id stringlengths 1 6 | url stringlengths 16 1.82k | content stringlengths 37 9.64M |
|---|---|---|
10500 | https://improvemandarin.com/house-in-chinese/ | Skip to content
97 House Vocabulary in Chinese (House Parts, Rooms & Objects)
Have you ever wondered what a house is called in Chinese? Knowing the key Chinese house vocabulary such as room names, home appliances, and furniture is very useful as you will probably need to use these words every day in China.
Luckily for you, we got this entire article dedicated to “house” in Chinese. We’re going to help you understand and use over 90 essential household vocabulary expressions. We will go around to each of the rooms in the house and show you what is typically there in Chinese households so you can use those words instantly in life. You’ll be able to expand your vocabulary even if you are an advanced Mandarin speaker!
Sound good? Let’s get started.
How to Say “House”in Chinese
First and foremost, the word for “house” in Mandarin Chinese is:
房子 (fángzi)
It’s a very quick and simple word for you to learn. 房 (fáng) means house, and 子 (zi) is a nominal suffix used after many nouns in Chinese. Depending on the situation and context, 房子 (fángzi) may also mean apartment or room. You can use this word colloquially as well as in written language.
Another common way of saying “house” in Chinese is:
房 (fáng)
You may simply use 房 (fáng), which is essentially the shortened version of 房子 (fángzi) to refer to a house sometimes. However, this word is rarely used on its own. Usually, it appears in house-related words and phrases.
For instance,
平房 (píng fáng) – bungalow (literally, “flat house”)
买房 (mǎi fáng) – buy (a) house
租房 (zū fáng) – rent (a) house
We’ll cover more house-related vocabulary in a minute. But before that, there is one thing you need to note:
The Measure Word for House in Chinese
In Chinese, all nouns require a measure word when counted. For instance, you wouldn’t just say “a house”, or “two apartments”, you would have to say “a [measure word] house” and “two [measure word] apartments”.
The most common measure words for 房子 (fángzi) – “house” in Chinese are 栋 (dòng) and 幢 (zhuàng). You can use them interchangeably, like
一栋房子 (yí dòng fángzi) – a house
两幢房子 (liǎng zhuàng fángzi) – two houses
However, if you are using 房子 (fángzi) to refer to an apartment, the proper measure word would be 套 (tào). For instance:
这套房子 (zhè tào fángzi) – this apartment
And when you are referencing a room, use 间 (jiān) instead as the measure word.
Example:
楼上有三间房。
Lóu shàng yǒu sān jiān fáng.
There are three rooms upstairs.
Parts of the House in Chinese
Now use the picture below to learn the names of different parts of the house in Chinese. Simply move your mouse around and the words will present themselves in Chinese.
second floor
二楼
èr lóu
1 of 9
« Previous
Next »
chimney
烟囱
yāncōng
2 of 9
« Previous
Next »
attic
阁楼
gélóu
3 of 9
« Previous
Next »
balcony
阳台
yángtái
4 of 9
« Previous
Next »
door
门
mén
5 of 9
« Previous
Next »
window
窗
chuāng
6 of 9
« Previous
Next »
roof
屋顶
wūdǐng
7 of 9
« Previous
Next »
wall
墙
qiáng
8 of 9
« Previous
Next »
first floor
一楼
yī lóu
9 of 9
« Previous
Next »
House-related Vocabulary in Chinese
It’s a good idea to add 房子/房 (fángzi/fáng) to your basic Chinese vocabulary, as it’s the building block of many useful daily words and phrases in Chinese.
Below are the most common house-related Chinese vocabulary words. We provide them with the Chinese characters as well as Pinyin romanization to help you pronounce the words. You’ll see that pairing 房(子)/fáng(zi) with different characters creates interesting compound words that relate to the house.
| | | |
---
| Chinese | Pinyin Pronunciation | English |
| 房间 | fángjiān | room |
| 楼房 | lóufáng | building |
| 买房(子) | mǎi fáng(zi) | buy a house |
| 卖房(子) | mài fáng(zi) | sell a house |
| 房价 | fáng jià | house price |
| 租房(子) | zū fáng(zi) | rent a house |
| 房租 | fáng zū | house rent |
| 房东 | fángdōng | landlord |
| 房客 | fángkè | tenant |
Home vs House in Chinese
If you’ve started to learn Chinese, you may already be familiar with another word – 家 (jiā), which means “home” in Chinese.
Like in English, people make a distinction between “home” and “house” in Chinese. While 家 (jiā) can refer to any place that we live in such as a house, a tent, a boat, a cave, or even the abstract notion, 房子 (fángzi) only means the physical building.
For example, if you live in a camper van, then your camper van can be your 家 (jiā), but not your 房子 (fángzi) – even if the Chinese word for camper van – 房车 (fáng chē) translates to “house car”.
Related Reading: Home in Chinese (25 Expressions to Expand Your Vocabulary)
All right, now that we have cleared all that up, let’s get onto talking about the different types of houses in Chinese.
Types of Houses in Chinese
There are a few types of Chinese houses and homes such as 公寓 (gōngyù), 别墅 (biéshù), 平房 (píng fáng), 老公房 (lǎo gōngfáng), etc.
Most Chinese people don’t live in single-family detached houses. Instead, they often live in apartments, especially in cities.
Here are the Chinese words for the different types of houses that people commonly live in.
1. 公寓 (gōngyù)
The standard Chinese word for “apartment” is 公寓 (gōngyù), though it’s often called 房子 (fángzi) as well in spoken Chinese. 公寓 (gōngyù) are the choice of the majority of Chinese people as they are cheaper.
2. 老公房 (lǎo gōngfáng)
老公房 (lǎo gōngfáng) are those communist-style apartment blocks built by the Chinese government in the 1950s-1980s to accommodate the working class. Nowadays, most of such old houses are resided by old people.
3. 商住两用房 (shāng zhù liǎng yòng fáng)
商住两用房 (shāng zhù liǎng yòng fáng) refers to the houses wherein a building comprises a mix of residential apartments and offices.
4. 别墅 (biéshù)
In Chinese, 别墅 (biéshù) is the generic word for a house that’s used as a residence, and usually housing a single household. A small house like a cottage is called a 小别墅 (xiǎo biéshù) – “small house” while a villa is referred to as a 豪华别墅 (háohuá biéshù) – “luxurious house”.
The term 别墅 (biéshù) may also be used for townhouses. To be more precise, you can call a stand-alone house 独栋别墅 (dúdòng biéshù), and a townhouse 联排别墅 (liánpái biéshù).
5. 平房 (píng fáng)
平房 (píng fáng) – bungalows used to be a popular type of house in China. A traditional type of bungalow you can still find throughout the country, most famously in Beijing, is called 四合院 (sì hé yuàn).
6. 石库门 (shí kù mén)
石库门 (shí kù mén), literally “stone warehouse gate”, is the most representative house style of Shanghai. These are clusters of two to three-story terrace houses that were built around the city in the early 20th century.
7. 农民房 (nóngmín fáng)
A 农民房 (nóngmín fáng), or “farmer’s house”, as the name suggests, is a rustic house with little aesthetic appeal built by farmers themselves in the countryside. An upscale house located in rural settings is instead referred to as 乡间别墅 (xiāngjiān biéshù) – “countryside house”.
8. 蒙古包 (Měnggǔ bāo)
蒙古包 (Měnggǔ bāo) refers to the primary housing structures that the Mongols use in China’s Inner Mongolia region (which is the home to more than 4 million Mongols). Like the usual residence, the yurt also has all the amenities.
9. 小屋 (xiǎo wū)
小屋 (xiǎo wū) is what we call “cabin” in Chinese. Like 房 (fáng), the word 屋 (wū) also means house or room. The primary difference you might find is that 屋 (wū) is usually smaller, simpler, and has less finishing compared to 房 (fáng). A cabin that is built from logs is called 小木屋 (xiǎo mù wū).
10. 树屋 (shù wū)
Yes, they do exist. Treehouses are called 树屋 (shù wū) in Chinese.
Rooms in the House in Chinese
As we’ve mentioned, the word 房 (fáng) can be used as a casual term for “room”. But a more formal word for room in Chinese is 房间 (fángjiān).
So, what are the Chinese names of the various 房间 (fángjiān) in a house?
Below is a quick rundown of the common room names in Chinese.
| | | |
---
| English | Chinese | Pinyin |
| living room | 客厅 | kètīng |
| dining room | 餐厅 | cāntīng |
| kitchen | 厨房 | chúfáng |
| bathroom | 卫生间 | wèishēngjiān |
| laundry room | 洗衣间 | xǐyījiān |
| bedroom | 卧室 | wòshì |
| office | 办公室 | bàngōngshì |
| study | 书房 | shūfáng |
| hallway | 玄关 | xuánguān |
| attic | 阁楼 | gélóu |
| basement | 地下室 | dìxiàshì |
| garage | 车库 | chēkù |
| balcony | 阳台 | yángtái |
| garden | 花园 | huāyuán |
balcony
阳台
yángtái
1 of 7
« Previous
Next »
second bedroom
次卧
cì wò
2 of 7
« Previous
Next »
living room
客厅
kètīng
3 of 7
« Previous
Next »
dining room
餐厅
cāntīng
4 of 7
« Previous
Next »
master bedroom
主卧
zhǔ wò
5 of 7
« Previous
Next »
bathroom
浴室
wèishēngjiān
6 of 7
« Previous
Next »
kitchen
厨房
chúfáng
7 of 7
« Previous
Next »
Now let’s learn how to use all of these words with some details.
Living Room in Chinese: 客厅 (kètīng)
Usually the most spacious room located at the front of the house, the living room is where Chinese families gather together for leisure. In China, the living room is called 客厅 (kètīng), literally “guest hall”, since it was originally a place to entertain visitors.
Dining Room in Chinese: 餐厅 (cāntīng)
The dining room is referred to as 餐厅 (cāntīng) in China. Literally “meal hall”, this word can also mean restaurant in Chinese.
Kitchen in Chinese: 厨房 (chúfáng)
厨房 (chúfáng) is probably everyone’s favorite room of the house. It means kitchen in Chinese.
Quiz: Do you know how to say “chef” in Chinese? Hint: it has something to do with “kitchen”. Check out our list of Mandarin professions to find out.
Bathroom in Chinese: 卫生间 (wèishēngjiān)
卫生间 (wèishēngjiān) is the bathroom in Chinese. This word usually refers to the room where the toilet is. However, if you’re referring to the room with the tub or shower instead, you can say 浴室 (yùshì). More on this in our article on 7 ways to say “bathroom” In Chinese.
Laundry Room in Chinese: 洗衣间 (xǐyījiān)
Laundry room in Chinese is simply “wash clothes room” – 洗衣间 (xǐyījiān). Most Chinese households don’t have a laundry room and the clothes are usually air-dried on the balcony.
Bedroom in Chinese: 卧室 (wòshì)
卧室 (wòshì) literally means “the room to sleep” in Chinese. The master bedroom in a house is called 主卧 (zhǔ wò) while the second and guest bedroom are called 次卧 (cì wò) and 客卧 (kè wò).
Office in Chinese: 办公室 (bàngōngshì)
Remember we all had to turn a part of our house into a home office during the COVID-19 outbreak? Well, the word for office in Chinese is 办公室 (bàngōngshì). And to say “work from home”, you say 在家办公 (zài jiā bàngōng).
Study in Chinese: 书房 (shūfáng)
This is an easy one: 书房 (shūfáng) – literally “book room”. Don’t confuse it with 图书馆 (túshūguǎn) which means library.
Hallway in Chinese: 玄关 (xuánguān)
The entryway area for a house or apartment is called 玄关 (xuánguān) in Chinese.
Attic in Chinese: 阁楼 (gélóu)
阁楼 (gélóu) can mean attic or loft in Chinese.
Here’s an interesting Chinese idiom with the word in it: 空中阁楼 (kōng zhōng gélóu) – “attics in the air”, meaning unrealistic plans or hopes for the future.
Basement in Chinese: 地下室 (dìxiàshì)
The word for basement in Chinese is 地下室 (dìxiàshì). It literally means “underground room”. There’s no clear-cut purpose for a basement. Many families convert it into a home gym – 家庭健身房 (jiātíng jiànshēnfáng), a home theater – 家庭影院 (jiātíng yǐngyuàn) or a “rec room” – 家庭娱乐室 (jiātíng yúlè shì).
Garage in Chinese: 车库 (chēkù)
车库 (chēkù) is what we call a garage in Chinese. It translates to “car storeroom”, literally. If you are talking about a fixed parking space in your apartment complex, then use the word 车位 (chēwèi) instead.
Balcony in Chinese: 阳台 (yángtái)
阳台 (yángtái), literally “sun deck”, is the balcony in Chinese. A terrace is called 露台 (lùtái).
Garden in Chinese: 花园 (huāyuán)
Finally, the garden around a house is called 花园 (huāyuán). Don’t get it mixed up with 公园 (gōng yuán), which is the park for the public.
Further Reading: Gardening Tools in Chinese
House Objects and Furniture in Chinese
Now we’re gonna go around the rooms in the house – the living room, the dining room, the kitchen, the bathroom, and the bedroom, and name the different items that are typically there in Chinese.
Let’s start with the living room.
Living Room Items in Chinese
| | | |
---
| English | Chinese | Pinyin |
| air conditioner | 空调 | kōngtiáo |
| bookshelf | 书架 | shūjià |
| carpet | 地毯 | dìtǎn |
| ceiling | 天花板 | tiānhuābǎn |
| chandelier | 吊灯 | diàodēng |
| coffee table | 茶几 | chájī |
| curtains | 窗帘 | chuānglián |
| fireplace | 壁炉 | bìlú |
| floor | 地板 | dìbǎn |
| floor lamp | 落地灯 | luòdìdēng |
| sofa | 沙发 | shāfā |
| TV | 电视机 | diànshìjī |
| TV cabinet | 电视柜 | diànshìguì |
| wall | 墙 | qiáng |
| window | 窗 | chuāng |
Note that though “coffee table” technically translates to 咖啡桌 (kāfēi zhuō) in Mandarin, Chinese people commonly refer to it as “tea table” – 茶几 (chájī).
Dining Room & Kitchen Items in Chinese
| | | |
---
| English | Chinese | Pinyin |
| chair | 椅子 | yǐzi |
| dining table | 餐桌 | cānzhuō |
| dishwasher | 洗碗机 | xǐwǎnjī |
| fridge | 冰箱 | bīngxiāng |
| kitchen counter | 厨房柜台 | chúfáng guìtái |
| microwave | 微波炉 | wēibōlú |
| oven | 烤箱 | kǎoxiāng |
| pan | 平底锅 | píngdǐguō |
| pot | 锅 | guō |
| stove | 炉灶 | lúzào |
| range hood | 油烟机 | yóuyānjī |
Further Reading: Kitchen Expressions in Chinese
Bathroom & Laundry Room Items in Chinese
| | | |
---
| English | Chinese | Pinyin |
| bathtub | 浴缸 | yùgāng |
| bath mat | 地垫 | dìdiàn |
| cabinet | 柜子 | guìzi |
| faucet | 水龙头 | shuǐlóngtou |
| mirror | 镜子 | jìngzi |
| shelf | 架子 | jiàzi |
| shower | 淋浴 | línyù |
| sink | 台盆 | táipén |
| tile | 瓷砖 | cízhuān |
| toilet | 马桶 | mǎtǒng |
| washing machine | 洗衣机 | xǐyījī |
See our full list of Chinese bathroom & toiletries vocabulary.
Bedroom Items in Chinese
| | | |
---
| English | Chinese | Pinyin Pronunciation |
| bed | 床 | chuáng |
| blanket | 毯子 | tǎnzi |
| drawers | 抽屉 | chōuti |
| makeup vanity | 梳妆台 | shūzhuāngtái |
| mattress | 床垫 | chuángdiàn |
| nightstand | 床头柜 | chuángtóuguì |
| pillows | 枕头 | zhěntou |
| rug | 小地毯 | xiǎo dìtǎn |
| table lamp | 台灯 | táidēng |
| wardrobe | 衣橱 | yīchú |
Not enough? Read on to learn more Chinese furniture vocabulary and expressions through examples.
Example Sentences with Housein Chinese
Now is the time to use the Chinese house vocabulary in context. Practice the following sentences and you’ll develop your knowledge of Chinese grammarand gain confidence in speaking Chinese in simple conversations.
我们下个月要搬到新房子了。
Wǒmen xià gè yuè yào bān dào xīn fángzi le.
We’re moving to a new house next month.
外国人能在中国买房吗?
Wàiguórén néng zài Zhōngguó mǎi fáng ma?
Can foreigners buy a house/apartment in China?
这栋房子是你们买的还是租的?
Zhè dòng fángzi shì nǐmen mǎi de háishì zū de?
Did you buy or rent this house?
上海的房价很高。房租也是。
Shànghǎi de fáng jià hěn gāo. Fáng zū yě shì.
The house price in Shanghai is very high. So is the rent.
这套房子有几个房间?
Zhè tào fángzi yǒu jǐ gè fángjiān?
How many rooms does this apartment have?
我们的房子有四个卧室,三个卫生间。
Wǒmen de fángzi yǒu sì gè wòshì, sān gè wèishēngjiān.
Our house/apartment has four bedrooms and three bathrooms.
这幢房子又大又漂亮,离海滩也很近。
Zhè zhuàng fángzi yòu dà yòu piàoliang, lí hǎitān yě hěn jìn.
This house is big and beautiful. It’s also close to the beach.
FAQs about Housein Chinese
How do I say “my house”in Chinese?
“My house” in Chinese is 我的房子 (wǒ de fángzi). Simply add the possessive pronoun 我的 (wǒ de) – meaning “my” to the word 房子 (fángzi). If you are referring to your home, you may also say 我家 (wǒ jiā) – “my home”.
How do I say “coffee house”in Chinese?
To say “coffee house” in Chinese, you can either say 咖啡馆 (kāfēi guǎn) or 咖啡屋 (kāfēi wū). The character 房 (fáng) is not to be used in this word.
How do I say “it’s on the house”in Chinese?
This English expression can’t be translated word for word into Chinese. To say something is free, you say 这是免费的 (zhè shì miǎnfèi de).
How do I say “the White House” in Chinese?
The White House in Chinese is 白宫 (bái gōng), literally “white palace”.
What’s “House of Cards”in Chinese?
House of Cards in Chinese is 纸牌屋 (Zhǐpái Wū). You can watch it with Chinese subtitles here.
Want to Speak Chinese for Real?
There you go! We’ve covered everything you wanted to know about house in Chinese. A great way to remember these vocabulary words is to go around your house and name things in Chinese. You could even write down a label and put it around if your family members don’t mind!
Now, if you’re learning Chinese, you should make the best out of ImproveMandarin.com, one of the world’s largest sites dedicated to Mandarin studies.
Here are some articles to help you get started:
Home in Chinese (25 Expressions to Expand Your Vocabulary)
Basic Chinese Words and Phrases to Survive in China
Easy Chinese Grammar for the Overwhelmed Beginners
How to Learn Chinese Faster – An Actionable Guide
By the way, if you’ve just started out to learn Chinese, we strongly recommend you take a structured Chinese course online. It’s far more effective than reading odd bits and pieces here and there and trying to put them together on your own.
We’ve practically reviewed every Chinese course available on the internet. Some are fantastic while others are a complete waste of time. Here are the best online Chinese courses we found in 2025. |
10501 | https://arxiv.org/abs/1312.0248 | [1312.0248] Maximizing the number of nonnegative subsets
Skip to main content
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors.Donate
>math> arXiv:1312.0248
Help | Advanced Search
Search
GO
quick links
Login
Help Pages
About
Mathematics > Combinatorics
arXiv:1312.0248 (math)
[Submitted on 1 Dec 2013 (v1), last revised 28 Jan 2014 (this version, v2)]
Title:Maximizing the number of nonnegative subsets
Authors:Noga Alon, Harout Aydinian, Hao Huang
View a PDF of the paper titled Maximizing the number of nonnegative subsets, by Noga Alon and 2 other authors
View PDF
Abstract:Given a set of $n$ real numbers, if the sum of elements of every subset of size larger than $k$ is negative, what is the maximum number of subsets of nonnegative sum? In this note we show that the answer is $\binom{n-1}{k-1} + \binom{n-1}{k-2} + \cdots + \binom{n-1}{0}+1$, settling a problem of Tsukerman. We provide two proofs, the first establishes and applies a weighted version of Hall's Theorem and the second is based on an extension of the nonuniform Erdős-Ko-Rado Theorem.
Subjects:Combinatorics (math.CO)
Cite as:arXiv:1312.0248 [math.CO]
(or arXiv:1312.0248v2 [math.CO] for this version)
Focus to learn more
arXiv-issued DOI via DataCite
Submission history
From: Hao Huang [view email]
[v1] Sun, 1 Dec 2013 16:51:44 UTC (7 KB)
[v2] Tue, 28 Jan 2014 01:59:33 UTC (8 KB)
Full-text links:
Access Paper:
View a PDF of the paper titled Maximizing the number of nonnegative subsets, by Noga Alon and 2 other authors
View PDF
TeX Source
Other Formats
view license
Current browse context:
math.CO
<prev | next>
new | recent | 2013-12
Change to browse by:
math
References & Citations
NASA ADS
Google Scholar
Semantic Scholar
export BibTeX citation Loading...
BibTeX formatted citation
×
Data provided by:
Bookmark
Bibliographic Tools
Bibliographic and Citation Tools
[x] Bibliographic Explorer Toggle
Bibliographic Explorer (What is the Explorer?)
[x] Connected Papers Toggle
Connected Papers (What is Connected Papers?)
[x] Litmaps Toggle
Litmaps (What is Litmaps?)
[x] scite.ai Toggle
scite Smart Citations (What are Smart Citations?)
Code, Data, Media
Code, Data and Media Associated with this Article
[x] alphaXiv Toggle
alphaXiv (What is alphaXiv?)
[x] Links to Code Toggle
CatalyzeX Code Finder for Papers (What is CatalyzeX?)
[x] DagsHub Toggle
DagsHub (What is DagsHub?)
[x] GotitPub Toggle
Gotit.pub (What is GotitPub?)
[x] Huggingface Toggle
Hugging Face (What is Huggingface?)
[x] Links to Code Toggle
Papers with Code (What is Papers with Code?)
[x] ScienceCast Toggle
ScienceCast (What is ScienceCast?)
Demos
Demos
[x] Replicate Toggle
Replicate (What is Replicate?)
[x] Spaces Toggle
Hugging Face Spaces (What is Spaces?)
[x] Spaces Toggle
TXYZ.AI (What is TXYZ.AI?)
Related Papers
Recommenders and Search Tools
[x] Link to Influence Flower
Influence Flower (What are Influence Flowers?)
[x] Core recommender toggle
CORE Recommender (What is CORE?)
Author
Venue
Institution
Topic
About arXivLabs
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs.
Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)
About
Help
Contact
Subscribe
Copyright
Privacy Policy
Web Accessibility Assistance
arXiv Operational Status
Get status notifications via email or slack |
10502 | https://www.tutor2u.net/economics/reference/concentration-ratios-in-economics?srsltid=AfmBOooQUxPcR_44tyiUcaV9LzOH4hTXuUxNza4ba7UidynDpxTpQt8o | Join us at the cinema! Our exam workshops are back in Leeds, Manchester, Birmingham and London this November
Learn more →
Students
Teachers
Got a code for an online course? Redeem your code
Students
Teachers
Got a code for an online course? Redeem your code
Economics
Reference Library
Study notes, videos, interactive activities and more!
Blog
Economics news, insights and enrichment
Collections
Currated collections of free resources
Topics
Browse resources by topic
Resource Selections
Currated lists of resources
Study Notes
Concentration Ratios in Economics
Last updated 31 Dec 2024
Concentration ratios are a key metric used in economics to measure the extent of market power held by the largest firms within a particular industry. They are especially significant in analyzing market structures, competition, and the degree of monopoly or oligopoly in a market.
Definition and Significance
Concentration ratios express the market share held by the largest firms in an industry. Typically measured as a percentage, these ratios help determine the level of competition and market control.
Key Ratios
Why Are Concentration Ratios Important?
Example Calculation
Imagine an industry where the top four firms have market shares of 30%, 25%, 15%, and 10%. The CR4 would be: 80%
This suggests a high level of concentration and likely an oligopolistic market.
Applications and Real-World Examples
Case 1: The Smartphone Industry
The global smartphone market is dominated by a few key players:
The CR4 for the smartphone market is 70%, indicating an oligopoly where a few firms control a majority of the market.
Case 2: The Coffee Retail Industry (UK)
In the UK, major coffee chains such as Costa Coffee, Starbucks, and Caffè Nero dominate, with a CR4 of approximately 65%. This concentration suggests moderate competition but significant control by a few firms.
Advantages and Disadvantages of High Concentration Ratios
Advantages
Disadvantages
Evaluating Concentration Ratios in Context
While concentration ratios provide useful insights, they should not be used in isolation. Consider:
Regulation and Policy Responses
Governments and regulators, such as the UK Competition and Markets Authority (CMA) or the US Federal Trade Commission (FTC), monitor concentration ratios to prevent monopolistic practices. Recent actions include:
Real-World Data and Figures
These examples highlight the diversity of concentration levels across industries and underscore their importance in economic analysis.
By understanding concentration ratios, students can better analyze real-world markets and appreciate the complex dynamics of competition, regulation, and consumer impact. Keep exploring industries to uncover more insights!
You might also like
Reducing Contestability using the ‘sardines’ technique
15th May 2014
What is Market Concentration?
Study Notes
Contestable Markets (Revision Quiz)
Quizzes & Activities
Mergers and Takeovers Revision Quiz
Quizzes & Activities
Concentration Ratio (AS Micro)
Topic Videos
Beyond the Bike lesson resource for returning AS students
25th May 2016
What do registered complaints tell us about competition in the Energy market?
1st September 2016
Market Structures (Revision Webinar)
Topic Videos
Our subjects
Explore
Contact
Boston House,
214 High Street,
Boston Spa,
West Yorkshire,
LS23 6AD
Tel: 01937 848885
© 2002-2025 Tutor2u Limited. Company Reg no: 04489574. VAT reg no 816865400. |
10503 | https://math.stackexchange.com/questions/1603753/difference-between-function-and-equation | Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Difference between function and equation
Ask Question
Asked
Modified 3 years, 11 months ago
Viewed 44k times
16
$\begingroup$
What is the precise difference between function and equation ? In which case will it be wrong if used( common mistakes )? Also will the Venn diagram overlap if I were to draw one ? Any help and discussions will be appreciated .
functions
Share
edited Feb 5, 2021 at 22:02
Servaes
68k88 gold badges8383 silver badges174174 bronze badges
asked Jan 7, 2016 at 22:26
Abu BardewaAbu Bardewa
41111 gold badge77 silver badges1515 bronze badges
$\endgroup$
1
$\begingroup$ Related: math.stackexchange.com/questions/2738360/… $\endgroup$
Ethan Bolker
– Ethan Bolker
2018-05-01 00:00:04 +00:00
Commented May 1, 2018 at 0:00
Add a comment |
4 Answers 4
Reset to default
24
$\begingroup$
A function is a transformation or mapping of one thing into another thing. It might be written as a rule (e.g. "Take the input and square it"), as a formula ("e.g. $f(x) = x^2$ or $x \mapsto x^2$), as a set of ordered pairs (e.g. $\left{(1, 1), (2, 4), (3, 9), \ldots\right}$, or any other way of showing how the output relates to the input. The function doesn't have to use numbers, either - a function could take two words and return their letters interlaced (so f(cat, dog) = cdaotg) or it could tell you what day of the week a given date falls on, or the post code/zip code of a given geographical location.
[In very formal terms, a function is a set of input-output pairs that follows a few particular rules.]
An equation is a declaration that two things are equal to each other. For example, $2^2 = 4$ is an equation stating that the square of 2 is 4. An equation may include variables of unknown value, and it may be true for all, some or none of the possible values of those variables. For example, $x^2 = 4$ is an equation that is true when $x = \pm 2$, and false for other values of $x$, while $x^2 = -4$ is an equation that is false for all real values of $x$.
What may be confusing you is that we often use equations to declare a relationship between two variables, often in the form of a function or formula. For example, $y = x^2$ is an equation stating that the value of $y$ is determined by the value of $x$ via the function $x^2$.
Share
answered Jan 7, 2016 at 23:07
ConManConMan
27.9k2727 silver badges4343 bronze badges
$\endgroup$
6
$\begingroup$ Very well explained. Thanks . $\endgroup$
Abu Bardewa
– Abu Bardewa
2016-01-08 07:45:20 +00:00
Commented Jan 8, 2016 at 7:45
1
$\begingroup$ A function means that every point in the domain for which the function is defined only has 1 image. $\endgroup$
Algebear
– Algebear
2018-04-30 23:44:03 +00:00
Commented Apr 30, 2018 at 23:44
$\begingroup$ @ConMan Even though we still use an equation to determine the output value of the function we don't mean to solve the equation right? If we have for example the function $f(x)=4$ no one will think to "solve" it. They will just map every $x$ to $4$ whereas if it was just an expression of equality ($y=4$) then the solution would be $4$. $\endgroup$
Antonios Sarikas
– Antonios Sarikas
2020-09-07 21:50:10 +00:00
Commented Sep 7, 2020 at 21:50
$\begingroup$ Correct.$f(x) = 4$ doesn't even really have a "solution" as such, since there's nothing to solve for (and if you're solving for "for which $x$ does $f(x) = 4$?" then the answer is "all of them"). $\endgroup$
ConMan
– ConMan
2020-09-07 22:50:40 +00:00
Commented Sep 7, 2020 at 22:50
$\begingroup$ One thing to note is that not all equations of two variables define a function. For example, $y=x^y$ does not define a function from ð¥ to ð¦ because it fails the vertical line test (i.e. there are some values of ð¥ that have $2$ images). For example, ð¥=1.3 has two corresponding ð¦-values that satisfy $y=1.3^y$ (see [graph] (desmos.com/calculator/2jlwcf7sfn)). $y=x^y$ does seem to define a function from ð¦ to ð¥ though as it doesn't fail the horizontal line test. $\endgroup$
joseville
– joseville
2021-11-16 18:19:39 +00:00
Commented Nov 16, 2021 at 18:19
| Show 1 more comment
2
$\begingroup$
It might be useful to introduce the term formula at this point.
Functions have arguments, i.e., values to be input into a formula. Equations do not have arguments to be input into a formula.
Share
answered Oct 14, 2021 at 11:42
David M. BowerDavid M. Bower
2111 bronze badge
$\endgroup$
Add a comment |
1
$\begingroup$
I think we also tend to muddy the semantic waters when we insist on referring to $f(x) = x^2$ (for instance) as a function. It's not: It's an equation. The function in this case is given by the expression $x^2$, so in that way we can say that expressions are functions. In this example, $f$ is the name of the function, $x$ is the input of the function,and $x^2$ is the expression which is the output, i.e., the function $f(x)$ itself.
Share
answered Apr 30, 2018 at 23:17
Paul HartzerPaul Hartzer
3511 bronze badge
$\endgroup$
3
1
$\begingroup$ This is not how it works. Do you know the strict definition of a function? $\endgroup$
Algebear
– Algebear
2018-04-30 23:42:13 +00:00
Commented Apr 30, 2018 at 23:42
$\begingroup$ You gave an example that "sin(x) is a function". sin(x) is an expression. It seems to me that you're interested in flexing technical muscles instead of having a constructive conversation. I'm not interested in that. $\endgroup$
Paul Hartzer
– Paul Hartzer
2018-05-02 01:48:44 +00:00
Commented May 2, 2018 at 1:48
$\begingroup$ No, it was not my intention to be understood as someone who likes to "flex technical muscles". I just like to point out to people how things are formally defined. If you're new here you should understand eventually that critic on others' work is the best way to learn from each other. $\endgroup$
Algebear
– Algebear
2018-05-02 12:25:07 +00:00
Commented May 2, 2018 at 12:25
Add a comment |
0
$\begingroup$
A function $f(x):D\to C$ must satisfy $\forall x\in C \ \text{where f is defined in this point $x$},\ \exists!\ f(x)\in D$; i.e. every point in the domain of $f$ for which $f$ is still defined may have only one image, which is a point on the line (a point in the codomain). Not to confuse with surjectivity. For example, $f:\mathbb{R}\to\mathbb{R}$ with $f(x)=\sin(x)$ is non-surjective for there is no $x\in \mathbb{R}$ such that $f(x)=2$. But the $\sin(x)$ is a function because there's no $x$-value with a multiple $f(x)$-value. An equation can be every equalty: a function is an equality, a differential equation is an equality. E.g. $x=y^2$ is an equation, but not a function if we view it with x in the domain and y in the codomain. For instance, $x=1$ has $y=1$ and $y=-1$ as solution (point in domain with two different images). Hence, not a function in the $(x,y)$-plane.
Share
edited Apr 30, 2018 at 23:47
answered Apr 30, 2018 at 23:41
AlgebearAlgebear
1,7421313 silver badges2222 bronze badges
$\endgroup$
2
$\begingroup$ re: "$\forall x \in C$", $x$ should be in the domain $D$, not the codomain $C$, right? i.e. it should be "$\forall x \in D$" $\endgroup$
joseville
– joseville
2021-11-16 18:10:14 +00:00
Commented Nov 16, 2021 at 18:10
$\begingroup$ Upvoted, but followup question, if you're using this notation: "ð(ð¥):ð·ð¶"; shouldn't it be "ð:ð·ð¶"? Likewise, "$sin(x)$ is a function" should be "$sin$ is a function". I'm using the following answer as a reference. $\endgroup$
joseville
– joseville
2021-11-16 18:16:37 +00:00
Commented Nov 16, 2021 at 18:16
Add a comment |
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
functions
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Visit chat
Linked
What exactly is an equation?
If two functions are mirror images of each other about the line $y=x$, are they inverses of each other?
7 Function, Relation, Operation and Cartesian Product
Related
2 Difference between "Lower sum" and "Riemann lower sum"
Difference between "Differentiability" and "Differentiation" .
4 Difference between horizontal and vertical line tests.
2 difference between function and relation?
What is the difference between the words "variables", "constants", "parameters" and "arguments"?
Understanding the difference between pre-image and inverse
0 What is the geometrical difference between concave function and Strictly concave funciton?
Hot Network Questions
Numbers Interpreted in Smallest Valid Base
Mishearing Monica’s line in Friends: “beacon that only dogs…” — is there a “then”?
Traversing a curve by portions of its arclength
Is it ok to place components "inside" the PCB
Can a state ever, under any circumstance, execute an ICC arrest warrant in international waters?
Identifying a movie where a man relives the same day
How exactly are random assignments of cases to US Federal Judges implemented? Who ensures randomness? Are there laws regulating how it should be done?
Is this commentary on the Greek of Mark 1:19-20 accurate?
I'm having a hard time intuiting throttle position to engine rpm consistency between gears -- why do cars behave in this observed way?
Copy command with cs names
Why is the definite article used in “Mi deporte favorito es el fútbol”?
Quantizing EM field by imposing canonical commutation relations
How to understand the reasoning behind modern Fatalism?
Fix integral lower bound kerning in textstyle or smaller with unicode-math
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
Converting hypergeometric function to Struve form
Clinical-tone story about Earth making people violent
How to use cursed items without upsetting the player?
Proving a certain Cantor cube is a complete metric space (by definition) - proof verification
Can I use the TEA1733AT for a 150-watt load despite datasheet saying 75 W?
Are there any alternatives to electricity that work/behave in a similar way?
Can a cleric gain the intended benefit from the Extra Spell feat?
I have a lot of PTO to take, which will make the deadline impossible
Matthew 24:5 Many will come in my name!
more hot questions
Question feed |
10504 | https://www.cs.unibo.it/~asperti/PAPERS/popl104-asperti.pdf | The Intensional Content of Rice’s Theorem (Pearl) Andrea Asperti Department of Computer Science, University of Bologna Mura Anteo Zamboni 7, 40127, Bologna, ITALY asperti@cs.unibo.it Abstract The proofs of major results of Computability Theory like Rice, Rice-Shapiro or Kleene’s fixed point theorem hide more informa-tion of what is usually expressed in their respective statements. We make this information explicit, allowing to state stronger, complex-ity theoretic-versions of all these theorems. In particular, we replace the notion of extensional set of indices of programs, by a set of in-dices of programs having not only the same extensional behavior but also similar complexity (Complexity Clique). We prove, under very weak complexity assumptions, that any recursive Complexity Clique is trivial, and any r.e. Complexity Clique is an extensional set (and thus satisfies Rice-Shapiro conditions). This allows, for in-stance, to use Rice’s argument to prove that the property of having polynomial complexity is not decidable, and to use Rice-Shapiro to conclude that it is not even semi-decidable. We conclude the paper with a discussion of “complexity-theoretic” versions of Kleene’s Fixed Point Theorem.
Categories and Subject Descriptors F.4.1 [Computability The-ory]; F.1.3 [Machine-independent complexity] General Terms Theory Keywords Recursion Theory, computability 1.
Introduction Recursive properties of extensional sets, i.e. index sets for par-tial recursive functions, have been extensively studied since the early days of Recursion Theory (Rice 1953; Dekker and Myhill 1958). Among intensional properties of programs, a major role is played by complexity. The theoretical research on effective proper-ties of recursive functions under complexity assumptions focused, since the very beginning, on complexity classes, that is classes of recursive functions computable (almost everywhere) within a given bound of complexity t. Studies on complexity classes, mostly developed in the abstract framework promoted by Blum (Blum 1967), extensively investigated their order structure under set theo-retic inclusion (Borodin 1972; McCreight and Meyer 1969), their recursive presentability and the computational quality of such a pre-Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
POPL ’08 10-12 January 2008, San Francisco (Ca) Copyright c ⃝2008 ACM [to be supplied]...$5.00 sentation (Lewis 1970; Young 1969; Landweber and Robertson 1972). It is important to understand that a complexity class is a set of functions, and not of indices; regarded as a set of indices, it is thus extensional by definition. If we are really interested in decid-ability properties of program complexity, complexity classes do not look like as an adequate instrument to perform the investigation.
The notion we propose here is that of complexity clique. A com-plexity clique (Section 2) is a set of indices for recursive functions closed w.r.t. indices of functions with same extension and similar complexity (defined in the only sensible way, namely up to con-stants). A complexity clique is not extensional, in general. On the other side, any extensional set is a complexity clique (the trivial “complexity” clique with arbitrary complexity).
Set-theoretic (Section 3) and, especially, recursive properties of complexity cliques are investigated. In particular, we general-ize both Rice’s Theorem (Section 4) and Rice-Shapiro’s Theorem (Section 5), concluding with a discussion of Kleene’s second fixed point Theorem from a complexity perspective (Section 6). Remark-ably, all proofs remain essentially the same of their classical coun-terparts: in other words, all those proofs seem to hide more infor-mation of what is expressed in their classical statements, and the notion of Complexity Clique is precisely what is required to make this hidden information explicit (providing our original motivation for their introduction).
Following an old tradition, we try to stick to the appealing gen-erality of Blum’s axiomatic approach; however, axiomatization is not the focus of the paper, and we shall introduce new axioms with some liberality, as far as they are satisfied by standard complex-ity measures; in particular, we shall introduce additional axioms bounding the complexity of (linear) composition, of the s-m-n func-tion, and finally of the universal machine.
Our generalization of Rice’s Theorem and other enumeration techniques is also different from (and in some sense complemen-tary to) the approach in (Kozen 1980): while Kozen investigates extensional properties in a sub-recursive setting, we are essentially concerned with decidability of complexity questions in a general recursive setting.
2.
Similarity and Complexity Cliques We shall work with n-ary partial recursive functions over natural numbers. If f is such a partial function, dom(f) and cod(f) re-spectively denote the domain and range of f. We write f(n) ↓if n ∈dom(f). We use ⊥for the everywhere divergent function, that is dom(⊥) = ∅. Given two function f and g, we write f ∼ = g when fand g have the same graph, i.e. dom(f) = dom(g) and for any n ∈dom(f), f(n) = g(n). We say a function is finite if it has a finite graph (i.e. dom(f) is a finite set). Partial functions are or-dered w.r.t the set-theoretic inclusion of their graphs: f ≤g if and only if graph(f) ⊆graph(g). ω is the set of all natural numbers.
DEFINITION 1. Let f and g be partial functions on natural num-bers: 1. we say f ∈O(g) if and only if there exist n and c such that for any m ≥n, if g(m) ↓then f(m) ≤cg(m); 2. f ∈Θ(g) if and only if f ∈O(g) and g ∈O(f).
Note that if f ∈Θ(g) the domains of f and g may only differ for a finite number of points. Let us also remark that, f ∈Θ(g) if and only if g ∈Θ(f); in particular, f ∈Θ(g) is an equivalence relation.
DEFINITION 2. (Blum 1967) A pair ⟨φ, Φ⟩is a computational complexity measure if φ is a principal effective enumeration of partial recursive functions and Φ satisfies Blum’s axioms: (a) φi(⃗ n) ↓↔Φi(⃗ n) ↓ (b) the predicate Φi(⃗ n) = m is decidable We say two programs are similar when they compute the same function and have the same complexity, up to constants: DEFINITION 3. Two programs i and j are similar (write i ≈j) if and only if φj ∼ = φi ∧Φj ∈Θ(Φi) THEOREM 4. Similarity is an equivalence relation.
Proof. Obvious, since similarity is defined as intersection of two equivalence relations.
We shall write [i]≈for the equivalence class of i w.r.t. the similarity relation ≈.
DEFINITION 5. Let ⟨φ, Φ⟩be an abstract complexity measure. A set P of natural numbers is a Complexity Clique, if and only if for all i and j i ∈P ∧j ≈i →j ∈P EXAMPLE 6. The following are examples of Complexity Cliques: 1. ∅and ω; 2. for any index i, [i]≈; 3. for any index i, {j|Φj ∈O(Φi)}.
On the other side the set {i|Φi(a) = b} (i.e. the programs whose complexity on input a is b) is not a Complexity Clique, in general.
3.
Simple properties of Complexity Cliques A set A ⊂ω of indices is extensional if, for all i and j, i ∈ A ∧φj ∼ = φi →j ∈A; this is equivalent to say that A is the counter-image (index set) under φ of some subset of partial recursive functions.
The notion of Complexity Clique is a strict generalization of the notion of extensional set well known in computability theory: THEOREM 7. Every extensional set is a Complexity Clique.
Proof. Trivial.
Of course, the converse is not true: for instance, the class of pro-grams with polynomial complexity is not extensional.
Any Complexity Cliques is a union of similarity classes, in particular: THEOREM 8. C is a Complexity Clique if and only if C = [ i∈C [i]≈ Proof. Trivial.
As a consequence, Complexity Cliques have very good alge-braic properties; in particular: THEOREM 9. Complexity Cliques, equipped with the subset rela-tion, are a Complete Boolean Lattice.
Proof. Just note that C = S i∈C[i]≈. The rest is easy.
The good set-theoretic properties of Complexity Cliques are to be compared with the very bad properties of Complexity Classes (stressing again the strong difference between the two notions). In particular: 1. for any complexity measure, Complexity Classes are not closed under union (Hartmanis and Stearns 1965; McCreight and Meyer 1969); 2. there are complexity measures whose Complexity Classes are not closed under intersection1(Landweber and Robertson 1972) Let us finally remark an important property about finite functions.
THEOREM 10. Let C be a Complexity Class and let i ∈C. If φi is finite then for any j such that φi ∼ = φj, j ∈C.
Proof.For finite functions, extensional equivalence implies similar-ity.
4.
Generalized Rice’s Theorem DEFINITION 11. A pair ⟨φ, Φ⟩has the s-m-n property if for all positive natural numbers m and n there exists a recursive function sn m such that, for any i and all x1, . . . , xm (a) φsn m(i,x1,...,xm) ∼ = λy1, . . . , yn.φi(x1, . . . , xm, y1, . . . , yn) (b) Φsn m(i,x1,...,xm) ∈Θ(λy1, . . . , yn.Φi(x1, . . . , xm, y1, . . . , yn)) Equation (a) is the standard s-m-n theorem, while equation (b) states that the overhead introduced by the function sn m is at most a constant factor: in fact, in standard computational models, it amounts to the cost of copying the (fixed) parameters x1, . . . , xm and then calling φi - see e.g. Cutland (1986); B¨ orger (1986); Odifreddi (1997).
Since the set or recursive functions is closed under composition, by the s-m-n theorem we may conclude that there exists a total computable function h such that φh(i,j) ∼ = φi◦φj. Axioms relating the complexity of h(i, j) to the complexity of its components have been considered by Lischke (1975, 1976, 1977). For the purposes of our analysis, we need a tight bound: DEFINITION 12. A pair ⟨φ, Φ⟩has the (linear) time-composition property if there exists a total computable function h such that (a) φh(i,j) ∼ = φi ◦φj (b) Φh(i,j) ∈Θ(Φi ◦φj + Φj) We say that it has the (linear) space-composition property if equa-tion (b) is replaced by (c) Φh(i,j) ∈Θ(max{Φi ◦φj, Φj}) Equation (b) says that the cost for computing φi(φj(x)) is, up to a constant factor, no more than the cost for computing φj(x) plus the cost for computing φi on input φj(x). Similarly, the space required for the same computation is the maximum among the 1 An important exception are measures satisfying the parallel computation property (Landweber and Robertson 1972) (see also section 5).
space required for computing φj(x) and the space required for computing φi on input φj(x).
The previous equations may be extended to n-ary composition, provided that input variables are linearly partitioned among the components; if duplication of some input is required, we should eventually take this cost into account, adding a linear overhead.
A particular case of (multi-variable) linear composition of fre-quent use in computability theory is sequencing with absence of communication, i.e. the case of a function φg(i,j)(x, y) = φj(x); φi(y) = ( φi(y) if φj(x)↓ ⊥ otherwise The aim is merely to force the evaluation of φj(x) before computing φi(y). According to our definitions Φg(i,j) ∈Θ(λxy.(Φj(x) + Φi(y))) for time and Φg(i,j) ∈Θ(λxy.max{Φj(x), Φi(y)}) for space.
In combination with the s-m-n property, fixing the parameter x, we have, for both time and space: LEMMA 13. There exists a total computable function c such that (a) ( φc(i,j,x)(y) = φi(y) if φj(x)↓ φc(i,j,x)(y) = ⊥ otherwise (b) ( Φc(i,j,x) ∈Θ(Φi) if φj(x)↓ Φc(i,j,x) = ⊥ otherwise In fact, the previous Lemma is all we need for the generalization of Rice’s Theorem to Complexity Cliques.
THEOREM 14. Under the s-m-n (Def. 11) and the linear-composition (Def. 12) assumptions (either in time or space), a Complexity Clique P is recursive if and only if it is trivial, i.e. P = ∅∨P = ω.
Proof. Assume P is recursive and let φp be its characteristic func-tion. Suppose P is not trivial, so there exist a and b such that φp(a) = 1 and φp(b) = 0. Let m be the index of a program computing the everywhere divergent function; either φp(m) = 1 or φp(m) = 0. Let us consider the latter case, the other one being analogous.
Let K be a r.e. not recursive set, and let φk be its semi-decision function, i.e. dom(φk) = K. Consider the following function: f(x, y) = φk(x); φa(y). By Lemma 13 there exists a total com-putable function c such that (a) ( φc(a,k,x)(y) = φa(y) if x ∈K φc(a,k,x)(y) = ⊥= φm(y) otherwise (b) ( Φc(a,k,x) ∈Θ(Φa) if x ∈K Φc(a,k,x) = ⊥= Φm(y) otherwise Since P is a Complexity Clique, φp(c(a, k, x)) = ( φp(a) = 1 if x ∈K φp(m) = 0 otherwise So, λx.φp(c(k, a, x)) is a characteristic function for K; c is com-putable, hence φp cannot be.
The case φp(m) = 1 is similar.
The knowledgeable reader will have certainly recognized, in part (a) of the above proof, the traditional Rice’s argument. We just rephrased it to put in evidence the two elementary operations required by the transformation, namely composition and s-m-n.
Providing a complexity bound for such operations is the key point that allows us to take complexity into account in a formal way.
However, it is clear that, in concrete computational models, part (b) is always satisfied (that is, the program φx(x); φa(y) has, for any given x, the same computational complexity as φa(y).
5.
Generalized Rice-Shapiro’s Theorem Rice’s Theorem provides a simple structural criterion for an exten-sional set to fall in Σ0. Rice-Shapiro’s Theorem2 does the same for Σ1. In a modern terminology, the result states that any completely r.e. set A of partial functions is upward closed and compact, i.e.
φi ∈A ⇔∃u finite, u ∈A ∧u ≤φi Let us start considering upward closedness, or monotonicity. The proof is not as standard as the one for Rice’s Theorem, and not ev-ery proof is suitable for a complexity-theoretic generalization. We recall here the argument in Odifreddi (1997), that is particularly close to our approach. Suppose there exist two partial recursive functions φi and φj such that φi ∈A, φj ̸∈A and φi ≤φj.
Let f be a recurtsive function such that φf(e)(x) = y ⇔φi(x) = y ∨(e ∈K ∧φj(x) = y) where K is an arbitrary r.e. non recursive set. Observe that the function f is well defined and computable just because φi ≤φj.
Then e ∈K ⇔φf(e) ∈A and since A is completely r.e. K would be r.e. too, that is a contradiction.
The key point of the above proof essentially consists in running in parallel two functions, namely φi(x) and φk(e); φj(x) where φk is a semidecision function for K. In order to study the complexity of the composite function, we need some assumptions about the complexity of parallel composition. Remarkably, the subject was investigated by Landweber and Robertson (1972) a long time ago and for quite different reasons.
DEFINITION 15. (Landweber and Robertson 1972) A pair ⟨φ, Φ⟩ has the parallel computation property if there exists a total com-putable function h such that (a) φh(i,j)(x) = ( φi(x) if Φi(x) ≤Φj(x) φj(x) otherwise (b) Φh(i,j) ∈Θ(λx.min{Φi(x), Φj(x)}) THEOREM 16. Let P be a r.e. Complexity Clique. If i ∈P, φi is finite and φi ≤φj then j ∈P.
Proof. Suppose there exist i and j such that i ∈P, φi is finite, φi ≤φj but j ̸∈P. Let K be a r.e. not recursive set, and let φk be its semi-decision function, i.e. dom(φk) = K. By Lemma 13 there exists a total computable function c such that φc(j,k,x)(y) = φk(x); φj(y) Let h be the function of the parallel computation property, and let us consider φh(i,c(j,k,x))(y) = ( φi(y) if Φi(y) ≤Φc(j,k,x)(y) φc(j,k,x)(y) otherwise 2 There seem to be some controversy on the paternity of this result; in particular, it is attributed to Shapiro (1956) by Rogers (1987), pag.324, and to Myhill and Shepherdson (1955) by (Odifreddi 1997), pag.206.
We claim that φh(i,c(j,k,x))(y) = ( φi(y) if x ̸∈K φj(y) otherwise If x ̸∈K then φc(j,k,x)(y) ↑so, by definition of φh(i,c(j,k,x)), either Φi(y) ↓and then φh(i,c(j,k,x))(y) = φi(y) or otherwise both φh(i,c(j,k,x))(y) and φi(y) diverge.
Conversely, suppose x ∈K. If φj(y) ↑, since φi ≤φj, also φi(y) ↑and hence φh(i,c(j,k,x))(y) ↑. If φj(y) ↓then, even if Φi(y) ≤Φc(j,k,x)(y) since φi ≤φj we have φi(y) = φj(y), and so in any case φh(i,c(j,k,x))(y) = φj(y). The second claim is that Φh(i,c(j,k,x)) ∈ ( Θ(Φi) if x ̸∈K Θ(Φj) otherwise Indeed if x ̸∈K then Φc(j,k,x) = ⊥and λy.min{Φi(y), Φc(j,k,x)(y)) = Φi Conversely, if x ∈K, by Lemma 13, Φc(j,k,x) ∈Θ(Φj), and since by hypothesis φi is finite, λy.min{Φi(y), Φc(j,k,x)(y)) = Φc(j,k,x) almost everywhere, so Θ(λy.min{Φi(y), Φh(i,c(j,k,x))(y)} = Θ(Φj) In conclusion, since P is a Complexity Clique, having assumed i ∈P and j ̸∈P, we have h(i, c(j, k, x)) ∈P ↔x ̸∈K and thus P cannot be r.e.
Let us remark that the hypothesis that φi is finite plays a crucial role in the previous proof. The point is that we have to compute a function similar to φi, if x ̸∈K and a function similar to φj if x ∈K. The parallel composition of φi and φj, when x ∈K, might be too fast for our purposes (it could belong to our complexity clique even if φj does not). Take for instance the case φi ∼ = φj but Φi is uniformly faster then Φj: in this case the parallel composition of i and j gives an algorithm with the same complexity as i.
As a corollary of Theorem 16 we get the following alternative proof of Rice’s Theorem (we repeat the statement both for com-pleteness and for ease of reference to the new proof): THEOREM 17. A Complexity Clique P is recursive if and only if it is trivial, i.e. P = ∅∨P = ω.
Proof. Let P be a recursive Complexity Clique. Then both P and P are r.e. and both are Complexity Cliques, since Complexity Cliques are closed under complementation. Let m be and index for the everywhere divergent function. Eventually, m ∈P or m ∈P.
If m ∈P then by Theorem 16 the index of any function must be in P, so P = ω. Similarly, if ⊥∈P then P = ω.
Let us now come to the converse of Theorem 16, that is com-pactness. In this case, Odifreddi’s proof runs as follows. Suppose A is a completely r.e. set of partial computable functions; assume φi ∈A but no finite subfunction of φi is in A. Let g(t) be the partial computable function such that g(x, t) = ( ↑ if φx(x) ↓in less then t steps 0 otherwise and consider the function φf(e)(x) = g(e, x); φi(x). It is clear that φf(e) ∼ = φi if φe(e) ↑and φf(e) is some finite subfunction of φi(x) if φe(e) ↓. Hence, φf(e) ∈A ⇔e ∈K, that is a contradiction.
We could probably argue that the complexity of g(x, t), when it terminates, is at most linear in t. However, this seems to require some delicate assumptions on the complexity of the intrepreter, and we finally decided to follow a slightly different route.
First of all we need a slight generalization of the parallel com-position property. The problem is that definition 15 does not allow to apply different continuations to the two parallel computations after termination of one of them.
DEFINITION 18. A pair ⟨φ, Φ⟩has the generalized parallel com-putation property if there exists a total computable function p such that for all i, i′, j, j′ (a) φp(i,i′,j,j′)(x) = ( φi′(φi(x)) if Φi(x) ≤Φj(x) φj′(φj(x)) otherwise (b) Φp(i,i′,j,j′) ∈Θ λx.
( Φh(i′,i)(x) if Φi(x) ≤Φj(x) Φh(j′,j)(x) otherwise !
where h is the sequential composition function of Definition 12.
Even if the definition is a bit involved, the generalized parallel computation property looks like a natural extension of property 15: roughly, the idea is that, given two algorithms, we may “arbitrarily” fix a checkpoint in their respective code, run them in parallel and, according to which one reaches its checkpoint first, drop the other computation. In order to reduce the generalized property to the simpler one, it looks enough to state the existence of pairs and a test function (we must know which one of the two computations terminated first), but then we should also discuss the complexity of all these new notions, that would drive us a bit too far away.
THEOREM 19. Let P be a r.e. Complexity Clique. If i ∈P and Φi ̸∈O(1) then there exists j such that φj is finite, φj ≤φi and j ∈P.
Proof. Let K be a r.e. not recursive set, and let φk be its semi-decision function, i.e. dom(φk) = K. Let m be an index for the everywhere divergent function, and let I be an index for the identity. By the s-m-n property there exists a total computable function c such that φc(x,k)(y) = φk(x) φc(x,k) is either the everywhere divergent function if x ̸∈K or a constant function with complexity Φc(x,k) ∈Θ(λy.Φk(x)) = Θ(1) otherwise. By the generalized parallel computation property, (a) φp(i,I,c(x,k),m)(y) = ( φi(y) if Φi(y) ≤Φk(x) ↑ otherwise (b) Φp(i,I,c(x,k),m) ∈Θ λy.
( Φi(y) if Φi(y) ≤Φk(x) ↑ otherwise !
If x ̸∈K then for any y Φi(y) ≤Φk(x), hence φp(i,I,c(x,k),m)(y) = φi(y), and the two functions also have the same complexity. If x ∈K, since Φi ̸∈O(1) then, Φi(y) ≤Φk(x) only for a finite number of values for y, and hence φp(i,I,c(x,k),m) is a finite func-tion.
If no index of finite sub-functions of φi is in P, we have φp(i,I,c(x,k),m) ̸∈P ↔x ̸∈K and thus P cannot be r.e.
COROLLARY 20. Let P be a r.e. Complexity Clique. If i ∈P and Φi ̸∈O(1) then for every j such that φj ∼ = φi we have j ∈P.
Proof. By Theorem 19, there exists a finite sub-function φr ≤φi such that r ∈P, and by Theorem 16, any j such that φr ≤φj, independently from its complexity Φj, must belong to P.
COROLLARY 21. No Complexity Clique of total functions and containing (indices of) programs with non constant complexity can be r.e.
By the last corollary, we have e.g. that the class of programs with linear (polynomial, exponential, . . . ) complexity is not r.e. (in fact, they are all Σ0 2: see below).
Corollary 20 essentially says that every Complexity Clique in Σ0 1 is (morally) an extensional set; in other words, all Complexity Cliques in Σ0 1 have trivial complexity. Since the complement of an extensional set is also extensional, a similar result holds for Complexity Cliques in Π0 1. Precisely: COROLLARY 22. Let P be a Complexity Clique in Π0 1. If i ∈P then for every j such that Φj ̸∈O(1) and φj ∼ = φi we have j ∈P.
Proof. Let i ∈P and consider j such that Φj ̸∈O(1) and φj ∼ = φi.
If j ̸∈P then j ∈P. Since P is a r.e. Complexity Clique, then we are in the hypothesis of Corollary 20 and we should have i ∈P, that is contradictory.
It is natural to wonder if there are Complexity Cliques with non trivial complexity in Σ0 2.
THEOREM 23. Let t be any total recursive function. Let Ct be the following Complexity Clique: Ct = {i|Φi ∈O(t)}. Then, Ct ∈Σ0 2.
Proof. By definition, Φi ∈O(t) if there exist n and c such that for any m ≥n, Φi(n) ≤ct(n). The relation Φi(n) ≤ct(n) is decidable by definition of complexity measure (Definition 2).
Hence, Ct is Σ0 2.
Since Σ0 2 is closed under r.e. unions, many interesting Complexity Cliques (such as, for instance, the Cliques of programs with poly-nomial complexity) are in Σ0 2.
6.
Kleene’s Second Fixed Point Theorem Kleene’s Second Fixed Point Theorem, in Rogers’ formulation (Rogers 1987), states that for any total recursive function f there exists an indices i such that φi ∼ = φf(i). The question is if we can always find a fixpoint i with the same complexity as f(i).
In the general framework given by an arbitrary abstract com-plexity measure, the best we can prove is that the two complexity of i and f(i) are related by a total recursive function. More pre-cisely3: THEOREM 24. (Blum 1971) There exists a binary total recursive function h monotonically increasing in its second argument such that, for any total recursive function φi there exists an index m such that, for any x, (1) φm(x) = φf(m)(x) (2) Φm(x) ≤h(x, Φf(m)(x)) (3) Φm(x) ≥Φf(m)(x) Fixing a particular model of computation, we may of course pro-vide a better estimation for h. The interesting point is that, assum-ing the s-m-n property, the complexity of h uniquely depends from the complexity of the universal function φu: THEOREM 25. Let ⟨φ, Φ⟩be an abstract complexity measure with the s-m-n property 11, and let u be an index for the universal 3 See (Odifreddi 1999) for the analogous theorem in terms of Kleene’s formulation of the Fixed Point Theorem. This has been also investigated in (Hansen et al. 1989) but no theoretical measure is given: the emphasis of the paper is more on practical, implementative issues.
function. Then for any total recursive function φi there exists an index m such that, for any x, (1) φm ∼ = φφi(m) (2) Φm ∈Θ(λy.Φu(φi(m), y) Proof. Consider the following computable function: g(x, y) = φφi(φx(x))(y) = φu(φu(i, (φu(x, x))), y) By the s-m-n theorem there exists a computable function s such that φs(x) = λy.g(x, y) and, for any x, Φs(x) ∈ Θ(λy.Φu(φu(i, (φu(x, x))), y)) = Θ(λy.Φu(φi(φx(x)), y)) (x is a fixed parameter, hence the complexity of computing φi(φx(x)) does not matter). Since s is a total computable function there exists p such that s = φp. φp(p)↓since φp is total. Moreover we have: φφp(p)(y) = g(p, y) = φφi(φp(p))(y) and Φφp(p) = Θ(λy.Φu(φi(φp(p)), y) DEFINITION 26. We say that a universal function φu is fair if for any x λy.Φu(x, y) ∈Θ(Φx) The cost of interpreting a program i by a fair universal machine may only introduce a constant slow-down factor c w.r.t. the direct computation of i. However, the constant c may depend on i. Fol-lowing (Jones 1993) we say that the universal machine is efficient when the constant c is independent from the interpreted program.
COROLLARY 27. Let ⟨φ, Φ⟩be an abstract complexity measure with the s−m−n property 11. If it admits a fair universal function u then for any total recursive function φi there exists an index m such that, for any x, (1) φm ∼ = φφi(m) (2) Φm ∈Θ(Φφi(m)) Let us remark that the previous result says almost nothing about the “efficiency” of the fixpoint; it only says that, independently from φi we may always find a fixpoint m as (in-)efficient as φi(m) (that is not surprising: a fixpoint program is as efficient as the program defined by its body).
Not all computational models seem to admit fair universal ma-chines. Discussing the case of multi-tape Turing machines, Blum (1971) suggests an upper bound for Φu(i, j) given by Φi(j)2 + j, where the square is due to the fact that the universal machine has a given number of tapes, but may need to simulate additional ones (if we admit that the universal machine has at least two tapes, the cost is likely to be reduced to log(Φi(j))Φi(j) + j)4.
However, many models, comprising single tape Turing ma-chines, lambda calculus and combinatory logic have fair universal machines. Unfortunately, this the kind of results that, belonging to the so called “folklore” of these subjects, cannot be properly quoted or elaborated. We hope someone will assume soon or later the bur-den to formally prove these important properties, and also hope that the scientific community will be so wise to accept these contribu-tions. As a remarkable exception, the existence of efficient universal functions is proved by Jones (1993) for several classes of compu-tational models defining problems in deterministic linear time (i.e.
computational models with very restricted capabilities).
4 In our opinion, the notion of multi-tape machine as a foundational model of computation is arguable: indeed, we are used to work with a fixed ma-chinery (a given processor), that amounts to fix a single universal machine with a given number of tapes, emulating all other programs.
The strong version of the Fixed Point Theorem of Corollary 27 (when it holds) is a major tool for the investigation of Complexity Cliques, since it can be used with the same confidence of the traditional theorem w.r.t. extensional sets. As a simple example, let us consider the traditional proof of Rice’s Theorem making use of a fixed point.
THEOREM 28. A Complexity Clique P is recursive if and only if it is trivial, i.e. P = ∅∨P = ω.
Proof. Assume P is recursive and let φp be its characteristic func-tion. Suppose P is not trivial, so there exist a and b such that φp(a) = 1 and φp(b) = 0. Let us consider the following com-putable function g(x) = ( a if φp(x) = 0 b if φp(x) = 1 If φp is total recursive, so is g, hence we may apply Corollary 27, concluding that there exists an index m such that φm ∼ = φg(m) Φm ∈Θ(Φg(m)) In particular, if φp(m) = 0 we have φm ∼ = φa Φm ∈Θ(Φa) Since P is a Complexity Clique and φp(a) = 1 it should also be φp(m) = 1: contradiction.
Similarly, if if φp(m) = 1 we have φm ∼ = φb Φm ∈Θ(Φb) Since P is a Complexity Clique and φp(b) = 0 it should also be φp(m) = 0, that is again a contradiction.
7.
Conclusions In this paper, we introduced the notion of Complexity Clique: a set of indices for programs closed under a similarity relation de-fined taking into account their extension and complexity. Recursive properties of Complexity Cliques have been investigated, sharpen-ing classical results of Recursion Theory, like Rice’s and Rice-Shapiro’s Theorems. In particular, we proved that all recursive Complexity Cliques are trivial, and all Complexity Cliques in Σ0 1 and Π0 1 are in fact (morally) extensional (i.e. are trivial w.r.t. com-plexity). In this way, we rephrase classical theorems in computabil-ity theory in order to establish properties of classes of programs defined by complexity conditions, concluding that no non-trivial complexity property is semi-decidable. For instance, the recent field of implicit computational complexity - see eg Dal Lago and Baillot (2006), Amadio (2005), citetAR02 and the biliography therein -studies criteria on programs implying some complexity properties.
The results of this paper put in evidence that such criteria, when-ever computable, can not be necessary and sufficient conditions. In other words, if polytime languages may be extensionally complete (computing all polynomial functions) they cannot be intensionally complete, that is express all polynomial algorithms.
The technical flavor of the paper follows Blum’s axiomatic ap-proach, but for the aims of the proofs we extended Blum’s axioms with stronger assumptions, concerning the complexity of the s-m-n function, of sequential and parallel composition, and of the univer-sal machine. Not all assumptions are needed for all results and the study of complexity seem to allow a deeper, fine grained, investi-gation even of traditional aspects of Recursion Theory (see e.g. the three different proofs of the generalized Rice’s Theorem: Theorems 14-17-28).
It is possible (but not evident) that by relaxing the complexity condition in the notion of similarity (e.g. to recursive relatedness via some total recursive function h) we could prove (much) weaker results in the full generality of an arbitrary abstract complexity measure (i.e. without requiring any additional axiom). However, our axioms are very natural, and it is not clear if the effort would be worth the result.
From a strictly technical point of view, the requirement i ̸∈ O(1) in Theorem 19 (and followings) is annoying (more from an aesthetic point of view than a practical one). It would be nice to find a way to avoid it (or, alternatively, to prove that it is indeed an essential hypothesis).
We believe that most of the interesting problems investigated at the beginning of the seventies for Complexity Classes can also be studied, possibly more profitably, in the framework of Complexity Cliques. A typical example is recursive presentability, that is the problem to provide effective enumerations of representatives (up to extensional equivalence) for all elements in the given set (such as the problem of giving an effective enumeration of programs com-puting all functions with polynomial complexity). As already re-marked by several authors - see e.g. Landweber and Robertson (1972); Young (1969) - , the problem does not make much sense for Complexity Classes: since complexity Classes are extensional you could enumerate “bad” programs (not within the given complexity bound) for “good” functions (functions admitting a program within the given complexity bound). The problem has been traditionally solved introducing a notion of quality for presentations (Landwe-ber and Robertson 1972), but Complexity Cliques, due to their intensional nature, could provide an alternative and possibly more natural framework to work with.
One of the appealing aspects of Complexity Cliques is that, (at the contrary of Complexity Classes, for which even basic composi-tional properties fail) they have a very nice set-theoretic structure: they are a Complete Boolean Lattice (Theorem 9).
In a categorical perspective, Complexity Cliques, equipped with the similarity relation, are partial equivalence relations, and it looks natural to investigate them as a sub-category of PER (Freyd et al. 1992). The natural notion of morphism seems to be that of a complexity-preserving effective operator (Dekker and Myhill 1958); note that, however, in order to define a category you im-mediately need some additional assumptions on the nature of com-position beyond Blum’s axioms. As it is often the case, Category Theory may turn out to be the best tool to grasp the essence of the notions under investigation.
Finally, from the point of view of Abstract Complexity Theory, we hope that our work can help to revitalize a field that, lately, has been a bit starving. In particular, in (Asperti and Ciabattoni 1995) it was proved that any enumerated collection of functions containing projections, a universal function, and closed w.r.t. composition and the s-m-n construction is algorithmically complete. For this reason, an abstract approach based on complexity assumptions for these basilar constructions looks particularly appealing.
Acknowledgments We are grateful to G.Longo, S.Martini, U.Dal Lago and Claudio Sacerdoti Coen for a few interesting discussions on the subject of this paper.
References R. Amadio. Synthesis of max-plus quasi interpretations. Fundamenta Infor-maticae 65 (2005), pp 29–60. IOS Press.
A. Asperti, A. Ciabattoni. Effective applicative structures. In Proceedings the sixth biannual conference on Category Theory in Computer Science (CTCS’95), volume 953, pp. 158–174, 1995.
A.Asperti, L.Roversi. Intuitionistic Light Affine Logic (Proof-nets, Normal-ization Complexity, Expressive Power). ACM Transactions on Compu-tational Logic (TOCL), Volume 3 , Issue 1, January 2002, pp.137–175.
M. Blum. A machine-independent theory of the complexity of recursive functions. Journal of ACM, 14(2), pp.322–336, April 1967.
M. Blum. On effective procedures for speeding up algorithms. Journal of ACM, 18(2), pp.290–305, April 1971.
E. B¨ orger. Berechenbarkeit, Komplexit¨ at, Logik. Friedr. Vieweg & Sohn, Braunshweig, 1986.
A. Borodin. Computational complexity and the existence of complexity gaps. Journal of ACM, 19, pp.158–174, March 1972.
N. J. Cutland.
Computability: An Introduction to Recursive Function Theory. Cambridge University Press, Cambridge, UK, 1986.
U.Dal Lago, P.Baillot. On light logics, uniform encodings and polynomial time. Mathematical Structures in Computer Science, V.16, Issue 4, pp.
713 - 733, August 2006.
J. C. E. Dekker and J. Myhill. Some theorems on classes of recursively enumerable sets. Trans. Amer. Math. Soc., 89, pp.25–59, 1958.
P. Freyd, P. Mulry, G. Rosolini, and D. Scott. Extensional pers. Information and Computation, 98(2), pp.211–227, June 1992.
T. A. Hansen, T. Nikolajsen, J. L. Tr¨ aff, and N. D. Jones. Experiments with implementations of two theoretical constructions. In Logic at Botik, volume 363, pages 119–133, 1989.
J. Hartmanis and R. E. Stearns.
On the computational complexity of algorithms. Trans. Amer. Math. Soc., 117, pp.285–306, 1965.
Neil D. Jones. Constant time factors do matter. In Proceedings of STOC’93, pp.602–611, 1993.
D. Kozen. Indexing of subrecursive classes. Theoretical Computer Science, 11, pp.277–301, 1980.
L. H. Landweber and E. L. Robertson. Recursive properties of abstract complexity classes. Journal of ACM, 19(2), pp.296–308, April 1972.
F. D. Lewis. Unsolvability considerations in computational complexity. In Proceedings of Second ACM Symp. on Theory of Computing, pp.22–30, 1970.
G. Lischke.
¨ Uber die erf¨ ullung gewisser erhaltungss¨ atze durch kom-pliziertheitsmasse. Zeit. Math. Log. Grund. Math., 21, pp.159-166, 1975.
G. Lischke. Nat¨ urliche kompliziertheitsmasse und erhaltungss¨ atze i. Zeit.
Math. Log. Grund. Math., 22, pp.413-418, 1976.
G. Lischke. Nat¨ urliche kompliziertheitsmasse und erhaltungss¨ atze ii. Zeit.
Math. Log. Grund. Math., 23, pp.193-200, 1977.
E. M. McCreight and A. R. Meyer. Classes of computable functions defined by bounds on computation. In Proceedings of ACM Symp. on Theory of Computing, Marina del Rey, Calif., pp. 79–88, 1969.
J.Myhill, J.C.Shepherdson. Effective operations on partial recursive func-tions. Zeit.Math. Log. Grund. Math., 1, pp.310-317, 1955.
P. G. Odifreddi.
Classical Recursion Theory: the Theory of Functions and Sets of Natural Numbers, volume 125 of Studies in Logic and the Foundations of Mathematics. Elsevier, 1997.
P. G. Odifreddi. Classical Recursion Theory, Volume II, volume 143 of Studies in Logic and the Foundations of Mathematics. Elsevier, 1999.
J. G. Rice. Classes of recursively enumerable set and their decision prob-lems. Trans. Amer. Math. Soc., 74, pp.358–366, 1953.
H. Rogers. Theory of Recursive Functions and Effective Computability.
MIT press, 1987.
N.Shapiro. Degrees of computability. Transactions of the American Math-ematical Society, 82, pp.281-299, 1956.
P. R. Young. Toward a theory of enumeration. Journal of ACM, 16(2), pp.328–348, 1969. |
10505 | https://artofproblemsolving.com/wiki/index.php/1985_AIME_Problems/Problem_15?srsltid=AfmBOop_sHBzQyCmQu6PDU0cPpJxU3rVMgOA570Ng2OdmXWcBSejbZWh | Art of Problem Solving
1985 AIME Problems/Problem 15 - AoPS Wiki
Art of Problem Solving
AoPS Online
Math texts, online classes, and more
for students in grades 5-12.
Visit AoPS Online ‚
Books for Grades 5-12Online Courses
Beast Academy
Engaging math books and online learning
for students ages 6-13.
Visit Beast Academy ‚
Books for Ages 6-13Beast Academy Online
AoPS Academy
Small live classes for advanced math
and language arts learners in grades 2-12.
Visit AoPS Academy ‚
Find a Physical CampusVisit the Virtual Campus
Sign In
Register
online school
Class ScheduleRecommendationsOlympiad CoursesFree Sessions
books tore
AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates
community
ForumsContestsSearchHelp
resources
math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten
contests on aopsPractice Math ContestsUSABO
newsAoPS BlogWebinars
view all 0
Sign In
Register
AoPS Wiki
ResourcesAops Wiki 1985 AIME Problems/Problem 15
Page
ArticleDiscussionView sourceHistory
Toolbox
Recent changesRandom pageHelpWhat links hereSpecial pages
Search
1985 AIME Problems/Problem 15
Contents
[hide]
1 Problem
2 Solution 1 (For the visualizers)
3 Solution 2
4 Solution 3
5 See also
Problem
Three 12 cm 12 cm squares are each cut into two pieces and , as shown in the first figure below, by joining the midpoints of two adjacent sides. These six pieces are then attached to a regularhexagon, as shown in the second figure, so as to fold into a polyhedron. What is the volume (in ) of this polyhedron?
Solution 1 (For the visualizers)
Note that gluing two of the given polyhedra together along a hexagonal face (rotated from each other) yields a cube, so the volume is , so our answer is .
Image:
Solution 2
Taking a reference to the above left diagram, obviously SP, SQ and SR are perpendicular to each other. Thus expanding plane SPQ, SQR and SRP to intersect with the plane XYZ that contains the regular hexagon, we form a pyramid with S the top vertex and the base being an equilateral triangle with side length of 18 . This pyramid has a volume of 972, because it is also 1/6 of the volume of a cube with side length of 18. Then subtracting 3 congruent pyramids with volume of 36 each, we get .
Solution 3
Position the polyhedra with the facing hexagon down. From this perspective it is clear that the polyhedra can be thought of as a tetrahedron with 3 smaller tetrahedra removed from each of the three corners of its base. The strategy is then to calculate the volume of the larger tetrahedron, and then subtract the three smaller ones.
Focusing on the larger tetrahedron, the base is an equilateral triangle formed by extending the sides of the base hexagon; this triangle has sides of length . Thus its area is . The height of the tetrahedron can be calculated by considering the following right triangle: Leg 1 is the height of the tetrahedron (which we seek); Leg 2 is the distance from a midpoint of one of the sides of the base to the base's center; and the Hypotenuse is the distance from the midpoint of one of the sides of the base to the top vertex. Leg 2 has a length of . And the hypotenuse's length is (each non-base face of the tetrahedron is an isosceles right triangle with leg of length 18, whose altitude to its hypotenuse has length ). Thus, by the Pythagorean theorem the height of the tetrahedron is . Altogether, the Volume of the large tetrahedron is .
Lastly, each smaller tetrahedron removed from a corner of the base of the larger one has sides whose lengths are that of the larger tetrahedron. Since volume scales with the cube of length, each of these tetrahedra are the volume of the larger one. There are three of them so the final volume is .
See also
1985 AIME (Problems • Answer Key • Resources)
Preceded by
Problem 14Followed by
Last Question
1•2•3•4•5•6•7•8•9•10•11•12•13•14•15
All AIME Problems and Solutions
AIME Problems and Solutions
American Invitational Mathematics Examination
Mathematics competition resources
Retrieved from "
Category:
Intermediate Geometry Problems
Art of Problem Solving is an
ACS WASC Accredited School
aops programs
AoPS Online
Beast Academy
AoPS Academy
About
About AoPS
Our Team
Our History
Jobs
AoPS Blog
Site Info
Terms
Privacy
Contact Us
follow us
Subscribe for news and updates
© 2025 AoPS Incorporated
© 2025 Art of Problem Solving
About Us•Contact Us•Terms•Privacy
Copyright © 2025 Art of Problem Solving
Something appears to not have loaded correctly.
Click to refresh. |
10506 | https://radiopaedia.org/articles/multiple-sclerosis?lang=us | Multiple sclerosis
Edit article
Citation, DOI, disclosures and article data
Gaillard F, Agazzi G, Sharma R, et al. Multiple sclerosis. Reference article, Radiopaedia.org (Accessed on 13 Sep 2025)
Article created:
2 May 2008,
Frank Gaillard
At the time the article was created Frank Gaillard had no recorded disclosures.
View Frank Gaillard's current disclosures
Last revised:
23 Aug 2025,
Giorgio Maria Agazzi
Disclosures:
At the time the article was last revised Giorgio Maria Agazzi had
no financial relationships to ineligible companies to disclose.
View Giorgio Maria Agazzi's current disclosures
Revisions:
101 times, by
41 contributors -
see full revision history and disclosures
Systems:
Central Nervous System, Paediatrics
Tags:
emergencymedicine, cns, demyelinating disease
Synonyms:
MS
Multiple sclerosis (MS)
Charcot type multiple sclerosis
Classic multiple sclerosis
Charcot type multiple sclerosis (MS)
Paediatric-onset multiple sclerosis
Paediatric-onset MS
Paediatric-onset multiple sclerosis (POMS)
Paediatric-onset MS (POMS)
Multiple sclerosis (MS)is a relatively common acquired chronic demyelinating disease involving the central nervous system and is the second most common cause of neurological impairment in young adults, after trauma 19. Characteristically and by definition, multiple sclerosis is disseminated in space (i.e. multiple lesions in different regions of the brain) and in time (i.e. lesions occur at different times).
A number of clinical variants are recognized, each with specific imaging findings and clinical presentation. They include:
classic multiple sclerosis (Charcot type)
pediatric-onset multiple sclerosis (variably defined as multiple sclerosis with an onset <16-18 years of age)
tumefactive multiple sclerosis
Marburg type (acute malignant)
Schilder type (diffuse cerebral sclerosis)
Baló concentric sclerosis
This article concerns itself primarily with classic (Charcot-type) multiple sclerosis. The other variants are discussed separately.
Importantly, neuromyelitis optica spectrum disorder (Devic disease) was considered a variant of multiple sclerosis but is now recognized as a distinct entity and is therefore also discussed separately.
On this page:
Article:
Epidemiology
Clinical presentation
Diagnosis
Pathology
Radiographic features
Treatment and prognosis
History and etymology
Differential diagnosis
Related articles
References
Images:
Cases and figures
Imaging differential diagnosis
Epidemiology
The presentation is usually between adolescence and the sixth decade, with a peak at approximately 35 years of age 12,19. Up to 10% of patients have pediatric-onset multiple sclerosis 31. There is a strong, well recognized female predilection with a F:M ratio of approximately 2:1 19.
Multiple sclerosis has a fascinating geographic distribution: it is rarely found in equatorial regions (e.g. 15 per 100,000), with incidence gradually increasing with distance from the equator (e.g. 250 per 100,000) 12,19.
Twin studies show a heritability of ~30% 38.
Associations
a strong association with HLA-DR15 (formerly covered by HLA-DR2) class II has been identified 35
several studies showed a correlation between prior EBV infection and multiple sclerosis onset, both in the adult and pediatric population 38
Clinical presentation
Clinical presentation is both highly variable acutely, as a result of varying plaque location, as well as over time. Examples of common clinical features include 23,24:
brainstem and cranial nerve involvement:
optic neuritis
internuclear ophthalmoplegia (often bilateral)
trigeminal neuralgia
diplopia (e.g. due to abducens nerve palsy)
vertigo
cerebellum involvement:
ataxia and gait disturbance
oscillopsia
cerebrum and spinal cord involvement:
limb sensory loss or paresthesias
upper motor neuron signs
Lhermitte sign
urinary incontinence
others:
fatigue
depression
Uhthoff phenomenon: heat and exercise worsen symptoms
cognitive decline
Types
A number of patterns of longitudinal disease have been described 11,12:
relapsing-remitting (RRMS)
most common in adults (70% of cases), even more common in pediatric-onset multiple sclerosis (98% of cases) 31
patients exhibit periodic symptoms with complete recovery (early on)
secondary progressive (SPMS)
approximately 85% of adult patients with relapsing-remitting MS eventually enter a secondary progressive phase, but this is less common in pediatric-onset multiple sclerosis
primary progressive (PPMS)
uncommon in adults (10% of cases) and very rare in pediatric-onset multiple sclerosis 31
defined by a progressive accumulation of disability for >12 months from disease onset, which can be determined prospectively or retrospectively
patients do not have remissions, with neurological deterioration being relentless
incorporates the previously described "progressive-relapsing" phenotype
benign multiple sclerosis
15-50% of cases
defined as patients who remain functionally active for over 15 years, and thus is only a retrospective diagnosis
As is evident from this list, there is overlap, and in some cases, patients can drift from one pattern to another (e.g. relapsing-remitting to secondary progressive).
Upon presentation patients often have evidence of multiple previous asymptomatic lesions, and the diagnosis of multiple sclerosis can be strongly inferred. In other instances patients present with the first plaque. This is known as clinically isolated syndrome (CIS) and not all patients go on to develop multiple sclerosis.
Radiologically isolated syndrome (RIS) is another entity based on MRI brain findings which described as incidental white matter lesions suggestive of MS on imaging in a patient without associated clinical symptoms 17.
Diagnosis
The diagnosis of multiple sclerosis requires the constellation of clinical findings and various investigations (see McDonald diagnostic criteria for multiple sclerosis), including 19:
typical clinical history
oligoclonal bands in CSF
abnormal visual evoked potential
MR imaging
lack of viable alternative diagnosis
Pathology
The exact etiology is poorly known although it is believed to have both genetic and acquired contributory components. An infectious agent (e.g. EBV), or at least a catalyst, has long been suspected due to the geographic distribution and presence of clusters of cases; however, no agent has yet been firmly confirmed. Additionally the presence in 3-7% of patients with multiple sclerosis of often striking and symmetric high T2/FLAIR signal of the intrapontine segments of the trigeminal nerve has led some to speculate whether there is a neurotropic viral cause from the aerodigestive tract 34.
Some authors also suggested that "chronic cerebrospinal venous insufficiency" can cause or exacerbate multiple sclerosis but this theory has not been proven by further investigations 15.
Multiple sclerosis is believed to result from a cell-mediated autoimmune response against one's own myelin components, with loss of oligodendrocytes, with little or no axonal degeneration in the acute phase; however, in later stages, loss of oligodendrocytes results in axonal degeneration.
Demyelination occurs in discrete perivenular foci, termed plaques, which range in size from a few millimeters to a few centimeters 19. Each lesion goes through three pathological stages:
early acute stage (active plaques)
active myelin breakdown
plaques appear pink and swollen
subacute stage
plaques become paler in color ("chalky")
abundant macrophages
chronic stage (inactive plaques/gliosis)
little or no myelin breakdown
gliosis with associated volume loss
appear grey/translucent
Radiographic features
Plaques can occur anywhere in the central nervous system. They are typically ovoid in shape and perivenular in distribution.
CT
CT features are usually non-specific, and significant change may be seen on MRI with an essentially normal CT scan. Features that may be present include:
plaques can be homogeneously hypoattenuating 8,11
brain atrophy may be evident in long-standing chronic MS 5
some plaques may show contrast enhancement in the active phase 7,11
MRI
MRI has revolutionised the diagnosis and surveillance of patients with MS. Not only can an MRI confirm the diagnosis (see McDonald diagnostic criteria for multiple sclerosis), but follow-up scans can assess response to treatment and help determine the disease pattern.
Protocol
Although many sequences are contributory, the 2018 Revised Guidelines of the Consortium of MS Centers MRI Protocol for the Diagnosis and Follow-up of MS plaques lists the following core sequences 25:
FLAIR (axial and sagittal)
ideally performed as a 3D volumetric scan (1 mm isotropic), or
3 mm contiguous
T1: 3D inversion recovery prepared gradient echo
T2 (axial): 3D or 2D
DWI (axial)
NB: contrast is not necessary for routine asymptomatic follow-up.
Sequence utility
T1
lesions are typically iso- to hypointense (T1 black holes)
callososeptal interface may have multiple small hypointense lesions (Venus necklace) or the corpus callosum may merely appear thinned 11
hyperintense lesions are associated with brain atrophy and advancing disease 18
T2
lesions are typically hyperintense
acute lesions often have surrounding edema
FLAIR
lesions are typically hyperintense
a very early sign is the ependymal dot-dash sign 16
when these propagate centrifugally along the medullary venules and are arranged perpendicular to the lateral ventricles in a triangular configuration (extending radially outward - best seen on parasagittal images), they are termed Dawson fingers
FLAIR is more sensitive than T2 in the detection of juxtacortical and periventricular plaques, while T2 is more sensitive to infratentorial lesions
double inversion recovery (DIR)
a sequence that suppresses both CSF and white matter signal and offers better delineation of the plaques compared to FLAIR 33
SWI
central vein sign: at higher field strengths most plaques have been shown to be perivenular (at 3 T, 45% of lesions; at 7 T, 87% of lesions) 19
paramagnetic rim lesions: may be seen in approximately 50% of patients, presence increases specificity of diagnosis and correlates with disability from disease 32
T1 C+ (Gd)
active lesions show enhancement
enhancement is often incomplete around the periphery (open ring sign)
DWI/ADC
active plaques may demonstrate high or low ADC (increased or decreased diffusion) 10,11,22
also typically open ring in morphology
PD
PD images are better at detecting cervical spinal cord MS lesions especially when T2W images fail to demonstrate these lesions 26
MR spectroscopy
NAA peaks may be reduced within plaques, which is the most common and remarkable finding
choline and lactate are found to be increased in the acute pathologic phase
Location of the plaques can be infratentorial, in the deep white matter, periventricular, juxtacortical or mixed white matter-grey matter lesions.
Even on a single scan, some features are helpful in predicting relapsing-remitting vs progressive disease. Features favoring progressive disease include:
large numerous plaques
hyperintense T1 lesions
Choroid plexus volume (CPV) is emerging as a multiple sclerosis biomarker, with multiple sclerosis patients having a greater CPV compared with healthy controls. CPV is also correlated with atrophy measures, lesion load and clinical disability status 41.
Chronic active lesions
Chronic active lesions (CALs) are a distinct type of brain lesion in multiple sclerosis that reflect ongoing, smoldering inflammation and are strongly linked to disease progression and disability:
paramagnetic rim lesions: show a dark rim on SWI, corresponding to the iron-rich inflammatory border 39,40
slowly expanding lesions (SELs): identified by gradual, concentric growth over time on serial MRI scans in regions within pre-existing T2 lesions 39,40
PET imaging can highlight active inflammation at the lesion rim 39
CALs are associated with more severe disability, progressive disease, and brain atrophy 39,40.
Treatment and prognosis
The aim of management is twofold:
curtail progression with disease-modifying therapies
symptomatic relief
Non-pharmacological preventative therapies include:
smoking cessation
vitamin D supplementation
sun exposure: appears to correlate with a slowing down of the rate of progression of the disease - to clinically important levels - and the risk of disability 30
Disease-modifying therapies include multiple pharmacological agents and autologous hematopoietic stem cell transplantation. Although discussion of individual agents and therapies is beyond the scope of this article, it is worth being aware of the main agents available and their mechanism of action 20:
interferon beta: inhibition of T-lymphocyte proliferation
glatiramer acetate (Copaxone): immunomodulation
teriflunomide (Aubagio): reduces both T-cell and B-cell activation and proliferation
dimethyl fumarate (Tecfidera) and diroximel fumarate (Vumerity): immunomodulation
fingolimod (Gilenya), siponimod (Mayzent) and ozanimod (Zeposia): prevents lymphocyte migration out of lymph nodes and into CNS
natalizumab (Tysabri): inhibits binding of lymphocytes to endothelium
cladribine (Mavenclad): purine analog that targets lymphocytes
ocrelizumab (Ocrevus), ofatumumab (Kesimpta) and rituximab: anti-CD20 monoclonal antibodies
alemtuzumab (Lemtrada): immunomodulation of T-cell and B-cell function
mitoxantrone (Novantrone): reduces T-cell and B-cell proliferation and reduces T-cell activation
Prognosis is variable and depends on the pattern of disease a patient has (e.g. primary progressive carries a worse prognosis than relapsing-remitting). In general, patients with relapsing-remitting MS will progress to secondary progressive disease in 10 years and will require ambulatory aids (e.g. cane/wheelchair/frame) in another 5 to 15 years 12. Approximately half of the affected individuals will no longer be independently ambulatory after 20 years 19. Overall life expectancy is also reduced, by 7 to 14 years 19.
High serum neurofilament light chain values have been associated with higher risk of relapse and overall worse prognosis 38.
Complications
In addition to the potential for disease progression resulting in progressive neurological impairment, a number of specific complications need to be considered. These include 20,21:
progressive multifocal leukoencephalopathy (PML) and other less common CNS JC virus manifestations (JC virus granule cell neuronopathy, JC virus encephalopathy, and JC virus meningitis)
particularly in patients treated with natalizumab with positive JC virus serology
PML-IRIS
a complication of cessation of natalizumab or treatment for natalizumab-related PML with plasma exchange or immunoabsorption 21
primary CNS lymphoma
rarely lymphoma appears to arise from previously identified demyelinating lesions
2-times increased risk of stroke 28, possibly related to chronic inflammatory vasculopathy
History and etymology
Multiple sclerosis was first defined by Jean-Martin Charcot (1825-1893), French neurologist, in 1868 27.
Differential diagnosis
The differential diagnosis is dependent on the location and appearance of demyelination. For classic (Charcot type) MS, the differential can be divided into intracranial and spinal involvement.
For intracranial disease, the differential includes almost all other demyelinating diseases, as well as:
CNS fungal infection (e.g. Cryptococcus neoformans): patients tend to be immunocompromised
mucopolysaccharidosis (e.g. Hurler disease): congenital and occurs in a younger age group
Marchiafava-Bignami disease (for callosal lesions)
Susac syndrome
CNS manifestations of primary antiphospholipid syndrome 13
CLIPPERS
levamisole-induced leukoencephalopathy
adult-onset Alexander disease
adult polyglucosan body disease
CTLA4 haploinsufficiency with autoimmune infiltration 36,37
For spinal involvement, the following should be considered:
other causes of transverse myelitis
infection
spinal cord tumors (e.g. astrocytomas)
spinal cord infarction (e.g. sulcal artery syndrome)
Multiple sclerosis variants (e.g. tumefactive MS) are discussed separately.
Quiz questions
Question 3108
Report problem with question
A 40 year old woman presents with optic neuritis. Her MRI demonstrates bilateral optic nerve signal abnormality involving the optic chiasm and prechiasmatic segments. The orbits are otherwise normal. What is the most likely diagnosis?
Skip question
References
Sheldon J, Siddharthan R, Tobias J, Sheremata W, Soila K, Viamonte M. MR Imaging of Multiple Sclerosis: Comparison with Clinical and CT Examinations in 74 Patients. AJR Am J Roentgenol. 1985;145(5):957-64. doi:10.2214/ajr.145.5.957 - Pubmed
Richards T. Proton MR Spectroscopy in Multiple Sclerosis: Value in Establishing Diagnosis, Monitoring Progression, and Evaluating Therapy. AJR Am J Roentgenol. 1991;157(5):1073-8. doi:10.2214/ajr.157.5.1927795 - Pubmed
Lövblad K, Anzalone N, Dörfler A et al. MR Imaging in Multiple Sclerosis: Review and Recommendations for Current Practice. AJNR Am J Neuroradiol. 2010;31(6):983-9. doi:10.3174/ajnr.A1906 - Pubmed
Caracciolo J, Murtagh R, Rojiani A, Murtagh F. Pathognomonic MR Imaging Findings in Balo Concentric Sclerosis. AJNR Am J Neuroradiol. 2001;22(2):292-3. PMC7973934 - Pubmed
Ge Y, Grossman R, Udupa J, Babb J, Nyúl L, Kolson D. Brain Atrophy in Relapsing-Remitting Multiple Sclerosis: Fractional Volumetric Analysis of Gray Matter and White Matter. Radiology. 2001;220(3):606-10. doi:10.1148/radiol.2203001776 - Pubmed
Tan I, van Schijndel R, Pouwels P et al. MR Venography of Multiple Sclerosis. AJNR Am J Neuroradiol. 2000;21(6):1039-42. PMC7973892 - Pubmed
Maravilla K, Weinreb J, Suss R, Nunnally R. Magnetic Resonance Demonstration of Multiple Sclerosis Plaques in the Cervical Cord. AJR Am J Roentgenol. 1985;144(2):381-5. doi:10.2214/ajr.144.2.381 - Pubmed
Nesbit G, Forbes G, Scheithauer B, Okazaki H, Rodriguez M. Multiple Sclerosis: Histopathologic and MR And/Or CT Correlation in 37 Cases at Biopsy and Three Cases at Autopsy. Radiology. 1991;180(2):467-74. doi:10.1148/radiology.180.2.2068314 - Pubmed
Miller D, Grossman R, Reingold S, McFarland H. The Role of Magnetic Resonance Techniques in Understanding and Managing Multiple Sclerosis. Brain. 1998;121 ( Pt 1)(1):3-24. doi:10.1093/brain/121.1.3 - Pubmed
Nusbaum A, Lu D, Tang C, Atlas S. Quantitative Diffusion Measurements in Focal Multiple Sclerosis Lesions: Correlations with Appearance on TI-Weighted MR Images. AJR Am J Roentgenol. 2000;175(3):821-5. doi:10.2214/ajr.175.3.1750821 - Pubmed
Valery N. Kornienko, I.N. Pronin. Diagnostic Neuroradiology. (2008) ISBN: 9783540756521 - Google Books
John Calvin M. Brust, John Brust. CURRENT Diagnosis & Treatment in Neurology. (2006) ISBN: 9780071423663 - Google Books
Stosic M, Ambrus J, Garg N et al. MRI Characteristics of Patients with Antiphospholipid Syndrome and Multiple Sclerosis. J Neurol. 2010;257(1):63-71. doi:10.1007/s00415-009-5264-6 - Pubmed
Wattjes M, Lutterbey G, Gieseke J et al. Double Inversion Recovery Brain Imaging at 3T: Diagnostic Value in the Detection of Multiple Sclerosis Lesions. AJNR Am J Neuroradiol. 2007;28(1):54-9. PMC8134107 - Pubmed
Garaci F, Marziali S, Meschini A et al. Brain Hemodynamic Changes Associated with Chronic Cerebrospinal Venous Insufficiency Are Not Specific to Multiple Sclerosis and Do Not Increase Its Severity. Radiology. 2012;265(1):233-9. doi:10.1148/radiol.12112245 - Pubmed
Lisanti C, Asbach P, Bradley W. The Ependymal "Dot-Dash" Sign: An MR Imaging Finding of Early Multiple Sclerosis. AJNR Am J Neuroradiol. 2005;26(8):2033-6. PMC8148837 - Pubmed
Okuda D, Mowry E, Beheshtian A et al. Incidental MRI Anomalies Suggestive of Multiple Sclerosis: The Radiologically Isolated Syndrome. Neurology. 2009;72(9):800-5. doi:10.1212/01.wnl.0000335764.14513.1a - Pubmed
Janardhan V, Suri S, Bakshi R. Multiple Sclerosis: Hyperintense Lesions in the Brain on Nonenhanced T1-Weighted MR Images Evidenced as Areas of T1 Shortening. Radiology. 2007;244(3):823-31. doi:10.1148/radiol.2443051171 - Pubmed
Sarbu N, Shih R, Jones R, Horkayne-Szakaly I, Oleaga L, Smirniotopoulos J. White Matter Diseases with Radiologic-Pathologic Correlation. Radiographics. 2016;36(5):1426-47. doi:10.1148/rg.2016160031 - Pubmed
McNamara C, Sugrue G, Murray B, MacMahon P. Current and Emerging Therapies in Multiple Sclerosis: Implications for the Radiologist, Part 1-Mechanisms, Efficacy, and Safety. AJNR Am J Neuroradiol. 2017;38(9):1664-71. doi:10.3174/ajnr.A5147 - Pubmed
McNamara C, Sugrue G, Murray B, MacMahon P. Current and Emerging Therapies in Multiple Sclerosis: Implications for the Radiologist, Part 2-Surveillance for Treatment Complications and Disease Progression. AJNR Am J Neuroradiol. 2017;38(9):1672-80. doi:10.3174/ajnr.A5148 - Pubmed
Rueda-Lopes F, Hygino da Cruz L, Doring T, Gasparetto E. Diffusion-Weighted Imaging and Demyelinating Diseases: New Aspects of an Old Advanced Sequence. AJR Am J Roentgenol. 2014;202(1):W34-42. doi:10.2214/AJR.13.11400 - Pubmed
Weinshenker B, Bass B, Rice G et al. The Natural History of Multiple Sclerosis: A Geographically Based Study. I. Clinical Course and Disability. Brain. 1989;112 ( Pt 1)(1):133-46. doi:10.1093/brain/112.1.133 - Pubmed
Allan Ropper, Joshua Klein, Martin Samuels. Adams and Victor's Principles of Neurology 10th Edition. (2014) ISBN: 9780071794794 - Google Books
2018 Revised Guidelines of the Consortium of MS Centers MRI Protocol for the Diagnosis and Follow-up of MS www.mscare.org/page/MRI_protocol
Chong A, Chandra R, Chuah K, Roberts E, Stuckey S. Proton Density MRI Increases Detection of Cervical Spinal Cord Multiple Sclerosis Lesions Compared with T2-Weighted Fast Spin-Echo. AJNR Am J Neuroradiol. 2016;37(1):180-4. doi:10.3174/ajnr.A4476 - Pubmed
Zalc B. One Hundred and Fifty Years Ago Charcot Reported Multiple Sclerosis as a New Neurological Disease. Brain. 2018;141(12):3482-8. doi:10.1093/brain/awy287 - Pubmed
Cho E, Yeo Y, Jung J et al. Risk of Stroke in Multiple Sclerosis and Neuromyelitis Optic Spectrum Disorder: A Nationwide Cohort Study in South Korea. J Neurol Neurosurg Psychiatry. 2022;93(11):1146-53. doi:10.1136/jnnp-2022-329628 - Pubmed
Amiola T, Oh U, Richard H et al. A 42-Year-Old Woman With Rapidly Expanding White Matter Lesions: From the National Multiple Sclerosis Society Case Conference Proceedings. Neurol Neuroimmunol Neuroinflamm. 2024;11(3):e200201. doi:10.1212/NXI.0000000000200201 - Pubmed
Wu J, Olsson T, Alfredsson L, Hedström A. Association Between Sun Exposure Habits and Disease Progression in Multiple Sclerosis. Euro J of Neurology. 2024;:e16269. doi:10.1111/ene.16269 - Pubmed
Alroughani R & Boyko A. Pediatric Multiple Sclerosis: A Review. BMC Neurol. 2018;18(1):27. doi:10.1186/s12883-018-1026-3 - Pubmed
Maggi P, Sati P, Nair G et al. Paramagnetic Rim Lesions Are Specific to Multiple Sclerosis: An International Multicenter 3T MRI Study. Ann Neurol. 2020;88(5):1034-42. doi:10.1002/ana.25877 - Pubmed
Elkholy S, Sabet M, Mohammad M, Asaad R. Comparative Study Between Double Inversion Recovery (DIR) and Fluid-Attenuated Inversion Recovery (FLAIR) MRI Sequences for Detection of Cerebral Lesions in Multiple Sclerosis. Egypt J Radiol Nucl Med. 2020;51(1):1-10. doi:10.1186/s43055-020-00298-9
Mills R, Young C, Smith E. Central Trigeminal Involvement in Multiple Sclerosis Using High-Resolution MRI at 3 T. BJR. 2010;83(990):493-8. doi:10.1259/bjr/65228893 - Pubmed
Martin R, Sospedra M, Eiermann T, Olsson T. Multiple Sclerosis: Doubling Down on MHC. Trends Genet. 2021;37(9):784-97. doi:10.1016/j.tig.2021.04.012 - Pubmed
Watson L, Slade C, Ojaimi S et al. Pitfalls of Immunotherapy: Lessons from a Patient with CTLA-4 Haploinsufficiency. Allergy Asthma Clin Immunol. 2018;14(1):65. doi:10.1186/s13223-018-0272-7 - Pubmed
Kolcava J, Litzman J, Bednarik J, Stulik J, Stourac P. Neurological Manifestation of Immune System Dysregulation Resulting from CTLA-4 Receptor Mutation: A Case Report. Multiple Sclerosis and Related Disorders. 2020;45:102313. doi:10.1016/j.msard.2020.102313 - Pubmed
Klotz L, Saraste M, Airas L, Kuhlmann T. Multiple Sclerosis: 2024 Update. Free Neuropathol. 2025;6:14. doi:10.17879/freeneuropathology-2025-6762 - Pubmed
Dal-Bianco A, Oh J, Sati P, Absinta M. Chronic Active Lesions in Multiple Sclerosis: Classification, Terminology, and Clinical Significance. Ther Adv Neurol Disord. 2024;17:17562864241306684. doi:10.1177/17562864241306684 - Pubmed
Preziosa P, Filippi M, Rocca M. Chronic Active Lesions: A New MRI Biomarker to Monitor Treatment Effect in Multiple Sclerosis? Expert Rev Neurother. 2021;21(8):837-41. doi:10.1080/14737175.2021.1953983 - Pubmed
Moases Ghaffary E, Yazdan Panah M, Mirmosayyeb O et al. Choroid Plexus Volume in Multiple Sclerosis: A Systematic Review and Meta-Analysis of an Emerging Imaging Biomarker. Eur J Med Res. 2025;30(1):762. doi:10.1186/s40001-025-03026-z - Pubmed
Incoming Links
Articles:
Facial colliculus syndrome
Longitudinally extensive spinal cord lesion
Sigmoid volvulus
Cerebral atrophy
Facial palsy
Infectious mononucleosis
Tumefactive multiple sclerosis
John Cunningham virus
Marchiafava-Bignami disease
Bilateral middle cerebellar peduncle lesions
Neurosarcoidosis
Ependymal dot-dash sign
Marbled pattern of the corpus callosum
Uveitis
H sign (spinal cord)
SPACE (MRI sequence)
Optic nerve enlargement (differential)
Basal ganglia T2 hypointensity
Dementia
Schizophrenia
Load more articles
Cases:
Paediatric-onset multiple sclerosis
Multiple sclerosis demyelinating plaque in cervical cord
Multiple sclerosis
Chronic lymphocytic inflammation with pontine perivascular enhancement responsive to steroids (CLIPPERS)
Multiple sclerosis
Tumefactive multiple sclerosis
Multiple sclerosis
Middle and anterior cerebral artery infarction with haemorrhagic transformation
Baló concentric sclerosis
Optic neuritis
Multiple sclerosis of the brain and cervical cord
Myelin oligodendrocyte glycoprotein antibody-associated disease (MOGAD)
CADASIL
Baló concentric sclerosis
Optic neuritis
Trigeminal neuropathy due to ADEM
Migraine
Myelin oligodendrocyte glycoprotein antibody-associated disease (MOGAD)
Multiple sclerosis and left optic neuritis
Multiple sclerosis
Load more cases
Multiple choice questions:
Question 3108
Question 2590
Question 2512
Question 2511
Question 2323
Question 1493
Question 1492
Question 1464
Question 1412
Question 1396
Question 1395
Question 1005
Question 822
Question 764
Question 763
Question 507
Related articles: White matter disorders
white matter
normal myelination
terminology[+][+]
leukodystrophy
leukoencephalopathy
demyelinating disorders
dysmyelinating disorders
hypomyelinating disorders
white matter disorders
demyelination
general articles[+][+]
longitudinally extensive spinal cord lesion (LESCL)
transverse myelitis
tumefactive demyelinating lesions
acute disseminated encephalomyelitis (ADEM)[+][+]
Callen MS-ADEM criteria
acute hemorrhagic encephalomyelitis (AHEM)
anti-MOG associated encephalomyelitis (MOGAD)
neuromyelitis optica spectrum disorder (NMOSD)[+][+]
signs
bright spotty lesions
marbled pattern of the corpus callosum
multiple sclerosis (MS)
diagnostic criteria
McDonald diagnostic criteria for MS (2017 revision)
MAGNIMS-CMSC-NAIMS consensus on MRI diagnosis of multiple sclerosis (2021 revision)
signs
central vein sign
Dawson fingers
open ring enhancement
paramagnetic rim lesions
T1 black holes
variants
tumefactive multiple sclerosis
acute malignant Marburg type
Schilder type (diffuse cerebral sclerosis)
Balo concentric sclerosis (BCS)
opticospinal multiple sclerosis (OSMS)
radiologically isolated syndrome (RIS)
clinically isolated syndrome (CIS)
astrocytopathies[+][+]
Aicardi-Goutières syndrome
Alexander disease
autoimmune GFAP astrocytopathy
megalencephalic leukoencephalopathy with subcortical cysts
oculodentodigital dysplasia
vanishing white matter disease
leukoaxonopathies[+][+]
early-onset neuronal degenerative disorders
GM1 gangliosidoses
GM2 gangliosidoses (e.g. Tay Sachs disease)
giant axonal neuropathy
hypomyelination with atrophy of the basal ganglia and cerebellum (H-ABC)
hypomyelination with congenital cataract
leukoencephalopathy with brainstem and spinal cord involvement and lactate elevation
hypomyelination with brainstem and spinal cord involvement and leg spasticity
pol III-related leukodystrophies
leukovasculopathies[+][+]
CADASIL
CARASIL
cathepsin A-related arteriopathy with strokes and leukoencephalopathy (CARASAL)
cerebral amyloid angiopathy
COL4A1 brain small-vessel disease
Fabry disease
heterozygous HTRA1-related cerebral small vessel disease
leukoencephalopathy with calcifications and cysts (Labrune syndrome)
pontine autosomal dominant microangiopathy with leukoencephalopathy (PADMAL)
retinal vasculopathy with cerebral leukoencephalopathy and systemic manifestations (RVCL-S)
microgliopathies[+][+]
CSF1R-related leukoencephalopathy
Nasu-Hakola disease
leukoencephalopathy due to autosomal recessive mutations in the mitochondrial alanyl-transfer RNA (tRNA) synthetase gene (AARS2-L)
myelin disorders[+][+]
hypomyelination
18q-deletion syndrome
fucosidosis
Pelizaeus-Merzbacher disease
Pelizaeus-Merzbacher-like disease 1
demyelination
metachromatic leukodystrophy
myelin vacuolisation
Canavan disease
CLCN2-related leukoencephalopathy
globoid cell leukodystrophy (Krabbe disease)
mitochondrial disorders
Kearns-Sayre syndrome
Leigh disease
MELAS
MERRF
multiple sulfatase deficiency
phenylketonuria
X-linked adrenoleukodystrophy
other[+][+]
adult polyglucosan body disease
adult-onset autosomal dominant leukodystrophy
cerebrotendinous xanthomathosis
cystic leukoencephalopathy without megalencephaly
L-2-hydroxyglutaric aciduria
lysosomal storage diseases
free sialic acid storage disorders (e.g. Salla disease)
Niemann-Pick disease
peroxisomal disorders
Zellweger syndrome
Sjögren-Larsson syndrome
Promoted articles (advertising)
ADVERTISEMENT: Supporters see fewer/no ads
Cases and figures
Case 1: Dawson fingers
Case 2: FLAIR
Case 3: spinal cord involvement
Case 4: T2
Case 5: spinal cord involvement
Case 6: T1 black holes
Case 7: spinal cord involvement
Case 8: enhancing juxtacortical lesion
Case 11: spinal cord enhancing lesions
Case 9: double inversion recovery (DIR)
Case 10: Dawson fingers
Case 12: posterior fossa involvement
Case 13: juxtacortical lesions on T2
Case 14: T1 hyperintense lesions
Case 15: spinal cord involvement
Case 16
Case 17
Case 18
Case 19
Case 20
Case 21
Case 22
Case 23
Case 24
Case 25: spinal involvement
Case 26: pediatric-onset
Case 27
Case 28: pediatric-onset
Case 29: tumefactive
Imaging differential diagnosis
Myelin oligodendrocyte glycoprotein ant...
© 2005–2025 Radiopaedia.org |
10507 | https://math.stackexchange.com/questions/4174150/does-tense-matter-in-propositional-logic-negation-contrapositive-converse | solution verification - Does tense matter in propositional logic [negation. contrapositive, converse]? - Mathematics Stack Exchange
Join Mathematics
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Mathematics helpchat
Mathematics Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Does tense matter in propositional logic [negation. contrapositive, converse]?
Ask Question
Asked 4 years, 3 months ago
Modified2 years, 3 months ago
Viewed 679 times
This question shows research effort; it is useful and clear
5
Save this question.
Show activity on this post.
Say I have a sentence : If I water my plants then they will grow.
Would tenses have anything to do with writing it's negation and contraposition
Negation: I watered my plants but they did not grow.
Contrapositive: If they do not grow then I did not water my plants.
logic
solution-verification
computer-science
propositional-calculus
predicate-logic
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this question to receive notifications
asked Jun 15, 2021 at 23:04
Python_newbiePython_newbie
81 4 4 bronze badges
7
1 Your negation is not correct. I would say, it is possible for me to water my plants and for them to not grow. Tense must be maintained.Rushabh Mehta –Rushabh Mehta 2021-06-15 23:19:52 +00:00 Commented Jun 15, 2021 at 23:19
6 I find in propositional logic it is dangerous to use future tense, because it vaguely implies a rule “any time I water my plants, the plants will grow.” But propositional logic is about individual facts, not facts that can vary over time. As such, we can say “If I watered my plants yesterday, my plants grew today.” But prop logic can’t talk about rules that apply to many cases. So I try to avoid language that predicts future based on PL. (It’s not technically wrong, but it can be misleading.)Thomas Andrews –Thomas Andrews 2021-06-15 23:20:22 +00:00 Commented Jun 15, 2021 at 23:20
1 In general, I like to use past tense whenever I'm working with sentences in a logical context. This is both for the reasons Thomas presents, as well as consistency.Rushabh Mehta –Rushabh Mehta 2021-06-15 23:21:33 +00:00 Commented Jun 15, 2021 at 23:21
1 Also avoid past perfect: “If I had taken out the garbage yesterday, my kitchen wouldn’t stink today” gives more of a sense of causality than “If I took out the garbage yesterday, my kitchen wouldn’t stink today.”Thomas Andrews –Thomas Andrews 2021-06-15 23:35:33 +00:00 Commented Jun 15, 2021 at 23:35
1 Dan's linked article is bogus.user21820 –user21820 2021-07-16 15:34:12 +00:00 Commented Jul 16, 2021 at 15:34
|Show 2 more comments
2 Answers 2
Sorted by: Reset to default
This answer is useful
5
Save this answer.
Show activity on this post.
Classical logic (Logic from more than a thousand years ago) does not include notions of time (past, present, future, etc...).
The following are examples of a few rules of inference from classical logic:
Rule of Inference: Implication Operator From Parent to Left Child
For all P P and Q Q in the set {t r u e,f a l s e}{t r u e,f a l s e}, the following is true:
N O T(i f P t h e n Q)⟹P N O T(i f P t h e n Q)⟹P
Rule of Inference: Implication Operator From Parent to Right Child
For any P P and Q Q in the set {t r u e,f a l s e}{t r u e,f a l s e}, the following is true:
N O T(i f P t h e n Q)⟹Q N O T(i f P t h e n Q)⟹Q
Rule of Inference: DeMorgan's Law
For any P P and Q Q in the set {t r u e,f a l s e}{t r u e,f a l s e}, the following is true:
[N O T(P O R Q)]⟷[(N O T P)A N D(N O T Q)][N O T(P O R Q)]⟷[(N O T P)A N D(N O T Q)]
Note that none of the rules of inference in classical logic talk about time.
It is not easy to express any of the following English sentences in logic from hundreds of years ago:
"I will water my plants in the future"
"I watered my plants in the past"
"I currently water the plants inside my house."
I would stay that it is incorrect to use classical logic to express the English sentence "If I water my plants then they will grow" as "i f P t h e n Q i f P t h e n Q" where P P is "I water my plants"
Even an operation as simple as negation is not the same in English as it is in classical logic.
Perhaps, you would say that the following are equivalent:
N O T N O TI do water my plants
I doN O T N O Twater my plants
The statements about plants might be okay. However, consider the two following two statements:
N O T N O TMy wife's cousin Hector's pet monkey does like to eat strawberries
My wife's cousin Hector's pet monkey doesN O T N O Tlike to eat strawberries
There are some issues, not the least of which are:
I do not have a wife
If I had a wife, I am not sure if she would have a cousin Hector or not
Even if I was married, and my wife had a cousin named Hector it is doubtful that Hector would own a pet monkey.
In English, you are not allowed to move the word "N O T N O T" further and further to the left, or further to the right.
It is helpful to learn simple logic from ye olden days before you learn more advanced contemporary logic. However, I really wish that your teacher would not give you examples in English. English is really too complicated to force into the classical logic model.
In mathematics, time is sometimes modeled as follows:
If there exists at least one time in the future at which statement P P is true, then we write:
◇P P
For example:
◇I am watering my plants
There exists a time in the future such that the following will be true at that time: I am watering my plants
I still think that this is an abuse of the English language. However, using the symbols ◇ and □ to say something about time makes for a better model of English, relatively speaking, than using classical logic alone.
If something is true for all times in the future then we might write:
□P P
For example:
For all times in the future I am watering my plants
□I am watering my plants
I am not sure that modal logic using the symbols ◇ and □ is great for English, but it does help in math sometimes.
For example, the following are equivalent:
Eventually, F(x)F(x) is always zero.
◇□F(x)=0 F(x)=0
There exists a number x x such that for all y≥x,F(y)=0 y≥x,F(y)=0
Suppose that:
P P is the string I water my plants
Q Q is the string they will grow.
Well then, we have:
| Thing 1 | Thing 2 |
--- |
| I F P T H E N Q I F P T H E N Q | I F I FI water my plantsT H E N T H E Nthey will grow |
| P A N D(N O T Q)P A N D(N O T Q) | (I water my plants) A N D A N D (N O T N O Tthey will grow) |
| I F(N O T Q)T H E N(N O T P)I F(N O T Q)T H E N(N O T P) | I F I F (N O T N O Tthey will grow) T H E N T H E N (N O T N O TI water my plants) |
If some of the things written in the table above do not sound like English it is because, the things written in the table are not English.
You cannot model English sentences so easily using classical logic.
In English, the following two sentences have the same meaning:
If I water my plants then they will grow.
If I water my plants then my plants will grow.
With classical logic alone, you are not allowed to do something as simple as understand that the word "they" can be replaced with the phrase "my plants" while retaining the meaning.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this answer to receive notifications
edited Jul 10, 2021 at 2:50
answered Jun 16, 2021 at 5:25
Toothpick AnemoneToothpick Anemone
1,112 5 5 silver badges 20 20 bronze badges
Add a comment|
This answer is useful
0
Save this answer.
Show activity on this post.
You wrote:
Say I have a sentence : If I water my plants then they will grow.
Would tenses have anything to do with writing it's negation and contraposition
Propositional logic deals with propositions that are unambiguously either true or false in the present. So, you might consider recasting your sentence as:
If my plants have sufficient water, then my plants are growing.
Then, it easy to see that its negation would be:
My plants have sufficient water and my plants are not growing.
The contrapositive would be:
If my plants are not growing, then my plants have insufficient water.
This follows from the usually given definition of IMPLIES: A→B≡¬(A∧¬B)A→B≡¬(A∧¬B)
This "definition" can also be derived from other more fundamental rules of inference. See my blog posting in this topic here.
EDIT: If we restrict our attention to propositions in the present tense, we can safely ignore the complications of temporal logic. See:
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this answer to receive notifications
edited Jun 20, 2023 at 16:30
answered Jun 16, 2021 at 13:54
Dan ChristensenDan Christensen
15.7k 5 5 gold badges 31 31 silver badges 48 48 bronze badges
Add a comment|
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
logic
solution-verification
computer-science
propositional-calculus
predicate-logic
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Related
1Discrete math: Inverse, converse, contrapositive - simplifying expressions
3Proof of consistency of propositional logic
2Logic and implication negation
1Negation, Contrapositive of (¬a ∧ b) → c
1How to write the converse, contrapositive and negation of "Every planar graph can be colored with at most four colors"
5Verb tenses when writing the converse and contrapositive of an implication
1Negation and Entailment for Propositional Logic
3Correct way to do logical negation? (cf inverse, opposite, contrapositive)
Hot Network Questions
How to home-make rubber feet stoppers for table legs?
Origin of Australian slang exclamation "struth" meaning greatly surprised
What NBA rule caused officials to reset the game clock to 0.3 seconds when a spectator caught the ball with 0.1 seconds left?
Analog story - nuclear bombs used to neutralize global warming
Bypassing C64's PETSCII to screen code mapping
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
Overfilled my oil
Are there any world leaders who are/were good at chess?
Can I go in the edit mode and by pressing A select all, then press U for Smart UV Project for that table, After PBR texturing is done?
Clinical-tone story about Earth making people violent
Checking model assumptions at cluster level vs global level?
Do we need the author's permission for reference
Who is the target audience of Netanyahu's speech at the United Nations?
Why include unadjusted estimates in a study when reporting adjusted estimates?
Making sense of perturbation theory in many-body physics
Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term?
Xubuntu 24.04 - Libreoffice
Determine which are P-cores/E-cores (Intel CPU)
Does a Linux console change color when it crashes?
Gluteus medius inactivity while riding
Is it possible that heinous sins result in a hellish life as a person, NOT always animal birth?
How to use \zcref to get black text Equation?
"Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf
Does the curvature engine's wake really last forever?
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Mathematics
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
10508 | https://math.stackexchange.com/questions/4779387/unique-solvability-of-weak-poisson-equation-with-neumann-boundary-condition | sobolev spaces - Unique solvability of weak Poisson equation with Neumann boundary condition - Mathematics Stack Exchange
Join Mathematics
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Mathematics helpchat
Mathematics Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Unique solvability of weak Poisson equation with Neumann boundary condition
Ask Question
Asked 1 year, 11 months ago
Modified1 year, 11 months ago
Viewed 121 times
This question shows research effort; it is useful and clear
1
Save this question.
Show activity on this post.
I'm studying a Poisson BVP: Find u∈W 1,p(Ω)u∈W 1,p(Ω) such that
∫Ω∇u⋅∇v=F(v)∀v∈W 1,p′(Ω),∫Ω∇u⋅∇v=F(v)∀v∈W 1,p′(Ω),
where p p and p′p′ are Hölder conjugates and F F belongs to the dual of W 1,p′(Ω)W 1,p′(Ω). Note the implicit homogeneous Neumann boundary condition ∂u/∂ν=0∂u/∂ν=0; consider solutions defined up to an additive constant.
My question: If a solution exists, is it unique (up to an additive constant)? I know that the answer is yes when p=2 p=2 due to coercivity but what about when, say, p∈(1,2)p∈(1,2)? This boils down to whether
∫Ω∇w⋅∇v=0∀v∈W 1,p′(Ω)∫Ω∇w⋅∇v=0∀v∈W 1,p′(Ω)
implies w w is constant, but I'm having difficulty showing that.
partial-differential-equations
sobolev-spaces
poissons-equation
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this question to receive notifications
asked Oct 2, 2023 at 11:18
bananab0ybananab0y
43 4 4 bronze badges
2
Idea: Is such a solution (to the homogeneous problem) automatically more regular (i.e. W 1,2 W 1,2)? If a portion of the boundary is flat, then w w is automatically smooth up to (that portion of) the boundary. However, I run into issues when dealing with non-flat boundary. Have you had any progress on this since you posted?Jose27 –Jose27 2023-10-08 05:17:27 +00:00 Commented Oct 8, 2023 at 5:17
I was able to show uniqueness for convex polygonal domains, which is enough for my purposes for now. It turned out to be pretty simple by considering a dual problem where the source term is w w above (w w is also adjusted to have zero mean value). The solution of the dual problem belongs to H 2 H 2 and by Sobolev imbeddings qualifies as a test function. Then it's just integration by parts to show that w=0 w=0 in L 2 L 2 norm.bananab0y –bananab0y 2023-10-09 02:19:13 +00:00 Commented Oct 9, 2023 at 2:19
Add a comment|
0
Sorted by: Reset to default
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
partial-differential-equations
sobolev-spaces
poissons-equation
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Related
5Heat equation with Neumann boundary condition
1Poisson partial differential equation under Neumann boundary conditions
2Solvability of Poisson equation with Cauchy boundary condition
1Variational formulation of the Helmholtz equation and doubt about how to deal with coercivity.
Hot Network Questions
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
Copy command with cs names
Interpret G-code
Sign mismatch in overlap integral matrix elements of contracted GTFs between my code and Gaussian16 results
Languages in the former Yugoslavia
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
Does the curvature engine's wake really last forever?
ConTeXt: Unnecessary space in \setupheadertext
Can you formalize the definition of infinitely divisible in FOL?
"Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf
Another way to draw RegionDifference of a cylinder and Cuboid
Transforming wavefunction from energy basis to annihilation operator basis for quantum harmonic oscillator
Is direct sum of finite spectra cancellative?
I have a lot of PTO to take, which will make the deadline impossible
What were "milk bars" in 1920s Japan?
On being a Maître de conférence (France): Importance of Postdoc
Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term?
Bypassing C64's PETSCII to screen code mapping
Does a Linux console change color when it crashes?
Why do universities push for high impact journal publications?
Calculating the node voltage
Are there any world leaders who are/were good at chess?
Making sense of perturbation theory in many-body physics
Clinical-tone story about Earth making people violent
more hot questions
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Mathematics
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
10509 | https://store.macmillanlearning.com/us/product/Biochemistry/p/1319333621?srsltid=AfmBOoo-dqXmlYHTwB-UXXqP8bMghAJ-BFC42qsGY5PJZuMVsJjqe6BD | Biochemistry 10th Edition | Jeremy Berg | Macmillan Learning
Skip to Main Content
Instructor Site
Student Store
United States
Canada
Student StoreStudent Store
Expand navigation
Sign in // Register
I'M AN INSTRUCTOR
I'M A STUDENT
#### Find what you need to succeed.
0
United States
Canada
Who We Are
Who We Are
back
Who We Are
Student Benefits
Student Benefits
back
Special Offers
Rent and Save
Flexible Formats
College Quest Blog
Discipline
Discipline
back
AstronomyBiochemistryBiologyChemistryCollege SuccessCommunicationEconomicsElectrical EngineeringEnglishEnvironmental ScienceGeographyGeologyHistoryMathematicsMusic & TheaterNutrition and HealthPhilosophy & ReligionPhysicsPsychologySociologyStatisticsValue
Digital Products
Digital Products
back
Achieve
E-books
iClicker Student App (Student Response System)
Support
Support
back
Get Help
Rental and Returns
Support Community
Student Options Explained
×
Rental FAQs
GET FREE SHIPPING!
Use Promo Code SHIPFREE at Step 4 of checkout.
Free Shipping only applicable to US orders. Restrictions apply.
Biochemistry
Instant Access
Tenth Edition|©2023 Jeremy Berg; Gregory Gatto Jr.; Justin Hines; John L. Tymoczko; Lubert Stryer
Format
Packages
Achieve $124.99
ISBN:9781319417475
Online course materials that will help you in this class. Includes access to e-book and iClicker Student.
Access ( 1 term )
$124.99
Subscribe until 02/28/2026
You will need to find your course in order to purchase Achieve.
Find Your Course
A grace period may be available for this course.
Visit Achieve to find out.
E-book from $86.99
ISBN:9781319486785
Take notes, add highlights, and download our mobile-friendly e-books.
Access ( 6 months )
$86.99
Subscribe until 03/28/2026
Add to Cart
Buy
$129.99
Add to Cart
Achieve Essentials $50.00
ISBN:9781319401917
Study, practice, and succeed in your course.
Access ( 1 term )
$50.00
Subscribe until 02/28/2026
You will need to find your course in order to purchase Achieve.
Find Your Course
A grace period may be available for this course.
Visit Achieve to find out.
Loose-Leaf $209.99
ISBN:9781319498405
Save money with our hole-punched, loose-leaf textbook.
Buy
$209.99
Add to Cart
Paperback from $70.00
ISBN:9781319333621
Read and study old-school with our bound texts.
Rent ( 6 months )
$70.00
Rent until 03/31/2026
Includes eBook Trial Access
(14-day)
Add to Cart
Rent ( 1 year )
$140.00
Rent until 09/27/2026
Includes eBook Trial Access
(14-day)
Add to Cart
Paperback + Achieve from $134.99
ISBN:9781319530341
This package includes Achieve and Paperback.
Rent Paperback ( 4 months ) +
Access Achieve ( 1 term )
$134.99
Rent until 02/09/2026
Includes eBook Trial Access
(14-day)
You will need to find your course in order to purchase Achieve.
Find Your Course
About
Digital Options
Contents
Authors
About
Berg (Stryer), Biochemistry is your key to success in biochemistry now and in the future with its breakthrough interactive resources, new discoveries, and discussions of career pathways in biochemistry.
Digital Options
E-book
Read online (or offline) with all the highlighting and notetaking tools you need to be successful in this course.
Learn More
Achieve Essentials
Complete assignments, engage with course materials, prepare for exams and more in order to succeed in class.
Learn More
Achieve
Achieve is a single, easy-to-use platform proven to engage students for better course outcomes
Learn More
Contents
Table of Contents
1 Biochemistry in Space and Time
2 Protein Composition and Structure
3 Binding and Molecular Recognition
4 Protein Methods
5 Enzymes: Core Concepts and Kinetics
6 Enzyme Catalytic Strategies
7 Enzyme Regulatory Strategies
8 DNA, RNA, and the Flow of Genetic Information
9 Nucleic Acid Methods
10 Exploring Evolution and Bioinformatics
11 Carbohydrates and Glycoproteins
12 Lipids and Biological Membranes
13 Membrane Channels and Pumps
14 Signal-Transduction Pathways
15 Metabolism: Basic Concepts and Themes
16 Glycolysis and Gluconeogenesis
17 Pyruvate Dehydrogenase and the Citric Acid Cycle
18 Oxidative Phosphorylation
19 Phototrophy and the Light Reactions of Photosynthesis
20 The Calvin–Benson Cycle and the Pentose Phosphate Pathway
21 Glycogen Metabolism
22 Fatty Acid and Triacylglycerol Metabolism
23 Protein Turnover and Amino Acid Catabolism
24 Integration of Energy Metabolism
25 Biosynthesis of Amino Acids
26 Nucleotide Biosynthesis
27 Biosynthesis of Membrane Lipids and Steroids
28 DNA Replication, Repair, and Recombination
29 RNA Functions, Biosynthesis, and Processing
30 Protein Biosynthesis
31 Control of Gene Expression
32 Principles of Drug Discovery and Development
Authors
Jeremy M. Berg
Jeremy M. Berg received his B.S. and M.S. degrees in Chemistry from Stanford University (where he did research with Keith Hodgson and Lubert Stryer) and his PhD in Chemistry from Harvard with Richard Holm. He then completed a postdoctoral fellowship with Carl Pabo in Biophysics at Johns Hopkins University School of Medicine. He was an Assistant Professor in the Department of Chemistry at Johns Hopkins from 1986 to 1990. He then moved to Johns Hopkins University School of Medicine as Professor and Director of the Department of Biophysics and Biophysical Chemistry, where he remained until 2003. He then became Director of the National Institute of General Medical Sciences at the National Institutes of Health. In 2011, he moved to the University of Pittsburgh, where he is now Professor of Computational and Systems Biology and Pittsburgh Foundation Chair and Director of the Institute for Personalized Medicine. He served as President of the American Society for Biochemistry and Molecular Biology from 2011 to 2013 and as Editor-in-Chief for Science magazine and the Science family of journals from 2016 to 2019. Dr. Berg has received numerous awards for his research, teaching, and public service. He is an elected member of the National Academy of Medicine and the American Academy of Arts and Sciences. He is coauthor, with Stephen J. Lippard, of the textbook Principles of Bioinorganic Chemistry. He greatly enjoys sharing his life with his wife, three grown children, and grandchildren.
Gregory J. Gatto, Jr.
Gregory J. Gatto, Jr., received his A.B. degree in Chemistry from Princeton University, where he worked with Martin F. Semmelhack and was awarded the Everett S. Wallis Prize in Organic Chemistry. In 2003, he received his MD and PhD degrees from the Johns Hopkins University School of Medicine, where he studied the structural biology of peroxisomal targeting signal recognition with Dr. Berg and received the Michael A. Shanoff Young Investigator Research Award. He completed a postdoctoral fellowship in 2006 with Christopher T. Walsh at Harvard Medical School, where he studied the biosynthesis of the macrolide immunosuppressants. Dr. Gatto is currently a Scientific Director in the Novel Human Genetics Research Unit at GlaxoSmithKline. While he enjoys losing at board games, attempting but not completing crossword puzzles, and watching baseball games at every available opportunity, he treasures most the time he spends with his wife Megan and sons Timothy and Mark.
Justin Hines
Justin K. Hines is Professor of Chemistry at Lafayette College, where he teaches general chemistry and biochemistry courses and conducts education and NIH-funded laboratory research on protein misfolding with undergraduates. He received both his B.S. and PhD in Biochemistry from Iowa State University, where he studied the structure and regulation of the enzymes of central metabolism with Richard B. Honzatko and Herbert J. Fromm. He then completed a postdoctoral fellowship with Elizabeth A. Craig in Biochemistry at the University of Wisconsin–Madison. Professor Hines has won numerous awards for teaching and research, including being named a Cottrell Scholar by the Research Corporation for Science Advancement and a Henry-Dreyfus Teacher-Scholar by the Camille and Henry Dreyfus Foundation. He is also the author of the case-studies series for Macmillan’s three biochemistry textbooks. He enjoys running, hiking, games of any kind, and spending time with his wife and children.
John L. Tymoczko
John L. Tymoczko was Towsley Professor of Biology Emeritus at Carleton College, where he taught from 1976 until his death in 2019. He taught a variety of courses, including Biochemistry, Biochemistry Laboratory, Oncogenes and the Molecular Biology of Cancer, and Exercise Biochemistry, and cotaught an introductory course, Energy Flow in Biological Systems. Professor Tymoczko received his B.A. from the University of Chicago in 1970 and his PhD in Biochemistry from the University of Chicago with Shutsung Liao at the Ben May Institute for Cancer Research. He then had a postdoctoral position with Hewson Swift of the Department of Biology at the University of Chicago. The focus of his research was on steroid receptors, ribonucleoprotein particles, and proteolytic processing enzymes.
Lubert Stryer
Lubert Stryer is Winzer Professor of Cell Biology, Emeritus, in the School of Medicine and Professor of Neurobiology, Emeritus, at Stanford University, where he has been on the faculty since 1976. He received his MD from Harvard Medical School. Professor Stryer has received many awards for his research on the interplay of light and life, including the Eli Lilly Award for Fundamental Research in Biological Chemistry, the Distinguished Inventors Award of the Intellectual Property Owners’ Association, and election to the National Academy of Sciences and the American Philosophical Society. He was awarded the National Medal of Science in 2006. The publication of his first edition of Biochemistry in 1975 transformed the teaching of biochemistry.
Berg (Stryer), Biochemistry is your key to success in biochemistry now and in the future with its breakthrough interactive resources, new discoveries, and discussions of career pathways in biochemistry.
E-book
Read online (or offline) with all the highlighting and notetaking tools you need to be successful in this course.
Learn More
Achieve Essentials
Complete assignments, engage with course materials, prepare for exams and more in order to succeed in class.
Learn More
Achieve
Achieve is a single, easy-to-use platform proven to engage students for better course outcomes
Learn More
Table of Contents
1 Biochemistry in Space and Time
2 Protein Composition and Structure
3 Binding and Molecular Recognition
4 Protein Methods
5 Enzymes: Core Concepts and Kinetics
6 Enzyme Catalytic Strategies
7 Enzyme Regulatory Strategies
8 DNA, RNA, and the Flow of Genetic Information
9 Nucleic Acid Methods
10 Exploring Evolution and Bioinformatics
11 Carbohydrates and Glycoproteins
12 Lipids and Biological Membranes
13 Membrane Channels and Pumps
14 Signal-Transduction Pathways
15 Metabolism: Basic Concepts and Themes
16 Glycolysis and Gluconeogenesis
17 Pyruvate Dehydrogenase and the Citric Acid Cycle
18 Oxidative Phosphorylation
19 Phototrophy and the Light Reactions of Photosynthesis
20 The Calvin–Benson Cycle and the Pentose Phosphate Pathway
21 Glycogen Metabolism
22 Fatty Acid and Triacylglycerol Metabolism
23 Protein Turnover and Amino Acid Catabolism
24 Integration of Energy Metabolism
25 Biosynthesis of Amino Acids
26 Nucleotide Biosynthesis
27 Biosynthesis of Membrane Lipids and Steroids
28 DNA Replication, Repair, and Recombination
29 RNA Functions, Biosynthesis, and Processing
30 Protein Biosynthesis
31 Control of Gene Expression
32 Principles of Drug Discovery and Development
Jeremy M. Berg
Jeremy M. Berg received his B.S. and M.S. degrees in Chemistry from Stanford University (where he did research with Keith Hodgson and Lubert Stryer) and his PhD in Chemistry from Harvard with Richard Holm. He then completed a postdoctoral fellowship with Carl Pabo in Biophysics at Johns Hopkins University School of Medicine. He was an Assistant Professor in the Department of Chemistry at Johns Hopkins from 1986 to 1990. He then moved to Johns Hopkins University School of Medicine as Professor and Director of the Department of Biophysics and Biophysical Chemistry, where he remained until 2003. He then became Director of the National Institute of General Medical Sciences at the National Institutes of Health. In 2011, he moved to the University of Pittsburgh, where he is now Professor of Computational and Systems Biology and Pittsburgh Foundation Chair and Director of the Institute for Personalized Medicine. He served as President of the American Society for Biochemistry and Molecular Biology from 2011 to 2013 and as Editor-in-Chief for Science magazine and the Science family of journals from 2016 to 2019. Dr. Berg has received numerous awards for his research, teaching, and public service. He is an elected member of the National Academy of Medicine and the American Academy of Arts and Sciences. He is coauthor, with Stephen J. Lippard, of the textbook Principles of Bioinorganic Chemistry. He greatly enjoys sharing his life with his wife, three grown children, and grandchildren.
Gregory J. Gatto, Jr.
Gregory J. Gatto, Jr., received his A.B. degree in Chemistry from Princeton University, where he worked with Martin F. Semmelhack and was awarded the Everett S. Wallis Prize in Organic Chemistry. In 2003, he received his MD and PhD degrees from the Johns Hopkins University School of Medicine, where he studied the structural biology of peroxisomal targeting signal recognition with Dr. Berg and received the Michael A. Shanoff Young Investigator Research Award. He completed a postdoctoral fellowship in 2006 with Christopher T. Walsh at Harvard Medical School, where he studied the biosynthesis of the macrolide immunosuppressants. Dr. Gatto is currently a Scientific Director in the Novel Human Genetics Research Unit at GlaxoSmithKline. While he enjoys losing at board games, attempting but not completing crossword puzzles, and watching baseball games at every available opportunity, he treasures most the time he spends with his wife Megan and sons Timothy and Mark.
Justin Hines
Justin K. Hines is Professor of Chemistry at Lafayette College, where he teaches general chemistry and biochemistry courses and conducts education and NIH-funded laboratory research on protein misfolding with undergraduates. He received both his B.S. and PhD in Biochemistry from Iowa State University, where he studied the structure and regulation of the enzymes of central metabolism with Richard B. Honzatko and Herbert J. Fromm. He then completed a postdoctoral fellowship with Elizabeth A. Craig in Biochemistry at the University of Wisconsin–Madison. Professor Hines has won numerous awards for teaching and research, including being named a Cottrell Scholar by the Research Corporation for Science Advancement and a Henry-Dreyfus Teacher-Scholar by the Camille and Henry Dreyfus Foundation. He is also the author of the case-studies series for Macmillan’s three biochemistry textbooks. He enjoys running, hiking, games of any kind, and spending time with his wife and children.
John L. Tymoczko
John L. Tymoczko was Towsley Professor of Biology Emeritus at Carleton College, where he taught from 1976 until his death in 2019. He taught a variety of courses, including Biochemistry, Biochemistry Laboratory, Oncogenes and the Molecular Biology of Cancer, and Exercise Biochemistry, and cotaught an introductory course, Energy Flow in Biological Systems. Professor Tymoczko received his B.A. from the University of Chicago in 1970 and his PhD in Biochemistry from the University of Chicago with Shutsung Liao at the Ben May Institute for Cancer Research. He then had a postdoctoral position with Hewson Swift of the Department of Biology at the University of Chicago. The focus of his research was on steroid receptors, ribonucleoprotein particles, and proteolytic processing enzymes.
Lubert Stryer
Lubert Stryer is Winzer Professor of Cell Biology, Emeritus, in the School of Medicine and Professor of Neurobiology, Emeritus, at Stanford University, where he has been on the faculty since 1976. He received his MD from Harvard Medical School. Professor Stryer has received many awards for his research on the interplay of light and life, including the Eli Lilly Award for Fundamental Research in Biological Chemistry, the Distinguished Inventors Award of the Intellectual Property Owners’ Association, and election to the National Academy of Sciences and the American Philosophical Society. He was awarded the National Medal of Science in 2006. The publication of his first edition of Biochemistry in 1975 transformed the teaching of biochemistry.
Related Titles
Find Your School
Select Your Discipline
Select Your Course
Find Your School
No schools matching your search criteria were found !
No active courses are available for this school.
No active courses are available for this discipline.
Can't find your course? Back Continue Back Purchase Access
Find Your Course
Confirm Your Course
Enter the course ID provided by your instructor
Find Your Course
We found the following course. Does this look correct?
We found the following course. To properly enroll in your course, please use the link provided in your school's course system (LMS Example: Canvas, Blackboard, D2L, Etc).
Your Achieve account needs to be linked with your school's account.
Back Purchase Access
Back Add to Cart
Back Add to Cart
Find Your School
Select Your Course
School Name
No schools matching your search criteria were found.
Instructor Name (Optional)
Academic Term
Search
Select Your Course
No Courses found for your selection.
Need an instructorless course?Back Purchase Access
macmillanlearning.com
//Privacy Notice
//Ads & Cookies
//Terms of Purchase/Rental
//Terms of Use
//Piracy
//Products
//Site Map
//Customer Support
We are processing your request. Please wait...
We have updated the terms of our Privacy Notice. Click here for more details.
×
Meet Tivity by Macmillan Learning!
Stay organized, manage assignments, and find balance with this free AI-powered app.
Get Tivity Today |
10510 | https://www.mometrix.com/academy/truth-tables/ | Published Time: 2021-08-18T16:45:00+00:00
Understanding Truth Tables for Statements (Video)
Skip to content
Online Courses
Study Guides
Flashcards
Online Courses
Study Guides
Flashcards
Menu
Truth Tables
On this page
Statements and Truth Values
Negation
Conjunction
Disjunction
Conditional Statements
Complex Truth Tables
Applying Truth Tables
On this page
Statements and Truth Values
Negation
Conjunction
Disjunction
Conditional Statements
Complex Truth Tables
Applying Truth Tables
[x] Transcript
Statements and Truth Values
Declarative word or number sentences are called statements if they are either true or false but cannot be both. Sometimes their truth values are easy to determine:
There are 12 months in a year is a true statement.
3+1=5 3+1=5 is a false statement.
n n is an even number is not a statement (it is an open sentence) because the truth value depends on the value of n n.
Other times it might not be so obvious and a truth table may be needed. Truth tables show the truth values of one or more compound statements for each possible combination of truth values of the statements within them. In this video, we’ll see how they work with common logical operators, and then we’ll get into more complex conditional statements.
Negation
First up, negation, denoted by this symbol: ¬¬. Every time a statement P P is negated, its truth value is reversed. The truth table shows the truth values resulting from different numbers of negations:
| P P | ¬P¬P | ¬¬P¬¬P | ¬¬¬P¬¬¬P | … |
--- ---
| T | F | T | F | … |
| F | T | F | T | … |
If the statement P P is true, then the negation of P P is false, the negation of the negation of P P is true, the negation of the negation of the negation of P P is false, and so on and so forth. If the statement P P is false, then you will have the opposite truth values.
Suppose P P is the statement, “Snoopy is a dog.” Using the truth table, since we can see this statement is true, we can also see that the statement, “Snoopy is not not a dog,” is also true.
| P P | ¬P¬P | ¬¬P¬¬P | ¬¬¬P¬¬¬P | … |
--- ---
| T | F | T | F | … |
| F | T | F | T | … |
If P P is the statement, “0.5 is an integer,” which is false, the table shows that, “0.5 is not an integer,” is true.
| P P | ¬P¬P | ¬¬P¬¬P | ¬¬¬P¬¬¬P | … |
--- ---
| T | F | T | F | … |
| F | T | F | T | … |
Conjunction
Now for conjunction, joining two statements P P and Q Q with the word “and”. The symbol for conjunction is an upside down V: ∧. A conjunction is true only when both statements are true, according to the table:
| P | Q | P∧Q |
---
| T | T | T |
| T | F | F |
| F | T | F |
| F | F | F |
If the statement P P is true AND the statement Q Q is true, then P∧Q P∧Q is true. If P P is true and Q Q is false, then P∧Q P∧Q is false. If P P is false and Q Q is true, then P∧Q P∧Q is false. And if P P is false and Q Q is false, then P∧Q P∧Q is false.
The statement, “Snoopy is a dog and 0.5 is an integer,” is false according to the table because P P – Snoopy is a dog – is true, but Q Q – 0.5 is an integer – is false.
| P | Q | P∧Q |
---
| T | T | T |
| T | F | F |
| F | T | F |
| F | F | F |
Disjunction
Disjunction, two statements joined by “or” and represented by this symbol: ∨∨, has kind of an opposite effect. It is only false when both statements are false.
| P | Q | P∨Q |
---
| T | T | T |
| T | F | T |
| F | T | T |
| F | F | F |
If P P is true and Q Q is true, then P∨Q P∨Q is true. If P P is true and Q Q is false, then P∨Q P∨Q is true. If P P is false and Q Q is true, then P∨Q P∨Q is true. If P P is false and Q Q is false, then P∨Q P∨Q is also false.
The statement, “Snoopy is a dog or 0.5 is an integer,” is true according to the table because P P – Snoopy is a dog – is true, and Q –0.5 is an integer – is false.
Conditional Statements
Conditional statements, denoted by an arrow can also be evaluated using truth tables. Consider the example, “Natural numbers are integers.” Of course, this can be written in “if, then” form: “If a number is a natural number, then it is an integer.”
Upon hearing this statement, you grab your calculator, ready to generate some random numbers. For each number generated, one of four things will happen:
Your number will be a natural number that is also an integer.
Your number will be a natural number that is not an integer.
Your number will not be a natural number but will be an integer.
Your number will not be a natural number and will not be an integer.
Scenario 1 could definitely be true. Scenario 2 could not. Scenarios 3 and 4, however, could go either way, but from the statement only, we don’t actually know anything about numbers that are not natural numbers. All we know is that if a number is a natural number, then it is an integer. So scenarios 3 and 4 don’t change the truth value of the conditional. Here’s what the truth table for a conditional looks like:
| Scenario | P | Q | P→Q |
--- --- |
| 1 | T | T | T |
| 2 | T | F | F |
| 3 | F | T | T |
| 4 | F | F | T |
Suppose I make this statement: “If you make an A on your test, then I’ll give you 10 dollars.” Is the statement, “If you make a B on your test, then I’ll give you 10 dollars,” true or false?
[pause]
| P | Q | P→Q |
---
| T | T | T |
| T | F | F |
| F | T | T |
| F | F | T |
The statement is true because we don’t know the outcome of bringing home a B. All we know is that it is true that an A will get us 10 bucks.
Think of it this way, if you got an A, then you should get $10. So when P P is true (you make an A on your test) and Q Q is true (I give you $10), then P→Q P→Q is also true because the first thing caused the second thing to happen. I told you the truth. But what if you got an A on your test (P P is true) and I didn’t give you $10 (Q Q is false)? Well, you’d probably be upset with me because I lied to you and told you a false statement (P→Q P→Q is false).
These next two rows are where it gets a little tricky. What if you make a B on your test (P P is false) and I give you $10 (Q Q is true). Is P→Q P→Q true? It may not seem like it, but it is true. I didn’t lie to you by giving you $10 even though you didn’t make an A because I didn’t tell you what I would do if you made a B. The same logic follows for the next statement. If you make a B on your test (P P is false) and I don’t give you $10 (Q Q is false), then P→Q P→Q is still true. Again, I didn’t lie to you by not giving you $10 when you made a B. All I said was IF you made an A, then I would give you $10. There were no promises made or broken for you making a B.
Biconditional Statements
The potential truth values of biconditionals can also be charted using truth tables. Biconditionals, usually containing “if and only if” and represented with a double arrow ↔, are true when both statements P P and Q Q are either true or false. Definitions tend to work well as biconditionals. Here’s one: “A right angle measures 90 degrees.” This can also be written, “An angle is a right angle if and only if it measures 90 degrees.” Biconditionals go both ways, so the reverse also works: “An angle measures 90 degrees if and only if it is a right angle.”
Given an angle, there are four possible scenarios:
An angle is a right angle and measures 90 degrees.
An angle is a right angle and does not measure 90 degrees.
An angle is not a right angle and measures 90 degrees.
The angle is not a right angle and does not measure 90 degrees.
Clearly, scenarios 1 and 4 are true and 2 and 3 are false. Therefore, this is the truth table:
| Scenario | P | Q | P↔Q |
--- --- |
| 1 | T | T | T |
| 2 | T | F | F |
| 3 | F | T | F |
| 4 | F | F | T |
Complex Truth Tables
Consider the statement “Two lines are parallel if they are coplanar and do not intersect.” Notice that the phrase “if and only if” has been simplified to if with two f’s. This is a common simplification made in mathematical phrases. Here, we’ll consider three statements:
Two lines are parallel lines.
Two lines are coplanar.
Two lines do not intersect.
This statement is of the form P↔(Q∧R)P↔(Q∧R). Let’s make a truth table. Since there are three statements in this example and each one has its own true or false value, we know that our truth table will have 2 3 2 3 rows. In general, any truth table has 2 n 2 n rows.
So the first three columns for P P, Q Q, and R R show the different possibilities for if P P, Q Q, and R R are true or false. Generally they’re set up the same way for any truth table that you have. Now we’re gonna look at the second part of our statement: Q∧R Q∧R.
For our first row, Q∧R Q∧R, we know that that’s true because Q Q and R R are both true. Then we look at P P. So our statement P P is true, and the statement Q∧R Q∧R is true, so P↔(Q∧R)P↔(Q∧R) is also true.
Then for our second row we can do the same thing. Look at Q∧R Q∧R. R R is false, so Q∧R Q∧R is also false. Then we compare this to our statement P P. P P is true and Q∧R Q∧R is false, so P↔(Q∧R)P↔(Q∧R) is also false.
For our third row, we’re gonna look at Q∧R Q∧R. Q Q is false, so the statement Q∧R Q∧R is false. Compared to our P P statement which is true, that makes our biconditional statement, P↔(Q∧R)P↔(Q∧R) false because the Q∧R Q∧R part is false.
For our fourth row, we’re gonna do the same thing, we look at Q∧R Q∧R, both Q Q and R R are false, so Q∧R Q∧R is also false. Compared to P P, which is true, that makes our biconditional statement, P↔(Q∧R)P↔(Q∧R) false because Q∧R Q∧R is false, while P P is true.
For our fifth row, we look at Q∧R Q∧R. Both Q Q and R R are true, so Q∧R Q∧R is true. Compared to our statement P P, which is false, P↔(Q∧R)P↔(Q∧R) is also false.
For our sixth row, Q∧R Q∧R is false because R R is false. Compared to P P, P P is also false, which makes our biconditional statement, P↔(Q∧R)P↔(Q∧R) true because they have the same truth value. P P has the same truth value as Q∧R Q∧R.
Looking at our seventh row, we’ll see the same thing. Q∧R Q∧R is false because Q Q is false. But since P P is also false, our biconditional statement becomes true. For our last row, we see that Q∧R Q∧R is false because both Q Q and R R have false truth values. And we compare this to our P P, which is also false, so P↔(Q∧R)P↔(Q∧R) is true because P P is false and Q∧R Q∧R is false, at the same time. Therefore, the whole thing is true.
| P | Q | R | (Q∧R) | P ↔ (Q∧R) | Reasoning |
--- --- --- |
| T | T | T | T | T | “And” statement true, matches true p |
| T | T | F | F | F | False R makes the “and” false but the P is true |
| T | F | T | F | F | False Q makes the “and” false but P is true |
| T | F | F | F | F | False Q and R make the “and” false but the P true |
| F | T | T | T | F | P false, “and” true |
| F | T | F | F | T | P and “and” both false |
| F | F | T | F | T | P and “and” both false |
| F | F | F | F | T | P and “and” both false |
Applying Truth Tables
Using the truth table, we can pinpoint whether the statement, “Two lines are skew if they are coplanar and do not intersect” is true or false. Skew lines, of course, do not intersect, but are not coplanar. Clearly a false statement, shown by the truth table.
| P | Q | R | (Q∧R) | P ↔ (Q∧R) |
--- ---
| T | T | T | T | T |
| T | T | F | F | F |
| T | F | T | F | F |
| T | F | F | F | F |
| F | T | T | T | F |
| F | T | F | F | T |
| F | F | T | F | T |
| F | F | F | F | T |
Since we are considering skew lines, we will assume P P is true. Skew lines are not coplanar, so Q Q is false. And skew lines do not intersect, so R R is true. This gives us row 3, which shows that (Q∧R)(Q∧R) is false because Q Q is false, which means that P↔(Q∧R)P↔(Q∧R) is also false because (Q∧R)(Q∧R) is false, even though P P is true.
I hope that this video helped you understand how truth tables work and how they can be used to determine truth values!
Thanks for watching, and happy studying!
Return to Discrete Math Videos
293095
by Mometrix Test Preparation | Last Updated: August 8, 2025
On this page
Statements and Truth Values
Negation
Conjunction
Disjunction
Conditional Statements
Complex Truth Tables
Applying Truth Tables
Why you can trust Mometrix
Raising test scores for 20 years
150 million test-takers helped
Prep for over 1,500 tests
40,000 5-star reviews
A+ BBB rating
Who we are
About Mometrix Test Preparation
We believe you can perform better on your exam, so we work hard to provide you with the best study guides, practice questions, and flashcards to empower you to be your best. Learn More...
PRODUCTS & SERVICES
Study Guides
Flashcards
Online Courses
Community Involvement
Affiliate Program
Companies/Institutions & Bulk Orders
Mometrix Blog
COMPANY
Reviews
FAQ
About Us
Academy Editorial Guidelines
CONTACT US
Customer Service
Purchase Orders
Contact Information
MOMETRIX
Privacy Policy
Terms of Use
Disclaimers
Mission, Vision and Values
Mometrix Scholarships
All content on this website is Copyright © 2025 Mometrix Test Preparation | 3195 Dowlen Rd Ste 101-414, Beaumont, TX 77706
Mometrix Test Preparation provides unofficial test preparation products for a variety of examinations. All trademarks are property of their respective trademark owners.
This content is provided for test preparation purposes only and does not imply our endorsement of any particular political, scientific, or religious point of view.
Mometrix Academy
Search for:
Business
Career
College Admissions and Placement
Construction and Industry
Counseling and Social Work
Finance, Insurance, and Real Estate
Graduate and Professional School
K-12
Medical Professional
Medical Technology
Nursing Certifications
Nutrition
Personal Fitness
Public Service and Legal
Teacher Certification
Test Anxiety Tips
Close |
10511 | https://www.onlinemathlearning.com/bedmas.html | Order Of Operations Worksheets - BEDMAS or PEMDAS
What is the BEDMAS rule? BEDMAS (or PEMDAS) is an acronym used to remember the order of operations in mathematical expressions. It tells you which calculations to perform first when you have a combination of different operations like addition, subtraction, multiplication, division, exponents, and parentheses.
Practice order of operations using BEDMAS (Brackets, Exponents, Division, Multiplication, Addition, Subtraction).
Share this page to Google Classroom
More Order of Operations Worksheets
Printable
Order of Operations (introduce parenthesis) Order of Operations (+, -, ×, parenthesis) Order of Operations (+, -, ×, ÷, parenthesis) Order of Operations (+, -, ×, ÷, parenthesis, exponents)
Order of Operations (introduce exponents)
Online
Order of Operations Game Order of Operations (+, –) Order of Operations (parenthesis, +, –)
Order of Operations (×, ÷ ) Order of Operations (parenthesis, ×, ÷)
Order of Operations (×, ÷, +, –) Order of Operations (parenthesis, ×, ÷, +, –) Order of Operations (parenthesis, ×, ÷, +, –)
Order of Operations (Include exponents)
Mixed Operations 1 Mixed Operations 2 Mixed Operations 3
Objective: I know how to perform mixed operations with brackets or parenthesis, exponents, multiplication, division, addition, and subtraction. If the calculations involve a combination of brackets or parenthesis, exponents, multiplication, division, addition, and subtraction then you need to follow the BEDMAS rules:
Step 1: First, perform the operations within the brackets or parenthesis
Step 2: Second, evaluate the exponents.
Step 3: Third, perform multiplication and division from left to right.
Step 4: Fourth, perform addition and subtraction from left to right. The following diagram shows the BEDMAS rules for order of operations.
What BEDMAS Stands For:
Brackets/Parentheses (B/P): Perform any calculations inside brackets or parentheses first. If you have nested brackets (brackets within brackets), work from the innermost set outwards.
Exponents/Orders (E): Evaluate any exponents, powers, or roots (like square roots).
Division and Multiplication (D/M): Perform division and multiplication from left to right. This is important: if both division and multiplication are present, you do whichever comes first as you read from left to right.
Addition and Subtraction (A/S): Perform addition and subtraction from left to right. Again, if both are present, you work from left to right.
Example: Calculate 23 – 3 × (8 – 6) Solution: 23 – 3 × (8 – 6) (perform within brackets or parenthesis) = 23 – 3 × 2 (evaluate the exponent) = 8 – 3 × 2 (perform multiplication) = 8 – 6 (perform subtraction) = 2
Fill in all the gaps, then press "Check" to check your answers. Use the "Hint" button to get a free letter if an answer is giving you trouble. You can also click on the "[?]" button to get a clue. Note that you will lose points if you ask for hints or clues!
Click on the following image to play the Orders of Operations Game.
Try out our new and fun Fraction Concoction Game.
Add and subtract fractions to make exciting fraction concoctions following a recipe. There are four levels of difficulty: Easy, medium, hard and insane. Practice the basics of fraction addition and subtraction or challenge yourself with the insane level.
We hope that the free math worksheets have been helpful. We encourage parents and teachers to select the topics according to the needs of the child. For more difficult questions, the child may be encouraged to work out the problem on a piece of paper before entering the solution. We hope that the kids will also love the fun stuff and puzzles.
We welcome your feedback, comments and questions about this site or page. Please submit your feedback or enquiries via our Feedback page. |
10512 | https://www.spiraxsarco.com/learn-about-steam/steam-engineering-principles-and-heat-transfer/engineering-units?sc_lang=en-GB | Looking for Spirax Sarco products and services?
Contents
Engineering Units
What is Steam?
Superheated Steam
Steam Quality
Heat Transfer
Methods of Estimating Steam Consumption
Measurement of Steam Consumption
Thermal Rating
Energy Consumption of Tanks and Vats
Heating with Coils and Jackets
Heating Vats and Tanks by Steam Injections
Steam Consumption of Pipes and Air Heaters
Steam Consumption of Heat Exchangers
Steam Consumption of Plant Items
Entropy - a basic understanding
Entropy - its practical use
Back to Learn about steam
Engineering Units
An overview of the units of measurement used in the Steam and Condensate Loop including temperature, pressure, density, volume, heat, work and energy.
Throughout the engineering industries, many different definitions and units have been proposed and used for mechanical and thermal properties.
The problems this caused led to the development of an agreed international system of units (or SI units: Système International d’Unités). In the SI system there are seven well-defined base units from which the units of other properties can be derived, and these will be used throughout this publication.
The SI base units include length (in metres), mass (in kilograms), time (in seconds) and temperature (in kelvin). The first three will hopefully need no further explanation, while the latter will be discussed in more detail later.
The other SI base units are electric current (in amperes), amount of substance (in moles) and luminous intensity (in candela). These may be familiar to readers with a background in electronics, chemistry and physics respectively, but have little relevance to steam engineering nor the contents of The Steam and Condensate Loop.
Table 2.1.1 shows the derived units that are relevant to this subject, all of which should be familiar to those with any general engineering background. These quantities have all been assigned special names after famous pioneers in the development of science and engineering.
Table 2.1.1 Named quantities in derived SI units.
| Quantity | Name | Symbol | SI-base unit | Derived unit |
| Area | square metre | A | m2
| Volume | cubic metre | V | m3
| Velocity | metre per second | u | m/s
| Acceleration | metre per second squared | a | m/s2
| Force | newton | N | kg m/s2 | J/m |
| Energy | joule | J | kg m2/s2 | N m |
| Pressure or stress | pascal | Pa | kg/m s2 | N/m2 |
| Power | watt | W | kg m2/s3 | J/s |
There are many other quantities that have been derived from SI base units, which will also be of significance to anyone involved in steam engineering. These are provided in Table 2.1.2.
Table 2.1.2 Other quantities in derived SI units
| Quantity | SI base unit | Derived unit |
| Mass density | kg/m3 | kg/m3 |
| Specific volume (Vg) | m3/kg | m3/kg |
| Specific enthalpy (h) | m2/s2 | J/kg |
| Specific heat capacity (cp) | m2/s2 K | J/kg K |
| Specific entropy | m2/s2 K | J/kg K |
| Heat flowrate | m2 kg/s3 | J/s or W |
| Dynamic viscosity | kg/m s | N s/m² |
Dot notation
This convention is used to identify a compound unit incorporating rate, for example:
m = Mass (e.g. kg)
ṁ = Mass flow per time unit (e.g. kg/h) = Mass flowrate
Multiples and submultiples
Table 2.1.3 gives the SI prefixes that are used to form decimal multiples and submultiples of SI units. They allow very large or very small numerical values to be avoided. A prefix attaches directly to the name of a unit, and a prefix symbol attaches directly to the symbol for a unit.
In summary: one thousand metres may be shown as 1 km, 1 000 m or 10³ m.
Table 2.1.3 Multiples and submultiples used with SI units
| Multiples | | | Submultiples | | |
| Factor | Prefix | Symbol | Factor | Prefix | Symbol |
| 1012 | tera | T | 10-3 | milli | m |
| 109 | giga | G | 10-6 | micro | μ |
| 106 | mega | M | 10-9 | nano | n |
| 103 | kilo | k | 10-12 | pico | P |
Special abbreviations used in steam flowmetering applications
For historical reasons, International Standard ISO 5167 (supersedes BS 1042) which refers to flowmetering, use the following abbreviations in Table 2.1.4.
Table 2.1.4 Symbols used in flowmetering applications
| Symbol | Definition | Unit |
| qM | Mass flowrate | kg/s or kg/h |
| qV | Volume flowrate | m3/s |
| QI | Liquid flowrate | I/min |
| QS | Gas flowrate at STP | I/min |
| QF | Gas flowrate actual | I/min |
| QE | Equivalent water flowrate | I/min |
| DS | Density of gas at STP | kg/m3 |
| DF | Density of gas actual | kg/m3 |
| PS | Standard pressure (1.013 bar a) | bar a |
| PF | Actual flow pressure | bar a |
| TS | Standard temperature | °C |
| TF | Actual flow temperature | °C |
STP - Standard temperature and pressure
These are the standard conditions for measurement of the properties of matter. The standard temperature is the freezing point of pure water, 0 °C or 273.16 °K. The standard pressure is the pressure exerted by a column of mercury (symbol Hg) 760 mm high, often designated 760 mm Hg. This pressure is also called one atmosphere and is equal to 1.01325 x 106 dynes per square centimetre, or approximately 14.7 lb per square inch. The density (mass per volume) of a gas is usually reported as its value at STP. Properties that cannot be measured at STP are measured under other conditions; usually the values obtained are then mathematically extrapolated to their values at STP
Symbols
Table 2.1.5 shows the symbols and typical units used in The Steam and Condensate Loop.
Table 2.1.5 Symbols and units of measure used in The Steam and Condensate Loop
| Symbol | Definition | Unit |
| A | Cross sectional area of a conduit,for the operating condition | m² or mm² |
| cP | Specific heat capacity at constant pressure | kJ/kg °C or kJ/kg K |
| cV | Specific heat capacity at constant volume | kJ/m³ °C or kJ/m³ K |
| D | Diameter of the circular cross section of a conduit | m or mm |
| d | Orifice diameter | m or mm |
| g | Acceleration due to gravity | 9.81 m/s² |
| Hz | Hertz, the unit of frequency (number of cycles per second) | Hz or kHz |
| J | Joule, the unit of energy | J or kJ |
| L | Length | m |
| M | Molar mass of a fluid | kg/mol |
| N | Newton, the unit of force | N or kN |
| Pa | Pascal, the unit of pressure | Pa or kPa |
| p | Static pressure of a fluid | bar or kPa |
| ∆p | Differential pressure | bar or kPa |
| m | Fundamental unit of length (metre) | m |
| m | Mass | kg |
| ṁ | Mass flowrate | kg/s or kg/h |
| ṁS | Steam mass flowrate | kg/s or kg/h |
| Q | Quantity of heat | kJ |
| Q̇ | Heat transfer rate | kJ/s (kW) |
| R | Radius | m or mm |
| ReD | Reynolds number referred to diameter D | Dimensionless |
| s | Fundamental unit of time (second) | s |
| Sr | Strouhal number | Dimensionless |
| σ | Stress | N/m² |
| TS | Steam temperature | K or °C |
| TL | Liquid (or product) temperature | K or °C |
| ∆T | Temperature difference or change | K or °C |
| t | Time | s or h |
| u | Velocity of a fluid | m/s |
| μ | Dynamic viscosity of a fluid | Pa s or cP |
| ν | Kinematic viscosity | cSt |
| ρ | Density of a fluid | kg/m³ |
| V̇ | Volume flowrate | m³/s or m³/h |
| W | Unit of energy flow (Watt) | W (J/s) |
| V (vg) | Volume (Specific volume) | m³ (m³/kg) |
| H (hg) | Enthalpy (Specific enthalpy) | kJ (kJ/kg) |
| S (sg) | Entropy (Specific entropy) | kJ/K (kJ/kg K) |
| U (ug) | Internal energy (specific internal energy) | kJ (kJ/kg) |
Subscripts used with properties
When using enthalpy, entropy and internal energy, subscripts as shown below are used to identify the phase, for example:
Subscript f = Fluid or liquid state, for example hf: liquid enthalpy
Subscript fg = Change of state liquid to gas, for example hfg: enthalpy of evaporation
Subscript g = Total, for example hg: total enthalpy
Note that, by convention, the total heat in superheated steam is signified by h.
It is also usual, by convention, to signify sample quantities in capital letters, whilst unit quantities are signified in lower case letters.
For example:
Total enthalpy in a sample of superheated steam H kJ
Specific enthalpy of superheated steam h kJ/kg
Temperature
The temperature scale is used as an indicator of thermal equilibrium, in the sense that any two systems in contact with each other with the same value are in thermal equilibrium.
The Celsius (°C) scale
This is the scale most commonly used by the engineer, as it has a convenient (but arbitrary) zero temperature, corresponding to the temperature at which water will freeze.
The absolute or K (kelvin) scale
This scale has the same increments as the Celsius scale, but has a zero corresponding to the minimum possible temperature when all molecular and atomic motion has ceased. This temperature is often referred to as absolute zero (0 K) and is equivalent to -273.16 °C.
The two scales of temperature are interchangeable, as shown in Figure 2.1.1 and expressed in Equation 2.1.1.
The SI unit of temperature is the kelvin, which is defined as 1 ÷ 273.16 of the thermodynamic temperature of pure water at its triple point (0.01 °C). An explanation of triple point is given in Module 2.2.
Most thermodynamic equations require the temperature to be expressed in kelvin. However, temperature difference, as used in many heat transfer calculations, may be expressed in either °C or K. Since both scales have the same increments, a temperature difference of 1 °C has the same value as a temperature difference of 1 K.
Pressure
The SI unit of pressure is the pascal (Pa), defined as 1 newton of force per square metre (1 N/m²).
As Pa is such a small unit the kPa (1 kilonewton/m²) or MPa (1 Meganewton/m²) tend to be more appropriate to steam engineering.
However, probably the most commonly used metric unit for pressure measurement in steam engineering is the bar. This is equal to 105 N/m², and approximates to 1 atmosphere. This unit is used throughout this publication.
Other units often used include lb/in² (psi), kg/cm², atm, in H2O and mm Hg. Conversion factors are readily available from many sources.
Absolute pressure (bar a)
This is the pressure measured from the datum of a perfect vacuum i.e. a perfect vacuum has a pressure of 0 bar a.
Gauge pressure (bar g)
This is the pressure measured from the datum of the atmospheric pressure. Although in reality the atmospheric pressure will depend upon the climate and the height above sea level, a generally accepted value of 1.013 25 bar a (1 atm) is often used. This is the average pressure exerted by the air of the earth’s atmosphere at sea level.
Gauge pressure = Absolute pressure - Atmospheric pressure
Pressures above atmospheric will always yield a positive gauge pressure. Conversely a vacuum or negative pressure is the pressure below that of the atmosphere. A pressure of -1 bar g corresponds closely to a perfect vacuum.
Differential pressure
This is simply the difference between two pressures. When specifying a differential pressure, it is not necessary to use the suffixes ‘g’ or ‘a’ to denote either gauge pressure or absolute pressure respectively, as the pressure datum point becomes irrelevant.
Therefore, the difference between two pressures will have the same value whether these pressures are measured in gauge pressure or absolute pressure, as long as the two pressures are measured from the same datum.
Density and specific volume
The density (ρ) of a substance can be defined as its mass (m) per unit volume (V). The specific volume (vg) is the volume per unit mass and is therefore the inverse of density. In fact, the term ‘specific’ is generally used to denote a property of a unit mass of a substance (see Equation 2.1.2).
The SI units of density (ρ ) are kg/m³, conversely, the units of specific volume (vg) are m³/kg.
Another term used as a measure of density is specific gravity. It is a ratio of the density of a substance (ρs) and the density of pure water (ρw) at standard temperature and pressure (STP).
This reference condition is usually defined as being at atmospheric pressure and 0°C. Sometimes it is said to be at 20°C or 25°C and is referred to as normal temperature and pressure (NTP).
The density of water at these conditions is approximately 1 000 kg/m³. Therefore substances with a density greater than this value will have a specific gravity greater than 1, whereas substances with a density less than this will have a specific gravity of less than 1.
Since specific gravity is a ratio of two densities, it is a dimensionless variable and has no units. Therefore in this case the term specific does not indicate it is a property of a unit mass of a substance. Specific gravity is also sometimes known as the relative density of a substance.
Heat, work and energy
Energy is sometimes described as the ability to do work. The transfer of energy by means of mechanical motion is called work. The SI unit for work and energy is the joule, defined as 1 N m.
The amount of mechanical work carried out can be determined by an equation derived from Newtonian mechanics:
Work = Force x Displacement
It can also be described as the product of the applied pressure and the displaced volume:
Work = Applied pressure x Displaced volume
Example 2.1.1
An applied pressure of 1 Pa (or 1 N/m²) displaces a volume of 1 m³. How much work has been done?
Work done = 1 N/m² x 1 m³ = 1 N m (or 1 J)
The benefits of using SI units, as in the above example, is that the units in the equation actually cancel out to give the units of the product.
The experimental observations of J. P. Joule established that there is an equivalence between mechanical energy (or work) and heat. He found that the same amount of energy was required to produce the same temperature rise in a specific mass of water, regardless of whether the energy was supplied as heat or work.
The total energy of a system is composed of the internal, potential and kinetic energy. The temperature of a substance is directly related to its internal energy (ug). The internal energy is associated with the motion, interaction and bonding of the molecules within a substance. The external energy of a substance is associated with its velocity and location, and is the sum of its potential and kinetic energy.
The transfer of energy as a result of the difference in temperature alone is referred to as heat flow. The watt, which is the SI unit of power, can be defined as 1 J/s of heat flow.
Other units used to quantify heat energy are the British Thermal Unit (Btu: the amount of heat to raise 1 lb of water by 1 °F) and the kilocalorie (the amount of heat to raise 1 kg of water by 1 °C).
Conversion factors are readily available from numerous sources.
Specific enthalpy
This is the term given to the total energy, due to both pressure and temperature, of a fluid (such as water or steam) at any given time and condition. More specifically it is the sum of the internal energy and the work done by an applied pressure (as in Example 2.1.1).
The basic unit of measurement is the joule (J). Since one joule represents a very small amount of energy, it is usual to use kilojoules (kJ = 1 000 joules).
The specific enthalpy is a measure of the total energy of a unit mass, and its units are usually kJ/kg.
Specific heat capacity
The enthalpy of a fluid is a function of its temperature and pressure. The temperature dependence of the enthalpy can be found by measuring the rise in temperature caused by the flow of heat at constant pressure. The constant-pressure heat capacity cP, is a measure of the change in enthalpy at a particular temperature.
Similarly, the internal energy is a function of temperature and specific volume. The constant volume heat capacity cv, is a measure of the change in internal energy at a particular temperature and constant volume.
Because the specific volumes of solids and liquids are generally smaller, then unless the pressure is extremely high, the work done by an applied pressure can be neglected. Therefore, if the enthalpy can be represented by the internal energy component alone, the constant-volume and constant-pressure heat capacities can be said to be equal.
Therefore, for solids and liquids: cP ≈ cv
Another simplification for solids and liquids assumes that they are incompressible, so that their volume is only a function of temperature. This implies that for incompressible fluids the enthalpy and the heat capacity are also only functions of temperature.
The specific heat capacity represents the amount of energy required to raise 1 kg by 1 °C, and can be thought of as the ability of a substance to absorb heat. Therefore the SI units of specific heat capacity are kJ/kg K (kJ/kg °C). Water has a large specific heat capacity (4.19 kJ/kg °C) compared with many fluids, which is why both water and steam are considered to be good carriers of heat.
The amount of heat energy required to raise the temperature of a substance can be determined from Equation 2.1.4.
This equation shows that for a given mass of substance, the temperature rise is linearly related to the amount of heat provided, assuming that the
specific heat capacity is constant over that temperature range.
Example 2.1.2
Consider a quantity of water with a volume of 2 litres, raised from a temperature of 20 °C to 70 °C.
At atmospheric pressure, the density of water is approximately 1 000 kg/m³. As there are 1 000 litres in 1 m³, then the density can be expressed as 1 kg per litre (1 kg/l). Therefore the mass of the water is 2 kg.
The specific heat capacity for water can be taken as 4.19 kJ/kg °C over low ranges of temperature.
Therefore: Q =2 kg x 4.19 kJ/kg °C x (70 - 20) °C = 419 kJ
If the water was then cooled to its original temperature of 20 °C, it would also release this amount of energy in the cooling application.
Entropy (S)
Entropy is a measure of the degree of disorder within a system. The greater the degree of disorder, the higher the entropy. The SI units of entropy are kJ/kg K (kJ/kg °C).
In a solid, the molecules of a substance arrange themselves in an orderly structure. As the substance changes from a solid to a liquid, or from a liquid to a gas, the arrangement of the molecules becomes more disordered as they begin to move more freely. For any given substance the entropy in the gas phase is greater than that of the liquid phase, and the entropy in the liquid phase is more than in the solid phase.
One characteristic of all natural or spontaneous processes is that they proceed towards a state of equilibrium. This can be seen in the second law of thermodynamics, which states that heat cannot pass from a colder to a warmer body.
A change in the entropy of a system is caused by a change in its heat content, where the change of entropy is equal to the heat change divided by the average absolute temperature, Equation 2.1.5.
When unit mass calculations are made, the symbols for entropy and enthalpy are written in lower case, Equation 2.1.6.
To look at this in further detail, consider the following examples:
Example 2.1.3
A process raises 1 kg of water from 0 to 100°C (273 to 373 K) under atmospheric conditions.
Specific enthalpy at 0°C (hf) = 0 kJ/kg (from steam tables)
Specific enthalpy of water at 100°C (hf) = 419 kJ/kg (from steam tables)
Calculate the change in specific entropy
Since this is a change in specific entropy of water, the symbol ‘s’ in Equation 2.1.6 takes the suffix ‘f’ to become sf.
Example 2.1.4
A process changes 1 kg of water at 100°C (373 K) to saturated steam at 100°C (373 K) under atmospheric conditions.
Calculate the change in specific entropy of evaporation
Since this is the entropy involved in the change of state, the symbol ‘s’ in Equation 2.1.6 takes the suffix ‘fg’ to become sfg.
Specific enthalpy of evaporation
of steam at 100°C (373 K) (hfg) = 2 258 kJ/kg (from steam tables)
Specific enthalpy of evaporation
of water at 100°C (373 K) (hfg) = 0 kJ/kg (from steam tables)
The total change in specific entropy from water at 0 °C to saturated steam at 100 °C is the sum of the change in specific entropy for the water, plus the change of specific entropy for the steam, and takes the suffix ‘g’ to become the total change in specific entropy sg.
Therefore
Example 2.1.5
A process superheats 1 kg of saturated steam at atmospheric pressure to 150°C (423 K). Determine the change in entropy.
As the entropy of saturated water is measured from a datum of 0.01 °C, the entropy of water at 0 °C can, for practical purposes, be taken as zero. The total change in specific entropy in this example is based on an initial water temperature of 0 °C, and therefore the final result happens to be very much the same as the specific entropy of steam that would be observed in steam tables at the final condition of steam at atmospheric pressure and 150 °C.
Entropy is discussed in greater detail in Module 2.15, Entropy - A Basic Understanding, and in Module 2.16, Entropy - Its Practical Use.
Top Of The Page
Next - What is Steam? |
10513 | https://math.stackexchange.com/questions/481133/equilateral-triangle-in-complex-plane | Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Equilateral triangle in complex plane [duplicate]
Ask Question
Asked
Modified 12 years, 1 month ago
Viewed 11k times
3
$\begingroup$
Prove that the points $a_1,a_2,a_3$ are vertices of an equilateral triangle if and only if $a_1^2+a_2^2+a_3^2=a_1a_2+a_2a_3+a_3a_1$.
I rewrite the equation as $2a_1^2+2a_2^2+2a_3^2-2a_1a_2-2a_2a_3-2a_3a_1=0$, which is $(a_1-a_2)^2+(a_2-a_3)^2+(a_3-a_1)^2=0$. This looks quite nice, but I'm not sure how to relate it to the equilateral triangle.
complex-numbers
Share
asked Sep 1, 2013 at 7:27
Paul S.Paul S.
3,49344 gold badges3333 silver badges6363 bronze badges
$\endgroup$
0
Add a comment |
1 Answer 1
Reset to default
6
$\begingroup$
I'll prove the 'if' part, leaving the 'only if' part to you:
Denote the points as $A(a), B(b), C(c)$ (easier to type).
Now, rotating $\vec{AC}$ by $\pi/3$ gives you $\vec{AB}$. So:
$$ \hat{AC}\cdot e^{i\pi/3} = \hat{AB}$$
Here, $|\vec{AC}| = | \vec{AB} |$. So:
$$ \vec{AC}\cdot e^{i\pi/3} = \vec{AB}$$ $$ \implies (c-a) \cdot e^{i\pi/3} = (b-a) \ldots... $$
Similarly:
$$ (a-b) \cdot e^{i\pi/3} = (c-b) \ldots... $$
Divide equation $1$ by equation $2$:
$$ \dfrac{c-a}{a-b} = \dfrac{b-a} {c-b}$$
Cross multiply and you are done!
Share
answered Sep 1, 2013 at 7:45
Parth ThakkarParth Thakkar
4,61844 gold badges3535 silver badges5151 bronze badges
$\endgroup$
4
$\begingroup$ Check the sign of rotation, not that it matters in the end. $\endgroup$
Macavity
– Macavity
2013-09-01 07:48:32 +00:00
Commented Sep 1, 2013 at 7:48
$\begingroup$ It must be counter clockwise and it is. What's wrong? $\endgroup$
Parth Thakkar
– Parth Thakkar
2013-09-01 07:49:51 +00:00
Commented Sep 1, 2013 at 7:49
$\begingroup$ How does this compare to the proofs given when the question was asked before? $\endgroup$
Gerry Myerson
– Gerry Myerson
2013-09-01 07:50:04 +00:00
Commented Sep 1, 2013 at 7:50
$\begingroup$ I saw your comment only when I had almost finished the answer. And secondly, I think this is more clear. $\endgroup$
Parth Thakkar
– Parth Thakkar
2013-09-01 07:53:08 +00:00
Commented Sep 1, 2013 at 7:53
Add a comment |
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
complex-numbers
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Linked
13 How does this equality on vertices in the complex plane imply they are vertices of an equilateral triangle?
1 Equilateral triangle iff relationship
1 Equilateral triangle using complex analysis
1 Do these vertices represent all equilateral triangles in the Complex Plane?
Related
13 How does this equality on vertices in the complex plane imply they are vertices of an equilateral triangle?
Finding center and radius of circumcircle
1 Prove $|z_1/z_2| = |z_1|/|z_2|$ without using the polar form
1 Why is the ratio of any two sides of an equilateral triangle on a complex plane equal to a complex cubic root of unity?
1 Equilateral triangle in the complex plane
4 Complex-number method to minimize equilateral-triangle area inside right triangle of side lengths $2\sqrt3$, $5$, and $\sqrt{37}$
On showing that three complex points form an equilateral triangle
Show that for exactly two positions of $A_1'$ the points $A_1'$ and $A_1''$ coincide
1 How does this solution involving complex numbers work on this inequality?
Hot Network Questions
Why is the fiber product in the definition of a Segal spaces a homotopy fiber product?
"Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf
Traversing a curve by portions of its arclength
The altitudes of the Regular Pentagon
How can the problem of a warlock with two spell slots be solved?
Are there any world leaders who are/were good at chess?
Suggestions for plotting function of two variables and a parameter with a constraint in the form of an equation
Another way to draw RegionDifference of a cylinder and Cuboid
Implications of using a stream cipher as KDF
Suspicious of theorem 36.2 in Munkres “Analysis on Manifolds”
Quantizing EM field by imposing canonical commutation relations
On the Subject of Switches
Matthew 24:5 Many will come in my name!
Proof of every Highly Abundant Number greater than 3 is Even
Analog story - nuclear bombs used to neutralize global warming
What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel?
Riffle a list of binary functions into list of arguments to produce a result
Sign mismatch in overlap integral matrix elements of contracted GTFs between my code and Gaussian16 results
Why, really, do some reject infinite regresses?
How to use \zcref to get black text Equation?
Storing a session token in localstorage
How to rsync a large file by comparing earlier versions on the sending end?
My dissertation is wrong, but I already defended. How to remedy?
An odd question
more hot questions |
10514 | https://www.hanspub.org/journal/paperinformation?paperID=109110 | 人教A版与IBDP版数学教材比较研究——以概率统计为例
学术期刊 切换导航
首 页
文 章
期 刊
投 稿
预 印
会 议
书 籍
新 闻
合 作
我 们
按学科分类 Journals by Subject
按期刊分类 Journals by Title
核心OA期刊 Core OA Journal
数学与物理 Math & Physics
化学与材料 Chemistry & Materials
生命科学 Life Sciences
医药卫生 Medicine & Health
信息通讯 Information & Communication
工程技术 Engineering & Technology
地球与环境 Earth & Environment
经济与管理 Economics & Management
人文社科 Humanities & Social Sciences
合作期刊 Cooperation Journals
首页
人文社科
创新教育研究
Vol. 13 No. 3 (March 2025)
期刊菜单
最新文章
历史文章
检索
领域
编委
投稿须知
文章处理费
最新文章
历史文章
检索
领域
编委
投稿须知
文章处理费
人教A版与IBDP版数学教材比较研究——以概率统计为例
A Comparative Study of Mathematics Textbooks between Humanistic A Version and IBDP Version—Taking Probability Statistics as an Example
DOI:10.12677/ces.2025.133157, PDF, HTML, XML, 被引量下载:485 浏览:648
作者:孔冰心, 付雨婕, 何春玲:黄冈师范学院数学与统计学院,湖北 黄冈;龙 燕:黄冈中学,湖北 黄冈
关键词:高中数学;概率统计;教材比较;High School Math;Probability Statistics;Textbook Comparison
摘要:随着全球化教育交流的深入,对比不同教育体系下的教材对优化教学内容具有重要意义。通过对人教A版与IBDP版高中数学教材中概率统计部分的比较,探讨两种不同教育理念下该学科内容的组织编排、呈现方式、版面设计、例习题数量及其综合难度的异同,并提出了改进教学方式、重视学生核心素养发展、增强知识点与现实联系以及强化课堂与信息技术整合的重要性。不仅揭示了两套教材各自的特色与优势,还为国内与国际课程的融合提供了有益的参考,希望对高中数学课堂教学以及教材改革有所帮助。
Abstract:With the deepening of globalized educational exchanges, comparing textbooks under different educational systems is of great significance in optimizing the teaching content. By comparing the probability statistics section in the high school mathematics textbooks of Humanistic A and IBDP editions, this study explores the similarities and differences in the organization, presentation, layout design, number of examples and exercises, and overall difficulty of the subject content under two different educational philosophies. It also highlights the importance of improving teaching methods, emphasizing the development of students’ core competencies, enhancing the connection between knowledge points and real-life situations, and strengthening the integration of classroom teaching with information technology. It not only reveals the characteristics and advantages of the two sets of textbooks, but also provides useful references for the integration of domestic and international curricula, hoping to be helpful for high school mathematics classroom teaching as well as textbook reform.
文章引用:孔冰心, 龙燕, 付雨婕, 何春玲. 人教A版与IBDP版数学教材比较研究——以概率统计为例[J]. 创新教育研究, 2025, 13(3): 73-81.
1. 引言
概率统计是高中数学课程内容的四大主线之一,贯穿必修和选择性必修课程,也是世界各国数学教学的重点内容。通过对数据进行收集、整理、分析等,可以帮助人们在对未知事件进行决策时提供理论依据,还可以为人们了解客观世界提供解决方法和有利的思维模式。随着大数据时代的到来,学习和掌握这一领域的知识,对于学生的终身发展具有非常重要的意义,这不仅是提升学生的数据分析、数学建模、逻辑推理能力等数学核心素养的重要媒介,同时也是提升其数学综合素质的一个重要途径。
随着全球经济一体化的发展,各国间的合作与交流也日趋密切,开展各国数学教育的对比研究,有助于深入了解各国教育制度的异同,为我国的教育改革与政策制定提供借鉴。
本文选取概率统计作为比较内容,将我国使用最广泛的教材人教A版和国际IBDP版数学教材进行比较,分析两种教材不同的编写特色、课程综合难度等方面的内容,并提出一些建议,使之更好地服务于教育教学。
2. 文献综述
2.1. 国内数学教材比较研究现状
数学课程改革是当前教育改革中的一个热门课题,数学教材比较也成为了教育界研究的对象。通过知网、万方、维普的文献搜索,发现国内新旧版教材的比较和多版本教材的比较居多。黄锦涛(2024)对人教A版和苏教版教材在“集合与常用逻辑用语”部分进行比较,得出不同版本教材里的不同,从而促进教育教学的有效实施。李小双,杨新荣(2024)对人教A版、北师大版、湘教版三版高中新数学教材呈现的统计思维水平和复杂性进行比较研究,总结发现并提出了要充分平衡各个环节的统计思考发展机遇,平衡统计思考的横向分布,合理适度地分配高复杂任务,强化IT融合等建议。张瑞凤、刘蕴煜(2020)从总体结构与具体内容两方面对人教版与人教版“几何”的内容作了对比,研究发现苏教版的教科书提倡以终身发展为目标,人教版强调了对基础知识的培养和对基础技能的培养,并在整体上和习题设置上分别进行了分析。曹一鸣和吴立宝在对比研究了世界上八个国家的小学数学教科书后,从内容的广度、内容深度、例题难度和习题难度四个方面,建立了一个比较的指标。也有作者针对国内外教材进行了比较,薛亚巧从问题提出的视角,对比分析了中美教科书的异同,并对中国的教科书进行了反思。沈爱桐和杨亚平选取中国和加拿大教材中“圆”几何学单元作为研究对象,分别从内容结构、呈现方式、题目设置和信息技术四个维度对其进行比较,并为我国教材建设提供可行性建议。跨文化的教材比较研究在这一方向上还有广阔的探索空间。
2.2. 国际数学教材比价研究现状
国际上的数学教科书的比较,可以分为国外教科书的比较和国内教科书的比较。李孝诚、春霞、王瑞霖(2012)在《美国初中数学教材评估及其启示》中介绍了美国数学教材评估的理念、假设与目标,对我国数学教材评估研究具有很好的借鉴价值。史宁中,孔凡哲、严家丽、崔英梅(2015)利用“教科书难度模型”,本研究选取了中美日俄十种典型中学数学教科书的交叉部分,以知识团为基本单位,从广度、深度、练习的综合难易三个方面对教科书的难易程度进行了量化对比和质的解释。胡典顺、王春静、王静(2020)以概念图法为基础,以英、澳大利亚、美、中为研究对象,对“矩阵”的概念进行了横、纵两个层次的研究。最后对四个国家教科书的深度和广度进行了对比。张萍、曾素樵(2022)以苏教版高中数学新教材和IBDP Mathematics AA HL教材为载体,初步探索了中外高中数学教材在拔尖创新人才培养方面的异同。
3. 研究对象
本文聚焦于比较中国的人教A版教材与国际IBDP课程教材中关于概率统计的内容,所选教材均为具有代表性的教材,见表1。
Table 1.Basic information on different editions of textbooks
表1.不同版本教材的基本信息
教材版本 教材名称 出版社 出版时间
人教A版 必修2;选择性必修3 人民教育出版社 2019年
IBDP版 Mathematics Core topics HL 1; Mathematics Analysis and approaches HL 2 Haese Mathematics 2019年
4. 内容结构比较
4.1. 编排顺序比较
内容的编排顺序体现了知识点之间的联系,它对内容的表现有着直接的影响,同时还能看到编写者对知识的衔接和对学生认识发展规律的衡量。有关两版教材概统统计内容的编排顺序比较,如表2。
从编排顺序上,我国人教A版教材主要采用的是直线式的组织结构进行编排。采用先统计后概率的方法,从随机抽样、样本估计及统计案例等定量的统计方法中自然过渡到对概率的刻画上,再从条件概率、期望等过渡到正态分布,最后以统计相关性、一元线性回归和独立性检验收尾。它基本按照概率统计知识本身的逻辑结构行进,学习内容不重复。IB教材则采用的是先概率后统计的思路,先从实验概率、二维表等到抽样数据、箱线图等内容,再从皮尔逊积矩相关系数、最小二乘回归线到离散概率等内容,章节更多,跨度更广,涉及到部分高等数学的内容,对基本课时和学生精力分配的要求更高。
两版教材从编排结构上来看,都遵循由浅入深顺序,串联知识点之间的联系,符合学生的认知发展规律,有利于提高学生的数学运算、逻辑推理等数学核心素养。
Table 2.Comparison of the content organization of probability and statistics in the Humanities A and IBDP editions of the textbook
表2.人教A版和IBDP版教材概率统计内容编排比较
课程设置 人教A版 IBDP版
必修2/
Mathematics Core
topics HL 1 9.1随机抽样
9.2用样本估计总体
9.3统计案例
10.1随机事件与概率
10.2事件的相互独立性
10.3频率与概率 11.1实验概率
11.2二维表
11.3样本空间和事件
11.4理论概率
11.5使用概率进行预测
11.6概率的加法法则
11.7独立事件
11.8相关事件
11.9条件概率
11.10独立性的正式定义
11.11贝叶斯定理
12.1-7抽样与数据
13.1-10统计
选择性必修3/
Mathematics Analysis and approaches HL 2 6.1分类加法计数原理与分步乘法计数原理
6.2排列与组合
6.3二项式定理
7.1条件概率与全概率公式
7.2离散型随机变量及其分布列
7.3离散型随机变量的数字特征
7.4二项分布与超几何分步
7.5正态分布
8.1成对数据的统计相关性
8.2一元线性回归模型及其应用
8.3列联表与独立性检验 7.1-5计数
26.1-5双变量统计
27.1随机变量
27.2离散概率分布
27.3期望
27.4方差和标准差
27.5 aX+b的性质
27.6二项分布
27.7使用技术查找二项概率
27.8二项分布的均值和标准差
28.1概率密度函数
28.2中心和离散度的度量
28.3正态分布
28.4计算正态概率
28.5标准正态分布
28.6正态分位数
4.2. 呈现方式比较
在引言设置上,人教A版教材,强调数学在生活中的实际运用,通过介绍之前所学习的内容,进而引出这一章节的内容,例如在随机事件与概率这一节中,回顾了初中学习的随机事件的概念,然后引出本节继续进一步研究随机事件及其计算,此外还举了一些生活情境问题的例子,简单直接。在IBDP版教材中则直接展示了一个问题情境,首先以丰富的图片和有趣的问题引入,激发学生的好奇心,然后抛出了思考问题,进而引出了本章的主题。不同的是在人教A版教材中,知识点都位于每一章节内,并在每一章节开始处都有引入设计,通过回顾已在大脑中建立起来的知识体系,并试图运用现有的知识来解决新的问题,产生认知冲突,由此产生新的知识概念,这对培养学生的主动性有很大的帮助。IBDP版教材把每一个知识点作为单独一个小节位于这一章之下,并只在本章开始处设计了问题导入,利用实际问题,从学生已有的知识建构出发,使得学生在解决问题的同时掌握新的知识,并且锻炼学生的动手操作能力,体现了“学生的学”和“以学生为主”的教学理念与学习方式。此外IBDP版教材更注重实践性,练习题的数量是人教A版的两倍多。
在章节内容呈现上,人教A版教材非常注重学生数学核心素养的发展,每节内容基本按照“问题情境或知识回顾——数学抽象——思考探究——知识巩固——练习强化”的编写体例来进行的,在每节内容之后都有相应课后习题,每章内容结束后会有相应的整章复习题,体现了知识的关联性、探究性和整合性,旨在帮助学生掌握知识。IBDP版教材,在每小节基本按照“调查研究——数学理论——例题——讨论——练习”的编写体例来进行的。在每一节内容结束后,会提供大量配套练习题,帮助学生巩固所学知识。每个章节的结尾处设置了一个活动探究问题,并通过有趣的案例激发学生对数学学习的兴趣和主动性。活动探究之后,还安排了几组难度各异的复习题,针对本章知识点进行不同层次的练习,以确保学生能够全面掌握并灵活运用所学内容。这样设计不仅有助于加深学生对各知识点的理解,还能通过多样化的练习形式提升他们的解题技巧和应变能力。同时,趣味性的个案研究也能提高学生的学习动力,激发他们对数学的兴趣,从而提高学生的综合应用能力和创造性思维。
4.3. 版面设计比较
版面设计是评判教科书质量的一个重要方面,丰富的版面设计一方面可以增加学生的阅读兴趣,一方面便于学生对知识的了解。
两版教材都采用彩印,人教A版在章节名、概念名称、题号字体上和栏目底色上使用彩印,其余都以黑白为主。在IBDP版中,并没有对字体的颜色进行改变,只是对不同部分内容的底色进行了改变,如章节名为蓝底、问题探究为绿色底、表格为浅黄色底、例题为浅蓝色底等,其他都是黑白色,对重点部分还有字体加粗。所以IBDP版的版面内容区分得更为明显,色彩面积更大,更能吸引学生的注意力,但主要概念、定理等并没有字体颜色变化,不容易使学生找到重点。从整体上来看,人教A版的文字编辑更加紧凑,页面的留白较多,穿插较少的图形。IBDP版教材页面更丰富多彩,印刷精致,页数也很多,更能引起学生的兴趣,特别说明的是IBDP版教材的提示框使用的是人物图形,从人的角度提出质疑,更能引起学生兴趣。以下是选取两版教材内页图,如图1。
Figure 1.Inset map of the two editions of the textbook
图1. 两版教材内页图
4.4. 例习题数量比较
在人教版教材中的例习题类型有例题、练习题、习题和章节复习题。IBDP版教材中的例习题有例题、练习题和复习题。两版教材的例习题数量整理如表3。
Table 3.Comparison of the number of example exercises in the two editions
表3. 两版教材例习题数量对比
例题 练习 习题 复习题 合计
人教A版 73 131 154 62 420
IBDP版 100 643 224 967
通过上表可以看出人教A版和IBDP版教材在例习题的总体上来看有很大的差异。IBDP版教材的例习题总数比人教A版的两倍多,其中IBDP版教材中练习题部分占比最高,一方面与知识点数量有关,IBDP版教材知识点数量多从而导致的习题数量有很多,另一方面,这与其教育理念有关,人教版教材的编写理念由我国课程标准决定,注重训练学生数学核心素养的发展,强调类比与转化的思想;IBDP版教材教学目标来源于AA课程指南,新版AA数学课程指南从认知维度上表达出希望更多的培养学生在领会、应用维度的能力,非常重视数学的探究学习,强调对问题解决的看法以及数学工具的选择。
5. 课程综合难度比较
课程综合难度是指某课程被学生接受的难易程度。史宁中和孔凡哲教授提出,课程综合难度受三个因素影响:课程时间、课程广度和课程深度。在确保有足够的教学时间的前提下,可以通过“相对深度(S/T)”与“相对广度(G/T)”的线性组合来表征课程的难度。这里,S代表深度,G代表广度,而T则表示总的教学时间。本节采用史宁中教授建立的课程难度模型 N=α S T+(1−α)G T N=α S T+(1−α)G T 对两版教材中概率统计内容的课程难度进行定量研究。
其中,N表示课程难度,T表示课程时间,G表示课程广度,S表示课程深度,G/T为可比深度,α 为加权系数,课程难度与课程深度成正比,与课程难度成反比;课程难度与课程广度成正比,与课程时间成反比。
5.1. 课程时间
课程时间完成教材相关内容所需要的基本课时数。我国《普通高中数学课程标准(2017年版2020年修订)》的课标中明确指出概率统计内容教学在必修课程中需20课时,选择性必修课程中需26课时,总计46课时。根据AA课程指南中指出的HL教材有关概率统计内容的建议课时数为33课时。因此,我们将人教A版课时时间记为T 1 = 46,IBDP版课时时间记为T 2 = 33。
5.2. 课程广度
课程广度指的是课程内容覆盖的范围和领域的宽泛程度,通常通过知识点的数量来衡量。关于如何界定知识点的理解,目前尚无统一标准,一般而言,知识点被认为是构成课程的基本单元,包括概念、定理以及一些小型的、相对独立的知识体系,以下是统计的这两版教材中概率统计的相关知识点(表4)。
5.3. 课程深度
课程深度是对指知识的要求程度,可以采用目标动词赋值的方法进行量化。根据课程标准和教材内容,将每个知识点的深度由低到高分为3个水平:了解、理解、掌握,并分别赋值,由于AA课程指南中并未明确说明具体知识点的水平要求,所以参考我国课程标准要求,具体见表5例如课程标准要求“理解样本点和有限样本空间的含义”,则这个知识点的深度水平为“理解”,并赋值为2。
Table 4.Statistics on the number of knowledge points in the two editions of the textbook
表4. 两版教材知识点数量统计表
版本 知识点
人教A版
G 1 = 38 简单随机抽样,分层随机抽样,均值,众数、平均数、中位数,样本空间,随机事件,基本事件,必然事件,事件的关系和运算,概率的性质,古典概型,独立事件,计数原理,贝尔斯定理,排列数,全排列,阶乘,组合数,二项式定理,条件概率,全概率公式,离散型随机变量,两点分布,二项分布,期望,方差,标准差,伯努利实验,超几何分布,正态分布,标准正态分布,相关关系,一元线性回归模型,最小二乘法,独立性检验,列联表,连续随机变量
IBDP版
G 2 = 45 简单随机抽样,分层随机抽样,均值,众数、平均数、中位数,样本空间,实验概率,理论概率,概率的加法定律,相关事件,系统抽样,方便抽样,分类变量,数值变量,独立事件,计数原理,贝尔斯定理,排列数,数值变量,离散数据,连续数据,使用频率表,阶乘,组合数,分组数据,箱线图,异常值,累积频率图,条件概率,离散型随机变量,二项分布,期望,方差,标准差,皮尔逊积矩相关系数,目测最佳拟合线,x对y的回归线,连续随机变量,离散概率分布,aX + b的性质,概率密度函数,正态分位数,正态分布,标准正态分布,相关关系,最小二乘法,双向表
Table 5.Target verb assignment
表5.目标动词赋值
赋值 水平要求 水平含义 行为动词
1 了解 再认或回忆知识;识别、辨认事实或证据;举出例子;描述对象的基本特征 经历(感受)、说出、知道、认识、 识别等
2 理解 描述对象的特征由来,阐述此对象和相关对象的区别和联系 解释、会、归纳、推断、分析、阐述等
3 掌握 在理解的基础上,把对象用于新情境 探索、能、解决等
在前边章节中已统计出两个版本教材中概率统计内容的知识点数量,再结合课程标准和AA课程指南,以及教材具体实施内容,根据赋值标准由低到高水平统计出相应知识点数量依次为10、8、20,通过计算其课程深度S 1 = 10 × 1 + 8 × 2 + 20 × 3 = 86。IBDP版知识点数量依次为12、11、22,通过计算其课程深度S 2 = 12 × 1 + 11 × 2 + 22 × 3 = 100。
5.4. 课程难度模型
将以上数据整理汇入表6。
Table 6.Comparison of course difficulty data between the two editions of the textbook
表6. 两版教材课程难度数据比较
版本 课程时间 课程广度 课程深度 可比广度 可比深度
人教A版 T 1 = 46 G 1 = 38 S 1 = 86 S 1/T 1 = 1.87 G 1/T 1 = 0.83
IBDP版 T 2 = 33 G 2 = 45 S 2 = 100 S 2/T 2 = 3.03 G 2/T 2 = 1.36
根据公式带入相应的数据,取 α = 0.4,得N 1 = 0.4 × 1.87 + (1 − 0.4) × 0.83 = 1.246,N 2 = 0.4 × 3.03 + (1 − 0.4) × 1.36 = 2.028。见图2。
Figure 2.Course difficulty values for both editions of the textbook
图2. 两版教材课程难度值
从图表中可以观察到,N 1< N 2,这意味着IBDP版教科书的难度要高于人教A版教科书。两版教材在综合难度上存在显著差异。就课程时间而言,IBDP版教材所需的教学时间较之人教A版更短,但知识点数量比人教A版的多,所以需要学生在较短的时间内完成较深的理解,是一项不小的挑战。从课程广度来看,IBDP版教材涉及一些高等数学的内容,所以学习起来可能比较有难度,课程广度就相对偏高一点。
6. 结论与建议
6.1. 结论
通过以上几个维度对人教A版和IBDP版数学教材的比较分析,可以看到两版教材各有所长。在内容编排上,人教A版教科书的概率统计章节在必修科目中没有着重于对资料处理的深度概率分析,而更多地侧重于对学生的随机性和统计概念的培养。对于概率论的深入探讨则被安排在选修课程中,这样更侧重于促进学生数学核心素养的整体发展。IBDP版教材的概率统计内容是按照学生的认知规律来编排内容,内容针对性更强。在呈现方式上,从引言和章节内容两个方面进行比较,人教A版的引言设置更详细,但只是文字语言,没有新颖性,很难引起学生学习的兴趣,在具体章节内容设置上,注重知识之间的关联性和综合性,顺应学生的身心发展规律。IBDP版引言部分大都以现实的实际问题为例,更具创新性,但是只在每一章首有引言,在具体的章节内容中,是以每一个知识点作为一节,每一节之后还有大量的练习题和信息技术的活动探究游戏,注重学生的创新性思维的发展。在版面设计上,IBDP版教材页面设计更加丰富多彩,更能引起学生的学习兴趣,但对重点概念的表示上人教A版的表示更能让学生抓住重点。在课程综合难度上可以发现,IBDP版教材明显比人教A版教材难度高,主要体现在IBDP版教材涉及的知识点更多,更加倾向于大学课程的衔接,更加丰富,所以对学生的学习能力要求更高,也从侧面反映了我国教材的设置更注重全体学生的全面个性发展以及对数学核心素养的发展。
我国教材向来以严谨、规范著称,而西方教材的活泼性、探究性与开放性也颇具特色,如何将二者有机融合,是我国教材编写未来需要重点思考的方向。无论是哪一种高中数学教科书,在编制过程中都必须重视地区差异、民族特点以及人才培养目的等方面的考虑,要多方面考虑而不能固步自封。另外,在教材编制中,可以适当增加一线师资的比重。处于教育第一线的老师,对学校的生活有着敏锐的洞察力。有了他们的参与,可以将一些贴近校园生活的实际问题,带到教学中去。这样,就可以把教科书上对数学概念的阐述,化抽象为具体,让广大读者更容易接受。
6.2. 建议
通过对人教A版和IBDP版的教材比较,从中借鉴IBDP版中的长处,针对我国教学提出如下建议:
1) 改进教学方式,重视核心素养
概率统计与日常生活紧密相关,具有重要的实际应用价值。在应用科学中,统计学强调理解其思想精髓,而非机械记忆定义。它重视数据的深层意义和内在联系,而非简单的数字运算,旨在进行有效的数据分析和解释。在概率统计的教学过程中,应参照 IBDP版的内容设定,大胆地转变自己的思维方式和认知模式,把理论教学的重心放在对结论的利用上,转向启发式的教学,以激发学生的求知欲,重视概率统计的练习与应用,培养学生的数学抽象、数学运算、逻辑推理等数学核心素养的发展。
2) 探究知识点之间关系,增强现实联系
IBDP版教材很重视知识点与现实生活的转化和跨学科知识的结合,很多知识点之间并非完全的独立,也是前后知识之间的传递性。在教学中,教师要多引导学生积极思考,比较两者的关系,使他们能把所学知识运用到生活中,解决现实中的实际问题,还可以涉及社会科学、自然科学等领域的问题,通过分析统计数据和进行概率计算,使学生能够应对跨学科的挑战,把理论联系实际,既可以加深学生对知识的理解,又可以提高学生的学习兴趣。
3) 强化课堂教学与信息技术的整合,提高教学效果
概率统计内容的深入学习总是以大量数据为依托的,在这个过程中就需要现代信息技术为辅助。在教学实践中,应根据自己的实际情况,灵活运用各种信息技术。一方面,就以智能教学系统为例,老师可以对学生进行检查,并对其进行个性化的指导,这样既能提升教学的效率,又能促进学生的全面发展。另一方面可以利用信息技术,实现直观的数据统计结果或者是图形动态效果,可以将抽象的数学知识变得生动、形象,便于学生理解和记忆。
NOTES
通讯作者。
参考文献
张妍. 中美高中数学教材概率与统计部分比较研究[D]: [硕士学位论文]. 武汉: 华中师范大学, 2022.
朱台. 沪教版与IBDP版数学教材的比较研究[D]: [硕士学位论文]. 上海: 上海师范大学, 2023.
谢先成. 基于核心素养的《普通高中数学课程标准(2017年版)》解读——访数学课程标准修订组组长、东北师范大学原校长史宁中教授[J]. 教师教育论坛, 2018, 31(6): 4-7.
徐慧新, 项亚光. IBDP数学课程与普通高中数学课程的比较与启示[J]. 外国中小学教育, 2015(7): 53-59.
鲍建生. 中英两国初中数学期望课程综合难度的比较[J]. 全球教育展望, 2002, 31(9): 48-52.
张翼飞. 澳大利亚IB数学教材与我国高中人教版教材的比较研究——以概率统计为例[J]. 数学教学, 2019(12): 4-8.
张萍, 曾素樵. IBDP与我国高中数学课程比较研究——指向拔尖创新人才培养[J]. 教育研究与评论(中学教育教学), 2022(4): 38-43.
Lu, D. and Yang, Z. (2023) Research on the Influencing Factors of Junior High School Students’ Mathematical Operation Ability in China. Asian Journal of Education and Social Studies, 49, 546-556.
投稿
为你推荐
友情链接
科研出版社
开放图书馆
汉斯出版社
所有期刊
学科分类
书籍出版
联系我们
汉斯期刊
最新文章
同行评议
文章费用
审稿/编委
作者须知
投稿须知
稿件跟踪
常见问题
特别约稿
关于我们
开放获取
出版协议
保存/撤销
隐私保护
版权所有:汉斯出版社 (Hans Publishers)
Copyright © 2025 Hans Publishers Inc. All rights reserved. 鄂ICP备08006613号-1 |
10515 | https://iopscience.iop.org/article/10.1088/1742-6596/568/2/022020 | Broken time-reversal symmetry in a SQUID based on chiral superconducting Sr2RuO4 - IOPscience
We value your privacy
We and our 3 partners use cookies and other tracking technologies to improve your experience on our website. We may store and/or access information on a device and process personal data, such as your IP address and browsing data, for personalised advertising and content, advertising and content measurement, audience research and services development. Additionally, we may utilize precise geolocation data and identification through device scanning.
Please note that your consent will be valid across all our subdomains. Once you give consent, a floating button will appear at the bottom of your screen, allowing you to change or withdraw your consent at any time. We respect your choices and are committed to providing you with a transparent and secure browsing experience.Privacy and Cookies policy
Customize Accept All
Customize Consent Preferences
Customise your consent preferences for Cookie Categories and advertising tracking preferences for Purposes & Features and Vendors below. You can give granular consent for each Third Party Vendor. Most vendors require explicit consent for personal data processing, while some rely on legitimate interest. However, you have the right to object to their use of legitimate interest. Additionally, please note that your preferences regarding purposes and vendors are saved in a cookie named 'euconsent' on your device and may be retained for up to 730 days to remember your choices.
Cookie Categories
Purposes & Features
Vendors
Cookie Categories
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...Show more
Necessary Always Active
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Cookie __uzma
Duration 6 months
Description No description available.
Cookie __uzmb
Duration 6 months
Description No description available.
Cookie __uzme
Duration 6 months
Description No description available.
Cookie IOP_session_live
Duration session
Description No description available.
Cookie __ssds
Duration 6 months
Description No description available.
Cookie __uzmd
Duration 6 months
Description This cookie is set by the provider ShieldSquare. This is a performance and monitoring cookie used for distinguishing bot and scraper traffic.
Cookie AWSALBCORS
Duration 7 days
Description Amazon Web Services set this cookie for load balancing.
Cookie JSESSIONID
Duration session
Description New Relic uses this cookie to store a session identifier so that New Relic can monitor session counts for an application.
Cookie __uzmc
Duration 6 months
Description This cookie is set by the provider ShieldSquare. This is a performance and monitoring cookie used for distinguishing bot and scraper traffic.
Cookie AWSALB
Duration 7 days
Description AWSALB is an application load balancer cookie set by Amazon Web Services to map the session to the target.
Cookie __sstester
Duration 6 months
Description Description is currently not available.
Cookie __cf_bm
Duration 1 hour
Description This cookie, set by Cloudflare, is used to support Cloudflare Bot Management.
Cookie cookieyes-consent
Duration 1 year
Description CookieYes sets this cookie to remember users' consent preferences so that their preferences are respected on subsequent visits to this site. It does not collect or store any personal information about the site visitors.
Cookie __uzmf
Duration 6 months
Description Description is currently not available.
Cookie uzmx
Duration 6 months
Description Description is currently not available.
Cookie IOP_prod_state
Duration 2 minutes
Description Description is currently not available.
Cookie auth0
Duration session
Description No description available.
Cookie did_compat
Duration session
Description No description available.
Cookie auth0_compat
Duration session
Description No description available.
Cookie _csrf
Duration 10 days
Description This cookie is essential for the security of the website and visitor. It ensures visitor browsing security by preventing cross-site request forgery.
Cookie _cfuvid
Duration session
Description Calendly sets this cookie to track users across sessions to optimize user experience by maintaining session consistency and providing personalized services
Cookie TiPMix
Duration 1 hour
Description The TiPMix cookie is set by Azure to determine which web server the users must be directed to.
Cookie x-ms-routing-name
Duration 1 hour
Description Azure sets this cookie for routing production traffic by specifying the production slot.
Cookie euconsent
Duration 1 year
Description CookieYes sets this cookie to store data when IAB TCF is enabled.
Cookie rc::h
Duration Never Expires
Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
Cookie rc::e
Duration session
Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
Cookie uzmxj
Duration 6 months
Description Description is currently not available.
Functional
[x]
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Cookie issuem_lp
Duration 1 month
Description No description available.
Cookie ytidb::LAST_RESULT_ENTRY_KEY
Duration Never Expires
Description The cookie ytidb::LAST_RESULT_ENTRY_KEY is used by YouTube to store the last search result entry that was clicked by the user. This information is used to improve the user experience by providing more relevant search results in the future.
Cookie yt-remote-session-app
Duration session
Description The yt-remote-session-app cookie is used by YouTube to store user preferences and information about the interface of the embedded YouTube video player.
Cookie yt-remote-cast-installed
Duration session
Description The yt-remote-cast-installed cookie is used to store the user's video player preferences using embedded YouTube video.
Cookie yt-remote-session-name
Duration session
Description The yt-remote-session-name cookie is used by YouTube to store the user's video player preferences using embedded YouTube video.
Cookie yt-remote-fast-check-period
Duration session
Description The yt-remote-fast-check-period cookie is used by YouTube to store the user's video player preferences for embedded YouTube videos.
Cookie yt-remote-cast-available
Duration session
Description The yt-remote-cast-available cookie is used to store the user's preferences regarding whether casting is available on their YouTube video player.
Analytics
[x]
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Cookie ga
Duration 1 year 1 month 4 days
Description Google Analytics sets this cookie to store and count page views.
Cookie _ga
Duration 1 year 1 month 4 days
Description Google Analytics sets this cookie to calculate visitor, session and campaign data and track site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognise unique visitors.
Cookie hjSessionUser
Duration 1 year
Description Hotjar sets this cookie to ensure data from subsequent visits to the same site is attributed to the same user ID, which persists in the Hotjar User ID, which is unique to that site.
Cookie hjSession
Duration 1 hour
Description Hotjar sets this cookie to ensure data from subsequent visits to the same site is attributed to the same user ID, which persists in the Hotjar User ID, which is unique to that site.
Cookie pardot
Duration past
Description The pardot cookie is set while the visitor is logged in as a Pardot user. The cookie indicates an active session and is not used for tracking.
Cookie _hjTLDTest
Duration session
Description To determine the most generic cookie path that has to be used instead of the page hostname, Hotjar sets the _hjTLDTest cookie to store different URL substring alternatives until it fails.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
No cookies to display.
Advertisement
[x]
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
Cookie __eoi
Duration 6 months
Description Description is currently not available.
Cookie test_cookie
Duration 15 minutes
Description doubleclick.net sets this cookie to determine if the user's browser supports cookies.
Cookie IDE
Duration 1 year 24 days
Description Google DoubleClick IDE cookies store information about how the user uses the website to present them with relevant ads according to the user profile.
Cookie __gpi
Duration 1 year 24 days
Description Google Ads Service uses this cookie to collect information about from multiple websites for retargeting ads.
Cookie __gads
Duration 1 year 24 days
Description Google sets this cookie under the DoubleClick domain, tracks the number of times users see an advert, measures the campaign's success, and calculates its revenue. This cookie can only be read from the domain they are currently on and will not track any data while they are browsing other sites.
Cookie YSC
Duration session
Description Youtube sets this cookie to track the views of embedded videos on Youtube pages.
Cookie VISITOR_INFO1_LIVE
Duration 6 months
Description YouTube sets this cookie to measure bandwidth, determining whether the user gets the new or old player interface.
Cookie VISITOR_PRIVACY_METADATA
Duration 6 months
Description YouTube sets this cookie to store the user's cookie consent state for the current domain.
Cookie yt-remote-device-id
Duration Never Expires
Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
Cookie yt-remote-connected-devices
Duration Never Expires
Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
Cookie yt.innertube::requests
Duration Never Expires
Description YouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
Cookie yt.innertube::nextId
Duration Never Expires
Description YouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
Cookie did
Duration session
Description Arbor sets this cookie to show targeted ads to site visitors.This cookie expires after 2 months or 1 year.
Cookie __Secure-ROLLOUT_TOKEN
Duration 6 months
Description Registers a unique ID to keep statistics of what videos from YouTube the user has seen.
Purposes & Features
Purposes (11)
[x]
Store and/or access information on a device
Consent
[x]
Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.
Illustrations
Most purposes explained in this notice rely on the storage or accessing of information from your device when you use an app or visit a website. For example, a vendor or publisher might need to store a cookie on your device during your first visit on a website, to be able to recognise your device during your next visits (by accessing this cookie each time).
Number of Vendors seeking consent: 3
Use limited data to select advertising
Legitimate Interest
[x]
Consent
[x]
Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Illustrations
A car manufacturer wants to promote its electric vehicles to environmentally conscious users living in the city after office hours. The advertising is presented on a page with related content (such as an article on climate change actions) after 6:30 p.m. to users whose non-precise location suggests that they are in an urban zone.
A large producer of watercolour paints wants to carry out an online advertising campaign for its latest watercolour range, diversifying its audience to reach as many amateur and professional artists as possible and avoiding showing the ad next to mismatched content (for instance, articles about how to paint your house). The number of times that the ad has been presented to you is detected and limited, to avoid presenting it too often.
Number of Vendors seeking consent or relying on legitimate interest: 3
Create profiles for personalised advertising
Consent
[x]
Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Illustrations
If you read several articles about the best bike accessories to buy, this information could be used to create a profile about your interest in bike accessories. Such a profile may be used or improved later on, on the same or a different website or app to present you with advertising for a particular bike accessory brand. If you also look at a configurator for a vehicle on a luxury car manufacturer website, this information could be combined with your interest in bikes to refine your profile and make an assumption that you are interested in luxury cycling gear.
An apparel company wishes to promote its new line of high-end baby clothes. It gets in touch with an agency that has a network of clients with high income customers (such as high-end supermarkets) and asks the agency to create profiles of young parents or couples who can be assumed to be wealthy and to have a new child, so that these can later be used to present advertising within partner apps based on those profiles.
Number of Vendors seeking consent: 3
Use profiles to select personalised advertising
Consent
[x]
Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Illustrations
An online retailer wants to advertise a limited sale on running shoes. It wants to target advertising to users who previously looked at running shoes on its mobile app. Tracking technologies might be used to recognise that you have previously used the mobile app to consult running shoes, in order to present you with the corresponding advertisement on the app.
A profile created for personalised advertising in relation to a person having searched for bike accessories on a website can be used to present the relevant advertisement for bike accessories on a mobile app of another organisation.
Number of Vendors seeking consent: 3
Create profiles to personalise content
Consent
[x]
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Illustrations
You read several articles on how to build a treehouse on a social media platform. This information might be added to a profile to mark your interest in content related to outdoors as well as do-it-yourself guides (with the objective of allowing the personalisation of content, so that for example you are presented with more blog posts and articles on treehouses and wood cabins in the future).
You have viewed three videos on space exploration across different TV apps. An unrelated news platform with which you have had no contact builds a profile based on that viewing behaviour, marking space exploration as a topic of possible interest for other videos.
Number of Vendors seeking consent: 0
Use profiles to select personalised content
Consent
[x]
Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Illustrations
You read articles on vegetarian food on a social media platform and then use the cooking app of an unrelated company. The profile built about you on the social media platform will be used to present you vegetarian recipes on the welcome screen of the cooking app.
You have viewed three videos about rowing across different websites. An unrelated video sharing platform will recommend five other videos on rowing that may be of interest to you when you use your TV app, based on a profile built about you when you visited those different websites to watch online videos.
Number of Vendors seeking consent: 0
Measure advertising performance
Legitimate Interest
[x]
Consent
[x]
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Illustrations
You have clicked on an advertisement about a “black Friday” discount by an online shop on the website of a publisher and purchased a product. Your click will be linked to this purchase. Your interaction and that of other users will be measured to know how many clicks on the ad led to a purchase.
You are one of very few to have clicked on an advertisement about an “international appreciation day” discount by an online gift shop within the app of a publisher. The publisher wants to have reports to understand how often a specific ad placement within the app, and notably the “international appreciation day” ad, has been viewed or clicked by you and other users, in order to help the publisher and its partners (such as agencies) optimise ad placements.
Number of Vendors seeking consent or relying on legitimate interest: 3
Measure content performance
Legitimate Interest
[x]
Consent
[x]
Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Illustrations
You have read a blog post about hiking on a mobile app of a publisher and followed a link to a recommended and related post. Your interactions will be recorded as showing that the initial hiking post was useful to you and that it was successful in interesting you in the related post. This will be measured to know whether to produce more posts on hiking in the future and where to place them on the home screen of the mobile app.
You were presented a video on fashion trends, but you and several other users stopped watching after 30 seconds. This information is then used to evaluate the right length of future videos on fashion trends.
Number of Vendors seeking consent or relying on legitimate interest: 0
Understand audiences through statistics or combinations of data from different sources
Legitimate Interest
[x]
Consent
[x]
Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Illustrations
The owner of an online bookstore wants commercial reporting showing the proportion of visitors who consulted and left its site without buying, or consulted and bought the last celebrity autobiography of the month, as well as the average age and the male/female distribution of each category. Data relating to your navigation on its site and to your personal characteristics is then used and combined with other such data to produce these statistics.
An advertiser wants to better understand the type of audience interacting with its adverts. It calls upon a research institute to compare the characteristics of users who interacted with the ad with typical attributes of users of similar platforms, across different devices. This comparison reveals to the advertiser that its ad audience is mainly accessing the adverts through mobile devices and is likely in the 45-60 age range.
Number of Vendors seeking consent or relying on legitimate interest: 3
Develop and improve services
Legitimate Interest
[x]
Consent
[x]
Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Illustrations
A technology platform working with a social media provider notices a growth in mobile app users, and sees based on their profiles that many of them are connecting through mobile connections. It uses a new technology to deliver ads that are formatted for mobile devices and that are low-bandwidth, to improve their performance.
An advertiser is looking for a way to display ads on a new type of consumer device. It collects information regarding the way users interact with this new kind of device to determine whether it can build a new mechanism for displaying advertising on this type of device.
Number of Vendors seeking consent or relying on legitimate interest: 3
Use limited data to select content
Legitimate Interest
[x]
Consent
[x]
Content presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Illustrations
A travel magazine has published an article on its website about the new online courses proposed by a language school, to improve travelling experiences abroad. The school’s blog posts are inserted directly at the bottom of the page, and selected on the basis of your non-precise location (for instance, blog posts explaining the course curriculum for different languages than the language of the country you are situated in).
A sports news mobile app has started a new section of articles covering the most recent football games. Each article includes videos hosted by a separate streaming platform showcasing the highlights of each match. If you fast-forward a video, this information may be used to select a shorter video to play next.
Number of Vendors seeking consent or relying on legitimate interest: 0
Special Purposes (3)
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Illustrations
An advertising intermediary delivers ads from various advertisers to its network of partnering websites. It notices a large increase in clicks on ads relating to one advertiser, and uses data regarding the source of the clicks to determine that 80% of the clicks come from bots rather than humans.
Number of Vendors seeking consent: 3
Deliver and present advertising and content
Certain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Illustrations
Clicking on a link in an article might normally send you to another page or part of the article. To achieve this, 1°) your browser sends a request to a server linked to the website, 2°) the server answers back (“here is the article you asked for”), using technical information automatically included in the request sent by your device, to properly display the information / images that are part of the article you asked for. Technically, such exchange of information is necessary to deliver the content that appears on your screen.
Number of Vendors seeking consent: 3
Save and communicate privacy choices
The choices you make regarding the purposes and entities listed in this notice are saved and made available to those entities in the form of digital signals (such as a string of characters). This is necessary in order to enable both this service and those entities to respect such choices.
Illustrations
When you visit a website and are offered a choice between consenting to the use of profiles for personalised advertising or not consenting, the choice you make is saved and made available to advertising providers, so that advertising presented to you respects that choice.
Number of Vendors seeking consent: 1
Features (3)
Match and combine data from other data sources
Information about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
Number of Vendors seeking consent: 3
Link different devices
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Number of Vendors seeking consent: 1
Identify devices based on information transmitted automatically
Your device might be distinguished from other devices based on information it automatically sends when accessing the Internet (for instance, the IP address of your Internet connection or the type of browser you are using) in support of the purposes exposed in this notice.
Number of Vendors seeking consent: 1
Special Features (2)
[x]
Use precise geolocation data
Consent
[x]
With your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Number of Vendors seeking consent: 0
Actively scan device characteristics for identification
Consent
[x]
With your acceptance, certain characteristics specific to your device might be requested and used to distinguish it from other devices (such as the installed fonts or plugins, the resolution of your screen) in support of the purposes explained in this notice.
Number of Vendors seeking consent: 0
Vendors
Third party vendors (3)
[x]
Accept All Save My Preferences
Powered by
Skip to content
IOP Science homeAccessibility Help
Search all IOPscience content Search Article Lookup Select journal (required) Volume number: Issue number (if known): Article or page number: Lookup
JournalsJournals listBrowse more than 100 science journal titles Subject collectionsRead the very best research published in IOP journals Publishing partnersPartner organisations and publications Open accessIOP Publishing open access policy guide IOP Conference SeriesRead open access proceedings from science conferences worldwide
Books
Publishing Support
LoginIOPscience login / Sign Up
Journal of Physics: Conference Series
Purpose-led Publishing is a coalition of three not-for-profit publishers in the field of physical sciences: AIP Publishing, the American Physical Society and IOP Publishing.
Together, as publishers that will always put purpose above profit, we have defined a set of industry standards that underpin high-quality, ethical scholarly communications.
We are proudly declaring that science is our only shareholder.
The following article is Open access
Broken time-reversal symmetry in a SQUID based on chiral superconducting Sr 2 RuO 4
R Ishiguro, T Sakurai, M Yakabe, T Nakamura, S Yonezawa, S Kashiwaya, H Takayanagi and Y Maeno
Published under licence by IOP Publishing Ltd
Journal of Physics: Conference Series, Volume 568, 27th International Conference on Low Temperature Physics (LT27) 6–13 August 2014, Buenos Aires, ArgentinaCitation R Ishiguro et al 2014 J. Phys.: Conf. Ser.568 022020DOI 10.1088/1742-6596/568/2/022020
Download Article PDF
Authors
R Ishiguro
AFFILIATIONS
Center for Emergent Matter Science, RIKEN, Wako, Saitama 351-0198, Japan
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
T Sakurai
AFFILIATIONS
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
M Yakabe
AFFILIATIONS
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
T Nakamura
AFFILIATIONS
Department of Physics, Graduate School of Science, Kyoto University, Kyoto 6068502, Japan
Institute for Solid State Physics, the University of Tokyo, Chiba 277-8581, Japan
S Yonezawa
AFFILIATIONS
Department of Physics, Graduate School of Science, Kyoto University, Kyoto 6068502, Japan
S Kashiwaya
AFFILIATIONS
National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba 305-8568, Japan
H Takayanagi
AFFILIATIONS
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
International Center for Materials Nanoarchitectonics (MANA), National Institute for Materials Science (NIMS), Tsukuba 305-0044, Japan
Y Maeno
AFFILIATIONS
Department of Physics, Graduate School of Science, Kyoto University, Kyoto 6068502, Japan
Figures
Skip to each figure in the article
Tables
Skip to each table in the article
References
Citations
Article data
Skip to each data item in the article
What is article data?
Open science
Download Article PDF
Authors
R Ishiguro
AFFILIATIONS
Center for Emergent Matter Science, RIKEN, Wako, Saitama 351-0198, Japan
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
T Sakurai
AFFILIATIONS
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
M Yakabe
AFFILIATIONS
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
T Nakamura
AFFILIATIONS
Department of Physics, Graduate School of Science, Kyoto University, Kyoto 6068502, Japan
Institute for Solid State Physics, the University of Tokyo, Chiba 277-8581, Japan
S Yonezawa
AFFILIATIONS
Department of Physics, Graduate School of Science, Kyoto University, Kyoto 6068502, Japan
S Kashiwaya
AFFILIATIONS
National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba 305-8568, Japan
H Takayanagi
AFFILIATIONS
Department of Applied Physics, Faculty of Science, Tokyo University of Science, Tokyo 125-8585, Japan
International Center for Materials Nanoarchitectonics (MANA), National Institute for Materials Science (NIMS), Tsukuba 305-0044, Japan
Y Maeno
AFFILIATIONS
Department of Physics, Graduate School of Science, Kyoto University, Kyoto 6068502, Japan
Article metrics
556 Total downloads
0 Video abstract views
2 CITATIONS 2 Total citations 0 Recent citations 0.43 Field Citation Ratio n/a Relative Citation Ratio
Share this article
Article information
Buy this article in print
Journal RSS
Sign up for new issue notifications
1742-6596/568/2/022020
Abstract
Unconventional superconductors involve not only gauge-symmetry breaking but also orbital- and spin-symmetry breaking. Superconducting Sr2RuO4 is known as a spin-triplet chiral p-wave and a topological superconductor with broken time-reversal symmetry (BTRS). Kerr-effect and muon-spin-rotation (pSR) measurements have shown that the bulk superconducting state of Sr2RuO4 features BTRS in the orbital part; hence, it is called the chiral state. BTRS in the response of superconducting junctions or SQUIDs would appear as the shifts of magnetic interference patterns. However, it is problematic to distinguish whether the shift originates in the residual magnetic field (trapped vortex) or the effects of BTRS. Here, we show that the magnetic interference patterns of a SQUID based on Sr2RuO4 are explicitly asymmetric with respect to the direction of both the bias current and the applied magnetic field; namely, there is no inversion symmetry. This indicates that the superconducting state of Sr2RuO4 undoubtedly breaks the time-reversal symmetry of the SQUID.
Export citation and abstractBibTeXRIS
Previous article in issue
Next article in issue
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Show references
Please wait… references are loading.
Abstract
References
Back to top
10.1088/1742-6596/568/2/022020
You may also like
Journal articles
Chiral p-wave order in Sr 2 RuO 4
Anomalies at magic charge densities in under-doped La 2−x Sr x CuO 4 superconductor crystals prepared by floating-zone method
Noise reduction by sparse representation in learned dictionaries for application to blind tip reconstruction problem
Particle swarm optimization-based continuous cellular automaton for the simulation of deep reactive ion etching
Identification of 4876 Bent-tail Radio Galaxies in the FIRST Survey Using Deep Learning Combined with Visual Inspection
Evaluating machine learning algorithms estimating tremor severity ratings on the Bain–Findley scale
Senior research staff member in superconducting qubits with millikelvin feedback Aalto University
Rowland Fellow The Rowland Institute at Harvard
Faculty Positions at Institute of Physics (IOP), Chinese Academy of Sciences Institute of Physics, Chinese Academy of Sciences
More jobsPost a job
IOPscience
Journals
Books
IOP Conference Series
About IOPscience
Contact Us
Developing countries access
IOP Publishing open access policy
Accessibility
IOP Publishing
Copyright 2024 IOP Publishing
Terms and Conditions
Disclaimer
Privacy and Cookie Policy
Text and Data mining policy
Publishing Support
Authors
Reviewers
Conference Organisers
IOP Publishing Facebook pageIOP Publishing LinkedIn pageIOP Publishing Youtube pageIOP Publishing WeChat QR codeIOP Publishing Weibo pageIOP Publishing Bluesky pageIOP Publishing Threads page
Search all IOPscience content Search
JournalsJournals listBrowse more than 100 science journal titles Subject collectionsRead the very best research published in IOP journals Publishing partnersPartner organisations and publications Open accessIOP Publishing open access policy guide IOP Conference SeriesRead open access proceedings from science conferences worldwide
Books
Publishing Support
LoginIOPscience login / Sign Up |
10516 | https://www.jem-journal.com/article/S0736-4679(18)30728-5/pdf | Selected Topics: Psychiatric Emergencies
PSYCHIATRIC EMERGENCIES FOR CLINICIANS: EMERGENCY DEPARTMENT MANAGEMENT OF HYPERCALCEMIA
Dunya N. Alfaraj, MD , Michael P. Wilson, MD , PHD , Yahia Akeely, MD , Gary M. Vilke, MD , and Kimberly Nordstrom, MD , JD
Department of Emergency Medicine, UC San Diego Health System, San Diego, California
Reprint Address: Dunya N. Alfaraj, MD , Department of Emergency Medicine, UC San Diego Health System, 200 West Arbor Drive, San Diego, CA 92103
, Keywords—hypercalcemia; emergency CLINICAL SCENARIO
A 55-year-old male with a medical history notable for diabetes mellitus and lung cancer was brought to the emergency department via emergency medical services for lethargy and confusion that started a few hours earlier. His family reported that his medications included trama-dol 50 mg three times a day as needed for pain and glybur-ide 5 mg twice a day. A review of systems was taken from his family members, which was positive for nausea, abdominal pain, polyuria, polydipsia, and a recent renal stone. The vital signs included temperature of 37.1 C, blood pressure of 110/60 mm Hg, heart rate of 120 beats/min, respiratory rate of 22 breaths/min, and oxygen saturation rate of 97% on room air. A fingerstick glucose level was 185 mg/dL and an electrocardiogram was initially reported as unremarkable, although a short QT interval was noted. On physical examination, the patient was not oriented to person, place, or time, and appeared dehydrated with dry mucous membranes. Pupils were equal, round, and reactive to light. Other physical exam-ination findings were unremarkable. A basic metabolic panel eventually resulted with a calcium level of 15 mg/dL.
What Do You Think Is Going on with This Patient?
The clinical presentation suggests a number of possible etiologies for the patient’s altered mental status, including electrolyte abnormality, drug intoxication, sei-zures, or stroke. Narcan was administered without effect, and computed tomography of the head was normal. A basic metabolic panel eventually confirmed the diagnosis of severe hypercalcemia. The patient’s mental status eventually improved with intravenous fluids.
What Key Findings Led to the Diagnosis?
This patient’s constellation of signs and symptoms, including lethargy, confusion, nausea, abdominal pain, polydipsia, polyuria, tachycardia, and dehydration, could be explained by marked hypercalcemia. A shortened QT interval and a history of renal stones also support the diag-nosis. A history of lung cancer suggests malignancy-induced hypercalcemia.
What Other Diagnoses Should You Consider?
There are many possible causes for an acute confusion (see Table 1), and many disorders present in a similar fashion. Hypoglycemia is an important potential cause in the differ-ential diagnosis, but can be excluded quickly by a fingerstick
R ECEIVED : 28 February 2018; F INAL SUBMISSION RECEIVED : 13 June 2018; ACCEPTED : 11 July 2018
688
The Journal of Emergency Medicine, Vol. 55, No. 5, pp. 688–692, 2018
Ó2018 The Authors. Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http:// creativecommons.org/licenses/by-nc-nd/4.0/). 0736-4679/$ - see front matter
glucose. Central nervous system (CNS) causes, such as stroke or intracranial bleeding, are also important possible causes to consider, but hypercalcemia typically does not pre-sent with focal neurological deficits. Of note, hyper-reflexia and tetany, which can sometimes be confused with a neuro-logical deficit, are typically seen in hypocalcemia instead of hypercalcemia. Opioid overdose should be considered because of the history of depression and tramadol use, but the patient’s clinical presentation, including lack of respira-tory depression and meiosis, is less suggestive of this etiol-ogy. Hepatic and uremic encephalopathy can occasionally present in a similar fashion, but are less likely in this patient with no history or stigmata of liver or kidney disease.
WHAT DO EMERGENCY CLINICIANS NEED TO KNOW ABOUT HYPERCALCEMIA?
Background
The neurocognitive symptoms of hypercalcemia, such as anxiety and mood change, can mimic a psychiatric disor-der presentation at modest levels of hypercalcemia. How-ever, hypercalcemic patients secondary to cancer generally present with much higher values of calcium and thus can develop more severe neurologic distur-bances, such as alterations in mental status, as opposed to mild neurocognitive symptoms. Hypercalcemia of ma-lignancy in many cases represents an oncologic emer-gency that necessitates urgent intervention (1,2).
Diagnosis
Only 2% of total body calcium is circulating in the blood-stream, and the remaining 98% is in the bone. Half of all circulating calcium is free (or ionized), and the remaining half is bound to protein. The total serum calcium concen-tration (free + bound) is typically between 8.5 to 10.5 mg/ d, with hypercalcemia defined as a total serum calcium concentration > 10.5 mg/d. Patients with mild hypercal-cemia (levels between 10.5 and 12.5 mg/d) can often be asymptomatic and might not require immediate therapy. As calcium levels exceed 12.5 mg/d, patients are more likely to be symptomatic. Further elevations, particularly > 14 mg/d, may lead to severe volume depletion, acute kidney injury, hypotension, alterations in mental status, and electrocardiographic abnormalities, such as short-ening of the QT interval, ST segment elevation, heart block, or even cardiac arrest (3–5). Several studies have shown that ionized Ca is more sensitive than total Ca (including corrected total Ca for albumin = serum calcium [mg/dL] + 0.8 {4 g/dL–patient albumin [g/ dL]}). However, because measurement of ionized Ca is more labor-intensive and expensive than total Ca, ionized Ca is not routinely requested. Ionized calcium can be important in critically ill patients, who often have severe hypoalbuminemia. In these situations, ionized calcium should be obtained in order to correctly estimate the severity of hypercalcemia. Acid–base changes influence protein binding. Acidosis increases the level of ionized calcium, while alkalosis conversely decreases the ionized calcium level (5,6).
Pathophysiology
Understanding the pathophysiology of hypercalcemia is important for both correct diagnosis and treatment. Vitamin D stimulates bone resorption and calcium ab-sorption from the small intestine. Parathyroid hormone (PTH) indirectly stimulates calcium absorption through the small intestine through its effect on vitamin D meta-bolism. PTH also enhances bone resorption, stimulates distal tubular reabsorption of calcium, and inhibits prox-imal and distal tubular reabsorption of phosphorus. Calci-tonin inhibits bone resorption, with sodium transport responsible for the majority of calcium reabsorption in the proximal tubule (5). As a result, both PTH and vitamin D increase calcium levels and decrease phos-phate levels. Conversely, calcitonin, which is released from the thyroid gland, decreases both calcium and phos-phate. PTH-related protein (PTHrP) is produced by certain types of cancer cells, such as renal cancer, ovarian cancer, endometrial cancer, human T-cell leukemia/lym-phoma virus type 1–associated lymphoma, breast cancer, and, more commonly, squamous cell cancers of the head and neck, esophagus, cervix, or lung. However, any tumor can cause the condition known as humoral hypercalcemia of malignancy. PTHrP binds to the PTH receptor and mimics the biologic effects of PTH on both bones and kidneys, causing increased bone resorption and enhanced renal retention of calcium (7,8).
Table 1. Differential Diagnosis of Altered Mental Status
Cause Description Psychiatric Severe depression, dementia Electrolytes Hyponatremia, hypercalcemia Endocrine Hypoglycemia, hyperglycemia, hypothyroidism, hyperthyroidism Hepatic and renal Hepatic and uremic encephalopathy Drug-related Serotonin syndrome, malignant neuroleptic syndrome, anticholinergic Withdrawal Alcohol, benzodiazepine, barbiturate Systemic Severe hypoxia, hypotension, bradycardia or tachycardia, hyperthermia or hypothermia CNS Stroke, head trauma or intracranial bleed, vasculitis, meningitis, encephalitis, non-CNS infection, hypertensive encephalopathy, seizure/post ictal state CNS = central nervous system.
ED Management of Hypercalcemia 689
Etiology
Causes of hypercalcemia include multiple pathologic en-tities (Table 2), but there are two diagnoses that account for > 90% of all hypercalcemia cases: primary hyperpara-thyroidism and hypercalcemia of malignancy (1,9). In an ambulatory population, primary hyperparathyroidism accounts for the vast majority of detected hypercalcemia. In primary hyperparathyroidism, excessive secretion of the PTH leads to hypercalcemia. In secondary hyperpara-thyroidism, PTH secretion increases as an adaptive response to hypocalcemia. Primary hyperparathyroidism is due to a benign parathyroid adenoma in 80–90% of cases. While 10–15% are caused by multi-gland disease or diffuse parathyroid hyperplasia, parathyroid carcinomas are responsible for < 1% of cases. Patients with chronic kidney disease develop hypercalcemia as a consequence of secondary hyperparathyroidism or tertiary hyperpara-thyroidism, in which patients develop autonomous para-thyroid function. Malignancy-associated hypercalcemia (MAH) occurs in a quarter of cancer patients and com-prises more than one-third of the cases of hypercalcemia presenting to the emergency department. MAH is also a cause of > 50% of inpatient hypercalcemic crises. Drugs may also be associated with hypercalcemia, such as thia-zide diuretics, lithium, and rarely, calcium supplementa-tion or vitamin D intoxication. Other conditions that may manifest with hypercalcemia include sarcoidosis, thyro-toxicosis, Addison’s, pheochromocytomas, or vasoactive intestinal peptide–secreting tumor (5,10,11). In patients with hyperparathyroidism, the serum phosphorus level can be either low or normal. However, in a patient with both hypercalcemia and hyperphosphatemia, the etiology is unlikely due to hyperparathyroidism. Instead, hypercalcemic disorders in which PTH secretion is suppressed should be considered (12).
Clinical Features
The classic description of ‘‘stones, bones, abdominal moans, and psychic groans’’ is often used to recall the wide variety of signs and symptoms of hypercalcemia. The most important renal effects (‘‘stones’’) are poly-dipsia and polyuria resulting from a nephrogenic diabetes insipidus (vasopressin-induced water reabsorption), and nephrolithiasis resulting from the hypercalciuria. Other renal effects include dehydration and nephrocalcinosis. Nephrocalcinosis, the deposition of calcium phosphate crystals within renal tubules, may occur with hypercalce-mia, hypercalciuria, hyperphosphatemia, or hyperphos-phaturia (13). Bone pain (‘‘bones’’) can occur when there is excess PTH, which results in subperiosteal resorption, leading to osteitis fibrosa cystica, or so-called ‘‘brown tumor.’’ Brown tumor is so-named because it has a reddish/brown color secondary to the accumula-tion of red blood cells. Histologically, osteoclasts present in combination with irregular areas of bone resorption, which are replaced by both fibrous and giant cells (14). Nausea, abdominal pain, anorexia, constipation, and rarely, peptic ulcer disease or pancreatitis reflect gastroin-testinal manifestations (‘‘abdominal moans’’). Neuropsy-chiatric effects (so-called ‘‘psychic groans’’) include impaired concentration, confusion, fatigue, and muscle weakness. Cardiovascular effects, not included in the classic mnemonic, may involve hypertension and vascular calcifications (3,15).
Management
Continuous cardiac monitoring in the ED is necessary, and central venous or pulmonary artery pressure moni-toring may be required (16). Half of hypercalcemic can-cer patients develop hypokalemia as well. Serum potassium levels should be monitored every 4 h, with administration of potassium chloride (20–40 mEq intra-venously or orally) as necessary to prevent hypokalemia (16). Most patients with severe hypercalcemia, particularly >14 mg/dL, exhibit clinical evidence of intravascular vol-ume depletion. These patients should be aggressively re-hydrated with normal saline at an initial rate of 200– 300 mL/h, then adjusted to maintain the urine output at 100–150 mL/h (17). Excessive hydration can result in congestive heart failure, especially in malignancy-associated hypercalcemia, where critically ill patients often have hypoalbuminemia. Some authors have recom-mended intravenous fluid administration with no more than 75–150 mL/h of 0.9% sodium chloride in patients with concomitant hypoalbuminemia (5). Osteoclast-inhibiting therapies for severe hypercalce-mia are generally considered in consultation with the
Table 2. Hypercalcemia Differential Diagnosis
Cause Description Parathyroid hormone–related Primary and tertiary hyperparathyroidism, familial hypocalciuric hypercalcemia Cancer Multiple myeloma, bone metastasis, PTHrP-mediated breast, lung, and renal cancers Calcitriol-mediated Granulomatous diseases (sarcoidosis and TB), lymphoma, vitamin D intoxication Miscellaneous Vitamin A toxicity, thyrotoxicosis, theophylline toxicity, adrenal crisis, and Paget’s disease, lithium, thiazide, immobilization PTHrP = parathyroid hormone–related protein; TB = tuberculosis.
690 D. N. Alfaraj et al.
patient’s primary physician, oncologist, or endocrinolo-gist. Drugs that inhibit osteoclast-mediated bone resorp-tion include bisphosphonates, mithramycin, calcitonin, or corticosteroids. Bisphosphonates are the treatment of choice for man-agement of cancer-induced hypercalcemia. The use of intravenous bisphosphonate is restricted to the treatment of serum calcium concentrations >15 mg/dL or in patients with rapid deterioration of CNS, cardiac, gastrointestinal, or renal function (16). Because the effect of bisphospho-nates appears after 2–4 days, it should be combined with faster-acting therapeutic modalities, such as intravenous fluid and calcitonin. Calcitonin may be effective in doses of 4–8 IU/kg intramuscularly or subcutaneously. Nasal calcitonin is well tolerated but, because of insufficient ef-ficacy, is not recommended as a form of therapy for cancer-related hypercalcemia. Prednisone (60–80 mg) or other corticosteroids may be effective within a few days to a week. They are more useful for long-term treat-ment rather than for acute control. Corticosteroids are particularly valuable in hypercalcemia related to breast carcinoma, myeloma, lymphoma, granulomatous dis-ease, or vitamin D toxicity (7,16,18–23). The prevalence of hypercalcemia increases among pa-tients with chronic renal impairment, given the frequent use of calcium-containing phosphate binders and vitamin D therapy. Patients on hemodialysis who present with hy-percalcemia require urgent dialysis. After initial stabilization, most if not all patients should be admitted for further management. One of the common underlying causes for hypercalcemia is parathy-roid adenoma. For that, curative therapy requires surgical parathyroidectomy (24).
How Should You Stabilize This Patient?
Airway management and circulatory support for ob-tunded or comatose patients. Patients should be aggressively hydrated with normal saline. Intensive care unit hospitalization for severe hypercal-cemia cases. Hemodialysis may be useful in severe cases.
Controversies in Treatment: What Are the Most Important Steps in the Management of This Patient?
Although often mentioned, there is limited evidence-based recommendation for using furosemide to treat hy-percalcemia. Furosemide should not be a recommended intervention unless given to reverse aggressive fluid resuscitation (5,25–27). In hyperparathyroidism, the exact timing of parathy-roidectomy to ensure optimal outcome is not definitively established. A single-center retrospective series that included 35 years of data reported no significant differ-ences in long-term survival in patients who underwent surgery within 72 h, compared with those treated medi-cally for > 72 h before surgery (20).
Clinical Bottom Lines
Primary hyperparathyroidism and hypercalcemia of ma-lignancy account for > 90% of all hypercalcemia cases. In an ambulatory population, primary hyperparathy-roidism accounts for the vast majority of detected cases of hypercalcemia. Hypercalcemia of malignancy usually presents with markedly elevated calcium levels and such patients are commonly severely symptomatic. These patients comprise more than one-third of all cases of hypercalcemia present-ing to the emergency department and more than half of inpatient hypercalcemic crises. In critically ill patients, who often have severe hypoal-buminemia in addition to hypercalcemia, ionized calcium levels should be obtained so as not to underestimate the severity of hypercalcemia. Neurocognitive symptoms of hypercalcemia may mimic psychiatric presentations, but often have associ-ated physical complaints that are not typical of a purely psychiatric illness. Aggressive hydration, calcitonin, and bisphospho-nates form the basis of evidence-based management. Bi-sphosphonate should be combined with faster-acting treatment, like intravenous fluid and calcitonin. Furosemide may be of limited utility unless needed to reverse overly aggressive fluid replacement. Hemodialysis should be considered in patients with end-stage renal disease or for refractory hypercalcemia.
REFERENCES
Mirrakhimov AE. Hypercalcemia of malignancy: an update on pathogenesis and management. N Am J Med Sci 2015;7:483–93. 2. LeGrand SB. Modern management of malignant hypercalcemia. Am J Hosp Palliat Care 2011;28:515–7. 3. Carroll MF, Schade DS. A practical approach to hypercalcemia. Am Fam Physician 2003;67:1959–66. 4. Chang WT, Radin B, McCurdy MT. Calcium, magnesium, and phosphate abnormalities in the emergency department. Emerg Med Clin North Am 2014;32:349–66. 5. Maier JD, Levine SN. Hypercalcemia in the intensive care unit: a review of pathophysiology, diagnosis, and modern therapy. J inten-sive Care Med 2015;30:235–52. 6. Ong GS, Walsh JP, Stuckey BG, et al. The importance of measuring ionized calcium in characterizing calcium status and diagnosing pri-mary hyperparathyroidism. J Clin Endocrinol Metab 2012;97:3138–45. 7. Stewart AF. Clinical practice. Hypercalcemia associated with can-cer. N Engl J Med 2005;352:373–9. 8. Kacprowicz RF, Lloyd JD. Electrolyte complications of malig-nancy. Emerg Med Clin North Am 2009;27:257–69. 9. Lafferty FW. Differential diagnosis of hypercalcemia. J Bone Miner Res 1991;6:S51–9.
ED Management of Hypercalcemia 691 10. McCurdy MT, Shanholtz CB. Oncologic emergencies. Crit Care Med 2012;40:2212–22. 11. Carroll R, Matfin G. Endocrine and metabolic emergencies: hyper-calcaemia. Ther Adv Endocrinol Metab 2010;1:225–34. 12. Shapiro HI, Davis KA. Hypercalcemia and "primary" hyperparathy-roidism during lithium therapy. Am J Psychiatry 2015;172:12–5. 13. Fogo AB, Lusco MA, Najafian B, Alpers CE. AJKD atlas of renal pathology: nephrocalcinosis and acute phosphate nephropathy. Am J Kidney Dis 2017;69:e17–8. 14. Nunes TB, Bologna SB, Witzel AL, Nico MM, Lourenc ¸o SV. A rare case of concomitant maxilla and mandible brown tumours, papillary thyroid carcinoma, parathyroid adenoma, and osteitis fibrosa cyst-ica. Case Rep Dent 2016;2016:5320298. 15. Wald DA. ECG manifestations of selected metabolic and endocrine disorders. Emerg Med Clin North Am 2006;24:145–57. 16. Marx JA, Rosen P. Rosen’s Emergency Medicine: Concepts and Clinical Practice. 8th ed. Philadelphia, PA: Elsevier/Saunders; 2014. 17. Hosking DJ, Cowley A, Bucknall CA. Rehydration in the treatment of severe hypercalcaemia. Q J Med 1981;50:473–81. 18. Fatemi S, Singer FR, Rude RK. Effect of salmon calcitonin and et-idronate on hypercalcemia of malignancy. Calcif Tissue Int 1992; 50:107–9. 19. Major P, Lortholary A, Hon J, et al. Zoledronic acid is superior to pamidronate in the treatment of hypercalcemia of malignancy: a pooled analysis of two randomized, controlled clinical trials. J Clin Oncol 2001;19:558–67. 20. Trimarchi H, Lombi F, Forrester M, et al. Disodium pamidronate for treating severe hypercalcemia in a hemodialysis patient. Nat Clin Pract Nephrol 2006;2:459–63. 21. Vaughn CB, Vaitkevicius VK. The effects of calcitonin in hypercal-cemia in patients with malignancy. Cancer 1974;34:1268–71. 22. Wisneski LA, Croom WP, Silva OL, Becker KL. Salmon calcitonin in hypercalcemia. Clin Pharmacol Ther 1978;24:219–22. 23. Dumon JC, Magritte A, Body JJ. Nasal human calcitonin for tumor-induced hypercalcemia. Calcif Tissue Int 1992;51:18–9. 24. Ahmad S, Kuraganti G, Steenkamp D. Hypercalcemic crisis: a clin-ical review. Am J Med 2015;128:239–45. 25. LeGrand SB, Leskuski D, Zama I. Narrative review: furosemide for hypercalcemia: an unproven yet common practice. Ann Intern Med 2008;149:259–63. 26. Suki WN, Yium JJ, Von Minden M, Saller-Hebert C, Eknoyan G, Martinez-Maldonado M. Acute treatment of hypercalcemia with furosemide. N Engl J Med 1970;283:836–40. 27. Robey RB, Lash JP, Arruda JA. Does furosemide have a role in the management of hypercalcemia? Ann Intern Med 2009;150:146–7.
692 D. N. Alfaraj et al. |
10517 | https://aviation.stackexchange.com/questions/49946/how-and-why-does-engine-thrust-change-with-airspeed | aircraft performance - How (and why) does engine thrust change with airspeed? - Aviation Stack Exchange
Join Aviation
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Aviation helpchat
Aviation Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
How (and why) does engine thrust change with airspeed?
Ask Question
Asked 7 years, 6 months ago
Modified5 years, 6 months ago
Viewed 12k times
This question shows research effort; it is useful and clear
13
Save this question.
Show activity on this post.
I'm interested in how the thrust of a turbofan engine is affected at higher airspeeds (TAS). I know (I believed) that engine thrust(at constant N1) was relatively constant like in the following graph (only slight deviations):
This graph is usually in the books/manuals describing engine performance with reference to speed.
Then I came across the data from CFM56-5C turbofan engine which states that max engine thrust at cruise is approximately 29,360 Newtons while it's max thrust when stationary is 140,000 N. That's almost 5 times more power on the ground than in cruise. Here is the link: How much air, by mass, enters an average CFM56 turbofan engine cruising per minute?
These are apparently contradictory statements or I am missing something. Which one is corrrect and why? Why is engine thrust being changed with speed? Also, on the graph above what are those two curves that when added form a net engine thrust?
After I did a few calculations using the thrust equation (F= mass flow difference in exhaust and inlet velocities denoted as delta V -> we will disregard the fuel mass flow and assume exit pressure is equal to the free stream pressure thanks to a nozzle) and following data mentioned above in the link, I found out that delta V term in cruise and on takeoff is constant (at full power) and its value is 295 m/s, which states that exhaust velocity of the engine will always be 295 m/s faster from the inlet velocity(for a maximum power setting at any speed). I think that's logical because work done by the engine is used to increase kinetic energy (delta Ek) of the airflow which increases speed always by a constant amount at specific power/N1 setting (of course less power equals less delta V).
jet-engine
aircraft-performance
airspeed
thrust
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Improve this question
Follow
Follow this question to receive notifications
edited Mar 4, 2020 at 2:05
Vikki
28.7k 17 17 gold badges 135 135 silver badges 307 307 bronze badges
asked Mar 29, 2018 at 18:29
DarjanDarjan
1,167 1 1 gold badge 13 13 silver badges 27 27 bronze badges
2
3 Please note the following: you state that max engine thrust at cruise is approximately 29,360 Newtons while it's max thrust when stationary is 140,000 N. That's almost 5 times more power on the ground than in cruise... That's wrong, because thrust is not power. There exist a relation between thrust, speed, and power, but the stationary case is an special one...xxavier –xxavier 2018-03-29 20:49:54 +00:00 Commented Mar 29, 2018 at 20:49
In terms of useful work, e n e r g y=f o r c e⋅d i s t a n c e e n e r g y=f o r c e⋅d i s t a n c e, p o w e r=f o r c e⋅v e l o c i t y p o w e r=f o r c e⋅v e l o c i t y (vector dot products). At zero speed, using power to blow all that air behind you costs a lot of fuel energy but isn't doing anything useful. Even when you release the brakes and start to roll, it's not much power. (Jet engines are very inefficient at low speed.)Peter Cordes –Peter Cordes 2021-09-14 07:45:06 +00:00 Commented Sep 14, 2021 at 7:45
Add a comment|
2 Answers 2
Sorted by: Reset to default
This answer is useful
14
Save this answer.
Show activity on this post.
The first diagram you link to shows three lines but does not indicate what they represent. I guess the bold line is thrust over speed. Then this diagram is correct for a turbojet.
Thrust T T is the difference between the engine's exit impulse minus the entry impulse:
T=(m˙a i r+m˙f u e l)⋅v e x i t−m˙a i r⋅v e n t r y T=(m˙a i r+m˙f u e l)⋅v e x i t−m˙a i r⋅v e n t r y
The exit speed v e x i t v e x i t of a turbojet engine is almost constant over flight speed (relative to the engine of course), so as the engine accelerates, a larger entry impulse must be subtracted from a nearly constant exit impulse. Thrust drops slightly over speed.
At higher Mach numbers, precompression from the ram effect at the intake raises the pressure level (and hence the mass flow m˙a i r m˙a i r) inside the engine, so it will develop more thrust than in static conditions. This effect causes the thrust line to bend upwards at higher speed, and since the precompression grows nonlinearly with speed, the initial drop in thrust is soon reversed. Of course, now the fuel mass flow m˙f u e l m˙f u e l will grow in the same way, so the fuel efficiency (thrust per fuel used) will continue to drop as speed increases.
Only when flight speed approaches the exit speed of the jet will thrust go down again. The typical exit speed of a turbojet is easily supersonic, therefore this type of engine is well suited for supersonic flight.
max engine thrust at cruise is approximately 29,360 Newtons while it's max thrust when stationary is 140,000 N
Here you have two effects combining to lower thrust. One is the reduction in the difference between entry and exit speed. This is more pronounced in a turbofan engine because the bypass flow will be accelerated much less than the core flow, and a higher flight speed will cause a proportionally bigger drop in thrust.
The second effect comes from the difference in air density between ground and cruise: Air density at a typical cruise altitude of 35,000 ft is only 0.38 kg/m³ or 31% of the air density at sea level. The original source for the cruise thrust number does not say for which altitude the figure is valid, but you can be sure that it is for about one third of ground density. Mass flow m˙a i r m˙a i r is directly proportional with ambient density, and both effects combine. However, most sources give only a drop to a quarter of static thrust - the last table in the linked answer looks like someone mixed the values for the CFM56-5A and the CFM56-5C.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Improve this answer
Follow
Follow this answer to receive notifications
edited Mar 27, 2019 at 22:01
answered Mar 29, 2018 at 21:19
Peter KämpfPeter Kämpf
241k 19 19 gold badges 607 607 silver badges 955 955 bronze badges
6
Just to clarify, by a turbojet's exit speed being "supersonic" is that meaning within the exhaust (with a higher speed of sound because it's hot) the actual flow is supersonic, or is it subsonic but faster than the speed of sound in the surrounding air?Talisker –Talisker 2019-02-24 22:04:42 +00:00 Commented Feb 24, 2019 at 22:04
1 @Talisker: Yes, supersonic means more than the speed of sound of this hot air. There are supersonic aircraft with subsonic engine exit speed, and that only works because of the higher speed of sound in hot air, but those are the exception.Peter Kämpf –Peter Kämpf 2019-02-25 06:18:26 +00:00 Commented Feb 25, 2019 at 6:18
2 @AbanobEbrahim: Yes, very good question! The exit speed is approx. constant relative to the aircraft, so this puts an upper limit on the maximum speed which can be achieved.Peter Kämpf –Peter Kämpf 2019-03-27 22:00:33 +00:00 Commented Mar 27, 2019 at 22:00
1 @PeterKämpf: Thank you. I'm new here on Aviation and I already admire your awesome answers. But just to make sure I understand you correctly, let's assume the exhaust velocity when the engine is stationary is 500 m/s m/s. Now by approx. constant you mean that when the aircraft is moving at 200 m/s m/s, the exhaust speed relative to the aircraft is still 500 m/s m/s but to someone standing on the ground the exhaust speed is just 300 m/s m/s in the opposite direction of the aircraft. So is that correct?Abanob Ebrahim –Abanob Ebrahim 2019-03-27 23:24:50 +00:00 Commented Mar 27, 2019 at 23:24
1 @AbanobEbrahim: Yes, that is correct. For the nitpickers: The actual numbers might vary a bit between the different scenarios.Peter Kämpf –Peter Kämpf 2019-03-28 06:17:38 +00:00 Commented Mar 28, 2019 at 6:17
|Show 1 more comment
This answer is useful
-1
Save this answer.
Show activity on this post.
Air density or pressure altitude must be factored in when comparing engine thrust figures. At cruise, FL400, air density will be about one fifth. Max thrust (or max HP for piston engines) will also be one fifth, as will air resistance/parasite drag. Air mass flow will be one fifth, so will fuel flow/burn. Even lift will be one fifth for a given air speed (TAS).
I assume you meant TAS in your question, however, if we consider IAS/CAS, that is a different story. At FL400, you would have numbers like Mach 0.82, 470kts TAS and 250kts IAS. Airliners rarely do level flight except at cruise altitude, however it would be possible to maintain 250kts IAS/CAS with 20% of static thrust (give or take) at altitudes lower than cruise, such as in a hold.
Playing with these might be helpful:
IAS/TAS vs Altitude:
Engine power vs Altitude:
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Improve this answer
Follow
Follow this answer to receive notifications
edited Mar 4, 2020 at 21:42
answered Mar 3, 2020 at 19:19
Chuck MacLeanChuck MacLean
71 3 3 bronze badges
2
3 I'm not sure that this answers the question that was asked. It's not bad information, but it's about how thrust varies with altitude, rather than what the question asks, which is why thrust varies with airspeed, per se. Also, I'd question your assertion that an airliner could ever maintain speed with only 20% of available power. Maybe on an incredibly light 747 or A-380, but on the 737's that I'm familiar with, that statement seems unsupportable.Ralph J –Ralph J♦ 2020-03-03 20:44:33 +00:00 Commented Mar 3, 2020 at 20:44
Ralph J, you are misunderstanding me if you say "20% of available power". I am addressing the question which references one fifth of static thrust or 29,360N. By definition of what IAS is and what it implies, how can anyone take issue with my statement? If thrust is 29,360N in cruise at a particular indicated airspeed, both will be approximately the same for any other altitude (except of course for speeds and altitudes out of limits).Chuck MacLean –Chuck MacLean 2020-03-04 23:57:12 +00:00 Commented Mar 4, 2020 at 23:57
Add a comment|
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
jet-engine
aircraft-performance
airspeed
thrust
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Linked
15Why aren't takeoff flaps used all the way up to cruise altitude?
17Why is thrust inverse to speed in piston engines?
12Can a convergent nozzle be used for a supersonic jet engine?
12What is a ramjet?
9Why is thrust available constant with speed for turbojet engines, when it varies with speed for turboprop engines?
9How does a supersonic jet engine differ from a subsonic jet engine?
9How much air, by mass, enters an average CFM56 turbofan engine cruising per minute?
6Why is thrust said to be constant over speed for a jet engine?
2Why isn't horsepower used as a measure of power output for jet engines?
4What is maximum acceleration that can be achieved by afterburner in level flight?
See more linked questions
Related
13What is the relationship between thrust and engine RPM in a turbojet?
3How to realistically model propeller static thrust?
4Does the P&W F100 turbofan engine of the F-16 really produce this much power?
3How does the power distribution change for a turbofan engine from being stationary to going at full speed?
2Is it true that high-bypass engines are inherently inefficient at higher speeds?
6Why is thrust said to be constant over speed for a jet engine?
2How do power and thrust curves compare?
3Why does Engine Pressure Ratio (EPR) rise as thrust levers are pushed forward?
Hot Network Questions
Program that allocates time to tasks based on priority
On being a Maître de conférence (France): Importance of Postdoc
What is a "non-reversible filter"?
How to locate a leak in an irrigation system?
Why do universities push for high impact journal publications?
Does the mind blank spell prevent someone from creating a simulacrum of a creature using wish?
Why include unadjusted estimates in a study when reporting adjusted estimates?
How to rsync a large file by comparing earlier versions on the sending end?
Implications of using a stream cipher as KDF
Why multiply energies when calculating the formation energy of butadiene's π-electron system?
Exchange a file in a zip file quickly
Gluteus medius inactivity while riding
Do we need the author's permission for reference
Languages in the former Yugoslavia
Cannot build the font table of Miama via nfssfont.tex
How do you emphasize the verb "to be" with do/does?
Calculating the node voltage
"Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf
If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church?
Do sum of natural numbers and sum of their squares represent uniquely the summands?
How to home-make rubber feet stoppers for table legs?
Does the Mishna or Gemara ever explicitly mention the second day of Shavuot?
Is it possible that heinous sins result in a hellish life as a person, NOT always animal birth?
Childhood book with a girl obsessed with homonyms who adopts a stray dog but gives it back to its owners
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Aviation
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 |
10518 | https://www.reddit.com/r/AdvancedRunning/comments/1i391tx/how_much_does_weight_affect_times_really/ | How much does weight affect times really? : r/AdvancedRunning
Skip to main contentHow much does weight affect times really? : r/AdvancedRunning
Open menu Open navigationGo to Reddit Home
r/AdvancedRunning A chip A close button
Log InLog in to Reddit
Expand user menu Open settings menu
Go to AdvancedRunning
r/AdvancedRunning
r/AdvancedRunning
Discussion about advanced training, racing, tactics, elite running, support, advice, and more. "Advanced" Running is NOT based on your level or race times. It's for individuals with the mindset of improving their running performance, whether they are competitive athletes, experienced runners, or enthusiasts looking to take their running to the next level. This is an actively moderated community, please review the rules/FAQ/wiki, and use the stickied Q&As for short questions/requests.
459K Members Online
•8 mo. ago
assholesplinters
How much does weight affect times really?
Health/Nutrition
So, I've seen wildly varying answers on this, from 1 seconds per mile per pound to Runners world claiming .064% per pound. Now, I realize all of their methodologies, and studies are done differently and on different people but Im curious if there's a semi reliable formula out there or if ultimately weight loss and speed are just side affects of consistent effort? For example. At the moment, I'm an out of shape former college swimmer running ~44 for a 10k. So if I were to drop 50 pounds and get to my competition weight of 180 at 1 seconds per mile per per pound that'd mean I'd be running a 39:10 or at the other end of the spectrum at .064% per pound I'd be running a 30min 10k which doesn't quite seem in the cards 😆
Read more
Archived post. New comments cannot be posted and votes cannot be cast.
Share
Related Answers Section
Related Answers
Impact of weight on running times
Running tips for weight loss
Racing weight calculator recommendations
Strategies for improving marathon performance
How to effectively taper before a big race
New to Reddit?
Create your account and connect with a world of communities.
Continue with Email
Continue With Phone Number
By continuing, you agree to ourUser Agreementand acknowledge that you understand thePrivacy Policy.
Public
Anyone can view, post, and comment to this community
0 0
Top Posts
Reddit reReddit: Top posts of January 17, 2025
Reddit reReddit: Top posts of January 2025
Reddit reReddit: Top posts of 2025
Reddit RulesPrivacy PolicyUser AgreementAccessibilityReddit, Inc. © 2025. All rights reserved.
Expand Navigation Collapse Navigation |
10519 | https://archive.csac.history.wisc.edu/The-Plans-at-the-Convention.htm | Skip to main navigation
Department of History
UW Search
My UW
Map
Calendar
Home
About Us
Contacts
Documentary Resources
The Confederation Period
The Philadelphia Convention
The States and the Ratification Process
Themes of the Ratification Period
Foundational Documents of American Constitutionalism
Multimedia
The University of the Air Interviews
Videos
Maps
The Founders
Founders on the Founders
An Assembly of Demigods
University of the Air Interviews
America's Founders Chapbook Series
Outreach
Document of the Month
Founder of the Month
Sources of the Month
Seminars
Lesson Plans
New Page
Links
CSAC Fellows Program
Publications
Books
America's Founders Chapbook Series
You are here:
Home
Documentary Resources
The Philadelphia Convention
Plans of Government Proposed at the Convention
Plans of Government Proposed at the Convention
At the very outset the Convention faced the issue of whether or not to work within the existing constitutional framework of the United States. If the Convention decided to do so, any amendments to the Articles would have to be approved by Congress and ratified unanimously by the legislatures of the thirteen states.
The Convention decided instead to work outside the constitutional framework. Governor Edmund Randolph proposed this constitutional revolution on 29 May in his speech presenting the Virginia Resolutions.
For the next two weeks, delegates debated the merits of the Virginia Plan. Eventually, the Convention adopted a resolution that agreed to abandon the existing federal government and create a national government. This fundamental decision was not challenged directly until 13 June. At that point, William Paterson of New Jersey asked that consideration of the plan be delayed and that time be given “to digest one purely federal. . . .”
Through these early stages of the convention, opposition to the Virginia Resolutions had been mounting steadily. Delegates from the small states united with other delegates who were opposed to an all-powerful central government and who wanted to retain the federal structure of the Articles of Confederation.
The Convention debated the Patterson’s New Jersey Amendments on the 15th, 16th, and 18th of June. On the 19th the Convention rejected the Amendments and voted to accept the revised Virginia Resolutions by a vote of seven states to three, with one state divided. However, the next day the Convention made a concession to the opponents of a national government.
Two additional proposals offered for consideration at the convention. On 29 May the Journals of the Convention record that Charles Pinckney “laid before the House . . . the draft of a federal government to be agreed upon between the free and independent states of America.” The plan was not discussed by the Convention but was turned over to the Committee of Detail on 24 July. The document written by Pinckney has never been found, but a document in James Wilson’s handwriting has been identified as a synopsis.
On 18 June, Alexander Hamilton offered his proposal. Hamilton essentially believed that both the Virginia Resolutions and the New Jersey Amendments were inadequate. He instead proposed a system that featured life terms for the executive and the members in the upper house of the legislature. Hamilton’s plan would have essentially subsumed the states into administrative units of the national government.
For a full analysis of the proposed plans at the Constitutional Convention, an essay from our CDR, Vol. 1 will provide information on the various plans debated in Philadelphia.
The Virginia Resolutions, 29 May 1787 (pdf)
The Virginia delegates arrived in Philadelphia early, talked with other delegates as they arrived, met regularly with one another, and drafted resolutions setting forth the broad principles upon which a new constitution should be based. Not all of the Virginia delegates agreed with the principles, as the later debates in the Convention were to reveal. But, the fifteen resolutions were presented to the Convention on 29 May by the Governor of Virginia, Edmund Randolph. No evidence exists as to who wrote the resolutions. Randolph’s original manuscript has never been located.
The Pinckney Plan, 29 May 1787 (pdf)
On 29 May the Journals of the Convention record that Charles Pinckney “laid before the House … the draft of a federal government to be agreed upon between the free and independent states of America.” The plan was not discussed by the Convention but was turned over to the Committee of Detail on 24 July. The document written by Pinckney has never been found, but a document in James Wilson’s handwriting has been identified as a synopsis.
The New Jersey Amendments, 15 June 1787 (pdf)
The amendments proposed by William Paterson of New Jersey were far more than “New Jersey amendments.” They represented the views of the delegates from the small states and of those delegates who were opposed to a national government or who at least insisted that the central government must retain some of the federal character of the Articles of Confederation. Nevertheless, they agreed that the central government needed more power and the proposed amendments provided for such power. On 19 June the Convention voted to reject the New Jersey Amendments and accept the amended Virginia Resolutions.
The Hamilton Plan, 18 June 1787 (pdf)
On 18 June, Alexander Hamilton in a speech proposed a very powerful national government. Hamilton essentially believed that both the amended Virginia Resolutions and the New Jersey Amendments were inadequate, particularly the latter.
Center for the Study of the American Constitution, UW-Madison,University Club Building 3rd Floor, 432 East Campus MallMadison, Wisconsin 53706
Contact Department | 608-263-1865 | Contact Webmaster
©2017 Board of Regents of the University of Wisconsin System
Page last updated: August 02, 2017 |
10520 | https://web.uvic.ca/~mcindoe/423/ligands.pdf | Table 1 Electron counting for commonly encountered ligands nVE Ligands 1-electron ligands Ligands which in the free state would be a radical: H, F, Cl, Br, I, OH, NR2, OR, SR, CN, N3, NCS, bent NO CR3 – alkyl, aryl, alkenyl, alkynyl, formyl, acyl 2-electron ligands Ligands which in the free state would have an even number of valence electrons: OH2, NH3, ethers, amines, thioethers, phosphines CO, CNR, CS, CR2, C=CR2 Alkenes, alkynes; molecules which bind side-on through a multiple bond: O2, SO2, CS2, RP=PR, R2Si=CR2 3-electron ligands Linear NO, nitride (N) Ligands which can be subdivided into a combination of 1 VE and 2 VE donations: H2C H C CH2• R C RC CR M X M η3-cyclopropenyl η3-allyl µ-X 4-electron ligands diene η4-cyclobutadienyl 5-electron ligands η5-cyclopentadienyl N N N N N N B H tris(pyrazolyl)borate 6-electron ligands 7-electron ligands 8-electron ligands |
10521 | https://en.wikipedia.org/wiki/Element_(mathematics) | Jump to content
Search
Contents
(Top)
1 Sets
2 Notation and terminology
3 Examples
4 Cardinality of sets
5 Formal relation
6 See also
7 References
8 Further reading
Element (mathematics)
العربية
বাংলা
Беларуская
Беларуская (тарашкевіца)
Bosanski
Català
Čeština
Cymraeg
Deutsch
Eesti
Español
Euskara
فارسی
Français
Galego
한국어
Հայերեն
हिन्दी
Hrvatski
Bahasa Indonesia
Italiano
עברית
Kurdî
Македонски
Bahasa Melayu
Nederlands
日本語
Português
Romnă
Shqip
Slovenčina
Slovenščina
کوردی
Српски / srpski
Suomi
Svenska
Tagalog
தமிழ்
ไทย
Türkçe
Українська
اردو
Tiếng Việt
Võro
粵語
中文
Edit links
Article
Talk
Read
Edit
View history
Tools
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Print/export
Download as PDF
Printable version
In other projects
Wikidata item
Appearance
From Wikipedia, the free encyclopedia
Any one of the distinct objects that make up a set in set theory
For elements in category theory, see Element (category theory).
For the components of the Periodic Table, see Chemical element.
| |
| A request that this article title be changed to Membership (mathematics) is under discussion. Please do not move this article until the discussion is closed. |
In mathematics, an element (or member) of a set is any one of the distinct objects that belong to that set. For example, given a set called A containing the first four positive integers (), one could say that "3 is an element of A", expressed notationally as .
Sets
[edit]
Writing means that the elements of the set A are the numbers 1, 2, 3 and 4. Sets of elements of A, for example , are subsets of A.
Sets can themselves be elements. For example, consider the set . The elements of B are not 1, 2, 3, and 4. Rather, there are only three elements of B, namely the numbers 1 and 2, and the set .
The elements of a set can be anything. For example the elements of the set are the color red, the number 12, and the set B.
In logic, a set can be defined in terms of the membership of its elements as . This basically means that there is a general predication of x called membership that is equivalent to the statement ‘x is a member of y if and only if, for all objects x, the general predication of x is identical to y, where x is a member of the domain of y.’ The expression x ∈ 𝔇y makes this definition well-defined by ensuring that x is a bound variable in its predication of membership in y.
In this case, the domain of Px, which is the set containing all dependent logical values x that satisfy the stated conditions for membership in y, is called the Universe (U) of y. The range of Px, which is the set of all possible dependent set variables y resulting from satisfaction of the conditions of membership for x, is the power set of U such that the binary relation of the membership of x in y is any subset of the cartesian product U × 𝒫(U) (the Cartesian Product of set U with the Power Set of U).
Notation and terminology
[edit]
The binary relation "is an element of", also called set membership, is denoted by the symbol "∈". Writing
means that "x is an element of A". Equivalent expressions are "x is a member of A", "x belongs to A", "x is in A" and "x lies in A". The expressions "A includes x" and "A contains x" are also used to mean set membership, although some authors use them to mean instead "x is a subset of A". Logician George Boolos strongly urged that "contains" be used for membership only, and "includes" for the subset relation only.
For the relation ∈ , the converse relation ∈T may be written
meaning "A contains or includes x".
The negation of set membership is denoted by the symbol "∉". Writing
means that "x is not an element of A".
The symbol ∈ was first used by Giuseppe Peano, in his 1889 work Arithmetices principia, nova methodo exposita. Here he wrote on page X:
Signum ∈ significat est. Ita a ∈ b legitur a est quoddam b; …
which means
The symbol ∈ means is. So a ∈ b is read as a is a certain b; …
The symbol itself is a stylized lowercase Greek letter epsilon ("ϵ"), the first letter of the word ἐστί, which means "is".
Character information
| Preview | ∈ | ∉ | ∋ | ∌ |
| Unicode name | ELEMENT OF | NOT AN ELEMENT OF | CONTAINS AS MEMBER | DOES NOT CONTAIN AS MEMBER |
| Encodings | decimal | hex | dec | hex | dec | hex | dec | hex |
| Unicode | 8712 | U+2208 | 8713 | U+2209 | 8715 | U+220B | 8716 | U+220C |
| UTF-8 | 226 136 136 | E2 88 88 | 226 136 137 | E2 88 89 | 226 136 139 | E2 88 8B | 226 136 140 | E2 88 8C |
| Numeric character reference | ∈ | ∈ | ∉ | ∉ | ∋ | ∋ | ∌ | ∌ |
| Named character reference | ∈, ∈, ∈, ∈ | ∉, ∉, ∉ | ∋, ∋, ∋, ∋ | ∌, ∌, ∌ |
| LaTeX | \in | \notin | \ni | \not\ni or \notni |
| Wolfram Mathematica | [Element] | [NotElement] | [ReverseElement] | [NotReverseElement] |
Examples
[edit]
Using the sets defined above, namely A = {1, 2, 3, 4}, B = {1, 2, {3, 4}} and C = {red, green, blue}, the following statements are true:
2 ∈ A
5 ∉ A
{3, 4} ∈ B
3 ∉ B
4 ∉ B
yellow ∉ C
Cardinality of sets
[edit]
Main article: Cardinality
The number of elements in a particular set is a property known as cardinality; informally, this is the size of a set. In the above examples, the cardinality of the set A is 4, while the cardinality of set B and set C are both 3. An infinite set is a set with an infinite number of elements, while a finite set is a set with a finite number of elements. The above examples are examples of finite sets. An example of an infinite set is the set of positive integers {1, 2, 3, 4, ...}.
Formal relation
[edit]
As a relation, set membership must have a domain and a range. Conventionally the domain is called the universe denoted U. The range is the set of subsets of U called the power set of U and denoted P(U). Thus the relation is a subset of U × P(U). The converse relation is a subset of P(U) × U.
See also
[edit]
Identity element
Singleton (mathematics)
References
[edit]
^ Weisstein, Eric W. "Element". mathworld.wolfram.com. Retrieved 2020-08-10.
^ Eric Schechter (1997). Handbook of Analysis and Its Foundations. Academic Press. ISBN 0-12-622760-8. p. 12
^ George Boolos (February 4, 1992). 24.243 Classical Set Theory (lecture) (Speech). Massachusetts Institute of Technology.
^ a b Kennedy, H. C. (July 1973). "What Russell learned from Peano". Notre Dame Journal of Formal Logic. 14 (3). Duke University Press: 367–372. doi:10.1305/ndjfl/1093891001. MR 0319684.
^ "Sets - Elements | Brilliant Math & Science Wiki". brilliant.org. Retrieved 2020-08-10.
Further reading
[edit]
Halmos, Paul R. (1974) , Naive Set Theory, Undergraduate Texts in Mathematics (Hardcover ed.), NY: Springer-Verlag, ISBN 0-387-90092-6 - "Naive" means that it is not fully axiomatized, not that it is silly or easy (Halmos's treatment is neither).
Jech, Thomas (2002), "Set Theory", Stanford Encyclopedia of Philosophy, Metaphysics Research Lab, Stanford University
Suppes, Patrick (1972) , Axiomatic Set Theory, NY: Dover Publications, Inc., ISBN 0-486-61630-4 - Both the notion of set (a collection of members), membership or element-hood, the axiom of extension, the axiom of separation, and the union axiom (Suppes calls it the sum axiom) are needed for a more thorough understanding of "set element".
| v t e Mathematical logic |
| General | Axiom + list Cardinality First-order logic Formal proof Formal semantics Foundations of mathematics Information theory Lemma Logical consequence Model Theorem Theory Type theory |
| Theorems (list) and paradoxes | Gödel's completeness and incompleteness theorems Tarski's undefinability Banach–Tarski paradox Cantor's theorem, paradox and diagonal argument Compactness Halting problem Lindström's Löwenheim–Skolem Russell's paradox |
| Logics | | | | --- | | Traditional | Classical logic Logical truth Tautology Proposition Inference Logical equivalence Consistency + Equiconsistency Argument Soundness Validity Syllogism Square of opposition Venn diagram | | Propositional | Boolean algebra Boolean functions Logical connectives Propositional calculus Propositional formula Truth tables Many-valued logic + 3 + finite + ∞ | | Predicate | First-order + list Second-order + Monadic Higher-order Fixed-point Free Quantifiers Predicate Monadic predicate calculus | |
| Set theory | | | | Set + hereditary Class (Ur-)Element Ordinal number Extensionality Forcing Relation + equivalence + partition Set operations: + intersection + union + complement + Cartesian product + power set + identities | | Types of sets | Countable Uncountable Empty Inhabited Singleton Finite Infinite Transitive Ultrafilter Recursive Fuzzy Universal Universe + constructible + Grothendieck + Von Neumann | | Maps and cardinality | Function/Map + domain + codomain + image In/Sur/Bi-jection Schröder–Bernstein theorem Isomorphism Gödel numbering Enumeration Large cardinal + inaccessible Aleph number Operation + binary | | Set theories | Zermelo–Fraenkel + axiom of choice + continuum hypothesis General Kripke–Platek Morse–Kelley Naive New Foundations Tarski–Grothendieck Von Neumann–Bernays–Gödel Ackermann Constructive | |
| Formal systems (list),language and syntax | | | | Alphabet Arity Automata Axiom schema Expression + ground Extension + by definition + conservative Relation Formation rule Grammar Formula + atomic + closed + ground + open Free/bound variable Language Metalanguage Logical connective + ¬ + ∨ + ∧ + → + ↔ + = Predicate + functional + variable + propositional variable Proof Quantifier + ∃ + ! + ∀ + rank Sentence + atomic + spectrum Signature String Substitution Symbol + function + logical/constant + non-logical + variable Term Theory + list | | Example axiomaticsystems (list) | of true arithmetic: + Peano + second-order + elementary function + primitive recursive + Robinson + Skolem of the real numbers + Tarski's axiomatization of Boolean algebras + canonical + minimal axioms of geometry: + Euclidean: - Elements - Hilbert's - Tarski's + non-Euclidean Principia Mathematica | |
| Proof theory | Formal proof Natural deduction Logical consequence Rule of inference Sequent calculus Theorem Systems + axiomatic + deductive + Hilbert - list Complete theory Independence (from ZFC) Proof of impossibility Ordinal analysis Reverse mathematics Self-verifying theories |
| Model theory | Interpretation + function + of models Model + equivalence + finite + saturated + spectrum + submodel Non-standard model + of non-standard arithmetic Diagram + elementary Categorical theory Model complete theory Satisfiability Semantics of logic Strength Theories of truth + semantic + Tarski's + Kripke's T-schema Transfer principle Truth predicate Truth value Type Ultraproduct Validity |
| Computability theory | Church encoding Church–Turing thesis Computably enumerable Computable function Computable set Decision problem + decidable + undecidable + P + NP + P versus NP problem Kolmogorov complexity Lambda calculus Primitive recursive function Recursion Recursive set Turing machine Type theory |
| Related | Abstract logic Algebraic logic Automated theorem proving Category theory Concrete/Abstract category Category of sets History of logic History of mathematical logic + timeline Logicism Mathematical object Philosophy of mathematics Supertask |
| Mathematics portal |
| v t e Set theory |
| Overview | Set (mathematics) |
| Axioms | Adjunction Choice + countable + dependent + global Constructibility (V=L) Determinacy + projective Extensionality Infinity Limitation of size Pairing Power set Regularity Union Martin's axiom Axiom schema + replacement + specification |
| Operations | Cartesian product Complement (i.e. set difference) De Morgan's laws Disjoint union Identities Intersection Power set Symmetric difference Union |
| Concepts Methods | Almost Cardinality Cardinal number (large) Class Constructible universe Continuum hypothesis Diagonal argument Element + ordered pair + tuple Family Forcing One-to-one correspondence Ordinal number Set-builder notation Transfinite induction Venn diagram |
| Set types | Amorphous Countable Empty Finite (hereditarily) Filter + base + subbase + Ultrafilter Fuzzy Infinite (Dedekind-infinite) Recursive Singleton Subset · Superset Transitive Uncountable Universal |
| Theories | Alternative Axiomatic Naive Cantor's theorem Zermelo + General Principia Mathematica + New Foundations Zermelo–Fraenkel + von Neumann–Bernays–Gödel - Morse–Kelley + Kripke–Platek + Tarski–Grothendieck |
| Paradoxes Problems | Russell's paradox Suslin's problem Burali-Forti paradox |
| Set theorists | Paul Bernays Georg Cantor Paul Cohen Richard Dedekind Abraham Fraenkel Kurt Gödel Thomas Jech John von Neumann Willard Quine Bertrand Russell Thoralf Skolem Ernst Zermelo |
Retrieved from "
Category:
Basic concepts in set theory
Hidden categories:
Articles with short description
Short description matches Wikidata
Articles containing Latin-language text
Element (mathematics)
Add topic |
10522 | https://openknowledge.fao.org/server/api/core/bitstreams/633151db-9c5f-401b-a5ac-e5a6ad222981/content | CODE OF FOREST HARVESTING PRACTICES
REPUBLIC OF LIBERIA FORESTRY DEVELOPMENT AUTHORITY Monrovia, 2007 CODE OF FOREST HARVESTING PRACTICES
REPUBLIC OF LIBERIA FORESTRY DEVELOPMENT AUTHORITY Monrovia, 2007
I3564E 2Code of Forest Harvesting Practices
TA bl E OF CONTENTS
1 Introduct Ion 4
1.1 Towards best practice timber harvesting 41.2 Development of the Code 41.3 Objectives 52 PLA nn InG rEQ uIrEME nt S 5
2.1 Forest Management Planning 52.2 Pre-Harvest Enumeration 6
3 EX cLuSI on ArEAS A nd BuFFE r Str IPS 6
3.1 Exclusion Areas 63.2 Buffer Strip Protection 83.3 Management of Exclusion Areas and Buffer Strips 8
4 con Struct Ion Wor KS F or LoGGI nG 10
4.1 Roads 10 4.2 Drainage 15 4.3 Road maintenance 17 4.4 Watercourse Crossings 17 4.5 Bridges 19 4.6 Log landings 22 4.7 Borrow Pits 24
5 L oGGI nG oPE rAtIon S 24
5.1 Tree Marking 24 5.2 Skid trails 25 5.3 Felling 27 5.4 Log Preparation 28 5.5 Skidding 29 5.6 Truck Loading, Transporting and unloading 30 5.7 Road Transport 30 5.8 Concentration of Harvesting Operations: 31 5.9 Weather Limitations on Logging Operations 31
6 non-t IMBE r For ES t Product ( nt FP) M AnAGEME nt Pr Act IcES 33
6.1 NTFP Sustainable Management Practices 33
7 P oSt-HA rVES t Act IVI tIES 33
7.1 Block closure 33 7.2 Road maintenance and closure 34 7.3 Log landings 34 7.4 Skid Trails 34 7.5 Borrow Pits 35 7.6 Field Camps 35 3Republic Of Liberia - Forestry Development Authority
8 oPE rAtIon AL HYGIE nE 35
8.1 Workshop & Wood Processing Facilities 35 8.2 Field Servicing and Maintenance 35 8.3 Hazardous Chemical Handling and Storage 36 8.4 Waste Management 37 8.5 Wildlife management in contract areas 37 8.6 Alternative protein sources for wildlife protection in concession areas 38
9 cAMP HYGIE nE 38
9.1 Camp Design 38 9.2 Water Supply and Domestic Waste Water 38 9.3 Wastes and Refuse Disposal 38 9.4 Camp Construction Requirement 39 9.5 Additional Facilities 39
10 HEAL tH A nd SAFE tY 39
10.1 General 39 10.2 Emergency Rescue 40 10.3 Felling 40 10.4 Heavy Machinery 41 10.5 Vehicles 42 10.6 Hazardous Chemicals 43 10.7 Workshop and Log Yard Workers 43 10.8 Fire Precautions 43
11 HA rVES t contro L, M on Itor InG A nd ASSESSME nt 44 12 S oc IAL ISS uES 44
12.1 Land and forest use rights and responsibilities 44 12.2 Work place relations, rights and responsibilities 44 13 GL oSSA rY 46 14 APPE nd IX 54 4Code of Forest Harvesting Practices
1 INTROD uCTION
1.1 Towards best practice timber harvesting
The Forestry Development Authority (FDA) has developed this Code of Forest Harvesting Practices to provide a clear set of guidelines to help foresters and logging companies select practices to be followed when carrying out harvesting operations under forest management contracts (FMC) and timber sales contracts (TSC). The purpose of these guidelines is to prescribe a code of timber harvesting practice, to which the FDA requires all contract holders to adhere. The planning requirements for forest areas under FMCs and TSCs are different with respect to some of the activities. However, the requirements regarding good logging practice remain the same and these are described in this code. Practices that conform to the regulations or guidelines should, at least in theory, achieve a desired outcome
such as the harvest of commercial timber from a specified area of forest in a way that meets standards for
sustainable forest management. Sustainable forest management recognizes the importance of all products and services provided by the forest, including timber, water quality, soils, biodiversity, and the livelihood of people that live or work in the forest. Liberia’s response to these concerns has been to develop principles, policies and guidelines for improved
forest management and timber harvesting practices. This is reflected in the new forest policy, forest
legislation, forest management guidelines and codes of practice. The goal of sustainable forest management cannot be reached unless improved harvesting practices are widely adopted by loggers. The emphasis in this document is on the harvesting practices themselves. If these are improved, then it is more likely that the ecological, environmental and cultural value of the country’s forests will be maintained while at the same time providing for sustainable yields of commercial timber from those forests The Code itself will not ensure sustainable forest management. However, with effective implementation through reduced-impact logging guidelines, participation in the planning process by all stakeholders, and integration with other sustainable forest management instruments the Code will assist in minimizing negative i mpacts of timber harvesting.
1.2 Development of the Code
The Code contains practices and sets standards, which have been developed based on research and
practical experience in tropical forests. Specifically, the FAO Model Code of Forest Harvesting Practice
and Regional Code of Practice for Reduced-Impact Forest Harvesting in Tropical Moist Forests of West and Central Africa form the basic framework for this code. The Code will not be applied retroactively. However, contract holders operating in areas that have been logged before should be aware that existing roads, log landings, bridges and other infrastructure that do not meet current Code provisions will have to be upgraded according to this Code. 5Republic Of Liberia - Forestry Development Authority
The Code will be reviewed on a regular basis by the FDA following consultations with the timber industry and other interested parties.
1.3 Objectives
The objectives of the Code of Forest Harvesting Practices are to:
• Provide forest operators with a set of guidelines and standards for improved forest harvesting practices that improve standards of logging/utilization and reduce environmental impacts, and so contributing to the conservation of forests through their wise use.
• Promote the health and safety of forest workers.
• Provide a framework for effective control of timber harvesting operations with predetermined guidelines and benchmark. There are two different types of statements in the code: ‘shall’ (in some cases phrased as an imperative) and ‘should’ statements. The ‘shall’ statements are to be applied in a practical manner to all logging operations. The ‘should’ statements show the desirable practice for most situations and should be interpreted taking account of local conditions
2 PlANNING REQ uIREMENTS 2.1 Forest Management Planning
Broad scale planning is carried out by the FDA to determine which areas may be allocated as commercial forest areas, protected areas or multiple use forest areas. Forest Management Plans are required for all forest management contracts. There are three levels of planning required in each forest management plan:
• operational planning covers the background, conditions and plans for the entire contract area;
• detailed planning for operations covers activities to be carried out within a 5-year period; and
• annual planning covers the previous year’s activities and operational plans for the following year including silvicultural prescription/treatments. Timber Sales contract holders are required to prepare at least the Annual Planning process. All these planning activities shall be made in accordance with the Code of Practice for Timber Harvesting.
Good planning at the operational level has been shown to significantly reduce both operational costs and
the environmental impact of timber harvesting.
Two types of field inventories shall be required for proper forest management planning. First, the
contractor shall complete a general inventory of the entire contract area to provide data on the sustainable forest management plan, rotation, and annual allowable cut volumes per species. Second,
the contractor shall complete pre-harvesting enumeration to define the harvestable trees for the
annual harvesting plan. 6Code of Forest Harvesting Practices
2.2 Pre-Harvest Enumeration
Pre-harvest enumeration shall be completed in advance of, and must receive approval from the Authority, cutting any trees at the start of each harvesting period. Regulations and the individual Timber Sale and
Forest Management Contracts define the timing and process for completing and pre-harvesting procedures.
However, pre-harvest enumeration shall:
• Facilitate harvest planning;
• Provide data to develop Silvicultural treatments;
• Assist in determining which species are locally rare or regenerate poorly under current harvesting regimes. Pre-harvest enumeration shall conform to the following standards:
• All blocks shall be surveyed for 100% stocking of trees 50 cm dbh using regular grid (north-south/ east-west) in each kilometer square blocks to develop tree location map;
• On FMC, a proper permanent grid for the entire five-year section of the contract area shall be opened,
with all gridlines permanently marked and kept open by clearance of undergrowth when necessary.
• Temporary gridlines at 20m interval from the permanent gridlines should be established for each Km-square block in order to facilitate the work of the inventory crews.
Moreover, the following parameters shall be assessed and recorded during the field inventory for each
marked tree:
• Location and the number of the tree;
• Botanical identification of tree species;
• Girth or diameter at dbh
• Quality features and visible defects a high for
• Location of size of any utilizable dead trees
• Topographic features that may influence harvest planning.
3 EXC lu SION AREAS AND bu FFER STRIPS 3.1 Exclusion Areas
Exclusion areas include (a) protected areas, (b) protected animal species habitat (c) protected tree species (ex. IUCN Red List Trees, etc) (d) sites that are especially susceptible to degradation (e) watercourses and (f) cultural and customary tenure areas. Buffer strips of different widths will be used to protect such areas.
3.1.1 Protected Areas
Protected areas are those areas that must be excluded from logging. Protected areas include: Conservation areas (e.g. biodiversity reserves) Declared protected areas under national legislation Areas of cultural importance (such as historical, archaeological and spiritual sites) Areas required for community needs (which may include cultural sites as well as settlements and farms. 7Republic Of Liberia - Forestry Development Authority
3.1.2 Protected Animal Species Habitat:
Areas of high protected animal species habitat, high density of protected species, and habitat trees – define
habitat tree – any tree with high potential or obvious characteristics for providing shelter or habitat for wildlife.
3.1.3 Protected Tree Species
These are mostly the CITES and IUCN and national red list species including rare, endangered and mother tree/seed species.
3.1.4 Sites susceptible to degradation
No harvesting operations shall be carried out on areas with slopes gradient above 30%.
3.1.5 Watercourses
Watercourses are natural channels, which carry water for some period in most years. Flows may be periodic or permanent. Watercourses include natural springs, rivers, streams or creeks, gullies, swamps and lakes. The width of a watercourse is to be measured from bank-to-bank during normal wet season (i.e. the period
of peak water flow), and may include a flood plain area which may be a swamp.
3.1.6 Cultural and Customary tenure areas
Areas that fall under cultural and customary tenure of local communities shall be excluded from the harvesting plan area and in some cases depending on the size and location of the cultural or customary tenure they can be removed from the contract all together. See section on Social Issues for more details.
Natural springs A natural spring is a place where groundwater flows out of the ground. A
spring may be intermittent or continuous (perennial).
Creeks
Creeks are watercourses in which water may flow or pond for more than
six months in most years, and whose beds are of stony, gravely or exposed bedrock materials.
Streams
Streams are watercourses in which water may flow or pond for about six
months in most years, and whose beds are of soil and whose banks are often covered with vegetation.
Rivers Rivers are those watercourses where water flows all year around in most years.
Gullies
Gullies are steep-sided channels. Their beds are normally of soil and may be
covered with vegetation. Water will flow or pond for less than six months in
most years
Swamps Swamps have standing surface water for six months or more in most years
Lakes Lakes have surface water present all year round for most years
TABLE 1SHOWS
THE RANGE OF
WATERCOURSE
THAT ARE DEF
AS ExCLUSION
AREAS .
8Code of Forest Harvesting Practices
3.2 buffer Strip Protection
Buffer strips are required whether or not an exclusion feature is identified on available maps. Field inspection
during pre-harvest inventory work will identify the areas that require buffer strips before forest operations start, and depending on the type of feature and how wide the strip shall be.
Type Minimum width
Conservation and declared protected areas or other buffer boundaries 50 meters Cultural, spiritual and historic sites 100 meters Villages, farms, settlements 100 meters Rare, endangered, mother/seed trees 10 meter radius Watercourses: Width <10m Width < 20m Width < 40 m 15 m on each bank 20 m on each bank 30 m on each bank Natural springs 50 meters circumference Lakes , 25 meters from the waters edge Creeks and streams 15 meters from the waters edge Gullies 15 meters from the waters edge Lakes 25 meters from the waters edge Swamps and other wetlands 15 meters from the waters edge
River banks are defined as the permanent edge of the river regardless of the seasonal recession of the water
levels, whereas the waters edge is determined from where the water is at that given point in time.
3.3 Management of Exclusion Areas and buffer Strips
3.3.1 Exclusion areas and their buffer strips shall be managed as follows
• No trees shall be felled within exclusion areas or their buffer strips except merchantable species that grow in the wetland areas (e.g. niangon, abura, leucinia etc.) which shall be extracted by using 25-meter cable extending to the log from the crawler tractor standing on the skid trail and only
upon approval from the Authority per tree harvested (with an FDA officer present) and only
during dry season when wetlands are dry.
TABLE 2BUFFER STRIP
DISTANCES
9Republic Of Liberia - Forestry Development Authority
• Machine access within exclusion areas and their buffer strips is not allowed, except at designated watercourse crossing points, which should be by the shortest possible distance.
• No earthworks, or spoils from earthworks, shall end up in a exclusion area or its buffer strip
• No harvesting debris shall be pushed into exclusion areas or their buffer strips.
• Trees shall be felled away from buffer strips and watercourses. If it is not possible to fell the tree away from the buffer strip or watercourse it shall not be harvested.
• Where trees inadvertently fall into a watercourse or its buffer strip, the head as well as any accompanying logging debris should be pulled clear, unless unacceptable damage to the bank or buffer strip is likely to occur.
FIGURE 1BUFFER STRIPS
ALONG WATER
COURSE
10 Code of Forest Harvesting Practices
4 CONSTR uCTION WORKS FOR lOGGING 4.1 Roads
Roads provide needed access to the forest. At the same time, roads can produce significant amounts of
sediment and can be one of the greatest adverse impacts on the local environment, on water quality and
on aquatic life. Roads can produce significant erosion, cause gullies, and have an impact on groundwater,
wildlife and vegetation. Road planning is key to ensuring that a road meets the current needs of the user, that it is not overbuilt, that it minimizes impacts on the environment and to the people along the road. A well planned, located, designed and constructed road will be cost-effective in the long term by preventing road failure, eliminating repair needs, and reducing maintenance. Roads should be planned to minimise the sum of skidding and road construction impacts, which in turn
will also lead to cost minimisation. The most efficient spacing of roads can be derived by looking at the cost
tradeoffs between skidding distance and road spacing.
4.1.1 Road classification
a. Primary forest roads
These are permanent, all-weather roads that provide access from public roads to the FMC or TSC area.
They should be capable of carrying log volumes of about 2,000 m3 (≈ c. 60 truck loads) or more per week
and may be in service during the entire logging operation of a 5-year management plan (FMC) or during the operations of a TSC.
b. Secondary forest roads
These are roads that provide access to a logging compartment, connecting feeder roads and log landings to primary roads. They will carry log volumes of about 1,000 to 2,000 m3 per week and will be in service for1-2 years only. Secondary roads are often upgraded to primary roads as the logging operations proceed.
4.1.2 Road Planning
In planning the location of roads the following factors shall be considered:
• Primary and secondary forest roads shall avoid all protected and exclusion areas and their respective buffer strips.
• Roads shall be kept at least 40 m away from the edge of buffer strips (e.g. 55 m from the banks of creeks, the edge of a gullies), except at designated watercourse crossing points.
• Roads shall be located wherever possible on well-drained soils and slopes where drainage will move away from the road. Roads should, therefore, follow the natural terrain by conforming to the
contour, rolling the grade and minimizing the use of cuts and fills.
• Roads should be located on ridges as much as possible.
• Efforts should be made to avoid locations that require box cuts, to avoid steep and very flat terrain where drainage is more difficult to control, and unstable locations such as swamps, marshes, landslides, steep slopes, massive rock outcrops, flood plains, and highly erosive soils
• Efforts should be made to minimize the number of watercourse crossings 11 Republic Of Liberia - Forestry Development Authority
4.1.3 Survey requirements for inspection
After planning the proposed primary and secondary road network contractors shall request that FDA carries out
a field inspection. This inspection should be undertaken with community representatives when appropriate. The
contractors will survey and mark the center of roads on the ground, and all proposed watercourse crossings prior to the inspection, and shall remark as necessary after the FDA has given approval and prior to any construction.
The field inspection of the road network will be part of the block inspection for the approval of the yield.
a. Road Construction
Road construction costs are mostly influenced by the standard of road built, particularly road width, type of surfacing, and the steepness of the terrain. A road with cuts and fills on steep cross slopes greatly
increases the time of construction, amount of earthwork, the areas of clearing, and adds length to cross-drains and other drainage structures.
b. Timing of construction
The construction of primary and secondary forest roads shall take place in the dry season only, and construction should commence within 12 months before logging. Preliminary roadway clearing should take place within 1
month of final construction to reduce sedimentation from untrained or poorly drained sites.
c. Roadway construction
The construction of primary and secondary forest roadways shall take into account the following factors:
• Merchantable stems along the road reserve should be felled and preferably extracted before clearing.
FIGURE 2ROAD LOCATIO
AND DRAINAGE
12 Code of Forest Harvesting Practices
While clearing, trees should be pushed into the road reserve and not into the adjacent forest.
• Hazardous trees, which have a significant probability of falling onto the roadway, shall be removed
during construction
• Soil heaps, berms and debris stockpiling along the roadway are not permitted; instead topsoil
should be stockpiled for use in cut and fill batters and/or in borrow pits. Organic debris should not be used as fill.
• All road drainage works shall be completed before gravelling work commences.
• Gravelling is required for primary roads and is recommended for secondary roads. Road surfaces on bridge approaches, culverts and swampy terrains shall be graveled.
• All road fill and paving material shall be compacted. Minimum compacted gravel thickness is
15 cm depending on the type of soil as advised by the Authority. Softer areas should require additional thickness where as rocky areas may require less gravel.
• Minimum primary road spacing of 1200m within a compartment is highly recommended.
d. Side slopes
Although primary and secondary road may not be located on slopes of greater than 15 %, the side slops of roads may have a greater slope. In such circumstances additional construction is required to mitigate the impact of the roads:
• Side cut roads shall not be located on slopes greater than 40%.
• Full bench construction should be adopted instead of half bench construction on slopes steeper
than 25% (see fig. 3).
FIGURE 3
ALF AND FULL
BENCH
ONSTRUCTION
13 Republic Of Liberia - Forestry Development Authority
• Cuts and fills should be balanced in gentle terrain so that as much of the excavated material as is practical can be deposited in the roadbed fills sections (see fig. 4).
• The maximum fill for batter slope is 40%. All cut batter slopes should be benched at 3 m vertical
intervals.
• Trees at the top of steep cut batters should be cleared if erosion or wind-blow is liable to occur.
e. Road grades
Primary and secondary forest roads shall not be constructed with grades (slopes) of more than 10% and
15% respectively since on steep roads drainage is difficult to control. However:
• Steeper grades (up to 20%) for short sections (maximum 200 m) would be acceptable, if this
shortens construction significantly or reduces earthworks, provided that adequate drainage is
installed.
• Any two sections of road at maximum gradient should be separated by 100 m of level gradient.
f. Road widths
Every effort shall be made to minimize the width of forest roads. Road widths depend on the class of road, the type of soils and the forest through which the roads are to be constructed. The maximum road widths for forest roads on loam and clay soils are shown in Table 3. The maximum road widths for forest roads on sandy soils are shown in Table 4. The widths of roads on laterite soil should be intermediate between the limits given in the tables above.
Road class Limit of Clearing Limit of Roadway Limit of Road Bed Limit of Travel Way
Main road 25 20 9 6Secondary road 20 15 8 5
Road class Limit of Clearing Limit of Roadway Limit of Road Bed Limit of Travel Way
Main road 15 11 9 6Secondary road 15 10 8 5
FIGURE 4BALANCE CUTS
AND FILLS
TABLE 3MAxIMUM ROA
WIDTH FOR LOA
AND CLAY SOIL
TABLE 4MAxIMUM ROA
WIDTH FOR SA
SOIL
14 Code of Forest Harvesting Practices
• Primary and secondary roads on clay and loam soils should have trees removed alongside the road to allow sunlight onto the road to dry the surface quickly after rain. Roads on white sand soils should be protected from rain and direct sunlight by limiting clearing to the roadbed and ditches
to maintain trafficability.
• On primary and secondary roads, tree stumps should be grubbed on at least one side of the road
to allow for movement of tractors and other heavy machinery that would damage the road surface.
• Passing spots shall be provided on roads with a roadbed narrower than 7 m, at least every 500 m and at bridge approaches and hillcrests.
• Where side cutting is not necessary, earthworks should be limited to the width for the roadbed plus ditches (table drains) on either side.
g. Curves
On all primary and secondary roads curves shall be fitted to the topography; i.e. along the contour. Curve
widening is required on corners to allow for off-tracking of trailers. To increase vehicle stability on a bend, banking (raising) the outer part of the curve is recommended. Shoulders may need to be cleared on the
inside of the curve to obtain the required sight distance to ensure traffic safety. The minimum radius of
the curve is related to the visibility and the speed the vehicles will be traveling on the road. Guidelines for recommended minimum sight distance and minimum curve radius are shown in Table 5. 15 Republic Of Liberia - Forestry Development Authority
Road class Design speed (km/hr) Minimum sight distance (m) Minimum radius (m)
Primary road 70 100 50 Secondary road 50 60 30
4.2 Drainage
Drainage problems often cause the largest impacts from roads with regard to erosion, sedimentation, and degradation of water quality. Poor drainage will also lead to rutting, scouring and gullying, while standing water and seepage under the roadbed may lead to road failure; in all cases necessitating extensive maintenance or even expensive repairs or diversions. These aspects make road drainage the single most important aspect of road construction and maintenance.
4.2.1 General
In all phases of forest road preparation, adequate drainage shall be constructed to ensure the stability of the roads and so reduce their impact on the forest. Wherever practicable, permanent drainage should be installed in advance of other construction to keep works as dry as possible. Temporary drainage shall be
provided where there is likely to be a significant delay in installing permanent drainage
4.2.2 Methods of drainage
On both primary and secondary roads a crowned road surface shall be required. Additionally:
• Ditches (table drains) shall be installed alongside all roads, constructed to a minimum depth of 30 cm below the level of the crown of the road.
• Turnout drains (side drains/outlets) shall be constructed at specified spacing.
• Crossroad drainage (pipes or culverts) should be used where turnout drains are not possible.
TABLE 5
FOR MINIMUM
SIGHT DISTANC
AND CURVE
RADIUS
FIGURE 5TURNOUT DRAI
16 Code of Forest Harvesting Practices
• For roads constructed on highly erodible soils on slopes, drains may require special treatment such as lining with gravel or stones, log or rock bars, as well as stepping and frequent outlets to reduce scouring.
• Earth fills should have adequate drainage to prevent water build up and ponding behind the fill.
• Side cuts shall also be provided with catch drains along the topside to collect surface runoff
4.2.3 Spacing between drains
Turnout drains or culverts shall be constructed:
• At changes of slope
• Within 50 m of watercourse crossings Maximum drain spacing guidelines are shown in Table 6 below.
Gradient (%) Drain spacing (meters)
0-5 80 5-10 40 10-15 30
FIGURE 6ADDITIONAL
DRAINAGE
EqUIREMENTS
FIGURE 7RAIN SPACING TABLE 6
xIMUM DRAIN
SPACING
17 Republic Of Liberia - Forestry Development Authority
4.2.4 Drain out-flow
Ditches shall not drain directly into watercourses. Rather turnout drains (outlets) shall be installed at least 50 m before meeting a watercourse to divert water into the surrounding vegetation. Where turnout drains are not practicable, drainage diversion using culverts shall be used.
• All drains shall have stable outlets, protected by vegetation or rock or log barriers, particularly in
fill areas.
• Sumps or silt traps shall be constructed in ditches at all four corners of watercourse crossings.
• In steep terrain silt traps should be constructed at the end of turnout drains.
4.3 Road maintenance
For all primary and secondary forest roads maintenance shall be carried out regularly, and at least on an annual basis. The crown of the road surface and road shape shall be maintained to allow effective drainage. Additionally:
• Surfacing gravel or loam should not be pushed to the road edge or into drains.
• Soil, vegetation and other materials that would obstruct water flow shall be cleared from ditches.
• Turnout drains, culverts and bridges shall be kept clear and in a good working condition at all times.
• Bridge decking, foundations and sidewalls should be checked regularly.
• Any debris that has been pushed into the watercourse shall be removed.
• Water should flow freely under bridges, and silt traps should be cleaned regularly.
4.4 Watercourse Crossings
4.4.1 Types of Crossings
Table 7 below shows the classification of watercourse crossings. Note that corduroy with earth fill and/or
log clusters is not permitted for crossing any watercourse in any situation.
Type of crossing Description
Bridges Bridges shall be used for road crossings of all rivers and creeks. They may also be used for other watercourses. Culverts (or pipes) Culverts shall be used for crossing gullies and other waterways if bridges are not constructed. Fords Fords are not permitted on primary and secondary forest roads, only for skid trails, and they should be corduroyed.
FIGURE 8DRAIN DIVERSIO
BY TURNOUTS O
CULVERT
TABLE 7
CLASSIFICATIO
OF WATERCOU
CROSSING
18 Code of Forest Harvesting Practices
4.4.2 Construction of Watercourse Crossings a. Location of crossings
Watercourse shall always be crossed at right angles. Additional criteria for selecting the location of crossing points are that sites:
• Are immediately downstream of straight and stable watercourse sections
• Have easy high bank access
• Do not require deep box cuts
• Require minimum alteration to the high bank
b. Earthworks
In the construction of roads and bridges, river and creek beds shall not be filled in. All earthworks shall
be carried out so as to prevent soil from entering the watercourse, and all spoil shall be removed to outside
the buffer strip or alternatively should be placed in road fills. Watercourse buffer strip vegetation should be
retained to the edge of the crossing. Temporary crossings are permitted to allow equipment involved with the construction of the crossing to be moved to the other side, provided that:
• The width of the temporary crossing is limited to 4 meters.
• The temporary crossing is made on the final crossing alignment, so as to reduce disturbance to
watercourse banks and buffer strip vegetation During bridge construction oil, chemicals, excess concrete and other waste should not enter the watercourse.
FIGURE 9
OG CLUSTERS
TH EARTH FILL
OT ALLOWED
FIGURE 10 CROSS
ATERCOURSES
RIGHT ANGLES
19 Republic Of Liberia - Forestry Development Authority
4.5 bridges
All bridges on primary roads shall be, and all bridges on secondary roads should be, sufficiently elevated to allow wet season flood flows to pass without damage to the crossing or its foundation. The bridge span
should extend at least 120% of the width of the watercourse measured from bank to bank; i.e. extend beyond the river or creek channel by 10% on either side. All approaches shall have a straight and level alignment for a minimum of 20 meters on either side.
4.5.1 Bridge construction
In constructing timber bridges the following criteria shall be considered (Fig 11 illustrates two timber bridge types).
• All parts of timber bridges should be constructed using durable timbers with high strength property/density not less than 850kg/m3, such as Dahoma, Irvingia, Klainodoxa, Ekki, based on approval by the Authority. Decks should be constructed with durable sawn timber.
• Soil fill or covering Is not allowed unless the stringers are completely covered with a material such
as geotextile and have guard logs on both sides
• Foundations should be excavated to a solid base and not formed by pushed material
• All parts of the bridge shall be well anchored to prevent their washing away (see fig. 12)
• The stream banks adjacent to the bridge should be stabilized using wing walls of durable logs or other equivalent construction
FIGURE 11 BRIDGE
CONSTRUCTIO
20 Code of Forest Harvesting Practices
• Silt traps shall be built at the four corners of bridges.
4.5.2 Culverts
Culverts should be set at or marginally below the level of the natural watercourse bed (see fig.12). They may have an earth fill but are to have stable abutments to the level of the running surface to prevent soil entering the watercourse. Simple log culverts should be constructed for small seasonal water flow crossing
the road. They should consist of three logs, of which two are the basic layer with the third log on top and covered with gravel. Culverts shall be laid at a grade that will minimize silting up and excessive scouring at the discharge end. They should have a headwall to prevent erosion, and should have an opening with a diameter of
45 cm or larger depending on the wet-season flood-flow level. In case of log culverts it is recommended to use at least three-log culvert if high flood flows are expected. Provisions shall be made at culvert inlets and outlets to minimize erosion caused by flow entering or discharging; sediment traps of logs and/or rocks shall be required in place where high water flows are expected (see fig.13).
FIGURE 12 STABILI zING
BRIDGE
UTMENTS AND
REAM BAN kSS
FIGURE 13 VERT SHOULD BE SET AT THE LEVEL OF E STREAMBED
21 Republic Of Liberia - Forestry Development Authority
Culverts shall not discharge over fills without adequate protection (e.g. rip rap, geotextile). Sumps or silt
traps shall be constructed in ditches at all four corners of culverts to prevent siltation and blocking. Log
culverts shall require geotextile or another retaining mechanism to retain backfill.
FIGURE 14 CULVERT
INSTALLATION
OUTLET
PROTECTION
DETAILS WITH
SPLASH APRON
RIPRAP LINED
PLUNGE POOL
ENERGY
DISSIPATION AN
SCOUR CONTR
FIGURE 15 PROVISIONS AT
CULVERT INLET
(SUMPS ) AND O
LETS (ENERGY
DISSIPATERS )
TO MINIMI zE
EROSION CAUS
BY FLOW
ENTERING
OR DISCHARGIN
FIGURE 16 SEDIMENT TRA
OF LOGS , ROC k
ETC . WILL BE
RE qUIRED IN
PLACES WHERE
HIGH WATER
FLOWS ARE
ExPECTED 22 Code of Forest Harvesting Practices
4.5.3 Fords
The construction of fords (or low-level watercourse crossings) shall minimize earthworks and impact on
the streambed. They shall be built to allow water to flow at all times, and should provide protection against
scouring below the crossing (unless the bed is solid gravel or stone), and should be corduroyed to minimize impact on creek bed. The corduroy shall be removed when the ford is no longer in use.
4.6 log landings
Log markets should be constructed to facilitate log sorting and loading activities. Spacing and size of log markets depend road density, topography, volume to be harvested, projected skid trail pattern, log size, storage time and logging equipment used. Hence, spacing and size of log markets should be determined during the planning phase. Remember that roads should be planned to minimise the sum of skidding and road construction impacts, which in turn will also lead to cost minimisation.
4.6.1 Location of log landings
Log landings (or log markets) should be sited at such intervals as to minimize the number and total length
of skid trails, but they should normally not be less than 250 m and not more than 1000 m apart (see fig. 17 and fig. 18). Log landings shall be located:
• At least 30 m from the edge of buffer strips (e.g. 45m from the bank of a creek or the edge of a gully) so that mud and debris do not enter watercourses.
• At sites that accommodate efficient skidding patterns and directions.
• On a gentle sloping elevated area, or on ridges or benches, in order to facilitate free drainage at all
times, reduce the amount of side cutting, and encourage uphill skidding to disperse runoff into surrounding vegetation. Log landings should not form part of the public roadway, and should be located 50 m from the public roadway to avoid deterioration of the road formation, road drainage facilities, and reduce hazard to the
public except when this would significantly reduce earthworks while maintaining adequate drainage of
both road and market. However, trees on the road construction site marked and felled, should be deposited on temporary roadside landing and integrate into the production process.
FIGURE 17
OCATION AND
SI zEOF LOG
LANDINGS
23 Republic Of Liberia - Forestry Development Authority
4.6.2 Size of log landings
The size of a log landing will depend on the expected volume and number of logs to be stockpiled. It should be large enough to facilitate the sorting of logs, to allow for entry (skidder) and exit (loader) points. A log landing should not exceed 1400 m2 (35 m x 40 m) in size, and the total area occupied by landings should not exceed 0.42 ha per unit area of 100 ha, i.e. 3 landings per km sq block. Private roads or road sides in the contract areas can be and sometimes should be encouraged as the landing areas where this can reduce environmental impacts.
4.6.3 Log landing construction
All merchantable trees shall be felled from the log landing site and extracted before clearing (these trees will be part of the approved yield from the block). Log landings shall be well drained. Proper drainage requires:
• A domed surface to prevent the ponding of water.
• Ring drainage around the perimeter to prevent surface ponding.
• Drains to channel runoff to vegetated areas. Log markets should have designated entry (skidder) and exit (log loader) points.
4.6.4 Log landing operations
Skid trails should approach landings from below to avoid directing runoff of water to the landing. This will reduce the amount of mud and water entering log markets from skid trails or roads. Likewise:
• Skidding across the roadway shall not be permitted because this may lead to deterioration of the road formation and (road) drainage facilities.
• The use of heavy machinery on saturated soils should be minimized to limit erosion, ponding, rutting, mixing and the compaction of the soil.
• Hauling on wet roads should be minimized
• Log landings should not be bladed off to keep them operational
• Debris and waste should be placed so as not to restrict drainage of the landing
FIGURE 18 LANDINGS SHO
BE LOCATED O
GENTLY SLOPIN
ELEVATED ARE
WITH SkID TRA
APPROACHING
FROM BELOW
24 Code of Forest Harvesting Practices
4.7 borrow Pits
Forest roads are typically built from local materials that must support heaving logging trucks and should have a surface that, when wet or when extremely dry, will provide adequate traction for vehicles. In many cases, the native soil material is too soft, too unstable or impossible to compact (white sand). Surfacing both improves structural support and reduces road surface erosion. Gravel, crushed aggregate, or loam are the most common improved surface materials used. Use of local material sources, usually borrow pits, can produce major cost savings, compared to the cost of hauling materials from distant sources. Typical borrow pits can have major adverse impacts, including sediment from a large denuded area and impacts on wildlife. Thus borrow pit planning, location and development should be done with care. The extraction of gravel or loam from road cutting areas during the formation of the road is preferred to the development of large borrow pits. All merchantable trees shall be harvested on the proposed borrow pit site (these will be included in the approved yield). Additionally:
• Catch drains should be constructed around the uphill side of the pit to prevent runoff entering the area
• The base of the pit shall be drained at all times. Drains shall not directly enter watercourses
• The face of the pit shall be maintained in a stable condition at all times
• At least one side of the pit shall have a gentle slope to allow easy wildlife access
5 lOGGING OPERATIONS 5.1 Tree Marking
Tree marking standards will be determined and regulated by the FDA’s chain of custody system. During the commercial stock survey all commercial trees above their respective minimum cutting diameters will be marked and numbered according to those standards.
• Following FDA approval of the yield all trees to be felled will be marked in the manner required.
• For all trees included in the yield the recommended felling direction shall be indicated.
• Seed trees and trees belonging to protected species shall be marked accordingly, and a 20m radius protection zone shall be established. However, no tree within 10 meters of a seed tree shall be felled.
• Rare, and endangered species (according to the IUCN Red List and Authority Regulations) shall be appropriately marked and designated as preserve trees to maintain the natural diversity of tree species; 25 Republic Of Liberia - Forestry Development Authority
5.2 Skid trails
5.2.1 Location
The design of the skid trail network should be based on an assessment of the following factors:
• Location and density of roads and log landings
• The number and location of trees to be harvested
• The logging equipment used
• The minimization of watercourse crossings
• The avoidance of soils with low load bearing capacity The total area occupied by skid trails should not exceed 8% of the total area of the block or compartment (or a total linear distance of 200 m per hectare). Skid trails shall not be constructed in areas excluded from harvesting and buffer strips. The maximum allowable gradient for skid trails is 35%. Skidding on slopes greater than 30% is only permitted/ allowed for short distances (less than 30 m) where adequate provision for drainage is possible to prevent excessive erosion. Uphill skidding is recommended since this gives operators better control over the movements of the log, and also tends to encourage the greater dispersion of runoff water into the surrounding area and not onto the skid trail. All skid trails should be as straight as possible to minimize damage to residual trees,
to prevent damage to the log being extracted, and to maximize skidding efficiency.
5.2.2 Survey requirements
The proposed skid trail layout in a block shall be marked in the field prior to inspection and approval by the FDA using flagging tape, paint marks or by blazing. Skidder and chain-saw operators (and their assistants)
should inspect the proposed alignments with the bush manager prior to commencing construction. Watercourse crossings shall be marked as such on the tree location map and on the ground
5.2.3 Timing of construction
The approved skid trail layouts shall be marked before the start of the felling operation to assist the feller
in determining the direction of fall and to improve safety and efficiency of the logging operation. The
construction of skid trails shall take place in the logging season only.
5.2.4 Construction
Skid trails shall be opened by a crawler tractor. The construction of skid trails should not require any earthworks. The maximum skid trail width is 4 meters. Avoid trees above 30 – 50cm dbh during skid trail construction. 26 Code of Forest Harvesting Practices
5.2.5 Watercourse crossings
Proposed watercourse crossings shall be marked on the block map, and shall be marked in the field prior to inspection and approval by the FDA using flagging tape, paint marks or by blazing. Crossings should be
constructed in dry weather. Watercourse crossings shall be selected in places where the bank slope is minor and the watercourse bed is
firm. Width of the crossing should be less than four meters. Buffer strip vegetation shall not be otherwise
disturbed. Skid trails shall cross waterways at right angles with straight approaches of at least 10 m on either side. Temporary crossings (log culvert with corduroy) shall be provided to cross gullies in any situation, and
waterways if water is flowing at the time of operation. Corduroy with earth fill is not allowed because this would effectively block the water flow and may divert its course. 27 Republic Of Liberia - Forestry Development Authority
Non-commercial logs shall be used in the construction of crossings where needed. Abutments and approaches should be higher than the stream banks. During construction soil should not be pushed past the high bank, into watercourses or onto the top of a crossing. Crossings shall be removed after completion of the operation. Crossing material should be placed more than 10 meters away from the high bank Its removal should not disturb the watercourse banks.
5.3 Felling
5.3.1 Timing of operation
Felling is only permitted in the logging season. Felling in a specific block shall commence once FDA has
given its authorization. All commercial trees included in the approved yield shall have been marked for felling and their predetermined felling direction indicated and seed trees and protected trees also shall have been clearly marked. Each felling crew should include three members (crew leader who operate the chain saw part of the time, main chain saw operator and an assistant). They shall be provided with radio for general communication and quick rescue in case of emergency. Felling can commence when forest road and log landing construction is completed, and when skid trails have been marked on the ground. All operators (skidding and chain-saw) shall be familiar with the harvest area and have discussed the operational plan with the bush manager and/or their supervisor. The felling
crew shall take both the harvesting map and the file of information on trees to be harvested into the forest.
All vines/lianas attached to the selected trees or trailing from the canopy should be cut in advance of felling so that they die and become brittle and prevent nearby trees from being pulled over or broken when the harvested tree falls.
5.3.2 Restrictions
Felling is not allowed within protected or exclusion areas and their respective buffer strips except species that are grown in wetland habitat. Felling is not allowed on slopes steeper than 30%. Felling shall commence at the rear end of the block and proceed along the main skid trail towards the log landing If trees fall inadvertently into watercourses or their buffer strips, the tree head as well as any accompanying logging debris should be pulled clear.
5.3.3 Directional felling
Chain-saw operator and assistant should be trained in directional felling, and shall be adequately equipped at all times. Directional felling is required to:
• Avoid damage to the felled tree (by cross-felling, falling on obstacles, down-slope felling) minimize damage to designated seed trees and other protected trees.
• Facilitate easy log extraction, thereby minimizing ground disturbance.
• Avoid disturbance to watercourses, exclusion areas and buffer strips.
• Prevent trees from hanging up in adjacent canopy trees.
• Minimize canopy openings by felling into gaps formed by previous felled trees or natural tree fall. 28 Code of Forest Harvesting Practices
• Avoid blocking the skid trail.
• Increase work safety.
5.3.4 Directional felling restriction
Felling crews should check trees suspected of being unsound before felling. Once cutting of a tree is
started, that tree should be felled, even if it is found during felling to be unsound. The stump height should be as low as practicable (approximately no more than. 30 cm) to maximize saleable volume. Stump heights over 30 cm are acceptable if there is a butt defect. Buttressed trees should be cut at a height not greater than the point, at which buttresses can be trimmed to provide a diameter equal to that immediately above the buttressed section. When it is not appropriate to trim the buttresses the tree should be cut immediately above the buttress. The logs and the stump are numbered and recorded with species and number of the harvesting block for legal reasons and work control.
5.4 log Preparation
All log preparations should be carried out at the stump. This ensures that the non-utilizable parts of the tree remain in the forest. The felled tree shall be cross-cut (top and junk) so that splitting does not occur when
a log is moved during extraction. Operators should top and junk boles to obtain the maximum volume, consistent with highest value of saleable logs, and to reduce skidding damage. All buttress flutes, knots and branches should be trimmed flush with the main stem to gain maximum log quality and volume, and reduce
soil disturbance and assist skidding. S-hooks or plates should be used before extraction as necessary on log susceptible to end splitting and to maintain quality.
5.4.1 Cross-cutting
Cross-cutting shall be done at the tree stump or at the bush landing. No crosscutting shall be carried at road side.
5.4.2 Safety Rules for Cross-cutting and bucking
• Always evaluate the distribution of tension and compression at the crosscutting point before applying the cut and position yourself on the compression side;
• Use appropriate working techniques to avoid timber wastage through shattering or splitting of the trunk;
• Give clear instructions on qualities, lengths and diameter for bucking at felling site and conversion at landing.
5.4.3 Log marking
Log markings enable logging operators, service providers, and costumers to locate and control all harvesting and extraction activities over space and time. Each log shall display:
• The number of the tree and the block number;
• The number of the log within the tree 1,2,3, or ABC, if segmented, alphabet shall be used;
• The logo of the logging company;
• Area of the log origin. 29 Republic Of Liberia - Forestry Development Authority
5.5 Skidding
Skidding shall commence only after the felling has been completed in a block and the felling crew has moved to another block. Machine access is prohibited in areas excluded from logging and their buffer strips. Logging machinery is not allowed to cross watercourses except at approved and properly constructed crossing points. Trees felled inadvertently into a buffer strip should be extracted carefully without much disturbance to the buffer strip. Skidding along or across primary and secondary forest roads should be avoided.
5.5.1 Pre-skidding
• The maximum gradient permitted on skid trail shall not exceed 30%.
• Any tree within the skid trail and having a diameter larger than 15cm should be cut by chainsaw before the machine opening the skid trail passes.
• Crawler tractor should be used to open skid trail and pre-skid logs from the stump to the skid trail. Avoid trees above 30 cm dbh during skid trail construction.
5.5.2 Skidding to landing
• Skidding is only permitted in the logging season.
• Skidding to the landing shall be done by a wheeled skidder equipped with grapples. Logs should be winched the maximum distance possible to reduce soil disturbance associated with skidding. Machines shall be equipped with an integral arch or similar device to lift the end of the log off the ground to avoid soil damage and an increase in skidding resistance.
• Winches shall be fitted to all extraction machines, and it is recommended that the minimum length
of wire rope of 25 m (19-22 mm diameter).
• Skidder and tractor blades shall be raised when traveling and skidding.
• Operators should reverse along skid tracks towards the concentrated log on the skid trail, and head
or butt haul to reduce travel distance.
• The wheeled skidder should never move off the skid trail especially when all logs are concentrated along the skid trail during the pre-skidding.
• Maximum skidding load should not exceed two (2) logs. Each skidding crew is equipped with chainsaw in addition to the standard complement of tools and safety gear.
5.5.3 Log Storage
The logging supervisor shall ensure that only trees approved in the yield are felled, and all saleable timber is extracted from the stump area and brought to the log landings. Logs should be stockpiled in well-drained log landings and shall be sorted in such a manner as to facilitate their inspection and scaling by FDA chain-of-custody staff and other authorized monitors. Logs stored at landing should be sprayed with permissible
fungicides and insecticides to protect against bio-deterioration. Only chemicals approved by the Authority
and Environmental Protection Agency shall be used. 30 Code of Forest Harvesting Practices
5.6 Truck loading, Transporting and unloading
Excavator type or rubber-tired or tracked front-end loaders should be used for loading and unloading logs where possible. Trucks shall not be loaded in excess of their capacity. Any protruding limbs bark or trailing material shall be removed before the truck departs the loading point. Pit loading shall only be permitted and is limited to logs that can not be possible for excavator or rubber tired or track front end loader. The
pit used shall be immediately refilled with the same excavated material removed.
5.6.1 Loading
Loading in forest harvesting is to facilitate the evacuation of extracted timber which had already been
bucked, classified, sorted and scaled. Transportation should be done by means of tractor with attached trailer or flat bed to its destination (processing mill or port of exit). Loading operation is often associated
with several constraints. Therefore the following measures shall be observed.
• All employees shall keep a distance of at least 20 meters away from loading truck during loading operations;
• All logs shall be stack on cross-bolts to facilitate handling by loader and to delay or restrict insect or fungal attack;
• No person should be in the cab or on the platform of truck while loading is in progress.
5.7 Road Transport
Transporting logs shall be completed by truck either directly from the bush landing/processing sites to its final
destination/point of delivery. The following rules for road transporting should be fully observed and adhere to:
• Secure load firmly against log slippage or fall by means of stanchions, chocks, cables, or chain and
binders to prevent log movement during transport;
• Each log should be secured by at least two cables or chain binders;
• For cost and safety reasons, vehicle brakes and stirring should always be in good technical condition. and should not be over loaded in excess of their capacity;
• All vehicles shall maintain safety and maintenance records for inspection by FDA or other authorities.
• Vehicle maintenance and inspection must be carried out at monthly intervals at a minimum for breaks, steering and other essential maintenance.
• Loads should not exceed the truck deck capacity and the bearing capacity of roads and road infrastructures;
• Never tow trucks across unstable section of the road by crawler or skidder;
• For efficiency and safety, the trailer unit should be loaded on to the tractor before traveling
unloaded;
• Personnel should be in possession of their faculties before driving an articulated vehicle (no driving trucks or other operational equipment if the conductor has been drinking alcohol, taking drugs, or other has a physical impediment or condition that may cause the driver to perform in an unsafe manner);
• Never transport un-authorized passengers, bushmeat, fire arms or protected wildlife;
• Remove timber within two months to avoid insects and fungal attack
• Remove hanging bark and limbs after chaining.
• Observe speed limits;
• Truck loaded with log shall only be unloaded using the required front-end loader. 31 Republic Of Liberia - Forestry Development Authority
5.8 Concentration of Harvesting Operations:
Harvesting operations are finally concentrated at either the processing mill or at shipment port of exit. It is at this stage when sound decisions are to be made in order to sustain the productivity and realize the profit
margin. Successful harvesting output depends on product, product quality and the market. To maintain the quality of the products harvested certain conditions will have to be guaranteed.
5.8.1 Processing Mills
• Logs off-loaded should be stacked according to species and grade on cross bolts
• Buck logs to market and contract requirement before sawing;
• Logs should be sprayed from time to time with pre-approved wood preservatives especially in the wet season while awaiting saw milling.
• Processed wood products shall be stacked under well ventilated shade using stickers between sawn timber to avoid sap staining
• End-faces of sawn timber should be painted to reduce face checks and splitting
• Produce quarter-sawn timbers to reduce shrinkage and increase market value.
5.8.2 Shipment Port
• Seal the faces of logs with anti-cracking chemicals to prevent face checking and splitting
• Spray the stacked log with permissible insecticides and fungicides
• Debark logs if necessary and spray before stacking;
• Logs must be properly stacked on cross-bolts to avoid direct contact with the moist ground and prevent discoloration from the exudates of other species; and
• Logs that are susceptible to crack and splitting should be S-Hooked to maintain quality and value.
5.9 Weather limitations on logging Operations
Road construction and maintenance, skidding, loading and hauling when conditions are wet cause extreme
damage to soil and water. It is also inefficient and often dangerous. Areas most likely to be workable in
wet weather are those with less than 20% slope on stable soil types such as brown/white sand and laterite. The annual plan should specify wet and dry weather coupes.
5.9.1 Felling
Felling should cease when winds prevent accurate and safe directional felling, and when ground conditions are too slippery to allow the felling crew to move safely and quickly away from the falling tree, and when log extraction or hauling is not possible due to weather and/or soil conditions. Felling should always be limited to ensure the volumes cut at any one time can be promptly skidded and hauled. 32 Code of Forest Harvesting Practices
5.9.2 Road skid trail construction and skidding
Road construction operations and skidding should cease when:
• Soils are saturated and turbid water or mud is flowing down a skid trail. • Turbid water or mud is flowing from a skid trail or road into a watercourse. • Soils are rutted to the extent that the depth of mud is greater than the rim of wheeled machinery or reaches the final drive on caterpillar-type machinery.
Any affected section of the trail or road shall not be by-passed by opening up a new trail/road alongside or close by.
5.9.3 Log landing operations
Construction or operations on log landings shall cease when:
• Water is ponding on the surface of the log landing.
• Soils are rutted to the extent that the depth of mud is greater than the rim of wheeled machinery
or reaches the final drive on caterpillar-type machinery.
5.9.4 Trucking
Trucking shall be halted when:
• Trucks cannot move unassisted along the roads because of slippery conditions.
• Turbid water or mud runs in wheel ruts, and forestry roads are rutted to the extent that the depth of mud is greater than halfway of the rim of wheeled machinery or deemed by the Authority representative to have substantial environmental impact.
5.9.5 Recommencement of operations
Soils need to be allowed to drain after heavy rainfall events before forest operations recommence. Skidding,
loading and trucking operations may recommence only after water or mud ceases to flow on affected skid
trails, landings and forest roads, and mud depths fall below the maximum permitted levels. 33 Republic Of Liberia - Forestry Development Authority
6 NON -TIM bER FOREST PROD uCT (NTFP) M ANAGEMENT PRACTICES
NTFPs are resources derived from the forest besides timber and other wood based materials e.g., plywood, particleboard etc., that provides security, health care, materials for implements and construction, fodder, fuel wood and livelihood to rural communities specially those living in the uplands. This includes wood extractives, barks, leaves, roots, sap, fruits and also non-timber yielding materials such as rattan, bamboo, coconuts etc.
NWFPs are of significance primarily in household and local economics. The economic benefit that can be derived from non-timbers forest products have been identified as a major
opportunity for community forest projects.
Most significantly, NTFPs play in important part in sustainable forest management. The exploitation of
many NTFPs depends on keeping forest intact without decimating a while range of forest resources.
6.1 NTFP Sustainable Management Practices
• Logging contracts should incorporate the sustainable management practices in their harvest plan;
• Capacity building in the NTFP sustainable management and utilization should form part of social agreement to be provided for the local communities. The training shall emphasis on the techniques in harvesting, processing, marketing and cultivation/propagation
• Local communities shall be given the opportunities to access the forest for NTFPs as long as the harvest is sustainable;
• Logging companies shall regulate and monitor the harvesting of honey. This is to mitigate the
burning /setting five on the bee hives
• Local communities shall be allowed to harvest, collect the NTFPs in the concession areas as long as these exercise are sustainable
• Extraction and road building machines should prevent the destruction bamboo clumps in the forest areas. POST-HARVEST ACTIVITIES
7 POST-HARVEST ACTIVITIES
Rehabilitation of logged areas is required to prevent further deterioration of the logged area and downstream soil and water values, and to encourage forest regeneration. All areas should be left in a clean and tidy condition.
7.1 block closure
Blocks shall be closed once the logging of the approved yield has been completed. A block that has been closed shall not be re-entered and shall remain closed until the next scheduled cutting cycle except for the collection of non-timber forest products by the local communities.
Logging operations in a specific block should be completed in a single logging season. The only exception
to this rule that may be applied is when weather conditions have prevented the approved yield to be felled and extracted. In such cases the FDA shall provide an extension to complete harvesting operations. 34 Code of Forest Harvesting Practices
7.2 Road maintenance and closure
The primary and secondary forest road network shall be maintained in good condition. There should be no ruts in the surface and the road surface should be crowned. Likewise all ditches, turnout drains and cross-road drainage that will not be removed shall be left in good working condition.
Roads not to be used until the next rotation shall be closed to all traffic by placing a large log across the
roadway, or digging a ditch across the roadway. For roads that are being decommissioned log culverts and
temporary bridges shall be removed to allow unobstructed water flow. All bridges and permanent culverts
that are not to be removed shall be checked regularly (and at least annually) including decking foundations and sidewalls. All silt traps shall be cleared regularly. Indigenous commercial tree species should be planted on closed roads after operations are completed.
7.3 log landings
All closed log landing sites should be restored so that proper drainage occurs. All areas where water may pond shall be drained, and drains installed. All log landing drains shall be cleared regularly until the landing has stabilized. Indigenous commercial tree species should be planted on the landing after operations are completed. Log landings on clay or loam should be ripped at 90° to the drainage direction to promote natural re-vegetation. Silvicultural treatment shall be introduced through enrichment planting of commercially valued species. Bark and debris should be disbursed evenly across the site to assist in stabilization. The site shall be cleaned of all refuse including oil/fuel drums, wire rope, tires and machinery parts.
7.4 Skid Trails
Temporary skid trail crossings of waterways and gullies shall be removed after completion of harvesting operation in the block. Removal should not disturb the watercourse banks. All material used in the construction of temporary crossings shall be moved at least 10 meters away from the watercourse. Action
shall be taken to restore water flow to its original watercourse where necessary. On higher gradients of skid trails the clearing and maintenance of drains may be required until skid trails
have stabilized. Where it may apply, contractors should plant indigenous commercial tree species in open skid trail areas were it may enrich the species diversity, improve stand quality or provide erosion prevention.
FIGURE 19 DRAIN LOG MAR kETS AND IVERT WATER FLOWING TO AR kETS ONCE LOGGING IS COMPLETED
35 Republic Of Liberia - Forestry Development Authority
7.5 borrow Pits
Borrow pits shall be decommissioned by:
• Removing any non-biodegradable material and burying all biodegradable waste
• Stabilizing steep cuts
• Re-grading the drain on the uphill side and ensuring that runoff cannot enter the pit
• Draining the surface of the pit if water is likely to pond
7.6 Field Camps
Temporary field camps shall be closed by taking the following steps:
• The site shall be cleaned of all refuse including oil/fuel drums, wire rope, tires and machinery parts, as well as building materials, and all biodegradable waste shall be buried.
• All areas where water may pond shall be drained (but drains are not to empty directly into watercourses) and drains shall be cleared regularly until the campsite has stabilized.
• Campsites should be ripped at 90° to the drainage direction to promote natural re-vegetation. Bark and debris should be disbursed evenly across the site to assist in stabilization.
8 OPERATIONA l HYGIENE
Maintenance, servicing and fuelling of logging equipment involves materials which could cause serious harm to soils and waters if released; pollution of groundwater or watercourses by oil, fuel, lubricants or
other hazardous materials will eventually affect all flora, fauna and humans not only near the spill but also
downstream. Not maintaining a clean and tidy operation is a sign of poor worker attitude, careless management and disrespect for the environment.
8.1 Workshop & Wood Processing Facilities
Workshop and wood processing facilities shall be located at least 100 m away from any watercourse or water body. The appropriate public health inspector or similar designated agency may assess plans, approve and inspect workshops, sawmills and associated infrastructure. Approval for their construction may depend upon the preparation of an environmental impact assessment. Provision shall be made in plans for the removal or burial of non-toxic solid waste, and for the collection and disposal at approved designated waste disposal facilities of fuel and oil waste.
8.2 Field Servicing and Maintenance
Field fuel tanks, refueling points, chemical mixing points and maintenance areas shall be located:
• In well-drained areas such as log landings or road junctions.
• Outside areas excluded from harvesting and their buffer strips.
• No closer than 100 m to any habitation
• More than 100 m away from any watercourse. 36 Code of Forest Harvesting Practices
Care shall be taken to prevent spillage during refueling or repairs. Adequate equipment – e.g. hand pumps – should be provided and used. Sump oil shall not be dumped in the harvesting areas, but collected and removed to the designated waste disposal facilities. All containers used in the transport, storage and use of toxic materials shall be leak proof, marked as “hazardous” and clearly labeled with the contents’ name.
8.3 Hazardous Chemical Handling and Storage
Hazardous chemicals include preservatives, pesticides and herbicides. The FDA must be notified and give
approval before a company starts using any pesticide, herbicide or preservative in or near the forest. The company must obtain the relevant “Chemical Technical Data Sheet” and submit a copy to the FDA every
time it is to be used. Chemicals must only be used when necessary to achieve defined management aims
described in the Management and/or Annual Plan, and approved by the FDA, and in strict accordance with the manufacturer’s instructions. The instruction shall specify:
• The types of chemical to be used (oil-borne, organic solvent base, or water-borne)
• % concentrations;
• Active ingredient (toxic component of preservative formulation);
• Application levels ; and
• Method of treatment. Hazardous chemicals shall be stored in a well-drained area at least 100 m from any watercourse and no
closer than 100 m to any habitation. Drains are to be directed to a closed, stable and flood free disposal pit,
situated at least 50 m from a watercourse or water body.
FIGURE 20
ARE SHALL BE
NTO PREVENT
LAGE DURING
REFUELING
37 Republic Of Liberia - Forestry Development Authority
Toxic materials are to be stored in a locked, dry, well-ventilated storeroom. Wet products are to be effectively separated from dry products. All entrances are to be clearly marked with a sign reading “warning – hazardous chemical storage - authorized persons only” or equivalent. Containers should not be stored on
the floor, but are to be elevated above the floor on pallets or other means, to allow regular inspection and rapid identification of leaks. All containers used in the transport, store and use of toxic chemicals are to be
leak proof, marked as “hazardous” and clearly labeled with the contents’ name. Access to the storerooms of toxic materials should be restricted to authorized personnel. It is recommended that concrete bunds with a capacity of twice the storage capacity of the largest storage container are to be provided around all storage facilities.
8.4 Waste Management
Toxic substances include (spent) hydraulic fluid, coolant, lubricants, fuel (gasoline/diesel/kerosene),
industrial cleaners, paints and resins, preservatives (including timber treatment chemicals), distillates, insecticides and herbicides, and workshop waste, waste oil and contaminated sludge Toxic materials shall be collected in containers securely sealed and either dumped at designated waste disposal facilities, waste pits or returned to the supplier in accordance with the approved environmental impact plan.
Only approved waste pits shall be used for specific waste products. All waste pits are to be covered with
at least one (1) m of soil and located at least 100 meters from any watercourse or water body and at least 1- 1.5m above the groundwater table. Signs should be erected identifying the waste pits. Toxic materials shall never be disposed of into watercourses or lakes. Equipment used for applying chemicals shall not be washed in watercourses. Excess chemicals are to be either removed from the forest or chemically treated (neutralized) in an approved manner. Empty containers are to be safely disposed and not reused. All refuse introduced to the forest e.g. pieces of wire rope, packing material, bottles, containers, etc. shall be removed from the forest, placed in a refuse pit, buried and covered to a level surface. Fuel and oil
drums, used oil filters, oily rags, empty grease gun cartridges, worn machinery parts, paint tins, etc. shall be
removed to a designated disposal area; or returned to the supplier. Discarded machinery shall be removed from the contract area to the designated waste disposal facilities.
8.5 Wildlife management in contract areas
• Logging companies shall apply measures to discourage and limit illegal hunting in their concession areas.
• No company workers shall possess and /or transport fire arms, bush meat and/or hunters in
company vehicles, even outside the concession area and a ban on abetting or facilitating hunting;
• All workers are prohibited from hunting outside demarcated Hunting area;
• All workers are prohibited from hunting protected animals;
• All workers are prohibited from using snares;
• All workers are prohibited from selling bush meat(in commercial quantities) in company camps and worksites; 38 Code of Forest Harvesting Practices
8.6 Alternative protein sources for wildlife protection in concession areas
• The company shall make available smoked fish, pork, canned meat, beans, dairy milk, chicken, groundnuts,(leguminous products) and/or fish;
• Encourage fishing using hooks and collection of snails in a sustainable manner;
• Promote activities that provide vegetables or animal proteins.
9 CAMP HYGIENE
Maintenance of safe, healthy and pleasant living and working conditions for personnel is a prerequisite for
a motivated and fit workforce, hence productivity.
9.1 Camp Design
Permanent camps should be protected from wind storm by planting non-invasive and fast growing ornamental species. Grasses around camp building should not be hooked out, but rather periodically trimmed/brushed. This will prevent soil erosion. Site plans for camps should include designs for sewage, water supply, waste water and waste disposal. These will be evaluated as part of the environmental impact assessment that accompanies forest management plans. FDA staff in conjunction with staff from other agencies, such as the EPA, will inspect sites on a regular basis. Camp areas shall be well drained so that water does not pond or create mosquito-breeding areas. The camp shall be checked regularly for any areas where stagnant water can accumulate.
9.2 Water Supply and Domestic Waste Water
Camps are to be supplied with purified potable water obtained from running streams, rainwater, and
wells or by water tanker. All water storage tanks should be properly screened to prevent the breeding of mosquitoes.
9.3 Wastes and Refuse Disposal
An adequate number of plumbed toilets or pit latrines shall be provided. Plumbed toilets should drain into a septic tank. Pit toilets shall be located at least 100 m away from watercourse and water bodies. Sewage shall be discharged so it neither enters the catchments of drinking water supplies, nor intakes into a stream. All pit toilets must be sprayed with environmentally recommended chemicals once every week. Domestic waste water shall be directed to a disposal area (or septic tank) at least 20m away from the nearest building. All drains (waste water and sewage) should be kept covered. Provision shall be made for refuse disposal areas in pits located at least 100 meters away from watercourses, 50meter away from habitation or farmland, The pits shall be dug above the groundwater table, and where runoff water cannot enter. Refuse shall be covered with soil to depth of 30 cm at least once per every one month. And it shall be sprayed once every week with biocide but not with fuel oil alone. 39 Republic Of Liberia - Forestry Development Authority
9.4 Camp Construction Requirement
• All permanent buildings in concession areas shall be made of solid materials such as cement, bricks, stone, processed hard wood and designed with comfort and convenience in mind;
• All camp houses and roads shall be lit at night and equipped with drinking water points (stand pipes) Living quarters for workers shall have:
• Clean running water;
• Lighting and power socket;
• Sanitary facilities (shower and toilet) draining to a septic tank A camp located at some distance from the social, school and commercial facilities of a town or village shall have:
• A dispensary with treatment and recovery rooms for basic medical assistance, and equipped with basic medical supplies;
• In case of emergency, there shall be an evacuation procedure ( rescue chain) for severe accidents and emergencies with rescue equipment;
• A primary school;
• A company store offering basic goods at competitive prices, with ample stocks of meat, poultry and
fish to reduce pressure on local wildlife (hunting)
• Social and cultural facilities: club, video room, church All logging camps shall be supplied with clean water that shall be duly tested on a regular basis. Any
necessary filtering and treatment shall be provided at the source.
9.5 Additional Facilities
Medical care shall be provided by the company whether or not public health services are available in the area where workers and their families live. Educational, recreational and spiritual services should be provided, where such services are not available nearby.
10 HEA lTH AND SAFETY 10.1 General
Employers have the main responsibility for safety and health in forestry work. They shall install and maintain work systems and methods which are safe and without risk to health. Employers shall provide insurance for all employees and workers. All machine operators shall receive the necessary training and instruction to ensure competency to safely operate equipment for the job they are assigned to do.
Operators should know what the job requirements are, what other machines are working in the area, and
be aware of any hazardous conditions that may arise. 40 Code of Forest Harvesting Practices
Basic first-aid training (and refresher courses) should be provided to all personnel involved in field
operations, wood processing, workshop, etc. All logging companies shall install a system whereby accidents, dangerous occurrences and occupational diseases are reported, recorded and investigated, and ensure that the necessary adjustments are made to prevent or reduce the incidence of these accidents, dangerous occurrences and occupational diseases in the future. Working hours shall not exceed the number prescribed by national law or collective agreements. Working hours shall be arranged to provide adequate periods of rest, which include: short breaks during work hours,
sufficient breaks for meals, nightly rest and weekly rest.
10.2 Emergency Rescue
Provision shall be made for the quick evacuation of a person in the event of an injury or illness that requires medical assistance. Radio or telephone links shall be available at the worksite to contact rescue services in case of an emergency. Where professional help is not available within a reasonable distance, consideration should be given to the creation of the necessary dispensing and health-care facilities.
10.3 Felling
10.3.1 Protective Clothing and Safety Equipment
A first-aid kit shall be provided to every felling crew and located close to where felling crews are working.
All felling crew members shall be provided with and wear:
• Safety helmet (that shall be replaced every year/once it is damaged before the end of the year)
• Hearing protection (e.g. earmuffs or earplugs whether damage or not;
• Safety boots with steel toecaps Additionally chain-saw operators shall be provided with and wear:
• Chain-saw gloves lined with cut-resistant material
• Eye protection (e.g. mesh face guard, goggles)
• Leg protection lined with cut-resistant material (e.g. chain-saw chaps)
10.3.2 Equipment Safety
All chain-saws shall be maintained in good working order and all safety devices shall be operational at all
times. Specifically all chain saws should be equipped with:
• A chain brake, which is activated manually by the front handle guard
• A front handle guard for protection of the left hand from the chain
• An on/off switch which is reachable with the right hand on the throttle
• A throttle control lock-out which prevents the chain-saw from being started unexpectedly, because two levers have to be pressed simultaneously
• A rear handle guard for protection of the right hand in case of chain breakage
• An anti-vibration system, consisting of rubber shock absorbers between the
engine block and handles 41 Republic Of Liberia - Forestry Development Authority
• A chain catcher
• A spiked bumper (for safe and accurate cross-cutting)
• An exhaust that directs fumes away from the operator
• A chain guard for avoiding injuries and protecting the chain during transportation
• A chain-saw toolkit for corrective and preventative maintenance.
10.3.3 Safe working practice
Chain-saw operators should always have an assistant and shall never work alone in case of accidents. No persons should approach closer to the feller than twice the height of the tree being felled, unless the feller
has acknowledged that it is safe to do so. Operators should clear undergrowth and debris away from the
base of the tree to provide an adequate and safe working space. Two alternative escape routes should be
cleared - one at 135° and one at 215° - to the intended felling direction (see fig. 21).
Chain saws should not be operated above shoulder height because of the risk of kickback and the resulting backward rotation of the guide-bar. The use of machines to pull trees while they are being cut should never be permitted.
10.4 Heavy Machinery
10.4.1 Definition
Heavy machinery includes bulldozers, skidders and log loaders, motor graders, excavators, etc.
10.4.2 Protective Clothing and Safety Equipment
Operators of heavy machinery and their assistants shall be provided with and wear:
• Safety helmet (that shall be replaced every year)
• Hearing protection (e.g. earmuffs or earplugs)
• Safety boots with steel toecaps
• Heavy-duty work gloves (for handling wire rope)
• Dust masks or respirators when appropriate
FIGURE 21 CLEAR TWO
ALTERNATIVE
ESCAPE ROUTE
42 Code of Forest Harvesting Practices
10.4.3 Equipment Safety
All heavy equipment requires regular maintenance to achieve and maintain safety standards and good working condition. All heavy machinery shall be equipped with:
• A safety cab which conforms to the Roll Over Protection Structure (ISO 3471 and ISO 8082) and Falling Object Protection Structure (ISO 8083) standards
• Access to and exit from machinery designed to provide hand and footholds of a convenient height and spacing
• Securely mounted seats and seat belts
• Rear portion of cabs fitted with protective wire mesh (except loaders, excavators and graders)
• Reversing alarms to alert people machines are backing up
• Securely guarded pulleys, shafts, belts and fan blades
• Engine emergency stopping devices that are not self-returning, those are clearly marked, and easily accessible from the normal operating position. The engine starter should be interlocked with the transmission or clutch to prevent the engine from starting when left in gear.
• Parking brakes must be capable of keeping the machine and its rated load stationary on all slopes likely to be encountered
• First-aid kit and fire extinguisher (operators should be trained in their use)
• Exhaust systems fitted with spark arrestors
Farm tractors not equipped with the provisions listed above shall not be used for timber extraction.
No modifications shall be made to a machine that:
• Interfere with operator visibility
• Interfere with access to and exit from the machine
• Exceed the rated payload or gross combination weight of the machine resulting in overloading the
braking and/or steering system or the ROPS capacity rating The safety cab of any item of heavy machinery shall not be modified, drilled, welded or altered in any way
nor should any attempt be made to straighten any part of the frame when it has suffered damage.
10.4.4 Skidding
Skidding should not be carried out in site conditions where the stability of the machine cannot be assured.
Skidding across slopes should be avoided because of the significant decrease in skidder stability. No objects
(equipment) shall be carried on the skidder unless a space is provided for that purpose and the object can
be firmly fixed into place.
10.5 Vehicles
10.5.1 Equipment Safety
All vehicles, including logging trucks, dump trucks, fuel tankers and personnel carriers, require:
• Regular maintenance to achieve and maintain safety standards and a roadworthy condition
• Full insurance 43 Republic Of Liberia - Forestry Development Authority
• Compliance with national requirements for safety and mechanical roadworthiness
• Securely mounted seats and seat belts
• Securely guarded pulleys, shafts, belts and fan blades
• First-aid kit and fire extinguisher
To protect the cabin from penetration logging trucks should incorporate an adequate log barrier or guard between the load and the cabin.
Logging machinery and vehicles using public roads shall have an amber flashing light on top of the cab or
other prominent point installed and reversing alarms.
10.5.2 Safe Working Practice
Trucks shall not be overloaded. All loads shall be secured with at least two approved load binders. Protruding limbs, bark and trailing material shall be removed before the truck leaves the log landing. Side stanchions on trucks and trailers shall be vertical after loading and bunks aligned properly.
10.6 Hazardous Chemicals
Workers applying hazardous chemicals must receive training and full information on the risks involved in
the use of protective equipment and first-aid techniques. Workers handling chemicals must wear protective
clothing as recommended on the container label. It is the company’s responsibility to ensure that its workers use all protective clothing provided. Chemicals must always be utilized with the proper equipment, as recommended by the manufacturer. The equipment must function properly and be free from leaks and blockages. Worker should be allowed to take bath or properly clean him or herself with water immediately after using the spraying chemical.
10.7 Workshop and log Yard Workers
Workshop mechanics and other workers, and workers in log yard areas shall be provided with and wear protective clothing, hearing protection, eye protection, respirators, and/or gloves, as appropriate for the equipment being used (e.g. welding, angle grinding, spray painting).
10.8 Fire Precautions
Operations shall cease in times of high fire risk. All machines and chain-saws should be fitted with spark
arrestors. Machinery should be clear of surplus oil and fuel. Any rubbing, damaged, frayed, kinked or
leaking hydraulic hoses and fittings should be replaced. Refueling shall only be carried out in designated areas where the ground is clear of all inflammables for a distance of 5 meters in all directions from the
machine.
All welding activities shall be done at least 10 meters away from flammable materials. No fire shall be left unattended in the forest, and fires for cooking or other purposes shall only be lit in designated areas cleared of flammable material within a 5-m radius around the fire. 44 Code of Forest Harvesting Practices
11 HARVEST CONTRO l, MONITORING AND ASSESSMENT
Harvesting assessment is a systematic check to be taken to determine or verify that harvesting operations
followed the annual harvest plan and achieve its technical, financial and environmental objectives while
complying with established standards of management plan guidelines. Monitoring and assessment are key elements of sustainable forest management which the contract holder shall be responsible to conduct. The Authority and contract holder shall provide opportunity for independent monitoring and evaluation:
• During harvesting through the monitoring and control of operations;
• After harvesting by means of internal and external assessment. All monitoring requirements established in the Timber Sale and Forest Management Contracts and
regulation shall be implemented and regulated under the supervision of the FDA contracting officers.
12 SOCIA l ISS uES 12.1 land and forest use rights and responsibilities
All contract holders shall be expected to respect legal or customary rights to land and forests, as well as respect for cultural, traditional and local values and customs Forest management contracts and timber sales contracts provide the contract holders and operators with a right to operate in a given area. Contract holders should immediately inform the FDA of any illegal forestry activity in their contract area.
Social agreements between contract holders and affected local forest communities define and describe the codes of conduct and other agreements concerning forest use rights and responsibilities, benefit sharing
arrangements, the use of local labor, compensation for crop damage, etc., between the two parties. They
also describe conflict management arrangements.
12.2 Work place relations, rights and responsibilities
12.2.1 Terms and conditions of employment
The terms and conditions of employment shall be in accordance with Liberian labor laws.
12.2.2 Equal opportunity employment
• Women and men shall be paid equal remuneration for the same work or work of equal value.
• Employers will maintain registers of all employees, together with employment records (including PAYE and NIS contributions). These registers will be available for scrutiny by the FDA and other relevant government agencies
• Employees shall not be discriminated against based on race, sex, religion, colour, or ethnic origin or sickness. 45 Republic Of Liberia - Forestry Development Authority
12.2.3 Prohibition against forced labor
• Employers shall ensure fair remuneration and humane working conditions in return for all services rendered
• Given the nature of forest management practices and the logging industry employers shall inform employees of the terms and conditions of service prior to the time they are hired, and prior to the assumption of duties, an employer shall document and inform an employee of his/her wages by
task or by day (or other specified time period).
• Employers shall observe ILO Convention 182 on forced labour.
• Employers shall not knowingly employ persons under the age of 14 in keeping with the International
Labour Organization Convention 182
12.2.4 Employment and training opportunities for local populations
• Contract holders should give priority to employing equally qualified persons who live in
communities within or adjacent to the contract area.
12.2.5 Education and training for workforce and local populations
• A range of educational and skills training programs for the purpose of enhancing workers’ job performance and promotion within the workplace should be made available on an appropriate basis, and as included in the contract holder’s business plan.
• Educational and vocational skills programs should be made available to communities within or adjacent to the contract area.
• Wherever possible, certification for educational and skills training programs should be issued by a
recognized institution or body.
12.2.6 Protection of Forest Wildlife Resources
The contract holder shall apply appropriate measures to discourage and limit illegal hunting including:
• A prohibition on all workers from possessing and/or transporting firearms, bush meat and/or
hunters in company vehicles, even outside the concession area.
• A prohibition on all workers from hunting protected animals. Transgressors should be reported to the FDA and local police for prosecution.
• A prohibition on all workers from using snares.
• A prohibition on selling or preparing bush meat in company camps and worksites
• Reporting all illegal activities promptly to FDA and other relevant authorities. 46 Code of Forest Harvesting Practices
13 GlOSSARY
Abutment End support for bridge culvert or similar structure Adverse grade Grade up which a loaded logging truck must travel Batter Inclination or shape of a cutting beside a road or track Berm Ridge of soil typically along the outside edge of a road shoulder or skid trail. It intentionally or unintentionally directs surface runoff onto or alongside the roadbed or skid trail Biodegradable Capable of being decomposed by bacteria, fungi or other living organisms Biodiversity The range of diversity of plants or animals, including the diversity of different species,the variation found within species and the variety of ecosystems
Borrow pit An area where excavation takes place to produce materials for earthwork, such as fill
material for embankments and surfacing material. It is typically a small area outside the roadway for obtaining sand, gravel, laterite, or loam without further processing Box cut A road cut through a hill slope or, more commonly a ridge, in which there is a cut slope on both sides of the road. Also called through cut Bucking Cross-cutting of a log in shorter sections Bridge A structure that provides for vehicle access over a watercourse Buffer strip Strip of vegetation left intact along a watercourse or other sensitive area or site during and after logging. Buttress A ridge of wood that develops in the angle between a lateral root and the base of a stem to provide lateral root stability to the stem Camber The amount of cross-fall on a road Catch drain A drain constructed above a batter to prevent erosion of the batter by surface water Catchment An area or basin of land bounded by natural geomorphologic features such as hill crests
and ridges from which water drains and flows to a watercourse, lake, wetland or estuary
Chain brake A safety device on a chain-saw designed to stop the chain in the event of a kick-back
Channel A waterway that contains flowing water either periodically or continuously. A channel has a defined bed and banks that confine the water
Chaps Chainsaw chaps are half-trousers which are contain material designed to protect againstchain-saw cuts 47 Republic Of Liberia - Forestry Development Authority
cm centimeter Compaction The process of reducing the apparent volume of the soil, by reducing the empty spaces
between particles and increasing the density of the soil under the influence of pressure.
Compaction is desirable when a soil is to be used as the base of a road, because it improves
stability and reduces infiltration. For the same reasons, compaction is undesirable in the
forest, because it has a negative effect on plant growth and survival and soil life. Compartment A sub-division of a concession frequently of several thousand hectares. It is normally
defined along natural boundaries
Competency A concept that focuses on what is expected of a person in the workplace rather than on the learning process. It embodies the ability to transfer and apply skills and knowledge to new situations and environments Corduroy Cording or matting involving the use of suitable logs to spread the weight of the load and separate machine tyres or tracks from direct soil contact during harvest operations, thus reducing ground pressure and rutting
Coupe A defined area of forest of variable size, shape and orientation, on which harvesting
takes place; usually to be harvested over one year Cross-cutting Cutting through a felled log. Sometimes called bucking Cross-drain A ditch and earth bank constructed at approximately right angles to a track, preventing water from building up speed along the track and allowing redirection of running water into surrounding areas Crown A crowned road surface has the highest elevation at the centre line (convex) and slopes down on both sides. Crown is used to facilitate draining water off the road surface Cultural area Area of social, cultural, historical, religious, spiritual, archaeological or anthropological importance to forest dwellers; usually to indigenous populations. Includes villages, farms, gardens and sites which are culturally sensitive. Culvert A conduit, typically of made of metal, concrete, plastic or (hollow) logs, set beneath the road surface, to move water from the inside of the road to the outside of the road. Culverts are used to drain (inside) ditches and watercourses (commonly gullies) that cross the road. Also called koker
Cut-and-fill A method of road construction in which a road is built by cutting into the hillside and spreading the spoil materials in adjacent low spots and as compacted or side cast fill slope material along the route. A ‘balanced cut-and-fill’ utilizes all of the ‘cut’ material to generate the ‘fill’. In a balanced cut-and-fill design, there is no excess waste material and there is no need for hauling additional fill material. Thus, cost is minimized. Cut slope The artificial face or slope cut into soil or rock along the inside edge of the road 48 Code of Forest Harvesting Practices
Cutting cycle In selective (polycyclic) harvesting systems: the planned number of years
between successive harvests on an area of forest. It is also referred to as felling cycle Dbh Diameter at breast height; 130 cm above the ground
Debris Organic material, rocks and sediment (leaves, brush, wood, stones, rocks, rubble, etc.)
often mixed, that is undesirable in a channel or drainage structure. Compare sediment
Directional A concept that focuses on predetermining the final direction of fall of a felling felled tree. It includes selecting a particular direction of fall based on a predefined set of criteria and the
felling techniques and aids involved in felling the tree in the selected direction Ditch A channel or shallow canal along the roadbed intended to collect water from the road and adjacent land for transport to suitable point of disposal. Also called table drain or (incorrectly) side drain Erodibility See soil erodibility Erosion See soil erosion Exclusion area Area which is excluded from harvesting Favourable Grade down which an unladen logging truck must travel grade
Feeder road A road connecting log markets to a secondary or primary road; also called spur road Fill Excavated material placed on a prepared ground surface to construct the road sub-grade and roadbed template. Also called embankment Fill slope The inclined slope extending from the outside edge of the road shoulder to the toe of
the fill. Also called embankment slope
Flood plain A level or gently sloping area on either side of a watercourse contemporary channel that
is submerged at times during high water of periods of flooding.
Ford A rock, other hardened or corduroy structure that is built across the bottom of a watercourse channel that is usually dry, to allow improved vehicle passage during periods
of low water or no flow and minimizes channel disturbance or sediment production
FMC A Forest Management Contract is for greater than 50,000 ha and duration of 25 years. Geotextile Any permeable textile material used with soil, rock or any other geotechnical engineering related material, as an integral part of a man made product, structure or system, usually related to the passage of water Grade The slope of the road along its alignment. This slope is expressed in percent – the ratio of elevation change compared to distance travelled. Also called gradient 49 Republic Of Liberia - Forestry Development Authority
Groundwater The part of the subsurface water that is in the zone of saturation, including underground streams Guard log Log along the outside of a bridge, above the main stringer logs to prevent gravel from falling off the bridge into a watercourse
Gully Steep sided drainage channel where water may flow during a wet season or only after a rainfall Gullying Scouring of the soil by high velocity water flow resulting in channels where water runs
down a slope, embankment or roadbed ha hectare Habitat tree A habitat tree is a mature living tree selected to be retained during harvesting because it has features of special value for wildlife (e.g. hollows). Harvesting Broken logs, branches, twigs, vines, epiphytes and other tree related debris vegetative material brought down as a result of felling or skidding Hauling Transport of forest products, particularly logs, from the log market to the processing facility, commonly by way of logging trucks Headwall A concrete, masonry or timber wall built around the inlet or outlet of a culvert to
increase inlet flow capacity, reduce risk of debris damage, retain the fill material and
minimize scour around the culvert inlet or outlet Hung-up trees: A tree which has not completely reached the ground following cutting
Inlet The opening of a drainage structure or culvert where the water first enters the structure
In-slope The inside cross-slope of a road surface, typically measured in percent. In-slope is used to facilitate the draining of water from a road surface to an inside ditch. An in-sloped road has the highest point on the outside edge of the road and slopes downward to the ditch at the toe of the cut slope, along the inside edge of the road Integral arch An extension to the body of extraction equipment, which raises the anchor point of the wire rope and thereby lifting the load off the ground, also called logging arch Junking Trimming of the butt end of a felled log. Also (incorrectly) called bucking km kilometer Landing See log market Logging Logging is the process of harvesting timber from trees. This includes felling, skidding, loading and transporting forest products, particularly logs. Pre-harvest inventory, tree and skid trail marking can be part of the process Log deck See log market 50 Code of Forest Harvesting Practices
Log market A cleared area, usually adjacent to the roadbed where logs are assembled after being skidded, awaiting subsequent handling, loading and transport. Also called ramp, log deck or landing Logging arch See integral arch m meter mm millimeter m2 square meters m3 cubic meters
Outlet: The opening of a drainage structure or culvert where the water leaves the structure. The outlet should be lower than the inlet to ensure that water flows through the structure Out-slope The outside cross slope of a road surface, typically measure in percent. Out-slope is used to
facilitate the draining of water from a road or trail directly off the outside edge of the road or trail. An out-sloped road or trail has the highest point on the uphill or inside of the road or trail and slopes down to the outside edge of the road Potential crop Stems of commercial species remaining after the cut and forming the basis tree of subsequent cutting cycles Riprap Layer of large, durable materials (usually stone or rock) used to protect exposed soil to minimize erosion Roadbed The formation between the ditches or tops of embankments, including the travel way and shoulders Roadway The formation between the extreme limits of the earthworks, from the top of the
cut slope to the toe of the fill or graded area. Also called road formation or width of
earthworks Road reserve The area that corresponds to the limit of the ground affected by the road, usually equals the width of clearing Rutting Road or skid trail surface damage in the form of deep tracks made by the passage of wheels or tracks. This typically a result of high wheel pressure on saturated or low
load bearing soils. These conditions worsen with heavy loads, high traffic volumes and
inclement weather conditions Scour Erosion or soil movement in a watercourse bed, bank, channel, or behind a drainage structure, typically caused by increased water velocity or lack of protection Sediment Fragments of rock, soil, and organic material transported and deposited in bed by water, wind or other natural phenomena Sedimentation Deposition of material suspended in water or air, usually when the velocity of the transportation medium drops below the level at which the material can be supported 51 Republic Of Liberia - Forestry Development Authority
Sediment trap See silt trap SFP State Forest Permit; non-exclusive permit allowing the holder to remove a certain quota of timber from an area, valid for one year
Shoulder The strip along the edge of the travel way on either side of the road, commonly flush with
the travel way for roads on stabilised soil. It is generally only used by passing vehicles but may be used for travel by track machines. Also called verge
Side cast Road construction material that is not used for fill and is pushed to or placed on the
down slope side of the road. Such material may travel long distances down slope before coming to rest Side drain See ditch Silt trap Hole created to divert sediment laden water, creating enough residence
time to allow solid material in suspension to drop out, before it is diverted
back into a body of water or drainage structure Sight distance The distance along a road or track that a driver can see other objects
(usually other vehicles) Skidding A method of ground-based extraction in which logs, poles or whole trees are dragged from the felling point to the log market, commonly by means of a tractor equipped with a cable-arch or a grapple known as a skidder, but also by means of farm tractors, crawler tractors, or bulldozers equipped with a winch or chains. Also called yarding Skid trail Trail along which a log is dragged by a extraction machine to the log market Soil erodibility The inherent susceptibility of a soil to erosion Soil erosion The process by which soil particles and aggregates are worn away and moved by the actions of wind or water in the from of raindrops, surface runoffs, and waves Spoon drain A shallow open drain, normally traversable by vehicles designed to carry water to the side of a road or skid trail Stakeholders Individuals or groups of individuals who have an interest in, or an impact on, the outcomes of a decision as well as groups or individuals dependent to some degree on the outcome for their personal or institutional goals
Stanchions Upright posts or supports for confining logs on trucks, trailers or other vehicles
Strategic plan Long term plan, which provides a broad description and broad details of future harvesting and management. 52 Code of Forest Harvesting Practices
Sustainable The process of managing forests to achieve one or more clearly specified objectives of management with regard to the production of a continuous flow of desired forest products
and services, without undue reduction of its inherent values and future productivity and without undue undesirable effect on the physical and social environment. Swamp A generally or permanently waterlogged area which may or may not have associated tree or palm vegetation; or a tract or low, poorly drained ground with patches of open water in which reeds, rushes and sedges occur. Swamp sediments are dominated by still water deposits, commonly with high organic content Table drain See ditch Temporary A crossing of a watercourse by a skid trail or road construction equipment designed for removal following short term use, having a designated opening to take typical peak
flows, e.g. a log culvert, and a cover of slash or small stems for a running surface Topping Severing the crown of a felled tree from the usable stem, usually at the fist heavy branch.
Also called junking Travel Way That portion of the road constructed for use by moving vehicles (excluding shoulders).
Also called Carriageway
TSC Timber Sales Contract; contract of less than duration of ≥ 3 years and a total area ≥
5,000 ha
Turbid water Water bearing significant quantities of soil particles
Turnout drain Excavations designed to divert water away from the ditch and roadway in order to reduce the volume and velocity of roadside ditch water. Also called outlet, lead-off, mitre or side drain Unstable areas Sites susceptible to one of the forms of mass soil movement or accelerated soil erosion as a result of the interaction of such factors as steepness, soil properties, parent and surface
geology and the position in the land form profile
Verge See shoulder Washboard A series of ridges and depressions across the road caused by soil and aggregate road
surfaces by the lack of surface cohesion. This typically is a result of the loss of fines in
the road surface caused by dry conditions or poorly graded material. These conditions
worsen with excessive vehicle speeds and high traffic volumes
Water body Watercourses and surface water such as lake, lagoon, sea or ocean
Watercourse Defined depression or channel that receives and conducts perennial or intermittent flows of surface water for part or all of the year in most years. Watercourses includes
rivers, creeks, gullies and waterways forest management crossing 53 Republic Of Liberia - Forestry Development Authority
Wedge A high impact plastic, aluminum or hardwood wedge driven into the back-cut to assist felling Wire rope Flexible twined metal alloy or steel rope to tie, pull or lift loads; in this context the cable by which logs are winched or attached to the skidder. Also cable Winch A rotating powered drum used to haul in or pay out a cable (wire rope) Wing wall Masonry, concrete or timber structures built onto the side of culvert inlet and outlet
headwalls or bridge abutments, designed to retain the roadway fill and direct water into
or out of the drainage structure or underneath the bridge while protecting the road and
fill from erosion. 54 Code of Forest Harvesting Practices
14 APPENDIX
DBH Cutting Limits
DIAMETER AT BREAST HEIGHT CUTTING LIMITS Species (Trade Name) Minimum Diameter Limit (cm) Species (Trade Name) Minimum Diameter Limit (cm)
Afzelia spp. (Doussie, Apa) 70 Alstonia boonei (Emien) 70 Aningeria robusta (Aningerie) 80 Antiaris africana (Ako) 60 Chlorophora excelsa (Iroko,
Odoum) 80 Bombax spp. (Kapokier) 70 Entandrophragma angolense (Tiama, Edinam) 90 Brachystegia leonensis (Naga) 90 Entandrophragma candollei (Kosipo) 90 Canarium schweinfurthii (Aiele) 80 Entandrophragma cylindricum (Sapeli) 90 Ceiba pentandra (Fromager) 90 Entandrophragma utile (Utile, Sipo) 100 Daniellia spp. (Fara) 70 Guarea cedrata (Bosse) 80 Didelotia spp. (Broutou, Zing, Bondu) 60 Guibourtia ehie (Amazakoue) 60 Distemonanthus benthamianus (Movingui) 80 Khaya spp. (Khaya, Acajou) 70 Erythrophleum spp. (Tali, Sassawood) 80 Lovoa trichilioides (Lovoa, Dibetou) 70 Gilbertiodendron spp. (Limbali) 60 Mansonia altissima (Bete) 60 Lophira alata (Azobe, Ekki) 80 Mitragyna ciliata (Abura, Bahia) 80 Mammea africana (Oboto,
Kaikumba) 60 Nesogordonia papaverifera (Kotibe) 60 Nauclea diderrichii. (Kusia, Bilinga) 80
Pycnanthus angolensis
(Ilomba) 70 Piptadeniastrum africanum (Dahoma, Mbeli) 80 Tarrietia utilis (Niangon) 60 Pterygota macrocarpa (Koto, Ake) 60 55 Republic Of Liberia - Forestry Development Authority
Terminalia ivorensis (Framire) 70 Sacoglottis gabonesis (Ozouga,
Akouapo) 70 Terminalia superba (Limba, frase, Afara) 70 For all other species, not listed above 60 Tetraberlinia tubmaniana (Sikon) 60 Tieghemella heckelii (Makore, Douka) 100 Triplochiton scleroxylon (Wawa,
Samba, Obeche) 90 Turreanthus africanus (Avodire) 80 56 Code of Forest Harvesting Practices
Slope Angles in Degrees and Per Cent
Degrees (°) Per cent (%) Per cent (%) Degrees (°)
1 2% 1% 0.6 2 3% 2% 1.1 3 5% 3% 1.7 4 7% 4% 2.3 5 9% 5% 2.9 6 11% 6% 3.4 7 12% 7% 4.0 8 14% 8% 4.6 9 16% 9% 5.1 10 18% 10% 5.7 11 19% 12% 6.8 12 21% 14% 8.0 13 23% 16% 9.1 14 25% 18% 10.2 15 27% 20% 11.3 16 29% 22% 12.4 17 31% 24% 13.5 18 32% 26% 14.6 19 34% 28% 15.6 20 36% 30% 16.7 21 38% 32% 17.7 22 40% 34% 18.8 23 42% 36% 19.8 24 45% 38% 20.8 25 47% 40% 21.8 26 49% 42% 22.8 27 51% 44% 23.7 28 53% 46% 24.7 29 55% 48% 25.6 30 58% 50% 26.6 31 60% 55% 28.8 32 62% 60% 31.0 33 65% 65% 33.0 34 67% 70% 35.0 35 70% 75% 36.9 57 Republic Of Liberia - Forestry Development Authority
36 73% 80% 38.7 37 75% 85% 40.4 38 78% 90% 42.0 39 81% 95% 43.5 40 84% 100% 45.0 41 87% 42 90% 43 93% 44 97% 45 100% I3564E |
10523 | https://math.stackexchange.com/questions/471014/an-irreducible-f-in-mathbbzx-whose-image-in-every-mathbbz-p-mathbb | number theory - An irreducible $f\in \mathbb{Z}[x]$, whose image in every $(\mathbb{Z}/p\mathbb{Z})[x]$ has a root? - Mathematics Stack Exchange
Join Mathematics
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Mathematics helpchat
Mathematics Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
An irreducible f∈Z[x]f∈Z[x], whose image in every (Z/p Z)x[x] has a root?
Ask Question
Asked 12 years, 1 month ago
Modified12 years, 1 month ago
Viewed 1k times
This question shows research effort; it is useful and clear
14
Save this question.
Show activity on this post.
Problem: Is there an irreducible f∈Z[x]f∈Z[x], whose image in every (Z/p Z)x[x] has a root for p p prime? If there is, what is the minimal degree possible?
I can only prove that x 2−c x 2−c is impossible, by quadratic reciprocity and Chinese remainder theorem. Even the case of a x 2−c a x 2−c is unknown to me.
Meanwhile, if f f is not required to be irreducible, but only have no root in Z Z, then (x 2−a)(x 2−b)(x 2−a b)(x 2−a)(x 2−b)(x 2−a b) is a solution for non-sqaure a,b,a b a,b,a b, since if both a,b a,b are not squares in Z/p Z Z/p Z, then a b a b is a square. Yet I still don't know if this is of minimal degree.
Also, it is natural to pose generalizations
When p p is not necessarily prime (equivalently for all prime powers).
When p p is odd prime.
When p p represents sufficiently large primes (equivalently all but a finite number left).
number-theory
irreducible-polynomials
Share
Share a link to this question
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this question to receive notifications
asked Aug 19, 2013 at 7:51
Ash GXAsh GX
1,379 10 10 silver badges 22 22 bronze badges
1
Maybe you should assume deg f>1 degf>1, or it will be trivial.Wei Zhan –Wei Zhan 2013-08-19 08:11:33 +00:00 Commented Aug 19, 2013 at 8:11
Add a comment|
2 Answers 2
Sorted by: Reset to default
This answer is useful
11
Save this answer.
Show activity on this post.
No. In fact, if f f is an irreducible polynomial of degree at least 2 2 then there are infinitely many primes p p such that f f does not have a root mod p mod p.
The argument is standard and goes as follows. A theorem of Dedekind asserts that if f f factors as a product ∏f i(x)mod p∏f i(x)mod p of irreducible polynomials, and if p p does not divide the discriminant of f f, then some element of the Galois group of f f has cycle type (deg f 1,deg f 2,...)(degf 1,degf 2,...). The Frobenius density theorem (a weaker version of the Chebotarev density theorem) asserts that the converse holds in the following sense: if some element of the Galois group of f f has a given cycle type, then a positive proportion of primes has the property that the factorization of f mod p f mod p has the same cycle type. In particular, if some element of the Galois group of f f has no fixed points, then a positive proportion of primes has the property that f f has no roots mod p mod p.
But the Galois group of f f acts transitively on its roots, and we have the following general result.
Lemma: Let G G be a finite group acting transitively on a set S S of size greater than 1 1. Then some g∈G g∈G does not have a fixed point.
Proof. By Burnside's lemma,
1=1|G|∑g∈G|Fix(g)|1=1|G|∑g∈G|Fix(g)|
so the average number of fixed points of a random element of G G is 1 1. On the other hand, id∈G id∈G has |S|>1|S|>1 fixed points. Hence some element must have less than 1 1 fixed point, which can only mean that it has no fixed points. □◻
The conclusion follows.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
edited Aug 19, 2013 at 9:57
answered Aug 19, 2013 at 9:52
Qiaochu YuanQiaochu Yuan
475k 55 55 gold badges 1.1k 1.1k silver badges 1.5k 1.5k bronze badges
1
However, it is possible for f f to be reducible mod p mod p for all primes p p, and here the minimal degree is 4 4. The argument is very similar to the above: a necessary and sufficient condition is that the Galois group of f f doe snot contain an n n-cycle, where n=deg f n=degf.Qiaochu Yuan –Qiaochu Yuan 2013-08-19 09:59:31 +00:00 Commented Aug 19, 2013 at 9:59
Add a comment|
This answer is useful
4
Save this answer.
Show activity on this post.
Looking at the Galois group of the polynomial as a subgroup G G of S n S n, we can translate your requirements as conditions on G G :
(i) f f has a root mod p p for every prime p p iff every element of G G has a fixpoint (by Cebotarev's theorem)
(ii) f f is irreducible in Q[x]Q[x] iff G G is transitive.
(iii) f f has a rational root iff every element of G G has a common fixpoint.
I don't think satisfying (i) and (ii) is possible.
(x 2−a)(x 2−b)(x 2−a b)(x 2−a)(x 2−b)(x 2−a b) gives the subgroup of S 6 S 6 generated by (12)(34)(12)(34) and (12)(56)(12)(56). It satisfies (i) and not (iii).
We can also achieve (i) and not (iii) with n=5 n=5 by using G G generated by (123)(123) and (12)(45)(12)(45). For example, with something like f(x)=(x 3−x+1)(x 2+23)f(x)=(x 3−x+1)(x 2+23)
Finally, we can enumerate the possible subgroups of S 2,S 3,S 4 S 2,S 3,S 4 to check that none of them satisfy (i) and not (iii), so n=5 n=5 is the minimal degree possible.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
edited Aug 19, 2013 at 9:30
answered Aug 19, 2013 at 9:22
merciomercio
51.3k 2 2 gold badges 84 84 silver badges 134 134 bronze badges
Add a comment|
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
number-theory
irreducible-polynomials
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Linked
7Polynomial with a root modulo every prime but not in Q Q.
11Integer polynomials with roots in every Z p Z p but no rational roots.
4Is the polynomial x 5+5 x−10 x 5+5 x−10 is solvable by radicals over Q Q?
0About the factorization of polynomials mod p
Related
2Is x 8+1 x 8+1 irreducible in R[x]R[x]
1Cases where irreducibility of polynomials over F⟺F⟺ it has no roots in F F
5All primes p p for which x 2+1 x 2+1 irreducible over F p F p
0If x p−x−c x p−x−c is irreducible in F[x]F[x] then it has no root in the field.
1Number of irreducible divisors of x p q−x∈F p x p q−x∈F p
9Why is x 4−4 x+2 x 4−4 x+2 irreducible over Q(i)Q(i)?
0Irreducible cubic polynomial in Q[x]Q[x] has no roots in Q(2–√,5 1/4)Q(2,5 1/4)
3factoring a cyclotomic polynomial modulo a prime
Hot Network Questions
Matthew 24:5 Many will come in my name!
Identifying a thriller where a man is trapped in a telephone box by a sniper
If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church?
What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel?
What's the expectation around asking to be invited to invitation-only workshops?
Origin of Australian slang exclamation "struth" meaning greatly surprised
Passengers on a flight vote on the destination, "It's democracy!"
How long would it take for me to get all the items in Bongo Cat?
Is it ok to place components "inside" the PCB
Numbers Interpreted in Smallest Valid Base
Riffle a list of binary functions into list of arguments to produce a result
Calculating the node voltage
Lingering odor presumably from bad chicken
How can blood fuel space travel?
My dissertation is wrong, but I already defended. How to remedy?
Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term?
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
Alternatives to Test-Driven Grading in an LLM world
How do you emphasize the verb "to be" with do/does?
What’s the usual way to apply for a Saudi business visa from the UAE?
How to use \zcref to get black text Equation?
Who is the target audience of Netanyahu's speech at the United Nations?
Can you formalize the definition of infinitely divisible in FOL?
Is there a specific term to describe someone who is religious but does not necessarily believe everything that their religion teaches, and uses logic?
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Mathematics
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
10524 | https://artofproblemsolving.com/wiki/index.php/AM-GM_Inequality?srsltid=AfmBOoo_fdUnHNX9KsDY5aEvGMfhVKMvnHSk40wXQfQ-GHVXlFsfgXZj | Art of Problem Solving
AM-GM Inequality - AoPS Wiki
Art of Problem Solving
AoPS Online
Math texts, online classes, and more
for students in grades 5-12.
Visit AoPS Online ‚
Books for Grades 5-12Online Courses
Beast Academy
Engaging math books and online learning
for students ages 6-13.
Visit Beast Academy ‚
Books for Ages 6-13Beast Academy Online
AoPS Academy
Small live classes for advanced math
and language arts learners in grades 2-12.
Visit AoPS Academy ‚
Find a Physical CampusVisit the Virtual Campus
Sign In
Register
online school
Class ScheduleRecommendationsOlympiad CoursesFree Sessions
books tore
AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates
community
ForumsContestsSearchHelp
resources
math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten
contests on aopsPractice Math ContestsUSABO
newsAoPS BlogWebinars
view all 0
Sign In
Register
AoPS Wiki
ResourcesAops Wiki AM-GM Inequality
Page
ArticleDiscussionView sourceHistory
Toolbox
Recent changesRandom pageHelpWhat links hereSpecial pages
Search
AM-GM Inequality
In algebra, the AM-GM Inequality, also known formally as the Inequality of Arithmetic and Geometric Means or informally as AM-GM, is an inequality that states that any list of nonnegative reals' arithmetic mean is greater than or equal to its geometric mean. Furthermore, the two means are equal if and only if every number in the list is the same.
In symbols, the inequality states that for any real numbers , with equality if and only if .
The AM-GM Inequality is among the most famous inequalities in algebra and has cemented itself as ubiquitous across almost all competitions. Applications exist at introductory, intermediate, and olympiad level problems, with AM-GM being particularly crucial in proof-based contests.
Contents
[hide]
1 Proofs
2 Generalizations
2.1 Weighted AM-GM Inequality
2.2 Mean Inequality Chain
2.3 Power Mean Inequality
3 Problems
3.1 Introductory
3.2 Intermediate
3.3 Olympiad
4 See Also
Proofs
Main article: Proofs of AM-GM
All known proofs of AM-GM use induction or other, more advanced inequalities. Furthermore, they are all more complex than their usage in introductory and most intermediate competitions. AM-GM's most elementary proof utilizes Cauchy Induction, a variant of induction where one proves a result for , uses induction to extend this to all powers of , and then shows that assuming the result for implies it holds for .
Generalizations
The AM-GM Inequality has been generalized into several other inequalities. In addition to those listed, the Minkowski Inequality and Muirhead's Inequality are also generalizations of AM-GM.
Weighted AM-GM Inequality
The Weighted AM-GM Inequality relates the weighted arithmetic and geometric means. It states that for any list of weights such that , with equality if and only if . When , the weighted form is reduced to the AM-GM Inequality. Several proofs of the Weighted AM-GM Inequality can be found in the proofs of AM-GM article.
Mean Inequality Chain
Main article: Mean Inequality Chain
The Mean Inequality Chain, also called the RMS-AM-GM-HM Inequality, relates the root mean square, arithmetic mean, geometric mean, and harmonic mean of a list of nonnegative reals. In particular, it states that with equality if and only if . As with AM-GM, there also exists a weighted version of the Mean Inequality Chain.
Power Mean Inequality
Main article: Power Mean Inequality
The Power Mean Inequality relates all the different power means of a list of nonnegative reals. The power mean is defined as follows: The Power Mean inequality then states that if , then , with equality holding if and only if Plugging into this inequality reduces it to AM-GM, and gives the Mean Inequality Chain. As with AM-GM, there also exists a weighted version of the Power Mean Inequality.
Problems
Introductory
For nonnegative real numbers , demonstrate that if then . (Solution)
Find the maximum of for all positive . (Solution)
Intermediate
Find the minimum value of for .
(Source)
Olympiad
Let , , and be positive real numbers. Prove that
(Source)
See Also
Proofs of AM-GM
Mean Inequality Chain
Power Mean Inequality
Cauchy-Schwarz Inequality
Inequality
Retrieved from "
Categories:
Algebra
Inequalities
Definition
Art of Problem Solving is an
ACS WASC Accredited School
aops programs
AoPS Online
Beast Academy
AoPS Academy
About
About AoPS
Our Team
Our History
Jobs
AoPS Blog
Site Info
Terms
Privacy
Contact Us
follow us
Subscribe for news and updates
© 2025 AoPS Incorporated
© 2025 Art of Problem Solving
About Us•Contact Us•Terms•Privacy
Copyright © 2025 Art of Problem Solving
Something appears to not have loaded correctly.
Click to refresh. |
10525 | https://en.wikipedia.org/wiki/Approximation_error | Published Time: 2004-05-07T12:18:27Z
Approximation error - Wikipedia
Jump to content
[x] Main menu
Main menu
move to sidebar hide
Navigation
Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Contribute
Help
Learn to edit
Community portal
Recent changes
Upload file
Special pages
Search
Search
[x] Appearance
Appearance
move to sidebar hide
Text
Small Standard Large
This page always uses small font size
Width
Standard Wide
The content is as wide as possible for your browser window.
Color (beta)
Automatic Light Dark
This page is always in light mode.
Donate
Create account
Log in
[x] Personal tools
Donate
Create account
Log in
Pages for logged out editors learn more
Contributions
Talk
[x] Toggle the table of contents
Contents
move to sidebar hide
(Top)
1 Formal definition
2 Examples
3 Comparison
4 Polynomial-time approximation of real numbers
5 Instruments
6 Generalizations
7 See also
8 References
9 External links
Approximation error
[x] 24 languages
العربية
Български
Català
Deutsch
Español
Esperanto
فارسی
Français
한국어
Հայերեն
Italiano
עברית
Қазақша
Кыргызча
Nederlands
日本語
Norsk nynorsk
Polski
Português
Српски / srpski
Svenska
ไทย
Українська
中文
Edit links
Article
Talk
[x] English
Read
Edit
View history
[x] Tools
Tools
move to sidebar hide
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Edit interlanguage links
Print/export
Download as PDF
Printable version
In other projects
Wikidata item
From Wikipedia, the free encyclopedia
Mathematical concept
"Absolute error" redirects here and is not to be confused with Absolute deviation.
For broader coverage of this topic, see Approximation.
Graph of f(x)=e x{\displaystyle f(x)=e^{x}} (blue) with its linear approximation P 1(x)=1+x{\displaystyle P_{1}(x)=1+x} (red) at a = 0. The approximation error, visually represented as the vertical gap between the two curves, demonstrably increases for values of x that are positioned further from the point of approximation, which in this case is x = 0.
The approximation error in a given data value represents the significant discrepancy that arises when an exact, true value is compared against some approximation derived for it. This inherent error in approximation can be quantified and expressed in two principal ways: as an absolute error, which denotes the direct numerical magnitude of this discrepancy irrespective of the true value's scale, or as a relative error, which provides a scaled measure of the error by considering the absolute error in proportion to the exact data value, thus offering a context-dependent assessment of the error's significance.
An approximation error can manifest due to a multitude of diverse reasons. Prominent among these are limitations related to computing machine precision, where digital systems cannot represent all real numbers with perfect accuracy, leading to unavoidable truncation or rounding. Another common source is inherent measurement error, stemming from the practical limitations of instruments, environmental factors, or observational processes (for instance, if the actual length of a piece of paper is precisely 4.53 cm, but the measuring ruler only permits an estimation to the nearest 0.1 cm, this constraint could lead to a recorded measurement of 4.5 cm, thereby introducing an error).
In the mathematical field of numerical analysis, the crucial concept of numerical stability associated with an algorithm serves to indicate the extent to which initial errors or perturbations present in the input data of the algorithm are likely to propagate and potentially amplify into substantial errors in the final output. Algorithms that are characterized as numerically stable are robust in the sense that they do not yield a significantly magnified error in their output even when the input is slightly malformed or contains minor inaccuracies; conversely, numerically unstable algorithms may exhibit dramatic error growth from small input changes, rendering their results unreliable.
Formal definition
[edit]
Given some true or exact value v, we formally state that an approximation v approx estimates or represents v where the magnitude of the absolute error is bounded by a positive value ε (i.e., ε>0), if the following inequality holds:
|v−v approx|≤ε{\displaystyle |v-v_{\text{approx}}|\leq \varepsilon }
where the vertical bars, | |, unambiguously denote the absolute value of the difference between the true value v and its approximation v approx. This mathematical operation signifies the magnitude of the error, irrespective of whether the approximation is an overestimate or an underestimate.
Similarly, we state that v approx approximates the value v where the magnitude of the relative error is bounded by a positive value η (i.e., η>0), provided v is not zero (v ≠ 0), if the subsequent inequality is satisfied:
|v−v approx|≤η⋅|v|{\displaystyle |v-v_{\text{approx}}|\leq \eta \cdot |v|}.
This definition ensures that η acts as an upper bound on the ratio of the absolute error to the magnitude of the true value. If v ≠ 0, then the actual relative error, often also denoted by η in context (representing the calculated value rather than a bound), is precisely calculated as:
η=|v−v approx||v|=|v−v approx v|=|1−v approx v|{\displaystyle \eta ={\frac {|v-v_{\text{approx}}|}{|v|}}=\left|{\frac {v-v_{\text{approx}}}{v}}\right|=\left|1-{\frac {v_{\text{approx}}}{v}}\right|}.
Note that the first term in the equation above implicitly defines ε as |v-v_approx| if η is ε/|v|.
The percent error, often denoted as δ, is a common and intuitive way of expressing the relative error, effectively scaling the relative error value to a percentage for easier interpretation and comparison across different contexts:
δ=100%×η=100%×|v−v approx v|.{\displaystyle \delta =100\%\times \eta =100\%\times \left|{\frac {v-v_{\text{approx}}}{v}}\right|.}
An error bound rigorously defines an established upper limit on either the relative or the absolute magnitude of an approximation error. Such a bound thereby provides a formal guarantee on the maximum possible deviation of the approximation from the true value, which is critical in applications requiring known levels of precision.
Examples
[edit]
Best rational approximants for π (green circle), e (blue diamond), φ (pink oblong), (√3)/2 (grey hexagon), 1/√2 (red octagon) and 1/√3 (orange triangle) calculated from their continued fraction expansions, plotted as slopes y/x with errors from their true values (black dashes)
v
t
e
To illustrate these concepts with a numerical example, consider an instance where the exact, accepted value is 50, and its corresponding approximation is determined to be 49.9. In this particular scenario, the absolute error is precisely 0.1 (calculated as |50 − 49.9|), and the relative error is calculated as the absolute error 0.1 divided by the true value 50, which equals 0.002. This relative error can also be expressed as 0.2%. In a more practical setting, such as when measuring the volume of liquid in a 6 mL beaker, if the instrument reading indicates 5 mL while the true volume is actually 6 mL, the percent error for this particular measurement situation is, when rounded to one decimal place, approximately 16.7% (calculated as |(6 mL − 5 mL) / 6 mL| × 100%).
The utility of relative error becomes particularly evident when it is employed to compare the quality of approximations for numbers that possess widely differing magnitudes; for example, approximating the number 1,000 with an absolute error of 3 results in a relative error of 0.003 (or 0.3%). This is, within the context of most scientific or engineering applications, considered a significantly less accurate approximation than approximating the much larger number 1,000,000 with an identical absolute error of 3. In the latter case, the relative error is a mere 0.000003 (or 0.0003%). In the first case, the relative error is 0.003, whereas in the second, more favorable scenario, it is a substantially smaller value of only 0.000003. This comparison clearly highlights how relative error provides a more meaningful and contextually appropriate assessment of precision, especially when dealing with values across different orders of magnitude.
There are two crucial features or caveats associated with the interpretation and application of relative error that should always be kept in mind. Firstly, relative error becomes mathematically undefined whenever the true value (v) is zero, because this true value appears in the denominator of its calculation (as detailed in the formal definition provided above), and division by zero is an undefined operation. Secondly, the concept of relative error is most truly meaningful and consistently interpretable only when the measurements under consideration are performed on a ratio scale. This type of scale is characterized by possessing a true, non-arbitrary zero point, which signifies the complete absence of the quantity being measured. If this condition of a ratio scale is not met (e.g., when using interval scales like Celsius temperature), the calculated relative error can become highly sensitive to the choice of measurement units, potentially leading to misleading interpretations. For example, when an absolute error in a temperature measurement given in the Celsius scale is 1°C, and the true value is 2°C, the relative error is 0.5 (or 50%, calculated as |1°C / 2°C|). However, if this exact same approximation, representing the same physical temperature difference, is made using the Kelvin scale (which is a ratio scale where 0 K represents absolute zero), a 1 K absolute error (equivalent in magnitude to a 1°C error) with the same true value of 275.15 K (which is equivalent to 2°C) gives a markedly different relative error of approximately 0.00363, or about 3.63×10−3 (calculated as |1 K / 275.15 K|). This disparity underscores the importance of the underlying measurement scale.
Comparison
[edit]
When comparing the behavior and intrinsic characteristics of these two fundamental error types, it is important to recognize their differing sensitivities to common arithmetic operations. Specifically, statements and conclusions made about relative errors are notably sensitive to the addition of a non-zero constant to the underlying true and approximated values, as such an addition alters the base value against which the error is relativized, thereby changing the ratio. However, relative errors remain unaffected by the multiplication of both the true and approximated values by the same non-zero constant, because this constant would appear in both the numerator (of the absolute error) and the denominator (the true value) of the relative error calculation, and would consequently cancel out, leaving the relative error unchanged. Conversely, for absolute errors, the opposite relationship holds true: absolute errors are directly sensitive to the multiplication of the underlying values by a constant (as this scales the magnitude of the difference itself), but they are largely insensitive to the addition of a constant to these values (since adding the same constant to both the true value and its approximation does not change the difference between them: (v+c) − (v approx+c) = v − v approx).: 34
Polynomial-time approximation of real numbers
[edit]
In the realm of computational complexity theory, we define that a real value v is polynomially computable with absolute error from a given input if, for any specified rational number ε> 0 representing the desired maximum permissible absolute error, it is algorithmically possible to compute a rational number v approx such that v approx approximates v with an absolute error no greater than ε (formally, |v − v approx| ≤ ε). Crucially, this computation must be achievable within a time duration that is polynomial in terms of the size of the input data and the encoding size of ε (the latter typically being of the order O(log(1/ε)) bits, reflecting the number of bits needed to represent the precision). Analogously, the value v is considered polynomially computable with relative error if, for any specified rational number η> 0 representing the desired maximum permissible relative error, it is possible to compute a rational number v approx that approximates v with a relative error no greater than η (formally, |(v − v approx)/v| ≤ η, assuming v ≠ 0). This computation, similar to the absolute error case, must likewise be achievable in an amount of time that is polynomial in the size of the input data and the encoding size of η (which is typically O(log(1/η)) bits).
It can be demonstrated that if a value v is polynomially computable with relative error (utilizing an algorithm that we can designate as REL), then it is consequently also polynomially computable with absolute error. Proof sketch: Let ε> 0 be the target maximum absolute error that we wish to achieve. The procedure commences by invoking the REL algorithm with a chosen relative error bound of, for example, η = 1/2. This initial step aims to find a rational number approximation r 1 such that the inequality |v − r 1| ≤ |v|/2 holds true. From this relationship, by applying the reverse triangle inequality (|v| − |r 1| ≤ |v − r 1|), we can deduce that |v| ≤ 2|r 1| (this holds assuming r 1 ≠ 0; if r 1 = 0, then the relative error condition implies v must also be 0, in which case the problem of achieving any absolute error ε> 0 is trivial, as v approx = 0 works, and we are done). Given that the REL algorithm operates in polynomial time, the encoding length of the computed r 1 will necessarily be polynomial with respect to the input size. Subsequently, the REL algorithm is invoked a second time, now with a new, typically much smaller, relative error target set to η' = ε / (2|r 1|) (this step also assumes r 1 is non-zero, which we can ensure or handle as a special case). This second application of REL yields another rational number approximation, r 2, that satisfies the condition |v − r 2| ≤ η'|v|. Substituting the expression for η' gives |v − r 2| ≤ (ε / (2|r 1|)) |v|. Now, using the previously derived inequality |v| ≤ 2|r 1|, we can bound the term: |v − r 2| ≤ (ε / (2|r 1|)) × (2|r 1|) = ε. Thus, the approximation r 2 successfully approximates v with the desired absolute error ε, demonstrating that polynomial computability with relative error implies polynomial computability with absolute error.: 34
The reverse implication, namely that polynomial computability with absolute error implies polynomial computability with relative error, is generally not true without imposing additional conditions or assumptions. However, a significant special case exists: if one can assume that some positive lower bound b on the magnitude of v (i.e., |v| >b> 0) can itself be computed in polynomial time, and if v is also known to be polynomially computable with absolute error (perhaps via an algorithm designated as ABS), then v also becomes polynomially computable with relative error. This is because one can simply invoke the ABS algorithm with a carefully chosen target absolute error, specifically ε target = ηb, where η is the desired relative error. The resulting approximation v approx would satisfy |v − v approx| ≤ ηb. To see the implication for relative error, we divide by |v| (which is non-zero): |(v − v approx)/v| ≤ (ηb)/|v|. Since we have the condition |v| >b, it follows that b/|v| < 1. Therefore, the relative error is bounded by η × (b/|v|) <η × 1 = η, which is the desired outcome for polynomial computability with relative error.
An algorithm that, for every given rational number η> 0, successfully computes a rational number v approx that approximates v with a relative error no greater than η, and critically, does so in a time complexity that is polynomial in both the size of the input and in the reciprocal of the relative error, 1/η (rather than being polynomial merely in log(1/η), which typically allows for faster computation when η is extremely small), is known as a Fully Polynomial-Time Approximation Scheme (FPTAS). The dependence on 1/η rather than log(1/η) is a defining characteristic of FPTAS and distinguishes it from weaker approximation schemes.
Instruments
[edit]
In the context of most indicating measurement instruments, such as analog or digital voltmeters, pressure gauges, and thermometers, the specified accuracy is frequently guaranteed by their manufacturers as a certain percentage of the instrument's full-scale reading capability, rather than as a percentage of the actual reading. The defined boundaries or limits of these permissible deviations from the true or specified values under operational conditions are commonly referred to as limiting errors or, alternatively, guarantee errors. This method of specifying accuracy implies that the maximum possible absolute error can be larger when measuring values towards the higher end of the instrument's scale, while the relative error with respect to the full-scale value itself remains constant across the range. Consequently, the relative error with respect to the actual measured value can become quite large for readings at the lower end of the instrument's scale.
Generalizations
[edit]
This section needs expansion. You can help by adding to it. (April 2023)
The fundamental definitions of absolute and relative error, as presented primarily for scalar (one-dimensional) values, can be naturally and rigorously extended to more complex scenarios where the quantity of interest v{\displaystyle v} and its corresponding approximation v approx{\displaystyle v_{\text{approx}}} are n-dimensional vectors, matrices, or, more generally, elements of a normed vector space. This important generalization is typically achieved by systematically replacing the absolute value function (which effectively measures magnitude or "size" for scalar numbers) with an appropriate vector n-norm or matrix norm. Common examples of such norms include the L 1 norm (sum of absolute component values), the L 2 norm (Euclidean norm, or square root of the sum of squared components), and the L∞ norm (maximum absolute component value). These norms provide a way to quantify the "distance" or "difference" between the true vector (or matrix) and its approximation in a multi-dimensional space, thereby allowing for analogous definitions of absolute and relative error in these higher-dimensional contexts.
See also
[edit]
Accepted and experimental value
Condition number
Errors and residuals in statistics
Experimental uncertainty analysis
Machine epsilon
Measurement error
Measurement uncertainty
Propagation of uncertainty
Quantization error
Relative difference
Round-off error
Uncertainty
References
[edit]
^Weisstein, Eric W. "Numerical Stability". mathworld.wolfram.com. Retrieved 2023-06-11.
^Weisstein, Eric W. "Absolute Error". mathworld.wolfram.com. Retrieved 2023-06-11.
^ Jump up to: ab"Absolute and Relative Error | Calculus II". courses.lumenlearning.com. Retrieved 2023-06-11.
^"Approximation and Error Bounds". math.wpi.edu. Retrieved 2023-06-11.
^ Jump up to: abGrötschel, Martin; Lovász, László; Schrijver, Alexander (1993), Geometric algorithms and combinatorial optimization, Algorithms and Combinatorics, vol.2 (2nd ed.), Springer-Verlag, Berlin, doi:10.1007/978-3-642-78240-4, ISBN978-3-642-78242-8, MR1261419
^Helfrick, Albert D. (2005) Modern Electronic Instrumentation and Measurement Techniques. p. 16. ISBN81-297-0731-4
^Golub, Gene; Charles F. Van Loan (1996). Matrix Computations (Third ed.). Baltimore: The Johns Hopkins University Press. p.53. ISBN0-8018-5413-X.
External links
[edit]
Weisstein, Eric W."Percentage error". MathWorld.
Retrieved from "
Category:
Numerical analysis
Hidden categories:
Articles with short description
Short description is different from Wikidata
Articles to be expanded from April 2023
All articles to be expanded
This page was last edited on 11 May 2025, at 23:16(UTC).
Text is available under the Creative Commons Attribution-ShareAlike 4.0 License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Privacy policy
About Wikipedia
Disclaimers
Contact Wikipedia
Code of Conduct
Developers
Statistics
Cookie statement
Mobile view
Edit preview settings
Search
Search
[x] Toggle the table of contents
Approximation error
24 languagesAdd topic |
10526 | http://web.uvic.ca/~monahana/eos225/matlab_tutorial/tutorial_2/for_loops_and_m_files.html | An Introduction to MATLAB: For Loops and M-Files
An Introduction to MATLAB: For Loops and M-Files
Contents
The For Loop
M-Files
NxM Arrays
Exercises
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Exercise 5
Exercise 6
Exercise 7
Exercise 8
Exercise 9
Exercise 10
Exercise 11
The For Loop
We will now consider our next example of fundamental concepts in computer programming: the for loop (more generally, ``iteration'').
We talked in class about an example of an iterative calculation - radioactive decay. Starting with some amount of U238, we know that each billion years we lose a fraction alpha, that is,
U(2) = (1-alpha)U(1)U(3) = (1-alpha)U(2) = [(1-alpha)^2] U(1)U(4) = (1-alpha)U(3) = [(1-alpha)^3] U(1)
and so on. To predict U(n), we start with U(1) and iteratively multiply by the factor 1-alpha. How do we do this in MATLAB?
In this case, we have a formula predicting U(n) from U(1), so we can just use the exponentiation function - we know how to take the nth power of some factor. In general, iterative calculations don't admit closed-form expressions for the nth step in terms of the first. But there's another way to do the calculation - using the for loop.
Before talking about the for loop, it's worth emphasising the following fact: computers were invented to do exactly this kind of computation. Many important applications involve doing similar calculations repeatedly, with each step making use of the results of the previous step (that is, using iterations). This can be incredibly tedious to do by hand - and errors can creep in, through carelessness or boredom. Computers don't get bored - they'll happily do the same thing over and over again. What we're learning now is at the heart of how computers work.
Going back to our radioactive decay example: to compute the mass of U238 present after 3 billion years have elapsed from some initial time, we could just type out the sequence of calculations above by hand, one after the other. With the initial mass
U(1) = 0.5 kg:
we can write
clear all
alpha = 0.143;
U(1) = 0.5;
U(2) = (1-alpha)U(1);
U(3) = (1-alpha)U(2);
U(4) = (1-alpha)U(3);
U
U =
0.5000 0.4285 0.3672 0.3147
Note that we've had to type the same thing over and over: take the result of the previous calculation and multiply by the same factor. This is a nuisance, and impossible in practice for bigger calculations - what if you had to go out to n=50? What are the chances you'd make a typo? Pretty large in fact ...
Before carrying on: note the indices of the array U. U(1) is the first element of U - corresponding to the time n=0 in the notation of Section 1.1 of the notes. Remember that the indices of the array must be positive integers. U(1) corresponds to the amount of U238 at the first time considered - which in this case is the initial amount, at "time" n=0. Similarly, U(2) is the amount after the first billion years has elapsed, U(3) is the amount after the second billion years, etc.
The for loop provides a much more efficient way of calculating U(4) calculation:
clear all
alpha = 0.143;
U(1) = 0.5;
for k=2:4
U(k) = (1-alpha)U(k-1);
end
U
U =
0.5000 0.4285 0.3672 0.3147
We get the same answer, but with a more compact program.
Note the structure of the for loop: we only have to tell MATLAB once how the iteration works, from step k - 1 to step k. But what is k? It is a counter of where we are in the iteration. If we start with k = 2, then we get the step from k - 1 = 1 to k = 2 - that is, from U(1) to U(2). With k = 3, we get the step from k - 1 = 2 to k = 3 - that is, from U(2) to U(3) - and so on and so forth. This process stops when k takes the value of 4. As we will see, not all iterations involve taking the value from a previous step and using it in the present step - although this will often be the case.
The range of steps to be taken is listed at the top of the for loop - we told MATLAB to run k from 2 to 4 (in increments of 1, the default for the : operator).
This sequence of steps can be represented visually as a flow chart:
The program begins by defining the parameter alpha and the value of U(1). Starting with k = 2, it then computes U(k) from U(k-1). After doing this, the value of k is increased by 1. When k exceeds 4, the iteration stops and the array is written to the screen.
At each iteration, MATLAB does everything between the "for" and "end" statements in the loop. In the above example, that's a single calculation - but it doesn't have to be. The "end" command is very important here - it tells MATLAB where to end the sequence of commands making up the for loop.
For example, say we want MATLAB to compute the square, cube, and fourth power of all integers between 4 and 8. We can write the program:
clear all
x = 4:8;
for k=1:5
s(k) = x(k)^2;
c(k) = x(k)^3;
f(k) = x(k)^4;
end
s
c
f
s =
16 25 36 49 64
c =
64 125 216 343 512
f =
256 625 1296 2401 4096
The counter k which keeps track of where we are in the loop starts at one, and increases by one until it reaches 5. The counter starts at k=1, corresponding to the first element in the array x (which is x(1)=4) and ends with the value k=5, corresponding to the last element (which is x(5)=8). At each step, each of the square, cube, and fourth power are computed and stored in different arrays. Note that here the output of the kth step is saved in the kth element of each array.
This program can be represented graphically by the following flow chart:
We can make the sequence of commands between the "for" and "end" as complicated as we want - we can even have other for loops inside a for loop (called "nesting"). But the basic idea is just this: do a perscribed sequence of steps, over and over again, for a pre-determined number of times.
The counter k is a variable itself. In fact, the counter doesn't have to be called "k" - it can be called anything. For example, typing
clear all
x = 4:8;
for j=1:5
s(j) = x(j)^2;
c(j) = x(j)^3;
f(j) = x(j)^4;
end
s
c
f
s =
16 25 36 49 64
c =
64 125 216 343 512
f =
256 625 1296 2401 4096
gives exactly the same thing as with the counter called "k". The important thing to remember is not to give the counter the same name as another variable that you still want to use - particularly one you'll be modifying in the for loop. Anybody who's done much programming has spent many hours of their life debugging programs where that was the error.
Note that we could also get the desired results from the code above using the program
clear all
x = 4:8;
s = x.^2;
c = x.^3;
f = x.^4;
s
c
f
s =
16 25 36 49 64
c =
64 125 216 343 512
f =
256 625 1296 2401 4096
The use of a for loop here isn't necessary - there is often more than one way to carry out the same calculation, using different coding tools.
In the earlier for loop example, computing the mass of uranium as a function of time, we used the value of the k-1 step to compute the value at the k step. We could also write the loop such that we use the value of the k step to get the value at k+1:
clear all
alpha = 0.143;
U(1) = 0.5;
for k=1:3
U(k+1) = (1-alpha)U(k);
end
U
U =
0.5000 0.4285 0.3672 0.3147
The output of this program is exactly equal to that of the earlier one - because it is carrying out the same iteration, albeit written in a somewhat different form. Note that we have had to change the range of k values: as the first U value we are computing in the iteration is the second element of the array, then if we're identifying this step as going from k to k+1, we need the first value of k to be 1 so that k+1=2. If the last value of U we're going to calculate is the 4th element of the array, then the last value of k we need is 3 (so that k+1 = 4).
The increment in a for loop doesn't have to be 1; for example we can have
clear all
for j=2:2:8
3j
end
ans =
6
ans =
12
ans =
18
ans =
24
In this case, the counter j goes up in steps of 2. A for loop can have any increment (unlike array indices which must be positive integers).
The general structure of for loops can be expressed:
for (counter) = (start):(increment):(end)
(stuff to be done in for loop)end
Let's go back to the radioactive decay example, and see how Figure 1.1 in the notes was made.
We want to see how U(t) changes from t=0 Ga to t=25 Ga , starting from U(0). If we define the ratio
r(t) = U(t)/U(0)
(where r is to be interpreted as a function of time - not as a MATLAB array) then from above we have the iteration
r(t) = (1-alpha)r(t-1)
with r(0) = 1 (where as written the argument of the function r is the time t=0). So if we write the program
clear all
alpha = 0.143;
t = 0:25;
r(1) = 1;
for k=2:26;
r(k) = (1-alpha)r(k-1);
end
plot(t,r)
xlabel('t (Ga)');
ylabel('U(t)/U(0)');
we get pretty much the plot in Figure 1.1 Note that because array indices must be positive, t = 0 corresponds to k=1 and t=25 Ga corresponds to k=26. In this MATLAB script, the quantity
r(k)
is not the value of r at the time k - it is the value of the kth element of the array r. If the kth element of the array r corresponds to the kth element of the array t, then in particular the first element of the array t (which has a value equal to 0) will correspond to the first element of the array r (which has a value equal to 1). When interpreting an expression, it is crucially important to remember if it is meant to represent algebra or computer code.
It would have been a lot of work to type out the iteration 25 times - for this reason, the for loop is an essential part of computer programming.
Note that the figure we got above isn't exactly Figure 1.1, which has a bunch of other stuff on it. In fact, Figure 1.1 was produced by the following code
clear all
t = 0:1:25;
alpha = .143;
U = (1-alpha).^t;
plot(t,U,'k','linewidth',2)
xlabel('t (Ga)','fontsize',24);
tmp=ylabel('U(t)/U(0)','fontsize',24);
set(gca,'fontsize',18);
hold on
plot(4.5,0.025,'^','markerfacecolor','k','markeredgecolor','k','markersize',18);
t2 = 0:.01:1;
plot(4.5ones(size(t2)),t2,'--k')
hold off
text(5,.15,'Age of Earth','fontsize',15)
While we haven't talked about all the things you need to understand everything in the above code, it's still worth looking at. When programming, it's often useful to examine how other people have written code - it's often easier to learn by example, seeing how other people have done things, rather than trying to do everything from first principles. Searching online is also a valuable way of figuring out how to do something new in programming.
M-Files
Look at the previous piece of code - it's 13 lines long, with some fairly complicated bits. Typing this out fully each time you want to make this Figure would be tedious - and error-prone. Now imagine a weather prediction program, which might have millions of lines of code - there's no way this can be retyped in full every 6 hours to make a forecast.
Programming languages get around this by storing programs in separate computer files. In MATLAB, these are known as M-files and always end with the suffix .m ("dot-m"). When you have the M-file "sample_program.m", you can run it by simply typing
sample_program
on the command line (note that you don't include the suffix ".m" in what you type).
Working with M-files is crucial, particularly if there's a program you're going to use multiple times (and so don't want to have to retype it in full each time), if the program has complicated lines of code in which it's easy to make a typo, or if the program is very long.
Programming M-files is no harder than programming on the command line - you just type out the sequence of commands in the order that you want them executed (just like you would on the command line) and that's the order in which MATLAB carries them out.
To make a new M-file, click on "New Script" icon in the upper left of the MATLAB window. This will open a new text editor window - a window you can type your program in.
A nice thing about M-files is that they can include notes to yourself (and others) about what the M-file does, both overall and in particular places. These are called "comments", and anything on a line appearing after a percentage sign "%" is "commented out". That is, anything on that line following the "%" will appear in the M-file MATLAB won't pay any attention to it.
Now, type the following program into the text editor
% My test program a = 3;b = 2;c = 1:4;d = a(c.^b);plot(c,d);
Right now, this text hasn't been saved as a file - it's just sitting in the text editor, and can't be run by MATLAB. To be able to run the program, you'll need to save the M-file. To do this, press the "Save" icon above your script (to the left). This will give you a menu where you can pick what you'll call the file. Call this one
my_test_program.m
Now you can go to the MATLAB command window and at the command line type
my_test_program
Up comes the plot of the array c against the array d. We can ask for the values of the array d
d
d =
3 12 27 48
or of the variable b
b
b =
2
It's all as if we'd typed each line in the command window. But here's one major advantage - say we want to look at the plot of c against d again, but now for the case that a = 4. If we'd typed each line in the command window, we'd have to go back and start typing them in again, right from the beginning. But we can go to the M-file and edit the first line to read
a = 4
instead. To run this new M-file, we first need to save it as a new file - using the "Save As" option under the "File" menu. Let's call this new file "my_test_program_2.m" Once the file is saved, we run the new M-file
my_test_program_2
and get another plot, now for the value a=4.
These aren't very realistic examples so far. Let's consider working with Eqn. (2.10) for the growth of a mountain range under the influence of tectonic uplift and erosion (neglecting isostatic effects). To start with, we open a clean new text editor. Now type the following
% Orogeny example, Eqn. (2.10)beta = 0.1e-3; %% m/yr tau = 5e6; %% yr h0 = 0; %% initial topgraphy zero t = 0:1e5:25e6; %% time in steps of 100,000 years from t=0 to t=25^6 years h = betatau + (h0-betatau)exp(-t/tau);plot(t/10^6,h/1e3)xlabel('t (Ma)')ylabel('h (km)')
Notice how the comments have been used to remind us what the units of different variables are. Now save this program under the name
orogony_example_1.m
Running this m-file gives the plot of h(t) against t:
orogeny_example_1
We see the familiar increase in h(t) with t, approaching the steady state value h_eq = 500 m.
Note the trick we've played in the plot: we didn't exactly plot t with h. Rather, we plotted t/1e6 with h/1e3. Because t is in years and h is in metres, doing this means that the plot's x-axis is in units of Ma (10^6 years) and the y-axis is in units of km (10^3 m) - as we've noted in the axis labels.
Whenever you work with dimensional quantities in MATLAB (or other programming languages) it is important to be careful with units. MATLAB has no idea of what the units of numbers in memory are - they're just numbers. If you enter the initial height of topography to be 10, MATLAB won't know if this is 10 m, 10 km, or 10 mm. When working with dimensional quantities, you have to decide at the start what units you are going to use - how are you going to measure length (m? mm? km? another length?), how you will measure time (seconds? hours? years? another length?), how you will measure mass, etc. You can use any units you want - but you have to be consistent with them in your calculations.
NxM Arrays
So far, we have only considered arrays with a single index. E.g.
M = [82 , -1.8 , 6]
for which
M(1) = 82 M(2) = -1.8 M(3) = 6
In fact, MATLAB allows arrays with more than one index. For the case of an array with two indices, you can think of it as a set of numbers arranged on a grid with rows and columns. E.g.
M = 1 3 -12 6 0.1 8 -0.3 7 12 4 -4 4
This array has 4 rows and 3 columns - so is called a 4x3 array. In general, an array with M rows and N columns is referred to as being MxN. The single-index arrays we've already talked about can be considered 1xN arrays.
You can think of the MxN array as a container with many small compartments (like an egg carton) arranged in a grid. Each compartment holds a number. Each compartment is also identified by a pair of numbers - the first indicates the row, the second the column. The numbers identifying the compartment (the indices) are both integers - counting rows (from the top) and columns (from the left) - but any kind of number can be IN the compartment. In MATLAB indices must take a value of one or greater.
We can look at individual elements of such an array. We use the notation:
M(i,j)
is the element of M in the ith row (counting from the top) and the jth column (counting from the left). In the example above
M(1,2) = 3 M(3,3) = 12 M(4,2) = -4
To put the above array into MATLAB, type the following in the command line:
M = [ 1 3 -12 ; 6 0.1 8 ; -0.3 7 12 ; 4 -4 4]
M =
1.0000 3.0000 -12.0000
6.0000 0.1000 8.0000
-0.3000 7.0000 12.0000
4.0000 -4.0000 4.0000
The array is entered row by row, separated by semicolons (you could use commas to separate the column values within a particular row, but you don't have to).
We can ask MATLAB for the values of individual array elements
M(1,2)
ans =
3
M(3,3)
ans =
12
M(4,2)
ans =
-4
or for parts of whole rows or columns. For example
M(2:4,1)
ans =
6.0000
-0.3000
4.0000
gives the elements in the first column from rows 2 through 4
M(3,1:2)
ans =
-0.3000 7.0000
gives the elements in the columns 1 through 2 in row 3
M(:,2)
ans =
3.0000
0.1000
7.0000
-4.0000
gives all elements in column 2 and
M(3,:)
ans =
-0.3000 7.0000 12.0000
gives all elements in row 3.
Such higher-dimensional arrays are useful for all sorts of things, as we'll see in the following example.
Let's compare the predictions made by the model of orogeny for different values of the initial topographic height h(0). Type the following into a new M-file:
% Orogeny example, Eqn. (2.10)beta = 0.1e-3; %% m/yr tau = 5e6; %% yr h0 = [0 250 750 1000];t = 0:1e5:25e6; %% time in steps of 100,000 years from t=0 to t=10^6 years for k=1:length(h0) h(k,:) = betatau + (h0(k)-betatau)exp(-t/tau);end plot(t/10^6,h(1,:)/1e3,'r')hold on plot(t/10^6,h(2,:)/1e3,'g')plot(t/10^6,h(3,:)/1e3,'b')plot(t/10^6,h(4,:)/1e3,'k')hold off xlabel('t (Ma)')ylabel('h (km)')legend('0 m','250 m','750 m','1000 m')
and save the M-file as
orogeny_example_2.m
Running this M-file:
orogeny_example_2
This plot has four curves h(t), one each for
h(0)=0 m
h(0)=250 m
h(0)=750 m
and
h(0)=1000 m.
Each curve approaches the steady state value as t increases: in those cases where the topography starts below the steady state value, h(t) increases with time; in those cases in which the topography starts below the steady state value, h(t) decreases with time.
Look at how we made this plot. First, we didn't define a single initial condition h(0) - we defined an array with four values. Each of these values h(0) gives a separate prediction for h(t) - and these were computed iteratively with a for loop.
The index k, numbering the index of the array holding the sequence of initial conditions, cycles from 1 to "length(h0)". Here we've used a new (and very useful) MATLAB command:
length(a)
which returns the number of columns in the array a. In the present example, h0 is a 1x4 array so
length(h0) = 4.
For each value of k, the function h(t) from Eqn. (2.10) is evaluated using the k'th value of the h(0) - that is,
h0(k)
For each k, this is a 1 x length(t) array. This array is stored as the kth row of a
length(h0) x length(t)
array h. That is, in the array h, the columns are associated with different points in time and the rows with different values of the initial topography. Note the syntax:
h(k,:)
refers to all columns (in this case, denoting points in time) in row k of the array h (which in this case refers to the k'th initial condition).
Once the loop is done filling up the array h, each row is plotted on the same graph. How was this done?
Well, first h(1,:) was plotted. Then we used the
hold on
command. When this is used, all subsequent plots will appear over top of the present plot, until the command
hold off
is given. Having "held" the plot, the remaining three h(k,:) curves were plotted.
Each curve was plotted in a different colour: in order, these were red, green, blue, black. This was done by specifying the colour in the plot command:
plot(a,b,'c')
will plot array a against array b with colour c. Note that c must be in single quotes, as it is a character and not a number.
Each colour is denoted by a single character, e.g.
r = red g = green b = blue k = black
There are other choices, like
y = yellow m = magenta c = cyan
These colour choices - as well as a lot of other information about the "plot" command - can be found by typing
help plot
The command "legend" allows us to identify the curves on the plot, in the order in which they were plotted. The command
legend('name 1','name 2','name 3', .... , 'name N')
produces a little window on the plot with the name 'name 1' associated with the first line plotted, 'name 2' with the second line plotted, and so on until 'name N' for the Nth line plotted.
Exercises
Exercise 1
Write a program that prints out the numbers 5 through -5 in decreasing order, and save it as an M-file.
Exercise 2
Write a program that creates an array with the cube of every third integer starting at one, up to 16.
Exercise 3
Consider the iteration x(k+1) = 1.2x(k)-0.2. Compute the first 10 values of this iteration starting with x(1)=3.
Exercise 4
Repeat Exercise 3 with x(1)=0.9. Describe the difference in the behaviour of this iteration for this initial value.
Exercise 5
Suppose that you have a $20,000 loan at 6 percent annual interest compounded monthly. You can afford to pay $200/month toward this loan. How long will it take until the loan is paid off? To do this calculation, think of the amount remaining on the loan from time k to time k+1 as a combination of interest accrued and payment made, express this as an iteration, and then write code using a for loop to find the amount remaining in the loan after N months. You may need to experiment with the value of N to find the value in which the remaining amount passes through zero (and the loan is paid off). Remember how monthly compounding of interest works: if your annual interest rate is P percent, the monthly interest is P/12 percent.
Exercise 6
Repeat Exercise 5 with a $75 monthly payment.
Exercise 7
Write a program that defines the array M = [2 -12 8 7] and then uses a for loop to add the elements of the array. To do this, first express the sum as an algorithm: start with 2, then add -12. To this earlier sum add 8, and then add 7. Note the algorithm: at each step (after the first), take the previous value of the running sum and add the new value corresponding to that step.
Exercise 8
Write a program that adds the numbers 1 through 100, and save it as an M-file.
Exercise 9
Write a program that adds the even numbers between 1 and 100, and save it as an M-file.
Exercise 10
Write a program that plots - on the same plot - h(t) from Eqn. (2.10) for
tau = 1 million years,
tau = 3 million years,
tau = 5 million years,
tau = 7 million years,
and
tau = 9 million years
for h(0) = 500 m, from t = 0 years to t = 50 million years, in increments of 100,000 years. Use beta = 0.1 mm/yr. Plot each line with a different colour, label the axes, and include a legend.
Exercise 11
Write a program that plots - on the same plot - h(t) from Eqn. (2.10) for
beta = 0.5 mm/yr,
beta = 0.75 mm/yr,
beta = 1.0 mm/yr,
beta = 1.25 mm/yr,
and
beta = 1.5 mm/yr
for tau = 2 million years and h(0) = 500 m, from t = 0 years to t = 20 million years, in increments of 100,000 years. Plot each line with a different colour, label the axes, and include a legend.
Published with MATLAB® R2020a |
10527 | https://artofproblemsolving.com/wiki/index.php/Telescoping_series?srsltid=AfmBOop0aO4u5MJWcjMBrL8407ysEAwFp66RrLDIg0hutpO6CkbtVYuS | Art of Problem Solving
Telescoping series - AoPS Wiki
Art of Problem Solving
AoPS Online
Math texts, online classes, and more
for students in grades 5-12.
Visit AoPS Online ‚
Books for Grades 5-12Online Courses
Beast Academy
Engaging math books and online learning
for students ages 6-13.
Visit Beast Academy ‚
Books for Ages 6-13Beast Academy Online
AoPS Academy
Small live classes for advanced math
and language arts learners in grades 2-12.
Visit AoPS Academy ‚
Find a Physical CampusVisit the Virtual Campus
Sign In
Register
online school
Class ScheduleRecommendationsOlympiad CoursesFree Sessions
books tore
AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates
community
ForumsContestsSearchHelp
resources
math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten
contests on aopsPractice Math ContestsUSABO
newsAoPS BlogWebinars
view all 0
Sign In
Register
AoPS Wiki
ResourcesAops Wiki Telescoping series
Page
ArticleDiscussionView sourceHistory
Toolbox
Recent changesRandom pageHelpWhat links hereSpecial pages
Search
Telescoping series
In mathematics, a telescoping series is a series whose partial sums eventually only have a finite number of terms after cancellation. This is often done by using a form of for some expression .
Contents
[hide]
1 Example 1
2 Solution 1
3 Example 2
4 Solution 2
5 Problems
5.1 Introductory
5.2 Intermediate
5.3 Olympiad
6 See Also
Example 1
Derive the formula for the sum of the first counting numbers.
Solution 1
We wish to write for some expression . This expression is as .
We then telescope the expression:
.
(Notice how the sum telescopes— contains a positive and a negative of every value of from to , so those terms cancel. We are then left with , the only terms which did not cancel.)
Example 2
Find a general formula for , where .
Solution 2
We wish to write for some expression . This can be easily achieved with as by simple computation.
We then telescope the expression:
.
Problems
Introductory
When simplified the product becomes:
(Source)
The sum can be expressed as , where and are positive integers. What is ? (Source)
Which of the following is equivalent to (Hint: difference of squares!)
(Source)
Intermediate
Let denote the value of the sum can be expressed as , where and are positive integers and is not divisible by the square of any prime. Determine . (Source)
Olympiad
Find the value of , where is the Riemann zeta function
See Also
Algebra
Summation
Retrieved from "
Category:
Algebra
Art of Problem Solving is an
ACS WASC Accredited School
aops programs
AoPS Online
Beast Academy
AoPS Academy
About
About AoPS
Our Team
Our History
Jobs
AoPS Blog
Site Info
Terms
Privacy
Contact Us
follow us
Subscribe for news and updates
© 2025 AoPS Incorporated
© 2025 Art of Problem Solving
About Us•Contact Us•Terms•Privacy
Copyright © 2025 Art of Problem Solving
Something appears to not have loaded correctly.
Click to refresh. |
10528 | https://pmc.ncbi.nlm.nih.gov/articles/PMC91484/ | Key Physiology of Anaerobic Ammonium Oxidation - PMC
Skip to main content
An official website of the United States government
Here's how you know
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
Search
Log in
Dashboard
Publications
Account settings
Log out
Search… Search NCBI
Primary site navigation
Search
Logged in as:
Dashboard
Publications
Account settings
Log in
Search PMC Full-Text Archive
Search in PMC
Journal List
User Guide
View on publisher site
Download PDF
Add to Collections
Cite
Permalink PERMALINK
Copy
As a library, NLM provides access to scientific literature. Inclusion in an NLM database does not imply endorsement of, or agreement with, the contents by NLM or the National Institutes of Health.
Learn more: PMC Disclaimer | PMC Copyright Notice
Appl Environ Microbiol
. 1999 Jul;65(7):3248–3250. doi: 10.1128/aem.65.7.3248-3250.1999
Search in PMC
Search in PubMed
View in NLM Catalog
Add to search
Key Physiology of Anaerobic Ammonium Oxidation
Marc Strous
Marc Strous
1 Department of Biotechnology, Delft University of Technology, 2628 BC Delft, The Netherlands
Find articles by Marc Strous
1, J Gijs Kuenen
J Gijs Kuenen
1 Department of Biotechnology, Delft University of Technology, 2628 BC Delft, The Netherlands
Find articles by J Gijs Kuenen
1, Mike S M Jetten
Mike S M Jetten
1 Department of Biotechnology, Delft University of Technology, 2628 BC Delft, The Netherlands
Find articles by Mike S M Jetten
1,
Author information
Article notes
Copyright and License information
1 Department of Biotechnology, Delft University of Technology, 2628 BC Delft, The Netherlands
Corresponding author. Mailing address: Department of Biotechnology, Delft University of Technology, Julianalaan 67, 2628 BC Delft, The Netherlands. Phone: 31-15-2781193. Fax: 31-15-2782355. E-mail: M.Jetten@STM.TUDelft.nl.
Received 1998 Dec 22; Accepted 1999 Apr 6.
Copyright © 1999, American Society for Microbiology
PMC Copyright notice
PMCID: PMC91484 PMID: 10388731
Abstract
The physiology of anaerobic ammonium oxidizing (anammox) aggregates grown in a sequencing batch reactor was investigated quantitatively. The physiological pH and temperature ranges were 6.7 to 8.3 and 20 to 43°C, respectively. The affinity constants for the substrates ammonium and nitrite were each less than 0.1 mg of nitrogen per liter. The anammox process was completely inhibited by nitrite concentrations higher than 0.1 g of nitrogen per liter. Addition of trace amounts of either of the anammox intermediates (1.4 mg of nitrogen per liter of hydrazine or 0.7 mg of nitrogen per liter of hydroxylamine) restored activity completely.
Anaerobic ammonium oxidation (anammox) is the biological conversion of ammonium and nitrite to dinitrogen gas. It is an almost completely unexplored part of the biological nitrogen cycle, and the process offers new opportunities for wastewater engineers and microbiologists (2). Previously, a morphologically unusual microorganism was enriched while the anammox activity increased (6), and a novel metabolic pathway was postulated (5). This pathway proceeded via hydroxylamine and hydrazine. In the present study, we have investigated the physiology of aggregated anammox biomass (80% enriched in the morphotypical microorganism) grown in a sequencing batch reactor (4). The compilation of this physiological information is the key to the future design and scale-up of the anammox process and will greatly facilitate microbiological investigation of the responsible microorganism(s).
Physiological temperature and pH ranges.
The maximum specific-substrate (ammonium and nitrite) conversion rate of aggregated anammox biomass was measured as a function of temperature and pH in batch experiments, in the absence of mass transfer limitations (see Table 1). From the temperature dependency of anammox activity, the activation energy was calculated to be 70 kJ/mol, approximately the same as for aerobic ammonium oxidation (7).
TABLE 1.
Important physiological parameters for anaerobic and aerobic ammonium oxidation
| Parameter | Anammox result | Nitrificationa result | Unit |
--- --- |
| Maximum specific aerobic NH 4+ consumption rate | 0 | 2–5 | g of NH 4+-N · g of protein−1 day−1 |
| Maximum specific anaerobic NH 4+ consumption rate | 1.1 | <0.05b | g of NH 4+-N · g of protein−1 day−1 |
| Biomass yield | 0.07 | 0.1 | g of protein · g of NH 4+-N−1 |
| Activation energy | 70 | 70 | kJ · mol−1 |
| Affinity for ammonium | ≤10−4 | ≥10−4 | g of NH 4+-N · liter−1 |
| Affinity for nitrite | ≤10−4 | NAc | g of NO 2−-N · liter−1 |
| Nitrite inhibition of ammonium consumption | K i = 0.8, α = 0.8 | Usually | g of NO 2−-N · liter−1 |
| Nitrite inhibition of nitrite consumption | K i = 1, α = 0.7 | NA | g of NO 2−-N · liter−1 |
| Temp range | 20–43 | ≤42°C | °C |
| pH range | 6.7–8.3 | Variable |
| Protein content of biomass | 0.6 | Variable | g of protein · g total dry weight−1 |
| Protein density | 50 | Variable | g of protein · liter biomass−1 |
Open in a new tab
a
Data were obtained as described in reference 7, except where noted.
b
As described in reference 8
c
NA, not applicable.
Affinity.
Before the substrate affinities were measured, the biomass aggregates were partially disrupted (by intense magnetic stirring), to reduce mass transfer limitation at low substrate concentrations. Figure 1A shows the aggregate size distribution during aggregate disruption. The affinity was measured after 5 h, when 80% of the aggregates had diameters less than 50 μm. Figures 1B and C show that the substrate decreases during the experiment were linear down to 0.15 mg of nitrogen per liter for ammonium and 0.05 mg of nitrogen per liter (the detection limit) for nitrite. Beyond these low substrate concentrations, the deviation from zero-order kinetics could have been caused by the approach of the affinity constant or by mass transfer limitation. Therefore, we concluded that the anammox affinity constants for ammonium and nitrite were equal to or less than 0.1 mg of nitrogen per liter (Table 1).
FIG. 1.
Open in a new tab
Determination of the substrate affinity of the anammox process. Decrease of the aggregate size during the aggregate disruption period (A). Nitrite (B) and ammonium (C) concentrations plotted against time, measured after a 5-h aggregate disruption period (arrow in A). Error bars represent standard deviations.
Inhibition.
The anammox process was not inhibited by ammonium or by the by-product nitrate up to concentrations of at least 1 g of nitrogen per liter. However, in the presence of more than 0.1 g of nitrite nitrogen per liter, the process was completely inhibited. This nitrite inhibition could be overcome by addition of trace amounts of either of the anammox intermediates (>1.4 mg of nitrogen per liter for hydrazine, >0.7 mg of nitrogen per liter for hydroxylamine). After a hydrazine pulse of 3 mg of nitrogen per liter of N 2 H 4 was used to start the anammox reaction, the resulting anammox activity was measured between pH 7 and 7.8 at different nitrite concentrations. It appeared that the anammox activity decreased with increasing nitrite concentration. This decrease was independent of pH at the pH range tested (7 to 7.8). Anammox activity is plotted against nitrite concentration in Fig. 2 (12 different batch experiments at 6 different substrate concentrations at pH 7, 7.4, and 7.8).
FIG. 2.
Open in a new tab
Immediate inhibition of the anammox process by nitrite. Specific ammonium (●) and nitrite (■) consumption rates. Lines indicate the fit of the Luong model to the data. Error bars represent standard deviations. Prot, protein.
Figure 2 also shows that with increasing nitrite concentration the stoichiometry of ammonium and nitrite consumption changed from 1.3 g of NO 2−-N/g NH 4+-N at 0.14 g of nitrogen per liter to almost 4 g of NO 2−-N/g NH 4+-N at 0.7 g of nitrogen per liter. From the distorted stoichiometry at high nitrite concentrations, it was clear that the microorganisms under these conditions did not only use ammonium as the electron donor but also must have generated an internal electron donor to reduce the nitrite.
Three different substrate inhibition models (Edwards, Andrews, and Luong models) were fitted to the data (3). For each model, the parameters that gave the least residual sum of squares were calculated, and R 2 was calculated for the linearized models as an estimate of the validity of the obtained curves. The calculated sums of squares were used to compare the models in an F test (1).
The Luong model fitted the experimental data best (R values were NH 4+ = 0.92 and NO 2− = 0.84). The coefficients were K i = 0.8 g of nitrogen per liter and α = 0.8 for inhibition of ammonium oxidation by nitrite, and K i = 1 g of nitrogen per liter and α = 0.7 for inhibition of nitrite reduction by nitrite. The F test showed that, with 73 and 85% respective certainty, the Luong model was better than the Edwards and Andrews models.
The hydrazine or hydroxylamine added at the start of each experiment was consumed very rapidly (within 10 min), but the durations of these experiments were much longer (up to 4 h). Apparently, the biomass only needed the N 2 H 4 or NH 2 OH pulse to get started. Still, it made sense to investigate how long the biomass would be able to remain active in the presence of high nitrite concentrations, after the N 2 H 4 had disappeared.
Prolonged exposure to nitrite.
Nitrite inhibition over a 50-h period was investigated in fed-batch experiments conducted under ammonium limitation with different resultant nitrite concentrations (0.06, 0.09, and 0.2 g of nitrogen per liter). In Fig. 3, the results are compared with a control experiment under nitrite limitation. In the control experiment and at 0.06 g of nitrite nitrogen per liter (Fig. 3A and B), ammonium and nitrite consumption and nitrate production remained constant over the course of the experiment, and the stoichiometry was as expected.
FIG. 3.
Open in a new tab
Consumption of ammonium (●) and nitrite (■) (shown as negative values), and production of nitrate (□) by the anammox process in 50-h fed-batch experiments. (A) Nitrite concentration = 0; (B) nitrite concentration = 0.06 g of nitrogen per liter; (C) nitrite concentration = 0.09 g of nitrogen per liter; (D) nitrite concentration = 0.2 g of nitrogen per liter (ammonium production after 10 h).
At 0.09 g of nitrite nitrogen per liter, the stoichiometry changed during the course of the experiment (Fig. 3C), much like the stoichiometric change illustrated in Fig. 2. The ratio of nitrite consumption to ammonium consumption increased to 2. At 0.2 g of nitrite nitrogen per liter, the anammox process proceeded normally only for the first 4 h of the experiment (Fig. 3D). After 4 h, the stoichiometry changed like in the previous experiments, but more strongly. Within 20 h, ammonium was produced in this experiment. Note that in Fig. 2 the inhibition of the anammox process was not yet apparent at 0.2 g of nitrite nitrogen per liter. After 20 h, two aliquots from the biomass described in Fig. 3D were reincubated in two different batch experiments with 0.26 g of nitrogen per liter of ammonium and nitrite. To one of these batches, hydrazine was added to a final concentration of 3 mg of nitrogen per liter. In this batch, the anammox activity was completely recovered, as shown by rapid conversion of ammonium and nitrite and nitrate production with normal stoichiometry. In the control experiment without hydrazine addition, the activity was not restored—no ammonium and no nitrite were converted. Apparently, the anammox process is strongly stimulated by its intermediates.
The physiological parameters of anaerobic ammonium oxidation are compiled in Table 1. This table also shows the parameters for aerobic nitrifiers, because these organisms resemble anammox from a physiological point of view. Both organisms are specialists: anammox has no aerobic activity, and the anaerobic activity of aerobic nitrifiers is only 5% that of the anammox activity. However, biomass yield, temperature range, substrate affinity, and activation energy are approximately the same for these anaerobic and aerobic organisms. Only the maximum specific-substrate conversion is much lower for anammox. Combined with the slightly lower biomass yield, this leads to the dramatic doubling time of 9 days under optimal conditions.
Acknowledgments
This research was financially supported by the Foundation for Applied Sciences (STW), the Royal Netherlands Academy of Arts and Sciences (KNAW), and the Gist-brocades and DSM companies.
We gratefully acknowledge Katinka van de Pas-Schoonen and Anke de Bruyn for careful maintenance of bench scale and pilot reactors, Mark van Loosdrecht for critical reading of the manuscript, and Sebastiaan Peeters for assistance with inhibition experiments.
REFERENCES
1.Elmen J, Pan W, Leung S Y, Magyarosy A, Keasling J D. Kinetics of toluene degradation by a nitrate-reducing bacterium isolated from a groundwater aquifer. Biotechnol Bioeng. 1997;55:82–90. doi: 10.1002/(SICI)1097-0290(19970705)55:1<82::AID-BIT10>3.0.CO;2-5. [DOI] [PubMed] [Google Scholar]
2.Jetten M S M, Strous M, van de Pas-Schoonen K T, Schalk J, van Dongen L, van de Graaf A A, Logemann S, Muyzer G, van Loosdrecht M C M, Kuenen J G. The anaerobic oxidation of ammonium. FEMS Microbiol Rev. 1998;22:421–437. doi: 10.1111/j.1574-6976.1998.tb00379.x. [DOI] [PubMed] [Google Scholar]
3.Luong J H T. Generalization of Monod kinetics for analysis of growth data with substrate inhibition. Biotechnol Bioeng. 1987;29:242–248. doi: 10.1002/bit.260290215. [DOI] [PubMed] [Google Scholar]
4.Strous M, Heijnen J J, Kuenen J G, Jetten M S M. The sequencing batch reactor as a powerful tool for the study of slowly growing anaerobic ammonium-oxidizing microorganisms. Appl Microbiol Biotechnol. 1998;50:589–596. [Google Scholar]
5.Van de Graaf A A, de Bruin P, Robertson L A, Jetten M S M, Kuenen J G. Metabolic pathway of anaerobic ammonium oxidation on basis of 15N-studies in a fluidized bed reactor. Microbiology (UK) 1997;143:2415–2421. doi: 10.1099/00221287-143-7-2415. [DOI] [PubMed] [Google Scholar]
6.Van de Graaf A A, de Bruijn P, Robertson L A, Jetten M S M, Kuenen J G. Autotrophic growth of anaerobic ammonium-oxidizing micro-organisms in a fluidized bed reactor. Microbiology (UK) 1996;142:2187–2196. [Google Scholar]
7.Wiesman U. Biological nitrogen removal from wastewater. Adv Biochem Eng Biotechnol. 1997;51:113–153. doi: 10.1007/BFb0008736. [DOI] [PubMed] [Google Scholar]
8.Zart D, Bock E. High rate of aerobic nitrification and denitrification by Nitrosomonas eutropha grown in a fermentor with complete biomass retention in the presence of gaseous NO2 or NO. Arch Microbiol. 1998;169:282–286. doi: 10.1007/s002030050573. [DOI] [PubMed] [Google Scholar]
Articles from Applied and Environmental Microbiology are provided here courtesy of American Society for Microbiology (ASM)
ACTIONS
View on publisher site
PDF (58.7 KB)
Cite
Collections
Permalink PERMALINK
Copy
RESOURCES
Similar articles
Cited by other articles
Links to NCBI Databases
On this page
Abstract
Acknowledgments
REFERENCES
Cite
Copy
Download .nbib.nbib
Format:
Add to Collections
Create a new collection
Add to an existing collection
Name your collection
Choose a collection
Unable to load your collection due to an error
Please try again
Add Cancel
Follow NCBI
NCBI on X (formerly known as Twitter)NCBI on FacebookNCBI on LinkedInNCBI on GitHubNCBI RSS feed
Connect with NLM
NLM on X (formerly known as Twitter)NLM on FacebookNLM on YouTube
National Library of Medicine 8600 Rockville Pike Bethesda, MD 20894
Web Policies
FOIA
HHS Vulnerability Disclosure
Help
Accessibility
Careers
NLM
NIH
HHS
USA.gov
Back to Top |
10529 | https://papersowl.com/blog/find-the-nth-term-of-an-arithmetic-sequence | Have an expert improve your writing
Ask for help
Check your paper for plagiarism
Do the check
Get inspired by free writing samples
View samples base
How to Find the Nth Term of an Arithmetic Sequence
Written by Kristian Eide
Posted: March 5, 2024
Last update date: April 3, 2024
6 min read
Table of contents
1 Definition of an Arithmetic Sequence
2 Step-by-Step Guide to Finding the nth Term
3 Examples
4 Practical Applications
5 Common Mistakes and Misconceptions
6 Overview of Related Concepts
7 Unlocking Patterns: The Essence of Arithmetic Sequences
As a basic part of mathematical analysis, arithmetic sequences are essential in many fields, from pure mathematics to real-world uses in science, engineering, and economics. The difference between each term in these sequences stays the same, which makes them easy to spot and use in a wide range of formulas and problem-solving situations. It’s very important to find the nth term in a series of numbers because it lets you guess what will happen in the future, look for patterns, and use an easy formula to solve hard problems.
The main points we will talk about in this article are:
Understanding arithmetic sequences, including formal definition and basic properties.
A detailed explanation of how to use a formula to find any term in an arithmetic sequence.
The application of the notion of the nth term in solving real-world problems enhances comprehension and practical skills.
You will get a full picture of math sequences and how to find the nth term by digging into these areas. As we move forward, we will explore each of these points in detail, providing a solid basis for both theoretical understanding and real-world use.
Definition of an Arithmetic Sequence
The nth term of an arithmetic sequence can be calculated using the formula: ({a_{n}=a_{1}+d(n-1)}), where:
({a_{n}}) is the nth term of the sequence,
({a_{1}}) is the first term of the sequence,
({d}) is the common difference,
({n}) is the position of the term within the sequence.
This formula allows for the direct calculation of any term in the sequence without the need to enumerate all preceding terms. The first term a1 represents the starting point of the sequence, d reflects the rate of progression, and n identifies the specific term’s position. By incorporating these components, the formula serves as a powerful tool for analyzing the behavior of arithmetic sequences and predicting future values. It is vital that you know and use this formula if you want to look for linear patterns and solve problems that have to do with arithmetic sequences, both in theory and in real life.
Step-by-Step Guide to Finding the nth Term
Finding the ({n^{th}}) term of an arithmetic sequence lets mathematicians and students find any term in the sequence without having to list them all by hand. This method is very helpful in many areas, from schoolwork to everyday problems, including help with math homework. Here’s how to learn this vital skill, step by step:
Identify the First Term (({a_{1}})): The first step in finding the nth term is to identify the first term of the sequence (({a_{1}})). This term serves as the starting point of your sequence and is crucial for applying the nth term formula effectively. In practical terms, a1 is simply the very first number you see in your sequence.
Determine the Common Difference (({d})): The common difference (({d})) is the consistent interval between consecutive terms in the sequence. To calculate d, subtract any term in the sequence from the subsequent term. It’s important to ensure this difference remains constant throughout the sequence for it to qualify as an arithmetic sequence. Understanding how to find this difference is key to effectively applying arithmetic concepts, including when seeking help with math homework.
Apply the nth Term Formula: With ({a_{1}}) and ({d}) in hand, you can now apply the nth term formula: ({a_{n}=a_{1}+d(n-1)}). This formula will enable you to find any term in the sequence, denoted as an, by simply knowing the position of the term (({n})) you wish to find.
For example, let’s find the nth term for the sequence starting 3, 7, 11, 15, 19…, which is a common task when getting help with math homework.
Step 1: The first term (({a_{1}})) is 3.
Step 2: The common difference (({d})) is 4, as each term increases by 4 from the previous one.
Step 3: To find the formula for the nth term, we plug ({a_{1}})= 3 and d = 4 into our formula: ({a_{n}}) = 3 + (n – 1) 4. Simplifying this, we get 4n – 1, which is the ({n^{th}}) term of our sequence.
Examples
A basic math skill that can be used in school and real life is finding the ({n^{th}}) term in a progression of numbers. As an example of this process, let’s look at two situations that come up a lot in maths homework help sessions: one with a positive common difference and the other with a negative common difference.
Example with Positive Common Difference:
Consider the sequence 5, 9, 13, 17, …
First Term (({a_{1}})): The first term is 5.
Common Difference (d): The difference between each term is 4 (positive).
Using ({a_{n}=a_{1}+d(n-1)}), the nth term is 5 + (n – 1) 4, simplifying to 4n + 1.
Example with Negative Common Difference:
Consider the sequence 20, 15, 10, 5, …
First Term (({a_{1}})): The first term is 20.
Common Difference (d): The difference between each term is -5 (negative).
Applying ({a_{n}=a_{1}+d(n-1)}), the nth term formula is 20 + (n – 1)(-5), or -5n + 25.
Practical Applications
The ability to find the nth term in a series of numbers has important uses in many areas of life. In finance, this idea is significant for figuring out how much investments or savings will be worth in the future when they grow at a steady rate. This helps people and businesses make better plans for their financial futures. Engineers use arithmetic sequences to model and predict situations that change in a straight line, like how material stress rises over time or how buildings get heavier over time.
In computer science, knowing arithmetic progressions is crucial for making algorithms. This is especially true for sorting and finding algorithms, where arithmetic progressions can often be used to predict or improve how efficiently data is handled. In addition, sequences are used to find patterns and create safe communication methods in coding theory and cryptography.
These applications underline the importance of mastering the concept of nth term calculation, as it equips professionals with the tools to solve complex problems, optimize processes, and make informed decisions in their respective fields. For those seeking further assistance in understanding or applying these concepts, resources like PapersOwl offer valuable support and insights.
Common Mistakes and Misconceptions
A lot of people make mistakes and don’t understand when they’re trying to figure out the nth term of an arithmetic process. It’s essential to be aware of and avoid these mistakes so that calculations are correct.
Common Mistakes:
Confusing the First Term with the Common Difference: A frequent fault is mixing up the first term (({a_{1}})) of the sequence with the common difference (d). Remember, a1 is the starting point of the sequence, while d is the consistent interval between terms.
Overlooking Negative Common Differences: The common difference is negative when sequences decrease. Neglecting the sign of d can result in incorrect calculations.
Arithmetic Sequences Always Increase: Many assume arithmetic sequences only grow. However, they can also decrease or remain constant if the common difference is negative or zero respectively.
Any Sequence with a Pattern is Arithmetic: Not all sequences with patterns are arithmetic. A sequence is only arithmetic if the difference between consecutive terms is constant. Sequences with varying intervals or patterns based on multiplication (geometric sequences) are not arithmetic.
Overview of Related Concepts
The study of arithmetic sequences naturally leads to exploring related concepts such as the sum of an arithmetic series and infinite arithmetic sequences, where the ({n^{th}}) term formula plays a pivotal role. The sum of an arithmetic series involves calculating the total of all terms within a finite sequence, applying the formula ({S_{n}=\frac{2a_{1}+d(n-1)}{2}\cdot n}) or ({S_{n}=\frac{a_{1}+a_{n}}{2}\cdot n}), where ({S_{n}}) represents the series sum, and n is the number of terms.
Infinite arithmetic sequence, which can go on forever in theory, causes people to talk about convergence and how sequences behave over time. In arithmetic sequences, the idea of infinity is more of a theoretical one. It is often used to push the limits of mathematical logic and thinking.
Unlocking Patterns: The Essence of Arithmetic Sequences
In wrapping up, the exploration of arithmetic sequences reveals their deep-seated importance in both the realm of pure mathematics and the practical aspects of daily life. Key takeaways we learned on our post were the basics of arithmetic sequences, which are made up of terms with a constant difference between them, how important the nth term formula is for finding any term in a sequence, and how these ideas can be used in many different fields, such as finance, engineering, and computer science. Moreover, we navigated through common pitfalls and misconceptions, ensuring a robust grasp of how to accurately compute and apply the nth term. It’s evident that the arithmetic sequences is an academic exercise and a practical toolset for solving real-world problems.
Was this article helpful?
7013
779
Readers also enjoyed
Sep 15, 2021
9 min read
Best 40 Online Math Courses For Every Student
Read more
Feb 09, 2024
8 min read
How to Calculate Weighted Average: Step-by-Step Guide (+ Examples)
Read more
Jan 04, 2021
4 min read
How to Write a Good Term Paper
Read more
Browse all
WHY WAIT? PLACE AN ORDER RIGHT NOW! |
10530 | https://math.stackexchange.com/questions/4154754/flaw-in-my-reasoning-for-the-maximum-of-ab-if-a-b-ge0-and-a2b-3 | algebra precalculus - Flaw in my reasoning for the maximum of $ab$ if $a,b\ge0$ and $a+2b=3$? - Mathematics Stack Exchange
Join Mathematics
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Mathematics helpchat
Mathematics Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Flaw in my reasoning for the maximum of a b a b if a,b≥0 a,b≥0 and a+2 b=3 a+2 b=3?
Ask Question
Asked 4 years, 4 months ago
Modified4 years, 4 months ago
Viewed 293 times
This question shows research effort; it is useful and clear
2
Save this question.
Show activity on this post.
Problem statement: What is the maximum value of the product a b a b if a a,b b are non-negative numbers such that a+2 b=3 a+2 b=3?
What is the flaw in my solution?
We know that a b−−√≤(a+b)2 a b≤(a+b)2 and that a=3−2 b a=3−2 b. The product a b a b will be maximum when it is equal to the square of the RHS of the inequality above. Plugging in for a a, and squaring both sides we get the equation: (3−2 b)(b)=(((3−2 b)+b)2 4(3−2 b)(b)=(((3−2 b)+b)2 4. Which gives b=1 b=1. And plugging b=1 b=1 into the the equation in the problem statement gives a=1 a=1. So, the max product is 1∗1=1 1∗1=1.
What am I doing wrong? What concepts could I be I misunderstanding? Can you please explain? The actual answer is 9/8 9/8. Thank you.
algebra-precalculus
inequality
optimization
solution-verification
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this question to receive notifications
edited May 29, 2021 at 18:37
user21820
61.1k 9 9 gold badges 109 109 silver badges 282 282 bronze badges
asked May 29, 2021 at 8:09
user796511 user796511
6
The right-hand side of your inequality depends on b b. You can't claim a maximum based on a bound that depends on the variable being optimized.dxiv –dxiv 2021-05-29 08:12:56 +00:00 Commented May 29, 2021 at 8:12
Maybe that is really intuitive and obvious to you and many others, but I just don’t see why. Anything anyone can do to help me grasp this?user796511 –user796511 2021-05-29 08:17:23 +00:00 Commented May 29, 2021 at 8:17
1 "The product ab will be maximum when it is equal to the square of the RHS of the inequality above" — The equality case of the AM-GM inequality is always a=b a=b, but this doesn't tell you that (a+b)2/4(a+b)2/4 is the maximum of a b a b when a a and b b vary under other constraints. Try for example to apply the same argument to "what is the maximum value of the product a b a b if a a, b b are non-negative numbers such that a=3 a=3".dxiv –dxiv 2021-05-29 08:24:37 +00:00 Commented May 29, 2021 at 8:24
Please carefully spell out the steps that you believe justify the sentence: "The product a b a b will be maximum when it is equal to the square of the RHS of the inequality above." Because that sentence is not, in fact, correct.Robert Shore –Robert Shore 2021-05-29 08:28:06 +00:00 Commented May 29, 2021 at 8:28
@dxiv in your first comment do you want to say that we cannot give maximum value unless we have a constant term on RHS Lalit Tolani –Lalit Tolani 2021-05-29 09:03:38 +00:00 Commented May 29, 2021 at 9:03
|Show 1 more comment
3 Answers 3
Sorted by: Reset to default
This answer is useful
6
Save this answer.
Show activity on this post.
Indeed: We have
(3−2 b)b≤(3−b)2 4(3−2 b)b≤(3−b)2 4
is a true statement and in fact equality holds when b=1 b=1.
However, it is possibel for the LHS to get a larger value and the equality doesn't hold.
To maximize it notice that (3−2 b)b(3−2 b)b is a concave quadratic and the optimal value is attained when
b=1.5 2=3 4 b=1.5 2=3 4
That is the maximum value is (3 2)⋅(3 4)=9 8.(3 2)⋅(3 4)=9 8.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this answer to receive notifications
answered May 29, 2021 at 8:30
Siong Thye GohSiong Thye Goh
155k 20 20 gold badges 94 94 silver badges 158 158 bronze badges
3
sir you graphically proved it that " it is possibel for the LHS to get a larger value and the equality doesn't hold" but how we can say that analytically Lalit Tolani –Lalit Tolani 2021-05-29 08:59:55 +00:00 Commented May 29, 2021 at 8:59
to show something is possible, we just need an example. we can use the example, in this question and find the maximum value of the quadratic curve and verify the RHS forms a strict upper bound.Siong Thye Goh –Siong Thye Goh 2021-05-29 09:11:18 +00:00 Commented May 29, 2021 at 9:11
@lalittolani You could prove that by showing that 3 x−2 x 2 3 x−2 x 2 intersects with (3−x)2/4(3−x)2/4 at 1, but the former has a peak that is higher: 3⋅0.75−2⋅0.75 2=1.125 3⋅0.75−2⋅0.75 2=1.125.a concerned citizen –a concerned citizen 2021-05-29 16:29:27 +00:00 Commented May 29, 2021 at 16:29
Add a comment|
This answer is useful
4
Save this answer.
Show activity on this post.
Building upon OP's attempt to use AM-GM, the following will work, instead, because it is arranged such that the right-hand side of the inequality matches the known constant sum.
a⋅2 b−−−−√≤a+2 b 2=3 2⟹2 a b≤(3 2)2=9 4⟹a b≤9 8 a⋅2 b≤a+2 b 2=3 2⟹2 a b≤(3 2)2=9 4⟹a b≤9 8
The maximum value of 9 8 9 8 is attained when a=2 b a=2 b, which is a=3 2,b=3 4 a=3 2,b=3 4.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this answer to receive notifications
edited May 29, 2021 at 16:45
answered May 29, 2021 at 9:01
dxivdxiv
78k 6 6 gold badges 69 69 silver badges 127 127 bronze badges
2
Wish the downvoter had left a comment why.dxiv –dxiv 2021-05-29 18:26:13 +00:00 Commented May 29, 2021 at 18:26
I think somebody has a grudge because it looks like all the others got one (though I can't really tell that about Siong's answer since it has gained a few more points than when I saw this).a concerned citizen –a concerned citizen 2021-05-29 22:47:25 +00:00 Commented May 29, 2021 at 22:47
Add a comment|
This answer is useful
0
Save this answer.
Show activity on this post.
I know you have accepted the answer but still I have one analogy to share with you-
Suppose we have a quadratic equation(to say) as -
e x x 2−(l o g x)x+3=0 e x x 2−(l o g x)x+3=0
Now you found it's roots by using quadratic formula. The "expression" of roots that you will obtain will also be some function of x x and in that case you can't call those expressions as roots because roots are the values of variable for which the equation reduces to zero and you can't get values of variable in terms of variable because a value is fixed. If the equation would be as follows-
x 2−3 x+2=0 x 2−3 x+2=0 then the you will obtain a constant value and in that case you can say that those values are certainly the roots of your equation.
Similarly ,as @dxiv mentioned in his answer and comments, "unless you claim it is a constant relative to constraints, you can't claim it a maximum".
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this answer to receive notifications
answered May 30, 2021 at 4:46
Lalit TolaniLalit Tolani
3,454 1 1 gold badge 12 12 silver badges 34 34 bronze badges
Add a comment|
You must log in to answer this question.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Related
2Maximum value of the product ab
3What is the maximum value of 6–√x y+4 y z 6 x y+4 y z given x 2+y 2+z 2=1?x 2+y 2+z 2=1?
3If x x, y y and z z are distinct positive integers and x+y+z=11 x+y+z=11 then what is the maximum value of (x y z+x y+y z+z x)(x y z+x y+y z+z x)?
1Solving Radical Inequalities
5Possible mistake finding the maximum volume of a box with the AM-GM inequality?
4Absolute Value Rational Inequalities Help Please
3Simplifying inequality contradicts actual inequality
2Two different solutions for the irrational inequality (x−1)x 2−x−2−−−−−−−−−√≥0(x−1)x 2−x−2≥0.
Hot Network Questions
ICC in Hague not prosecuting an individual brought before them in a questionable manner?
How different is Roman Latin?
What were "milk bars" in 1920s Japan?
With line sustain pedal markings, do I release the pedal at the beginning or end of the last note?
Is it possible that heinous sins result in a hellish life as a person, NOT always animal birth?
How to convert this extremely large group in GAP into a permutation group.
Why multiply energies when calculating the formation energy of butadiene's π-electron system?
Drawing the structure of a matrix
Discussing strategy reduces winning chances of everyone!
Interpret G-code
Transforming wavefunction from energy basis to annihilation operator basis for quantum harmonic oscillator
Passengers on a flight vote on the destination, "It's democracy!"
What NBA rule caused officials to reset the game clock to 0.3 seconds when a spectator caught the ball with 0.1 seconds left?
Is it ok to place components "inside" the PCB
Repetition is the mother of learning
Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term?
Vampires defend Earth from Aliens
Matthew 24:5 Many will come in my name!
Why include unadjusted estimates in a study when reporting adjusted estimates?
Program that allocates time to tasks based on priority
Can I go in the edit mode and by pressing A select all, then press U for Smart UV Project for that table, After PBR texturing is done?
Calculating the node voltage
How to rsync a large file by comparing earlier versions on the sending end?
Is encrypting the login keyring necessary if you have full disk encryption?
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Mathematics
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
10531 | https://www.fisheries.noaa.gov/west-coast/endangered-species-conservation/south-central-california-coast-steelhead | Published Time: Sat, 13 Sep 2025 10:21:01 GMT
South-Central California Coast Steelhead | NOAA Fisheries
Skip to main content
Unsupported Browser Detected
Internet Explorer lacks support for the features of this website. For the best experience, please use a modern browser such as Chrome, Firefox, or Edge.
An official website of the United States government Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Search NOAA Fisheries Search
Menu
Find A Species
Find a Species
Dolphins & Porpoises
Fish & Sharks
Highly Migratory Species
Invertebrates
Sea Turtles
Seals & Sea Lions
Whales
Protected Species
All Threatened & Endangered Species
Marine Mammals
Species By Region
Alaska
New England/Mid-Atlantic
Pacific Islands
Southeast
West Coast
Helpful Resources
Marine Life Viewing Guidelines
Marine Life in Distress
Report a Stranded or Injured Marine Animal
Species in the Spotlight
Fishing & Seafood
Sustainable Fisheries
Bycatch
Catch Shares
Fishery Observers
Illegal, Unregulated, Unreported Fishing
Magnuson-Stevens Act
Research Surveys
Population Assessments
Resources for Fishing
Commercial Fishing
Recreational Fishing
Subsistence Fishing
Fishery Management Info
Permits & Forms
Rules & Regulations by Region
Sustainable Seafood
Seafood Profiles
Aquaculture
Commerce & Trade
Seafood Inspection
Related Topics
Atlantic Highly Migratory Species
Cooperative Research
Enforcement
Financial Services
International Affairs
Science & Data
Socioeconomics
Protecting Marine Life
Endangered Species Conservation
Listing Species Under ESA
Critical Habitat
Consultations
Species Recovery
Research Surveys
Species in the Spotlight
Endangered Species Act
Marine Mammal Protection
Health & Stranding Response
Marine Mammal Protection Act
Research Surveys
Population Assessments
Take Reduction Plans
Marine Life in Distress
Report a Stranded or Injured Marine Animal
Bycatch
Ocean Acoustics/Noise
Unusual Mortality Events
Vessel Strikes
Related Topics
Marine Life Viewing Guidelines
Enforcement
Funding Opportunities
International Cooperation
Permits & Authorizations
Regulations & Actions
Science & Data
Environment
Ecosystems
U.S. Regional Ecosystems
Management
Ecosystem Science
Changing Ecosystems and Fisheries Initiative
Habitat Conservation
Priority Restoration Investments
Habitat Restoration
Habitat Protection
Types of Habitat
Habitat by Region
Science
Consultations
Climate Change
Understanding the Impacts
Climate Change Solutions
Regional Activities
Regions
Our Regions
Alaska
New England/ Mid-Atlantic
Pacific Islands
Southeast
West Coast
Contact Us
Regional Offices
Science Centers
Resources & Services
Rules & Regulations
Fisheries Rules & Regs
Fisheries Management Info
Protected Resources Regs & Actions
Permits
Fishing & Seafood
Protected Resources
International & Trade
Funding & Financial Services
Funding Opportunities
Financial Services
Prescott Grants
Saltonstall-Kennedy Grants
Habitat Restoration Grants
Consultations
Habitat
Endangered Species
Tribal
Science & Data
Research
Surveys
Data
Maps & GIS
Publications
Published Research
Key Reports
Documents
Publication Databases
Outreach Materials
Laws & Policies
Magnuson-Stevens Act
Endangered Species Act
Marine Mammal Protection Act
Policies
Outreach & Education
For Educators
For Students
Educational Materials
Outreach Materials
Teacher at Sea
Events
About Us
NOAA Fisheries
Our Mission
Who We Are
Where We Work
Our History
News & Media
News & Announcements
Bulletins
Multimedia
Science Blogs
Events
Video Gallery
Photo Gallery
Careers & More
Career Paths
Internships
Citizen Science and Volunteering
Contact Us
National Program Offices
Regional Offices
Science Centers
Our Partners
Regional Fishery Management Councils
American Fisheries Advisory Committee
Government Agencies
Non-Government Organizations
Search NOAA Fisheries Search
Find A Species
Back
Find A Species
Find a Species
Dolphins & Porpoises
Fish & Sharks
Highly Migratory Species
Invertebrates
Sea Turtles
Seals & Sea Lions
Whales
Protected Species
All Threatened & Endangered Species
Marine Mammals
Species By Region
Alaska
New England/Mid-Atlantic
Pacific Islands
Southeast
West Coast
Helpful Resources
Marine Life Viewing Guidelines
Marine Life in Distress
Report a Stranded or Injured Marine Animal
Species in the Spotlight
Fishing & Seafood
Back
Fishing & Seafood
Sustainable Fisheries
Bycatch
Catch Shares
Fishery Observers
Illegal, Unregulated, Unreported Fishing
Magnuson-Stevens Act
Research Surveys
Population Assessments
Resources for Fishing
Commercial Fishing
Recreational Fishing
Subsistence Fishing
Fishery Management Info
Permits & Forms
Rules & Regulations by Region
Sustainable Seafood
Seafood Profiles
Aquaculture
Commerce & Trade
Seafood Inspection
Related Topics
Atlantic Highly Migratory Species
Cooperative Research
Enforcement
Financial Services
International Affairs
Science & Data
Socioeconomics
Protecting Marine Life
Back
Protecting Marine Life
Endangered Species Conservation
Listing Species Under ESA
Critical Habitat
Consultations
Species Recovery
Research Surveys
Species in the Spotlight
Endangered Species Act
Marine Mammal Protection Health & Stranding Response
Marine Mammal Protection Act
Research Surveys
Population Assessments
Take Reduction Plans
Marine Life in Distress Report a Stranded or Injured Marine Animal
Bycatch
Ocean Acoustics/Noise
Unusual Mortality Events
Vessel Strikes
Related Topics Marine Life Viewing Guidelines
Enforcement
Funding Opportunities
International Cooperation
Permits & Authorizations
Regulations & Actions
Science & Data
Environment
Back
Environment Ecosystems
U.S. Regional Ecosystems
Management
Ecosystem Science
Changing Ecosystems and Fisheries Initiative
Habitat Conservation Priority Restoration Investments
Habitat Restoration
Habitat Protection
Types of Habitat
Habitat by Region
Science
Consultations
Climate Change Understanding the Impacts
Climate Change Solutions
Regional Activities
Regions
Back
Regions Our Regions
Alaska
New England/ Mid-Atlantic
Pacific Islands
Southeast
West Coast
Contact Us Regional Offices
Science Centers
Resources & Services
Back
Resources & Services Rules & Regulations
Fisheries Rules & Regs
Fisheries Management Info
Protected Resources Regs & Actions
Permits Fishing & Seafood
Protected Resources
International & Trade
Funding & Financial Services Funding Opportunities
Financial Services
Prescott Grants
Saltonstall-Kennedy Grants
Habitat Restoration Grants
Consultations Habitat
Endangered Species
Tribal
Science & Data Research
Surveys
Data
Maps & GIS
Publications Published Research
Key Reports
Documents
Publication Databases
Outreach Materials
Laws & Policies Magnuson-Stevens Act
Endangered Species Act
Marine Mammal Protection Act
Policies
Outreach & Education For Educators
For Students
Educational Materials
Outreach Materials
Teacher at Sea
Events
About Us
Back
About Us NOAA Fisheries
Our Mission
Who We Are
Where We Work
Our History
News & Media News & Announcements
Bulletins
Multimedia
Science Blogs
Events
Video Gallery
Photo Gallery
Careers & More Career Paths
Internships
Citizen Science and Volunteering
Contact Us National Program Offices
Regional Offices
Science Centers
Our Partners Regional Fishery Management Councils
American Fisheries Advisory Committee
Government Agencies
Non-Government Organizations
Endangered Species Conservation
South-Central California Coast Steelhead
The South-Central California Coast steelhead is a threatened species. NOAA Fisheries’ West Coast Region, along with the Science Centers, work to protect and conserve this species under the Endangered Species Act.
West Coast
On This Page
Species Status
Species Recovery
Partnerships for Recovery
More Information
Contact
Species Status
ESA Listing Status: Threatened on August 18, 1997 (62 FR 43937) and January 5, 2006 (71 FR 833); updated April 14, 2014 (79 FR 20802)
DPS Description: This distinct population segment, or DPS, includes naturally spawned anadromous steelhead (Oncorhynchus mykiss) originating below natural and manmade impassable barriers from the Pajaro River to (but not including) the Santa Maria River.
Current Population Trends:South-Central California Coast Steelhead Status Reviews and Five-Year Updates
Critical Habitat: Designated September 2, 2005
Protective Regulations: Issued June 28, 2005 (70 FR 37159)
Recovery Plan:South-Central California Coast Steelhead Recovery Plan (2013)
Species Recovery
NOAA Fisheries delineated eight recovery domains, or geographic recovery planning areas, for the ESA-listed salmon and steelhead populations on the West Coast. The South-Central/Southern California Coast Domain extends from the Pajaro River to the Tijuana River at the U.S.-Mexican border (see map of recovery domains). This sub-domain is home to two ESA-listed steelhead species:
South-Central California Coast steelhead
Southern California Coast steelhead
NOAA Fisheries West Coast Region manages recovery planning and implementation for this domain through itsCalifornia Coastal Area Office.
Recovery Plan
Working with its partners, NOAA Fisheries adopted a Recovery Plan for South-Central California Coast Steelhead in 2013. The plan is based on the biological needs of the fish and provides the foundation for restoring populations to healthy levels.
Partnerships for Recovery
Partners A - C
AmeriCorps Environmental Stewards
Association of Monterey Bay Area Governments
Audubon California
Army Corps of Engineers
Association of California Water Agencies
Anadromous Fish Restoration Program
Arroyo Seco River Alliance
Big Creek Lumber Company
Big Sur Land Trust
Bureau of Indian Affairs (United States)
Bureau of Land Management (United States)
Bureau of Reclamation (United States)
California‐American Water Company
California Coastal Commission
California Coastal Conservancy
California Conservation Corps
California Division Safety of Dams
California Department of Fish and Wildlife
California Department of Forestry and Fire Protection
California Department of Transportation
California Department of Parks and Recreation
California Division of Mines and Geology
California Native Plant Society
California River Parkway Program
California Sport Fishing Protective Association
California State University, Monterey Bay
California State Water Resources Control Board
California Trout
Cambria Community Service District
Carmel Area Wastewater District
Carmel River Association
Carmel River Lagoon Coalition
Carmel River Steelhead Association
Carmel River Watershed Conservancy
Carmel River Watershed Council
Carmel Valley Property Owners Association
Central Coast Resource Conservation and Development Council
Central Coast Salmon Enhancement, Inc.
Coastal Habitat, Education, and Environmental Restoration
Coastal San Luis Resource Conservation District
Comprehensive Monitoring Assessment and Research Program
City of Atascadero
City of Carmel
City of Monterey
City of Morro Bay
City of Gilroy
City of Paso Robles
City of Pismo Beach
City of Salinas
City of San Luis Obispo
City of San Miguel
City of Watsonville
Partners D - R
Department of Transportation (United States)
Department of Water Resources (State of California)
Environmental Protection Agency (United States)
Earth Island Institute
Elkhorn Slough Foundation
Federal Emergency Management Agency
Federal Energy Regulatory Commission
Friends of the River
Fisheries Restoration Grant Program
Garrapata Creek Watershed Council
Los Padres Forest Watch
The Nature Conservancy
Monterey County
Marina Coast Water District
Morro Bay National Estuary Program
Monterey Bay National Marine Sanctuary
Monterey Bay Salmon and Trout Project
Monterey County Public Works Department
Monterey County Service Area 50
Monterey County Water Resources Agency
Monterey Peninsula Water Management District
Monterey Regional Park District
Monterey County Unified Sportsmen Association
National Fish and Wildlife Foundation
National Park Service, Pacific Western Regional Office
National Resources Conservation Service
Pebble Beach Community Services District
Planning and Conservation League Foundation
Regional Water Quality Control Board
Resource Conservation District of Monterey County
Resource Conservation District of Santa Cruz County
Partners S - Z
San Benito County
San Benito County Water District
San Luis Obispo County Farm Bureau
Santa Clara County
Santa Cruz County Resource Conservation District
Santa Cruz County
Santa Clara Valley Water District
Santa Lucia Preserve
Santa Luis Obispo County
Salinas Valley Fly Fishers Club
The Big Sur Land Trust
The Cambria Land Trust
The Land Conservancy of San Luis Obispo County
Tri‐County Fish Team
Trout Unlimited
The Wildlands Conservancy
The Watershed Institute (California State University, Monterey Bay)
Upper Salinas‐Las Tablas Resources Conservation District
Upper Salinas Watershed Coalition
United States Forest Service
United States Fish and Wildlife Service
United States Geological Survey
Ventana Wilderness Alliance
United States Army (Fort Hunter Liggett)
Wildlife Conservation Board (State of California)
More Information
Steelhead Status Reviews and Five-Year Updates
Steelhead Federal Register Notices
Salmon and Steelhead Federal Register Rules and Notices prior to August 2019
Steelhead Maps & GIS Data
Salmon Publications
Steelhead Publications
Salmon and Steelhead Hatcheries on the West Coast
Learn about what you can do to help endangered and threatened salmon and steelhead recover
Recent Stories
Contact
If you have questions, would like to learn more about recovery efforts in your watershed, or would like to get involved directly, please contact:
West Coast Region - California Coastal Area Office
Mark Capelli
Email: Mark.Capelli@noaa.gov
Phone: 805.963.6478 ext. 14
Last updated by West Coast Regional Office on 08/21/2024
Sign up for our newsletters
Facebook
Instagram
Youtube
X (Twitter)
Linkedin
NOAA Fisheries
About Us
Laws & Policies
FishWatch
Site Index
For Fishermen
Rules & Regulations
Permits & Forms
Commercial Fishing
Recreational Fishing
Fishery Observers
For Researchers
Published Research
Science & Data
Contact Us
Contact Us
Media Inquiries
Report a Violation
Report a Stranded or Injured Marine Animal
NOAA Staff Directory
Send Feedback
Science. Service. Stewardship.
Accessibility
|
EEO
|
FOIA
|
Information Quality
|
Policies & Disclaimer
|
Privacy Policy
|
USA.gov
Department of Commerce
|
National Oceanic and Atmospheric Administration
|
NOAA Fisheries |
10532 | https://www.acs.org/middleschoolchemistry/lessonplans/chapter5/lesson9.html | Temperature Changes in Dissolving
Youtube ID: Vl7HCFubrtE
Lesson Summary Video for teachers
Note: This video is designed to help the teacher better understand the lesson and is NOT intended to be shown to students. It includes observations and conclusions that students are meant to make on their own.
Key Concepts
Summary
Students will feel the temperature change that occurs when a cold pack and a hot pack are activated. They will see that these temperature changes are due to a solid substance dissolving in water. Students will then compare the temperature changes that occur as four different solutes dissolve in water and classify these as either endothermic or exothermic. Students will be introduced to the concept that it takes energy to break bonds and energy is released when bonds are formed during the process of dissolving.
Objective
Students will be able to identify variables in an experiment to find out how much the temperature increases or decreases as each of four solutes dissolves in water. Students will be able to correctly classify the process of dissolving as either exothermic or endothermic for each solute. Students will be able to explain that the temperature changes in dissolving are a result of the amount of energy released compared to the amount of energy used as “bonds” are formed and broken.
Safety
Be sure you and the students wear properly fitting goggles. Excess dry material from the hot and cold packs can be placed in the trash. Sodium carbonate may be a skin irritant. Have students wash hands after the activity.
Materials for the Demonstrations
Materials for Each Group
Notes about the Materials
Note: This activity deals with a concept that is not often addressed in middle school—that a temperature change occurs during the process of dissolving. Most middle school textbooks and curricula associate a change in temperature only with chemical change. Dissolving is usually considered a physical change but also can result in a change in temperature. This change in temperature is based on the energy changes involved in breaking and making “bonds” in the process of dissolving.
Read more about the energy changes in making and breaking bonds in Teacher Background.
All Downloads
Download All Lesson 5.9 Resources
Get the entire lesson plan and Student Activity Sheet for " Lesson 5.9 - Temperature Changes in Dissolving."
Download PDF
DOCX | Google Doc
Online Assignments
Supplement in-class learning with interactive, multimedia-rich Google Forms lesson modules, perfect for reinforcing key chemistry concepts and scientific investigation skills.
Explore Online Assignments
Standards Alignment
5.9 Next Generation Science Standards (PDF)
5.9 Common Core State Standards (PDF)
More about Standards Alignment
Instructions
1 Engage
Step 1 Allow students to feel the temperature change in an activated cold pack and an activated hot pack.
Tell students that they will explore how some hot and cold packs work. Give them a hint that it has to do with dissolving, which they have been studying in this chapter.
Materials for the Demonstration
Procedure
Expected Results
The cold pack quickly becomes cold while the hot pack quickly becomes hot.
Step 2 Do a demonstration to show how cold and hot packs work.
Note: In this demonstration, 1 teaspoon of each substance is dissolved in 10 mL of water. Since the purpose of this demonstration is to show whether the temperature simply goes up or down, this type of volume measure is fine. But to compare which substance is more or less exothermic or endothermic than another, as students will do in the activity, the solute will be measured in grams.
Materials for the Demonstration
Procedure
Expected Results
Dissolving the substance from the cold pack will cause the temperature to decrease to less than 10 °C (endothermic). Dissolving the substance from the hot pack will cause the temperature to increase to over 40 °C (exothermic). Results may vary.
Step 3 Introduce the terms endothermic and exothermic.
Tell students that scientists describe temperature changes that occur when substances interact as either endothermic or exothermic. When the temperature decreases, as it does in the cold pack, the process is endothermic. When the temperature increases, as it does in the hot pack, the process is exothermic.
2 Evaluate
Give each student an activity sheet.
Download the student activity sheet, and distribute one per student.
All Downloads
The activity sheet will serve as the “Evaluate” component of each 5-E lesson plan. The activity sheets are formative assessments of student progress and understanding. A more formal summative assessment is included at the end of each chapter.
Students will record their observations and answer questions about the activity on the activity sheet. The Explain It with Atoms and Moleculesand Take It Furthersections of the activity sheet will either be completed as a class, in groups, or individually depending on your instructions. Look at the teacher version of the activity sheet to find the questions and answers.
3 Explore
Step 4 Introduce the dissolving activity students will do and help students identify the variables.
Tell students that they will compare how much the temperature changes when four household substances dissolve in water. Introduce the crystals students will dissolve:
Ask students:
Note: Comparing the amount of temperature change for different substances by dissolving the same mass of each substance in the same amount of water is fine at the middle school level. However, a more rigorous approach is to dissolve the same number of particles (molecules or ionic units) of each substance in the same amount of water.
Read more about counting molecules in Teacher Background.
All Downloads
Step 5 Have students monitor changes in temperature as they dissolve four different household solutes in water.
Question to Investigate
Which solute dissolves the most endothermically and which dissolves the most exothermically in water?
Materials for Each Group
Procedure
Expected Results
Potassium chloride dissolved the most endothermically, and calcium chloride dissolved the most exothermically. Student temperature readings will vary, but will likely be similar to the following:
| | | |
---
| Solute dissolved in room temperature water (22 °C) | Maximum or minimum temperature achieved | Endothermic or exothermic? |
| potassium chloride | 14 °C | endothermic |
| calcium chloride | 45 °C | exothermic |
| sodium carbonate | 32 °C | exothermic |
| sodium bicarbonate | 18 °C | endothermic |
Maximum or minimum temperature achieved
Step 6 Discuss student observations.
Ask students:
4 Explain
Step 7 Show students an animation of dissolving and explain that the energy of making and breaking “bonds” during dissolving causes a change in temperature.
Project the animation Breaking and Making Bonds.
Breaking and Making Bonds
Tell students that there is an important rule in chemistry: Energy is required to pull apart atoms, ions, or molecules that are attracted to each other. But when atoms, ions, or molecules come together, energy is released. One way to say it is, “It takes energy to break bonds, and energy is released when bonds are formed.”
Project the animation Energy and Dissolving.
Energy and Dissolving
Press the “next” button and explain that this happens in dissolving. When water molecules are attracted to and bond to the molecules or ions of a substance, some energy is released as shown by the arrow going out. Then the water molecules pull ions or molecules of the substance apart, which takes energy, as shown by the arrow going in.
Project the image Exothermic Dissolving.
The process of dissolving is exothermic when more energy is released when water molecules “bond” to the solute than is used to pull the solute apart. Because more energy is released than is used, the molecules of the solution move faster, making the temperature increase.
Project the image Endothermic Dissolving.
The process of dissolving is endothermic when less energy is released when water molecules “bond” to the solute than is used to pull the solute apart. Because less energy is released than is used, the molecules of the solution move more slowly, making the temperature decrease.
5 Extend
Step 8 Explore whether the process of crystallization can cause a change in temperature.
Project the video Hand Warmer.
Hand Warmer
In the hand warmer, the water molecules and the ions of the solute come together to form a crystal. Bending the metal disk creates tiny scratches, which act as nucleation points where the sodium acetate crystal forms. As the water molecules and ions bond together in the growing crystal, energy is released. This results in an increase in temperature.
Step 9 Liquids dissolving in a liquid can also cause a temperature change.
Project the video Temperature Change Alcohol in Water.
Temperature Change – Alcohol in Water
Explain that the “bonding” of water molecules to alcohol molecules releases more energy than it takes to separate the alcohol molecules from each other. This results in an increase in temperature.
What is the 5-E format?
The 5-E instructional model is an approach to teaching and learning that focuses on active engagement, inquiry-based learning, and collaboration.
Learn More
Simulations
Breaking and Making Bonds
Energy and Dissolving
Hand Warmer
Temperature Change – Alcohol in Water
Simulations for Lesson 5.9
Downloads
For Students
For Teachers
Resources for the entire Chapter 5
More from Chapter 5
Interactive Lesson Modules
Have Questions? Visit Help Center
This lesson is part of: Chapter 5: The Water Molecule and Disolving
Lesson 5.8: Can Gases Dissolve in Water?
Lesson 6.1: What is a Chemical Reaction?
1155 Sixteenth Street, NW, Washington, DC 20036, USA | service@acs.org | 1-800-333-9511 (US and Canada) | 614-447-3776 (outside North America)
Copyright © 2025 American Chemical Society |
10533 | https://link.springer.com/chapter/10.1007/978-3-642-55566-4_16 | Log in
A Survey of the Hadwiger-Debrunner (p, q)-problem
Chapter
pp 347–377
Cite this chapter
Discrete and Computational Geometry
Jürgen Eckhoff
Part of the book series: Algorithms and Combinatorics ((AC,volume 25))
1832 Accesses
32 Citations
Abstract
At the annual meeting of the Swiss Mathematical Society held in September 1956 in Basel, H. Hadwiger presented the following theorem. It was published one year later in a joint paper with H. Debrunner, his colleague at the University of Bern.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Log in via an institution
Subscribe and save
Springer+
from $39.99 /Month
Starting from 10 chapters or articles per month
Access and download chapters and articles from more than 300k books and 2,500 journals
Cancel anytime
View plans
Buy Now
Chapter
: USD 29.95
: Price excludes VAT (USA)
eBook
: USD 129.00
: Price excludes VAT (USA)
Softcover Book
: USD 169.99
: Price excludes VAT (USA)
Hardcover Book
: USD 169.99
: Price excludes VAT (USA)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Improved bounds on the Hadwiger–Debrunner numbers
Article 18 April 2018
A new lower bound on Hadwiger-Debrunner numbers in the plane
Article 21 August 2021
From a (p, 2)-Theorem to a Tight (p, q)-Theorem
Article 27 November 2018
Explore related subjects
Discover the latest articles, books and news in related subjects, suggested using machine learning.
Abstract Harmonic Analysis
Discrete Mathematics
History of Mathematical Sciences
Mathematics
Mathematical Physics
Mathematics in the Humanities and Social Sciences
References
N. Alon, Piercing d-intervals, Discrete Comput. Geom. 19 (1998) 333-334.
MATH Google Scholar
2. N. Alon, Covering a hypergraph of subgraphs, Discrete Math., to appear.
Google Scholar
3. N. Alon, I. B´ar´any, Z. F¡§uredi and D. J. Kleitman, Point selection and weak-nets for convex hulls, Combin. Probab. Comput. 1 (1992) 189-200.
Article MathSciNet Google Scholar
4. N. Alon and G. Kalai, Bounding the piercing number, Discrete Comput. Geom. 13 (1995) 245-256.
MathSciNet MATH Google Scholar
5. N. Alon, G. Kalai, J. Matou¡¦sek and R. Meshulam, Transversal numbers for hypergraphs arising in geometry, Adv. Appl. Math. 29 (2002) 79-101.
MathSciNet MATH Google Scholar
6. N. Alon and D. J. Kleitman, Piercing convex sets, Bull. Amer. Math. Soc. (N.S.)27 (1992) 252-256.
Article MathSciNet MATH Google Scholar
7. N. Alon and D. J. Kleitman, Piercing convex sets and the Hadwiger-Debrunner (p, q)-problem, Adv. Math. 96 (1992) 103-112.
MathSciNet MATH Google Scholar
8. N. Alon and D. J. Kleitman, A purely combinatorial proof of the Hadwiger Debrunner (p, q)con jecture, Electron. J. Combin. 4 (1997) #R1.
Google Scholar
9. I. B´ar´any, A generalization of Carath´eodory’s theorem, Discrete Math. 40 (1982) 141-152.
Article MathSciNet Google Scholar
10. I. B´ar´any and J. Matou¡¦sek, A fractional Helly theorem for convex lattice sets, Adv. Math., to appear.
Google Scholar
J. Bourgain and J. Lindenstrauss, On covering a set in RN by balls of the same diameter,in: Geometric Aspects of Functional Analysis (1989-90), pp. 138-144, Lecture Notes inMathematics 1469, Springer-Verlag, Berlin, 1991.
Chapter Google Scholar
12. G. D. Chakerian, Intersection and covering properties of convex sets, Amer. Math. Monthly 76 (1969) 753-766.
Article MathSciNet MATH Google Scholar
13. G. D. Chakerian and G. T. Sallee, An intersection theorem for sets of constant width, Duke Math. J. 36 (1969) 165-170.
MathSciNet MATH Google Scholar
14. G. D. Chakerian and S. K. Stein, On measures of symmetry of convex bodies, Canad. J. Math. 17(1965) 497-504.
Article MathSciNet MATH Google Scholar
15. G. D. Chakerian and S. K. Stein, Some intersection properties of convex bodies, Proc. Amer. Math. Soc. 18 (1967) 109-112.
Article MathSciNet MATH Google Scholar
16. B. Chazelle, H. Edelsbrunner, M. Grigni, L. Guibas, M. Sharir and E. Welzl, Improved bounds on weak _-nets for convex sets, Discrete Comput. Geom. 13 (1995) 1-15.
MathSciNet MATH Google Scholar
17. F. Chung and L. Lu, An upper bound for the Tur´an number n3(4), J. Combin. Theory Ser. A 87 (1999) 381-385.
Article MathSciNet MATH Google Scholar
18. L. Danzer, ¡§Uber zwei Lagerungsprobleme; Abwandlungen einer Vermutung von T. Gallai, Dissertation, Techn. Hochschule M¡§unchen, 1960.
Google Scholar
19. L. Danzer, ¡§Uber Durchschnittseigenschaften n-dimensionaler Kugelfamilien, J. Reine Angew. Math. 208 (1961) 181-203.
MathSciNet MATH Google Scholar
20. L. Danzer, On the k-th diameter in Ed and a problem of Gr¡§unbaum, in: Proc. Colloq. Convexity Copenhagen 1965, p. 41, Kobenhavns Universitets Matematiske Institut, Copenhagen, 1967.
Google Scholar
21. L. Danzer, Zur L¡§osung des Gallaischen Problems ¡§uber Kreisscheiben in dereuklidischen Ebene, Studia Sci. Math. Hungar. 21 (1986) 111-134.
MathSciNet MATH Google Scholar
22. L. Danzer, B. Gr¡§unbaum and V. Klee, Helly’s theorem and its relatives, in: Convexity, Proc. Symp. Pure Math. 7 (V. L. Klee, ed.), pp. 101-180, Amer. Math. Soc., Providence, R. I., 1963.
Google Scholar
23. V. L. Dol’nikov, A coloring problem, Siberian Math. J. 13 (1972) 886-894. Translation of Sibirsk. Mat. Zh. 13 (1972) 1272-1283.
Article MathSciNet Google Scholar
24. V. L. Dol’nikov, On a generalization of Ramsey’s theorem, Soviet Math. Dokl. 18 (1977) 223-226. Translation of Dokl. Akad. Nauk SSSR 232 (1977) 1241-1244.
MATH Google Scholar
25. V. L. Dol’nikov, A theorem of Helly type for sets defined by systems of equations, Math. Notes 46 (1989) 837- 840. Translation of Mat. Zametki 46 (1989), no. 5, 13-16.
Article MathSciNet Google Scholar
26. P. Duchet, Hypergraphs, in: Handbook of Combinatorics (R. L. Graham et al., eds.), Vol. I, Chapter 7, pp. 381-432, North-Holland, Amsterdam, 1995.
Google Scholar
27. J. Eckhoff, Transversalenprobleme in der Ebene, Arch. Math. (Basel) 24 (1973) 195-202.
Article MathSciNet MATH Google Scholar
28. J. Eckhoff, Helly, Radon and Carath´eodory type theorems, in: Handbook of Convex Geometry (P. M. Gruber and J. M. Wills, eds.), Vol. A, Chapter 2.1, pp. 389-448, North-Holland, Amsterdam, 1993.
Google Scholar
29. P. Erdőos, Graph theory and probability, Canad. J. Math. 11 (1959) 34-38.
Google Scholar
30. P. Erdőos, Personal reminiscences and remarks on the mathematical work of Tibor Gallai, Combinatorica 2 (1982) 207-212.
Article MathSciNet Google Scholar
31. P. Erdőos and T. Gallai, On the minimal number of vertices representing the edges of a graph, Publ. Math. Inst. Hungar. 6 (1961) 181-203.
MathSciNet Google Scholar
32. P. Erdőos and A. Hajnal, On chromatic number of graphs and set-systems, Acta Math. Hungar. 17 (1966) 61-99.
Article MathSciNet Google Scholar
33. P. Erdőos and C. A. Rogers, Covering space with convex bodies, Acta Arith. 7 (1962) 281-285.
MathSciNet Google Scholar
34. L. Fejes T´oth, Lagerungen in der Ebene, auf der Kugel und im Raum, Springer-Verlag, Berlin, 1953. [Second edition 1972]
Book Google Scholar
35. D. G. Fon-Der-Flaas and A. V. Kostochka, Covering boxes by points, Discrete Math. 120 (1993) 269-275.
Article MathSciNet MATH Google Scholar
36. B. E. Fullbright, Intersectional properties of certain families of compact convex sets, Pacific J. Math. 50 (1974) 57-62.
Article MathSciNet MATH Google Scholar
37. B. Gr¡§unbaum, Borsuk’s partition conjecture in Minkowski planes, Bull. Research Council Israel, Sect. F, 7 (1957) 25-30.
MathSciNet Google Scholar
38. B. Gr¡§unbaum, On intersections of similar sets, Portugal. Math. 18 (1959), 155-164.
MathSciNet Google Scholar
39. B. Gr¡§unbaum, Lectures on Combinatorial Geometry, Mimeographed notes, University of Washington, Seattle, 1974.
Google Scholar
40. A. Gy´arf´as, A Ramsey-type theorem and its applications to relatives of Helly’s theorem, Period. Math. Hungar. 3 (1976) 261-270.
Article MathSciNet Google Scholar
41. A. Gy´arf´as and J. Lehel, A Helly-type problem in trees, in: Combinatorial Theory and its Applications II (P. Erdőos et al., eds.), Colloq. Math. Soc. J´anos Bolyai 4, pp. 571-584, North-Holland, Amsterdam, 1970.
Google Scholar
42. A. Gy´arf´as and J. Lehel, Covering and coloring problems for relatives of intervals, Discrete Math. 55 (1985) 167-180.
Article MathSciNet Google Scholar
43. A. Gy´arf´as, J. Lehel and Z. Tuza, Upper bounds on the order of ¦Ó ¨Ccritical hypergraphs, J. Combin. Theory Ser. B 33 (1982) 161-165.
Article MathSciNet Google Scholar
44. H. Hadwiger, Ungel¡§oste Probleme, Nr. 15, Elem. Math. 12 (1957), 10-11; Nachtrag ibid. p. 62. A Survey of the Hadwiger-Debrunner (p, q)-problem 375
MathSciNet Google Scholar
45. H. Hadwiger, Ungel¡§oste Probleme, Nr. 19, Elem. Math. 12 (1957) 109-110.
MathSciNet Google Scholar
46. H. Hadwiger and H. Debrunner, Ausgew¡§ahlte Einzelprobleme der kombinatorischen Geometrie in der Ebene, Enseign. Math. (2)1 (1955) 56-89.
MathSciNet MATH Google Scholar
47. H. Hadwiger and H. Debrunner, ¡§Uber eine Variante zum Hellyschen Satz, Arch. Math. (Basel)8 (1957) 309-313.
Article MathSciNet MATH Google Scholar
48. H. Hadwiger and H. Debrunner, Kombinatorische Geometrie in der Ebene, Monogr. Enseign. Math., No. 2, Universit´e, Gen`eve, 1960.
Google Scholar
49. H. Hadwiger, H. Debrunner and V. Klee, Combinatorial Geometry in the Plane, Holt, Rinehart and Winston, New York, 1964.
Google Scholar
50. H. Hadwiger and J. Schaer, Studie zur kombinatorischen Geometrie zentralsymmetrischer Eik¡§orper, Portugal. Math. 30 (1971) 145-152.
MathSciNet MATH Google Scholar
51. A. Hajnal and J. Sur´anyi, ¡§Uber die Aufl¡§osung von Graphen in vollst¡§andige Teilgraphen, Ann. Univ. Sci. Budapest. Rolando E¡§otv¡§os 1 (1958) 113-121.
MathSciNet MATH Google Scholar
52. T. Kaiser, Transversals of d-intervals, Discrete Comput. Geom. 18 (1997) 195-203.
Article MathSciNet MATH Google Scholar
53. T. Kaiser, Piercing problems and topological methods, Doctoral dissertation, Charles University, Prague, 1998.
Google Scholar
54. T. Kaiser and Y. Rabinovich, Intersection properties of families of convex (n, d)-bodies, Discrete Comput. Geom. 21 (1999) 275-287.
Article MathSciNet MATH Google Scholar
55. G. Kalai, Intersection patterns of convex sets, Israel J. Math. 48 (1984) 161-174.
Article MathSciNet MATH Google Scholar
56. R. N. Karasev, Transversals for families of translates of a two-dimensional convex compact set, Discrete Comput. Geom. 24 (2000) 345-353.
Article MathSciNet MATH Google Scholar
57. G. K´arolyi, On point covers on parallel rectangles, Period. Math. Hungar. 23 (1991) 105-107.
Article MathSciNet Google Scholar
58. G. K´arolyi and G. Tardos, On point covers of multiple intervals and axisparallelrectangles, Combinatorica 16 (1996) 213-222.
Article MathSciNet Google Scholar
59. M. Katchalski and A. Liu, A problem of geometry in Rn, Proc. Amer. Math. Soc. 75 (1979) 284-288.
MathSciNet MATH Google Scholar
60. P. Katzarowa-Karanowa, ¡§U ber ein euklidisch-geometrisches Problem von B. Gr¡§unbaum, Arch. Math. (Basel) 18 (1967) 663-672.
Article MathSciNet MATH Google Scholar
61. D. J. Kleitman, A. Gy´arf´as and G. T´oth, Convex sets in the plane with three of every four meeting, Combinatorica 21 (2001) 221-232.
Article MathSciNet MATH Google Scholar
62. D. Larman, J. Matous¡¦ek, J. Pach and J. T¡§orőocsik, A Ramsey-type result for convex sets, Bull. London Math. Soc. 26 (1994) 132-136.
Article MathSciNet MATH Google Scholar
63. J. Lehel, Gallai-type results for multiple boxes and forests, European J. Combin. 9 (1988) 113-120.
MathSciNet MATH Google Scholar
64. N. Linial and Y. Rabinovich, Local and global clique numbers, J. Combin. Theory Ser. B 61 (1994) 5-15.
Article MathSciNet MATH Google Scholar
65. P. Loomis, Covering among constant relative width bodies in the plane, Ph. D. thesis, University of California, Davis, 1980.
Google Scholar
66. L. Lov´asz, On chromatic number of finite set-systems, Acta Math. Hungar. 19 (1968) 59-67.
Article MathSciNet Google Scholar
67. L. Lov´asz and M. D. Plummer, Matching Theory, Ann. of Discrete Math., No. 29, North-Holland, Amsterdam, 1986.
Google Scholar
68. J. Matou¡¦sek, Lower bounds on the transversal numbers of d-intervals, Discrete Comput. Geom. 26 (2001) 283-287.
Article MathSciNet Google Scholar
69. J. Matou¡¦sek, Lectures on Discrete Geometry, Springer-Verlag, New York, 2002.
Book Google Scholar
70. D. Nadler, Minimal 2-fold coverings of Ed, Geom. Dedicata 65 (1997) 305-312.
Article MathSciNet MATH Google Scholar
71. J. Ne¡¦set¡¦ril and V. R¡§odl, A short proof of the existence of highly chromatic hypergraphs without short cycles, J. Combin. Theory Ser. B 27 (1979) 225-227.
Article MathSciNet Google Scholar
72. A. G. Netrebin, Separability of convex sets and the concept of convexity on the surface of a convex body, Math. Notes 27 (1980) 311-316. Translation of Mat. Zametki 25 (1980) 603-618.
Article MathSciNet MATH Google Scholar
73. J. Pach, A remark on transversal numbers, in: The Mathematics of Paul Erdőos II (R. L. Graham and J. Ne¡¦set¡¦ril, eds.), pp. 310-317, Springer-Verlag, Berlin, 1997.
Chapter Google Scholar
74. M. A. Perles, A Helly type theorem for almost intersecting families, Talk at the Convex Geometry meeting, Oberwolfach, June 1993.
Google Scholar
75. E. A. Ramos, Equipartition of mass distributions by hyperplanes, Discrete Comput. Geom. 15 (1996) 147-167.
Article MathSciNet MATH Google Scholar
76. N. Scheller, (p, q)-Probleme f¡§ur Quaderfamilien, Diplomarbeit, Universit¡§at Dortmund, 1996.
Google Scholar
77. J. Schopp, Versch¡§arfung eines Kreisabdeckungssatzes, Elem. Math. 17 (1962) 12-14.
MathSciNet MATH Google Scholar
78. L. Stach´o, ¡§Uber ein Problem f¡§ur Kreisscheibenfamilien, Acta Sci. Math. (Szeged) 26 (1965) 273-282.
MathSciNet Google Scholar
79. L. Stach´o, A solution of Gallai’s problem on pinning down circles. (Hungarian), Mat. Lapok 32 (1981/84) 19-47.
MathSciNet Google Scholar
80. G. Tardos, Transversals of 2-intervals, a topological approach, Combinatorica 15 (1995) 123-134.
Article MathSciNet MATH Google Scholar
81. ] G. Tardos, Transversals of d-intervals¡ªcomparing three approaches, in: European Congress of Mathematics, Budapest 1996 (A. Balog et al., eds.), Vol. II, pp. 234-243, Progress in Mathematics, Vol. 169, Birkh¡§auser-Verlag, Basel, 1998.
Google Scholar
82. W. T. Trotter, Jr., A decomposition theorem for collections of universal subcontinua, Colloq. Math. 23 (1971) 233-239.
MathSciNet MATH Google Scholar
83. Z. Tuza, Critical hypergraphs and intersecting set-pair systems, J. Combin. Theory Ser. B 39 (1985) 134-145.
Article MathSciNet MATH Google Scholar
84. Z. Tuza, Minimum number of elements representing a set system of given rank, J. Combin. Theory Ser. A 52 (1989) 84-89.
Article MathSciNet MATH Google Scholar
85. G. Wegner, ¡§Uber eine kombinatorisch-geometrische Frage von Hadwiger und Debrunner, Israel J. Math. 3 (1965) 187-198.
Article MathSciNet MATH Google Scholar
86. G. Wegner, Eigenschaften der Nerven homologisch-einfacher Familien im Rn, Dissertation, Universit¡§at G¡§ottingen, 1967.
Google Scholar
87. G. Wegner, Anmerkungen zu ¡®¡§U ber eine kombinatorisch-geometrische Frage von Hadwiger und Debrunner’, Unpublished notes (4 pages), G¡§ottingen, 1968.
Google Scholar
88. G. Wegner, Ein ebenes Transversalenproblem, Monatsh. Math. 77 (1973) 72-81.
Article MathSciNet MATH Google Scholar
89. G. Wegner, ¡§Uber Helly-Gallaische Stichzahlprobleme, in: 3. Kolloquium ¡§uber Diskrete Geometrie, pp. 277-282, Salzburg, 1985.
Google Scholar
Download references
Authors
Jürgen Eckhoff
View author publications
Search author on:PubMed Google Scholar
Editor information
Editors and Affiliations
Department of Computer and Information Science, Polytechnic University, Six Metro Tech Center, Brooklyn, NY, 11201, USA
Boris Aronov
2. School of Mathematics, Georgia Institute of Technology, Atlanta, GA, 30332-0160, USA
Saugata Basu
3. City College and Courant Institute, 251 Mercer St., New York, NY, 10012, USA
János Pach
4. School of Computer Science, Tel Aviv University, Tel Aviv, 69978, Israel
Micha Sharir
Rights and permissions
Reprints and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Eckhoff, J. (2003). A Survey of the Hadwiger-Debrunner (p, q)-problem. In: Aronov, B., Basu, S., Pach, J., Sharir, M. (eds) Discrete and Computational Geometry. Algorithms and Combinatorics, vol 25. Springer, Berlin, Heidelberg.
Download citation
.RIS
.ENW
.BIB
DOI:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-62442-1
Online ISBN: 978-3-642-55566-4
eBook Packages: Springer Book Archive
Share this chapter
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Keywords
Convex Body
Chromatic Number
Intersection Graph
Nonempty Intersection
Convex Geometry
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Publish with us
Policies and ethics |
10534 | https://breast-cancer-research.biomedcentral.com/articles/10.1186/bcr3206 | Breast Cancer Research
Endometrial cancer survival after breast cancer in relation to tamoxifen treatment: Pooled results from three countries
Download PDF
Download PDF
Research article
Open access
Published:
Endometrial cancer survival after breast cancer in relation to tamoxifen treatment: Pooled results from three countries
Michael E Jones1,
Flora E van Leeuwen2,
Wilhelmina E Hoogendoorn2,
Marian JE Mourits3,
Harry Hollema4,
Hester van Boven5,
Michael F Press6,
Leslie Bernstein7 &
…
Anthony J Swerdlow1
Breast Cancer Research volume 14, Article number: R91 (2012) Cite this article
41k Accesses
75 Citations
6 Altmetric
Metrics details
Abstract
Introduction
Tamoxifen is an effective treatment for breast cancer but an undesirable side-effect is an increased risk of endometrial cancer, particularly rare tumor types associated with poor prognosis. We investigated whether tamoxifen therapy increases mortality among breast cancer patients subsequently diagnosed with endometrial cancer.
Methods
We pooled case-patient data from the three largest case-control studies of tamoxifen in relation to endometrial cancer after breast cancer (1,875 patients: Netherlands, 765; United Kingdom, 786; United States, 324) and collected follow-up information on vital status. Breast cancers were diagnosed in 1972 to 2005 with endometrial cancers diagnosed in 1978 to 2006. We used Cox proportional hazards survival analysis to estimate hazard ratios (HRs) and 95% confidence intervals (CI).
Results
A total of 1,104 deaths occurred during, on average, 5.8 years following endometrial cancer (32% attributed to breast cancer, 25% to endometrial cancer). Mortality from endometrial cancer increased significantly with unfavorable non-endometrioid morphologies (P < 0.0001), International Federation of Gynaecology and Obstetrics staging system for gynecological malignancy (FIGO) stage (P < 0.0001) and age (P < 0.0001). No overall association was observed between tamoxifen treatment and endometrial cancer mortality (HR = 1.17 (95% CI: (0.89 to 1.55)). Tamoxifen use for at least five years was associated with increased endometrial cancer mortality (HR = 1.59 (1.13 to 2.25)). This association appeared to be due primarily to the excess of unfavorable histologies and advanced stage in women using tamoxifen for five or more years since the association with mortality was no longer significant after adjustment for morphological type and FIGO stage (HR = 1.37 (0.97 to 1.93)). Those patients with endometrioid tumors, who stopped tamoxifen use at least five years before their endometrial cancer diagnosis, had a greater mortality risk from endometrial cancer than endometrioid patients with no tamoxifen exposure (HR = 2.11 (1.13 to 3.94)). The explanation for this latter observation is not apparent.
Conclusions
Patients with endometrial cancer after breast cancer who received tamoxifen treatment for five years for breast cancer have greater endometrial cancer mortality risk than those who did not receive tamoxifen. This can be attributed to non-endometrioid histological subtypes with poorer prognosis among long term tamoxifen users.
Introduction
Tamoxifen is an effective treatment for breast cancer [1, 2] but an undesirable side-effect is the increased risk of endometrial cancer in postmenopausal women [3–8], particularly rare tumor types [5, 6, 8, 9] associated with poor prognosis . Although the number of cases of endometrial cancer occurring after tamoxifen is modest (for example, 0.3% taking tamoxifen for approximately five years versus 0.1% not taking it ), there is concern that tamoxifen-induced endometrial cancers may have poorer survival [6, 11], even after allowance for histopathologic characteristics . The side-effects of tamoxifen are unlikely to outweigh the benefits in breast cancer patients , but any detrimental effects on survival would have implications for endometrial cancer surveillance following treatment , and would be important in decisions about the prophylactic use of tamoxifen by women without breast cancer . To address these issues we have pooled patients from the three largest case-control studies of endometrial cancer after breast cancer [3–6] to examine mortality from endometrial cancer in relation to tamoxifen treatment.
Materials and methods
The case series from three case-control studies of endometrial cancer after breast cancer were pooled. These studies from the Netherlands (NL) (nine regional cancer registries contributing to the Netherlands Cancer Registry), the United Kingdom (UK) (regional cancer registries in England, Scotland and Wales), and the United States (US) (Surveillance, Epidemiology and End Results (SEER) registries in four regions: Atlanta, Iowa, Los Angeles County, and Seattle-Puget Sound) have each been described previously [3–6]. Each study received appropriate ethical approval(s). The majority of data were abstracted from medical case-notes without patient contact; however, informed consent was obtained in the US where patients were interviewed. Briefly, each case-control study was population-based and included patients diagnosed with endometrial cancer after breast cancer during defined periods (NL (n = 765): 1978 to 1997; UK (n = 786): 1988 to 1996; US (n = 324): 1978 to 1993). The endometrial cancer diagnosis had to have occurred at least three months after the breast cancer diagnosis (six months for the US study). Patients were excluded if they had had a cancer (other than non-melanoma skin cancer or in situ cervical cancer) diagnosed before their breast cancer or between the diagnosis of the initial primary breast cancer and the subsequent endometrial cancer (except non-melanoma skin cancer, in situ cervical cancer or breast cancer). Information on tamoxifen treatment was abstracted from medical records and in Los Angeles, confirmed in interviews. At follow-up for survival, one patient from the original UK case-series was no longer eligible (because of erroneous cancer registry tumor record linkage) and was removed from this study.
The cases of endometrial cancer from the original Dutch study were supplemented with patients diagnosed from 1989 to 2003 (the TAMARISK (Tamoxifen Associated Malignancies: Aspects of Risk) retrospective cohort) from the same nine regional cancer registries as in the original (ALERT (Assessment of Liver and Endometrial cancer Risk following Tamoxifen)) study [3, 6], except diagnosis of endometrial cancer was at least 12 months after breast cancer (rather than three months). In addition, a further 179 Dutch patients diagnosed from 2003 to 2006 were included, with endometrial cancer at least three months after breast cancer, from the prospective component of the TAMARISK study .
Follow-up
The Netherlands
Vital status, date of most recent follow-up, or date of death and cause, were obtained from medical records, general practitioners or clinicians, and municipal population registries. Follow-up for the ALERT patients was initially to 1997, with additional follow-up to 2004 for those patients who had less than four years initial follow-up. Follow-up was to 2003 to 2005 for the TAMARISK retrospective cohort and to 2004 to 2007 for the TAMARISK prospective cohort. All deaths were linked through 'Statistics Netherlands' to obtain registered underlying cause of death (which was used in analyses when cause of death was unknown based on review of medical records ). Within the study period there were no known emigrations from the Netherlands in these cohorts.
UK
Vital status and cause of death were ascertained from hospital case-notes when the initial study data were collected (1996 to 1999). In 2005 further follow-up for vital status and causes of death was obtained from each of the regional cancer registries in Britain, and subsequently in 2008 further follow-up was obtained by linkage to the National Health Service Central Register (NHSCR -- a list of virtually every member of the population, which routinely receives notifications of events such as emigrations, cancers, and deaths) , and for those who had died copies of death certificates were obtained. Vital status could not be determined for eleven (1.4%) patients so for these follow-up was taken to the date of the last clinical contact as extracted from case-notes. Thirty-eight cases had deaths recorded as occurring at the date of diagnosis of endometrial cancer and were removed from the main analysis.
USA
Data were originally collected on vital status, date of most recent follow-up or date of death, and cause of death (based on information from death certificates) for all patients up to 2000. Additional follow-up was obtained to the end of 2006 for the Los Angeles County patients (n = 228), and those not known to be deceased were additionally checked against the Social Security Administration's Death Master File to ascertain any deaths outside the state of California.
Statistical Analysis
Descriptive analyses by morphological type of endometrial cancer were conducted using one way analysis of variance for continuous variables or Pearson chi-square for categorical variables . When comparing individual differences between morphological groups, we adjusted for age at diagnosis of endometrial cancer and study, using linear regression in the case of continuous variables and a 'modified' Poisson approach with robust standard errors for binary variables. To assess the association between tamoxifen treatment and the risk of death, we calculated hazard ratios using Cox proportional hazards regression with time since diagnosis of endometrial cancer (follow-up time) as the implicit regression time scale and stratification by (adjustment for) attained age (which also is an adjustment for age at endometrial cancer diagnosis since: age at endometrial cancer diagnosis = attained age - survival time since diagnosis), calendar period and, as appropriate, morphology and FIGO stage. Tests for trend were calculated using continuous data. Women with deaths due to causes other than the cause under study in cause-specific analyses were treated as censored on their dates of death. Where it was not possible to distinguish between breast and endometrial cancer as cause of death the patients (n = 37) were not allocated to either cause of death in the main analyses, but were allocated to each cause in sensitivity analyses. Patients diagnosed with endometrial cancer at death (n = 38) were excluded from the main analysis and tables but were included, with a survival time of one day and one year, in sensitivity analyses. For breast cancer and all cause mortality, we additionally adjusted for age at diagnosis of breast cancer and extent of breast disease (instead of FIGO stage). All analyses were carried out using Stata/IC version 10.1 and all statistical tests were two-sided.
Results
Descriptive characteristics of the three studies
There were 1,875 patients in the combined study, comprising 765 (41%) from the Netherlands, 786 (42%) from the UK, and 324 (17%) from the US (Table 1). The median age at diagnosis of breast cancer was 63 years in the Netherlands, 62 years in the UK study, and 65.5 years in the US study, and the median age at diagnosis of endometrial cancer was 69 years in each study. The calendar periods for diagnosis of breast cancer and endometrial cancer, and the intervals between the two cancers, reflect the original individual study designs (as described above). The median interval between cancers was 5.1 years in the Netherlands study, 6.0 years in the UK, and 3.0 years in the US. Tamoxifen use was more commonly recorded for patients in the UK (82%) than the Netherlands (46%) or US (45%).
Endometrial cancer morphology
In the combined series 60.7% of the endometrial cancers developed among tamoxifen users. The majority (84%) of the endometrial cancers were endometrioid adenocarcinomas (Table 2), and (after adjustment for study) these were diagnosed at significantly younger ages than were serous or clear cell endometrial cancer (P < 0.0001), and carcinosarcomas (P = 0.002). FIGO stage was available for 97% of the cases in the Netherlands, 78% in the US, but only 37% in the UK study. Where FIGO stage was known, 79% of tumors were stage I, 10% were stage II and 11% were stage III or higher, with no significant difference in this distribution between studies (P = 0.46). Endometrioid tumors were more likely to be diagnosed at FIGO stage I than were non-endometrioid tumors (P < 0.001). A significantly higher proportion of patients with carcinosarcoma had a history of tamoxifen use than did patients with endometrioid carcinoma (P < 0.001). Among tamoxifen users the patients who developed carcinosarcoma had been treated with tamoxifen on average 0.9 years longer than the patients with endometrioid type tumors (P = 0.012). Patients with carcinosarcomas, or serous or clear cell endometrial cancers, were more likely to have ceased tamoxifen use one or more years before diagnosis of endometrial cancer than patients with endometrioid tumors. (P = 0.010 and P = 0.020 respectively). The average interval between breast and endometrial tumors was longer for the unfavorable cancers, such as carcinosarcomas, serous and clear cell endometrial cancers but the differences were not statistically significant (P = 0.25).
Follow-up
The 1,875 patients who had both breast and endometrial cancer were followed on average for 5.8 years (median 4.0 years) with 1,104 deaths (Table 3). For these patients with breast cancer who had also developed endometrial cancer 25% to 28% of the deaths were due to endometrial cancer, 32% to 35% to breast cancer (type of cancer death could not be distinguished between the two causes in 3% of cases), and 40% to all other causes (including 1.7% to cancer of unknown primary site and 0.5% with cause of death unknown). The five-year survival was 55.5% but this varied from 73% for patients diagnosed with localized breast cancer and FIGO grade I endometrial cancer to 16% for patients diagnosed with metastatic breast cancer or FIGO grade III/IV endometrial cancer. For those patients diagnosed with endometrial cancer before age 65, five-year survival was 82% for patients diagnosed with localized breast cancer and FIGO grade I endometrial cancer and 32% for patients diagnosed with metastatic breast cancer or FIGO grade III/IV endometrial cancer.
Mortality
Age at diagnosis of endometrial cancer
Older age at endometrial cancer diagnosis was associated with greater risk of dying of endometrial cancer (trend P < 0.0001, with no evidence for heterogeneity between studies (P = 0.52)) (Table 4). Subsequent analyses adjust endometrial mortality for attained age and time since diagnosis of endometrial cancer, and thus implicitly also adjust for age at diagnosis.
FIGO stage
Higher FIGO stage was associated with greater endometrial cancer death rates (FIGO III/IV versus I: Hazard Ratio, HR = 13.1; 95% confidence Interval (9.25 to 18.6); trend P < 0.0001 with no strong evidence for interaction between studies P = 0.067).
Endometrial cancer morphology
Endometrial cancer mortality was greater for patients with non-endometrioid endometrial cancer than patients with endometrioid types across all three studies combined (HR = 5.09; (3.96 to 6.53), P < 0.0001) and within each study (data not shown), with no evidence for heterogeneity between the three studies (P = 0.33); the greatest increases were seen for carcinosarcomas (HR = 6.66 (4.87 to 9.12)) and sarcomas (HR = 5.65 (3.53 to 9.05)). The HRs were smaller but still significant after adjustment for FIGO stage (Table 4).
Validity of cause-specific mortality
Extent of disease of breast cancer was unrelated to endometrial cancer mortality (P = 0.14) but was strongly related to breast cancer mortality (P < 0.0001). Age at diagnosis of endometrial cancer (P = 0.23), FIGO stage (P = 0.34) and endometrial morphology (P = 0.16) were not related to breast cancer mortality. Conversely, age at diagnosis of breast cancer was unrelated to endometrial cancer mortality (P = 0.11). There was no significant heterogeneity between studies.
Endometrial cancer mortality: tamoxifen use and morphology
No overall association was observed between tamoxifen treatment and endometrial cancer mortality (HR = 1.17 (95% CI: (0.89 to 1.55)); however, tamoxifen use for at least five years was associated with increased endometrial cancer mortality (HR = 1.59 (1.13 to 2.25)). After adjustment for morphological type and FIGO stage, five years tamoxifen use was no longer significantly associated with endometrial cancer mortality (HR = 1.37 (0.97 to 1.93)) overall or when stratified by morphology (Table 5). When analyzed by cumulative dose of tamoxifen, patients with cumulative doses over 30,000 mg (for example, 20 mg per day for 4.1 years) had modestly elevated endometrial cancer mortality. There was no association with daily tamoxifen dose.
Endometrial cancer mortality risk among women who stopped tamoxifen use at least five years before their endometrial cancer diagnosis was twice that of women who had never used tamoxifen and the trend with cessation among users (HR = 1.11 per year since last use (1.05 to 1.18)) remained statistically significant after adjustment for morphological type, duration of tamoxifen use, FIGO stage and interval between breast and endometrial cancer.
There was a strong trend of increasing mortality with increasing interval between breast cancer and endometrial cancer diagnosis (P = 0.0001), which, after stratification by morphology, remained statistically significant among those with endometrioid tumors (P < 0.0003). The trend with interval was also stronger in tamoxifen users than non-users (P = 0.044) and among users remained statistically significant even after adjustment for duration of tamoxifen use (P = 0.032). (For breast cancer mortality, risk of dying decreased as the interval between tumors increased (P = 0.003), but all-cause mortality did not vary with interval between tumors (P = 0.085)).
Time since last tamoxifen use and interval between diagnoses of breast and endometrial cancer are related (that is, only those with an interval between tumors of five or more years could have ceased tamoxifen use five or more years ago) but even among those patients with an interval of five or more years (that is, those with the potential for five or more years cessation) mortality was still elevated among those with five or more years since cessation of tamoxifen (HR = 2.06 (1.18 to 3.60)). When considering calendar period of diagnosis, since the indications for treatment and cessation of tamoxifen may have changed over time, there was no significant difference in trend with cessation among tamoxifen users for those diagnosed with breast cancer before 1990 (compared with those diagnosed in 1990 or later, P = 0.84) or with endometrial cancer before 1995 (compared with those diagnosed in 1995 or later, P = 0.53).
Discussion
We accrued 1,875 patients, with 1,104 deaths of which 227 were due to endometrial cancer, by pooling the three largest case-control studies of endometrial cancer after breast cancer [3–6]. The number of cases of endometrial cancer occurring in breast cancer trial settings at present is modest (for example, 182 cases of uterine cancer reported in the Early Breast Cancer Trialists' Collaborative Group (EBCTCG) meta-analysis of 20 trials , and 102 cases in the National Surgical Adjuvant Breast and Bowel Project (NSABP) trial comparing prophylactic tamoxifen with raloxifene ), so although our data are observational we have a large number of cases, some of rarer histologies, with which to examine endometrial cancer survival after tamoxifen use. A previous report using a subset of the pooled data showed increased endometrial cancer mortality with tamoxifen use, but did not have as many patients or as much follow-up time as we have in the pooled data.
We found that women with five or more years of tamoxifen use had 59% greater risk of endometrial cancer death than non-users, which was mostly attributable to the occurrence of endometrial cancer morphologies among tamoxifen users with less favorable prognosis, for example, carcinosarcomas. Several earlier studies have shown that tamoxifen greatly increases the risk of developing non-endometrioid tumors [5, 6, 8, 9] and in the data reported here endometrial cancer mortality attributed to these morphological types was 2.3 to 5.4 times that of endometrioid types. Beyond the consequence of tamoxifen increasing the incidence of these tumors with poor prognosis , we saw no further adverse effect of tamoxifen dose or cumulative dose on endometrial cancer survival. In line with our results, genomic analyses suggest there are no differences between tamoxifen-induced tumors, either endometrioid or non-endometrioid, and those tumors occurring in patients without tamoxifen use [16, 25, 26]. Our data show, however, that patients with endometrioid tumors who had stopped tamoxifen five or more years before diagnosis of endometrial cancer had greater endometrial cancer-specific mortality risk. (The statistical power to examine this among patients with non-endometrioid tumors was low because these tumor types were less common.)
Although some of the women in this study may have received tamoxifen when distant metastases arose, and their prognosis would have been poor in relation to breast cancer survival, this does not preclude them from contributing survival time for analyses of tamoxifen use and endometrial cancer mortality (just as women who had other serious diseases are able to contribute to the analyses). As a demonstration of the validity of the cause-specific survival analyses, we found that extent of the breast disease was strongly predictive of breast cancer mortality but it was not associated with endometrial cancer mortality. Conversely, age at diagnosis of endometrial cancer, FIGO stage and morphology were strongly predictive of endometrial cancer mortality but not breast cancer mortality. We, therefore, believe our analyses are valid, whether tamoxifen was used for metastatic disease or in an adjuvant setting.
Mortality risk was elevated in the patients for whom tamoxifen use was known but the details of the dose or duration was missing. However, it is probable that this is an artefact related to the greater chance of destruction or loss of some part of the medical case-note history among patients who had died by the time of data collection. Our conclusions were not materially affected by the missing data because few were missing, for example, < 3% were missing the duration of tamoxifen use.
The cases from the three study populations were all ascertained from regional population-based cancer registries [3–6, 12], although some patients were not available for the analyses. For the UK, 208 provisionally eligible patients were identified but their case notes could not be located or had insufficient information for the original case-control study (and subsequent follow-up for mortality). In the US, five patients were excluded from the case-control study. None were excluded in the NL, yet there was no evidence of heterogeneity between the studies, suggesting there was little, if any, bias due to case under-ascertainment. Furthermore, the one- and five- year survival rates seen here for endometrial cancer within each study were similar to published NL, UK and US rates [27, 28], which suggests under-ascertainment did not materially affect the results.
Follow-up for mortality was comprehensive because population-based cancer registries covered each region, and additional information was available from medical records, general practitioners, clinicians, and national death registers. It is therefore unlikely that any significant migration outside of the study regions occurred, or that any unascertained deaths occurred. Thirty-eight patients diagnosed with endometrial cancer at death were excluded from the analysis because they contributed no survival follow-up, and their inclusion in sensitivity analyses made no material difference to the results. It was not possible to distinguish between breast and endometrial cancer as cause of death in 37 cases and these patients were censored at date of death in the main analyses, and their inclusion as endometrial cancer deaths strengthened the association with cumulative dose but made little material change to the other results.
An issue in the interpretation of the results is the attribution of cause of death to a single underlying cause in the presence of co-morbidity. We saw opposing trends in breast and endometrial cancer mortality with interval between tumors, and although longer follow-up since breast cancer would be expected to be associated with lower breast cancer death rates it is possible that deaths occurring after a long interval between tumors may have been more likely to be assigned to the most recently diagnosed tumor (that is, endometrial cancer). To make some allowance for this we adjusted for interval between tumors in the analyses and the main results remained the same: among patients with endometrioid tumors there was no association between endometrial cancer mortality and tamoxifen use, but increased mortality if tamoxifen had stopped at least five years before diagnosis of endometrial cancer.
Endometrioid endometrial tumors may be more likely to present with vaginal bleeding and therefore be diagnosed earlier than non-endometerioid tumors, and indeed we saw that these tumor types were more likely to be of a lower FIGO grade at diagnosis. However, even among the patients with only endometerioid tumors we saw increased mortality in those who had stopped tamoxifen five or more years before endometrial cancer diagnosis compared with those who had not received tamoxifen.
One possibility to consider is that gynecologic surveillance could have been less comprehensive after patients had ceased tamoxifen, resulting in delayed diagnosis and poorer prognosis. We investigated this hypothesis by looking at the effect of cessation among patients diagnosed with endometrial cancer before and after 1995 (when the first major reports of increased risk of endometrial cancer with tamoxifen use appeared [3, 7, 13] and awareness of the issue presumably increased), but we found that this did not change our findings, nor if we split the data at 1990 (when the first randomized trial results appeared linking tamoxifen to second cancers ).
If there is a real effect of time since last use we are unable to suggest an explanation for the increased risk but speculate that endometrioid endometrial cancers developing after long induction times may have different characteristics from those occurring in closer proximity to tamoxifen exposure.
Conclusions
Patients with endometrial cancer after five years use of tamoxifen for breast cancer have increased mortality from endometrial cancer, due to the occurrence of less favorable morphological subtypes of endometrial cancer in long term tamoxifen users. Patients who had stopped tamoxifen use five or more years before diagnosis of endometrioid endometrial cancer had increased endometrial cancer mortality, a finding that warrants further research.
Abbreviations
ALERT:
: Assessment of Liver and Endometrial Cancer Risk following Tamoxifen (a cohort study cancer in the Netherlands)
CI:
: confidence interval
FIGO:
: Fédération Internationale de Gynécologie et d'Obstétrique (International Federation of Gynaecology and Obstetrics)
HR:
: hazard ratio
NHSCR:
: National Health Service Central Register
SEER:
: Surveillance, Epidemiology and End Results
TAMARISK:
: Tamoxifen Associated Malignancies: Aspects of Risk.
References
Early Breast Cancer Trialists' Collaborative Group (EBCTCG): Effects of chemotherapy and hormonal therapy for early breast cancer on recurrence and 15-year survival: an overview of the randomised trials. Lancet. 2005, 365: 1687-1717.
Article Google Scholar
2. Early Breast Cancer Trialists' Collaborative Group (EBCTCG), Davies C, Godwin J, Gray R, Clarke M, Cutter D, Darby S, McGale P, Pan HC, Taylor C, Wang YC, Dowsett M, Ingle J, Peto R: Relevance of breast cancer hormone receptors and other factors to the efficacy of adjuvant tamoxifen: patient-level meta-analysis of randomised trials. Lancet. 2011, 378: 771-784.
Article Google Scholar
3. van Leeuwen FE, Benraadt J, Coebergh JW, Kiemeney LA, Gimbrere CH, Otter R, Schouten LJ, Damhuis RA, Bontenbal M, Diepenhorst FW, et al: Risk of endometrial cancer after tamoxifen treatment of breast cancer. Lancet. 1994, 343: 448-452. 10.1016/S0140-6736(94)92692-1.
Article CAS PubMed Google Scholar
4. Bernstein L, Deapen D, Cerhan JR, Schwartz SM, Liff J, McGann-Maloney E, Perlman JA, Ford L: Tamoxifen therapy for breast cancer and endometrial cancer risk. J Natl Cancer Inst. 1999, 91: 1654-1662. 10.1093/jnci/91.19.1654.
Article CAS PubMed Google Scholar
5. Swerdlow AJ, Jones ME: Tamoxifen treatment for breast cancer and risk of endometrial cancer: a case-control study. J Natl Cancer Inst. 2005, 97: 375-384. 10.1093/jnci/dji057.
Article CAS PubMed Google Scholar
6. Bergman L, Beelen ML, Gallee MP, Hollema H, Benraadt J, van Leeuwen FE: Risk and prognosis of endometrial cancer after tamoxifen for breast cancer. Comprehensive Cancer Centres' ALERT Group. Assessment of Liver and Endometrial cancer Risk following Tamoxifen. Lancet. 2000, 356: 881-887. 10.1016/S0140-6736(00)02677-5.
Article CAS PubMed Google Scholar
7. Tamoxifen: IARC Working Group on the Evaluation of Carcinogenic Risks to Humans Some pharmaceutical drugs: views and expert opinions of an IARC Working Group on the Evaluation of Carcinogenic Risks to Humans which met in Lyon, 13-20 February 1996 lARC monographs on the evaluation of carcinogenic risks to humans. 1996, 66: 340-351.
Google Scholar
8. Curtis RE, Freedman DM, Sherman ME, Fraumeni JF: Risk of malignant mixed mullerian tumors after tamoxifen therapy for breast cancer. J Natl Cancer Inst. 2004, 96: 70-74. 10.1093/jnci/djh007.
Article CAS PubMed Google Scholar
9. Bland AE, Calingaert B, Secord AA, Lee PS, Valea FA, Berchuck A, Soper JT, Havrilesky L: Relationship between tamoxifen use and high risk endometrial cancer histologic types. Gynecol Oncol. 2009, 112: 150-154. 10.1016/j.ygyno.2008.08.035.
Article CAS PubMed Google Scholar
10. Acharya S, Hensley ML, Montag AC, Fleming GF: Rare uterine cancers. Lancet Oncol. 2005, 6: 961-971. 10.1016/S1470-2045(05)70463-0.
Article PubMed Google Scholar
Lasset C, Mignotte H, Bonadona V, Chauvin F: Prognosis of tamoxifen-associated endometrial cancer. J Clin Oncol. 1998, 16: 2573-
CAS Google Scholar
12. Hoogendoorn WE, Hollema H, van Boven HH, Bergman E, de Leeuw-Mantel G, Platteel I, Fles R, Nederlof PM, Mourits MJ, van Leeuwen FE: Prognosis of uterine corpus cancer after tamoxifen treatment for breast cancer. Breast Cancer Res Treat. 2008, 112: 99-108. 10.1007/s10549-007-9823-1.
Article CAS PubMed Google Scholar
13. Fisher B, Costantino JP, Redmond CK, Fisher ER, Wickerham DL, Cronin WM: Endometrial cancer in tamoxifen-treated breast cancer patients: findings from the National Surgical Adjuvant Breast and Bowel Project (NSABP) B-14. J Natl Cancer Inst. 1994, 86: 527-537. 10.1093/jnci/86.7.527.
Article CAS PubMed Google Scholar
14. ACOG committee opinion. No. 336: Tamoxifen and uterine cancer. Obstet Gynecol. 2006, 107: 1475-1478. 10.1097/00006250-200606000-00057.
15. Vogel VG, Costantino JP, Wickerham DL, Cronin WM, Cecchini RS, Atkins JN, Bevers TB, Fehrenbacher L, Pajon ER, Wade JL, Robidoux A, Margolese RG, James J, Runowicz CD, Ganz PA, Reis SE, McCaskill-Stevens W, Ford LG, Jordan VC, Wolmark N, National Surgical Adjuvant Breast and Bowel Project: Update of the National Surgical Adjuvant Breast and Bowel Project Study of Tamoxifen and Raloxifene (STAR) P-2 Trial: preventing breast cancer. Cancer Prev Res (Phila). 2010, 3: 696-706. 10.1158/1940-6207.CAPR-10-0076.
Article CAS Google Scholar
16. Fles R, Hoogendoorn WE, Platteel I, Scheerman CE, de Leeuw-Mantel G, Mourits MJ, Hollema H, van Leeuwen FE, van Boven HH, Nederlof PM: Genomic profile of endometrial tumors depends on morphological subtype, not on tamoxifen exposure. Genes Chromosomes Cancer. 2010, 49: 699-710. 10.1002/gcc.20781.
Article CAS PubMed Google Scholar
17. Centraal Bureau voor de Statistiek. [
18. Hawkins MM, Swerdlow AJ: Completeness of cancer and death follow-up obtained through the National Health Service Central Register for England and Wales. Br J Cancer. 1992, 66: 408-413. 10.1038/bjc.1992.279.
Article CAS PubMed PubMed Central Google Scholar
19. Hermansen SW, Leitzmann MF, Schatzkin A: The impact on National Death Index ascertainment of limiting submissions to Social Security Administration Death Master File matches in epidemiologic studies of mortality. Am J Epidemiol. 2009, 169: 901-908. 10.1093/aje/kwn404.
Article PubMed PubMed Central Google Scholar
20. Armitage P, Berry G: Statistical Methods in Medical Research. 1987, Oxford: Blackwell Scientific Publications
Google Scholar
21. Zou G: A modified poisson regression approach to prospective studies with binary data. Am J Epidemiol. 2004, 159: 702-706. 10.1093/aje/kwh090.
Article PubMed Google Scholar
22. Clayton D, Hills M: Statistical Methods in Epidemiology. 1993, Oxford: Oxford University Press
Google Scholar
23. StataCorp: Stata Statistical Software: Release 10. Book Stata Statistical Software: Release 10. 2007, StataCorp LP
Google Scholar
24. Runowicz CD, Costantino JP, Wickerham DL, Cecchini RS, Cronin WM, Ford LG, Vogel VG, Wolmark N: Gynecologic conditions in participants in the NSABP breast cancer prevention study of tamoxifen and raloxifene (STAR). Am J Obstet Gynecol. 2011, 205: 535-
Article PubMed PubMed Central Google Scholar
25. Prasad M, Wang H, Douglas W, Barakat RR, Ellenson LH: Molecular genetic characterization of tamoxifen-associated endometrial cancer. Gynecol Oncol. 2005, 96: 25-31. 10.1016/j.ygyno.2004.08.046.
Article CAS PubMed Google Scholar
26. Ferguson SE, Olshen AB, Viale A, Awtrey CS, Barakat RR, Boyd J: Gene expression profiling of tamoxifen-associated uterine cancers: evidence for two molecular classes of endometrial carcinoma. Gynecol Oncol. 2004, 92: 719-725. 10.1016/j.ygyno.2003.10.038.
Article CAS PubMed Google Scholar
27. Sant M, Allemani C, Santaquilani M, Knijn A, Marchesi F, Capocaccia R: EUROCARE-4. Survival of cancer patients diagnosed in 1995-1999. Results and commentary. Eur J Cancer. 2009, 45: 931-991. 10.1016/j.ejca.2008.11.018.
Article PubMed Google Scholar
28. Kosary C: Cancer of the corpus uteri. SEER Survival Monograph: Cancer Survival Among Adults: US SEER Program, 1988-2001, Patient and Tumor Characteristics Volume NIH Pub. No. 07-6215. Edited by: Ries LAG, Young JL, Keel GE, Eisner MP, Lin YD, Horner M-J. 2007, Bethesda, MD: National Cancer Institute, 123-132.
Google Scholar
29. Fornander T, Rutqvist LE, Cedermark B, Glas U, Mattsson A, Silfversward C, Skoog L, Somell A, Theve T, Wilking N, et al: Adjuvant tamoxifen in early breast cancer: occurrence of new primary cancers. Lancet. 1989, 1: 117-120.
Article CAS PubMed Google Scholar
Download references
Acknowledgements
Dutch Cancer Society grant NKI 2002-2586, National Institutes of Health R03 grant number 1R03CA130108-02. The ICR acknowledge NHS funding to the NIHR Biomedical Research Centre Netherlands: The Comprehensive Cancer Centers' TAMARISK-group (Tamoxifen Associated Malignancies: Aspects of Risk)-group of the Comprehensive Cancer Centers (CCC): O. Visser (CCC Amsterdam), R. A. M. Damhuis (CCC Rotterdam), W. J. Louwman (CCC South Netherlands), J. A. A. M. van Dijck (CCC East Netherlands), Y. Westerman (CCC Middle Netherlands), M. J. M. Dirx (CCC Limburg), M. L. E. A. Jansen-Landheer (CCC West), L. de Munck (CCC Northern Netherlands), S. Siesling (CCC Stedendriehoek Twente). United Kingdom: The regional cancer registries: D. H. Brewster (Scottish Cancer Intelligence Unit), D. Forman (Northern & Yorkshire Cancer Registry & Information Service), S. Godward (East Anglian Cancer Intelligence Unit), A. Moran (North Western Cancer Registry), G. Lawrence (West Midlands Cancer Intelligence Unit), H. Møller (Thames Cancer Registry), M. Roche (Oxford Cancer Intelligence Unit), P. Silcocks (Trent Cancer Registry), J. A. Steward (Welsh Cancer Intelligence & Surveillance Unit), J. Verne (South & West Intelligence Unit), E. M.I. Williams (Merseyside & Cheshire Cancer Registry). The US: Dennis Deapen (Los Angeles), James R. Cerhan (Iowa) Stephen M. Schwartz (Seattle), Jonathan Liff (Atlanta), Jeffrey Perlman, Leslie Ford (National Cancer Institute).
Author information
Authors and Affiliations
Section of Epidemiology, The Institute of Cancer Research, Sutton, Surrey, SM2 5NG, UK
Michael E Jones & Anthony J Swerdlow
2. Department of Epidemiology, The Netherlands Cancer Institute, Plesmanlaan 121, 1066 CX, Amsterdam, The Netherlands
Flora E van Leeuwen & Wilhelmina E Hoogendoorn
3. Department of Gynecology, University Medical Center Groningen, University of Groningen, Groningen, The Netherlands
Marian JE Mourits
4. Department of Pathology, University Medical Center Groningen, University of Groningen, The Netherlands
Harry Hollema
5. Department of Pathology, The Netherlands Cancer Institute, Amsterdam, The Netherlands
Hester van Boven
6. Department of Pathology and Norris Comprehensive Cancer Center, University of Southern California Keck School of Medicine, 1441 Eastlake Ave, Ste 5409, Los Angeles, CA, 90033, USA
Michael F Press
7. Division of Cancer Etiology, Department of Population Sciences, Beckman Research Institute, 1500 East Duarte Road, City of Hope, Duarte, CA, 91010, USA
Leslie Bernstein
Authors
Michael E Jones
View author publications
Search author on:PubMed Google Scholar
2. Flora E van Leeuwen
View author publications
Search author on:PubMed Google Scholar
3. Wilhelmina E Hoogendoorn
View author publications
Search author on:PubMed Google Scholar
4. Marian JE Mourits
View author publications
Search author on:PubMed Google Scholar
5. Harry Hollema
View author publications
Search author on:PubMed Google Scholar
6. Hester van Boven
View author publications
Search author on:PubMed Google Scholar
7. Michael F Press
View author publications
Search author on:PubMed Google Scholar
8. Leslie Bernstein
View author publications
Search author on:PubMed Google Scholar
9. Anthony J Swerdlow
View author publications
Search author on:PubMed Google Scholar
Corresponding author
Correspondence to Michael E Jones.
Additional information
Competing interests
AJS holds shares in GlaxoSmithKline (who do not manufacture tamoxifen, but do make other drugs). The authors declare that they have no other competing interests.
Authors' contributions
MJ, FvL, WH, LB and AS made substantial contributions to the conception, design, analysis and interpretation of data. All authors have been involved in acquisition of data, drafting the manuscript, revising it critically for important intellectual content, and have given final approval of the version to be published.
Rights and permissions
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reprints and permissions
About this article
Cite this article
Jones, M.E., van Leeuwen, F.E., Hoogendoorn, W.E. et al. Endometrial cancer survival after breast cancer in relation to tamoxifen treatment: Pooled results from three countries. Breast Cancer Res 14, R91 (2012).
Download citation
Received:
Revised:
Accepted:
Published:
DOI:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Keywords
Breast Cancer
Tamoxifen
Endometrial Cancer
Figo Stage
Tamoxifen Treatment
Breast Cancer Research
ISSN: 1465-542X
Contact us
Submission enquiries: journalsubmissions@springernature.com |
10535 | https://www.youtube.com/watch?v=vDw2ALprfiw | Coordinate Geometry: Straight lines: Area of a square given the equation of a pair of parallel sides
Jatheen's Math Channel
23600 subscribers
24 likes
Description
1188 views
Posted: 7 Oct 2014
Coordinate Geometry: Straight lines: Area of a square given the equation of a pair of parallel sides
Transcript:
Hello friends welcome back in this session let's look at how to find out the area of a square if we know two parallel sides of a square so let's look at the equation here of the sides we have 5x - 12 y - 65 = 0 and 5x - 12 y + 26 = to 0 so let the equations let let these two sides Be those so I'll write down here 5x - 12 y - 65 = 0 and this side is 5X equation of this is 5x - 12 y + 26 = 0 now we we have been asked to find out the area of the square we know that area of square is equal to side into side so if I know the side then I can square it to find out the area now the problem is I don't have any coordinates or I haven't been given any any lens but I see that these two are parallel lines and I know how to find out the distance between two parallel lines the distance between two parallel lines ax Plus b y + C1 = 0 and ax + b y + C2 = 0 is given by C1 - C2 byun of a s + b² so taking this as a b C1 and a b C2 we will have the distance B between these two parallel lines is nothing but equal to C1 - C2 that is - 65 - 26 mod of that so that you will not have any negative value for the distance between two points then you will have square root of a square + b square a is 5 so 5 S + b² is 12 s this is equal to 65 + 26 so can I say mod of - 91 divid by squ < TK of 25 + 144 this is equal to 91 / < TK of 169 that's equal to 91 / 13 which is equal to 7 so we know that D is equal to 7 7 once we know D it's very easy to find out the area area equal to 7 into 7 that is equal to 49 square units so whenever we know the equation of one of the two parallel sides either either these two sides or these two sides if we know the equation of two pades then we can use the formula of finding out the distance between two parallel lines to find out the side of the square once we know the side of the square it becomes pretty easy to find out the area so that's how we can find out the area in the next session we will look into some more examples on distance between two parallel lines |
10536 | https://www.ck12.org/book/ck-12-physics-intermediate/section/27.3/ | Two-Dimensional Motion Problem Sets | CK-12 Foundation
What are you looking for? Search
Math
Grade 6
Grade 7
Grade 8
Algebra 1
Geometry
Algebra 2
PreCalculus
Science
Earth Science
Life Science
Physical Science
Biology
Chemistry
Physics
Social Studies
Economics
Geography
Government
Philosophy
Sociology
Subject
Math
Elementary Math
Grade 1
Grade 2
Grade 3
Grade 4
Grade 5
Interactive
Math 6
Math 7
Math 8
Algebra I
Geometry
Algebra II
Conventional
Math 6
Math 7
Math 8
Algebra I
Geometry
Algebra II
Probability & Statistics
Trigonometry
Math Analysis
Precalculus
Calculus
What's the difference?
Science
Grade K to 5
Earth Science
Life Science
Physical Science
Biology
Chemistry
Physics
Advanced Biology
FlexLets
Math FlexLets
Science FlexLets
English
Writing
Spelling
Social Studies
Economics
Geography
Government
History
World History
Philosophy
Sociology
More
Astronomy
Engineering
Health
Photography
Technology
College
College Algebra
College Precalculus
Linear Algebra
College Human Biology
The Universe
Adult Education
Basic Education
High School Diploma
High School Equivalency
Career Technical Ed
English as 2nd Language
Country
Bhutan
Brasil
Chile
Georgia
India
Translations
Spanish
Korean
Deutsch
Chinese
Greek
Polski
Explore
EXPLORE
Flexi A FREE Digital Tutor for Every Student
FlexBooks 2.0 Customizable, digital textbooks in a new, interactive platform
FlexBooks Customizable, digital textbooks
Schools FlexBooks from schools and districts near you
Study Guides Quick review with key information for each concept
Adaptive Practice Building knowledge at each student’s skill level
Simulations Interactive Physics & Chemistry Simulations
PLIX Play. Learn. Interact. eXplore.
CCSS Math Concepts and FlexBooks aligned to Common Core
NGSS Concepts aligned to Next Generation Science Standards
Certified Educator Stand out as an educator. Become CK-12 Certified.
Webinars Live and archived sessions to learn about CK-12
Other Resources
CK-12 Resources
Concept Map
Testimonials
CK-12 Mission
Meet the Team
CK-12 Helpdesk
FlexLets
Know the essentials.
Pick a Subject
Donate
Sign InSign Up
HomeSciencePhysicsFlexBooksCK-12 Physics - IntermediateCh273. Two Dimensional Motion Problem Sets
Add to Library
Share with Classes
Add to FlexBook® Textbook
Customize
Quick tips
Notes/Highlights
Offline Reader
27.3 Two-Dimensional Motion Problem Sets
Difficulty Level: At Grade | Created by: CK-12
Last Modified: Jun 24, 2017
Read Resources Details Attributions
A vector \begin{align}\vec {A}\end{align} has a magnitude of 5 units and is directed east. Vector \begin{align}\vec {B}\end{align} is directed north with a magnitude of 8 units. Draw a vector diagram for determining \begin{align}\vec {A}+ \vec{B}\end{align} and mathematically determine the magnitude and direction of the resultant vector (determine the displacement).
You walk 2 m east and 5 m south. What is the resultant displacement?
What is the magnitude of the displacement between the points (0,1) and (7,3)?
Tom walks 3 meters east, then 25 meters north. After Tom walks another 8 meters west, what is his magnitude of displacement from his original position?
On a road trip you drive 10 m east and then 12 m at an angle of 60° south of east. Find your resultant displacement.
The initial velocity of a particle is given as \begin{align}\vec{v}_0=3.00 \hat{x} \ m/s\end{align}and the acceleration is given as \begin{align}\vec{a} = 2.50 \hat{y} \ m/s^2\end{align}. Find the position and velocity vectors for the particle in terms of time \begin{align}t\end{align}.
A boy walks to the mall traveling 2 m/s for 5 minutes heading east. He then turns north and walks 3 m/s for 2 minutes. Find the boy’s average speed and total vector displacement.
A car moves east at a constant speed has a velocity of 50 mph. After 40 minutes, it begins heading 20.0° north of east for 20 minutes before heading east again for 30 more minutes. What is the car’s average velocity?
An Olympic sport shooter aims at a target 30 meters away. The fired projectile hits the target 0.02 meters beneath the point at which she aimed.
For how long was the projectile in the air?
With what velocity was the projectile fired?
A ball is thrown with an initial velocity of 25 m/s at an angle of 45°.
What is the horizontal displacement 1.0 seconds after the ball is thrown?
How about after 3 seconds?
A rifle with a muzzle velocity of 500 m/s shoots a target 50 m away. How high above the bullseye should the barrel be pointed?
Show that the maximum height reached by a projectile is represented as \begin{align}y=\frac{(v_0\sin\theta)^2}{2g}\end{align}.
A thrown ball has a time of flight of 5 seconds. If the ball leaves the hand 3 meters above the ground and lands 40 meters away, what must the magnitude and direction of its initial velocity be?
A plane releases a package 700 m above the ground while diving with constant speed at an angle 30.0° below the horizontal.
If the package hits the target on the ground 6 s later, determine the speed of the plane?
Find the package’s horizontal displacement?
What are the horizontal and vertical components of the package’s velocity upon hitting the ground?
A batter hits a ball 1.5 m above the ground. If the ball clears a fence that is 7 m tall and 97 m away, the hit will be a home run. The ball leaves with an angle of 45° and a range of 107 m. Will it clear the fence?
While evading the cops across city rooftops at 5 m/s, the caped crusader is quickly approaching a gap between two buildings that is 4 m wide with a 2 m drop. Since the caped crusader is well versed in physics, he knows he should leap at an angle of 45°. The cops, while capable of running at the same speed as the crusader, decide to leap with maximal horizontal velocity.
Do the cops clear the gap?
Does the caped crusader clear the gap? If so, by how much? If not, how close was he?
Upon graduation, a happy physics student launches her cap in the air. The cap has an initial velocity of 20 m/s and is released at 50° with respect to the horizontal.
Find the total time the cap is in the air. (Assume that \begin{align}y = y_0\end{align}.)
Determine how far the cap traveled horizontally.
While playing kickball with your friends, you kick the ball over a wall that is 3.2 m tall. The time of flight at the moment the ball clears the wall is 0.8 s and the distance to the wall is 12 m.
Find the initial speed and direction of the ball.
At what time does the ball reach its maximum height?
An emergency care package is being dropped to help out a village in need. The package is being dropped from 100 m above the ground while the plane is climbing upward at 35 m/s at an angle of 30° with respect to the horizontal. Where does the care package hit the ground?
Worried that your cat may be ambushed by a mountain lion, you build a fence around your backyard that is 4 m tall. If a mountain lion approaches the fence and leaps at an angle of 45°, what must its initial speed be to reach the top of the fence?
While on the moon and astronaut notices that he can leap a distance of 15 m if his initial speed is 5 m/s. Find the acceleration due to gravity on the moon.
A rifle that has a muzzle velocity of 1500 m/s is aimed at a target 3000 m away. At what angle should the rifle be fired?
While playing catch with your friends on the balcony, the ball goes sailing over the edge. The ball passes the edge with an angle 30° below the horizontal and an initial velocity of 7.5 m/s.
If the ball hits the ground 4 s later, how far away is the ball from the building?
What height did the ball fall from?
Determine how long it takes the ball to travel to a point 8 m below the balcony?
Billy, upset that he flunked his physics test, kicked a rock off a 50-meter cliff. After 6 seconds have passed, Billy hears the rock strike a metal roof. What was the initial velocity of the rock that was kicked off the cliff if the speed of sound is 343 m/s?
A softball player throws a softball at a certain angle in such a way that when the ball reaches its maximum height, its speed is one-third the speed at one-third its maximum heights. Calculate the initial angle of the ball when it was thrown.
A basketball player shoots a basketball with an angle of 60° at a hoop 5 meters away from the ball. With what velocity should the player shoot the ball to prevent it from dropping more than 10 cm vertically on the way to the hoop?
Shot putter competitor #1 launches a metal ball at 45° above the horizontal, and the metal ball lands 15 meters away. If shot putter competitor #2 launches his ball at a 57° angle at 10 m/s, will it travel more than 15 m?
Lola is dribbling a ball up a hill with an inline of \begin{align}\theta_1\end{align}. She then kicks the ball at an angle of \begin{align}\theta_2\end{align} with respect to horizontal \begin{align}\left ( \theta_2 > \theta_1 \right )\end{align}, determine the distance \begin{align}d\end{align} up the incline where the ball lands.
Attempting to score the winning point for his kickball team, Nicholas manages to kick the ball out of the park, sending it over a wall that is 100 m away and 15 m high. The ball is struck at an angle of 40°.
What is the initial speed of the ball?
Determine the time that it takes for the ball to just clear the top of the wall.
A rock is thrown from the top of a building at an angle of 35° with respect to the horizontal. The height of the building is 50 m and the initial velocity of the rock is 20 m/s.
Determine how long is the stone in the air.
What is the rock’s speed just before impacting the ground?
Sitting down to a picnic in the park, you watch a cat play in the grass. With respect to where you are sitting, the cat has the coordinates (1.0 m, 3.9 m) at \begin{align}t=0\end{align}. However, 5 seconds later, the cat is located at (6.4 m, 1.5 m).
Find the average velocity components.
Find the magnitude and direction of the average velocity.
You are watching a mouse race through a maze. At \begin{align}t=0\end{align}, define the initial position of the mouse as the origin. Determine the mouse’s \begin{align}(x,y)\end{align}position and its distance from the origin after 6.4 seconds in each of the following scenarios:
At \begin{align}t=6.4 \ s\end{align}, the mouse’s average velocity in the \begin{align}x\end{align}-direction is 2.0 m/s and its average velocity in the \begin{align}y\end{align}-direction is -2.0 m/s.
At \begin{align}t=6.4 \ s\end{align}, the mouse’s average velocity in the \begin{align}x\end{align}-direction is -2.0 m/s and its average velocity in the \begin{align}y\end{align}-direction is 2.0 m/s.
While creating a first-person shooter video game, you want to model the animation of a missile being fired from the player’s position as a function of time it spends in air. The missile’s position is defined by the following function: \begin{align}\vec r=\left [ 0.03 \ m+(2.0 \ m/s^2)t^2\right ] \hat{x}-\left [(0.5\ m/s)t\right ] \hat{y}\end{align}. Calculate the magnitude and direction of the average velocity after 2 s (from \begin{align} t=0 \ s\end{align} to \begin{align}t=2.0 \ s\end{align}.)
Upon arriving at the park, you give your dog a bone and let him off his leash. For a minute, he lies in the grass, gnawing at his treat. He then runs off with his bone. The initial components of his velocity are \begin{align}v_x= 2.0 \ m/s\end{align} and \begin{align}v_y= 1.5 \ m/s\end{align}. After 45 seconds have passed, the components of his velocity are \begin{align}v_x=8.0 \ m/s\end{align} and \begin{align}v_y=5.5 \ m/s\end{align}. Determine your dog’s average acceleration in the \begin{align}x\end{align}- and \begin{align}y\end{align}-directions during your time at the park so far.
Upset at a poor quiz score, you shove your textbook across the coffee table with a horizontal velocity of 2.5 m/s. The book hits the ground 0.40 s later. (Ignore friction on the table and air resistance.)
Find the height of the coffee table.
Calculate the horizontal distance between the table and where the book lands.
Draw the following graphs to describe the motion of the book: \begin{align}x\end{align} vs. \begin{align}t\end{align}, \begin{align}y\end{align} vs. \begin{align}t\end{align}, \begin{align}v_x\end{align} vs. \begin{align}t\end{align}, and \begin{align}v_y\end{align} vs. \begin{align}t\end{align}. (Hint: Calculate the velocity components first.)
John plans to impress his fiancé Anna by dropping roses on her from the skies with the help of a hang glider. Maintaining a constant horizontal speed of 15 m/s in the air, he drop the roses at an elevation of 200 m. Calculate the horizontal distance between Anna and the position from which John should drop the roses.
While hiking in Hawaii, Carlos and Ivan decide to jump from the top of a waterfall. At the last moment, Ivan chickens out and drops off the edge. Carlos, on the other hand, leaps with a horizontal velocity of 2.5 m/s. If Ivan hits the water in 4.0 s, how far away does Carlos land from the cliff?
A group of backpackers reach the top of a waterfall and decide to cool off with a dive into the lake below. Peering over a nearby cliff, they notice a ledge 8.0 m down that is 2.3 m long, as shown in the diagram below. Determine the minimum horizontal speed with which they must leap off the cliff in order to clear the ledge.
Inspired by the Dukes of Hazzard movie, you decide to see if your 1975 Buick Regal can leap across a river that is 50 m wide. The vertical displacement between the launching point and the ground on the other side of the river is -19 m.
At what horizontal speed would you have to drive off the cliff in order to clear the river?
What is the magnitude of the velocity just before the car hits the ground on the other side of the river?
You are playing a video game in which your character needs to defend the top of a hill. You decide to cash in some bonus points for extra shields. The package will be delivered by a plane flying 10 m overhead. If the package is dropped when it is horizontally 5.0 meters away from you, what speed should the plane be flying at?
In previous problems involving objects rolling or being pushed off cliffs or tables, you’ve assumed that \begin{align}g\end{align} is equal to gravitational acceleration on Earth. If the traveled horizontal distances for such objects are suddenly doubled, what would the new acceleration due to gravity be?
Playing catch with your cousin on a warm summer night, you throw the ball with a horizontal velocity of 10.0 m/s and a vertical velocity of 15.2 m/s.
What is the maximum height the ball reaches?
How long does it take the ball to return to the height it was thrown from? (Ignore air resistance.)
You are playing outside when your ball rolls toward your younger brother. Instead of tossing the ball back to you, he kicks it with a velocity of 60.0 m/s and at an angle of 65° above the horizontal.
Calculate the components of the initial velocity.
Ignoring air resistance, how long does it take the ball to reach its maximum height?
What is the maximum height?
Determine the components of the ball’s velocity and acceleration when it reaches its maximum height.
A bolt is fired from a crossbow with an initial velocity of 40 m/s and at an angle of 50° above the horizontal. If air resistance is ignored, determine the maximum height reached and total distance traveled.
After being hit, a softball flies with a velocity of 24 m/s at an angle of 37.8° above the horizontal. How many seconds after the ball is struck will it be 20 m away from its initial position?
Standing on the roof of a building that is 30 m high, you launch a baseball off the edge with a speed of 25 m/s at an angle of 25° below the horizontal.
Determine the magnitude of the velocity before the ball hits the ground.
Determine the horizontal distance the ball traveled before hitting the ground.
During medieval times, invaders often used trebuchets to launch objects over castle walls to scare and hurt the castle’s inhabitants. The distance between the castle walls and the trebuchet is 75 m and the castle walls are 30 m high. If the trebuchet launches objects at an angle of 45°, calculate the minimum velocity needed to launch objects from the trebuchet over the castle wall?
While on a 4-hour layover at Denver International Airport, you decide to play around on the moving walkway. The walkway is 70.0 m long and moves at a speed of 1.5 m/s. If your normal walking speed is 1.0 m/s, how long would it take you to walk across the walkway in the unintentional direction?
With the goal of creating a super slingshot to launch water balloon bombs, you construct a system that accelerates balloons 150.0 m up a 45° incline at a rate of 1.0 m/s 2. Calculate the maximum height above the ground that the water balloons reach when launched. (Hint: Once the balloons leave the incline, the only acceleration is due to gravity.)
A small boat is adrift on the ocean, heading towards a bunch of rocks near a cliff. As it drifts near the cliff, it is noticed by a group of people. To try and tow them in, a rope is thrown from the cliff, which is 12.0 m above the boat. The rope is thrown at an angle of 50° above the horizontal with an initial velocity of 16 m/s towards the boat. If the boat is has a velocity that is 0.6 m/s towards the cliff while heading to the rocks, at what distance \begin{align}x\end{align} from the cliff, should the people on the cliff throw the rope?
While at the state fair, you compete in a game to fill up a cylindrical container as fast as possible using a water gun. If the container’s height is twice as large as its diameter \begin{align}d\end{align} and the water gun’s distance from the container is 6 times the of the cylinder’s diameter, what is the minimum velocity that the water can be shot, assuming the gun is aimed at 45°?
Wanting to play the ultimate prank on your professor, you attempt to roll a giant balloon full of paint off of the physics building roof. As seen in the diagram below, the edge of the roof has a 40° incline with respect to the negative \begin{align}x\end{align}-axis and is 16.5 m above the ground. The balloon has a 6.5 m/s velocity as it rolls down the incline, and the professor, who is 1.5 m tall, stands 5.5 m away from the building.
Calculate how far from the edge does the balloon land?
Does the professor get hit?
Competing in a long jump event, Jack leaves the ground at an angle of 21° and travels a horizontal distance of 5.68 m. Calculate his initial velocity.
Competing in a long jump event, Allison jumps with an initial speed of 8.17 m/s and clears a distance of 6.01 m. At what angle did she leave the ground?
If two particles are fired with angles whose difference from 45° are equal, they will travel the same distance, assuming the initial velocity are equal and the landing height is equal to the launching height. Show that this is true.
Show that the velocity of a ball thrown off of a cliff \begin{align}y\end{align} m above the ground, at an angle of \begin{align}\theta\end{align}, is independent of \begin{align}\theta\end{align}.
If you were given the position of an object at two different points and the elapsed time, which of the following would you not be able to determine: instantaneous velocity or average velocity? Explain your answer.
Draw the path showing how the velocity of an object would change if it were thrown parallel to the ground.
Draw the acceleration as a function of time and show how the acceleration of an object would change if it were thrown parallel to the ground.
Given the initial position of a thrown object, explain how you could calculate the coordinates of the object when it is at its highest point.
An object is sliding across a frictionless surface at a constant velocity. If a constant acceleration is applied perpendicular to the velocity and normal to the surface, what is the shape of the object’s path?
Determine which of the following remain constant during parabolic motion: acceleration, speed, horizontal component of the velocity, and vertical component of the velocity.
While traveling on a bullet train, you throw a ball straight up in the air. Describe the motion of the ball from the eyes of passengers both outside and inside of the train.
For his final performance, a daredevil wants to jump over a pit of spikes and gorillas on his motorcycle. As seen in the diagram below, the pit is 50.0 m wide and the ramp off of which he will jump is inclined at angle of 50°. The top of the ramp reaches 75 m above the spike but only 12.0 m above the landing point. Ignoring air resistance, at what speed does the daredevil need to leave the ramp in order to clear the pit?
An object moves through space with a velocity of \begin{align}\vec{v}=5 \hat{i} - 10 \hat{j}\end{align}, with an acceleration of \begin{align} \vec{a}=2 \hat{i}\end{align}. Determine the components of the velocity at any given time.
A particle has an initial velocity of \begin{align}\vec v=(5 - 2t)\hat{i} - 8\hat{j}\end{align}. Determine the velocity 2 s later.
Consider a launched projectile that travels a parabolic path. At what point is the velocity vector and the acceleration vector perpendicular to each other?
Is there a point at which the velocity and acceleration vectors of an object exhibiting projectile motion are parallel?
At what angle should you throw a ball to achieve the maximum possible height?
What is significant about the following angle pairs in projectile motion: (40, 50), (25, 65)?
While pondering the meaning of life, a student is playfully throwing pebbles off the physics department’s roof. If the building is 50 m high and the rocks are being thrown with an initial velocity of 15 m/s at an angle of 35° with respect to the horizontal, how long does it take for the pebbles to hit the ground?
Determine the magnitude of the final velocity of an object that is launched from a ledge 30 m high with an initial velocity of 25 m/s at an angle of 40° with respect to the horizontal.
A screw from a plane traveling 400 m above the surface of the Earth shakes loose and falls to the surface. If the plane is traveling at 80 m/s parallel to the ground, calculate how much time elapses before the screw hits the ground?
If a particle’s position is given by \begin{align}\vec{r} (t)=(1.0t+1.0)\hat{i} + (0.5t^2+0.2)\hat{j},\end{align} determine the average velocity of a particle between \begin{align}t=1.0\ s\end{align} and \begin{align}t = 3.0 \ s\end{align}.
A car has an initial velocity of 25 m/s, and 10 s later, its velocity is 42 m/s. What is the car’s average acceleration?
If the average acceleration of an object is \begin{align}\vec a=(0.7 \ m/s^2)\hat{i} + (0.5 \ m/s^2)\hat{j}\end{align}, determine the direction of the acceleration with respect to the positive \begin{align}x\end{align}-axis.
While visiting a planet outside our solar system, an astronaut jumps a horizontal distance of 25 m with an initial velocity of 8 m/s.
Calculate the acceleration due to gravity on this planet.
If the astronaut were back on Earth, what would be the maximum horizontal distance traveled?
A ball is tossed from the roof of a building with an initial velocity of 5.0 m/s in the \begin{align}x\end{align}-direction strikes the ground 4.0 seconds later. Determine the distance from the building that the ball hit the ground.
A ball is tossed from the roof of a building with an initial velocity of 8.0 m/s at an angle of 35° with respect to the \begin{align}x\end{align}-axis. If the ball strikes the ground 4.0 seconds later, determine the distance between the building and the location where the ball hit the ground.
While sitting on a cliff that overlooks a lake, Aliya throws a pebble with an initial horizontal velocity of 5 m/s, and the pebble lands in the lake 4 s later. Her sister, Meta, then throws a pebble with a velocity of 5 m/s at an angle of 35° with respect to the \begin{align}x\end{align}-axis.
How high is the cliff?
Determine how much longer Meta’s pebble is in the air.
If Audrey is standing at a point that is 3 miles east and 5 miles north of her house, what is her position in vector notation?
Calculate \begin{align}\vec {A} - 2\vec {B}\end{align} if \begin{align}\vec {A}=(5,4)\end{align} and \begin{align}\vec {B}=(1,2)\end{align}.
If \begin{align}\vec{A} + \vec{B}=4\hat{j}\end{align} and \begin{align}2\vec{B}=2\hat{i} - 3\hat{j}\end{align}, determine \begin{align}\vec {A}\end{align}.
True or False: The sum of two vectors is the sum of their magnitudes.
A plane is attempting to fly due south with an airspeed of 300 km/h while a wind blowing from west to east has a speed of 60 km/h. In what direction should the plane head?
Determine the velocity of an object whose position as a function of time is given as \begin{align}\vec r(t)=(3.0t)\hat{i} - (4.8t^3)\hat{j}\end{align}.
Determine the expression for the acceleration of an object whose position as a function of time is given as \begin{align}\vec r(t)=(3.0t-t^2)\hat{i} - (5.0t^2)\hat{j}\end{align}.
Calculate the time it takes for a ball thrown vertically upward with an initial velocity of 16.3 m/s to travel 10.0 m.
Determine the time it takes for a ball to reach its maximum height when thrown vertically upward at an initial velocity of 8.3 m/s.
Determine the components of the vector below.
If \begin{align}\vec{A}=3\hat{i} - 8\hat{j}\end{align} and \begin{align}\vec{B}=-7.2\hat{i} + 19.2\hat{j}\end{align}, write an equation relating the two vectors.
An object initially traveling in the \begin{align}x\end{align}-direction at a speed of 1.1 m/s is given an acceleration of 2.0 m/s 2 in the \begin{align}y\end{align}-direction for 3.0 s. What is the object’s speed afterwards?
An initially motionless object is given an acceleration of 2.0 m/s 2 in the \begin{align}y\end{align}-direction for 3.0 s. What is the object’s speed afterwards?
True or False: An object takes the same amount of time to hit the ground when dropped and launched horizontally from the same height.
Given two vectors\begin{align}\vec A\end{align}and\begin{align}\vec B\end{align}, when can the magnitude of the resultant vector be written as\begin{align}A+B\end{align}?
Prove that if a vector is two-dimensional, a component of the vector will always be less than the magnitude of the vector.
Prove that if a vector has at least one nonzero component, it must have a positive magnitude.
Calculate the sum of the following two vectors: \begin{align}|\vec A| =2\end{align} at 20° north of east and \begin{align}|\vec B|=3\end{align} at 35° north of east. What is the magnitude of the resultant vector?
Is it possible for a vector to have only a magnitude and not a direction? Explain.
Two vectors are equal in magnitude but opposite in direction. Show, using components, that the resultant vector has a magnitude of zero.
You are given two vectors: \begin{align}|\vec A|=5\end{align} at 20° north of east and \begin{align}|\vec B|=3\end{align}at 65° north of east.
What is the magnitude of the resultant vector?
What is the direction of the resultant vector?
A car drives 4 miles north and then turns west before driving another 4 miles.
Determine the magnitude of the car’s displacement vector.
Graph the car’s displacement vector. Include the proper lengths and angles.
While trying to determine how much rope you will need to scale a wall, you note that when you stand 70.0 m away from the base, the top of the wall makes a 35° angle with the ground. Calculate the height of the wall.
Given two vectors \begin{align}\vec A\end{align} and \begin{align}\vec B\end{align}, if the component of vector \begin{align}\vec A\end{align} that lies along vector \begin{align}\vec B\end{align} is 0, what can be said about the relationship between the two vectors?
What method is used to add a vector quantity to a scalar quantity?
Both vectors \begin{align}\vec A\end{align} and \begin{align}\vec B\end{align} each have a magnitude of 3.0 m. If \begin{align}\theta_A=20^\circ\end{align} and \begin{align}\theta_B=90^\circ\end{align}, calculate the following:
\begin{align}\vec A+ \vec B\end{align}
\begin{align}\vec A - \vec B\end{align}
\begin{align}2 \vec A - 2 \vec B\end{align}
Calculate the angle each resultant vector in the previous problem makes with the positive \begin{align}x\end{align}-axis.
Given the vector \begin{align}\vec A= -3.0 \hat{x} -2.0 \hat{y}\end{align}, determine the angle the displacement vector makes with the positive \begin{align}x\end{align}-axis.
A vector has an \begin{align}x\end{align}-component of -20.0 splurgs and a \begin{align}y\end{align}-component of 55.0 splurgs. Calculate the vector’s magnitude and direction.
Vector \begin{align}\vec A\end{align} has components 3, 5, 7 in the \begin{align}x\end{align}-, \begin{align}y\end{align}-, and \begin{align}z\end{align}-directions respectively. Calculate the magnitude of the displacement vector.
Prove that addition of the following vectors is associative: \begin{align}v_1 + (v_2 + v_3) = (v_1 + v_2) + v_3\end{align}.
Prove that \begin{align}\vec A - \vec B = \vec A - (\vec B)\end{align}.
Prove that \begin{align}2(\vec A + \vec B) = 2 \vec A + 2 \vec B\end{align}.
Under what conditions is the following statement true: \begin{align}\vec A = \vec B\end{align}?
During a jet pack training exercise, one pilot rises 200 meters upward, flies 100 meters west, and then flies 50 meters north. A second pilot flies 75 meters west, rises 150 meters upward, and then flies 160 meters north. How far apart are the two jet pack pilots?
Find the magnitude of the sum of the following two vectors: \begin{align}\vec A = (2, -1, 5)\end{align}, \begin{align}\vec B = (0, 3, 3)\end{align}.
Express the sum of the following two vectors in \begin{align}\hat{x}, \hat{y}, \hat{z}\end{align} notation: \begin{align}\vec A = (2, 0, 5)\end{align}, \begin{align}\vec B=(4, 3, 3)\end{align}
Find the magnitude of the resultant of the following vector operation: \begin{align}\vec A + \vec B - \vec C\end{align}. Let \begin{align}\vec A=(1, 5, 0)\end{align}, \begin{align}\vec B = (0, 7, 2)\end{align}, and \begin{align}\vec C = (-1, -2, 2)\end{align}.
Find the magnitude of the resultant of the following vector operation: \begin{align}-\vec A -\vec B + \vec C\end{align}. Let \begin{align}\vec A=(1, 5, 0)\end{align},\begin{align}\vec B = (0, 7, 2)\end{align}, and\begin{align}\vec C = (-1, -2, 2)\end{align}.
Given vectors \begin{align}\vec A\end{align} and \begin{align}\vec B\end{align} with A = 30 m at 20° and B = 20 m at 75°, what are the components of each vector along the \begin{align}x\end{align}- and \begin{align}y\end{align}-axes?
Given vectors \begin{align}\vec A\end{align} and \begin{align}\vec B\end{align} with A = 30 m at -20° and B = 20 m at 75°, what are the components of each vector along the \begin{align}x\end{align}- and \begin{align}y\end{align}-axes? (Assume the angles are measured with respect to the negative \begin{align}x\end{align}-axis.)
Determine the resultant vector of the sum \begin{align}\vec A + \vec B\end{align}, if A = 2 N at 20° and B = 1 N at 90°.
Calculate the resultant vector of the difference \begin{align}\vec A - \vec B\end{align}, if A = 2 N at 20° and B = 1 N at 90°.
Find the angle between the following vectors: \begin{align}\vec A = 3 \hat{i}\end{align}, \begin{align}\vec B = 5 \hat{j}\end{align}
Notes/Highlights
| Color | Highlighted Text | Notes | |
--- --- |
| | Please Sign In to create your own Highlights / Notes |
Currently there are no resources to be displayed.
Description
CK-12 Physics - Intermediate is a high school FlexBook® resource covering all standard high school physics topics with mathematical rigor and detailed examples.
Learning Objectives
Difficulty Level
At Grade
author
Authors Des
Standards Correlations
-
Concept Nodes
Language
English
Date Created
Jan 14, 2016
Last Modified
Jun 24, 2017
Vocabulary
.
| Image | Reference | Attributions |
---
Show Attributions
Show Details ▼
Previous One Dimensional Motion Problem Sets
Next Newton's Three Laws Problem Sets
Reviews
Was this helpful?
Yes
No
33% of people thought this content was helpful.
1 2
Back to the top of the page ↑
CK-12 Foundation is a non-profit organization that provides free educational materials and resources.
FLEXIAPPS
ABOUT
Our missionMeet the teamPartnersPressCareersSecurityBlogCK-12 usage mapTestimonials
SUPPORT
Certified Educator ProgramCK-12 trainersWebinarsCK-12 resourcesHelpContact us
BYCK-12
Common Core MathK-12 FlexBooksCollege FlexBooksTools and apps
CONNECT
TikTokInstagramYouTubeTwitterMediumFacebookLinkedIn
v2.11.10.20250923073248-b88c97d744
© CK-12 Foundation 2025 | FlexBook Platform®, FlexBook®, FlexLet® and FlexCard™ are registered trademarks of CK-12 Foundation.
Terms of usePrivacyAttribution guide
Curriculum Materials License
Oops, looks like cookies are disabled on your browser. Click on this link to see how to enable them.
X
Student Sign Up
Are you a teacher? Sign up here
Sign in with Google
Having issues? Click here
Sign in with Microsoft Sign in with Apple
or
Sign up using email
By signing up, I confirm that I have read and agree to the Terms of use and Privacy Policy
Already have an account? Sign In
No Results Found
Your search did not match anything in .
Got It |
10537 | https://www.nccn.org/patients/guidelines/content/PDF/breast-invasive-patient.pdf | 2025 Invasive Breast Cancer NCCN GUIDELINES FOR PATIENTS ® Presented with support from FOUNDATION Guiding Treatment. Changing Lives.
NATIONAL COMPREHENSIVE CANCER NETWORK ® Available online at NCCN.org/patientguidelines Ü 1 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Invasive Breast Cancer About the NCCN Guidelines for Patients® Did you know that top cancer centers across the United States work together to improve cancer care? This alliance of leading cancer centers is called the National Comprehensive Cancer Network® (NCCN®).
Cancer care is always changing. NCCN develops evidence-based cancer care recommendations used by health care providers worldwide. These frequently updated recommendations are the NCCN Clinical Practice Guidelines in Oncology (NCCN Guidelines®). The NCCN Guidelines for Patients plainly explain these expert recommendations for people with cancer and caregivers.
These NCCN Guidelines for Patients are based on the NCCN Clinical Practice Guidelines in Oncology (NCCN Guidelines®) for Breast Cancer, Version 3.2025 – March 18, 2025.
Learn how the NCCN Guidelines for Patients are developed NCCN.org/patient-guidelines-process Find an NCCN Cancer Center near you NCCN.org/cancercenters View the NCCN Guidelines for Patients free online NCCN.org/patientguidelines Connect with us 2 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Invasive Breast Cancer Supporters To make a gift or learn more, visit online or email NCCNFoundation.org/donate PatientGuidelines@ NCCN.org NCCN Foundation gratefully acknowledges the following corporate supporters for helping to make available these NCCN Guidelines for Patients: AstraZeneca and The Wawa Foundation.
NCCN independently adapts, updates, and hosts the NCCN Guidelines for Patients. Our corporate supporters do not participate in the development of the NCCN Guidelines for Patients and are not responsible for the content and recommendations contained therein.
NCCN Guidelines for Patients are supported by funding from the NCCN Foundation® FOUNDATION Guiding Treatment. Changing Lives.
NATIONAL COMPREHENSIVE CANCER NETWORK ® 3 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Invasive Breast Cancer Contents © 2025 National Comprehensive Cancer Network, Inc. All rights reserved. NCCN Guidelines for Patients and illustrations herein may not be reproduced in any form for any purpose without the express written permission of NCCN. No one, including doctors or patients, may use the NCCN Guidelines for Patients for any commercial purpose and may not claim, represent, or imply that the NCCN Guidelines for Patients that have been modified in any manner are derived from, based on, related to, or arise out of the NCCN Guidelines for Patients. The NCCN Guidelines are a work in progress that may be redefined as often as new significant data become available. NCCN makes no warranties of any kind whatsoever regarding its content, use, or application and disclaims any responsibility for its application or use in any way.
NCCN Foundation seeks to support the millions of patients and their families affected by a cancer diagnosis by funding and distributing NCCN Guidelines for Patients. NCCN Foundation is also committed to advancing cancer treatment by funding the nation’s promising doctors at the center of innovation in cancer research. For more details and the full library of patient and caregiver resources, visit NCCN.org/patients. National Comprehensive Cancer Network (NCCN) and NCCN Foundation 3025 Chemical Road, Suite 100, Plymouth Meeting, PA 19462 USA 4 About invasive breast cancer 8 Testing for breast cancer 22 Breast cancer staging 28 Types of treatment 44 Supportive care 51 Your treatment options 62 The breast after surgery 67 Recurrence 71 Other resources 75 Words to know 79 NCCN Contributors 80 NCCN Cancer Centers 82 Index 4 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 1 About invasive breast cancer 5 What is invasive breast cancer?
6 What are the parts of the breast?
6 What's in this book?
7 What can you do to get the best care? 5 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 1 About invasive breast cancer » What is invasive breast cancer?
Invasive breast cancer is cancer that has spread from the milk ducts or milk glands (lobules) into the surrounding breast tissue or nearby lymph nodes. Invasive breast cancer is also called early-stage breast cancer. What is invasive breast cancer?
Breast cancer starts in the cells of the breast. Over time, these cells form a mass called a tumor. In invasive breast cancer, cancer has grown outside the milk ducts or milk glands (lobules) into the surrounding breast tissue. Once outside the ducts or lobules, breast cancer can spread through lymph or blood to lymph nodes or other parts of the body.
Almost all invasive breast cancers are carcinomas—cancers that start in the cells that line the inner or outer surfaces of the body. There are different types of breast carcinoma, most of which arise in cells that make up the lining (epithelial cells) in the terminal duct lobular units (TDLUs) of the breast. A TDLU consists of a lobule connected to the end of a small milk duct. The most common types of invasive breast cancer are ductal carcinoma and lobular carcinoma.
Anyone can develop breast cancer, including those assigned male at birth. Although there are some differences between breast cancers in those assigned male and those assigned female at birth, treatment is very similar for all genders.
The breast The breast is a glandular organ made up of milk ducts, fat, nerves, blood and lymph vessels, ligaments, and other connective tissue.
6 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 1 About invasive breast cancer » What are the parts of the breast?
6 1 About invasive breast cancer » What are the parts of the breast? » What's in this book?
What are the parts of the breast?
The breast is a gland found on the chest. The breast is made of milk ducts, fat, nerves, lymph and blood vessels, ligaments, and other connective tissue. Behind the breast are the pectoral (chest) muscle and ribs. Muscle and ligaments help hold the breast in place.
Breast tissue contains glands that can make milk. These milk glands are called lobules. Lobules look like tiny clusters of grapes. Small tubes called ducts connect the lobules to the nipple.
The ring of darker breast skin in the center of the breast is called the areola. The raised tip within the areola is called the nipple. The nipple-areola complex (NAC) is a term that refers to both parts. Lymphatic fluid (lymph) drains from breast tissue into lymph vessels and travels to lymph nodes near your armpit (axilla). Lymph is a clear fluid that gives cells water and food. It also helps to fight germs. Nodes near the armpit are called axillary lymph nodes (ALNs). Cancer cells can travel through blood and lymph to lymph nodes and other parts of the body. What's in this book?
This book is organized into the following chapters: Chapter 2: Testing for breast cancer provides an overview of tests you might receive, and the role of HER2 status, hormone receptors, genetic cancer risk, and biomarker testing.
Chapter 3: Breast cancer staging provides information on how breast cancer is staged.
Chapter 4: Types of treatment gives a general overview of invasive breast cancer treatment and what to expect. Chapter 5: Supportive care gives an overview of what supportive care is and possible side effects of treatment.
Chapter 6: Your treatment options provides specific surgery and systemic therapy options for your cancer based on hormone receptor (HR) and HER2 tumor status. It also discusses who might benefit from systemic therapy before surgery.
Chapter 7: The breast after surgery offers more information on volume displacement, flat closure, and breast reconstruction.
Chapter 8: Recurrence explains treatment options for cancer that has returned.
Chapter 9: Other resources provides information on patient advocacy groups and where to get help.
7 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 1 About invasive breast cancer » What can you do to get the best care? What can you do to get the best care? Advocate for yourself. You have an important role to play in your care. In fact, you’re more likely to get the care you want by asking questions and making shared decisions with your care team. Consider seeking the opinion of a breast cancer specialist and team that specializes in diagnosis and management of breast cancer. The NCCN Guidelines for Patients will help you understand cancer care. With better understanding, you’ll be more prepared to discuss your care with your team and share your concerns. Many people feel more satisfied when they play an active role in their care.
You may not know what to ask your care team. That’s common. Each chapter in this book ends with an important section called Questions to ask. These suggested questions will help you get more information on all aspects of your care.
Take the next step and keep reading to learn what is the best care for you!
Why you should read this book Making decisions about cancer care can be stressful. You may need to make tough decisions under pressure about complex choices.
The NCCN Guidelines for Patients are trusted by patients and providers. They clearly explain current care recommendations made by respected experts in the field. Recommendations are based on the latest research and practices at leading cancer centers.
Cancer care is not the same for everyone. By following expert recommendations for your situation, you are more likely to improve your care and have better outcomes as a result. Use this book as your guide to find the information you need to make important decisions.
The NCCN Guidelines for Patients are seen as a trusted source by researchers, clinicians, and advocates. They set the standard for appropriate and effective breast cancer treatment, making them a good first step for newly diagnosed patients." “ 8 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer 9 General health tests 11 Fertility (all genders) 11 Blood tests 12 Imaging tests 16 Biopsy 17 HER2 status 18 Hormone receptor status 19 Biomarker testing 19 Genetic cancer risk testing 21 Key points 21 Questions to ask 9 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » General health tests Not all invasive breast cancers are the same. Treatment planning starts with testing. Your care team will want to gather information about the cancer you have. This chapter presents an overview of the tests you might receive and what to expect.
Tests are used to find cancer, plan treatment, and check how your cancer is responding to treatment. Results from a tumor biopsy and imaging studies will be used to determine what treatments are best for your type of breast cancer. Testing takes time. For possible tests, see Guide 1.
General health tests Medical history A medical history is a record of all health issues and treatments you have had in your life. Be prepared to list any illness or injury and when it happened. Bring a list of old and new medicines and any over-the-counter (OTC) medicines, herbals, or supplements you take. Some supplements interact with and affect medicines that your care team may prescribe. Tell your care team about any symptoms you have. A medical history, sometimes called a health history, will help determine which treatment is best for you.
Family history Some cancers and other diseases can run in families. Your doctor will ask about the health history of family members who are blood relatives. This information is called a family history. Ask family members on both sides of your family about their health issues like heart disease, cancer, and diabetes. It’s important to know the specific type of cancer, or where the cancer started, if it was in multiple locations, how old they were when they had the cancer, and if they had genetic testing. Guide 1 Possible tests Medical history and physical exam Diagnostic mammogram. Other imaging tests as needed Biopsy with pathology review Tumor estrogen receptor (ER) and progesterone receptor (PR) status Tumor HER2 status Genetic counseling and testing if at risk for hereditary breast cancer or have triple-negative breast cancer (TNBC) Address fertility and sexual health concerns Pregnancy test in those of childbearing potential Assess for distress Lymphedema baseline screening 10 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » General health tests Physical exam During a physical exam, your health care provider may: h Check your temperature, blood pressure, pulse, and breathing rate h Check your height and weight h Listen to your lungs and heart h Look in your eyes, ears, nose, and throat h Feel and apply pressure to parts of your body to see if organs are of normal size, are soft or hard, or cause pain when touched. h Examine your breasts to look for lumps, nipple discharge or bleeding, or skin changes. h Feel for enlarged lymph nodes in your neck, underarm, and groin.
Clinical breast exam A clinical breast exam (CBE) is a physical exam of the bare breast performed by a health care provider to check for lumps or other changes. It is done while you are seated and/ or lying down. Your provider should take time to palpate (feel) the entire breast, including the armpit. A nurse or assistant might also be in the room during the exam. Distress screening Distress is an unpleasant experience of a mental, physical, social, or spiritual nature. It can affect how you feel, think, and act. Distress might include feelings of sadness, fear, helplessness, worry, anger, and guilt. You may also experience depression, anxiety, and sleep issues.
It is normal to have strong feelings about being diagnosed with cancer and your feelings can also change from day to day and week to week. Talk to your care team and those whom you feel most comfortable about how you are feeling. There are services, people, and medicine that can help you. Support and counseling are available. Your treatment team will ask about your level of distress. This is part of your cancer care. More information on distress can be found in the NCCN Guidelines for Patients: Distress During Cancer Care at NCCN.org/ patientguidelines and on the NCCN Patient Guides for Cancer app.
Lymphedema baseline screening Lymphedema is a condition in which lymph fluid builds up in tissues and causes swelling. A lymphedema baseline screening measures the fluid levels in your body. It is done to look for small changes in the body after surgery. Performance status Performance status (PS) is a person’s general level of fitness and ability to perform daily tasks. Your state of general health might be rated using a PS scale called the Eastern Cooperative Oncology Group (ECOG) score or the Karnofsky Performance Status (KPS). PS is one factor taken into consideration when choosing a treatment plan.
11 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Fertility (all genders) 11 2 Testing for breast cancer » Fertility (all genders) » Blood tests Fertility (all genders) Some types of treatment such as chemotherapy can affect fertility, or the ability to have children. If you think you want children in the future, ask your care team how cancer and cancer treatment might change your fertility. To preserve your fertility, you may need to take action before starting cancer treatment. Those who want to have children in the future should be referred to a fertility specialist to discuss the options before starting treatment. Fertility preservation is all about keeping your options open, whether you know you want to have children later in life or aren’t sure at the moment. Fertility and reproductive specialists can help you sort through what may be best for your situation. More information on fertility preservation can be found at NCCN Guidelines for Patients: Adolescent and Young Adult Cancer at NCCN.
org/patientguidelines and on the NCCN Patient Guides for Cancer app.
Changes in fertility Treatment might cause your fertility to be temporarily or permanently impaired or interrupted. This loss of fertility is related to your age at time of diagnosis, treatment type(s), treatment dose, and treatment length. Talk to your care team about your concerns and if you are planning a pregnancy.
Preventing pregnancy during treatment Preventing pregnancy during treatment is important. Cancer treatment can affect the ovaries, damage sperm, and hurt a developing baby. Therefore, becoming pregnant or having one's partner become pregnant during treatment should be avoided. Non-hormonal birth control methods such as intrauterine devices (IUDs) and barrier methods are preferred in those with a breast cancer diagnosis. Types of barrier methods include condoms, diaphragms, cervical caps, and the contraceptive sponge. If you are pregnant at the time of your cancer diagnosis, treatment will need to be tailored to protect your unborn child. If you are breastfeeding at the time of cancer diagnosis, you may need to stop breastfeeding during treatment. Blood tests Blood tests check for signs of disease and how well organs are working. Some blood tests you might have are described next.
Alkaline phosphatase Alkaline phosphatase (ALP) is an enzyme found in the blood. High levels of ALP can be a sign cancer has spread to the bone or liver. A bone scan might be performed if you have high levels of ALP.
Complete blood count A complete blood count (CBC) measures the levels of red blood cells (RBCs), white blood cells (WBCs), and platelets (PLTs) in your blood. Red blood cells carry oxygen 12 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Imaging tests throughout your body, white blood cells fight infection, and platelets control bleeding.
Comprehensive metabolic panel A comprehensive metabolic panel (CMP) measures substances in your blood. It provides important information about how well your kidneys and liver are working, among other things Liver function tests Liver function tests (LFTs) look at the health of your liver by measuring chemicals that are made or processed by the liver. Levels that are too high or low signal that the liver is not working well or that cancer has spread to the liver. Pregnancy test Those who can become pregnant will be given a pregnancy test before treatment begins.
Imaging tests Imaging tests take pictures of the inside of your body. Imaging tests show the primary tumor, or where the cancer started, and look for cancer in other parts of the body. A radiologist, a medical expert, will interpret the test and send a report to your doctor. While these reports might be available to you through your patient portal or patient access system, please wait to discuss these results with your care team The following imaging tests are not in order of importance. You may not need all of these tests.
Bone scan A bone scan uses a radiotracer to highlight areas of bone damage or loss. A radiotracer is a substance that releases small amounts of radiation. Before the pictures are taken, the tracer will be injected into your vein. It can take a few hours for the tracer to enter your bones. However, the test is quick and painless.
A special camera will take pictures of the tracer in your bones as it moves over your body. Areas of bone damage take up more radiotracer than healthy bone and show up as bright spots on the pictures. Bone damage can be caused by cancer, cancer treatment, previous injuries, or other health issues. Bone x-ray An x-ray uses low-dose radiation to take one picture at a time. A tumor changes the way radiation is absorbed and will show up on the x-ray. X-rays are also good at showing bone issues. Your care team may order x-rays if your bones hurt or were abnormal on a bone scan. Contrast material Contrast material is a substance used to improve the quality of the pictures of the inside of the body. It is used to make the pictures clearer. Contrast might be taken by mouth (oral) or given through a vein (IV). Oral contrast does not get absorbed from your intestines and will be passed with your next bowel movements. IV contrast will leave the body in the urine immediately after the test. 13 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Imaging tests The types of contrast vary and are different for CT and MRI. Not all imaging tests require contrast, but many do. Tell your care team if you have had allergic reactions to contrast in the past. This is important. You might be given medicines to avoid the effects of those allergies. Contrast might not be used if you have a serious allergy or if your kidneys aren’t working well.
CT scan A computed tomography (CT or CAT) scan uses x-rays and computer technology to take pictures of the inside of the body. It takes many x-rays of the same body part from different angles. All the images are combined to make one detailed picture. Intravenous (IV) contrast is often used.
Diagnostic mammogram A mammogram is a picture of the inside of your breast. The pictures are made using x-rays. A computer combines the x-rays to make detailed pictures. A bilateral mammogram includes pictures of both breasts. Mammogram results are used to plan treatment.
Diagnostic mammograms look at specific areas of your breasts, which may not be clearly seen on screening mammograms. They are used to see tumor and the size of the tumor(s). Diagnostic mammograms include extra compression in certain areas of the breast, magnification views, or rolling the breast to image additional areas of the breast. Other tests may include a breast MRI or ultrasound.
What’s the difference between a screening and diagnostic mammogram?
A mammogram is a picture of the inside of your breast made using x-rays. During a mammogram, the breast is pressed between two plates while you stand in different positions. Multiple x-rays will be taken. A computer combines the x-rays to make detailed pictures.
Screening mammogram • Done on a regular basis when there are no signs or symptoms of breast cancer. Results take a few days.
Diagnostic mammogram • Used for those who have symptoms such as a lump, pain, nipple thickening or discharge, or those whose breasts have changed shape or size. An ultrasound is often used with a diagnostic mammogram.
• Also used to take a closer look at an abnormal area found in a screening mammogram. • A radiologist will evaluate the diagnostic mammogram while you wait so if additional testing is needed, it can be done right away.
Both types of mammograms use low-dose x-rays to examine the breast. They may use either the standard 2-dimensional (2D) digital mammogram or 3-dimensional (3D) mammogram known as tomosynthesis. 14 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Imaging tests MRI scan A magnetic resonance imaging (MRI) scan uses radio waves and powerful magnets to take pictures of the inside of the body. It does not use x-rays, which means there is no radiation delivered to your body during the test. Because of the very strong magnets used in the MRI machine, tell the technologist if you have any metal or a pacemaker in your body. During the test, you will likely be asked to hold your breath for 10 to 20 seconds as the technician collects the images. Contrast is used.
A closed MRI has a capsule-like design where the magnet surrounds you. The space is small and enclosed. An open MRI has a magnetic top and bottom, which allows for an opening on each end. Closed MRIs are more common than open MRIs, so if you have claustrophobia (a dread or fear of enclosed spaces), be sure to talk to your care team about it. MRI scans take longer to perform than CT scans. h A breast MRI might be used in addition to a mammogram. You will be positioned face down in the machine with your arms above your head. h A spine or brain MRI can be used to detect breast cancer that has spread (metastasized) to the spine or brain. Breast MRI If needed, a breast MRI will be done in addition to a mammogram. In a breast MRI, you are positioned face down with your arms overhead. 15 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Imaging tests PET scan A PET (positron emission tomography) scan uses a radioactive drug called a tracer. A tracer is a substance injected into a vein to see where cancer cells are in the body and how much sugar is being taken up by the cancer cells. This gives an idea about how fast the cancer cells are growing. Cancer cells show up as bright spots on PET scans. However, not all tumors will appear on a PET scan. Also, not all bright spots found on the PET scan are cancer. It is normal for the brain, heart, kidneys, and bladder to be bright on PET. Inflammation or infection can also show up as a bright spot. When a PET scan is combined with CT, it is called a PET/CT scan. h An FDG-PET/CT uses a radiotracer called fluorodeoxyglucose (FDG). It is made of fluoride and a simple form of sugar called glucose. You cannot eat or drink for at least 4 hours before the scan. This scan is most helpful when other imaging results are unclear. h A sodium fluoride PET/CT uses a radiotracer made of sodium fluoride. h An FES-PET/CT uses FES, which is a radioactive form of the hormone estrogen. An FES-PET/CT might be used when cancer is estrogen receptor-positive (ER+). Ultrasound An ultrasound (US) uses high-energy sound waves to form pictures of the inside of the body. This is similar to the sonogram used for pregnancy. A wand-like probe (transducer) will be held and moved on your bare breast using gel. It may also be placed below your armpit. Ultrasound is painless and does not use x-rays, so it can be repeated as needed. Ultrasound is good at showing small areas of cancer in the breast and abnormal lymph nodes. Sometimes, a breast ultrasound or MRI is used to guide a biopsy.
Testing takes time. It might take days or weeks before all test results come in.
16 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Biopsy Biopsy A biopsy is the removal of a sample of tissue from your body for testing. A pathologist will examine the biopsy for cancer and write a report called a pathology report. Ask questions about your biopsy results and what it means for your treatment.
There are different types of biopsies. Some biopsies are guided using imaging, such as ultrasound or MRI. The primary or main tumor is biopsied first. Other tumors or tumors in different areas may also be biopsied. You may have tissue removed from the breast, lymph nodes, or both.
Types of possible biopsies include: h Fine-needle aspiration (FNA) or core biopsy (CB) uses needles of different sizes to remove a sample of tissue or fluid. In a vacuum-assisted core biopsy (VACB), suction from a special vacuum device is used to remove the sample through a needle. h Incisional biopsy removes a small amount of tissue through a cut in the skin or body. h Excisional biopsy removes the entire abnormal area. This is not the preferred type of biopsy, but may be necessary if other methods are not possible or when the biopsy results don’t match the expected findings. An excisional biopsy is usually done under anesthesia by a surgeon in an operating room.
Before biopsies are performed, usually the area is injected with numbing medicine. A core needle biopsy (CNB) removes more than one tissue sample, but usually through the same area on the breast. The samples are small. The needle is often guided into the tumor with imaging. When mammography is used during a biopsy, it is called a stereotactic needle biopsy.
One or more clips may be placed near the breast tumor during a biopsy. The clips are small, painless, and made of metal. They will mark the site for possible future treatment and imaging. The clips will stay in place until surgery. If the area biopsied is benign, the clip will remain in place to mark the biopsy site on future imaging. The clips cause no problems, even if they are left in place for a long time. You will be able to go through airport security and have an MRI.
Axillary lymph node needle biopsy An axillary lymph node (ALN) drains lymph fluid from the breast and nearby areas. In an axillary lymph node biopsy, a sample of lymph node near the armpit (axilla) is biopsied with a needle. This is to determine if abnormal lymph nodes seen on imaging tests contain cancer cells. An ultrasound-guided fine-needle aspiration (US-FNA) or core biopsy will be used. If cancer is found, it is called node positive (node+). A marker may be placed in the node so that it can be identified later if needed.
Biopsy results Histology is the study of the anatomy (structure) of cells, tissues, and organs under a microscope. The tissue may be benign (not cancer), atypical (not typical), or cancerous. If the tissue is benign, likely this area can be observed. If the tissue is atypical, you may be recommended to have a surgical (open) biopsy of the area for further evaluation. If 17 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » HER2 status tissue shows cancer, your health care provider will discuss next steps. Your pathology report will contain information about histology and the grade (how abnormal the tumor looks) of the cancer.
HER2 status Human epidermal growth factor receptor 2 (HER2) is a protein involved in normal cell growth. It is found on the surface of all cells. When amounts are high, it causes cells to grow and divide. Some breast cancers have too many HER2 genes or receptors. Too many HER2s is called HER2-positive (HER2+). You might hear it called HER2 overexpression or amplification.
There are 2 tests for HER2: h Immunohistochemistry (IHC) measures receptors. If the IHC score is 3+, the cancer is HER2+. If the score is 0 or 1, it is considered HER2-negative (HER2-). If the score is 2+, further testing is needed. h In situ hybridization (ISH) counts the number of copies of the HER2 gene. This test is done mainly when the IHC score is unclear.
HER2 testing should be done on all new invasive tumors. A tumor biopsy sample will be used. You might have more than one HER2 test. Treatment options by cell receptor type There are many treatments for breast cancer. Which ones are right for you are based on many factors. Two important factors are the hormone receptor (HR) and HER2 status of any tumors.
• Hormone receptors include estrogen and progesterone. A tumor is considered hormone receptor-positive (HR+) if an increased number of estrogen receptors, progesterone receptors, or both are found.
• HER2 is a protein involved in normal cell growth. There might be higher amounts of HER2 in your breast cancer. If this is the case, it is called HER2-positive (HER2+) breast cancer.
Endocrine therapy stops cancer growth caused by hormones. It is a standard treatment for hormone receptor-positive (HR+) cancers. HR+ cancer can be estrogen receptor-positive (ER+), progesterone receptor-positive (PR+), or both (ER+/PR+).
HER2-targeted therapy is a standard treatment for HER2+ cancers.
Other systemic therapies are used with those listed above to treat invasive breast cancer. 18 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Hormone receptor status Immunohistochemistry Immunohistochemistry (IHC) is a special staining process that involves adding a chemical marker to cancer or immune cells. The cells are then studied using a microscope. IHC can find estrogen, progesterone, and HER2 receptors in breast cancer cells. A pathologist will measure how many cells have estrogen and/or progesterone receptors and the number of receptors inside each cell. FISH or ISH Fluorescence in situ hybridization (FISH) or other ISH methods like dual ISH are testing methods that involve special dyes called probes that attach to pieces of DNA, the genetic material in a person’s cells. Hormone receptor status Your blood carries hormones throughout your body. A hormone is a substance made by a gland in your body. A receptor is a protein found inside or on the surface of a cell. When substances such as hormones attach (bind) to these receptors, it causes changes within the cell. When hormones attach to receptors inside breast cancer cells, they can cause cancer to grow. If found, these receptors may be targeted using endocrine (hormone-blocking) therapy. There are 2 types of hormone receptors: h Estrogen plays a role in ovary, uterus, and breast development h Progesterone plays a role in menstrual cycle and pregnancy Hormone receptor (HR) testing should be done on any new tumors. A biopsy sample will be used.
Hormone receptor-positive In hormone receptor-positive (HR+) or hormone-sensitive breast cancer, IHC finds estrogen receptors (ER+), progesterone receptors (PR+), or both (ER+/PR+). Most breast cancers are ER+/PR+ or ER+/PR-. h Estrogen receptor (ER) is stimulated by estrogen and provides survival and proliferation (rapid growth) signals. Cancer cells deprived of estrogen or that have their ER signal blocked with treatment may stop growing or die. h Progesterone receptor (PR) binds progesterone and provides survival and proliferation signals. It is thought that PR expression also suggests the tumor is estrogen dependent. An ER-/PR+ tumor is relatively uncommon. Estrogen receptor-positive (ER+) breast cancer cells • In ER+ breast cancer, testing finds estrogen hormone receptors in at least 1 out of every 100 cancer cells.
• In ER-low–positive invasive breast cancer, testing finds estrogen hormone receptors in 1 to 10 out of every 100 cancer cells. 19 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Biomarker testing 19 2 Testing for breast cancer » Biomarker testing » Genetic cancer risk testing HR+ breast cancer is treated with endocrine therapy, which blocks estrogen receptor signaling or decreases estrogen production.
Hormone receptor-negative Hormone receptor-negative (HR-) breast cancer cells do not have estrogen or progesterone hormone receptors. These cancers are sometimes simply called hormone negative. HR- cancers often grow faster than HR+ cancers. Both the estrogen and progesterone receptors need to be negative for breast cancer to be considered HR-.
Biomarker testing Biomarker testing or tumor mutation testing is more commonly done in metastatic breast cancer. For more information, see NCCN Guidelines for Patients: Metastatic Breast Cancer at NCCN.org/patientguidelines and on the NCCN Patient Guides for Cancer app.
Genetic cancer risk testing About 1 out of 20 breast cancers are hereditary. Depending on your family history or other features of your cancer, your health care provider might refer you for hereditary genetic testing to learn more about your cancer. A genetic counselor or trained provider will speak with you about the results. Tests results may be used to guide treatment planning. Genetic testing is done using blood or saliva (spitting into a cup or using a cheek swab). The goal is to look for gene mutations inherited from your biological (birth) parents called germline mutations. Some mutations can put you at risk for more than one type of cancer. You can pass these genes on to your children. Also, other family members might carry these mutations. Tell your care team if there is a family history of cancer. More information on genetic cancer risk testing can be found in the NCCN Guidelines for Patients: Genetic Testing for Hereditary Breast, Ovarian, Pancreatic, and Prostate Cancers at NCCN.org/patientguidelines and on the NCCN Patient Guides for Cancer app.
20 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Genetic cancer risk testing BRCA tests Everyone has BRCA genes. Normal BRCA genes help to prevent tumor growth. They help fix damaged cells and help cells grow normally. BRCA mutations put you at risk for more than one type of cancer. Mutations in BRCA1 or BRCA2 increase the risk of breast, ovarian, prostate, colorectal, pancreatic, and melanoma skin cancers. Mutated BRCA genes can also affect how some treatments work. These tests might be repeated if you tested negative for a gene mutation over 10 years ago, as genetic testing technology has improved.
Other genes Other genes such as PALB2, p53, CHEK2, and ATM might be tested. For example, PALB2 normally helps prevent cancer. When PALB2 mutates, it no longer works correctly. Those with a PALB2 mutation have a higher risk of developing breast cancer.
What is your family health history?
Some cancers and other diseases run in families—those who are related to you through genes passed down from biological (birth) parent to child. This information is called a family health history. Ask blood relatives about their health issues like heart disease, cancer, and diabetes, and at what age they were diagnosed. For relatives who were diagnosed with cancer, ask them (or other relatives if they are no longer living) what type of cancer they had, if they died from the cancer, and at what age the cancer was diagnosed.
Start by asking your parents, siblings, and children. Next, talk to half-siblings, aunts and uncles, nieces and nephews, grandparents, and grandchildren.
Write down what you learn about your family history and share with your health care provider.
Some of the questions to ask include: • How old were you when each of these diseases and health conditions was diagnosed?
• What is our family’s ancestry—from what countries did our ancestors originate?
21 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 2 Testing for breast cancer » Key points 21 2 Testing for breast cancer » Key points » Questions to ask Key points h Tests are used to find cancer, plan treatment, and check how your cancer is responding to treatment. h You will have a physical exam, including a breast exam, to see if anything feels or looks abnormal. h Treatment can affect your fertility or the ability to have children. You might be referred to a fertility specialist to discuss fertility preservation. h A diagnostic mammogram includes detailed pictures of both breasts. It is different than a screening mammogram. h During a biopsy, tissue or fluid samples are removed for testing. Samples are needed to confirm the presence of cancer and to perform cancer cell tests. h A sample from a biopsy of your tumor will be tested for estrogen receptor (ER) status, progesterone receptor (PR) status, HER2 status, and histology. This provides information about the behavior of your cancer, as well as treatments to which your cancer may respond. Other biomarker tests may be performed. h About 1 out of 20 breast cancers are hereditary. Depending on your family history or other features of your cancer, your health care provider might refer you for hereditary genetic testing or to speak with a genetic counselor. Questions to ask h What type(s) of imaging scans will I have? h What type(s) of biopsy will I have? h What tests will be done on the tumor? h When will the test results be ready and who will discuss the results with me? h What is the tumor HER2 and hormone receptor (HR) status?
22 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 3 Breast cancer staging 23 How is breast cancer staged?
24 TNM scores 26 Numbered stages 27 Key points 27 Questions to ask 23 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 3 Breast cancer staging » How is breast cancer staged?
Cancer staging is used to reflect prognosis and to guide treatment decisions. It describes the size and location of the tumor and if cancer has spread to lymph nodes, organs, or other parts of the body. It also takes into account hormone receptor (HR) and HER2 status and standard-of-care treatment results.
How is breast cancer staged?
A cancer stage is a way to describe the extent of the cancer at the time you are first diagnosed. Based on testing, your cancer will be assigned a stage. Staging helps to predict prognosis and is needed to make treatment decisions. A prognosis is the course your cancer will likely take. Information gathered during staging: h The extent (size) of the tumor (T): How large is the cancer? Has it grown into nearby areas? h The spread to nearby lymph nodes (N): Has the cancer spread to nearby lymph nodes? If so, how many? Where? h The spread (metastasis) to distant sites (M): Has the cancer spread to distant organs such as the lungs or liver? h Estrogen receptor (ER) and progesterone receptor (PR) tumor status: Does the cancer have the protein called an estrogen or progesterone receptor? h Human epidermal growth factor receptor 2 (HER2) tumor status: Does the cancer make too much of a protein called HER2? h Grade of the cancer (G): How much do the cancer cells look like normal cells? h Biomarker testing: Does the cancer have any genes, proteins, markers, or mutations that might suggest treatment?
Staging is based on a combination of information to reach a final numbered stage. It takes into account what can be felt during a physical exam, what can be seen on imaging tests, and what is found during a biopsy or surgery. Often, not all information is available at the initial evaluation. More information can be gathered as treatment begins. Staging includes: h Anatomic – based on extent of cancer as defined by tumor size (T), lymph node status (N), and distant metastasis (M). h Prognostic – includes anatomic TNM plus tumor grade and the status of the biomarkers such as human epidermal growth factor receptor 2 (HER2), estrogen receptor (ER), and progesterone receptor (PR). Prognostic stage also includes the assumption that you are treated with the standard of care approaches.
Breast cancer staging is often done twice, before and after surgery. Staging after surgery 24 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 3 Breast cancer staging » TNM scores provides more specific and accurate details about the size of the cancer and lymph node status.
Clinical stage Clinical stage (c) is the rating given before any treatment. An example might look like cT1 or cN2. In breast cancer, the clinical stage is based on imaging and biopsy results. These tests are done before any treatment as part of an initial diagnosis.
Pathologic stage Pathologic stage (p) or surgical stage is determined by examining tissue removed during surgery. The pathologic stage and clinical stage may be different, if imaging was not completely accurate. If you are given drug therapy before surgery, then the stage might look like ypT2.
TNM scores The tumor, node, metastasis (TNM) system is used to stage breast cancer. In this system, the letters T, N, and M describe different areas of cancer growth. Based on cancer test results, your doctor will assign a score or number to each letter. The higher the number, the larger the tumor or the more the cancer has spread. These scores will be combined to assign the cancer a stage. A TNM example might look like this: T2N1M0 or T2, N1, M0. h T (tumor) – Depth and spread of the main (primary) tumor(s) in one or both breasts h N (node) – If cancer has spread to nearby (regional) lymph nodes h M (metastasis) – If cancer has spread to distant parts of the body or metastasized Clinical staging Clinical staging of lymph nodes is staging before surgery.
25 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 3 Breast cancer staging » TNM scores T = Tumor The primary tumor size can be measured in centimeters (cm) or millimeters (mm). One inch is equal to 2.54 cm. A large pea is 1 cm (10 mm). A golf ball is 4 cm (40 mm). A tumor micrometastasis is a very small collection of cancerous cells smaller than 1 mm. It might be written as T1mi. Ipsilateral means on the same side of the body. h T1 – Tumor is 2 cm (20 mm) or less h T2 – Tumor is 2.1 cm to 5 cm h T3 – Tumor is more than 5 cm h T4 – Tumor is of any size and has invaded nearby structures such as the chest wall and skin of the breast h T4d – Tumor is inflammatory carcinoma (inflammatory breast cancer) For more information on inflammatory breast cancer, see NCCN Guidelines for Patients: Inflammatory Breast Cancer at NCCN.org/ patientguidelines and on the NCCN Patient Guides for Cancer app N = Regional lymph node Lymph, a clear fluid containing cells that help fight infections and other diseases, drains through channels into lymphatic vessels. From here, lymph drains into lymph nodes. Lymph nodes work as filters to help fight infection.
Regional lymph nodes are those located near the breast in the armpit (axilla). If breast cancer spreads, it often goes first to nearby lymph nodes under the arm. It can also sometimes spread to lymph nodes near the collarbone or near the breastbone. However, it is possible for cancerous cells to travel through lymph and blood to other parts of the body without having gone to the lymph nodes first. Knowing if the cancer has spread to your lymph nodes helps doctors find the best way to treat your cancer. h N0 means no cancer is in the regional lymph nodes. Isolated tumor cells (ITCs) may be present. These are malignant cell clusters no larger than 0.2 mm. h N1mi means micrometastases (approximately 200 cells, larger than 0.2 mm, but not larger than 2.0 mm) are found in lymph nodes. h N1, N2, N3 means regional lymph node metastases are found. The higher the number, the more lymph nodes that have metastases.
26 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 3 Breast cancer staging » Numbered stages M = Metastasis Cancer that has spread to distant parts of the body is shown as M1. This is metastatic breast cancer (MBC). The most common sites for metastasis are bone and lung. h M0 means no evidence of distant metastasis. h M1 means distant metastasis is found. This is metastatic breast cancer.
Grade Grade describes how abnormal the tumor cells look under a microscope (called histology). Higher-grade cancers tend to grow and spread faster than lower-grade cancers. GX means the grade can’t be determined, followed by G1, G2, and G3. G3 is the highest grade for breast cancers. A low-grade tumor has a low risk of recurrence. A high-grade tumor has a higher risk of recurrence (of cancer returning). h GX – Grade cannot be determined h G1 – Low h G2 – Intermediate h G3 – High Numbered stages Numbered stages are based on TNM scores and receptor (hormone and HER2) status. Stages range from stage 0 to stage 4, with 4 being the most advanced. They might be written as stage 0, stage I, stage II, stage III, and stage IV. h Stage 0 is noninvasive – Noninvasive breast cancer is rated stage 0. Ductal carcinoma in situ (DCIS) is found only in the ducts (Tis). It has not spread to the surrounding breast tissue, lymph nodes (N0), or distant sites (M0). h Stages 1, 2, and 3 are invasive – Invasive breast cancer is rated stage 1, 2, or 3. It has grown outside the ducts, lobules, or breast skin. Cancer might be in the axillary lymph nodes. h Stage 4 is metastatic – In stage 4 breast cancer, cancer has spread to distant sites. It can develop from earlier stages. Sometimes, the first diagnosis is stage 4 metastatic breast cancer (called de novo).
27 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 3 Breast cancer staging » Key points 27 3 Breast cancer staging » Key points » Questions to ask Key points h Staging helps to predict prognosis and is needed to make treatment decisions. A prognosis is the course your cancer will likely take. h The tumor, node, metastasis (TNM) system is used to stage breast cancer. h Breast cancer is often staged twice, before and after surgery. h Clinical stage (c) is the rating given before any treatment. It is written as cTNM. h Pathologic stage (p) or surgical stage is determined by examining tissue removed during surgery. It is written as pTNM. h Grade describes how abnormal the tumor cells look under a microscope (called histology). h Regional lymph nodes are found near the breast.
Questions to ask h What is the cancer stage and tumor grade? h What does the cancer stage and grade mean in terms of treatment options and prognosis? h Is there more than one known cancer site? h Is cancer in the lymph nodes? If so, which lymph nodes? h What is the tumor HER2 and hormone status?
Anyone can develop breast cancer, including those assigned male at birth. Although there are some differences between breast cancers in those assigned male and those assigned female at birth, treatment is very similar for all genders.
28 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment 29 Care team 29 Treatment overview 30 Surgery 32 Lymph node surgery 34 Radiation therapy 34 Systemic therapy 36 Chemotherapy 36 Antibody drug conjugates 36 HER2-targeted therapy 37 Other targeted therapies 38 Immunotherapy 38 Endocrine therapy 40 Bone-strengthening therapy 42 Clinical trials 43 Key points 43 Questions to ask 29 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Care team 29 4 Types of treatment » Care team » Treatment overview There is more than one treatment for breast cancer. Treatment is usually a combination of surgery and other therapies. This chapter provides a general overview of the types of treatment and what to expect. Together, you and your care team will choose a treatment plan that is best for you.
Care team Treating breast cancer takes a team approach. Treatment decisions should involve a multidisciplinary team (MDT). An MDT is a team of health care and psychosocial care professionals from different professional backgrounds who have knowledge (expertise) and experience in your type of cancer. This team is united in the planning and implementing of your treatment. Ask who will coordinate your care.
Some members of your care team will be with you throughout cancer treatment, while others will only be there for parts of it. Get to know your care team and help them get to know you.
Treatment overview Invasive breast cancer is treatable. Treatment can be local, systemic, or usually a combination of both.
Local therapy focuses on the breast, chest wall, and lymph node area. It includes: h Surgery h Radiation therapy (RT) Systemic therapy works throughout the body. It includes: h Chemotherapy h HER2-targeted therapy h Inhibitors and other targeted therapies h Immunotherapy h Endocrine therapy Treatment options are often described in the following ways: h Preferred therapies have the most evidence they work better and may be safer than other therapies. h Other recommended therapies may not work quite as well as preferred therapies, but they can still help treat cancer. h Therapies used in certain cases work best for people with specific cancer features or health circumstances.
Many factors play a role in how cancer responds to treatment. It is important to have regular talks with your care team about your goals for treatment and your treatment plan.
30 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Surgery Surgery Surgery is an operation or procedure to remove cancer from the body. It is the main or primary treatment for invasive breast cancer. This is only one part of a treatment plan. When preparing for surgery, seek the opinion of an experienced surgeon who is an expert in performing your type of surgery. Hospitals that perform many surgeries often have better results. You can ask for a referral to a hospital or cancer center that has experience in treating your type of cancer. Goal of surgery The goal of surgery or tumor resection is to remove all the cancer. To do so, the tumor is removed along with a rim of normal-looking tissue around its edge called the surgical margin. The surgical margin may look normal during surgery, but cancerous cells may be found when viewed under a microscope by a pathologist. A clear or negative margin (R0) is when no cancer cells are found in the tissue around the edge of the tumor. In a positive margin, cancer cells are found in normal-looking tissue around the tumor. After surgery, you may receive treatment such as radiation to kill any remaining cancer cells. You might have a wound drain to prevent fluid from collecting in the body after surgery. These drains are usually removed a few days after surgery.
Lumpectomy Lumpectomy is the removal of abnormal cells or a tumor. It does not remove the whole Breast-conserving surgery The dotted line shows where the tumor is removed. Lumpectomy is the removal of abnormal cells or tumor and not the whole breast. It is also called a partial mastectomy, breast-conserving therapy, or breast-conserving surgery (BCS). 31 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Surgery breast. A lumpectomy is also called a partial mastectomy, breast-conserving therapy, or breast-conserving surgery (BCS). In a lumpectomy, the surgeon aims to remove the tumor with a rim of healthy tissue around it, called a negative, or clear, surgical margin. Having a negative surgical margin will decrease the chance that cancer may return in that area of the breast. You may need more than one surgery to achieve negative margins and ensure all the cancer is removed.
The breast might not look the same after a lumpectomy. Speak to your surgeon about how a lumpectomy might affect the look and shape of your breast, and any concerns you have. You can also seek the opinion of a plastic surgeon.
Mastectomy A mastectomy removes all or part of the breast tissue. Before removing the breast, the surgeon may do a sentinel lymph node biopsy (SLNB). Sentinel lymph nodes are the first lymph nodes cancer cells are likely to have spread from the primary tumor.
Types of mastectomies include: h A total mastectomy or simple mastectomy removes the whole breast with a flat skin closure. h A modified radical mastectomy removes the breast and axillary lymph nodes. h A skin-sparing mastectomy removes the breast but not all of the skin, in order Total (simple) mastectomy The dotted line shows where the entire breast is removed. Some lymph nodes under the arm may also be removed.
32 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Lymph node surgery to have breast reconstruction that might include flaps and/or implants. h Nipple-sparing mastectomy preserves the nipple-areola complex (NAC) as well as all of the skin. Not everyone is a candidate for nipple-sparing mastectomy. This is based upon location of cancer, breast size, and breast ptosis (degree of drooping).
Breast reconstruction is an option after a mastectomy. If you opt for reconstruction, it can be done during the initial surgery to remove your breast, or after finishing cancer treatment. If it is done after cancer treatment, this is called delayed reconstruction. Breast reconstruction is often done in multiple stages, requiring multiple procedures. You will need to consult with a plastic surgeon.
Lymph node surgery Sentinel lymph node biopsy Sentinel lymph node biopsy (SLNB or SNB) may be done during a lumpectomy or mastectomy to determine if any cancer cells have traveled to the lymph nodes. The lymph nodes removed are called sentinel nodes. A sentinel lymph node (SLN) is the first lymph node(s) that cancer cells are most likely to spread to from a primary tumor. Often, there is more than one sentinel lymph node. Just because these nodes are removed, it does not mean that they test positive for cancer.
To find the sentinel lymph nodes, a tracer is injected into the breast. It may be a radioactive material, blue dye, or other tracer. The tracer travels through the lymph channels in the breast to the lymph nodes in the armpit. Lymph node surgery 33 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Lymph node surgery This helps the surgeon find which of the lymph nodes are the sentinel lymph nodes. The lymph nodes containing the tracer are removed and tested by a pathologist.
Axillary lymph node dissection Axillary lymph node dissection (ALND) is surgery to remove axillary lymph nodes. This is performed after an axillary lymph node biopsy or SLNB shows cancer in the lymph nodes (called node positive). Then, an ALND will remove any other lymph nodes that may contain cancer. Removing lymph nodes can cause lymphedema (fluid buildup) and other health issues. There are 3 levels of axillary lymph nodes: h Level I – nodes located below the lower edge of the chest muscle h Level II – nodes located underneath the chest muscle h Level III – nodes located above the chest muscle near the collarbone An ALND usually removes level I and II axillary lymph nodes. Level III nodes are not typically removed unless there is a lot of disease. For more information about the timing of biopsies, talk with your care team. Modified radical mastectomy The dotted line shows where the entire breast and some lymph nodes are removed.
34 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Radiation therapy 34 4 Types of treatment » Radiation therapy » Systemic therapy Radiation therapy Radiation therapy (RT) uses high-energy radiation from x-rays (photons), protons, and other sources to kill cancer cells and shrink tumors. Radiation therapy can be given after surgery to treat or slow cancer growth. Treatment is given in small daily doses on weekdays, with weekends off. At least weekly, you will meet with your radiation oncologist to review treatment results and to help with side effects, such as sunburn-like rash. Ask your care team which radiation option(s) are best for your situation, if RT will be combined with chemotherapy, and what side effects to expect. The following are types of radiation therapy used to treat breast cancer: h Whole breast radiation therapy (WBRT) is used to treat the entire breast. h Partial breast irradiation (PBI) is used to treat only the tumor area of the breast. Accelerated partial breast irradiation (APBI) is radiation given over a shorter period of time. h Postmastectomy radiation therapy (PMRT) is given after a mastectomy. It targets the chest wall and possible mastectomy scar. h Lymph node radiation therapy is used to treat the lymph nodes. It is also called regional nodal irradiation (RNI).
Radiation may be given to the breast and chest wall, infraclavicular region (below the collarbone), supraclavicular area (above the collarbone), or lymph nodes found inside the breast (intramammary), behind the ribcage (internal mammary), and axillary bed (armpit).
External beam radiation therapy External beam radiation therapy (EBRT) uses a machine outside of the body called a linear accelerator (linac) to aim radiation at the whole breast (called whole breast radiation therapy or WBRT) and lymph nodes (called regional nodal irradiation or RNI). Internal radiation Internal radiation (brachytherapy) involves placing one or more small tubes into the tumor area of the breast. A small radioactive seed travels into the tube(s) and delivers radiation to the tumor area of the breast from inside the body. This type of radiation is used only for PBI. Systemic therapy Systemic therapy is drug therapy that works throughout the body. Types include chemotherapy, targeted therapy, immunotherapy, and endocrine therapy. For a general list of systemic therapies, see Guide 2. Systemic therapy might be used alone or with other therapies. Goals of systemic therapy should be discussed before starting treatment. The choice of therapy takes into consideration many factors, including HER2 and hormone receptor tumor status, if the tumor can be removed with surgery (resectable), your preferences about treatment, and if you have any other serious health conditions. 35 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Systemic therapy Guide 2 Systemic therapy examples Chemotherapy examples • Capecitabine (Xeloda) • Carboplatin • Cisplatin • Cyclophosphamide (Frindovyx) • Docetaxel (Taxotere, Docivyx) • Doxorubicin (Adriamycin) • Epirubicin (Ellence) • Eribulin (Halaven) • Fluorouracil • Gemcitabine • Methotrexate • Paclitaxel • Vinorelbine Targeted therapy examples Antibody drug conjugates • Ado-trastuzumab emtansine (T-DM1, Kadcyla), fam-trastuzumab deruxtecan-nxki (T-DXd, Enhertu), and sacituzumab govitecan-hziy (Trodelvy) CDK4/6 inhibitors • Abemaciclib (Verzenio), palbociclib (Ibrance), and ribociclib (Kisqali) PARP inhibitors • Olaparib (Lynparza) and talazoparib (Talzenna) PIK3CA, AKT1, PTEN, and mTOR inhibitors • Alpelisib (Piqray), capivasertib (Truqap), and everolimus (Afinitor) HER2-targeting therapy (antibody, inhibitor, and conjugate) examples • Pertuzumab (Perjeta) • Trastuzumab (Herceptin) or trastuzumab substitutes (biosimilars) such as Kanjinti, Ogivri, Herzuma, Ontruzant, and Trazimera • Ado-trastuzumab emtansine • Fam-trastuzumab deruxtecan-nxki • Lapatinib (Tykerb) • Margetuximab-cmkb (Margenza) • Neratinib (Nerlynx) • Tucatinib (Tukysa) • Phesgo as a substitute for combination therapy of trastuzumab with pertuzumab Immunotherapy • Pembrolizumab (Keytruda) Endocrine therapy • Endocrine therapy can be found in Guide 3.
36 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Chemotherapy 36 4 Types of treatment » Chemotherapy » Antibody drug conjugates » HER2-targeted therapy Systemic therapy might be given before or after surgery. Systemic therapies are described in more detail below and in the following pages.
Chemotherapy Chemotherapy kills fast-dividing cells throughout the body, including cancer cells and some normal cells. More than one chemotherapy may be used to treat invasive breast cancer. When only one drug is used, it’s called a single agent. A combination or multi-agent regimen is the use of two or more chemotherapy drugs. Some chemotherapy drugs are liquids that are infused into a vein (IV) or injected under the skin with a needle. Other chemotherapy drugs may be given as a pill that is swallowed. Some examples of chemotherapy drugs include the following: h Anthracyclines include doxorubicin (Adriamycin), doxorubicin liposomal injection (Doxil), and epirubicin (Ellence) h Taxanes include docetaxel, paclitaxel, and albumin-bound paclitaxel. h Antimetabolites include capecitabine (Xeloda), fluorouracil, gemcitabine, and methotrexate.
Most chemotherapy is given in cycles of treatment days followed by days of rest. This allows the body to recover before the next cycle. Cycles vary in length depending on which drugs are used. The number of treatment days per cycle and the total number of cycles given also vary.
Antibody drug conjugates An antibody drug conjugate (ADC) delivers cell-specific chemotherapy. It attaches to a protein found on the outside of the cancer cell, then enters the cell. Once inside the cell, chemotherapy is released. ADCs are given in cycles. Examples include ado-trastuzumab emtansine (Kadcyla), fam-trastuzumab deruxtecan-nxki (Enhertu, T-DXd), and sacituzumab govitecan-hziy (Trodelvy). HER2-targeted therapy HER2 is a protein involved in normal cell growth. There might be higher amounts of HER2 in your breast cancer. If this is the case, it is called HER2-positive (HER2+) breast cancer. HER2-targeted therapy is drug therapy that treats HER2+ breast cancer. Some HER2-targeted therapy is given with chemotherapy. However, it might be used alone or in combination with endocrine therapy. HER2-targeted therapies include: h HER2 antibodies prevent HER2 growth signals from outside the cell. They also increase the attack of immune cells on cancer cells. h HER2 inhibitors stop HER2 growth signals from within the cell. h HER2 conjugates or HER2 antibody drug conjugates (ADCs) deliver cell-specific chemotherapy. They attach directly to HER2s then enter the cell. Once inside, chemotherapy is released.
HER2 therapies may affect your heart’s pumping function. Your heart will be monitored 37 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Other targeted therapies before and during treatment with HER2-targeted therapy. Tests will measure the left ventricular ejection fraction (LVEF), the amount of blood pumping from the left side of the heart.
Other targeted therapies This section is for inhibitors that are different from inhibitors used in HER2-targeted therapy. CDK4/6 inhibitors Cyclin-dependent kinase (CDK) is a cell protein that helps cells grow and divide. For hormone receptor-positive (HR+), HER2-negative (HER2-) cancer, taking a CDK4/6 inhibitor with endocrine therapy may help control cancer longer and improve survival. With all CDK4/6 regimens, those who are premenopausal must also receive ovarian ablation or suppression. CDK4/6 inhibitors include abemaciclib (Verzenio), palbociclib (Ibrance), and ribociclib (Kisqali).
PARP inhibitors Cancer cells often become damaged. PARP is a cell protein that repairs cancer cells and allows them to survive. Blocking PARP can cause cancer cells to die. Olaparib (Lynparza) and talazoparib (Talzenna) are examples of a PARP inhibitor (PARPi).
PIK3CA, PTEN, and AKT1 inhibitors The PIK3CA gene is one of the most frequently mutated genes in breast cancers. PTEN and AKT are also part of this important pathway in cancer cells and can be altered less commonly Warnings about supplements and drug interactions You might be asked to stop taking or avoid certain herbal supplements when on a systemic therapy. Some supplements can affect the ability of a drug to do its job. This is called a drug interaction.
It is critical to speak with your care team about any supplements you may be taking. Some examples include: h Turmeric h Ginkgo biloba h Green tea extract h St. John’s Wort h Antioxidants Certain medicines can also affect the ability of a drug to do its job. Antacids, heart or blood pressure medicine, and antidepressants are just some of the medicines that might interact with a systemic therapy or supportive care medicines given during systemic therapy. Therefore, it is very important to tell your care team about any medicines, vitamins, over-the-counter (OTC) drugs, herbals, or supplements you are taking.
Bring a list with you to every visit.
38 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Immunotherapy 38 4 Types of treatment » Immunotherapy » Endocrine therapy in breast cancers. A mutation or alteration in these genes can lead to increased growth of cancer cells and resistance to various treatments. Alpelisib (Piqray) and inavolisib (Itovebi) are examples of a PIK3CA inhibitors and capivasertib (Truqap) is an AKT1 inhibitor.
mTOR inhibitors mTOR is a cell protein that helps cells grow and divide. Endocrine therapy may stop working if mTOR becomes overactive. mTOR inhibitors are used to get endocrine therapy working again.
Everolimus (Afinitor) is an mTOR inhibitor. Most often, it is taken with exemestane. For some, it may be taken with fulvestrant or tamoxifen.
Immunotherapy Immunotherapy is a type of systemic treatment that tries to reactivate the immune system against tumor cells. The immune system has many on and off switches. Tumors take advantage of off switches. Immunotherapy can block off switches, which helps the immune system turn on. Immunotherapy can be given alone or with other types of treatment. Pembrolizumab (Keytruda) is an example of immunotherapy.
Endocrine therapy Endocrine therapy blocks estrogen or progesterone to treat hormone receptor-positive (HR+) breast cancer. The endocrine system is made up of organs and tissues that produce hormones. Hormones are natural chemicals released into the bloodstream. There are 4 hormones that might be targeted in endocrine therapy: h Estrogen is made mainly by the ovaries, but is also made by other tissues in the body such as fat tissue. h Progesterone is made mainly by the ovaries. h Luteinizing hormone-releasing hormone (LHRH) is made by a part of the brain called the hypothalamus. It tells the ovaries to make estrogen and progesterone and testicles to make testosterone. LHRH is also called gonadotropin-releasing hormone (GnRH). h Androgen is made by the adrenal glands, testicles, and ovaries.
Hormones may cause breast cancer to grow. Endocrine therapy will stop your body from making hormones or it will block what hormones do in the body. This can slow tumor growth or shrink the tumor for a period of time. Endocrine therapy is sometimes called hormone therapy or anti-estrogen. It is not the same as hormone replacement therapy (HRT) used for menopause. Those who want to have children in the future should discuss fertility plans with their doctor 39 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Endocrine therapy and may need to be referred to a fertility specialist before starting endocrine therapy.
Types of endocrine therapy can be found in Guide 3.
Testosterone For those assigned male at birth whose bodies continue to make testosterone, endocrine therapy includes tamoxifen or an aromatase inhibitor (AI) with a testosterone-suppressing therapy.
Guide 3 Endocrine therapy types Bilateral oophorectomy Surgery to remove both ovaries.
Ovarian ablation Radiation to permanently stop the ovaries from making hormones.
Ovarian or testosterone suppression Drugs to temporarily stop the ovaries or testicles from making hormones such as LHRH and GnRH. • LHRH agonists include goserelin (Zoladex) and leuprolide (Lupron Depot). These are injected every 4 or 12 weeks. They do not affect estrogen made by the ovaries.
• GnRH agonists might be used to suppress ovarian hormone or testosterone production.
Aromatase inhibitors (AIs) Drugs to stop a type of hormone called androgen from changing into estrogen by interfering with an enzyme called aromatase. They do not affect estrogen made by the ovaries. Nonsteroidal AIs include anastrozole (Arimidex) and letrozole (Femara). Exemestane (Aromasin) is a steroidal AI.
Estrogen receptor (ER) modulators or anti-estrogens • Selective estrogen receptor modulators (SERMs) block estrogen from attaching to hormone receptors. Tamoxifen and toremifene (Fareston) are SERMs. • Selective estrogen receptor degraders (SERDs) block and destroy estrogen receptors. Fulvestrant (Faslodex) and elacestrant (Orserdu) are SERDs.
Hormones Hormone examples include ethinyl estradiol, fluoxymesterone, and megestrol acetate (Megace).
40 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Bone-strengthening therapy Premenopause If you have menstrual periods, you are in premenopause. In premenopause, the ovaries are the main source of estrogen and progesterone. GnRH agonists may be used to temporarily induce menopause for those in premenopause. A combination of GnRH agonists and tamoxifen or aromatase inhibitors (AIs) may be considered as endocrine therapy for those in premenopause. Ovarian suppression or ablation is frequently considered for higher risk ER+ breast cancers.
Menopause In menopause, the ovaries permanently stop producing hormones and menstrual periods stop. Estrogen and progesterone levels are low, but the adrenal glands, liver, and body fat continue to make small amounts of estrogen. If you don’t have periods, a test using a blood sample may be used to confirm your status. Cancer treatment can cause temporary menopause. If you stopped having periods due to removal of your uterus (hysterectomy) but you still have your ovaries, then you should have your menopausal status confirmed with a blood test. If both ovaries have been removed (with or without your uterus), you are in menopause.
Bone-strengthening therapy Medicines that target the bones may be given to help relieve bone pain or reduce the risk of bone-related problems. Some medicines work by slowing or stopping bone breakdown, while others help increase bone thickness.
When breast cancer spreads to distant sites, it may metastasize in your bones. This puts your bones at risk for injury and disease. Such problems include fractures, bone pain, high calcium levels in the blood, and squeezing (compression) of the spinal cord. Some treatments for breast cancer, like aromatase inhibitors or GnRH agonists, can cause bone loss (osteoporosis), which puts you at an increased risk for fractures.
Drugs used to prevent bone loss and fractures: h Oral bisphosphonates h Zoledronic acid (Zometa) h Pamidronate (Aredia) h Denosumab (Prolia) You may be screened for bone weakness (osteoporosis) using a bone mineral density test. This measures how much calcium and other minerals are in your bones. It is also called a dual-energy x-ray absorptiometry (DEXA) scan and is painless. Bone mineral density tests look for osteoporosis and help predict your risk for bone fractures.
41 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Bone-strengthening therapy Zoledronic acid, pamidronate, and denosumab Zoledronic acid, pamidronate, and denosumab are used to prevent bone loss (osteoporosis) and fractures caused by endocrine therapy. You might have blood tests to monitor kidney function, calcium levels, and magnesium levels. A calcium and vitamin D supplement will likely be recommended by your doctor.
Let your dentist know if you are taking any of these medicines. Also, ask your care team how these medicines might affect your teeth and jaw. Osteonecrosis, or bone tissue death of the jaw, is a rare but serious side effect. Tell your care team about any planned trips to the dentist and surgeries or dental procedures that might also affect the jawbone. It will be important to take care of your teeth and to see a dentist before starting treatment with any of these drugs.
Standard of care is the best-known way to treat a particular disease based on past clinical trials. There may be more than one treatment regimen that is considered standard of care. Ask your care team what treatment options are available and if a clinical trial might be right for you.
We want your feedback!
Our goal is to provide helpful and easy-to-understand information on cancer.
Take our survey to let us know what we got right and what we could do better.
NCCN.org/patients/feedback 42 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Clinical trials Clinical trials A clinical trial is a type of medical research study. After being developed and tested in a lab, potential new ways of treating cancer need to be studied in people. If found to be safe and effective in a clinical trial, a drug, device, or treatment approach may be approved by the U.S. Food and Drug Administration (FDA). Everyone with cancer should carefully consider all of the treatment options available for their cancer type, including standard treatments and clinical trials. Talk to your doctor about whether a clinical trial may make sense for you.
Phases Most cancer clinical trials focus on treatment and are done in phases. h Phase 1 trials study the safety and side effects of an investigational drug or treatment approach. h Phase 2 trials study how well the drug or approach works against a specific type of cancer. h Phase 3 trials test the drug or approach against a standard treatment. If the results are good, it may be approved by the FDA. h Phase 4 trials study the safety and benefit of an FDA-approved treatment.
Who can enroll?
It depends on the clinical trial’s rules, called eligibility criteria. The rules may be about age, cancer type and stage, treatment history, or general health. They ensure that participants are alike in specific ways and that the trial is as safe as possible for the participants.
Informed consent Clinical trials are managed by a research team. This group of experts will review the study with you in detail, including its purpose and the risks and benefits of joining. All of this information is also provided in an informed consent form. Read the form carefully and ask questions before signing it. Take time to discuss it with people you trust. Keep in mind that you can leave and seek treatment outside of the clinical trial at any time.
Will I get a placebo?
Placebos (inactive versions of real medicines) are almost never used alone in cancer clinical trials. It is common to receive either a placebo with a standard treatment, or a new drug with a standard treatment. You will be informed, verbally and in writing, if a placebo is part of a clinical trial before you enroll.
Are clinical trials free?
There is no fee to enroll in a clinical trial. The study sponsor pays for research-related costs, including the study drug. But you may need to pay for other services, like transportation or childcare, due to extra appointments. During the trial, you will continue to receive standard cancer care. This care is often covered by insurance. 43 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 4 Types of treatment » Key points 43 4 Types of treatment » Key points » Questions to ask Key points h Surgery is the main or primary treatment for invasive breast cancer. h Systemic treatment is based on estrogen receptor (ER), progesterone receptor (PR), and HER2 expression. h Radiation therapy (RT) uses high-energy radiation from x-rays (photons, electrons), protons, and other sources to kill cancer cells. h Some breast cancers grow because of estrogen. These cancers are estrogen receptor-positive (ER+) and are often treated with endocrine therapy to reduce the risk of cancer recurrence. h A clinical trial is a type of research that studies a treatment to see how safe it is and how well it works.
Questions to ask h What is your experience treating breast cancer? h How many breast cancer surgeries have you done? h What treatment will I have before and after surgery? h Is there a social worker or someone who can help me decide about treatment? h How much time do I have to decide about treatment? Are there any decisions that must be made today?
Finding a clinical trial In the United States NCCN Cancer Centers NCCN.org/cancercenters The National Cancer Institute (NCI) cancer.gov/about-cancer/treatment/clinical-trials/search Worldwide The U.S. National Library of Medicine (NLM) clinicaltrials.gov/ Need help finding a clinical trial? NCI’s Cancer Information Service (CIS) 1.800.4.CANCER (1.800.422.6237) cancer.gov/contact 44 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 5 Supportive care 45 What is supportive care?
45 Side effects 49 Late effects 49 Survivorship 50 Key points 50 Questions to ask 45 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 5 Supportive care » What is supportive care?
45 5 Supportive care » What is supportive care? » Side effects Supportive care helps manage the symptoms of invasive breast cancer and the side effects of treatment. This chapter discusses possible side effects.
What is supportive care?
Supportive care helps improve your quality of life during and after cancer treatment. The goal is to prevent or manage side effects and symptoms, like pain and cancer-related fatigue. It also addresses the mental, social, and spiritual concerns faced by those with cancer.
Supportive care is available to everyone with cancer and their families, not just those at the end of life. Palliative care is another name for supportive care. Supportive care can also help with: h Making treatment decisions h Coordinating your care h Paying for care h Planning for advanced care and end of life Side effects All cancer treatments can cause unwanted health issues called side effects. Side effects depend on many factors. These factors include the drug type and dose, length of treatment, and the person. Some side effects may just be unpleasant. Others may be harmful to one’s health. Treatment can cause several side effects. Some are very serious. Tell your care team about any new or worsening symptoms.
Blood clots Cancer or cancer treatment can cause blood clots to form. This can block blood flow and oxygen in the body. Blood clots can break loose and travel to other parts of the body causing breathing problems, stroke, or other health issues. Venous thromboembolism (VTE) refers to blood clots in the veins.
Bone health Breast cancer may spread to your bones. Some breast cancer treatments may also weaken your bones. Both can put your bones at increased risk for injury and disease. Such problems include bone fractures, bone pain, and squeezing (compression) of the spinal cord. High levels of calcium in the blood, called hypercalcemia, may also occur.
Medicine may be given to help relieve bone pain and reduce the risk of other bone problems. Some medicines work by slowing or stopping bone breakdown, while others help increase bone thickness. It is recommended that you take calcium and vitamin D with these bone health medicines. Talk to your care team first.
46 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 5 Supportive care » Side effects Diarrhea or constipation Diarrhea is frequent and watery bowel movements. Your care team will tell you how to manage diarrhea. It is important to drink lots of fluids. Constipation is also common, especially if taking certain pain medicines. Drinking fluids, staying active, and taking medicines for constipation are often recommended.
Distress Depression, anxiety, and sleeping issues are common and are a normal part of cancer diagnosis. Talk to your care team and with those whom you feel most comfortable about how you are feeling. There are services, people, and medicine that can help you. Fatigue Fatigue is extreme tiredness and inability to function due to lack of energy. Fatigue may be caused by cancer or it may be a side effect of treatment. Let your care team know how you are feeling and if fatigue is getting in the way of doing the things you enjoy. Eating a balanced diet, exercise, yoga, acupuncture, and massage therapy can help. You might be referred to a nutritionist or dietitian to help with fatigue.
Hair loss Chemotherapy may cause hair loss (alopecia) all over your body — not just on your scalp. Some chemotherapy drugs are more likely than others to cause hair loss. Dosage might also affect the amount of hair loss. Most of the time, hair loss from chemotherapy is temporary. Hair often regrows 3 to 6 months after treatment ends. Your hair may be a different shade or texture at first. Scalp cooling (or scalp hypothermia) might help lessen hair loss in those receiving certain types of chemotherapy. Infections Infections occur more frequently and are more severe in those with a weakened immune system. Drug treatment for breast cancer can weaken the body’s natural defense against infections. If not treated early, infections can be fatal.
Neutropenia, a low number of white blood cells, can lead to frequent or severe infections. When someone with neutropenia also develops a fever, it is called febrile neutropenia (FN). With FN, your risk of infection may be higher than normal. This is because a low number of white blood cells leads to a reduced ability to fight infections. FN is a side effect of some types of systemic therapy.
Loss of appetite Sometimes side effects from surgery, cancer, or its treatment might cause you to feel not hungry or sick to your stomach (nauseated). You might have a sore mouth. Healthy eating is important during treatment. It includes eating a balanced diet, eating the right amount of food, and drinking enough fluids. A registered dietitian who is an expert in nutrition and food It is important to tell your care team about all of your side effects, including new or worsening symptoms.
47 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 5 Supportive care » Side effects can help. Speak to your care team if you have trouble eating or maintaining weight.
Low blood cell counts Some cancer treatments can cause low blood cell counts. h Anemia is a condition where your body does not have enough healthy red blood cells, resulting in less oxygen being carried to your body tissues. You might tire easily or feel short of breath if you are anemic. h Neutropenia is a decrease in neutrophils, the most common type of white blood cell. This puts you at risk for infection. h Thrombocytopenia is a condition where there are not enough platelets found in the blood. This puts you at risk for bleeding.
Lymphedema Lymphedema is a condition in which lymph fluid builds up in tissues and causes swelling. It may be caused when part of the lymph system is damaged or blocked, such as during surgery to remove lymph nodes, or by radiation therapy. Cancers that block lymph vessels can also cause lymphedema. Swelling usually develops slowly over time. It may develop during treatment, or it may start years after treatment. If you have lymphedema, you may be referred to an expert in lymphedema management. The swelling may be reduced by exercise, massage, compression devices, and other means.
Nausea and vomiting Nausea and vomiting are common side effects of treatment. You will be given medicine to prevent nausea and vomiting.
“Recovery is the goal. Life will be forever altered because of your cancer experience. There will come a day that your cancer isn’t the first thing that you think of in the morning and the day you realize that happened will be powerful.” 48 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 5 Supportive care » Side effects Neurocognitive or neuropsychological effects Some treatments can damage the nervous system (neurotoxicity) causing problems with concentration and memory. Survivors are at risk for neurotoxicity and might be recommended for neuropsychological testing. Neuropsychology looks at how the health of your brain affects your thinking and behavior. Neuropsychological testing can identify your limits and doctors can create a plan to help with these limits.
Neuropathy and neurotoxicity Some treatments can damage the nervous system (neurotoxicity) causing neuropathy and problems with concentration, memory, and thinking. Neuropathy is a nerve problem that causes pain, numbness, tingling, swelling, or muscle weakness in different parts of the body. It usually begins in the hands or feet and gets worse with additional cycles of treatment. Most of the time, neuropathy improves gradually and may eventually go away after treatment. Organ issues Treatment might cause your kidneys, liver, heart, and pancreas to not work as well as they should. Pain Tell your care team about any pain or discomfort. You might meet with a palliative care specialist or with a pain specialist to manage pain.
Palliative care Palliative care is appropriate for anyone, regardless of age, cancer stage, or the need for other therapies. It focuses on physical, emotional, social, and spiritual needs that affect quality of life. Supportive care resources More information on supportive care is available at NCCN.org/patientguidelines and on the NCCN Patient Guides for Cancer app.
49 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 5 Supportive care » Late effects 49 5 Supportive care » Late effects » Survivorship Quality of life Cancer and its treatment can affect your overall well-being or quality of life (QOL). For more information on quality of life, see NCCN Guidelines for Patients: Palliative Care at NCCN.org/patientguidelines and on the NCCN Patient Guides for Cancer app.
Late effects Late effects are side effects that occur months or years after a disease is diagnosed or after treatment has ended. Late effects may be caused by cancer or cancer treatment. They may include physical, mental, and social health concerns, and second cancers. The sooner late effects are treated the better. Ask the care team about what late effects could occur. This will help you know what to look for.
Survivorship A person is a cancer survivor from the time of diagnosis until the end of life. After treatment, your health will be monitored for side effects of treatment and the return of cancer. This is part of your survivorship care plan. It is important to keep any follow-up care and imaging test appointments. Seek good routine medical care, including regular doctor visits for preventive care and cancer screening. A personalized survivorship care plan will contain a summary of possible long-term effects of treatment called late effects and a list of follow-up tests. Find out how your primary care provider will coordinate with specialists for your follow-up care. Tell your care team about any symptoms such as headaches, menstrual spotting between periods or new onset of spotting after menopause (if prior tamoxifen), shortness of breath that you notice with walking, or bone pain. Side effects can be managed. Continue to take all medicine such as endocrine therapy exactly as prescribed and do not miss or skip doses.
Let us know what you think!
Please take a moment to complete an online survey about the NCCN Guidelines for Patients.
NCCN.org/patients/response 50 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 5 Supportive care » Key points 50 5 Supportive care » Key points » Questions to ask Key points h Supportive care is health care that relieves symptoms caused by treatment and improves quality of life. Supportive care is always given. h All cancer treatments can cause unwanted health issues called side effects. Side effects depend on many factors. These factors include the drug type and dose, length of treatment, and the person. h Some side effects are very rare. Ask your care team what to expect. h Tell your care team about any new or worsening symptoms.
Questions to ask h Who will coordinate my care? h Who should I call when I have questions or notice changes in my condition? h How long should I wait if I notice changes in my condition? h What should I do on weekends and other non-office hours? h Will my care team be able to communicate with the emergency department or urgent care team?
51 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options 52 Surgery first 53 Systemic therapy before surgery 56 Systemic therapy after surgery 58 HR+ with HER2+ 58 HR- with HER2+ 58 HR+ with HER2-58 Triple-negative breast cancer 59 Endocrine therapy 60 Follow-up care 61 Key points 61 Questions to ask 52 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Surgery first Surgery is the main or primary treatment for invasive breast cancer. Some people benefit from systemic therapy before surgery. Radiation therapy (RT), systemic therapy, or both are possible after surgery. Together, you and your care team will choose a treatment plan that is best for your situation. This chapter provides specific treatment options based on hormone receptor (HR) and HER2 tumor status. It also discusses who might benefit from treatment before surgery.
Surgery first Surgery is the main or primary treatment for invasive breast cancer. It involves removing the tumor from the breast and assessing the lymph nodes. There are 2 breast surgery options: h Lumpectomy h Mastectomy Surgery might include axillary lymph node (ALN) staging with either sentinel lymph node biopsy (SLNB), axillary lymph node dissection (ALND), or both. After surgery, a pathologist will examine the removed tissue and any lymph nodes to determine the pathologic stage. This information will help plan next steps for treatment. Treatment after surgery might include systemic therapy, radiation therapy, or both. An example of a tumor stage after surgery might be pT2. Lymph node micrometastases are written as pN1mi. Ipsilateral means on the same side of the body. Lumpectomy first A lumpectomy, also called breast-conserving surgery (BCS), is surgery to remove a tumor in the breast. Treatment after a lumpectomy is based on the type of cancer (histology), the size of the tumor, if cancer is found in the axillary lymph nodes, your age, and if you are in menopause. Many factors play a role in treatment decisions. Most people have radiation therapy (RT) to the breast and sometimes lymph nodes after a lumpectomy. A boost is extra radiation to the tumor area. Systemic (drug) therapy might be given before RT. Mastectomy first A total mastectomy is a surgery that removes the whole breast. A nipple-sparing or skin-sparing mastectomy may be possible. Treatment after a mastectomy is based on if cancer was found in the axillary lymph nodes, the number of lymph nodes that tested positive, and the size of the removed tumor. Radiation therapy to the chest wall and lymph nodes, systemic therapy, or both are possible following a mastectomy.
53 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Systemic therapy before surgery Systemic therapy before surgery Some cancers benefit from treatment before surgery. These cancers include those with large tumors, aggressive tumors, cancer in the lymph nodes called nodal or node-positive (N+) disease, or the cancer that involves the breast skin or chest wall. Treatment before surgery is called preoperative or neoadjuvant therapy.
Testing Not everyone will benefit from preoperative therapy. If preoperative systemic therapy is an option for you, then you will have blood and imaging tests before starting treatment. Testing will include an axillary lymph node exam. An ultrasound and biopsy of lymph nodes suspected of cancer are possible.
You will have the following before starting preoperative systemic therapy: h Core biopsy of breast h Placement of clips or markers to help the surgeon know where to operate in case the tumor goes away with preoperative therapy. Clips are also placed at the time of surgery for radiation planning. h Axillary lymph node ultrasound or magnetic resonance imaging (MRI) (if not done before) h Biopsy of suspicious lymph nodes with clip placement (if not done before) Order of treatments Most people with cancer will receive more than one type of treatment. Below is an overview words you might hear to describe treatment.
• Preoperative or neoadjuvant (before) therapy is given to shrink the tumor before a primary treatment such as surgery. • Perioperative therapy is systemic therapy, such as chemotherapy, given before and after surgery. • Primary treatment is the main treatment given to rid the body of cancer. • Postoperative or adjuvant (after) therapy is given after primary treatment to rid the body of any cancer cells left behind from surgery. It is also used when the risk of cancer returning (recurrence) is felt to be high. • First-line therapy is the first set of systemic (drug) treatment given.
• Second-line therapy is the next set of treatment given if cancer progresses during or after systemic therapy. Talk to your care team about your treatment plan and what it means for your stage and type of cancer.
54 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Systemic therapy before surgery Treatment before surgery Treatment before surgery is systemic (drug) therapy. It is based on hormone receptor (HR) and HER2 status. Preoperative systemic therapy has benefits. The goal is to shrink the tumor or the amount of cancer before surgery. How the tumor responds to drug therapy may also affect treatments after surgery. Guide 4 HER2-targeted therapy options: HER2+ cancer Preferred • Paclitaxel and trastuzumab • Docetaxel, carboplatin, and trastuzumab (TCH) • Docetaxel, carboplatin, trastuzumab, and pertuzumab (TCHP) If no residual disease after preoperative therapy or no preoperative therapy: • Complete up to 1 year of HER2-targeted therapy with trastuzumab. Pertuzumab might be added.
If residual disease after preoperative therapy: • Ado-trastuzumab emtansine alone. If ado-trastuzumab emtansine discontinued for toxicity, then trastuzumab with or without pertuzumab to complete one year of therapy.
• If node positive at initial staging, trastuzumab with pertuzumab Other recommended • Doxorubicin with cyclophosphamide (AC) followed by docetaxel with trastuzumab • Doxorubicin with cyclophosphamide (AC) followed by docetaxel with trastuzumab and pertuzumab • Paclitaxel, carboplatin, trastuzumab, and pertuzumab Used in some cases • Docetaxel, cyclophosphamide, and trastuzumab • Doxorubicin and cyclophosphamide (AC) followed by docetaxel and trastuzumab, followed by paclitaxel with trastuzumab • Doxorubicin and cyclophosphamide (AC) followed by docetaxel, trastuzumab and pertuzumab, followed by paclitaxel, trastuzumab, and pertuzumab • Paclitaxel with trastuzumab and pertuzumab • Neratinib (adjuvant only) • Ado-trastuzumab emtansine (TDM-1) (adjuvant only) Notes Other taxanes (such as docetaxel, paclitaxel, albumin-bound paclitaxel) might be substituted in some cases. 55 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Systemic therapy before surgery For preoperative systemic therapy options, see Guide 4 and Guide 5.
Guide 5 Systemic therapy options: HER2- cancer Preferred • Doxorubicin and cyclophosphamide (AC) with paclitaxel • Docetaxel and cyclophosphamide (TC) • Adjuvant only: Olaparib, if germline BRCA1 or BRCA2 mutations Triple-negative breast cancer (TNBC): • Options listed above • Preoperative pembrolizumab with carboplatin and paclitaxel, followed by preoperative pembrolizumab and cyclophosphamide with doxorubicin or epirubicin, followed by adjuvant pembrolizumab • If residual disease after preoperative therapy with taxane-, alkylator-, and anthracycline-based chemotherapy, then capecitabine Other recommended • Doxorubicin and cyclophosphamide (AC) with docetaxel • Epirubicin and cyclophosphamide (EC) • Docetaxel, doxorubicin, and cyclophosphamide (TAC) TNBC: • Options listed above • Paclitaxel with carboplatin • Docetaxel with carboplatin Used in some cases • Doxorubicin and cyclophosphamide (AC) • Cyclophosphamide, methotrexate, and fluorouracil (CMF) • Doxorubicin and cyclophosphamide (AC) with paclitaxel TNBC: • Options listed above • Docetaxel, carboplatin, and pembrolizumab (preoperative only) • Doxorubicin and cyclophosphamide (AC) with carboplatin and docetaxel • Capecitabine (maintenance therapy after adjuvant chemotherapy) Notes Other taxanes (such as docetaxel, paclitaxel, albumin-bound paclitaxel) might be substituted in some cases.
56 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Systemic therapy after surgery Surgery Surgery options depend on how your cancer responded to preoperative therapy. A complete response means there is no evidence of cancer. In a partial response, the tumor in the breast or lymph nodes has shrunk in size. The choice between a lumpectomy or mastectomy is based on the size and location of the tumor, the size of your breast before surgery, and your preference. If you had preoperative therapy, your tumor will be restaged using tissue removed during surgery. This is called the pathologic (p) stage or surgical stage. It might look like this: ypT2N1. The y means you had preoperative therapy. Treatment after surgery might be systemic therapy or radiation or both. It will likely include endocrine therapy if your tumor is HR+. Surgery is not an option Surgery is not always possible. Even though surgery might not be an option, systemic therapy will continue. If the cancer is not responding to systemic therapy, then radiation may be considered to try to make the cancer resectable (able to be removed with surgery). The goal of treatment is to reduce the amount of cancer. Talk with your care team about your goals of treatment and your treatment preferences. Your wishes are always important. Systemic therapy after surgery Adjuvant systemic therapy is drug treatment after surgery. It is given to kill any remaining cancer cells and to help reduce the risk of cancer returning. This treatment is based on “Take things one day or even one step at a time, it might get harder before it gets better, but it will get better." 57 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Systemic therapy after surgery cancer stage, including lymph node (nodal) hormone receptor (HR), and HER2 status.
Systemic therapy options are based on the tumor type (histology), tumor HR and HER2 status, and if you are in menopause. Systemic therapies might be used alone or in combination. Ask your care team why one treatment might be preferred over another for your type of cancer. For those in menopause (natural or induced), bone-strengthening therapy might be given to reduce the risk of distant metastasis.
Favorable histologies A tumor with a favorable histology is one that has a good prognosis. A prognosis is the course your cancer will likely take. These tumor types are not high grade, are HER2-, and might respond better to treatment than other tumors. They also might have less risk of returning. Ask your care team what this might mean for your treatment. Those with hormone receptor-positive (HR+) tumors will likely have endocrine therapy. Other systemic therapies or radiation therapy are possible. Favorable histology includes the following: h Pure tubular h Pure mucinous h Pure cribriform h Adenoid cystic (conventional), secretory carcinoma, and other salivary carcinomas h Rare low-grade forms of metaplastic carcinoma h Other rare forms Common histologies Ductal and lobular carcinoma are the most common types of invasive breast cancer. Common histology includes the following: h Ductal/no special type (NST) (NST includes medullary pattern, cancers with neuroendocrine expression, and other rare patterns) h Lobular h Mixed h Micropapillary h Metaplastic (includes various subtypes) 21-gene assay A 21-gene assay (such as Oncotype Dx) is a tumor test used to predict if your cancer might benefit from adjuvant chemotherapy in addition to endocrine therapy. There are other tests that might be helpful, but a 21-gene assay is the only test proven to predict who would benefit from chemotherapy. What’s next?
The next pages describe systemic therapy treatment based on tumor HR and HER2 status for common histologies. Typically, the systemic therapy options are the same before and after surgery. Ask your care team for more information.
58 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » HR+ with HER2+ 58 6 Your treatment options » HR+ with HER2+ » Triple-negative breast cancer HR+ with HER2+ HR+ with HER2+ breast cancer is sometimes called triple-positive breast cancer. It is treated with HER2-targeted therapy and endocrine therapy. A CDK4/6 inhibitor may be added. h Chemotherapy with a HER2-targeted therapy is used to treat HER2+ cancer. Trastuzumab and pertuzumab are examples of HER2-targeted therapy. HER2-targeted therapy options can be found in Guide 4. h Endocrine therapy is used to treat HR+ breast cancer. It is given after chemotherapy. Endocrine therapy options for HR+ cancer can be found in Guide 6.
HR- with HER2+ In HER2-positive (HER2+) breast cancer, tumor cells have a larger than normal number of HER2 receptors. Since this cancer is HR- and HER2+, treatment focuses on targeting HER2. HER2-targeted therapy usually includes chemotherapy. HER2-targeted therapy options can be found in Guide 4. HR+ with HER2-HER2-targeting therapy is not used when the tumor is HER2-negative (HER2-). Sometimes, chemotherapy is used. When cancer is found in the lymph nodes, it is node positive (node+). h If chemotherapy is given, it is given before endocrine therapy. Chemotherapy and other systemic therapies specific to HER2- breast cancer can be found in Guide 5. h Those who are premenopausal might have ovarian suppression or ablation in addition to endocrine therapy. Endocrine therapy options for HR+ cancer can be found in Guide 6.
Triple-negative breast cancer In triple-negative breast cancer (TNBC), the tumor tested negative for HER2, estrogen receptors, and progesterone receptors. It is written as ER- and/or PR- with HER2-. There are many variations within TNBC. It is a group of diseases that we are learning more about all the time. This cancer is treated with chemotherapy and other systemic therapies found in Guide 5.
59 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Endocrine therapy Endocrine therapy Endocrine therapy is used to treat hormone receptor-positive (HR+) breast cancer. This is cancer that tests positive for estrogen receptors (ER+), progesterone receptors (PR+), or both (ER+/PR+). Endocrine therapy blocks estrogen and progesterone, which can slow tumor growth or shrink the tumor for a period of time. It might also help prevent the risk of cancer returning in the breasts and elsewhere in the body. Guide 6 Endocrine therapy options: HR+ cancer Premenopause at diagnosis Option 1 • Tamoxifen alone or with ovarian suppression or ablation for 5 years ª • After 5 years, if in postmenopause, then an aromatase inhibitor for 5 years or consider tamoxifen for another 5 years (for a total of 10 years on tamoxifen) • After 5 years, if still in premenopause, then consider tamoxifen for another 5 years (for a total of 10 years on tamoxifen) or stop endocrine therapy Option 2 • Aromatase inhibitor for 5 years with ovarian suppression or ablation, then consider aromatase inhibitor for an additional 3 to 5 years Menopause at diagnosis Option 1 • Aromatase inhibitor for 5 years, then consider aromatase inhibitor for 3 to 5 more years • Aromatase inhibitor for 2 to 3 years, then tamoxifen to complete 5 years total of endocrine therapy • Tamoxifen for 2 to 3 years, then an aromatase inhibitor to complete 5 years of endocrine therapy • Tamoxifen for 2 to 3 years, then up to 5 years of an aromatase inhibitor Option 2 • Tamoxifen for 4.5 to 6 years, then an aromatase inhibitor for 5 years or consider tamoxifen for another 5 years (for a total of 10 years on tamoxifen) Option 3 • For those who can’t have aromatase inhibitors or who don’t want aromatase inhibitors, take tamoxifen for 5 years or consider tamoxifen for up to 10 years 60 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Follow-up care h If chemotherapy is given, it is given before endocrine therapy. h Those with high-risk breast cancer that is HR+ and HER2- might have endocrine therapy with 2 years of adjuvant abemaciclib or 3 years of ribociclib. h Those receiving an aromatase inhibitor (AI) who are at risk for osteoporosis will likely have bone density tests and bone-strengthening therapy. Endocrine therapy options for HR+ cancer can be found in Guide 6.
Follow-up care After treatment, you will receive follow-up care. During this time, your health will be monitored for side effects of treatment (late effects) and the possible return of cancer (recurrence). It is important to keep any follow-up care and imaging test appointments. Seek routine medical care, including regular doctor visits for preventive care and cancer screening. Find out who will coordinate with specialists for your follow-up care.
Tell your care team about any symptoms such as headaches, menstrual spotting between periods or new onset of spotting after menopause (if prior tamoxifen use), shortness of breath that you notice with walking, or bone pain. Side effects can be managed. Continue to take all medicine such as endocrine therapy exactly as prescribed and do not miss or skip doses. Follow-up care can be found in Guide 7.
Guide 7 Follow-up care Medical history and physical exam 1 to 4 times a year as needed for 5 years, then every year Screen for distress, anxiety, depression, and changes in family history Genetic testing and referral to genetic counseling, as needed Monitor for lymphedema and refer for lymphedema management, as needed Mammogram every 12 months (not needed for the side that underwent a mastectomy or on reconstructed breast) Discuss any issues or questions related to fertility, birth control, or sexual health Heart tests, as needed Information on risk of future health issues (comorbidities) If signs and symptoms of metastases, then blood and imaging tests If taking endocrine therapy, continue to take endocrine therapy. Do not miss or skip doses Annual gynecology exam (depending on age) Bone density tests for those on an aromatase inhibitor or who later have ovarian issues Maintain an ideal body weight (BMI of 20 to 25), be active, eat a mostly plant-based diet, exercise, limit alcohol, and quit smoking/vaping nicotine 61 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 6 Your treatment options » Key points 61 6 Your treatment options » Key points » Questions to ask Key points h Surgery is the main or primary treatment for invasive breast cancer. Some people benefit from systemic therapy before surgery. Treatment after surgery might include systemic therapy, radiation therapy, or both. h In hormone receptor-positive (HR+) cancer, estrogen receptors (ER+), progesterone receptors (PR+), or both (ER+/PR+) are found. Endocrine therapy is given for HR+ cancers to reduce the risk of recurrence. h HER2-positive (HER2) cancers are treated with a combination of chemotherapy and HER2-targeted therapy. h If chemotherapy is given, it is given before radiation therapy and endocrine therapy. h In triple-negative breast cancer (TNBC), receptors for estrogen, progesterone, and HER2 are not found. It is almost always treated with chemotherapy. h It is important to keep follow-up visits and imaging test appointments. Seek good routine medical care, including preventive care and cancer screenings. Continue to take all medicines as prescribed.
Questions to ask h What treatments do you recommend and why? h Does the order of treatments matter? h Which option is proven to work best for my type of cancer, age, overall health, and other factors? h Are there resources to help me pay for treatment or other care I may need? h How long will I be on this systemic (drug) therapy or endocrine therapy?
62 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 7 The breast after surgery 63 Volume displacement 63 Flat closure 64 Breast reconstruction 65 What to consider 66 Key points 66 Questions to ask 63 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 7 The breast after surgery » Volume displacement 63 7 The breast after surgery » Volume displacement » Flat closure The look of your breast after surgery will depend on the type of surgery, the amount of tissue removed, and other factors such as your body type, age, and size and shape of the area before surgery. You might consider speaking with a plastic surgeon before surgery. This chapter offers more information on flat closure and breast reconstruction.
The recovery time for each procedure differs. This can affect your ability to return to work or participate in activities. You might consider speaking with a plastic surgeon before surgery to discuss your options and what to expect. A plastic surgeon performs oncoplastic (breast cancer surgery) reductions, balancing procedures, and breast reconstruction.
Volume displacement With a lumpectomy, most people have a scar with some volume loss. However, if you need a large lumpectomy and your surgeon thinks your breast will look more abnormal afterwards, your breast may be able to be re-shaped at the time of surgery. This procedure is called volume displacement or oncoplasty. Only a limited number of cancer centers perform this procedure. It is often done by the cancer surgeon or plastic surgeon right after the lumpectomy. The surgeon will shift the remaining breast tissue to fill the space left by the removed tumor.
If volume displacement is planned, a larger piece of your breast will need to be removed. Despite a larger piece being removed, the natural look of your breast will be kept. However, with large amounts of tissue removed, your breast may be smaller than before.
You may not like the results of the volume displacement. In this case, breast revision surgery may help. This surgery is done by a plastic surgeon. A second volume displacement may be an option, too. Another option is to get breast implants or mastectomy with reconstruction.
Flat closure In a total mastectomy with a flat closure, the entire breast, including nipple, extra skin, fat, and other tissue in the breast area, is removed. The remaining skin is tightened and sewn together. No breast mound is created, and no implant is added. The scar will be slightly raised and differ in color than the surrounding skin. A flat closure is not completely flat or smooth. The result varies from person to person. Ask to look at pictures from flat closures so you know what to expect. You might decide to have a flat closure procedure later or after having breast implants removed. Talk to your care team to learn more.
64 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 7 The breast after surgery » Breast reconstruction Breast reconstruction Breast reconstruction is surgery to rebuild the shape and look of the breast after a mastectomy. In many cases, breast reconstruction involves a staged approach. It might require more than one procedure.
You may have a choice as to when breast reconstruction is done. Immediate reconstruction is finished within hours after removing the breast. Delayed reconstruction can occur months or years after the cancer surgery. Reconstruction can also be done in stages, with part of the reconstruction done at the time of the original cancer surgery and finished with another surgery later. A plastic surgeon performs breast reconstruction. Breasts can be reconstructed with implants and flaps. All methods are generally safe, but as with any surgery, there are risks. Ask your treatment team for a complete list of side effects.
Implants Breast implants are small bags filled with salt water, silicone gel, or both. They are placed under the breast skin or muscle to look like a new breast following a mastectomy. A balloon-like device, called an expander, may be used first to stretch out tissue. It will be placed under your skin or muscle and enlarged every few weeks for 2 to 3 months. When your skin is stretched to the proper size, you will have surgery to place the final implant.
Implants have a small risk of leaking or causing other issues. You may feel pain from the implant or expander. Scar tissue or tissue death can occur. Flaps Breasts can be remade using tissue from other parts of your body, known as flaps. These flaps are taken from the abdomen, buttocks, thigh, or from under the shoulder blade. Some flaps are completely removed and then sewn in place. Other flaps stay attached to your body but are slid over and sewn into place.
There are several risks associated with flaps, including death of fat in the flap, which can cause lumps. A hernia may result from muscle weakness. Problems are more likely to occur among those who have diabetes or who smoke.
Implants and flaps Some breasts are reconstructed with both implants and flaps. This method may give the reconstructed breast more volume to match the other breast. For any reconstruction, you may need surgery on your remaining breast to match the size and shape of both breasts.
Nipple replacement Like your breast, a nipple can be remade. To rebuild a nipple, a plastic surgeon can use surrounding tissues. Also, nipples can be remade with tissue from the thigh or the other nipple. Tissue can be darkened with a tattoo to look more like a nipple. It is important to note that while you can remake something to look like a nipple, it will not have the sensation of your real nipple. Also, a tattoo can be done to look like a nipple without having to take tissue from another part of the body.
65 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 7 The breast after surgery » What to consider What to consider Some things to consider when deciding to have flat closure or reconstruction after mastectomy: h Your desire – You may have a strong feeling towards flat closure or one form of reconstruction after being given the options. Breast reconstruction should be a shared decision between you and your care team. Make your wishes known. h Health issues – You may have health issues such as diabetes or a blood disorder that might affect or delay healing, or make longer procedures unsafe. h Tobacco use – Smoking delays wound healing and can cause mastectomy flap death (necrosis), nipple-areola complex (NAC) necrosis in a nipple-sparing mastectomy, infection, and failure of implant-based reconstruction. In free flap reconstruction, smoking increases the risk of complications. You are encouraged to stop smoking prior to reconstruction. h Breast size and shape – There are limits to the available sizes of breast implants. Very large breasts or breasts that lack tone or droop (called ptosis) might be difficult to match. Breast reduction surgery might be an option. h Body mass index (BMI) – Those with an elevated BMI have an increased risk of infections and complications with breast reconstruction. If you smoke or vape, seek help to quit Smoking or vaping nicotine greatly increases your chances of having side effects during and after surgery. Smoking and vaping can limit how well cancer treatment works and prevent wound healing. They also increase your chances of developing other cancers. Cannabis use might also affect the amount of anesthesia used during surgery. Nicotine is the chemical in tobacco that makes you want to keep smoking and vaping. Nicotine withdrawal is challenging for most people who smoke or vape. The stress of having cancer may make it even harder to quit. If you smoke or vape, ask your care team about counseling and medicines to help you quit.
More information can be found in the NCCN Guidelines for Patients: Quitting Smoking at NCCN.org/patientguidelines and on the NCCN Patient Guides for Cancer app.
For online support, try these websites: • SmokeFree.gov • CDC.gov/tobacco 66 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 7 The breast after surgery » Key points 66 7 The breast after surgery » Key points » Questions to ask Key points h Volume displacement is a shifting of the breast tissue to fill the space left by a lumpectomy. h Flat closure is done after a mastectomy. The skin is tightened and sewn together without the addition of a breast implant. h Breast reconstruction is surgery to rebuild the shape and look of the breast. h Breasts that are fully removed in a mastectomy can be remade with breast implants, flaps, or both. h Removed nipples can be remade with body tissue and/or tattooing.
Questions to ask h What will my breast look like after surgery? h How many breast surgeries or breast reconstructive surgeries have you done? h How long will it take for me to recover from surgery and what should I expect? h How much pain will I be in and what will be done to manage my pain? h What options are available if I do not like the look of my breast after surgery?
67 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 8 Recurrence 68 Overview 68 Tests 69 Treatment 70 Key points 70 Questions to ask 68 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 8 Recurrence » Overview 68 8 Recurrence » Overview » Tests When cancer returns, it is called a recurrence. Treatment is based on the types of treatment you had before. Together, you and your care team will choose a treatment plan that is best for you.
Overview Breast cancer can return in the following areas: h It can return to the breast or chest wall of the breast that had cancer before. This is called local recurrence. h It can return to axillary lymph nodes or lymph nodes in or near the breast. This is called regional recurrence. h It can return to other distant parts of the body. This is called metastatic breast cancer. h You can also have a new breast cancer that is not a recurrence of an earlier cancer. This chapter presents treatment options for local and regional recurrence. Tests You will have tests to learn more about your cancer. Many tests you had when you were first diagnosed will be repeated. This is called restaging. Tests for recurrence can be found in Guide 8.
Guide 8 Possible tests: Recurrence Medical history and physical exam Blood tests such as CBC and comprehensive metabolic panel (including liver function tests and alkaline phosphatase) Chest CT with or without contrast CT with contrast of abdomen with or without pelvis (MRI with contrast might be done instead) Other imaging as needed Biopsy tumor or metastasis and test for biomarkers, including estrogen receptor (ER), progesterone receptor (PR), and HER2 status Genetic counseling if at risk for hereditary breast cancer Assess for distress 69 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 8 Recurrence » Treatment Treatment Treatment is based on where the cancer has returned and what type of treatment you had before. Surgery followed by radiation therapy (RT) and systemic (drug) therapy are possible. Systemic and endocrine therapy options will be based on tumor hormone receptor (HR) status, HER2 status, and treatments given during your initial cancer treatment. Supportive care is always given. Supportive care aims to relieve side effects such as pain and to improve quality of life.
Local recurrence Treatment for cancer that has returned to the same breast as before is based on if your first treatment was breast-conserving surgery (lumpectomy) or a mastectomy. More surgery might be an option. If you had radiation therapy before, then it may or may not be possible to have radiation again in the same area, which may limit your surgical options.
Regional recurrence If the recurrence is in or near the armpit (axilla), then surgery to remove the tumor might be an option before radiation therapy. Systemic therapy might be given before surgery to help reduce the amount of cancer or the size of the tumor. Treatment after surgery might include radiation therapy to the lymph nodes. If you had radiation therapy before, then it may not be possible to have it again to the same area.
Both local and regional Cancer that is both local and regional might be referred to as a locoregional recurrence. Treatment for a locoregional recurrence is surgery and radiation therapy followed by systemic therapy.
Unresectable An unresectable tumor cannot be removed with surgery. It is treated with systemic therapy. For treatment of unresectable recurrent disease, see NCCN Guidelines for Patients: Metastatic Breast Cancer, available at NCCN.
org/patientguidelines and on the NCCN Patient Guides for Cancer app.
70 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 8 Recurrence » Key points 70 8 Recurrence » Key points » Questions to ask Key points h When cancer returns, it is called a recurrence. h Cancer that returns to the breast that had cancer before is called a local recurrence. h Cancer that returns to axillary lymph nodes or lymph nodes in or near the breast is called a regional recurrence. h Cancer that returns to distant parts of the body is called metastatic breast cancer. h Treatment is based on where the cancer has returned and what type of treatment you had before. h Surgery followed by systemic therapy and radiation therapy is possible for a locoregional recurrence. Systemic and endocrine therapy options are based on hormone receptor (HR) and HER2 status, and any mutations found. h An unresectable tumor cannot be removed with surgery. Unresectable recurrent disease is treated as metastatic disease with systemic therapy.
Questions to ask h Where is the cancer located and what does this mean for my treatment options? h Which course of treatment do you recommend and why? h Is surgery an option? What treatment might I have before and after surgery? h What role do previous treatments, my age, menopause status, and overall health play in treatment options? h Am I a candidate for a clinical trial?
71 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 9 Other resources 72 What else to know 72 What else to do 72 Where to get help 73 Questions to ask about resources and support 72 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 9 Other resources » What else to know 72 9 Other resources » What else to know » Where to get help Want to learn more? Here's how you can get additional help.
What else to know This book can help improve your cancer care. It plainly explains expert recommendations and suggests questions to ask your care team. But, it’s not the only resource that you have.
You’re welcome to receive as much information and help as you need. Many people are interested in learning more about: h The details of treatment h Being a part of a care team h Getting financial help h Finding an oncologist who is an expert in breast cancer h Coping with side effects What else to do Your health care center can help you with next steps. They often have on-site resources to help meet your needs and find answers to your questions. Health care centers can also inform you of resources in your community.
In addition to help from your providers, the resources listed in the next section provide support for many people like yourself. Look through the list and visit the provided websites to learn more about these organizations Where to get help Bone Marrow & Cancer Foundation bonemarrow.org Breast Cancer Alliance Breastcanceralliance.org Breastcancer.org Breastcancer.org CanCare Cancare.org CancerCare Cancercare.org Cancer Hope Network cancerhopenetwork.org Cancer Survivor Care Cancersurvivorcare.org DiepC Foundation diepcfoundation.org FORCE: Facing Our Risk of Cancer Empowered facingourrisk.org GPAC Global Patient Advocacy Coalition GPACunited.org HIS Breast Cancer Awareness Hisbreastcancer.org 73 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 9 Other resources » Questions to ask about resources and support Imerman Angels Imermanangels.org Inflammatory Breast Cancer Research Foundation ibcresearch.org Lobular Breast Cancer Alliance lobularbreastcancer.org My Faulty Gene Myfaultygene.org MedlinePlus medlineplus.gov National Cancer Institute (NCI) cancer.gov/types/breast National Coalition for Cancer Survivorship canceradvocacy.org Sharsheret sharsheret.org Triage Cancer Triagecancer.org Unite for HER uniteforher.org Young Survival Coalition (YSC) Youngsurvival.org Questions to ask about resources and support h Who can I talk to about help with housing, food, and other basic needs? h What help is available for transportation, childcare, and home care? h What other services are available to me and my caregivers? h How can I connect with others and build a support system? h Who can I talk to if I don’t feel safe at home, at work, or in my neighborhood?
74 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Ü 75 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Words to know Words to know adjuvant therapy Treatment that is given to lower the chances of the cancer returning.
antibody drug conjugate (ADC) A substance made up of a protein linked to a drug that attaches and enters certain types of cancer cells.
anti-estrogen A drug that stops estrogen from attaching to cells. areola A darker, round area of skin on the breast around the nipple.
aromatase inhibitor (AI) A drug that lowers the level of estrogen in the body. axillary lymph node (ALN) A small disease-fighting structure that is near the armpit (axilla).
axillary lymph node dissection (ALND) An operation that removes the disease-fighting structures (lymph nodes) near the armpit.
bilateral diagnostic mammogram Pictures of the insides of both breasts that are made from a set of x-rays.
bilateral oophorectomy An operation that removes both ovaries.
biopsy A procedure that removes fluid or tissue samples to be tested for a disease.
bone mineral density A test that measures the strength of bones.
bone scan A test that makes pictures of bones to assess for health problems.
breast implant A small bag filled with salt water, gel, or both that is used to remake breasts.
breast reconstruction An operation that creates new breasts.
cancer stage A rating of the outlook of a cancer based on its growth and spread.
carcinoma A cancer of cells that line the inner or outer surfaces of the body.
chest wall The layer of muscle, bone, and fat that protects the vital organs.
clinical breast exam (CBE) Touching of a breast by a health expert to feel for diseases. clinical stage (c) The rating of the extent of cancer before treatment is started.
clinical trial A type of research that assesses health tests or treatments.
contrast A substance put into your body to make clearer pictures during imaging tests.
core needle biopsy (CNB) A procedure that removes tissue samples with a hollow needle. Also called core biopsy (CB).
76 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Words to know diagnostic bilateral mammogram Pictures of the insides of both breasts that are made from a set of x-rays.
duct A tube-shaped structure through which milk travels to the nipple.
ductal carcinoma A cancer derived from cells that line small tube-shaped vessels. endocrine therapy A cancer treatment that stops the making or action of estrogen. Also called hormone therapy.
estrogen A hormone that plays a role in breast development.
estrogen receptor (ER) A protein inside cells that binds to estrogen.
estrogen receptor-negative (ER-) A type of breast cancer that doesn’t use estrogen to grow.
estrogen receptor-positive (ER+) A type of breast cancer that uses estrogen to grow. fertility specialist An expert who helps people have babies. fine-needle aspiration (FNA) A procedure that removes tissue samples with a very thin needle.
flat closure Procedure done after a mastectomy in which the skin is tightened and sewn together without the addition of a breast implant.
gene Coded instructions in cells for making new cells and controlling how cells behave.
genetic counseling Expert guidance on the chance for a disease that is passed down in families.
hereditary breast cancer Breast cancer likely caused by abnormal genes passed down from biological parent to child.
histology The structure of cells, tissue, and organs as viewed under a microscope.
hormone A chemical in the body that triggers a response from cells or organs.
hormone receptor-negative cancer (HR-) Cancer cells that don’t use hormones to grow. hormone receptor-positive cancer (HR+) Cancer cells that use hormones to grow. human epidermal growth factor receptor 2 (HER2) A protein on the surface of a cell that sends signals for the cell to grow. immunohistochemistry (IHC) A lab test of cancer cells to find specific cell traits involved in abnormal cell growth.
inflammatory breast cancer (IBC) A type of breast cancer in which the breast looks red and swollen and feels warm to the touch.
infraclavicular The area right below the collarbone.
in situ hybridization (ISH) A lab test of the number of a gene. internal mammary The area along the breastbone.
77 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Words to know lobule A gland in the breast that makes breast milk.
luteinizing hormone-releasing hormone (LHRH) A hormone in the brain that helps control the making of estrogen by the ovaries.
lymph A clear fluid containing white blood cells.
lymphatic system Germ-fighting network of tissues and organs that includes the bone marrow, spleen, thymus, lymph nodes, and lymphatic vessels. Part of the immune system. lymphedema Swelling in the body caused by a buildup of fluid called lymph.
lymph node A small, bean-shaped disease-fighting structure.
magnetic resonance imaging (MRI) A test that uses radio waves and powerful magnets to make pictures of the insides of the body.
mammogram A picture of the insides of the breast that is made using x-rays.
mastectomy An operation that removes the whole breast.
medical oncologist A doctor who is an expert in cancer drugs.
menopause 12 months after the last menstrual period.
modified radical mastectomy An operation that removes the whole breast and lymph nodes under the arm (axilla). mutation An abnormal change.
neoadjuvant treatment A treatment that is given before the main treatment to reduce the cancer. Also called preoperative treatment if given before an operation.
nipple-areola complex (NAC) The ring of darker breast skin is called the areola. The raised tip within the areola is called the nipple. pathologic stage (p) A rating of the extent of cancer given after examining tissue removed during surgery.
pathologist A doctor who’s an expert in testing cells and tissue to find disease.
positron emission tomography (PET) A test that uses radioactive material to see the shape and function of body parts.
postmenopause The state of having no more menstrual periods. premenopause The state of having menstrual periods.
progesterone A hormone involved in sexual development, periods, and pregnancy.
progesterone receptor (PR) A protein inside cells that binds to progesterone.
prognosis The likely course and outcome of a disease based on tests. radiation therapy (RT) A treatment that uses high-energy rays. Also called radiotherapy. 78 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Words to know radical mastectomy An operation that removes the whole breast, lymph nodes under the arm (axilla), and chest wall muscles under the breast. recurrence The return of cancer after a cancer-free period.
selective estrogen receptor degrader (SERD) A drug that blocks and destroys estrogen receptors.
selective estrogen receptor modulator (SERM) A drug that blocks the effect of estrogen inside of cells.
sentinel lymph node (SLN) The first lymph node to which cancer cells spread after leaving a tumor.
sentinel lymph node biopsy (SLNB) An operation to remove the disease-fighting structures (lymph nodes) to which cancer first spreads. Also called sentinel lymph node dissection.
side effect An unhealthy or unpleasant physical or emotional response to treatment.
supportive care Health care that includes symptom relief but not cancer treatment. Also called palliative care or best supportive care. supraclavicular The area right above the collarbone.
systemic therapy Drug treatment that works throughout the body.
total mastectomy An operation that removes the entire breast with a flat closure. Also called simple mastectomy.
triple-negative breast cancer (TNBC) A breast cancer that does not use hormones or the HER2 protein to grow.
ultrasound A test that uses sound waves to take pictures of the inside of the body.
79 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 NCCN Contributors The NCCN Clinical Practice Guidelines in Oncology (NCCN Guidelines®) for Breast Cancer, Version 3.2025 were developed by the following NCCN Panel Members: William J. Gradishar, MD/Chair Robert H. Lurie Comprehensive Cancer Center of Northwestern University Meena S. Moran, MD/Vice-Chair Yale Cancer Center/Smilow Cancer Hospital Jame Abraham, MD Case Comprehensive Cancer Center/ University Hospitals Seidman Cancer Center and Cleveland Clinic Taussig Cancer Institute Vandana Abramson, MD Vanderbilt-Ingram Cancer Center Rebecca Aft, MD, PhD Siteman Cancer Center at Barnes-Jewish Hospital and Washington University School of Medicine Doreen Agnese, MD The Ohio State University Comprehensive Cancer Center - James Cancer Hospital and Solove Research Institute Kimberly H. Allison, MD Stanford Cancer Institute Bethany Anderson, MD University of Wisconsin Carbone Cancer Center Janet Bailey, MD University of Michigan Rogel Cancer Center Harold J. Burstein, MD, PhD Dana-Farber/Brigham and Women’s Cancer Center Nan Chen, MD The UChicago Medicine Comprehensive Cancer Center Helen Chew, MD UC Davis Comprehensive Cancer Center Chau Dang, MD Memorial Sloan Kettering Cancer Center Anthony D. Elias, MD University of Colorado Cancer Center Sharon H. Giordano, MD, MPH The University of Texas MD Anderson Cancer Center Matthew P. Goetz, MD Mayo Clinic Comprehensive Cancer Center Rachel C. Jankowitz, MD Abramson Cancer Center at the University of Pennsylvania Sara H. Javid, MD Fred Hutchinson Cancer Center Jairam Krishnamurthy, MD Fred & Pamela Buffet Cancer Center A. Marilyn Leitch, MD UT Southwestern Simmons Comprehensive Cancer Center Janice Lyons, MD Case Comprehensive Cancer Center/ University Hospitals Seidman Cancer Center and Cleveland Clinic Taussig Cancer Institute Susie McCloskey, MD, MSHS UCLA Jonsson Comprehensive Cancer Center Melissa McShane, MD Fox Chase Cancer Center Joanne Mortimer, MD City of Hope National Medical Center Sameer A. Patel, MD Fox Chase Cancer Center Laura H. Rosenberger, MD, MS Duke Cancer Institute Hope S. Rugo, MD UCSF Helen Diller Family Comprehensive Cancer Center Cesar Santa-Maria, MD, MSCI Johns Hopkins Kimmel Cancer Center Bryan Schneider, MD Indiana University Melvin and Bren Simon Comprehensive Cancer Center Mary Lou Smith, JD, MBA Research Advocacy Network Hatem Soliman, MD Moffitt Cancer Center Erica M. Stringer-Reasor, MD O'Neal Comprehensive Cancer Center at UAB Melinda L. Telli, MD Stanford Cancer Institute Mei Wei, MD Huntsman Cancer Institute at the University of Utah Kari B. Wisinski, MD University of Wisconsin Carbone Cancer Center Kay T. Yeung, MD, PhD UC San Diego Moores Cancer Center Jessica S. Young, MD Roswell Park Comprehensive Cancer Center NCCN Rashmi Kumar, PhD Senior Director, Clinical Content Ryan Schonfeld, BA Guidelines Coordinator NCCN Contributors This patient guide is based on the NCCN Clinical Practice Guidelines in Oncology (NCCN Guidelines®) for Breast Cancer, Version 3.2025. It was adapted, reviewed, and published with help from the following people: Dorothy A. Shead, MS Senior Director Patient Information Operations Tanya Fischer, MEd, MSLIS Senior Medical Writer Susan Kidney Senior Graphic Design Specialist Reviewed this patient guide. For disclosures, visit NCCN.org/disclosures.
80 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 NCCN Cancer Centers NCCN Cancer Centers Abramson Cancer Center at the University of Pennsylvania Philadelphia, Pennsylvania 800.789.7366 • pennmedicine.org/cancer Case Comprehensive Cancer Center/ University Hospitals Seidman Cancer Center and Cleveland Clinic Taussig Cancer Institute Cleveland, Ohio UH Seidman Cancer Center 800.641.2422 • uhhospitals.org/services/cancer-services CC Taussig Cancer Institute 866.223.8100 • my.clevelandclinic.org/departments/cancer Case CCC 216.844.8797 • case.edu/cancer City of Hope National Medical Center Duarte, California 800.826.4673 • cityofhope.org Dana-Farber/Brigham and Women’s Cancer Center | Mass General Cancer Center Boston, Massachusetts 877.442.3324 • youhaveus.org 617.726.5130 • massgeneral.org/cancer-center Duke Cancer Institute Durham, North Carolina 888.275.3853 • dukecancerinstitute.org Fox Chase Cancer Center Philadelphia, Pennsylvania 888.369.2427 • foxchase.org Fred & Pamela Buffett Cancer Center Omaha, Nebraska 402.559.5600 • unmc.edu/cancercenter Fred Hutchinson Cancer Center Seattle, Washington 206.667.5000 • fredhutch.org Huntsman Cancer Institute at the University of Utah Salt Lake City, Utah 800.824.2073 • healthcare.utah.edu/huntsmancancerinstitute Indiana University Melvin and Bren Simon Comprehensive Cancer Center Indianapolis, Indiana 888.600.4822 • www.cancer.iu.edu Johns Hopkins Kimmel Cancer Center Baltimore, Maryland 410.955.8964 www.hopkinskimmelcancercenter.org Mayo Clinic Comprehensive Cancer Center Phoenix/Scottsdale, Arizona Jacksonville, Florida Rochester, Minnesota 480.301.8000 • Arizona 904.953.0853 • Florida 507.538.3270 • Minnesota mayoclinic.org/cancercenter Memorial Sloan Kettering Cancer Center New York, New York 800.525.2225 • mskcc.org Moffitt Cancer Center Tampa, Florida 888.663.3488 • moffitt.org O’Neal Comprehensive Cancer Center at UAB Birmingham, Alabama 800.822.0933 • uab.edu/onealcancercenter Robert H. Lurie Comprehensive Cancer Center of Northwestern University Chicago, Illinois 866.587.4322 • cancer.northwestern.edu Roswell Park Comprehensive Cancer Center Buffalo, New York 877.275.7724 • roswellpark.org Siteman Cancer Center at Barnes-Jewish Hospital and Washington University School of Medicine St. Louis, Missouri 800.600.3606 • siteman.wustl.edu St. Jude Children’s Research Hospital/ The University of Tennessee Health Science Center Memphis, Tennessee 866.278.5833 • stjude.org 901.448.5500 • uthsc.edu Stanford Cancer Institute Stanford, California 877.668.7535 • cancer.stanford.edu The Ohio State University Comprehensive Cancer Center - James Cancer Hospital and Solove Research Institute Columbus, Ohio 800.293.5066 • cancer.osu.edu The UChicago Medicine Comprehensive Cancer Center Chicago, Illinois 773.702.1000 • uchicagomedicine.org/cancer The University of Texas MD Anderson Cancer Center Houston, Texas 844.269.5922 • mdanderson.org 81 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 NCCN Cancer Centers UC Davis Comprehensive Cancer Center Sacramento, California 916.734.5959 • 800.770.9261 health.ucdavis.edu/cancer UC San Diego Moores Cancer Center La Jolla, California 858.822.6100 • cancer.ucsd.edu UCLA Jonsson Comprehensive Cancer Center Los Angeles, California 310.825.5268 • uclahealth.org/cancer UCSF Helen Diller Family Comprehensive Cancer Center San Francisco, California 800.689.8273 • cancer.ucsf.edu University of Colorado Cancer Center Aurora, Colorado 720.848.0300 • coloradocancercenter.org University of Michigan Rogel Cancer Center Ann Arbor, Michigan 800.865.1125 • rogelcancercenter.org University of Wisconsin Carbone Cancer Center Madison, Wisconsin 608.265.1700 • uwhealth.org/cancer UT Southwestern Simmons Comprehensive Cancer Center Dallas, Texas 214.648.3111 • utsouthwestern.edu/simmons Vanderbilt-Ingram Cancer Center Nashville, Tennessee 877.936.8422 • vicc.org Yale Cancer Center/Smilow Cancer Hospital New Haven, Connecticut 855.4.SMILOW • yalecancercenter.org Take our survey and help make the NCCN Guidelines for Patients better for everyone!
NCCN.org/patients/comments share with us.
82 NCCN Guidelines for Patients® Invasive Breast Cancer, 2025 Index Index 21-gene assay (Oncotype Dx) 57 antibody drug conjugate (ADC) 36 biopsy 16 bone scan 12 bone-strengthening therapy 40–41 BRCA 20 breast reconstruction 64 cancer stages 23–26 chemotherapy 36 clinical trials 42 clips or markers 16 computed tomography (CT) 13 diagnostic mammogram 13 distress 10 endocrine therapy 38–40, 59–60 estrogen receptor (ER) 18 family history 9, 19–20 fertility 11 flat closure 63 genetic testing 19–20 hereditary breast cancer 19–20 histology 16–17, 57 hormone receptor (HR) 18–19 human epidermal growth factor receptor 2 (HER2) 17 HER2-targeted therapy 36–37 immunotherapy 38 inhibitors 37–38 lumpectomy 30–31 lymphedema 10 lymph nodes 25 lymph node biopsy 32–33 magnetic resonance imaging (MRI) 14 mammogram 13 mastectomy 31–32 menopause 40, 59 positron emission tomography (PET) 15 pregnancy 11 premenopause 40, 59 progesterone receptor (PR) 18–19 radiation therapy (RT) 34 recurrence 68–69 regional nodal irradiation (RNI) 34 side effects 45–49 supportive care 45–49 surgery 30–33 survivorship 49 targeted therapy 36–38 testosterone 39 those assigned male at birth 27 TNM scores 24–26 triple-negative breast cancer (TNBC) 58 ultrasound 15 volume displacement 63 Ü PAT-N-1855-1025 3025 Chemical Road, Suite 100 Plymouth Meeting, PA 19462 215.690.0300 NCCN.org/patients – For Patients | NCCN.org – For Clinicians Invasive Breast Cancer 2025 NCCN GUIDELINES FOR PATIENTS ® To support the NCCN Guidelines for Patients, visit NCCNFoundation.org/Donate |
10538 | https://www.britannica.com/topic/syllogistic | syllogistic
Our editors will review what you’ve submitted and determine whether to revise the article.
syllogistic, in logic, the formal analysis of logical terms and operators and the structures that make it possible to infer true conclusions from given premises. Developed in its original form by Aristotle in his Prior Analytics (Analytica priora) about 350 bce, syllogistic represents the earliest branch of formal logic.
A brief treatment of syllogistic follows. For full treatment, see history of logic: Aristotle.
As currently understood, syllogistic comprises two domains of investigation. Categorical syllogistic, with which Aristotle concerned himself, confines itself to simple declarative statements and their variation with respect to modalities, or expressions of necessity and possibility. Noncategorical syllogistic is a form of logical inference using whole propositions as its units, an approach traceable to the Stoic logicians but not fully appreciated as a separate branch of syllogistic until the work of John Neville Keynes in the 19th century.
Knowing the truth or falsity of any given premises or conclusions does not enable one to determine the validity of an inference. In order to understand the validity of an argument, it is necessary to grasp its logical form. Traditional categorical syllogistic is the study of this problem. It begins by reducing all propositions to four basic forms.
Respectively, these forms are known as A, E, I, and O propositions, after the vowels in the Latin terms affirmo and nego. This distinction between affirmation and negation is said to be one of quality, while the difference between the universal scope of the first two forms, in contrast to the particular scope of the last two forms, is said to be one of quantity.
The expressions that fill the blanks of these propositions are called terms. These may be singular (Mary) or general (women). A very important distinction with respect to the use of general terms turns on whether their extensional or intensional attributes are in play; extension designates the set of individuals to which a term applies, while intension describes the set of attributes which define the term. The term that fills the first blank is called the subject of the proposition, that which fills the second is the predicate.
Using the notation of the early 20th-century logician Jan Łukasiewicz, the general terms or term variables can be expressed as lowercase Latin letters a, b, and c, with capitals reserved for the four syllogistic operators that specify A, E, I, and O propositions. The proposition “Every b is an a” is now written “Aba”; “Some b is an a” is written “Iba”; “No b is an a” is written “Eba”; and “Some b is not an a” is written “Oba.” Careful examination of the relations obtaining between these propositions reveals that the following are true for any terms a and b.
Not both: Aba and Eba.
If Aba, then Iba.
If Eba, then Oba.
Either Iba or Oba.
Aba is equivalent to the negation of Oba.
Eba is equivalent to the negation of Iba.
Reversing the order of the terms yields the simple converse of a proposition, but when in addition an A proposition is changed to an I, or an E to an O, the result is called the limited converse of the original. The logical relations holding between propositions and their converses, often pictured graphically in a square of opposition, are as follows: E and I propositions are equivalent or equipollent to their simple converses (i.e., Eba and Iba are the same as Eab and Iab, respectively). An A proposition Aba, although not equivalent to its simple converse Aab, implies, but is not implied by, its limited converse Iab. This kind of inference is traditionally called conversio per accidens and holds as well in Eba implying Oab. In contrast, Oba neither implies nor is implied by Oab, and this is expressed by saying that O propositions do not convert. When a proposition is posed against the proposition that results from changing its quality at the same time that its second term is negated, the resulting equivalence is called obversion. A last type of inference is called contraposition and is produced by the fact that some propositions imply the proposition that results from the original proposition when both of its term variables are negated and their order reversed.
A categorical syllogism infers a conclusion from two premises. It is defined by the following four attributes. Each of the three propositions is an A, E, I, or O proposition. The subject of the conclusion (called the minor term) also occurs in one of the premises (the minor premise). The predicate of the conclusion (called the major term) also occurs in the other premise (the major premise). The two remaining term positions in the premises are filled by the same term (the middle term). Since each of the three propositions in a syllogism can take one of four combinations of quality and quantity, the categorical syllogism may exhibit any of 64 moods. Each mood may occur in any of four figures—patterns of terms within the propositions—thus yielding 256 possible forms. One of the important tasks of syllogistic has been to reduce this plurality to just the valid forms.
Aristotle accepted 14 valid moods officially and 5 unofficially; since 5 of these 19 syllogisms have universal conclusions, the number of valid moods can be increased to 24 by passing to their corresponding particular propositions (i.e., from “all” to “some”). Employing an axiomatic system in which proof was by direct reduction and indirect reduction or reductio ad impossibile, Aristotle was able to reduce all syllogisms to those of the first figure. Today, in order to admit terms regardless of their emptiness or nonemptiness, syllogistic has become a special case of Boolean algebra in which the concepts of universal class and null class, along with the operations of class union and class intersection, are incorporated. From this standpoint the number of moods is 15. These 15 moods are the theorems of the syllogistic when interpreted in the predicate calculus.
Noncategorical syllogisms are either hypothetical or disjunctive, to which some treatments add a class of copulative syllogisms. Their treatment is distinguished from categorical syllogistic by the fact that the latter is a predicate logic analyzing terms in combination, while noncategorical syllogistic is a propositional logic that treats unanalyzed entire propositions as its units. Hypothetical syllogisms in which all propositions are of the form “p ⊃ q” (i.e., “p implies q”) are called pure, as opposed to mixed hypothetical syllogisms that have one hypothetical and one categorical premise and a categorical conclusion. These latter have two valid moods. Disjunctive syllogisms are composed by an “either…or” operator and have two important moods. In the 20th century the understanding of noncategorical syllogisms was extended to encompass complex and compound propositions as well as the dilemma with its constructive and destructive moods. |
10539 | https://stats.libretexts.org/Courses/Queensborough_Community_College/MA336%3A_Statistics/05%3A_Basic_Concepts_of_Probability/5.02%3A_Complements_Intersections_and_Unions | 5.2: Complements, Intersections, and Unions - Statistics LibreTexts
Skip to main content
Table of Contents menu
search Search build_circle Toolbar fact_check Homework cancel Exit Reader Mode
school Campus Bookshelves
menu_book Bookshelves
perm_media Learning Objects
login Login
how_to_reg Request Instructor Account
hub Instructor Commons
Search
Search this book
Submit Search
x
Text Color
Reset
Bright Blues Gray Inverted
Text Size
Reset
+-
Margin Size
Reset
+-
Font Type
Enable Dyslexic Font - [x]
Downloads expand_more
Download Page (PDF)
Download Full Book (PDF)
Resources expand_more
Periodic Table
Physics Constants
Scientific Calculator
Reference expand_more
Reference & Cite
Tools expand_more
Help expand_more
Get Help
Feedback
Readability
x
selected template will load here
Error
This action is not available.
chrome_reader_mode Enter Reader Mode
5: Basic Concepts of Probability
MA336: Statistics
{ }
{ "5.01:Sample_Spaces_Events_and_Their_Probabilities" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "5.02:_Complements_Intersections_and_Unions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "5.03:_Conditional_Probability_and_Independent_Events" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "5.E:_Basic_Concepts_of_Probability(Exercises)" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
{ "00:_Front_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "01:_Introduction_to_Statistical_Studies" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "02:_Descriptive_Statistics" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "03:_Examining_Relationships-_Quantitative_Data" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "04:_Relationships_in_Categorical_Data_with_Intro_to_Probability" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "05:_Basic_Concepts_of_Probability" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "06:_Discrete_Random_Variables" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "07:_Continuous_Random_Variables" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "08:_Sampling_Distributions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "09:_Confidence_Intervals" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "10:_Hypothesis_Testing_with_One_Sample" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "zz:_Back_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
Sat, 22 Jan 2022 00:31:16 GMT
5.2: Complements, Intersections, and Unions
28385
28385
Fei Ye
{ }
Anonymous
Anonymous
2
false
false
[ "article:topic", "complement", "INTERSECTIONS", "mutually exclusive", "Adding probabilities", "Probability Rule for Complements", "unions", "transcluded:yes", "license:ccbyncsa", "showtoc:yes", "source-stats-531", "program:hidden" ]
[ "article:topic", "complement", "INTERSECTIONS", "mutually exclusive", "Adding probabilities", "Probability Rule for Complements", "unions", "transcluded:yes", "license:ccbyncsa", "showtoc:yes", "source-stats-531", "program:hidden" ]
Search site Search Search Go back to previous article
Sign in
Username Password Sign in
Sign in
Sign in
Forgot password
Expand/collapse global hierarchy
1. Home
2. Campus Bookshelves
3. Queensborough Community College
4. MA336: Statistics
5. 5: Basic Concepts of Probability
6. 5.2: Complements, Intersections, and Unions
Expand/collapse global location
5.2: Complements, Intersections, and Unions
Last updated Jan 22, 2022
Save as PDF
5.1: Sample Spaces, Events, and Their Probabilities
5.3: Conditional Probability and Independent Events
Page ID 28385
( \newcommand{\kernel}{\mathrm{null}\,})
Table of contents
1. Learning Objectives
2. Complements
1. Definition: Complement
2. Example 5.2.1
1. Solution
3. Definition: Probability Rule for Complements
4. Example 5.2.2)
1. Solution
Intersection of Events
Definition: intersections
Example 5.2.3
Solution
Example 5.2.4
Solution
Definition: mutually exclusive
Definition: Probability Rule for Mutually Exclusive Events
Example 5.2.5
Solution
Union of Events
Definition: Union of Events
Example 5.2.6
Solution
Example 5.2.7
Solution
Definition: Additive Rule of Probability
Example 5.2.8
Solution
Example 5.2.9
Solution
Example 5.2.10
Solution
Key Takeaway
Learning Objectives
To learn how some events are naturally expressible in terms of other events.
To learn how to use special formulas for the probability of an event that is expressed in terms of one or more other events.
Some events can be naturally expressed in terms of other, sometimes simpler, events.
Complements
Definition: Complement
The complement of an event A in a sample space S, denoted A c, is the collection of all outcomes in S that are not elements of the set A. It corresponds to negating any description in words of the event A.
Example 5.2.1
Two events connected with the experiment of rolling a single die are E:“the number rolled is even” and T:“the number rolled is greater than two.” Find the complement of each.
Solution
In the sample space S={1,2,3,4,5,6} the corresponding sets of outcomes are E={2,4,6} and T={3,4,5,6}. The complements are E c={1,3,5} and T c={1,2}.
In words the complements are described by “the number rolled is not even” and “the number rolled is not greater than two.” Of course easier descriptions would be “the number rolled is odd” and “the number rolled is less than three.”
If there is a 60% chance of rain tomorrow, what is the probability of fair weather? The obvious answer, 40%, is an instance of the following general rule.
Definition: Probability Rule for Complements
The Probability Rule for Complements states that P(A c)=1−P(A)
This formula is particularly useful when finding the probability of an event directly is difficult.
Example 5.2.2
Find the probability that at least one heads will appear in five tosses of a fair coin.
Solution
Identify outcomes by lists of five hs and ts, such as tthtt and hhttt. Although it is tedious to list them all, it is not difficult to count them. Think of using a tree diagram to do so. There are two choices for the first toss. For each of these there are two choices for the second toss, hence 2×2=4 outcomes for two tosses. For each of these four outcomes, there are two possibilities for the third toss, hence 4×2=8 outcomes for three tosses. Similarly, there are 8×2=16 outcomes for four tosses and finally 16×2=32 outcomes for five tosses.
Let O denote the event “at least one heads.” There are many ways to obtain at least one heads, but only one way to fail to do so: all tails. Thus although it is difficult to list all the outcomes that form O, it is easy to write O c={ttttt}. Since there are 32 equally likely outcomes, each has probability 1 32, so P(O c)=1∕32, hence P(O)=1−1 32≈0.97 or about a 97% chance.
Intersection of Events
Definition: intersections
The intersection of events A and B, denoted A∩B, is the collection of all outcomes that are elements of both of the sets A and B. It corresponds to combining descriptions of the two events using the word “and.”
To say that the event A∩B occurred means that on a particular trial of the experiment both A and B occurred. A visual representation of the intersection of events A and B in a sample space S is given in Figure 5.2.1. The intersection corresponds to the shaded lens-shaped region that lies within both ovals.
Figure 5.2.1 : The Intersection of Events A and B
Example 5.2.3
In the experiment of rolling a single die, find the intersection E∩T of the events E:“the number rolled is even” and T:“the number rolled is greater than two.”
Solution
The sample space is S={1,2,3,4,5,6}. Since the outcomes that are common to E={2,4,6} and T={3,4,5,6} are 4 and 6, E∩T={4,6}.
In words the intersection is described by “the number rolled is even and is greater than two.” The only numbers between one and six that are both even and greater than two are four and six, corresponding to E∩T given above.
Example 5.2.4
A single die is rolled.
Suppose the die is fair. Find the probability that the number rolled is both even and greater than two.
Suppose the die has been “loaded” so that P(1)=1 12, P(6)=3 12, and the remaining four outcomes are equally likely with one another. Now find the probability that the number rolled is both even and greater than two.
Solution
In both cases the sample space is S={1,2,3,4,5,6} and the event in question is the intersection E∩T={4,6} of the previous example.
Since the die is fair, all outcomes are equally likely, so by counting we have P(E∩T)=2 6.
The information on the probabilities of the six outcomes that we have so far is
Outcome 1 2 3 4 5 6 Probablity 1 12 p p p p 3 12
Since P(1)+P(6)=4 6=1 3
P(2)+P(3)+P(4)+P(5)=1−1 3=2 3
Thus 4p=2 3, so p=1 6. In particular P(4)=1 6 therefore:
P(E∩T)=P(4)+P(6)=1 6+3 12=5 12
Definition: mutually exclusive
Events A and B are mutually exclusive (cannot both occur at once) if they have no elements in common.
For A and B to have no outcomes in common means precisely that it is impossible for both A and B to occur on a single trial of the random experiment. This gives the following rule:
Definition: Probability Rule for Mutually Exclusive Events
Events A and B are mutually exclusive if and only if
P(A∩B)=0
Any event A and its complement A c are mutually exclusive, but A and B can be mutually exclusive without being complements.
Example 5.2.5
In the experiment of rolling a single die, find three choices for an event A so that the events A and E: “the number rolled is even” are mutually exclusive.
Solution
Since E={2,4,6} and we want A to have no elements in common with E, any event that does not contain any even number will do. Three choices are {1,3,5} (the complement E c, the odds), {1,3}, and {5}.
Union of Events
Definition: Union of Events
The union of events A and B, denoted A∪B, is the collection of all outcomes that are elements of one or the other of the sets A and B, or of both of them. It corresponds to combining descriptions of the two events using the word “or.”
To say that the event A∪B occurred means that on a particular trial of the experiment either A or B occurred (or both did). A visual representation of the union of events A and B in a sample space S is given in Figure 5.2.2. The union corresponds to the shaded region.
Figure5.2.2: The Union of Events A and B
Example 5.2.6
In the experiment of rolling a single die, find the union of the events E: “the number rolled is even” and T: “the number rolled is greater than two.”
Solution
Since the outcomes that are in either E={2,4,6} or T={3,4,5,6} (or both) are 2,3,4,5, and 6, that means E∪T={2,3,4,5,6}.
Note that an outcome such as 4 that is in both sets is still listed only once (although strictly speaking it is not incorrect to list it twice).
In words the union is described by “the number rolled is even or is greater than two.” Every number between one and six except the number one is either even or is greater than two, corresponding to E∪T given above.
Example 5.2.7
A two-child family is selected at random. Let B denote the event that at least one child is a boy, let D denote the event that the genders of the two children differ, and let M denote the event that the genders of the two children match. Find B∪D and B∪M.
Solution
A sample space for this experiment is S={bb,bg,gb,gg}, where the first letter denotes the gender of the firstborn child and the second letter denotes the gender of the second child. The events B,D, and M are B={bb,bg,gb}, D={bg,gb}, M={bb,gg}.
Each outcome in D is already in B, so the outcomes that are in at least one or the other of the sets B and D is just the set B itself: B∪D={bb,bg,gb}=B.
Every outcome in the whole sample space S is in at least one or the other of the sets B and M, so B∪M={bb,bg,gb,gg}=S.
Definition: Additive Rule of Probability
A useful property to know is the Additive Rule of Probability, which is
P(A∪B)=P(A)+P(B)−P(A∩B)
The next example, in which we compute the probability of a union both by counting and by using the formula, shows why the last term in the formula is needed.
Example 5.2.8
Two fair dice are thrown. Find the probabilities of the following events:
both dice show a four
at least one die shows a four
Solution
As was the case with tossing two identical coins, actual experience dictates that for the sample space to have equally likely outcomes we should list outcomes as if we could distinguish the two dice. We could imagine that one of them is red and the other is green. Then any outcome can be labeled as a pair of numbers as in the following display, where the first number in the pair is the number of dots on the top face of the green die and the second number in the pair is the number of dots on the top face of the red die.
\begin{array}11 & 12 & 13 & 14 & 15 & 16 \ 21 & 22 & 23 & 24 & 25 & 26 \ 31 & 32 & 33 & 34 & 35 & 36 \ 41 & 42 & 43 & 44 & 45 & 46 \ 51 & 52 & 53 & 54 & 55 & 56 \ 61 & 62 & 63 & 64 & 65 & 66\end{array} \nonumber
There are 36 equally likely outcomes, of which exactly one corresponds to two fours, so the probability of a pair of fours is 1/36.
From the table we can see that there are 11 pairs that correspond to the event in question: the six pairs in the fourth row (the green die shows a four) plus the additional five pairs other than the pair 44, already counted, in the fourth column (the red die is four), so the answer is 11/36. To see how the formula gives the same number, let A G denote the event that the green die is a four and let A R denote the event that the red die is a four. Then clearly by counting we get: P(A G)=6/36 and P(A R)=6/36.Since A G∩A R={44}, P(A G∩A R)=1/36.This is the computation from part 1, of course. Thus by the Additive Rule of Probability we get:
P(A G∩A R)=P(A G)+P(A R)−P(A G−A R)=6/36+6/36−1/36=11 36
Example 5.2.9
A tutoring service specializes in preparing adults for high school equivalence tests. Among all the students seeking help from the service, 63% need help in mathematics, 34% need help in English, and 27% need help in both mathematics and English. What is the percentage of students who need help in either mathematics or English?
Solution
Imagine selecting a student at random, that is, in such a way that every student has the same chance of being selected. Let M denote the event “the student needs help in mathematics” and let E denote the event “the student needs help in English.” The information given is that P(M)=0.63, P(E)=0.34 and P(M∩E)=0.27. Thus the Additive Rule of Probability gives:
P(M∪E)=P(M)+P(E)−P(M∩E)=0.63+0.34−0.27=0.70
Note how the naïve reasoning that if 63% need help in mathematics and 34% need help in English then 63 plus 34 or 97% need help in one or the other gives a number that is too large. The percentage that need help in both subjects must be subtracted off, else the people needing help in both are counted twice, once for needing help in mathematics and once again for needing help in English. The simple sum of the probabilities would work if the events in question were mutually exclusive, for then P(A∩B) is zero, and makes no difference.
Example 5.2.10
Volunteers for a disaster relief effort were classified according to both specialty (C: construction, E: education, M: medicine) and language ability (S: speaks a single language fluently, T: speaks two or more languages fluently). The results are shown in the following two-way classification table:
| Specialty | Language Ability |
--- |
| S | T |
| C | 12 | 1 |
| E | 4 | 3 |
| M | 6 | 2 |
The first row of numbers means that 12 volunteers whose specialty is construction speak a single language fluently, and 1 volunteer whose specialty is construction speaks at least two languages fluently. Similarly for the other two rows.
A volunteer is selected at random, meaning that each one has an equal chance of being chosen. Find the probability that:
his specialty is medicine and he speaks two or more languages;
either his specialty is medicine or he speaks two or more languages;
his specialty is something other than medicine.
Solution
When information is presented in a two-way classification table it is typically convenient to adjoin to the table the row and column totals, to produce a new table like this:
| Specialty | Language Ability | Total |
---
| S | T |
| C | 12 | 1 | 13 |
| E | 4 | 3 | 7 |
| M | 6 | 2 | 8 |
| Total | 22 | 6 | 28 |
The probability sought is P(M∩T). The table shows that there are 2 such people, out of 28 in all, hence P(M∩T)=2/28≈0.07 or about a 7% chance.
The probability sought is P(M∪T). The third row total and the grand total in the sample give P(M)=8/28. The second column total and the grand total give P(T)=6/28. Thus using the result from part (1),
P(M∪T)=P(M)+P(T)−P(M∩T)=828+628−228=1228≈0.43
or about a 43% chance.
This probability can be computed in two ways. Since the event of interest can be viewed as the event C∪E and the events C and E are mutually exclusive, the answer is, using the first two row totals,
P(C∪E)=P(C)+P(E)−P(C∩E)=1328+728−028=2028≈0.71
On the other hand, the event of interest can be thought of as the complement M c of M, hence using the value of P(M)computed in part (2),
P(M c)=1−P(M)=1−828=2028≈0.71
as before.
Key Takeaway
The probability of an event that is a complement or union of events of known probability can be computed using formulas.
5.2: Complements, Intersections, and Unions is shared under a CC BY-NC-SA license and was authored, remixed, and/or curated by LibreTexts.
Back to top
5.1: Sample Spaces, Events, and Their Probabilities
5.3: Conditional Probability and Independent Events
Was this article helpful?
Yes
No
Recommended articles
4.2: Complements, Intersections, and UnionsSome events can be naturally expressed in terms of other, sometimes simpler, events.
3.2: Complements, Intersections, and UnionsSome events can be naturally expressed in terms of other, sometimes simpler, events.
4.3: The Union and Intersection of Two SetsAll statistics classes include questions about probabilities involving the union and intersections of sets. In English, we use the words "Or", and "An...
6.4: The Union and Intersection of Two SetsAll statistics classes include questions about probabilities involving the union and intersections of sets. In English, we use the words "Or", and "An...
6.4: The Union and Intersection of Two SetsAll statistics classes include questions about probabilities involving the union and intersections of sets. In English, we use the words "Or", and "An...
Article typeSection or PageLicenseCC BY-NC-SAOER program or PublisherThe Publisher Who Must Not Be NamedShow TOCyesTranscludedyes
Tags
Adding probabilities
complement
INTERSECTIONS
mutually exclusive
Probability Rule for Complements
source-stats-531
unions
© Copyright 2025 Statistics LibreTexts
Powered by CXone Expert ®
?
The LibreTexts libraries arePowered by NICE CXone Expertand are supported by the Department of Education Open Textbook Pilot Project, the UC Davis Office of the Provost, the UC Davis Library, the California State University Affordable Learning Solutions Program, and Merlot. We also acknowledge previous National Science Foundation support under grant numbers 1246120, 1525057, and 1413739. Privacy Policy. Terms & Conditions. Accessibility Statement.For more information contact us atinfo@libretexts.org.
Support Center
How can we help?
Contact Support Search the Insight Knowledge Base Check System Status×
contents readability resources tools
☰
5.1: Sample Spaces, Events, and Their Probabilities
5.3: Conditional Probability and Independent Events |
10540 | https://www.open.edu/openlearn/science-maths-technology/mathematics-statistics/interpreting-data-boxplots-and-tables/content-section-0/?printable=1 | Interpreting data: boxplots and tables
Completion requirements
View all sections of the document
Printable page generated Sunday, 28 September 2025, 8:22 AM Use 'Print preview' to check the number of pages and printer settings. Print functionality varies between browsers.
Unless otherwise stated, copyright © 2025 The Open University, all rights reserved. Printable page generated Sunday, 28 September 2025, 8:22 AM
◄ Interpreting data: boxplots and tables
Interpreting data: boxplots and tables
Introduction
This course is concerned with two main topics. In Section 1, you will learn about another kind of graphical display, the boxplot. Boxplots are particularly useful for assessing quickly the location, dispersion, and symmetry or skewness of a set of data, and for making comparisons of these features in two or more data sets. The other topic, is that of dealing with data presented in tabular form. You are, no doubt, familiar with such tables: they are common in the media and in reports and other documents. It is not always straightforward to see at first glance just what information a table of data is providing, and it often helps to carry out certain calculations and/or to draw appropriate graphs to make this clearer.
This OpenLearn course is an adapted extract from the Open University course M248 Analysing data.
Learning outcomes
After studying this course, you should be able to:
understand and use the following terms: boxplots, box, whisker, upper and lower adjacent values, rate, time series, line plot
demonstrate an awareness of the idea that the general pattern of a set of data, in terms of location, dispersion and skewness, can be graphically represented in a boxplot
understand that boxplots can be used to provide a quick and simple comparison of data sets
understand that patterns in tabular data can be made clearer by leaving out unhelpful information, by including extra pieces of useful information, or by drawing appropriate graphs
describe and compare data sets on the basis of boxplots.
Overview
It is a common observation that a data exploration should always begin by looking at a graphical display of the data. When looking at data sets which involve only one variable, displays such as bar charts and histograms are available. One problem with these is that they can include too much detail. Also they are not very useful for comparing two or more samples of data. A graphical display showing certain summary statistics in a visually appealing and interpretable way is introduced in this section. This is the boxplot.
1 Boxplots
In this first section, you will learn how to construct a boxplot for a single set of data. The use of boxplots to compare two or more sets of data will then be discussed.
1.1 Simple boxplots
A boxplot is simple to construct. The following example on the β endorphin concentrations of collapsed runners will be used to show how this is done.
Example 1.1 Endorphin concentrations for collapsed runners
The β endorphin concentrations (in pmol/l) recorded for eleven runners who collapsed after the Great North Run are as follows (written in order of increasing size).
A boxplot for these data is shown in Figure 1.1.
Figure 1.1 A boxplot for the collapsed runners
Show description|Hide description
Figure 1.1 A boxplot for the collapsed runners
Figure 1.1 A boxplot for the collapsed runners
(Data sourced from Dale, G., Fleetwood, J.A., Weddell, A., Ellis, R.D. and Sainsbury, J.R.C. (1987) Beta-endorphin: a factor in 'fun run' collapse? British Medical Journal, 294, 1004.)
The easiest way to understand exactly what a boxplot represents and how it is constructed is to think about how you would draw one by hand. The steps involved in constructing the boxplot in Figure 1.1 for the data set of β endorphin concentrations are as follows.
First, a convenient scale is drawn covering the extent of the data. Since the minimum is 66 and the maximum is 414, a scale from 0 to 500 (say) is suitable in this case. The boxplot is drawn against this scale.
The median and quartiles are used to construct the ‘box’. The median of this data set is 110, and the lower and upper quartiles are 79 and 162, respectively. The box is shown in Figure 1.2.
The ‘box’ is a rectangle with edges defined by the lower and upper quartiles; so it indicates where the ‘middle 50%’ of the data can be found. The vertical line inside the box is located at the median.
The ‘whiskers’ are constructed next. These are lines drawn parallel to the scale (so they are horizontal in this course). Essentially, each whisker extends outwards from the edge of the box as far as the most extreme observation. However, as you will see in the next step, some observations may be classified as potential outliers; and in fact the whiskers extend only to cover observations which are not classified as potential outliers. The whiskers are drawn outwards as far as observations called adjacent values. The lower adjacent value is the furthest observation which is within one and a half iqr (interquartile range) of the lower end of the box; and the upper adjacent value is the furthest observation which is within one and a half iqr of the upper end of the box. So the interquartile range is needed to construct the whiskers.
Figure 1.2 Collapsed runners boxplot: the box
Show description|Hide description
Figure 1.2 Collapsed runners boxplot: the box
Figure 1.2 Collapsed runners boxplot: the box
For these data, the interquartile range is 162−79=83. So
The highest observation not exceeding 286.5 is 169, so the upper adjacent value is 169, and hence the right-hand whisker extends as far as the observation 169. Similarly,
The lowest observation, 66, is greater than this, so the lower adjacent value is 66, and the left-hand whisker extends to 66. Notice that, in this example, the lower adjacent value is the same as the sample minimum, 66. Figure 1.3 shows the box with the whiskers extending to the upper and lower adjacent values.
Figure 1.3 Collapsed runners boxplot: adjacent values
Show description|Hide description
Figure 1.3
Figure 1.3 Collapsed runners boxplot: adjacent values
Finally, any values not covered by the whiskers are marked separately. In some circumstances, they may be deemed outliers. At the least, they are potential outliers and merit special attention.
In this case, the only observation not covered by the whiskers is the maximum observation of 414. This is shown in Figure 1.4.
Figure 1.4 Completed boxplot for collapsed runners
Show description|Hide description
Figure 1.4
Figure 1.4 Completed boxplot for collapsed runners
It must be stressed that boxplot construction is an area where there are no universally accepted rules. All boxplots show the three quartiles, but the conventions defining the extent of the whiskers vary from text to text and from one computer package to another. The whiskers may extend as low as one or even up to two interquartile ranges either side of the box. Some approaches even distinguish between moderate and severe outliers by using different symbols for them. Some textbooks and software always draw the whiskers right out to the minimum and maximum values and do not mark (potential) outliers separately. The approach adopted here is one of the simplest and is probably the most common.
You can see how a boxplot gives a quick visual assessment of the data. The length of the box represents the interquartile range and the lengths of the whiskers relative to the length of the box give an idea of how stretched out the rest of the values are. Thus these aspects of the diagram give an idea of the dispersion of the data set. The unusually large value in this data set is clearly shown and the median gives an assessment of the centre.
Some kind of assessment of symmetry is possible, since symmetric data will produce a boxplot which is symmetric about the median. These particular data are not symmetric; they are right-skew, and in fact the sample skewness is 2.572. The corresponding lack of symmetry shows up in the boxplot: the right-hand section of the box is longer than the left. However, it should be borne in mind that this particular data set has only eleven values, and this is too small a number to infer anything definite about any underlying structure.
You should now ensure that you understand simple boxplots by constructing one for yourself.
A boxplot displays the median, the quartiles, the range of values covered by the data and any outliers which may be present. It gives a clear picture of all these features and, as you will see, allows a visual appreciation of lack of symmetry.
1.2 Boxplot activity
Activity 1 Drawing a boxplot: chondrite meteors
Table 1.1 contains data on the percentage of silica found in 22 chondrite meteors. The data are given in order of increasing size.
Table 1.1 Silica content of chondrite meteors
| 20.77 | 22.56 | 22.71 | 22.69 | 26.39 | 27.08 | 27.32 | 27.33 |
| 27.57 | 27.81 | 28.69 | 29.36 | 30.25 | 31.89 | 32.88 | 33.23 |
| 33.28 | 33.40 | 33.52 | 33.83 | 33.95 | 34.82 |
(Source: Good, I.J. and Gaskins, R.A. (1980) Density estimation and bump-hunting by the penalized likelihood method exemplified by scattering and meteorite data. J. American Statistical Association, 75, 42-56.)
The median for this data set is 29.025; the lower and upper quartiles are approximately 26.91 and 33.31. The interquartile range is 6.40.
(a) Using a pencil and ruler, construct a boxplot for these data.
(b) The sample skewness for these data is −0.446. Is this value in accord with the shape of the boxplot?
Answer
Solution
(a) The data run from 20.77 to 34.82. A convenient scale to cover this range of values runs from 20 to 40. In this case,
This is smaller than the sample minimum, so the left-hand whisker will extend as far as the minimum observation 20.77. (In other words, the lower adjacent value is equal to the sample minimum.) Similarly,
This is greater than the sample maximum, so the upper adjacent value is the same as the sample maximum. So with this data set, there are no extreme values to be plotted separately. The boxplot is shown in Figure 3.1.
Figure 1.5a Boxplot for silica content of chondrite meteors
Show description|Hide description
Figure 1.5a
Figure 1.5a Boxplot for silica content of chondrite meteors
(b) The sample skewness is negative, indicating that the data are left-skew. To some extent the boxplot reflects this: the left whisker is considerably longer than the right, indicating that the smaller values are more spread out than are the larger values. However, the box gives a different impression. The box corresponds to the middle half of the data values, and the line denoting the median divides this into two parts, each corresponding to one-quarter of the data. In this case, the left part of the box is shorter than the right part. In other words, the box suggests that the data might be right-skew rather than left-skew. So the pattern of asymmetry of these data is not straightforward.
In assessing patterns of skewness from a boxplot, you are looking at five different values: the upper and lower adjacent values, the upper and lower quartiles, and the median. It is thus possible, in some cases at least, to observe somewhat complicated patterns of skewness. On the other hand, calculating the sample skewness involves boiling the data down to a single value; and thus the sample skewness provides rather less information than a boxplot does about the shape of a data set.
The boxplot for the data in Table 1.1, which you were asked to draw in Activity 1, is shown in Figure 1.5.
Figure 1.5b A boxplot for silica content of chondrite meteors
Show description|Hide description
Figure 1.5b
Figure 1.5b A boxplot for silica content of chondrite meteors
This boxplot is clearly not symmetrical. However, the pattern of its skewness is not straightforward. The box, corresponding to the middle 50% of the data, appears to be right-skew, because the line marking the median is towards the left of the box (so that the right section of the box is longer than the left). However, the longer whisker is on the left, indicating a longer tail towards smaller values, which in turn suggests that the data are left-skew.
In this example, the sample skewness (−0.446) is in accord with the pattern suggested by the whiskers of the boxplot (left-skew), rather than with that suggested by the box. Essentially, this occurs because all the values in the data set are used to calculate the sample skewness; and the calculation involves a sum of powers of values, so that the sample skewness is particularly affected by the more extreme values in the data set. In a boxplot, the whiskers correspond to the more extreme values. In Figure 1.5, the whiskers suggest that the data are left-skew, matching the sample skewness.
1.3 Comparing data sets using boxplots
Example 1.2 Infants with SIRDS: boxplots
Boxplots are particularly useful for making quick comparisons. The following example relates to birth weights of infants exhibiting severe idiopathic respiratory distress syndrome (SIRDS), and the question ‘Is it possible to relate the chances of eventual survival to birth weight?’ The data in Table 1.3 are the recorded birth weights of infants who displayed the syndrome.
Table 1.3 Birth weights (in kg) of infants with severe idiopathic respiratory distress syndrome
| 1.050 | 2.500 | 1.890 | 1.760 | 2.830 |
| 1.175 | 1.030 | 1.940 | 1.930 | 1.410 |
| 1.230 | 1.100 | 2.200 | 2.015 | 1.715 |
| 1.310 | 1.185 | 2.270 | 2.090 | 1.720 |
| 1.500 | 1.225 | 2.440 | 2.600 | 2.040 |
| 1.600 | 1.262 | 2.560 | 2.700 | 2.200 |
| 1.720 | 1.295 | 2.730 | 2.950 | 2.400 |
| 1.750 | 1.300 | 1.130 | 3.160 | 2.550 |
| 1.770 | 1.550 | 1.575 | 3.400 | 2.570 |
| 2.275 | 1.820 | 1.680 | 3.640 | 3.005 |
| child died |
van Vliet, P.K. and Gupta, J.M. (1973) Sodium bicarbonate in idiopathic respiratory distress syndrome. Arch. Disease in Childhood, 48, 249–255.
An initial investigation of the question might involve histograms of the two sets of birth weights, as well as calculating their sample means, standard deviations and skewnesses. The results in this case would show that the mean birth weight of the infants who survived is considerably higher than the mean birth weight of the infants who died, and that the standard deviation of the birth weights of the infants who survived is also higher. Using boxplots we will now be able to make some further headway with the question.
For the birth weights (in kg) of the infants who survived, the lower quartile, median and upper quartile are, respectively, 1.72, 2.20 and 2.83. For the infants who died, the corresponding quartiles are 1.23, 1.60 and 2.20. Using these figures, together with the original data in Table 1.3 above, boxplots of the two data sets can be constructed. Notice that in both cases (as in Activity 1) the adjacent values are equal to the sample maxima and minima, so that the whiskers extend to the ends of the sample range. Plotting both boxplots against the same scale produces the diagram in Figure 1.6.
Figure 1.6 Comparative boxplots: birth weights of infants with SIRDS
Show description|Hide description
Figure 1.6
Figure 1.6 Comparative boxplots: birth weights of infants with SIRDS
As you saw in Subsection 1.1, a boxplot gives graphical information on the location, the dispersion and the skewness of a data set – that is, on the three aspects of the data set for which summary measures were introduced in Unit A1. In addition, a boxplot draws attention to certain potential outliers. Thus comparative boxplots, as in Figure 1.6, can be used to compare these four features in the data sets shown. This has been done in producing the following discussion of the SIRDS data.
Comparison of location: Figure 1.6 shows that the median birth weight of infants who survived is greater than that of those who died.
Comparison of dispersion: The interquartile ranges are reasonably similar (as shown by the lengths of the boxes), though the overall range of the data set is greater for the surviving infants (as shown by the distances between the ends of the two whiskers for each boxplot).
Comparison of skewness: Though both batches of data appear to be right-skew, and the batch for the infants who died is slightly more skewed than that for those who survived, the skewness is not particularly marked in either case. (In fact, the sample skewness for the birth weights of the infants who survived is 0.25; and for the infants who died, it is 0.53. Both skewnesses are positive; the value for the infants who died is rather larger, corresponding to a more marked lack of symmetry, but neither skewness is particularly large.)
Comparison of potential outliers: Neither data set shows any suspiciously far out values which might require a closer look.
General conclusions: Overall, the two batches of data look as if they were generally distributed in a similar way, but with one batch located to the right (larger location) of the other. You can see immediately that the median birth weight of infants who died is less than the lower quartile of the birth weights of infants who survived (that is, over three-quarters of the survivors were heavier than the median birth weight of those who died). So it looks as if we can safely say that survival is related to birth weight.
You can see how comparative boxplots give a compact, quickly assimilated summary of the data, suggesting that infants who survive and infants who do not may typically have different birth weights.
When using boxplots to compare two or more batches of data, it is usually best to compare individual features in a methodical way. You may find the following guidelines helpful.
Guidelines for comparing boxplots
Compare the respective medians, to compare location.
Compare the interquartile ranges (that is, the box lengths), to compare dispersion.
Look at the overall spread as shown by the adjacent values. (This is another aspect of dispersion.)
Look for signs of skewness. If the data do not appear to be symmetric, does each batch show the same kind of asymmetry?
Look for potential outliers.
After discussing these features, general conclusions should be summarized briefly.
Let us look at another example. This time, you are asked to do the work!
1.4 Boxplot activity 2
Activity 2 Boxplots of family sizes
The table below contains data on the sizes (numbers of children) of the completed families of two samples of mothers in Ontario. One sample of mothers had had fewer years of education than the other sample (six years or less for mothers in the first sample, and seven years or more for those in the other sample).
Table 1.4 Family size: mothers married aged 15–19
| Mother educated for six years or less |
| 14 13 4 14 10 2 13 5 0 0 13 3 9 2 10 11 13 5 14 |
| Mother educated for seven years or more |
| 0 4 0 2 3 3 0 4 7 1 9 4 3 2 3 2 16 6 0 13 6 6 5 9 10 5 4 3 3 5 2 3 5 15 5 |
Keyfitz, N. (1953) A factorial arrangement of comparisons of family size. American J. Sociology, 53, 470–480.
Comparative boxplots of the family size data are shown in Figure 1.7.
Figure 1.7 Comparative boxplots: family sizes for two groups of mothers
Show description|Hide description
Figure 1.7
Figure 1.7 Comparative boxplots: family sizes for two groups of mothers
Compare the two samples of data using the systematic approach just outlined in the text. What conclusions can you draw about an association between education and family size?
Answer
Solution
Following the five steps for comparing boxplots outlined in the text, we begin with the medians (step 1). These are well separated, with the median for mothers with less education being higher at an astonishing 10. The length of the box for these mothers is more than twice that of the other box (step 2). The overall spreads (distances between adjacent values) are roughly similar for the two data sets (step 3). However, this comparison is perhaps less informative about dispersion than the comparison of box lengths, because of the potential outliers in the data set for mothers with more education. The overall range for mothers with more education is rather greater if these ‘outliers’ are included. However, if the untypicality of these values were to be seen as a reason for omitting them, the range for the mothers with less education would be the greater. Whether or not they are omitted, the difference in range is not huge.
The boxplot for mothers with less education shows some slight left-skew: the left whisker is longer than the right (step 4). The main body of data for the mothers with more years of education looks symmetric, but there are three large potential outliers which would undoubtedly have an effect on any calculations of skewness (step 5).
The two batches of data seem to be distributed differently in a way which is not merely the result of difference in location. The median for the mothers with less education is close to the upper adjacent value for the mothers with more education, which leads to the conclusion that the mother's education varies with family size. The main difference between the groups lies in their different concentrations around the median rather than their overall spread of values. The potential outliers for the mothers with more education are not very far from the upper adjacent value for the other sample, and are marked as outliers essentially because of the comparatively low interquartile range for the sample into which they fall.
The overall conclusion is that the mother's education does vary with family size, with those mothers receiving six or less years of formal education having, on average, larger families.
One thing the boxplots have also shown is that three data values in one of the samples are perhaps not typical; so calculations of the mean, standard deviation and skewness should be treated with certain amount of scepticism.
1.5 Summary
In this section you have been introduced to the boxplot. This is a graphic that represents the key features of a set of data. A typical boxplot is shown in Figure 1.8.
Figure 1.8 A typical boxplot
Show description|Hide description
Figure 1.8
Figure 1.8 A typical boxplot
The ends of the box mark the quartiles, and the vertical line through the box is located at the median. The whiskers of a boxplot extend to values known as adjacent values. These are the values in the data that are furthest away from the median on either side of the box, but are still within a distance of 1.5 times the interquartile range from the nearest end of the box (that is, the nearer quartile). In many cases the whiskers actually extend right out to the most extreme values in the data set. However, in other cases they do not. Any values in the data set that are more extreme than the adjacent values are plotted as separate points on the boxplot. This identifies them as potential outliers that may need further investigation.
A boxplot depicts only some basic aspects of the distribution of the values in data set. But often these basic aspects are the ones of most interest. It is straightforward to draw boxplots of more than one data set on the same scale, and then to use them to compare important aspects of the distribution of the data sets. A systematic approach to carrying out such comparisons has been described.
1.6 Exercise
Activity 3 Exercise 1.1 Memory recall times
In a study of memory recall times, a series of stimulus words was shown to a subject on a computer screen. For each word, the subject was instructed to recall either a pleasant or an unpleasant memory associated with that word. Successful recall of a memory was indicated by the subject pressing a bar on the computer keyboard. Table 1.5 shows the recall times (in seconds) for twenty pleasant and twenty unpleasant memories.
Table 1.5 Memory recall times (seconds)
| Pleasant memory | Unpleasant memory |
| 1.07 | 1.45 |
| 1.17 | 1.67 |
| 1.22 | 1.90 |
| 1.42 | 2.02 |
| 1.63 | 2.32 |
| 1.98 | 2.35 |
| 2.12 | 2.43 |
| 2.32 | 2.47 |
| 2.56 | 2.57 |
| 2.70 | 3.33 |
| 2.93 | 3.87 |
| 2.97 | 4.33 |
| 3.03 | 5.35 |
| 3.15 | 5.72 |
| 3.22 | 6.48 |
| 3.42 | 6.90 |
| 4.63 | 8.68 |
| 4.70 | 9.47 |
| 5.55 | 10.00 |
| 6.17 | 10.93 |
Dunn, G. and Master, D. (1982) Latency models: the statistical analysis of response times. Psychological Medicine, 12, 659–665.
Of key interest in this study was whether pleasant memories could be recalled more easily and quickly than unpleasant ones. Comparative boxplots for the two samples are shown in Figure 1.9.
Figure 1.9 Comparative boxplots of memory recall times
Show description|Hide description
Figure 1.9
Figure 1.9 Comparative boxplots of memory recall times
Use the boxplots to compare the distributions of recall times for the two types of memory.
Answer
Solution
The most obvious feature is that the recall times for unpleasant memories are on the whole longer than those for pleasant memories – the median, the lower quartile and the upper quartile for the ‘unpleasant’ sample are all above the corresponding values for the ‘pleasant’ sample. The dispersion is also considerably greater for the ‘unpleasant’ sample. (The interquartile range, as shown by the box lengths, is longer, and indeed so is the overall range and the lengths of the ‘whiskers’.)
Both samples are also skew. The pattern of skewness is simpler for the ‘unpleasant’ sample. It is clearly right-skew, with a long tail to the right (high values), as shown by the longer right whisker and also by the fact that the right part of the box (median to upper quartile) is longer than the left part. The ‘pleasant’ sample is not symmetric, but its pattern of skewness is a little more complicated to describe. The upper (right) whisker is longer than the lowe whisker, but the upper part of the box is shorter than the lower part.
Only one potential outlier is picked out in the boxplot – a relatively high value for the ‘pleasant’ sample. In view of the fact that it is actually not all that much higher than the upper adjacent value, perhaps this value should cause us no particular concern.
2 Producing useful tables
In much of your statistical work, you will begin with data set, often presented in the form of a table, and use the information in the table to produce diagrams and/or summary statistics that help in the interpretation of the data set. However, in practice, much interpretation of data sets can be done directly from an appropriate table of data, or by re-presenting the data in a rather different tabular form. Dealing with data in tables is the subject of this section and the next. By the time you have finished you should be able to produce tables which make certain aspects of the data in question more obvious.
2.1 Data sets in different tabular forms
Example 2.1 Lung cancer deaths in South Australia
Table 2.1 contains raw data on the incidence and mortality for lung cancer in South Australia in 1981.
Table 2.1 Age group, male and of population sizes, male and female cases, male and female deaths
| 0–4 | 47589 | 45273 | 0 | 0 | 0 | 0 |
| 5–9 | 53814 | 50672 | 0 | 0 | 0 | 0 |
| 10–14 | 58561 | 55645 | 0 | 0 | 0 | 0 |
| 15–19 | 59408 | 57756 | 0 | 0 | 0 | 0 |
| 20–24 | 58443 | 57249 | 0 | 0 | 0 | 0 |
| 25–29 | 54341 | 53376 | 0 | 0 | 1 | 0 |
| 30–34 | 53456 | 52978 | 1 | 0 | 1 | 0 |
| 35–39 | 42113 | 41988 | 0 | 2 | 0 | 0 |
| 40–44 | 35648 | 35547 | 2 | 5 | 3 | 3 |
| 45–49 | 32911 | 31799 | 8 | 2 | 10 | 2 |
| 50–54 | 36485 | 35333 | 38 | 8 | 26 | 8 |
| 55–59 | 35192 | 35555 | 61 | 18 | 43 | 8 |
| 60–64 | 28131 | 30868 | 67 | 16 | 57 | 15 |
| 65–69 | 24419 | 27390 | 88 | 15 | 69 | 17 |
| 70–74 | 16613 | 21402 | 60 | 21 | 61 | 21 |
| 75–79 | 9958 | 14546 | 46 | 10 | 46 | 9 |
| 80–84 | 4852 | 9749 | 24 | 6 | 23 | 4 |
| 85+ | 2790 | 7477 | 7 | 2 | 8 | 3 |
O'Neill, T. J., Tallis, G. M. and Leppard, P. (1985) The epidemiology of a disease using hazard functions. Australian Journal of Satistics, 27, 283–297.
A table like Table 2.1 may be adequate for someone who is merely taking a quick look at the data, perhaps prior to carrying out an analysis, but it is not the best way of presenting the figures to most readers. The objectives in producing a table that is actually being used to communicate information are to make the data immediately clear, and to facilitate picking out important patterns in them with the minimum of effort. To this end, there are several guidelines for producing tables which should be borne in mind.
Guidelines for tables
Labelling of rows and columns should be clear and unambiguous.
A table should contain the minimum amount of information needed to communicate its message. This may involve splitting the data into several simpler tables or pooling cells.
It may be appropriate to simplify the numbers in a table to aid speedy comprehension.
Useful summary statistics or calculation results should be added, where appropriate, to help communicate the message.
These guidelines will be followed in relation to Table 2.1 to see what changes they suggest.
2.2 Basic table layout
As Table 2.1 stands, it is hard to assimilate the information. Indeed it is not at all clear what any of the numbers mean. Even doing something as simple as giving the columns proper headings and drawing a few lines to separate the headings from the rest of the data, as in Table 2.2, make a big difference to clarity (guideline 1).
Table 2.2 South Australia: incidence and mortality for lung cancer, 1981
| Age group | Population size | New cases | Deaths |
| Male | Female | Male | Female | Male | Female |
| 0–4 | 47589 | 45273 | 0 | 0 | 0 | 0 |
| 5–9 | 53814 | 50672 | 0 | 0 | 0 | 0 |
| 10–14 | 58561 | 55645 | 0 | 0 | 0 | 0 |
| 15–19 | 59408 | 57756 | 0 | 0 | 0 | 0 |
| 20–24 | 58443 | 57249 | 0 | 0 | 0 | 0 |
| 25–29 | 54341 | 53376 | 0 | 0 | 1 | 0 |
| 30–34 | 53456 | 52978 | 1 | 0 | 1 | 0 |
| 35–39 | 42113 | 41988 | 0 | 2 | 0 | 0 |
| 40–44 | 35648 | 35547 | 2 | 5 | 3 | 3 |
| 45–49 | 32911 | 31799 | 8 | 2 | 10 | 2 |
| 50–54 | 36485 | 35333 | 38 | 8 | 26 | 8 |
| 55–59 | 35192 | 35555 | 61 | 18 | 43 | 8 |
| 60–64 | 28131 | 30868 | 67 | 16 | 57 | 15 |
| 65–69 | 24419 | 27390 | 88 | 15 | 69 | 17 |
| 70–74 | 16613 | 21402 | 60 | 21 | 61 | 21 |
| 75–79 | 9958 | 14546 | 46 | 10 | 46 | 9 |
| 80–84 | 4852 | 9749 | 24 | 6 | 23 | 4 |
| 85+ | 2790 | 7477 | 7 | 2 | 8 | 3 |
There is, of course, still an enormous amount of information to absorb, but the labelling is better and, above all, the table is more or less self-explanatory.
But it is important to consider what information we really want the table to convey to the reader. Here there are often choices to be made. Table 2.2 includes data on the population size in different age groups, and these data could be used to investigate the average age of the population, or the way in which the proportions of people in different age groups differ between males and females. If we wanted to convey this particular kind of information, it would make sense to simplify the table in various ways — for instance, all the data about lung cancer cases and deaths could simply be omitted! But, for this particular data set, it is much more likely that we would be interested primarily in the lung cancer cases and deaths, and in that case we would be interested in the population counts only insofar as they are related to the lung cancer counts. In that case, there is an immediate and obvious simplification to be made. There were no lung cancer cases or deaths in people aged up to 24, so we can simply pool together the first five rows of the table as in Table 2.3.
Table 2.3 South Australia: incidence and mortality for lung cancer, 1981
| Age group | Population size | New cases | Deaths |
| Male | Female | Male | Female | Male | Female |
| 0–24 | 277815 | 266595 | 0 | 0 | 0 | 0 |
| 25–29 | 54341 | 53376 | 0 | 0 | 1 | 0 |
| 30–34 | 53456 | 52978 | 1 | 0 | 1 | 0 |
| 35–39 | 42113 | 41988 | 0 | 2 | 0 | 0 |
| 40–44 | 35648 | 35547 | 2 | 5 | 3 | 3 |
| 45–49 | 32911 | 31799 | 8 | 2 | 10 | 2 |
| 50–54 | 36485 | 35333 | 38 | 8 | 26 | 8 |
| 55–59 | 35192 | 35555 | 61 | 18 | 43 | 8 |
| 60–64 | 28131 | 30868 | 67 | 16 | 57 | 15 |
| 65–69 | 24419 | 27390 | 88 | 15 | 69 | 17 |
| 70–74 | 16613 | 21402 | 60 | 21 | 61 | 21 |
| 75–79 | 9958 | 14546 | 46 | 10 | 46 | 9 |
| 80–84 | 4852 | 9749 | 24 | 6 | 23 | 4 |
| 85+ | 2790 | 7477 | 7 | 2 | 8 | 3 |
This simplification, in line with guideline 2, has not lost any information about lung cancer at all, and the table is now easier to comprehend.
2.3 Table activity
Table 2.4 South Australia: incidence and mortality for lung cancer, 1981
| Age group | Population size | New cases | Deaths |
| Male | Female | Male | Female | Male | Female |
| 0–39 | 427725 | 414937 | 1 | 2 | 2 | 0 |
| 40–44 | 35648 | 35547 | 2 | 5 | 3 | 3 |
| 45–49 | 32911 | 31799 | 8 | 2 | 10 | 2 |
| 50–54 | 36485 | 35333 | 38 | 8 | 26 | 8 |
| 55–59 | 35192 | 35555 | 61 | 18 | 43 | 8 |
| 60–64 | 28131 | 30868 | 67 | 16 | 57 | 15 |
| 65–69 | 24419 | 27390 | 88 | 15 | 69 | 17 |
| 70–74 | 16613 | 21402 | 60 | 21 | 61 | 21 |
| 75–79 | 9958 | 14546 | 46 | 10 | 46 | 9 |
| 80–84 | 4852 | 9749 | 24 | 6 | 23 | 4 |
| 85+ | 2790 | 7477 | 7 | 2 | 8 | 3 |
Simplifying the table further
Do you think it would make sense to continue this process of simplification by pooling more rows? If so, which rows would you pool?
Discussion
Comment
Since there were new cases, or deaths, and indeed usually both, in all the other age groups, the pooling of rows cannot be continued further without losing some information that was in the original table. But, in fact, there are very few cases in either gender group under the age of 40. So, if the corresponding rows are pooled, to give Table 2.4, very little information is lost (and, arguably, nothing at all important in relation to lung cancer). (You might have suggested a slightly different set of rows to pool.)
2.4 Including the results of useful calculation
Can Table 2.4 be simplified further by pooling more rows or columns? Perhaps it might be, but there may well be a risk of losing some important or relevant information. So, before considering any further simplification, we shall look at adding information to the table, in the form of the results of some helpful calculations (guideline 4).
On their own, some of the numbers in the table still do not mean a great deal. There were 61 new cases among males in the 55–59 age group. But how does this compare with males in other age groups, and with females? There were 60 new cases for males aged 70–74. On the face of it this looks very close to the figure for the 55–59 group. But there were far more males in the South Australian population aged 55–59 than there were aged 70–74 (35192 compared to 16613). It seems likely that the main interest in these data is in the varying chances of developing lung cancer or dying from it, at different ages and for the two genders. To find out something about this, it is useful to calculate the proportions of the different age groups that became new cases of lung cancer. For males aged 55–59, the proportion is 61/35192=0.0017333, or 0.17333% as a percentage. For males aged 70–74 the corresponding proportion is 60/16613=0.0036116, or 0.36116%. It is very common, and often very useful, to calculate such quantities, which are often known as rates.
For the time being, we shall just look at the new cases and omit the information on deaths. The rate for new cases in each age group has been calculated for males and for females; these rates are included in Table 2.5. As you can see, these numbers do not look particularly user-friendly!
Table 2.5 South Australia: incidence for lung cancer, 1981
| Age group | Population size | New cases | New cases as % of population size |
| Male | Female | Male | Female | Male | Female |
| 0–39 | 427725 | 414937 | 1 | 2 | 0.0023380 | 0.0048200 |
| 40–44 | 35648 | 35547 | 2 | 5 | 0.056104 | 0.014066 |
| 45–49 | 32911 | 31799 | 8 | 2 | 0.024308 | 0.062895 |
| 50–54 | 36485 | 35333 | 38 | 8 | 0.10415 | 0.022642 |
| 55–59 | 35192 | 35555 | 61 | 18 | 0.17333 | 0.050626 |
| 60–64 | 28131 | 30868 | 67 | 16 | 0.23817 | 0.051834 |
| 65–69 | 24419 | 27390 | 88 | 15 | 0.36038 | 0.054765 |
| 70–74 | 16613 | 21402 | 60 | 21 | 0.36116 | 0.098122 |
| 75–79 | 9958 | 14546 | 46 | 10 | 0.46194 | 0.068747 |
| 80–84 | 4852 | 9749 | 24 | 6 | 0.49464 | 0.061545 |
| 85+ | 2790 | 7477 | 7 | 2 | 0.25090 | 0.026749 |
The table still looks pretty horrible and the information it contains is difficult to assimilate, largely because there is too much clutter from information of dubious relevance, and also because far too many decimal places are included in the last two columns. The latter problem is easily solved, in accord with guideline 3. First, note that (for example) the figure of 0.098122% for females aged 70–74 means that, for every 100 women in this age group (in South Australia in 1981), there were 0.098122 new cases of lung cancer. In this context there is nothing special about calculating the rate per 100 women in the population. Instead, the number of cases per 100 000 women in the population will be calculated. This has the effect of multiplying all the rates by 1000, which gets rid of most of the occurrences of ‘0.0…’ at the start of the numbers, and hence makes the table easier to read. Also, simply to get across the main message of these data does not require five significant figures. Instead, in Table 2.6, the figures are given to one decimal place.
Table 2.6 South Australia: incidence for lung cancer, 1981
| Age group | Population size | New cases | Newcases per 100 000 population |
| Male | Female | Male | Female | Male | Female |
| 0–39 | 427725 | 414937 | 1 | 2 | 0.2 | 0.5 |
| 40–44 | 35648 | 35547 | 2 | 5 | 5.6 | 14.1 |
| 45–49 | 32911 | 31799 | 8 | 2 | 24.3 | 6.3 |
| 50–54 | 36485 | 35333 | 38 | 8 | 104.2 | 22.6 |
| 55–59 | 35192 | 35555 | 61 | 18 | 173.3 | 50.6 |
| 60–64 | 28131 | 30868 | 67 | 16 | 238.2 | 51.8 |
| 65–69 | 24419 | 27390 | 88 | 15 | 360.4 | 54.8 |
| 70–74 | 16613 | 21402 | 60 | 21 | 361.2 | 98.1 |
| 75–79 | 9958 | 14546 | 46 | 10 | 461.9 | 68.7 |
| 80–84 | 4852 | 9749 | 24 | 6 | 494.6 | 61.5 |
| 85+ | 2790 | 7477 | 7 | 2 | 250.9 | 26.7 |
Now does it make sense to simplify the table any further? If we want to use it to communicate information about the relative chances of being diagnosed as a new case of lung cancer at different ages and for the two genders, the ‘Population size’ and ‘New cases’ columns do not actually give very relevant information. It might therefore be reasonable to omit them. Furthermore, the general pattern of the new case rates at different ages can be communicated with rather fewer age groups than were used in Table 2.6. Table 2.7 uses fewer and coarser age groupings, and the only figures given are the calculated values of the new cases per 100 000 and deaths per 100 000; these have been rounded to one decimal place. (Note that the figures for new cases in Table 2.7 cannot be calculated simply from the rates given in the last two columns of Table 2.6. The appropriate population sizes and counts of cases must be aggregated and the aggregates used to calculate the rates.)
Table 2.7 South Australia: incidence and mortality for lung cancer, 1981 (rates per 100,000 population)
| Age group | New cases | Deaths |
| Male | Female | Male | Female |
| 0–49 | 2.2 | 1.9 | 3.0 | 1.0 |
| 50–59 | 138.1 | 36.7 | 96.3 | 22.6 |
| 60–69 | 295.0 | 53.2 | 239.8 | 54.9 |
| 70–79 | 398.9 | 86.2 | 402.7 | 83.5 |
| 80+ | 405.7 | 46.4 | 405.7 | 40.6 |
(Whole numbers in the deaths column would arguably have been quite adequate to get across the message of these data. Using one decimal place has the advantage of making it clear that these are rates, and not counts of individual cases.)
This is a quickly assimilated table that communicates the pattern of incidence and death from lung cancer, in relation to population size. It is easy to compare the figures for males and females, and it is equally easy to compare incidence with mortality in any of the age groups.
Activity 4 Describing data in a table
(a) Describe the main patterns in the data on lung cancer in South Australia, on the basis of Table 2.7.
(b) Table 2.7 is certainly much simpler than the earlier tables in this section, and you would probably agree that the patterns in the data are easier to see. But can you think of any disadvantages of the presentation in Table 2.7 compared to the other tables?
Answer
Solution
(a) The pattern of incidence of lung cancer for males in South Australia may be described as follows. There are very few new cases in men aged under 50 years, but the rate rises rapidly for men in their 50s and 60s. The increase levels off above age 70. The pattern of mortality for males is very similar to that for incidence. For females, both incidence and mortality are again very low below 50 years of age and increase after that, but the incidence and mortality rates remain much lower than for men (about one quarter or one fifth of the level for men). Also the incidence and mortality rates for women reduce quite considerably in the oldest age groups.
(b) One problem is that the information on how many people were involved has been entirely removed. One pattern that was noted in part (a) is the fall in incidence and mortality rates for women aged over 80. However, we cannot tell from Table 2.7 that there were actually only 8 new cases and 7 deaths in women in these age groups. With numbers of cases this small, a few extra cases in one year, such as we might expect just on the basis of random variability, would show up as a large rise in the incidence rate. Without knowing something about the numbers from which the rates in Table 2.7 were calculated, it is not possible to take this into account. Thus, for example, in writing report about these matters, it would be good statistical practice to include the counts of cases and deaths somewhere, even if not in the same table as that including the rates.
Do you agree that Table 2.7 conforms to all of the four guidelines given at the beginning of this section? After you have produced a table for yourself, it is always a good idea to check it carefully against each of the four guidelines.
2.5 Early retirement from the National Health Service
Example 2.2: Early retirement from the National Health Service
A study was carried out to investigate various aspects of early retirement from the British National Health Service (NHS). In 1998–99, 5469 NHS employees from England and Wales were granted early retirement because of ill health. The researchers examined the records of a sample of 1994 of these people. Table 2.8 gives data on these people, classifying each of them by occupational group and by a broad classification of the health reason for which they retired.
Table 2.8 Retirements from the NHS because of ill health, 1998–99
| Occupational group | Reason for retiring because of ill health |
| Musculoskeletal | Cardiovascular | Psychiatric | Other | Total |
| Ambulance workers | 65 | 12 | 6 | 12 | 95 |
| Healthcare assistants or support | 339 | 61 | 77 | 117 | 594 |
| Nurses or midwives | 364 | 144 | 70 | 153 | 731 |
| Technical or professional staff | 42 | 25 | 4 | 23 | 94 |
| Administration or estates staff | 118 | 94 | 31 | 66 | 309 |
| Doctors or surgeons | 33 | 40 | 20 | 28 | 121 |
| Other | 22 | 13 | 7 | 8 | 50 |
| Total | 983 | 389 | 215 | 407 | 1994 |
This table is adapted from Pattani, S., Constantinovici, N., and Williams, S. (2001) Who retires early from the NHS because of ill health and what does it cost? A national cross sectional study. British Medical Journal, 322, 208–209.
Activity 5 Early retirement from the National Health Service
Suppose that the main interest of the researchers was to see whether (and, if so, how) the pattern of causes of retirement differed between occupational groups. How does the table, as it stands, match up to the guidelines given at the start of this section?
Answer
Solution
The labelling of rows and columns is reasonably clear as it stands (guideline 1). Assuming that the researchers were interested separately in all these occupational groups and all these reasons for retirement, there seem to be no good reasons for breaking up the table or combining cells (guideline 2). The numbers in the table are counts and not particularly large ones (three digits at most, apart from the overall total) and there seems no reason to simplify them (guideline 3).
However, it might help to include some calculation results (guideline 4). As the table stands, it is reasonably easy to see that (for instance) in each occupational group, the greatest number of retirements was due to musculoskeletal reasons, but it is not easy to compare just how much bigger that count is relative to the others in each occupational group, because the total number of retirements differs considerably from one occupational group to another. This sort of comparison would be more straightforward if we knew, for instance, the proportion or percentage of people in each occupational group who retired for musculoskeletal reasons.
Activity 6 Early retirement from the National Health Service: percentages
(a) For each occupational group, calculate the percentage of people who retired because of each cause of ill health. Use these percentages to comment on the different patterns of causes of retirement in the different occupational groups.
(b) Assuming you found the percentages useful for making these comparisons, say whether you think that a table presenting this information should include only the counts (as in Table 2.8), only the percentages that you calculated, or both.
Answer
Solution
(a) The percentage of people in each occupational group who retired because of each cause of ill health is given in Table 2.9.
Table 2.9 Retirements from the NHS because of ill health, 1998–99
| Occupational group | Reason for retiring because of ill health (% of row total) |
| Musculoskeletal | Psychiatric | Cardiovascular | Other |
| Ambulance workers | 68 | 13 | 6 | 13 |
| Healthcare assistants or support | 57 | 10 | 13 | 20 |
| Nurses or midwives | 50 | 20 | 10 | 21 |
| Technical or professional staff | 45 | 27 | 4 | 2 |
| Administration or estates staff | 38 | 30 | 10 | 21 |
| Doctors or surgeons | 27 | 33 | 17 | 23 |
| Other | 44 | 26 | 14 | 16 |
| Total | 49 | 20 | 11 | 20 |
For instance, the proportion of the ambulance workers who retired because of ill health for musculoskeletal causes is 65/95=0.68421, or 68.421%. However, there is no need to include three decimal places to portray the patterns in the data clearly. Whole percentages are sufficiently accurate; so this percentage has been entered in the table as 68%. The other percentages were calculated in a similar way.
(Note that, because of the rounding of the percentages, the sums of some of the rows are 99% or 101% rather than 100%. In the context of communicating the general pattern of the data, this does not matter.)
Perhaps the most obvious difference between the occupational groups is that the percentage of retirements for musculoskeletal causes was considerably greater in the first two groups than in some of the others, particularly administrators and doctors. The authors of the paper from which these data are taken attribute this difference to the greater amount of manual work done by workers in the first two categories. The occupational groups with relatively low levels of retirement for musculoskeletal causes also had relatively high percentages of retirements for psychiatric causes. Without further investigation, and in particular without having looked at what proportion of workers in each of these groups actually retired on grounds of ill health (rather than continuing to work), it is difficult to say more about the reasons for these patterns.
(b) The question of whether to include the percentages in a table as well as, or instead of, the counts does not have a clear-cut answer. The table given in the paper from which these data were obtained includes both. This makes the table rather complicated, and the patterns of different causes of retirement is not entirely clear at a glance. However, in interpreting the data it is important to know that the number of ill-health retirements in some of these groups was not particularly large. A useful compromise would have been to include the total number of retirements from which the percentages in each row were calculated, as in Table 2.10. In general, when calculating row percentages (or column percentages) in a table in this way, it is good practice to include the totals that were used to calculate the percentages as well.
Table 2.10 Retirements from the NHS because of ill health, 1998–99
| Occupational group | Reason for retiring because of ill health (%of row total) |
| Musculoskeletal | Psychiatric | Cardiovascular | Other | Total (=100%) |
| Ambulance workers | 68 | 13 | 6 | 13 | 95 |
| Healthcare assistants or support | 57 | 10 | 13 | 20 | 594 |
| Nurses or midwives | 50 | 20 | 10 | 21 | 731 |
| Technical or professional staff | 45 | 27 | 4 | 24 | 9 |
| Administration or estates staff | 38 | 30 | 10 | 21 | 309 |
| Doctors or surgeons | 27 | 33 | 17 | 23 | 121 |
| Other | 44 | 26 | 14 | 16 | 50 |
| Total | 49 | 20 | 11 | 20 | 1994 |
2.6 Summary
In this section you have been introduced to some guidelines for presenting data in tables. These guidelines apply particularly when the data in a table are being used to illustrate a particular point or to show up clearly a particular pattern.
You have seen that, in some circumstances, following the second of these guidelines leads to some pooling together of rows. (In other cases, it could be columns or individual cells that are pooled.) However, care is needed when, by making such simplifications, information is lost from the table. The examples of the application of guideline 4 that you have seen involve calculating appropriate ratios or rates. Such calculations are very common in dealing with data in tabular form.
3 Interpreting data in table
In Section 2, the main concern was with producing a table of data, for others to read, that communicates clearly the important patterns or messages in the data. In this section, the focus changes slightly. Your role will be that of the reader or user of the data in a table, and you will learn about approaches that make it easier for you to extract information from a table. However, manipulating tabular data into a form that makes it clearer to others will also, very often, make it clearer to you as well. So the approaches introduced in Section 2 will be useful in this section too. You will have more practice in choosing and calculating appropriate ratios and rates for tabular data. You will also see examples where it is appropriate to go one step further than you did in Section 2: rather than leaving the data in tabular form, relevant graphs will be drawn as well.
3.1 Health personnel in Thailand
There are practically no new theories or new principles in this section. We shall work through some examples, and you will see how basic techniques and approaches that you have already learned can be combined to allow you to use tabular data efficiently.
Example 3.1 Health personnel in Thailand
The data shown in Table 3.1 are taken from the Thailand Mini Health Profile 1988, published by the Ministry of Public Health, Bangkok. They show the numbers of health care personnel at approximately five-year intervals.
Table 3.1 Health personnel in Thailand, 1966–1984
| Category | 1966 | 1971 | 1976 | 1981 | 1984 |
| Physicians | 3609 | 4092 | 5210 | 6931 | 8058 |
| Dentists | 253 | 532 | 600 | 1057 | 1326 |
| Pharmacists | 940 | 1586 | 1757 | 2680 | 3312 |
| Nurses | 6876 | 9760 | 13700 | 19599 | 31827 |
| Midwives | 2834 | 4989 | 7304 | 8577 | 8573 |
| Total | 14512 | 20959 | 28571 | 38844 | 53096 |
What do these data tell us about the change in health care personnel in Thailand over the period in question, and how can we work with the data in the table to make any pattern clearer?
First, notice that some features of the data are obvious. The total number of health care personnel increased hugely between 1966 and 1984, from under 15 000 to about 53 000. Also, throughout the period, the biggest category of staff was that of Nurses, and this category seems to have grown more rapidly than some of the others. (In 1966, there were very roughly twice as many nurses as there were doctors, for instance, but in 1984 there were almost four times as many nurses as there were doctors.)
How could the patterns that have already been identified be made clearer? The pattern of overall increase in numbers is already clear from the last row of the table. Perhaps it could be made even clearer by drawing an appropriate graph; we shall return to this idea later.
In Activity 6, the patterns of retirement reasons in different occupational groups were made easier to see by calculating how large each entry was as a percentage of the corresponding row total. In Activity 7, you are asked to consider whether similar approach would help here.
3.2 Health care personnel in Thailand: activities
Activity 7 Health care personnel in Thailand: calculating percentages
Would it be helpful, in considering possible changes in the way health care personnel are divided into the five categories listed, to recalculate the numbers in the body of Table 3.1 as percentages either of the row totals or of the column totals? If you think it would be helpful, calculate the appropriate percentages and use the resulting table to comment on the data.
Answer
Recalculating the numbers in the body of the table as percentages of the totals of the columns would show clearly how the total number of health personnel in each year is divided between the five categories. It would not be very meaningful to calculate the percentages of the row totals. The results of calculating the numbers as percentages of the column totals are shown in Table 3.2.
Table 3.2 Health personnel in Thailand, 1966–1984 (percentages of column totals)
| Category | 1966 | 1971 | 1976 | 1981 | 1984 |
| Physicians | 25 | 20 | 18 | 18 | 15 |
| Dentists | 2 | 3 | 2 | 3 | 2 |
| Pharmacists | 6 | 8 | 6 | 7 | 6 |
| Nurses | 47 | 47 | 48 | 50 | 60 |
| Midwives | 20 | 24 | 26 | 22 | 16 |
| Total (= 100%) | 14512 | 20959 | 28571 | 38844 | 53096 |
These percentages show that the numbers for dentists and for pharmacists as percentages of the total health care personnel changed very little over the period covered by the table. However, the percentage of physicians fell reasonably steadily from 25% of the total in 1966 to 15% in 1984. The percentage of nurses grew slowly from 1966 to 1981, but then increased rapidly between 1981 and 1984. Finally, the percentage of midwives increased over the first ten years of the period covered, but then fell back to a level below the 1966 level. Of course, it should be borne in mind throughout that the total number of health care staff grew considerably over the period.
Your investigation in Activity 7 clarified the patterns in the original table; but it remains the case that the single most prominent feature of the table is the rise in total health care personnel over the period covered. However, it may well have occurred to you that the population served by these health care personnel also changed over the period in question. Thailand is, after all, a developing country that may well have experienced considerable population growth between 1966 and 1984.
In fact, estimates of the total population of Thailand in the years covered by Table 3.1 are also provided in the source from which that table was taken. They are given in Table 3.3.
Table 3.3 Estimated total population of Thailand, 1966–1984
| 1966 | 1971 | 1976 | 1981 | 1984 |
| Population (millions) | 31.1 | 35.4 | 40.3 | 44.9 | 50.7 |
These figures can be used to calculate the numbers of the different categories of health care personnel as a proportion of the total population. These proportions could, in principle at any rate, be shown as percentages, or as numbers per 100 000 population as in Example 2.1 (see especially Tables 2.6 and 2.7); but in this case they are clearer if shown as numbers per million population. The resulting proportions are given in Table 3.4. After reading through the table you should check that you understand how the numbers displayed were calculated.
Table 3.4 Health personnel per million population in Thailand, 1966–1984
| Category | 1966 | 1971 | 1976 | 1981 | 1984 |
| Physicians | 116.0 | 115.6 | 129.3 | 154.4 | 158.9 |
| Dentists | 8.1 | 15.0 | 14.9 | 23.5 | 26.2 |
| Pharmacists | 30.2 | 44.8 | 43.6 | 59.7 | 65.3 |
| Nurses | 221.1 | 275.7 | 340.0 | 436.5 | 627.8 |
| Midwives | 91.1 | 140.9 | 181.2 | 191.0 | 169.1 |
| Total | 466.6 | 592.1 | 709.0 | 865.1 | 1047.3 |
These calculations show clearly that, in relation to the size of the total population, the total numbers of health care personnel in Thailand rose considerably and steadily between 1966 and 1984. Putting it another way, the population rose over this period, but the numbers of health care personnel rose much faster. It would be reasonably straightforward to comment on the changes in the different categories in relation to total population on the basis of the numbers in Table 3.4, but this task can be made easier by drawing an appropriate graph.
Data like those in Table 3.4, where there is a value for each of a number of different times, are referred to as time series. (In this case, there are actually six different time series, one for each personnel category, plus one for the data on total health personnel.) A useful kind of graph for showing time series data is line plot. This is a scatterplot, with the times (years, in this case) along the horizontal axis and the actual data values of the time series along the vertical axis. It is conventional, for time series data, to join the resulting plots with straight line segments. This draws attention to the rate of change of the values in the series. For time series where there are large numbers of different time points, the symbols (for example, crosses or dots) representing the data points are often omitted for clarity. However, in these data there are only five time points so it is not necessary to do that. We could produce such line plots separately for each of the different categories, and indeed for the total. But it is often easier to compare the levels of different time series by plotting them all on the same graph. Figure 3.1 shows such a graph, with a set of points and a line for each of the categories. (The series for total personnel is omitted. Since the totals are necessarily bigger than the figures for the individual groups, including them on the same graph would squeeze up all the other lines towards the bottom of the diagram and make them hard to see.)
Figure 3.1 Health care personnel per million population in Thailand
Show description|Hide description
Figure 3.1
Figure 3.1 Health care personnel per million population in Thailand
Activity 8 Health care personnel: interpreting line graphs
Comment on the main changes in health care personnel per million population in Thailand over the period 1966–1984, on the basis of Figure 3.1. Are there any important patterns in the data in Table 3.4 that the graph does not make clear?
Answer
It is clear from Figure 3.1 that the numbers for personnel in each category, in relation to the total population of the country, rose quite markedly over the period in question. The rise was very marked for nurses (who were the largest category throughout the period), particularly towards the end of the period covered, between 1981 and 1984. There are some exceptions to this overall pattern of increase, the most prominent of which is that the number of midwives per million population actually fell by considerable amount between 1981 and 1984.
It is very clear from the graph that the numbers for dentists and for pharmacists per million population are considerably less than the corresponding numbers for the other categories; and it is reasonably clear that the numbers for both these groups rose over the period. However, because the numbers for these groups are so much smaller than, say, the numbers for nurses, the lines for dentists and for pharmacists are rather squashed up at the bottom of the graph and it is therefore difficult to judge the size of the increase. It is thus much clearer from the table than from the graph that the number of dentists has more than tripled in relation to the population size over the period, and that the number of pharmacists has more than doubled. It is also not very clear from the graph that the numbers for dentists and for pharmacists fell slightly in relation to the population between 1971 and 1976.
Activity 9 Health care personnel: more on proportions
Your work in Activity 7, on the proportions of health care personnel in the different categories, did not take account of the total population of Thailand. Explain why, if you calculated the figures in Table 3.4 as percentages of the column totals, you would get exactly the same table of percentages as that in the solution to Activity 7. If you wanted to represent these percentages graphically, what kind of graph would you draw?
Answer
The figures in any particular column of Table 3.4, including the column totals, are equal to the figures in the corresponding column of Table 3.1 divided by the population estimate from the corresponding column of Table 3.3. Thus in carrying out a division to calculate a percentage from Table 3.4, the quantities in the numerator and in the denominator were calculated from Table 3.1 by dividing by the same population total. So the population total cancels out and the result of the division is identical to that obtained from Table 3.1.
One appropriate kind of graph that would draw particular attention to the proportions is the pie chart. We could draw separate pie charts for each of the years listed in the table. The appropriate pie charts for the 1966 and 1984 data are shown in Figures 3.2 and 3.3 respectively. (You were not asked to draw these in the activity!)
Figure 3.2 Pie chart of health care personnel in Thailand in 1966
Show description|Hide description
Figure 3.2
Figure 3.2 Pie chart of health care personnel in Thailand in 1966
Figure 3.3 Pie chart of health care personnel in Thailand in 1984
Show description|Hide description
Figure 3.3
Figure 3.3 Pie chart of health care personnel in Thailand in 1984
These pie charts draw particular attention to the large increase in the number of nurses as a proportion of total health care personnel in Thailand between 1966 and 1984.
In Example 3.1, the original data were counts of individuals. It proved useful to calculate appropriate percentages, by dividing the numbers in the body of the table by column totals. In Activity 2.4, you calculated similar percentages, but they were based on row totals. In Example 3.1, it would have made very little sense to calculate percentages of the row totals. However, in Activity 6, it would have made sense to calculate the percentages of column totals instead of row totals, but they would have provided information relevant to a different question from the one you were considering. For tables of counts in general, it is very often useful to calculate percentages of row totals, and/or of column totals, but it is important to think carefully about which set of percentages is informative in relation to the question you are interested in. The following example is intended to make this clear.
3.3 HIV testing in sub-Saharan Africa
Example 3.2 HIV testing in sub-Saharan Africa
In developed countries, the standard method for testing whether a person is infected with the virus HIV, that causes AIDS, is to carry out a blood test. Provided such a test is carried out long enough after the initial infection occurred, the accuracy is high. However, in sub-Saharan Africa, where in most countries the incidence of AIDS is much higher than in the developed world, blood testing can be difficult to conduct and it is expensive in terms of the health resources available. Thus there is interest in whether HIV infection can be diagnosed at all reliably on the basis of clinical features that are more easily measured or observed under the local circumstances. People infected with HIV often have enlarged lymph nodes, and these enlarged nodes can be felt from the outside of the body in a simple physical examination. However, there are very many other reasons as well as HIV infection for an individual to have enlarged lymph nodes. (In countries like the UK, the overwhelming majority of enlarged lymph nodes are caused by infections that have nothing whatever to do with HIV or AIDS.)
To investigate whether enlarged lymph nodes could play a role in testing for HIV in an African context, researchers in Zimbabwe investigated all adult patients admitted to an acute medical ward in a Harare hospital over a three-month period (apart from one patient who did not agree to take part). Each patient was tested for HIV using a standard (and an accurate) blood-testing method. (In fact, 56% of the patients turned out to have an HIV infection according to these tests.) In addition, the patients were examined (by feeling) for enlarged lymph nodes in three areas of their body. The data in Table 3.4 provide information on the numbers of patients who had an epitrochlear lymph node (a node in the upper arm near the elbow) swollen to a size larger than 1 cm.
Table 3.4 Possible indicators of HIV in Harare hospital patients
Show description|Hide description
Table 3.4
Table 3.4 Possible indicators of HIV in Harare hospital patients
Activity 10 HIV testing: calculating proportions
(a) Suppose you were a doctor practising in a hospital in sub-Saharan Africa, in a place where the general characteristics of patients that you see is likely to be reasonably similar to those reported on in Table 3.4. You decide to investigate for enlarged epitrochlear lymph nodes in the patients you see and, depending on whether you find such a node enlarged to over 1 cm, to use this information together with that in Table 3.4 to take a view on how likely it is that the patient has HIV. Would it help you more to recalculate the numbers in the main body of Table 3.4 as percentages of the row totals or the column totals? Calculate the set of percentages you believe to be more appropriate. In the light of your results, what would be your view on how likely it is that patient with an epitrochlear node over 1 cm actually has HIV (according to blood test). What about a patient who does not have such a node?
(b) Suppose now that you are a scientific researcher interested in the physiological mechanism by which HIV infection can cause enlarged lymph nodes. In investigating this topic, would it help you more to recalculate the numbers in the main body of Table 3.4 as percentages of the row totals or the column totals? Calculate the set of percentages you believe to be more appropriate and comment on what you find.
Answer
(a) In this situation, suppose one of your patients has an epitrochlear lymph node enlarged to more than 1 cm. You might then want to ask ‘What proportion of such patients actually have HIV (as would show up if they were given a standard blood test)?’ That is, you know your patient corresponds to those in the first row of Table 3.4. If your patients are generally comparable to those in the Harare hospital, the proportion can be estimated by calculating the number in the first row of Table 3.4 as a percentage of the row total. For this reason, calculating the figures in the table as percentages of the row totals is helpful, and the percentages of the column totals are less relevant. Calculating all the figures as percentages of the row totals leads to Table 3.5. (The percentages have been rounded to whole numbers.)
Table 3.5: Percentages of row totals for Harare hospital patients
Show description|Hide description
Table 3.5: Percentages of row totals for Harare hospital patients
Table 3.5: Percentages of row totals for Harare hospital patients
This table shows that 83% of the patients who had an enlarged epitrochlear lymph node of size over 1cm were actually infected with HIV (according to the blood test). In this context, it is quite likely that a patient with such an enlarged node will have HIV. (But bear in mind that these figures will not apply in other contexts. As Table 3.5 again makes clear (in the bottom line), 56% of all the patients in the study were HIV positive on the blood test. In a hospital in, say, Europe, this will not be the case, and it is much more likely that an enlarged epitrochlear lymph node would have some other explanation.)
The table also shows that 52% of the patients who do not have an enlarged epitrochlear lymph node of this size were not HIV positive. In the Harare context, not having this particular physical sign does not actually say much about the patient's chances of being free from HIV. The chance is rather more than would be the case for patients in general, but not much more.
(b) In this case the scientist will probably be more interested to ask ‘Of the patients who actually are HIV positive on the blood test, what proportion show an enlarged epitrochlear lymph node of this size?’. That is, the scientist would be interested in knowing how large the numbers in the table were in relation to the column totals rather than the row totals. The resulting percentages are shown in Table 3.6.
Table 3.6: Percentages of column totals for Harare hospital patients
Show description|Hide description
Table 3.6
Table 3.6: Percentages of column totals for Harare hospital patients
This table shows that, of the Harare patients who are HIV positive (on the blood test), 36% have this type of enlarged lymph node (so most of them do not have it). However, the fact that the presence of an enlarged lymph node of this type does have some diagnostic value is shown by the fact that a much smaller proportion, just 10%, of HIV negative patients show this particular sign.
It is worth noting that the percentages in Table 3.5 are considerably different from those in Table 3.6. Thus if you were interested in the scientist's question but calculated, mistakenly, the percentages relevant to the doctor (that is, the row percentages), you could be seriously misled.
For the data in Table 3.4, both the row percentages and the column percentages turned out to be useful quantities to calculate; but which is more useful depends on the question you are trying to answer. It is crucial not to use the row percentages to answer questions that relate to the column percentages, or vice versa. As you saw in Activity 10, the two sets of percentages can be considerably different. In general, in making calculations from data in tables, it is always important to think through carefully exactly what you want to know.
Before the final activity, some threads relating to graphics will be drawn together. You have now met several different graphics: pie charts, bar charts, histograms, scatterplots, boxplots and line plots of time series. You have seen that different types of plot are suitable for different types of data. You have also seen that the choice of an appropriate graph for presenting and examining data can depend on the question of interest. The following guidelines draw together what you have learned so far.
3.4 Guidelines for graphics
Data in the form of counts of individual entities (for example, people, animals, power stations) in a small set of discrete categories can be presented in bar charts or pie charts. For most purposes, bar charts are preferable. Pie charts draw particular attention to the proportions in which the entities are split between the different categories. However, they do so by representing the proportions by angles, and even when the main interest lies in the proportions, bar charts may well be easier to ‘read’.
For data in the form of category counts where the interest lies in comparing two or more data sets (as in Example 2.3 of Unit A1 ), it can be useful to produce a bar chart where the corresponding bars for the different data sets are plotted side by side.
To examine the pattern of distribution of values of a continuous (measured) variable, a histogram is an appropriate graphic. An alternative is a boxplot. However, neither sort of plot gives direct information about the number of observations in the data set, and it can be risky to draw firm conclusions about the pattern of distribution when the number of observations is small.
Boxplots give a simple representation of the values of a continuous variable. They can also be used for discrete variables where the categories are numbers (such as the counts of family sizes in Figure 1.7. A boxplot shows less detail about a distribution than an appropriate histogram or bar chart, but the amount of detail in a boxplot is often sufficient.
Boxplots are particularly useful for comparing two or more data sets, because the corresponding boxplots can be drawn against a common scale on the same diagram. (It is difficult to do this clearly with more than one histogram.)
Scatterplots are used when the values of two numerical variables have been obtained from each of a number of individual entities. The aim of the plot is to investigate the relationship between the values of the two variables.
Line plots can be useful, particularly for time series data, because they draw attention to the way that one or more variables have changed over time.
In some circumstances, particularly when the data are very skew, more informative boxplot or scatterplot can be produced by transforming the data first.
This section ends with a more substantial activity. This will provide you with some further experience of dealing with data in tables. You will also be asked to look at one or two slightly different approaches for interpreting tabular data.
3.5 The British Crime Survey
Table 3.7 Comparison of British Crime Survey and crimes recorded by the police
| 1997 Police | 1997 BCS | % BCS reported | % recorded of reported | % recorded of all BCS | % change 1995 to 1997 | % change 1981 to 1997 |
| Police | BCS | Police | BCS |
| Vandalism | 443 | 2917 | 26 | 58 | 15 | −4 | −15 | 121 | 7 |
| All comparable property theft (acquisitive crime) | 1751 | 6261 | 50 | 56 | 28 | −17 | −15 | 51 | 99 |
| Burglary | 519 | 1639 | 64 | 49 | 32 | −19 | −7 | 48 | 119 |
| Attempts & no loss | 140 | 976 | 50 | 29 | 14 | −17 | −0.1 | 90 | 160 |
| With loss | 379 | 664 | 85 | 67 | 57 | −20 | −15 | 37 | 77 |
| All vehicle thefts | 1022 | 3483 | 47 | 62 | 29 | −15 | −19 | 57 | 99 |
| Theft from vehicle | 552 | 2164 | 43 | 59 | 25 | −16 | −14 | 63 | 68 |
| Theft of vehicle | 316 | 375 | 97 | 87 | 84 | −21 | −25 | 10 | 31 |
| Attempted thefts | 154 | 943 | 37 | 44 | 16 | 3 | −27 | 447 | 425 |
| Bicycle theft | 151 | 549 | 64 | 43 | 27 | −18 | −17 | 19 | 154 |
| Theft from the person | 60 | 590 | 35 | 29 | 10 | −4 | −12 | 71 | 36 |
| All comparable violence | 256 | 1022 | 49 | 51 | 25 | 11 | −13 | 150 | 53 |
| Wounding | 205 | 714 | 45 | 63 | 29 | 18 | −17 | 143 | 41 |
| Robbery | 52 | 307 | 57 | 30 | 17 | −11 | −2 | 183 | 89 |
| All comparable | 2450 | 10199 | 44 | 54 | 24 | −12 | −15 | 67 | 56 |
Mirrlees-Black, C, Budd, T., Partridge, S. and Mayhew, P. (1998) The 1998 British Crime Survey Englnd Wales, Home Office Statistical Bulletin 21/98
Activity 11 The British Crime Survey
The British Crime Survey (BCS) is a sample survey carried out in England and Wales by the Home Office. The survey was first carried out in 1982, and at the time of writing (2001) is done every two years. The aim is to measure the level of crimes against people in private households. Data are collected by interviewing adult respondents from a representative sample of households about their experience as victims of crime in the previous year, and about some other matters connected with crime. For the 1998 BCS, a respondent from each of approximately 15 000 households was interviewed.
Apart from the BCS, the main source of data on crime in England and Wales is police records. Data on crimes from police records are not entirely comparable with those from the BCS, mainly because certain categories of crime are not covered by both sources of data. (For instance, frauds against companies are not recorded in the BCS because there is no personal victim in a private household.) However, there is a large set of categories of crime for which BCS data and police records should (in principle at least) be comparable. Table 3.5 is taken from the report on the 1998 BCS (and hence relates to crimes in 1997), and it compares in various ways the numbers (in thousands) of crimes (in these comparable categories) recorded by the police and measured by the BCS. (The BCS figures are estimates, based on the sample data, for total numbers of crimes in these categories in England and Wales.) In the BCS, respondents are asked, in relation to any crime of which they were a victim, whether or not it was reported to the police. Many crimes are not reported to the police, and clearly these crimes will not appear in the police records.
Some of this activity is concerned with making sense of where the figures come from in this rather complex table. In fact, rather more clues about the relationships between the different numbers are contained in the text of the report. However, with other reports and other tables, this is regrettably not always the case, so the practice you will get by working through this activity will be worthwhile!
Note also that the questions below ask you to answer briefly. Being able to make statistical points concisely in writing is an important skill generally (as well as being crucial in an examination context where time is limited).
(a) The row labelled ‘All comparable’ at the bottom of Table 3.5 concerns values for all offences in the comparable categories taken together. Explain briefly how the first three percentages in that row (44, 54, 24) relate to one another and to the first two values (2450, 10199) in the row.
(b) Consider the column labelled ‘1997 Police’. Describe briefly how values in this column are related to one another.
(c) Draw a suitable diagram to display the values associated with ‘Vandalism’, ‘Burglary’, ‘All vehicle thefts’, ‘Bicycle theft’, ‘Theft from the person’ and ‘All comparable violence’, using the values in the ‘1997 BCS’ column.
(d) Find and use the appropriate numbers from the table to calculate the equivalent values in 1981 to those in part (c). Draw a diagram to display these values. Using your diagrams and/or the corresponding numbers, comment briefly on the similarities and differences between the numbers of crimes in these categories in 1981 and 1997.
Answer
The questions in this activity generally required you to answer briefly. This solution is not particularly brief, because it contains material intended to explain to you what is going on. However, to clarify matters, this explanatory material is enclosed in square brackets.
(a) The value 44 [in the ‘% BCS reported’ column] is the percentage of the crimes mentioned in the BCS that, according to the BCS respondents, were reported to the police. It cannot be calculated from other values in the table. However, it can be used to deduce that the number of ‘comparable’ crimes that were reported to the police, according to BCS respondents, was 44% of 10 199 thousand, or 4488 thousand [to the nearest thousand].
The value 54 [in the ‘% recorded of reported’ column] is the percentage of the crimes that BCS respondents said were reported to the police that actually appear in the police crime statistics. It has already been calculated that 4488 thousand crimes in these categories were said by BCS respondents to have been reported to the police. According to police records, 2450 thousand such crimes were reported to them. Thus the figure of 54% is calculated as the ratio 24504488 [and indeed, allowing for some rounding error, the figures do match].
Finally, the value 24 [in the ‘% recorded of all BCS’ column] is the ratio of the total number of crimes reported to the police (according to police records) to the number of crimes recorded in the BCS. That is, it is 2450/10 199 [and again this does come to 24%].
(b) [In the ‘1997 Police’ column and, indeed, in the ‘1997 BCS’ column, the total number of comparable crimes is divided between various different categories, and some of the categories are further divided in subcategories, and in some cases these are further divided.] The value 2450 for ‘All comparable’ is the sum of the values for the categories shown in bold type, namely ‘Vandalism’, ‘All comparable property theft’ and ‘All comparable violence’. The value for ‘All comparable violence’ is approximately the sum of the values for ‘Wounding’ and ‘Robbery’. [Actually that sum is 257, not 256, but that is presumably accounted for by rounding errors, given that these values are all rounded to the nearest thousand crimes.] The value 1751 for ‘All comparable property theft’ is, within rounding error, the sum of the values for ‘Burglary’, ‘All vehicle thefts’, ‘Bicycle theft’ and ‘Theft from the person’. Finally, the values for ‘Burglary’ and for ‘All vehicle thefts’ are the sums of the values in the relevant rows given below each of these headings.
(c) [These are data in the form of counts of individual entities, in this case crimes, in a number of discrete categories. Guideline 1 for graphics suggests that there are two appropriate types of plot – a bar chart or a pie chart. Both are given here, although only one is required to answer the question. Perhaps the more appropriate is a bar chart, where the lengths of the bars indicate the numbers of crimes in each of the categories. A bar chart for the numbers of crimes in the named categories is shown in Figure 3.4.
Alternatively, you may have felt that the most important point here was the way that the total number of comparable crimes was divided between these categories, in which case a pie chart might be more appropriate. However, the pie chart does not show directly the total number of crimes involved, so that a bar chart is arguably the better choice. A pie chart for the data is shown in Figure 3.5.]
Figure 3.4 Bar chart of BCS ‘comparable’ crimes, 1997
Show description|Hide description
Figure 3.4
Figure 3.4 Bar chart of BCS ‘comparable’ crimes, 1997
Figure 3.5 Pie chart of BCS ‘comparable’ crimes, 1997
Show description|Hide description
Figure 3.5
Figure 3.5 Pie chart of BCS ‘comparable’ crimes, 1997
(d) [Here, the relevant numbers in the table are those in the ‘1997 BCS’ column, and those in the ‘% change 1981 to 1997: BCS’ column. For the ‘Vandalism’ category, there were 2917 thousand crimes (BCS) in 1997, and the final column of the table indicates that this value is 7% higher than that for 1981. Thus the 1981 value for ‘Vandalism’ can be calculated as follows:
in thousands, to the nearest thousand. The other figures can be calculated in similar manner and are given below, all rounded to the nearest thousand.]
| | |
--- |
| Vandalism | [2 917/1.07=] 2726 |
| Burglary | [1639/2.19=] 748 |
| All vehicle thefts | [3 483/1.99=] 1750 |
| Bicycle theft | [549/2.54 =] 216 |
| Theft from the person | [590/1.36 =] 434 |
| All comparable violence | [1022/1.53=] 668 |
[A bar chart for these data is shown in Figure 3.6 and a pie chart in Figure 3.7. Only one of these charts is required to answer the question.]
Figure 3.6 Bar chart of BCS ‘comparable’ crimes, 1981
Show description|Hide description
Figure 3.6
Figure 3.6 Bar chart of BCS ‘comparable’ crimes, 1981
Figure 3.7 Pie chart of BCS ‘comparable’ crimes, 1981
Show description|Hide description
Figure 3.7
Figure 3.7 Pie chart of BCS ‘comparable’ crimes, 1981
[In fact, a better way of portraying these data, instead of either Figure 3.6 or Figure 3.7, for the purpose of the comparison you are asked to make is to plot both the 1981 and the 1997 figures on the same bar chart (guideline 2), as in Figure 3.8.]
Figure 3.8 Bar chart of BCS ‘comparable’ crimes, 1981 and 1997
Show description|Hide description
Figure 3.8
Figure 3.8 Bar chart of BCS ‘comparable’ crimes, 1981 and 1997
[Whichever diagram you drew, the following should be reasonably clear.] The pattern of crimes in these different categories changed considerably between 1981 and 1997. In 1981 vandalism was, by a large margin, the most common category, though the number of vehicle thefts was also large. By 1997, the numbers of crimes in all categories had increased, though the increase in the number of crimes of vandalism was relatively small. However, there had been very large increases in numbers of vehicle thefts, of bicycle thefts and of burglaries, and vehicle thefts had become the largest category. The two smallest categories in 1981 were thefts from the person and bicycle thefts, and this remained the case in 1997 even though the number of bicycle thefts had increased by over 150%.
3.6 Summary of Section 3
In this section, you have learned about appropriate ways of interpreting data in tables. By working through examples, you have seen how it can be useful to calculate appropriate proportions and ratios, and to present some of the data in graphical form. Guidelines for the choice of graphics have been given. When the data in a table are in the form of counts, you have seen that it can be useful to calculate the counts in a particular row or column as proportions (usually in the form of percentages) of the corresponding row or column total. However, it is important to calculate the proportion that is relevant to the question you are trying to answer.
4 Conclusion
In this course, you have learned about boxplots and about ways of dealing with data given in tabular form.
A boxplot is a way of presenting certain summary statistics and other characteristics of a data set in graphical form. It gives a quick graphical impression of the location, dispersion and the general pattern of skewness in data set, as well as drawing attention to unusually large or small values. In comparing two or more data sets, it is often useful to draw comparative boxplots (that is, draw boxplots for the data sets on the same diagram against the same scale). These can be used to compare the data sets in terms of location, dispersion and symmetry or skewness. For some data sets that exhibit considerable skewness, this process of comparison is sometimes made easier by transforming the data first.
You have seen how the presentation of data in tabular form can often be improve by following certain guidelines. The labelling of the rows and columns in a table should be clear; unnecessary information should not be included; it may be useful to simplify the numbers in the table (for example, by reducing the number of significant figures presented); and summary statistics or calculation results can often usefully be added to table.
When you are faced with the task of interpreting data in a table, it is very often useful to calculate appropriate rates or proportions to clarify the message of the table. Patterns in the data may also become clearer if an appropriate graph is drawn. Guidelines on the choice of graph have been given. You have seen that it is important to understand how the different numbers in a table relate to one another.
Don't miss out:
1. Join over 200,000 students, currently studying with The Open University choose/ ou/ open-content
2. Enjoyed this? Find out more about this topic or browse all our free course materials on OpenLearn openlearn/
3. Outside the UK? We have students in over a hundred countries studying online qualifications including an MBA at our triple accredited Business School.
Acknowledgements
Except for third party materials and otherwise stated (see terms and conditions), this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence
Course image: Paul L Dineen in Flickr made available under Creative Commons Attribution 2.0 Licence.
Don't miss out:
If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University - www.open.edu/ openlearn/ free-courses
◄ Interpreting data: boxplots and tables
Copyright © 2016 The Open University |
10541 | https://maidenlab.zoo.ox.ac.uk/history-and-biology-istreptococcus-pneumoniaei | History and Biology of Streptococcus pneumoniae | maidenlab
Skip to main content
Back to the Maidenlab
Bandwidth
High
Low
English
Français
MeVacP Home
Our Work
About us
Research
News
menu
MeVacP Home
Our Work
About us
Research
News
Streptococcus pneumoniae
History and Biology of Streptococcus pneumoniae
Image
Go to bottom of page
Streptococcus pneumoniae are lancet-shaped (elongated round shape) Gram-positive bacteria that can either grow in chains or pairs as shown in this image.It was first isolated independently in 1880 in France by Louis Pasteur from the saliva of a patient who had rabies and in the USA by George M. Sternberg.
In 1886,S.pneumoniae was first known as pneumococcus due to its close association with pneumonia. In 1920, it was renamed as Diplococcus pneumoniae as it was usually observed in pairs.In 1974, the name was changed to Streptococcus pneumoniae due to its similarities in forming chains like other Streptococcus spp. S. pneumoniae can be distinguished from other species using rMLST.
S.pneumoniae is a leading global cause of morbidity and mortality amongst all age groups but children and the elderly are most at risk. The burden of pneumococcal disease is highest in low- and middle-income countries.S.pneumoniae causes mild infections like otitis media and sinusitis, but also life-threatening infections like pneumonia,septicaemia and meningitis. Worldwide, pneumococcal disease is highest among children less than 5 years of age and an estimated 1.6 million deaths occur every year, mainly due to pneumonia.
Image
Streptococcus pneumoniae seen by electron micrograph
Biology
Factors that enable pneumococci to evade the immune system and cause disease include the polysaccharide capsule, various surface proteins, and toxins such as the pneumolysin gene (ply).
The polysaccharide capsule is a key virulence factor because it protects the pneumococcus and enables it to evade phagocytosis by the host immune system.
There are at least100 antigenically different polysaccharide capsules or ‘serotypes’. The capsule is the target for the current pneumococcal vaccines.Pneumolysin is a toxin that forms pores in the cell membrane and causes cell lysis, which induces inflammation and activates the complement system in the human host.
S.pneumoniae can undergo phase variation, allowing it to have different phenotypes during colonisation and invasion. During colonisation,S.pneumoniae can produce a thin (or transparent) capsule, better adapted for colonisation, whereas during invasion a thicker (opaque) capsule is observed, which enables it to evade phagocytosis.
Image
Another factor that enables bacteria to survive is that pneumococci can change their capsule to avoid being recognised by the immune system. They do this by taking up DNA (transformation) encoding a different set of capsular genes from another pneumococcus and incorporating that new DNA into their genome (recombination),discarding the original capsular genes. This process of transformation and recombination also enables the pneumococcus to acquire other advantageous genes like antibiotic-resistance genes.
History - Epidemics
S.pneumoniae causes disease in all countries around the world. Outbreaks are possible but not as large scale or as frequent as meningitis outbreaks caused by Neisseria meningitidis. Seasonal outbreaks of bacterial meningitis due to S.pneumoniae have been recorded in themeningitis belt. Most of these cases were predominantly due to serotype 1 pneumococci, which is especially prevalent in Africa.
Map of Africa with countries of the meningitis belt in red
Meningitis outbreaks highlight the need for current and continuous revision of epidemic prevention, surveillance and diagnostic strategies, which to date have largely focused on outbreaks caused by N.meningitidis.
To learn more about Streptococcus pneumoniae click on the links bellow.
Image ### Streptococcus pneumoniae-Serotypes LEARN MORE
Image ### Streptococcus pneumoniae-Disease LEARN MORE
Image ### Streptococcus pneumoniae-Prevention LEARN MORE
Back to top
Back to MEVacP home
Funded & supported by
Quick links
People
Publications
Research areas
© University of Oxford 2025. Privacy notice |
10542 | https://eng.libretexts.org/Bookshelves/Electrical_Engineering/Electronics/DC_Electrical_Circuit_Analysis_-_A_Practical_Approach_(Fiore)/06%3A_Analysis_Theorems_and_Techniques/6.4%3A_Thevenin's_Theorem | 6.4: Thévenin's Theorem - Engineering LibreTexts
Skip to main content
Table of Contents menu
search Search build_circle Toolbar fact_check Homework cancel Exit Reader Mode
school Campus Bookshelves
menu_book Bookshelves
perm_media Learning Objects
login Login
how_to_reg Request Instructor Account
hub Instructor Commons
Search
Search this book
Submit Search
x
Text Color
Reset
Bright Blues Gray Inverted
Text Size
Reset
+-
Margin Size
Reset
+-
Font Type
Enable Dyslexic Font - [x]
Downloads expand_more
Download Page (PDF)
Download Full Book (PDF)
Resources expand_more
Periodic Table
Physics Constants
Scientific Calculator
Reference expand_more
Reference & Cite
Tools expand_more
Help expand_more
Get Help
Feedback
Readability
x
selected template will load here
Error
This action is not available.
chrome_reader_mode Enter Reader Mode
6: Analysis Theorems and Techniques
DC Electrical Circuit Analysis - A Practical Approach (Fiore)
{ }
{ "6.1:_Introduction" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.2:_Source_Conversions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.3:_Superposition_Theorem" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.4:_Thevenin\'s_Theorem" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.5:_Norton\'s_Theorem" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.6:_Maximum_Power_Transfer_Theorem" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.7:_Delta-Y_Conversions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.8:_Summary" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "6.9:_Exercises" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
{ "00:_Front_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "01:_Fundamentals" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "02:_Basic_Quantities" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "03:_Series_Resistive_Circuits" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "04:_Parallel_Resistive_Circuits" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "05:_Series-Parallel_Resistive_Circuits" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "06:_Analysis_Theorems_and_Techniques" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "07:_Nodal_and_Mesh_Analysis_Dependent_Sources" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "08:_Capacitors" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "09:_Inductors" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "10:_Magnetic_Circuits_and_Transformers" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "zz:_Back_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
Sun, 22 May 2022 21:20:20 GMT
6.4: Thévenin's Theorem
25130
25130
Delmar Larsen
{ }
Anonymous
Anonymous User
2
false
false
[ "article:topic", "license:ccbyncsa", "showtoc:no", "authorname:jmfiore", "licenseversion:40", "source@ ]
[ "article:topic", "license:ccbyncsa", "showtoc:no", "authorname:jmfiore", "licenseversion:40", "source@ ]
Search site Search Search Go back to previous article
Sign in
Username Password Sign in
Sign in
Sign in
Forgot password
Contents
1. Home
2. Bookshelves
3. Electrical Engineering
4. Electronics
5. DC Electrical Circuit Analysis - A Practical Approach (Fiore)
6. 6: Analysis Theorems and Techniques
7. 6.4: Thévenin's Theorem
Expand/collapse global location
DC Electrical Circuit Analysis - A Practical Approach (Fiore)
Front Matter
1: Fundamentals
2: Basic Quantities
3: Series Resistive Circuits
4: Parallel Resistive Circuits
5: Series-Parallel Resistive Circuits
6: Analysis Theorems and Techniques
7: Nodal and Mesh Analysis, Dependent Sources
8: Capacitors
9: Inductors
10: Magnetic Circuits and Transformers
Back Matter
6.4: Thévenin's Theorem
Last updated May 22, 2022
Save as PDF
6.3: Superposition Theorem
6.5: Norton's Theorem
Page ID 25130
James M. Fiore
Mohawk Valley Community College
( \newcommand{\kernel}{\mathrm{null}\,})
Table of contents
1. Finding Thévenin Equivalents in Lab
1. Example 6.4.1
Computer Simulation
Example 6.4.2
Thévenin's theorem, named after Léon Charles Thévenin, is a powerful analysis tool. For DC, it states:
Any single port linear network can be reduced to a simple voltage source,E th,in series with an internal resistance,R th.
Figure 6.4.1 : Thévenin equivalent circuit.
An example is shown in Figure 6.4.1 . The phrase “single port network” means that the circuit is cut in such a way that only two connections exist to the remainder of the circuit (two connection points makes up one port). The remainder of the circuit may be a single component or a large multi-component sub-circuit. As there are many ways to cut a typical circuit, there are many possible Thévenin equivalents. The important thing is that there are only two connection points between the two portions of the circuit and neither point has to be ground.
Figure 6.4.2 : Example circuit.
Figure 6.4.3 : Finding E th..
Consider the circuit shown in Figure 6.4.2 . Suppose we cut the circuit immediately to the left of R 4. That is, we will find the Thévenin equivalent that drives R 4. The first step is to make the cut, removing the remainder of the circuit (in this case, just R 4). We then determine the open circuit output voltage. This is the maximum voltage that could appear between the cut points and is called the Thévenin voltage, E th. This is shown in Figure 6.4.3 . In a circuit such as this, basic series-parallel analysis may be used to find E th. This process turns out to be quite straightforward in this particular circuit. Due to the open, no current flows through R 3, thus no voltage is developed across R 3, and therefore E th must equal the voltage developed across R 2 which may be obtained via a voltage divider with resistor R 1 and source E.
The second part is finding the Thévenin resistance, R th. Beginning with the “cut” circuit, replace all sources with their ideal internal resistance (thus shorting voltage sources and opening current sources). From the perspective of the cut point, look back into the circuit and simplify by making appropriate series and parallel combinations to determine its equivalent resistance. This is shown in Figure 6.4.4 . Looking in from where the cut was made (right-to-left here), we find that R 1 and R 2 are in parallel, and this combination is then in series with R 3. Thus, R th=R 3+(R 1||R 2). A common error is to determine the equivalent resistance that the source drives. Remember, everything is determined from the vantage point of the cut or port.
Thévenin equivalents are not limited to single source circuits. It is possible to find the equivalent of a network with several sources. Finding the open circuit output voltage will undoubtedly require some extra work, for example the use of superposition of source conversions. Finding the Thévenin resistance is unchanged, just remember to replace every source with its ideal internal resistance before simplifying the network.
As noted earlier, the original circuit could be cut in a number of different ways. We might, for example, want to determine the Thévenin equivalent that drives R 2 in the circuit of Figure 6.4.2 . This cut appears in Figure 6.4.5 . Clearly, this will result in different values for both E th and R th. For example, R th is now R 1||(R 3+R 4).
Figure 6.4.4 : Finding R th.
Finding Thévenin Equivalents in Lab
The procedure for experimentally determining an equivalent in the laboratory mimics the analytical approach. The first step is to figuratively cut the circuit and isolate the section that is to be converted. At this point we have the open circuit version of the circuit and all we need do is connect a multimeter to the open port to determine E th.
There are two methods for determining R th. The first method works well for simple circuits that use only resistors and current and/or voltage sources. The second method is more generally applicable and will work for circuits with active devices such as transistors. To use the first method, the sources are physically removed from the circuit and replaced with their ideal internal resistance. Thus voltage sources are replaced with a shorting wire and current sources are left as opens. Do not simply place shorting wires across the terminals of voltage sources as doing so will cause an overload and potentially damage the sources. Once this is completed, a multimeter is placed at the open port and set to read resistance. The indicated value is R th.
Figure 6.4.5 : An alternate cut or port location.
The second method uses a variable resistance, namely either a rheostat or a decade box, and exploits the voltage divider rule. In this version, the sources are left active (powered up) and are not replaced with opens or shorts. Once E th is measured, the variable resistor is placed across the port connections. This resistance is adjusted until the port voltage drops to exactly half of E th. In the equivalent circuit, there are only two resistances of concern, R th and this variable load resistance, and they are in series. Consequently, if the load voltage is now half of the open circuit voltage (E th), then the other half of the voltage must be dropping across the equivalent internal resistance (R th). For this to be true in a series circuit, the two resistances must have the same value. Thus, we simply remove the rheostat from the circuit and use a multimeter to determine its precise value. If a decade box is used instead, the value is determined directly by reading the knob settings.
Whether determined analytically or empirically, the Thévenin equivalent circuit can replace the original single port network regardless of what the original was connected to. The same voltages and currents will be seen in this other portion, and it won't matter if the other portion is comprised of a single resistor, multiple resistors, multiple resistors and multiple sources, or even multiple resistors and sources wired to a selection of piquant cheeses. The Thévenin equivalent is a true functional equivalent and can be used on any linear bilateral network.
Example 6.4.1
Determine the Thévenin equivalent of the circuit driving the 1 k Ω in Figure 6.4.6 . Verify that the equivalent produces the same voltage across this resistor as the original circuit.
Figure 6.4.6 : Circuit for Example 6.4.1 .
Figure 6.4.7 : Finding E th.
First, we'll redraw the circuit showing the portion to be Théveninized, as shown in Figure 6.4.7 . The open circuit output voltage will be the voltage across the 800 Ω resistor as there will be no voltage drop across the 200 Ω resistor (as no current flows through it into the open). This is found via a simple voltage divider.
E th=ER x R x+R y
E th=10V800Ω 800Ω+100Ω
E th≈8.889V
The equivalent resistance is found by shorting the voltage source and then simplifying the circuit. The result is 200 Ω in series with the parallel combination of the 100 Ω and 800 Ω. 200+100||800≈288.89Ω.
To determine Vc, we can use a voltage divider between the 1 k Ω and the 288.89 Ω along with the equivalent source voltage of 8.889 volts.
V c=E thR L R L+R th
V c=8.889V1kΩ 1kΩ+288.89Ω
V c≈6.897V
Now let's determine V c in the original circuit using series-parallel analysis techniques. Perhaps the quickest approach is a pair of voltage dividers. V b is found via a divider between the parallel combination of the 1 k Ω + 200 Ω and the 800 Ω, against the 100 Ω. V c is is then found using that voltage with a divider between the 1 k Ω and 200 Ω. Using this approach, V b is approximately 8.276 volts and V c is approximately 6.897 volts, providing an excellent match.
It might seem that the Thévenin method is the “long way home” in this example, and it is, but it has the advantage of being more efficient if several different loads are being considered. For example, suppose we decided to determine the output voltage not just for the 1 k Ω, but for a group of a half dozen different resistors. The double voltage divider would have to be determined for each load resistor using the straight series-parallel method but only a single divider needs to be computed for each load when using the Thévenin method. The Thévenin method is also of great use when determining maximum power transfer, as we shall see a later in this chapter.
Computer Simulation
To verify the results of Example 6.4.1 , the original circuit is recreated in a simulator along its Thévenin equivalent, as shown in Figure 6.4.8 .
Figure 6.4.8 : The original circuit of Example 6.4.1 in a simulator along with the equivalent.
A DC operating point analysis is performed and the results are shown in Figure 6.4.9 . Note that the voltages across the identical 1 k Ω loads (nodes 3 and 5) are virtually the same, indicating functional equivalence between the two. The slight deviation is due to the rounding of the Thévenin voltage and resistance.
Figure 6.4.9 : Results of the simulation showing equivalence.
As a further check, the simulation is run again, but this time using an alternate load resistor value. The value chosen is the Thévenin resistance value. By matching the resistances, this should produce a 50/50 voltage divider and the load voltage should equal half of the Thévenin source voltage, or approximately 4.444 volts. That is precisely what we find, as seen in Figure 6.4.10 .
Figure 6.4.10 : Results of the simulation for matched resistance.
As mentioned previously, Thévenin's theorem can be applied to much more complex multi-source circuits, and the item being driven need not be just a single resistor. This is illustrated in the next example.
Example 6.4.2
Determine the Thévenin equivalent of the circuit driving the resistor/voltage source combo in Figure 6.4.11 . Verify that the equivalent produces the same voltage across this resistor as the original circuit.
Figure 6.4.11 : Circuit for Example 6.4.2 .
Determining R th is not particularly difficult here. After shorting the 10 volt source and open the current source, it can be seen that the 1 k Ω and 3 k Ω are in parallel, yielding 750 Ω. This is in series with the 1250 Ω for a total of 2 k Ω, which is in turn in parallel with the 6 k Ω. The final result is 1.5 k Ω.
Finding E th is a little more involved. One possibility is to use a source conversion on the 10 volt source as that will leave us with two parallel current sources that may be combined directly. The converted source will be 10 V/ 1k Ω, or 10 mA, in parallel with 1 k Ω. This results in a total of 25 mA feeding upwards with 1 k Ω|| 3 k Ω, or 750 Ω. We can use the current divider rule to determine the current flowing through the 1250 Ω plus 6 k Ω branch, and then use Ohm's law to find the open circuit voltage (i.e., the voltage across the 6 k Ω).
I 6k=I SR x R x+R y
I 6k=25mA750Ω 750Ω+7250Ω
I 6k=2.34375mA
E th=I 6k×R 6k
E th=2.34375mA×6kΩ
E th=14.0625V
Another approach to determine this value would be to use superposition. This is left as an additional exercise.
Turning our attention to the voltage produced across the 6 volt with 500 Ω sub-circuit, we have a simple series loop with E th opposing this 6 volt source, leaving 8.0625 volts to produce a clockwise current through R th in series with the 500 Ω (a total of 2 k Ω). That current will be 8.0625 V / 2 k Ω, or 4.03125 mA. This will produce a drop across the 500 Ω of 2.015625 volts with a polarity of + to − from top to bottom. This will add to the 6 volt source resulting in a final potential of 8.015625 volts. The results are verified via the simulation technique used previously. The node voltages for both the original and equivalent circuits are shown in Figure 6.4.12 .
Figure 6.4.12 : Results of the simulation using the original and equivalent circuits.
This page titled 6.4: Thévenin's Theorem is shared under a CC BY-NC-SA 4.0 license and was authored, remixed, and/or curated by James M. Fiore via source content that was edited to the style and standards of the LibreTexts platform.
Back to top
6.3: Superposition Theorem
6.5: Norton's Theorem
Was this article helpful?
Yes
No
Recommended articles
6.1: Introduction
6.2: Source Conversions
6.3: Superposition Theorem
6.5: Norton's Theorem
Article typeSection or PageAuthorJames M. FioreLicenseCC BY-NC-SALicense Version4.0Show TOCno
Tags
source@
© Copyright 2025 Engineering LibreTexts
Powered by CXone Expert ®
?
The LibreTexts libraries arePowered by NICE CXone Expertand are supported by the Department of Education Open Textbook Pilot Project, the UC Davis Office of the Provost, the UC Davis Library, the California State University Affordable Learning Solutions Program, and Merlot. We also acknowledge previous National Science Foundation support under grant numbers 1246120, 1525057, and 1413739. Privacy Policy. Terms & Conditions. Accessibility Statement.For more information contact us atinfo@libretexts.org.
Support Center
How can we help?
Contact Support Search the Insight Knowledge Base Check System Status×
contents readability resources tools
☰
6.3: Superposition Theorem
6.5: Norton's Theorem |
10543 | https://resources.system-analysis.cadence.com/blog/msa2022-internal-energy-and-enthalpy-in-thermodynamics | Skip to main content
Internal Energy and Enthalpy in Thermodynamics
Author
Cadence CFD
Key Takeaways
Enthalpy is a measure of the total heat energy, absorbed or released, in a thermodynamic system.
Internal energy indicates the total energy, potential or kinetic, in a thermodynamic system.
The relation between internal energy and enthalpy in thermodynamics can be established by calculating the changes or studying the temperature relations.
The general law of thermodynamics deals with quantities like temperature, heat, work, internal energy, and their relation. These relations often establish the interlink between the science of thermodynamics and fluid dynamics, where concepts such as fluid flow and heat transfer can be utilized to perform the work within a system. An example where this can be observed thoroughly is in engines or heat transfer machines where working fluid can drive the thermodynamic cycle.
The enthalpy in a thermodynamic system is an important variable that defines the total heat associated with a system. The analysis of the enthalpy change and internal energy change during a reaction is an important guide to maintaining efficiency in thermodynamic engineering.
Discussing Change of Enthalpy in Thermodynamics
Enthalpy is the total heat absorbed or released in a thermodynamic system. Mathematically, it is often described as the sum of the internal energy and the work performed:
H= U+pV
H is the enthalpy, U is the internal energy, p is the pressure, and V is the volume of the fluid system. The product of pressure and volume is the work performed. Generally, the enthalpy change in the system is the desired calculation, as it simplifies the energy transfer analysis. As such, the above equation can be written as:
ΔH= ΔU+pΔV
For the above equation to be true, the pressure must be constant. The equation can indicate the nature of the reaction, i.e., whether it is endothermic or exothermic. The positive enthalpy change means the reaction is endothermic, where the system absorbs the energy. The negative value of enthalpy change means the reaction in the system is exothermic, where the heat is released during the process. At the zero value of enthalpy change, the thermodynamic reaction is considered to be in equilibrium.
Given that both the internal energy and the enthalpy in a thermodynamic system describe the energy associated with the system, it is important to establish the differentiation between the both. The internal energy is the heat energy of the system at constant volume while the enthalpy is the heat energy under constant pressure. We will discuss the internal energy in thermodynamics next.
Relation With Internal Energy
Internal energy signifies the total energy, kinetic and potential, of a thermodynamic system. From the above equations, we know that enthalpy and internal energy are directly influenced by each other. However, understanding the absolute value of internal energy in a system is difficult given the uncertainty of internal energy components. Thus, the change in internal energy is calculated, which is also an important factor in determining enthalpy change.
For a closed system, the first law of thermodynamics holds true, according to which the total energy remains constant. This can be expressed as:
ΔU=δQ-δW
Q is the heat energy supplied to the system and W is the work done.
The relation between enthalpy and internal energy can also be established by studying temperature relations. According to the second law of thermodynamics, for absolute temperature T and entropy S:
δQ=TdS
The above equation for change in internal energy can be written as:
dU=T dS - p dV
This can be further simplified to get:
dH=TdS+Vdp
The increase in temperature of the system induces kinetic energy, which changes the internal energy of the system. This also influences the enthalpy change within the thermodynamic system.
Calculating Thermodynamic Variables With CFD
When the fluid and its thermodynamic properties are the driving factors of energy transfer in a system, the calculations of variables like enthalpy, internal energy, and temperature become critical. The enthalpy equation establishes the understanding of heat transfer and power requirements for the system to operate. The numerical solution for temperature requirements can be determined for the enthalpy and internal energy changes to occur. In the case of compressible flow, pressure and power requirements can be calculated from the enthalpy equation. The calculation can be complex for incompressible flow given the challenge to establish the relationship between temperature, pressure, and density of the working fluid. In such a case, the Navier-Stokes and continuity equation can be applied.
Solving the various equations associated with a thermodynamic system can be done using CFD simulation packages. By running high-fidelity simulations, the changes in internal energy and enthalpy in a thermodynamic system can be analyzed accurately, which is critical to understanding the heat transfer within a system. By generating a heat transfer model, running a thermodynamic system simulation, and solving the governing equation for different pressure, volume, and force conditions, efficient thermodynamic design can be achieved.
Subscribe to our newsletter for the latest CFD updates or browse Cadence’s suite of CFD software, including Fidelity and Fidelity Pointwise, to learn more about how Cadence has the solution for you.
CFD Software Subscribe to Our Newsletter |
10544 | https://www.homeschoolmath.net/worksheets/ratio_word_problems.php | | | | | | | | | | |
--- --- --- ---
| You are here: Home → Worksheets → RatiosFree worksheets for ratio word problems Find here an unlimited supply of worksheets with simple word problems involving ratios, meant for 6th-8th grade math. In level 1, the problems ask for a specific ratio (such as, "Noah drew 9 hearts, 6 stars, and 12 circles. What is the ratio of circles to hearts?"). In level 2, the problems are the same but the ratios are supposed to be simplified. Level 3 contains varied word problems, similar to these: A bag contains 60 marbles, some blue and some green. The ratio of blue marbles to green ones is 1 : 5. How many blue marbles are there? or A truck is carrying mango juice, tomato juice, and passion fruit juice bottles in a ratio of 4 : 4 : 3. If there are 1020 passion fruit juice bottles, then how many juice bottles in total are there? Options include choosing the number of problems, the amount of workspace, font size, a border around each problem, and more. The worksheets can be generated as PDF or html files. For some extra tips and word problems focused on ratios, check out IXL's compare ratios: word problems activity! Basic instructions for the worksheets Each worksheet is randomly generated and thus unique. The answer key is automatically generated and is placed on the second page of the file. You can generate the worksheets either in html or PDF format — both are easy to print. To get the PDF worksheet, simply push the button titled "Create PDF" or "Make PDF worksheet". To get the worksheet in html format, push the button "View in browser" or "Make html worksheet". This has the advantage that you can save the worksheet directly from your browser (choose File → Save) and then edit it in Word or other word processing program. Sometimes the generated worksheet is not exactly what you want. Just try again! To get a different worksheet using the same options: PDF format: come back to this page and push the button again. Html format: simply refresh the worksheet page in your browser window. Ready-made ratio worksheets | | | --- | | What is the ratio given in the word problem? (grade 6) View in browser Create PDF | What is the ratio given in the word problem? (with harder numbers; grade 6) View in browser Create PDF | | Solve ratio word problems (grade 7) View in browser Create PDF | Solve ratio word problems (more workspace; grade 7) View in browser Create PDF | Generator Use the generator to make customized ratio worksheets. Experiment with the options to see what their effect is. Ratio Worksheets | | | | | Page orientation: Portrait Landscape (PDF worksheet only; the orientation of an html worksheet can be set in the print preview of the browser) Font: Font Size: Cell Padding: Border: Bordercolor: Workspace: lines below each problem | | Additional title & instructions (HTML allowed) | | | |
10545 | https://pubmed.ncbi.nlm.nih.gov/17870430/ | Staged excision versus Mohs micrographic surgery for lentigo maligna and lentigo maligna melanoma - PubMed
Clipboard, Search History, and several other advanced features are temporarily unavailable.
Skip to main page content
An official website of the United States government
Here's how you know
The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.
The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Log inShow account info
Close
Account
Logged in as:
username
Dashboard
Publications
Account settings
Log out
Access keysNCBI HomepageMyNCBI HomepageMain ContentMain Navigation
Search: Search
AdvancedClipboard
User Guide
Save Email
Send to
Clipboard
My Bibliography
Collections
Citation manager
Display options
Display options
Format
Save citation to file
Format:
Create file Cancel
Email citation
Email address has not been verified. Go to My NCBI account settings to confirm your email and then refresh this page.
To:
Subject:
Body:
Format:
[x] MeSH and other data
Send email Cancel
Add to Collections
Create a new collection
Add to an existing collection
Name your collection:
Name must be less than 100 characters
Choose a collection:
Unable to load your collection due to an error
Please try again
Add Cancel
Add to My Bibliography
My Bibliography
Unable to load your delegates due to an error
Please try again
Add Cancel
Your saved search
Name of saved search:
Search terms:
Test search terms
Would you like email updates of new search results? Saved Search Alert Radio Buttons
Yes
No
Email: (change)
Frequency:
Which day?
Which day?
Report format:
Send at most:
[x] Send even when there aren't any new results
Optional text in email:
Save Cancel
Create a file for external citation management software
Create file Cancel
Your RSS Feed
Name of RSS Feed:
Number of items displayed:
Create RSS Cancel
RSS Link Copy
Full text links
Elsevier Science
Full text links
Actions
Cite
Collections
Add to Collections
Create a new collection
Add to an existing collection
Name your collection:
Name must be less than 100 characters
Choose a collection:
Unable to load your collection due to an error
Please try again
Add Cancel
Permalink
Permalink
Copy
Display options
Display options
Format
Page navigation
Title & authors
Abstract
Similar articles
Cited by
Publication types
MeSH terms
Related information
LinkOut - more resources
Comparative Study
J Am Acad Dermatol
Actions
Search in PubMed
Search in NLM Catalog
Add to Search
. 2007 Oct;57(4):659-64.
doi: 10.1016/j.jaad.2007.02.011.
Staged excision versus Mohs micrographic surgery for lentigo maligna and lentigo maligna melanoma
Hobart W Walling1,Richard K Scupham,Andrew K Bean,Roger I Ceilley
Affiliations Expand
Affiliation
1 hobartwalling@yahoo.com
PMID: 17870430
DOI: 10.1016/j.jaad.2007.02.011
Item in Clipboard
Comparative Study
Staged excision versus Mohs micrographic surgery for lentigo maligna and lentigo maligna melanoma
Hobart W Walling et al. J Am Acad Dermatol.2007 Oct.
Show details
Display options
Display options
Format
J Am Acad Dermatol
Actions
Search in PubMed
Search in NLM Catalog
Add to Search
. 2007 Oct;57(4):659-64.
doi: 10.1016/j.jaad.2007.02.011.
Authors
Hobart W Walling1,Richard K Scupham,Andrew K Bean,Roger I Ceilley
Affiliation
1 hobartwalling@yahoo.com
PMID: 17870430
DOI: 10.1016/j.jaad.2007.02.011
Item in Clipboard
Full text links Cite
Display options
Display options
Format
Abstract
Background: Lentigo maligna (LM) is a relatively common tumor with increasing prevalence and substantial morbidity. A variety of treatment modalities are available, though margin-control surgery offers the highest cure rate. We were interested in comparing long-term outcomes of Mohs micrographic surgery (MMS) versus staged excision with permanent sections (SE) for treating LM or LM melanoma (LMM).
Methods: Comparative study consisting of retrospective chart review from our private practice.
Results: Fifty-seven patients (31 male, 26 female, mean age at diagnosis 69.1 +/- 10.1 years) were treated in our office for LM (50) or LMM (9) between January 1986 and December 2001. Forty-one tumors (71%) were located on the head and neck. Fifty-three of the 59 tumors (90%) were primary, and 6/59 (10%) were recurrent at the time of initial treatment. Forty-one tumors (36 LM, 5 LMM) were treated with SE, and 18 (14 LM, 4 LMM) were treated with MMS. The mean preoperative lesion size (1.5 +/- 0.2 cm2 for SE; 1.2 +/- 0.4 cm2 for MMS), mean postoperative defect size (7.1 +/- 1 cm2 for SE; 7.1 +/- 1.4 cm2 for MMS), and the ratio of postoperative defect to preoperative lesion size (7.9-fold increase for SE, 11.2-fold increase for MMS) were similar between the cohorts. Mean number of stages for clear margins were similar, with 1.8 +/- 0.2 stages (range: 1-7) for SE and 2.0 +/- 0.2 stages (range: 1-4) for MMS; clear margins were obtained in one or two stages in 85% of cases for SE and in 67% for MMS. Three recurrences (3/41; 7.3%) occurred in the SE group while 6 recurrences (6/18; 33%) occurred in the MMS group (P < .025). The mean follow-up duration was 95 months (range: 60-240) in the SE group and 117.5 months (range: 61-157) in the MMS group.
Limitations: Results are limited to a single practice site and fewer patients underwent MMS compared to SE. Patients were not randomized as cases were ascertained retrospectively.
Conclusion: Staged excision of LM and LMM is associated with a significantly lower recurrence rate with no difference in surgical defect size compared to MMS. To our knowledge, this is the first study directly comparing these two surgical techniques for managing this form of melanoma. Our extended follow-up duration exceeds that of most previous reports.
PubMed Disclaimer
Similar articles
Mapped serial excision for periocular lentigo maligna and lentigo maligna melanoma.Malhotra R, Chen C, Huilgol SC, Hill DC, Selva D.Malhotra R, et al.Ophthalmology. 2003 Oct;110(10):2011-8. doi: 10.1016/S0161-6420(03)00670-5.Ophthalmology. 2003.PMID: 14522781
Mohs micrographic surgery for lentigo maligna and lentigo maligna melanoma using Mel-5 immunostaining: University of Minnesota experience.Bhardwaj SS, Tope WD, Lee PK.Bhardwaj SS, et al.Dermatol Surg. 2006 May;32(5):690-6; discussion 696-7. doi: 10.1111/j.1524-4725.2006.32142.x.Dermatol Surg. 2006.PMID: 16706765
Mohs micrographic surgery in the treatment of lentigo maligna and melanoma.Temple CL, Arlette JP.Temple CL, et al.J Surg Oncol. 2006 Sep 15;94(4):287-92. doi: 10.1002/jso.20305.J Surg Oncol. 2006.PMID: 16917877
Staged margin control techniques for surgical excision of lentigo maligna.Raziano RM, Clark GS, Cherpelis BS, Sondak VK, Cruse CW, Fenske NA, Glass LF.Raziano RM, et al.G Ital Dermatol Venereol. 2009 Jun;144(3):259-70.G Ital Dermatol Venereol. 2009.PMID: 19528907 Review.
Recurrent lentigo maligna invading a skin graft successfully treated with Mohs' micrographic surgery.Cohen LM, Zax RH.Cohen LM, et al.Cutis. 1996 Mar;57(3):175-8.Cutis. 1996.PMID: 8882016 Review.
See all similar articles
Cited by
[Malignant melanoma].Göhl J, Hohenberger W, Merkel S.Göhl J, et al.Chirurg. 2009 Jun;80(6):559-67. doi: 10.1007/s00104-009-1711-2.Chirurg. 2009.PMID: 19444395 German.
Very Rare Amelanotic Lentigo Maligna Melanoma with Skull Roof Invasion.Wollina U, Hansel G, Schmidt N, Schönlebe J, Kittner T, Nowak A.Wollina U, et al.Open Access Maced J Med Sci. 2017 Jul 19;5(4):458-461. doi: 10.3889/oamjms.2017.113. eCollection 2017 Jul 25.Open Access Maced J Med Sci. 2017.PMID: 28785332 Free PMC article.
Disease-specific survival of malignant melanoma after Mohs micrographic surgery is not impacted by initial margins: A systematic review and meta-analysis.Crum OM, Campbell EH, Chelf CJ, Demer AM, Brewer JD.Crum OM, et al.JAAD Int. 2023 Jun 28;13:140-149. doi: 10.1016/j.jdin.2023.06.009. eCollection 2023 Dec.JAAD Int. 2023.PMID: 37823046 Free PMC article.
Interventions for melanoma in situ, including lentigo maligna.Tzellos T, Kyrgidis A, Mocellin S, Chan AW, Pilati P, Apalla Z.Tzellos T, et al.Cochrane Database Syst Rev. 2014 Dec 19;2014(12):CD010308. doi: 10.1002/14651858.CD010308.pub2.Cochrane Database Syst Rev. 2014.PMID: 25526608 Free PMC article.
Recurrence Rate of Melanoma in Situ when Treated with Serial Disk Staged Excision: A Case Series.Garcia D, Eilers RE, Jiang SB.Garcia D, et al.J Clin Investig Dermatol. 2017 Feb;5(1):10.13188/2373-1044.1000037. doi: 10.13188/2373-1044.1000037. Epub 2017 Feb 27.J Clin Investig Dermatol. 2017.PMID: 28936478 Free PMC article.
See all "Cited by" articles
Publication types
Comparative Study
Actions
Search in PubMed
Search in MeSH
Add to Search
MeSH terms
Aged
Actions
Search in PubMed
Search in MeSH
Add to Search
Female
Actions
Search in PubMed
Search in MeSH
Add to Search
Follow-Up Studies
Actions
Search in PubMed
Search in MeSH
Add to Search
Humans
Actions
Search in PubMed
Search in MeSH
Add to Search
Hutchinson's Melanotic Freckle / surgery
Actions
Search in PubMed
Search in MeSH
Add to Search
Male
Actions
Search in PubMed
Search in MeSH
Add to Search
Melanoma / surgery
Actions
Search in PubMed
Search in MeSH
Add to Search
Middle Aged
Actions
Search in PubMed
Search in MeSH
Add to Search
Mohs Surgery
Actions
Search in PubMed
Search in MeSH
Add to Search
Retrospective Studies
Actions
Search in PubMed
Search in MeSH
Add to Search
Skin Neoplasms / surgery
Actions
Search in PubMed
Search in MeSH
Add to Search
Related information
Cited in Books
MedGen
LinkOut - more resources
Full Text Sources
ClinicalKey
Elsevier Science
Other Literature Sources
H1 Connect - Access expert opinions and insights on biomedical research.
Full text links[x]
Elsevier Science
[x]
Cite
Copy Download .nbib.nbib
Format:
Send To
Clipboard
Email
Save
My Bibliography
Collections
Citation Manager
[x]
NCBI Literature Resources
MeSHPMCBookshelfDisclaimer
The PubMed wordmark and PubMed logo are registered trademarks of the U.S. Department of Health and Human Services (HHS). Unauthorized use of these marks is strictly prohibited.
Follow NCBI
Connect with NLM
National Library of Medicine
8600 Rockville Pike Bethesda, MD 20894
Web Policies
FOIA
HHS Vulnerability Disclosure
Help
Accessibility
Careers
NLM
NIH
HHS
USA.gov |
10546 | https://www.youtube.com/watch?v=-c-tkCFmwOE | Lecture 51 : Stagnation Properties
Advanced Fluid Mechanics - IITKGP
3530 subscribers
50 likes
Description
4444 views
Posted: 31 Mar 2018
5 comments
Transcript:
[Music] you [Music] we will continue with our discussions on compressible flows we will now discuss on something known as tag nation properties this term stagnation we have come across during our earlier topics that we have covered in fluid mechanics and one of the literal meanings is that the fluid is brought to rest at a point so that the velocity is zero so stagnation point is a point where the velocity of flow is zero but that does not mean that it suffices the requirement of discrete description of stagnation properties so we will now look into more deeply about some of the important properties which dictate the nature of the process by which the stagnation State is achieved to do that we will refer to first an important thermodynamic property and when we are referring to a thermodynamic property we will be basically referring to the first law of thermodynamics to specify that so if we say that you have a control volume say some control volume which has some Inlet I and some exit II let us say that there is some rate of heat transfer to the control volume say Q dot CV and say some rate of work done by the control volume as W dot CV and let us say that the flow is steady and the state for the properties of fluid within the control volume steady that means the properties within the control volume do not change with time so if these two conditions are simultaneously achieved then the corresponding form of the first law of thermodynamics is like this where H is the property enthalpy which is the internal energy plus pressure by the density now this particular form is also known as a steady flow energy equation just just for common understanding so this is nothing but the first law of thermodynamics expressed for a flow process across a control volume when the flow is steady and the states within the control volume are also steady not only that there are certain more important assumptions what are the important assumptions all the properties at the inlet and the exit are uniform that means our velocity profiles are uniform the thermodynamic properties like enthalpy those are uniform so it is like approximately a one dimensional representation where uniform properties across the cross section for the inlet and outlet now we are interested to apply this equation for compressible flows so when we apply this equation for compressible flows first of all if you have a system where you are not having any mechanism of extracting work from that so then this rate of work done will be zero by the control volume then if what kind of process we are considering we are considering an adiabatic process so if it is an adiabatic process that means heat transfer across the control volume is zero we are not committing whether it is reversible or irreversible so the reversibility or irreversibility features when we talk about the second law of thermodynamics when we discuss about that but in the first law of thermodynamics it is just good enough to say whether it's adiabatic or not even reversible or irreversible does not feature here now in most of the high speed gas flows the effects of the the thermal effects and the kinetic energy effects are more important than the changes in potential energy so that is negligible and therefore you are left with H I plus UI square by two is equal to h e+ u v square by okay now let us say that we are thinking about two sections instead of I and E some generic section where the profit the enthalpy this is specific enthalpy that is enthalpy per unit mass is H the velocity is U this is at some section and when you go to some another section that section is a special section when the velocity is brought to zero so this is a section of stagnation so we are interested to see that what is the corresponding enthalpy there and let us say that the name of enthalpy at that stagnation section is H 0 since it is a one-dimensional treatment section and point at the same so it's basically uniform so we can say from here that h plus u square by 2 is equal to h 0 because at the stagnation u equal to 0 so this H 0 is known as stagnation enthalpy for an ideal gas it is known that D H equal to CP DT this is for an ideal gas where CP is a function of temperature in general but when we talk about the perfect gas CP is a constant so if we say perfect gas this is a constant for perfect gas therefore we may say H minus H 0 for a perfect gas is CP into T minus T 0 at T 0 is the temperature corresponding to this stagnation enthalpy this is known as stagnation temperature why we refer to the temperature because temperature is a directly measurable quantity from experiments so it is important that we refer to that so this is known as stagnation temperature so we can write CP into T minus t0 plus u square by 2 equal to 0 okay now we may write CP in terms of R and gamma because just recall that CP minus CV is equal to R and CP by CV is equal to gamma okay so you can write CP into 1 minus 1 by gamma equal to R that means CP is equal to gamma R by gamma minus 1 so we can write T 0 minus T in place of CP we write gamma R by gamma minus 1 is equal to u square by 2 u square by 2 is what you can write u by C is equal to the Mac number say M so u square is equal to M square into C square now what will be the expression for C will depend on the nature of the process if it is an ice isentropic flow C square is gamma RT so this is equal to M square gamma RT for isentropic flow C till now whenever we define the stagnation temperature so the stagnation temperature how it is defined the stagnation temperature is defined from this equation as T 0 is equal to T plus u square by 2 CP right this definition does not require the process to be reversible so if you want to find out that what is the stagnation temperature in fact this definition does not require any process because it is just an expression so if you know the temperature and velocity at a point and specific heat at a point you know the stagnation temperature at a point so stagnation temperature is defined at a point irrespective of what is I mean what kind of state is there at that point if you want to physically achieve a stagnation temperature you have to bring the process to rest at a point in an ideal manner it need not be reversible that is not necessary because the definition followed from the fossil of thermodynamics by setting heat transfer equal to zero without imposing any condition of reversible process okay so keep one thing in mind stagnation temperature just like any stagnation properties of property so if it does not mean that at one point if it is not a stagnation point it will not have a stagnation temperature it will have a stagnation temperature because it is just dependent on the local temperature velocity and CP so it is just like a combination of properties and therefore it is a property if you say that I want to physically achieve the property then you have to follow this type this kind of a process adiabatic process now if you want to use this expression u square equal to M square into gamma RT that means you are now imposing the additional constraint that it is an isentropic process that means the reversible process so for an isentropic process these will be M square gamma RT by 2 so from this what follows is so gamma into R will cancel from both sides so you will get T 0 by T is equal to 1 plus gamma minus 1 by 2 m square right so this is the relationship between the stagnation temperature and this temperature at a point what are the assumptions under which this is valid it is an isentropic process that you have to keep in mind otherwise the more general expression is this one now you may relate the stagnation just like stagnation temperature you may have a stagnation pressure and stagnation density so those properties also you may find out so for an isentropic flow for isentropic process you have PV to the power gamma equal to constant that means basically in terms of T and P you can write T 2 by T 1 is equal to P 2 by P 1 to the power gamma minus 1 by gamma so just like you have related the stagnation temperature similarly you can relate stagnation pressure p 0 by p is equal to t 0 by T to the power gamma by gamma minus 1 that means 1 plus gamma minus 1 by 2 m square to the power gamma by gamma minus ok this is this p 0 is stagnation pressure remember assumption again is isentropic flow now so this considers compressibility we have earlier seen a case where we used Bernoulli's equation to define a stagnation pressure and that was without consideration of any compressibility so we use just the Bernoulli's equation Bernoulli's equation means it is an incompressible flow assumption and the stagnation pressure so if you consider the incompressible limit p 0 is equal to P plus half Rho u square neglecting the potential energy effect what are the assumptions it is an incompressible flow we use the Bernoulli's equation that means we implicitly assume that it is a frictionless flow so if you want to achieve physically this p 0 you have to bring the fluid to rest in a reversible and adiabatic process that will mean that it's a frictionless process if you want to achieve T 0 physically you have to bring the fluid to rest in an adiabatic process it need not be whereas to achieve p0 physically you have to bring it to race by ensuring both that it is reversible as well as adiabatic this is a very important distinction between like how you achieve physically a stagnation pressure and a stagnation temperature so now when you come to this incompressible flow so here you can write p 0 by p for an ideal gas p by rho is RT so this is 1 plus half u square by RT remember that if it is an isentropic flow C square is gamma RT so this you can write 1 plus gamma by 2 u square by C square u square by C square is M square okay so this is an expression which is which is valid for incompressible flow this is an expression that is valid for compressible flow it may be interesting to see that in a certain approximately made these two equations in certain approximation they agree with each other to do that what we may do this is the more general expression so we may expand this in a binomial theorem just like 1 plus X to the power of n so if we expand that in a binomial theorem so p 0 by P compressible so 1 plus X to the pardon is like 1 plus NX plus n into n minus 1 by factorial 2 into X square plus let us just write another term n into n minus 1 into n minus 2 by factorial 3 into X cube like that so this is 1 plus gamma by 2 m square so you can see that up to the first term it is just like the incompressible flow expression the remaining terms are the corrections because of the compressibility effect so what are the corrections so you can write maybe the first two Corrections so one is gamma minus so this is gamma by 8m for right then plus this is two plus gamma into gamma by 48 m to the power six like that sorry two minus gamma so what is it's important implication say you are using a pitot tube to measure the flow velocity at a point and you are negligent of the compressibility effect and you are using this expression for p0 by P because in a pitot tube you may get the difference between stagnation and static pressure by connecting a manometer between the stagnation point and another point which is a point located upstream to that so when you get that expression that expression will require a correction and the leading order terms that will dictate the correction the first two leading order terms are like this so if it has to have a compressibility effect these extra terms for correction need to be invoked and we can see this these terms are higher powers of M so as M becomes smaller and smaller this becomes more and more irrelevant that means for low values of Mach number the compressibility effects are smaller and smaller that is quite intuitive |
10547 | https://physexams.com/Pdf-files/Coulombs-law-problems-and-solution.pdf | Coulomb’s Law Problems and Solutions Physexams.com The force exerted by a point charge q1 on another point charge q2 located at a distance r away is given by the following formula ⃗ F = k |q1q2| r2 ˆ r where ˆ r is a unit vector points from q1 toward q2.
Note that Coulomb’s law gets only the magnitude of the electric force between two point charges.
These questions are intended for the college level and are difficult. For simple and more relevant practice problems on Coulomb’s law for the high school level, refer to here.
More Problems about all topics of electrostatic are also provided here.
The AP Physics exams are just around the corner Unlock your full potential in AP Physics 1 (2025) exam with our top-notch equation sheet and notes— grab it now for just $10, before it’s gone!
1 Coulomb’s Law: Problems and Solutions 1. Compute the electric force between two charges of 5×10−9 C and −3×10−8 C which are separated by d = 10 cm.
Solution: the magnitude of the electrostatic force between two point charges is given by Coulomb’s law as F = k |q1q2| d2 = 9 × 109 |(5 × 10−9)(−3 × 10−8)| (0.1)2 = 135 × 10−6 N where | · · · | denote the magnitude of the charges.
Note that in Coulomb’s law force formula, the sign of charges is not included only its absolute values must be entered.
2. Two spheres located at distance of d = 5 cm attract one another with a force of F = 3 mN. If one of them has three times more charges than the other, find the electric force between them?
Solution: let one of charges be q1 =? and the other q2 = 3q1. Then using Coulomb’s law Page 1 Coulomb’s Law Problems and Solutions Physexams.com formula and solving for the unknown charges, we have F = k |q1q2| d2 3 = 9 × 109 |q1 × 3q1| 0.05 ⇒q2 1 = (3 × 10−3)(0.05) (9 × 109 × 3) = 0.5 × 10−14 Taking square root from both sides gives q1 = 0.75 × 10−7 C Thus, the magnitude of the charges are q1 = 0.075 µC and q2 = 0.225 µC.
3. A point charge q1 = 2 µC located at origin and another point charge q2 = −5 µC is on the coordinate (x = 3, y = 4) m.
(a) Find the electric force on charge q1.
(b) Is the force attractive or repulsive?
Solution: the distance between two point charges is found using distance formula (Pythagorean theorem) as below d = p (x2 −x1)2 + (y2 −y1)2 which gives d = p 32 + 42 = 5 m (a) Now, use Coulomb’s law formula to find the magnitude of the force between two point charges as below F = k |q1q2| d2 = 9 × 109 |(2 × 10−6)(−5 × 10−6)| 52 = 3.6 × 10−3 N (b) Coulomb’s law gives only the magnitude of the electric force. Being repulsive or attractive depends on the signs of charges. Like charges attract and unlike charges repel each other.
Here, the two charges have opposite signs so the electric force between them is attractive.
Page 2 Coulomb’s Law Problems and Solutions Physexams.com 4. Three point charges are fixed in place in the right triangle shown below, in which q1 = 0.71 µC and q2 = −0.67 µC. What is the magnitude and direction of the electric force on the +1.0 µC (let’s call this q3) charge due to the other two charges?
Solution: First, find the electric force due to each charge on the q3, then use the superposition principle to do the vector sum of them.
In the figure below, all forces on q3 are sketched. Recall that the like charges repel each other and unlike charges attract.
The magnitude of Coulomb’s forces on the charge q3 is obtained as below ⃗ F13 = k |q1| |q3| r2 13 ˆ r13 = 9 × 109 0.71 × 10−6 1 × 10−6 (0.1)2 (cos θ ˆ x + sin θ(−ˆ y)) = 0.639 N Where ˆ r13 is the unit vector (a vector whose length is unity) along the line connecting the two charges and decomposed as shown in the figure.
Page 3 Coulomb’s Law Problems and Solutions Physexams.com Since q1 > 0 so the electric field lines are along the line between q1 and q3 and directed away from q3. From the geometry we see that sin θ = 8 10 and cos θ = √ 102−82 10 = 6 10. Therefore, ⃗ F13 = 0.639 (0.6 ˆ x + 0.8 (−ˆ y)) = (0.383ˆ x −0.511ˆ y) N Now find the electric force due to the q2 on q3 i.e. ⃗ F23 ⃗ F23 = k |q2| |q3| r2 23 ˆ r23 = (9 × 109) −0.67 × 10−6 1 × 10−6 102 −82 × 10−4 m2 (−ˆ y) = (−1.675 ˆ y) N Therefore, the resultant force on the q3 is ⃗ F3 = ⃗ F13 + ⃗ F23 = (0.383ˆ x −0.511ˆ y) + (−1.675 ˆ y) = (0.383 ˆ x −2.186 ˆ y) N The direction of the net force with the x axis are determined by tan α = |Fy| / |Fx|, so α = tan−1 2.058 0.511 = 76.05◦ Since F3x > 0 and F3y < 0 , the net force lies in the fourth quadrant.
Page 4 Coulomb’s Law Problems and Solutions Physexams.com Using Pythagorean theorem, its magnitude is also found to be ⃗ F3 = q (0.511)2 + (−2.058)2 = 2.12 N 5. Two small insulating spheres are attached to silk threads and aligned vertically as shown in the figure. These spheres have equal masses of 40 g, and carry charges q1 and q2 of equal magnitude 2.0 µC but opposite sign.The spheres are brought into the positions shown in the figure, with a vertical separation of 15 cm between them.
Note that you cannot neglect gravity. What is the tension in the lower threads?
Solution: There are three forces acting on q2. The attractive electrostatic force Fe due to q1, tension force in the thread, and gravity. Thus, its free body diagram is as follows Page 5 Coulomb’s Law Problems and Solutions Physexams.com The system is in equilibrium so the net force on the q2 is zero i.e.
(ΣFy)2 = 0 ⇒Fe −T −mg = 0 ⇒T = k |q1| |q2| (15)2 −mg ⇒T = 9 × 109 2 × 10−6 2 × 10−6 (0.15)2 −(0.040 × 9.8) = 1.208 N 6. Four identical particles, each having charge +q, are fixed at the corners of a square of side L. A fifth point charge −Q (at P point) lies a distance z along the line perpendicular to the plane of the square and passing through the center of the square. Determine the force exerted by the other four charges on −Q.
Solution: Because the magnitude and distance of all charges are equal so consider |F1| = |F2| = |F3| = |F4| = k |qQ| r2 Page 6 Coulomb’s Law Problems and Solutions Physexams.com By symmetry consideration, Fx = Fy = 0. So the direction of one of the forces is: ⃗ F1z = k |qQ| r2 cos θ −ˆ k = −k |qQ| r3 zˆ k Where we have used from the geometry of the problem cos θ = z/r. By symmetry ⃗ F1z = ⃗ F2z = ⃗ F3z = ⃗ F4z = −k |qQ| r3 zˆ k So ⃗ Fz = Σ4 i=1 ⃗ Fiz = −4k qQ r3 zˆ k In terms of the parameters of the square and using the Pythagorean theorem, we have: x = √ 2 2 L , r = v u u tz2 + √ 2 2 L !2 ⃗ Fz = −4k Qq z2 + √ 2 2 L 2 3 2 z ˆ k 7. Three point charges are located at the corners of an equilateral triangle an in the figure. Find the magnitude and direction of the net electric force on the 7 µC charge.
Page 7 Coulomb’s Law Problems and Solutions Physexams.com Solution: Same as the previous problem, first we must calculate each of the electric forces due to the 2 µC, −4 C charges exerted on the third charge then use the superposition principle to determine the net electric force on it.
⃗ F21 = k |q1q2| r2 12 ˆ r21 = 9 × 109 2 × 10−6 × 7 × 10−6 (0.5)2 ˆ r21 = 0.504 ˆ r21 N ˆ r21 is the unit vector points from q2 toward q1 so if one decomposes it, we get ⃗ F21 = 0.504 1 2 ˆ x + √ 3 2 ˆ y !
N (Notation: F12 is the force exerted by point charge q1on point charge q2) ⃗ F31 = k |q1q3| r2 13 ˆ r31 = 9 × 109 7 × 10−6 × (−4) × 10−6 (0.5)2 (cos 60◦ˆ x + sin 60◦(−ˆ y)) N = 1.008 1 2 ˆ x + √ 3 2 (−ˆ y) !
N Using superposition principle: ⃗ F1=⃗ F31+⃗ F32, we obtain ⃗ F1 = 0.504 1 2 ˆ x + √ 3 2 ˆ y !
+ 1.008 1 2 ˆ x + √ 3 2 (−ˆ y) !
= 0.756 ˆ x −0.437 ˆ y (N) And its magnitude is ⃗ F1 = q (0.756)2 + (−0.437)2 = 0.873 N Page 8 Coulomb’s Law Problems and Solutions Physexams.com And also the direction of the resultant force with the horizontal axis (x) is α = tan−1 |−0.437| |0.756| = 30.02◦ Since F1x > 0 and F1y < 0 so the net force lies in the fourth quadrant.
8. Four point charges are at the corners of a square. The distance from each corner to the center is 0.3 m.
At the center, there is a −q point charge.
What is the magnitude of the net force on this charge?
Solution: Note: the electric force vector between two point charges located at distance r from each other is ⃗ F = k |q1q2| r2 ˆ r.
When there is a system of point charges and we want to find the net force on one of the charges, we must use the superposition principle i.e. the vector sum of the individual electric forces on the desired charge: ⃗ Fnet=⃗ F1+⃗ F2+⃗ F3 + . . . So we must vector sum the individual forces due to four point charges on the −q in the center.
The drawing below shows the direction of the individual forces.
|F1| = |F2| = k |(−q) (+q)| (0.3)2 = + kq2 0.09 |F3| = |F4| = k |(−q) (−q)| (0.3)2 = +k q2 0.09 Because the F1, F2 and F3, F4 are separately in opposite directions to each other (i.e. ⃗ F1 = −⃗ F2 and ⃗ F3 = −⃗ F4) so the net force is ⃗ Fnet = ⃗ F1 + ⃗ F2 + ⃗ F3 + ⃗ F4 = 0 Page 9 Coulomb’s Law Problems and Solutions Physexams.com 9. A electron is fixed at the position x = 0, and a second charge q is fixed at x = 4 × 10−9 m (to the right).
A proton is now placed between the two at x′ = 1 × 10−9 m. What must the charge q be (magnitude and sign) so that the proton is in equilibrium?
Solution: The magnitude of the electric force between two point charges q and q′ located at distance r from each other is given by the Coulomb’s law as follows F = k |q q′| r2 Where k = 9 × 109 N · m2/C2. The directions of forces the two charges exert on each other are always along the line joining them.
The figure below is a free-body diagram for the proton. Let us consider the charge q to be positive. In such a case, F is the force exerted on the proton by the electron, and F ′ is the force exerted by the charge q on it. Now compute these forces and use the superposition principle to find the total force acting on the proton.
⃗ Ftot = ⃗ F + ⃗ F ′ = k |(−e) (+e)| x ′2 −ˆ i + k |(+e) q| (x −x ′)2 +ˆ i Since the charge q is in equilibrium state so the total force exerted on it must be zero ⃗ Ftot = 0 , equilibrium condition k |(−e) (+e)| x ′2 −ˆ i + k |(+e) q| (x −x ′)2 +ˆ i = 0 ⇒ e x ′2 = |q| (x −x ′)2 ⇒e x −x ′2 = |q| x ′2 e(4 nm −1nm)2 = |q| (1nm)2 ⇒|q| = 9e If we assume that the charge q is negative, we get the same result.
10. Four point charges lie on the corners of a square of side L = a √ 2. What is the magnitude of the net Coulomb force at the place of charge −q?
Solution: Similar to the previous problem, first find (using the definition of Coulomb’s law) each electric force on charge −q then form the vector sum of them and determine its magni-tude. Charges q1 and q3 (in the figure below) have the same magnitude and are at equal Page 10 Coulomb’s Law Problems and Solutions Physexams.com distances from q4 so the magnitude of their Coulomb forces acted on q4 are equal.
Coulomb’s law : F = k |q| |q′| d2 F14 = F34 = k |q| | −q| a √ 2 = k |q|2 2a2 Since the two charges have the opposite signs so the electric force (attractive) on q4 due to q1 is to the left and due to q3 is downward as shown in the figure. Therefore, the net force of them, F, is √ 2 F14 or √ 2 F34.
Similarly, find the electrostatic force F24 due to charge q2 on q4.
F24 = k |q| | −q| (2a)2 = 1 4 k |q|2 a2 The distance between q2 and q4 is the diagonal length of the square which is obtained using the Pythagorean theorem.
The charges q2 and q4 have opposite signs, so the Coulomb force between them is attractive and directed inward along the diagonal of the square.
The magnitude of the net Coulomb force on q2 is determined by adding the other magnitudes since they are directed in the same direction along the diagonal of the square. Thus, F2 = F + F24 = k |q|2 2a2 + 1 4 k |q|2 a2 = k |q|2 a2 1 2 + 1 4 = 3 4 k |q|2 a2 11. Four point charges are located on the corners of a square shown in the figure. If the net Coulomb force on q2 is zero, what is the ratio of Q q ?
Page 11 Coulomb’s Law Problems and Solutions Physexams.com Solution: Since |q1| = |q3| = q and placed at a equal distance of charge q2 so F12 = F32. We know that the resultant vector of two perpendicular and equal vectors F is given as √ 2 F so, in this case, the magnitude of the net force acting on charge q2 due to q1 and q3 is F = √ 2 F12 along the diagonal (q2 −q4) of the square and directed outward as shown in the figure.
The total electric force on charge q2 is the vector sum (superposition principle) of ⃗ F2 = ⃗ F + ⃗ F42 since said that it is zero ⃗ F2 = 0 so the electrostatic force of q4 on q2 i.e. ⃗ F42 must be equal in magnitude and opposite in direction with ⃗ F. Therefore, by equating the magnitudes of the Page 12 Coulomb’s Law Problems and Solutions Physexams.com forces i.e. F = F42 we obtain F = F42 √ 2 F12 = F42 √ 2 k |q1| |q2| a2 = k |q4| |q2| ( √ 2 a)2 √ 2|q| |Q| 1 = | 1 2Q| |Q| 2 ⇒Q q = 4 √ 2 12. In The configuration of three point charges, as shown in the figure below, the Coulomb force on each charge is zero. Determine the ratio of charges q3 and q2 i.e.
q3 q2 .
Solution: Since the ratio of the q3 q2 is required and the net force on each charge is zero we must balance the forces on the charge q1 because in this case, the magnitude of q1 cancels from both sides as below, F21 = F31 k |q1| |q2| (20)2 = k |q1| |q3| (30)2 |q2| 400 = |q3| 900 ⇒|q3| |q2| = 9 4 Note: since the expression above is an equality so no need to convert the units to SI.
Page 13 Coulomb’s Law Problems and Solutions Physexams.com Now that the ratio of the magnitudes of the charges is obtained we must determine its signs.
As you can see in the figure because the forces ⃗ F31 and ⃗ F32 are in the opposite directions (to produce a zero net force on q1) so the charges q2 and q3 must be unlike.
The exact sign of charges can not be determined as long as at least the sign of one charge is given. See the later problem.
13. Two point charges q1 = +2 µC and q2 = +8 µC are 30 cm apart from each other.
Another charge q is placed so that the three charges are brought to a balance.
What is the magnitude and sign of the charge q?
Solution: To find the location of the third charge, place a positive (or negative) test charge q3 somewhere between q1 and q2. Since all charges here are positive (negative), by Coulomb’s law, the electrostatic forces on the test charge are repulsive (attractive) and to the left (right) and right (left) of it. Consequently, the net electric force can be zero between them at a distance of say x from charge q1.
Now, balance the magnitude of the forces on the test charge q3 as below to find the location of it F13 = F23 k |q1| |q3| x2 = k |q2| |q3| (30 −x)2 2 x2 = 8 (30 −x)2 ⇒2x = 30 −x ⇒x = 10 cm In above, the required charge q3 is canceled from both sides and one can not find its sign and value. To find the magnitude and sign of q3, balance the forces on another charge, say q1 as Page 14 Coulomb’s Law Problems and Solutions Physexams.com below F31 = F21 k |q1| |q3| (10)2 = k |q2| |q1| (30)2 |q3| 100 = 8 900 ⇒|q3| = 8 9 The electric force ⃗ F21 is repulsive and directed to the −x axis. Since the net force on each charge is zero the charge q3 must be negative to provide an attraction force in the opposite direction of ⃗ F21 that is to the +x axis.
Therefore, the third charge is negative, located at a distance of 10 cm between the two other charges.
14. In the corners of a square of side L, four point charges are fixed as shown in the figure below. What angle does make the net Coulomb force vector on the charge q located at the point B in the upper right corner with the horizontal?
Solution: In this problem, there is no need to do any explicit calculation, only justify the desired direction.
The electric force vector on the charge q at the corner B is the vector sum of the forces acting by the other charges −q on it. Therefore, using superposition principle, we have ⃗ FB = ⃗ FAB + ⃗ FDB + ⃗ FCB Page 15 Coulomb’s Law Problems and Solutions Physexams.com Similar to the previous problems, since the magnitude and distance of charges located at A and C are equal and the same so |⃗ FAB| = |⃗ FCB| = F. On the other hand, those forces are attractive and directed to the points A and C as shown in the figure. Thus, their resultant electric force lies along the diagonal of BD points inward with the magnitude of √ 2 F.
The force between charge −q at point D and q at point B is also attractive, lies along the diagonal of BD, and points inward. Therefore, Adding these three force vectors gives a resul-tant Coulomb force vector ⃗ FB directed with an angle of (180 + 45)◦along the BD diagonal as shown in the figure.
15. Three equal point charges are placed at the vertices of an equilateral triangle of side a. What is the magnitude and direction of the Coulomb force on the charge q at the point A? (q = 10 µC and a = 4 √ 3 m).
Page 16 Coulomb’s Law Problems and Solutions Physexams.com Solution: first find the magnitudes of ⃗ FBA and ⃗ FCA using Coulomb’s force law as below FBA = k |qB| |qA| d2 = k q2 4 √ 3 2 = k q2 √ 3 = (9 × 109) (10 × 10−6)2 √ 3 = 9 √ 3 × 10−1 N Since the distance to qA and the magnitudes of qB and qC are the same so FBA = FCA = F.
Now find the direction of the electrostatic forces above using vector components. ⃗ FBA makes an angle of 60◦with the +x direction and ⃗ FCA an angle of 60◦with the −x direction. Thus, the above forces can be written in the following vector form ⃗ FBA = |⃗ FBA| | {z } F cos 60◦ˆ i + sin 60◦ˆ j ⃗ FCA = |⃗ FCA| | {z } F cos 60◦(−ˆ i) + sin 60◦ˆ j The x-components will add up to zero which gives the x-component of the net force on the Page 17 Coulomb’s Law Problems and Solutions Physexams.com charge on the position A. The sum of the y-components also gives FAy = F sin 60◦+ F sin 60◦ = 2F sin 60◦ = 2F × √ 3 2 !
= √ 3 F = √ 3 × 9 √ 3 × 10−1 = 0.9 N Therefore, the resultant Coulomb force on qA directed upward and is written as ⃗ FA = 0.9 ˆ j.
16. Four unknown point charges are held at the corners of a square. Suppose q4 is at equilibrium and Let q1 = q3 = −5 µC then what is the magnitude of the charge q2 and the sign of the ratio of q2 q4 .
Solution: Since q4 is at equilibrium, the net electric force on it must be zero. Applying the superposition principle at point 4 we get ⃗ Fnet−on−q4 = 0 ⃗ F14 + ⃗ F24 + ⃗ F34 = 0 ⇒⃗ F14 + ⃗ F34 = −⃗ F24 Let’s consider first the charge q4 is positive. Because of being negative of the charges q1 and q3, their forces on q4 are attractive, to the right and up direction which gives a net force F along the diagonal of the square and directed inward.
Page 18 Coulomb’s Law Problems and Solutions Physexams.com In this case, the electric force ⃗ F24 must be diagonally and directed outward to cancel the contribution F (See the right figure). This result tells us that the force between q2 and q4 must be repulsive, or they must have like charges.
Because we assumed q4 > 0, so q2 is also positive. Thus, q2 q4 > 0 for this situation.
Similar reasoning can be also applied for the case of a negative q4 charge (left figure). Conse-quently, q4 and q2 are unlike charges or its ratio is q2 q4 < 0.
Consequently, this analysis tells us that q2 must be always positive.
Since |q1| = |q3| = |q| and are at an equal distance to q4 so their forces on q4 due to these charges are also equal with magnitude (using Coulomb’s law formula) F14 = F34 = = k |q1 or q3||q4| a2 = k |q| |q4| a2 Pythagorean theorem gives the net electric force on q4 due to q1 and q3 as F = q F 2 14 + F 2 34 = q F 2 14 + F 2 14 = √ 2 F14 Now we proceed to determine the magnitude of q2 by applying the equilibrium condition on charge q4 (the magnitude of the forces along the square diagonal (F and F24) must be equal) Page 19 Coulomb’s Law Problems and Solutions Physexams.com as below F = F24 √ 2 F14 = k |q2| |q4| ( √ 2 a)2 √ 2 k |q1| |q4| a2 = k |q2| |q4| ( √ 2 a)2 √ 2 5 × 10−6 a2 = |q2| 2a2 ⇒|q2| = 10 √ 2 µC the first equality is the equilibrium condition. Therefore, the charge q2 has a magnitude of 10 √ 2 µC .
17. Two point charges of q1 = +2 µC and q2 = −8 µC are at a distance of d = 10 cm.
Where must a third charge q3 be placed so that the net Coulomb force acted upon it is zero?
Solution: Put a positive (or negative) test charge q3 between them and examine whether the net Coulomb force on it is zero or not. In this case, the net electrostatic force on the positive (negative) test charge due to the charges q1 and q2 is to the right (left). Thus, there is no space between them to balance a test charge.
Now place that test charge q3 outside them, say in the left of the charge q1 at a distance x from it. One can see that, in this case, the forces on the q3 can be balanced and canceled by each other. Therefore, apply Coulomb’s force law and find the unknown x as below, F13 = F23 k |q1| |q3| x2 = k |q2| |q3| (10 + x)2 |2 × 10−6| x2 = | −8 × 10−6| (10 + x)2 1 x2 = 4 (10 + x)2 ⇒1 4 = x2 (x + 10)2 ⇒ x x + 10 = ±1 2 In the fifth equality, the square root is taken from both sides. Solving the last equation for x, we get x = 10 cm.
18. In the figure below, what is the magnitude and direction of the net Coulomb force vector acted on the charge qO = q by the eight other charges placed on the Page 20 Coulomb’s Law Problems and Solutions Physexams.com circumference of a circle of radius R = 100 cm. Let q0 = +20 µC and other charges be q1 = q2 = q3 = q4 = q5 = q7 = q8 = q = 50 µC q6 = −q The charge q0 is held at the center of circle.
Solution: Using the symmetry of the charge configuration, one can realize that the electric forces due to a pair of charges (q1, q5), (q2, q8) and (q3, q7) on the charge at the origin qO are equal in magnitude and opposite in direction, so cancel each other. Consequently, the net force on the charge q at the center is only due to the charges q6 and q2 which its magnitudes (F1O and F6O) are computed by applying Coulomb’s law as below F = F1O = F6O F = k |q1| |q| R2 = k |q6| |q| R2 F = k |q| |q| R2 = k | −q| |q| R2 ⇒F = k |q|2 R2 = (9 × 109) (50 × 10−6)(20 × 10−6) (100 × 10−2)2 = 9 N The charge q6 attracts and q1 repels the charge q at the center so the magnitude of the net electric force at point O is 2 times the magnitude of the force between q6 or q1 and q at center i.e. |⃗ FO| = 2F = 19 N.
Page 21 Coulomb’s Law Problems and Solutions Physexams.com The resultant electric force ⃗ FO lies on the third quadrant, points radially outward, and makes an angle of (180 + 45)◦with the positive x axis or 45◦with the −x axis. Its vector form is written as follows ⃗ FO = 18 cos 45◦(−ˆ i) + sin 45◦(−ˆ j) Page 22 |
10548 | https://byjus.com/biology/biogeochemical-cycles/ | What is a Biogeochemical Cycle?
“Biogeochemical cycles mainly refer to the movement of nutrients and other elements between biotic and abiotic factors.”
The term biogeochemical is derived from “bio” meaning biosphere, “geo” meaning the geological components and “chemical” meaning the elements that move through a cycle.
The matter on Earth is conserved and present in the form of atoms. Since matter can neither be created nor destroyed, it is recycled in the earth’s system in various forms.
The earth obtains energy from the sun which is radiated back as heat, rest all other elements are present in a closed system. The major elements include:
Carbon
Hydrogen
Nitrogen
Oxygen
Phosphorus
Sulphur
These elements are recycled through the biotic and abiotic components of the ecosystem. The atmosphere, hydrosphere and lithosphere are the abiotic components of the ecosystem.
Types of Biogeochemical Cycles
Biogeochemical cycles are basically divided into two types:
Gaseous cycles – Includes Carbon, Oxygen, Nitrogen, and the Water cycle.
Sedimentary cycles – Includes Sulphur, Phosphorus, Rock cycle, etc.
Let us have a look at each of these biogeochemical cycles in brief:
Water Cycle
The water from the different water bodies evaporates, cools, condenses and falls back to the earth as rain.
This biogeochemical cycle is responsible for maintaining weather conditions. The water in its various forms interacts with the surroundings and changes the temperature and pressure of the atmosphere.
There’s another process called Evapotranspiration (i.e. vapour produced from leaves) which aids this process. It is the evaporation of water from the leaves, soil and water bodies to the atmosphere which again condenses and falls as rain.
Also Read: Water Cycle
Carbon Cycle
It is one of the biogeochemical cycles in which carbon is exchanged among the biosphere, geosphere, hydrosphere, atmosphere and pedosphere.
All green plants use carbon dioxide and sunlight for photosynthesis. Carbon is thus stored in the plant. The green plants, when dead, are buried into the soil that gets converted into fossil fuels made from carbon. These fossil fuels when burnt, release carbon dioxide into the atmosphere.
Also, the animals that consume plants, obtain the carbon stored in the plants. This carbon is returned to the atmosphere when these animals decompose after death. The carbon also returns to the environment through cellular respiration by animals.
Huge carbon content in the form of carbon dioxide is produced that is stored in the form of fossil fuel (coal & oil) and can be extracted for various commercial and non-commercial purposes. When factories use these fuels, the carbon is again released back in the atmosphere during combustion.
Also Read:Carbon cycle
Nitrogen Cycle
It is the biogeochemical cycle by which nitrogen is converted into several forms and it gets circulated through the atmosphere and various ecosystems such as terrestrial and marine ecosystems.
Nitrogen is an essential element of life. The nitrogen in the atmosphere is fixed by the nitrogen-fixing bacteria present in the root nodules of the leguminous plants and made available to the soil and plants.
The bacteria present in the roots of the plants convert this nitrogen gas into a usable compound called ammonia. Ammonia is also supplied to plants in the form of fertilizers. This ammonia is converted into nitrites and nitrates. The denitrifying bacteria reduce the nitrates into nitrogen and return it into the atmosphere.
Also Read:Nitrogen Cycle
Oxygen Cycle
This biogeochemical cycle moves through the atmosphere, the lithosphere and the biosphere. Oxygen is an abundant element on our Earth. It is found in the elemental form in the atmosphere to the extent of 21%.
Oxygen is released by the plants during photosynthesis. Humans and other animals inhale the oxygen exhale carbon dioxide which is again taken up by the plants. They utilise this carbon dioxide in photosynthesis to produce oxygen, and the cycle continues.
Also Read:Oxygen Cycle
Phosphorous Cycle
In this biogeochemical cycle, phosphorus moves through the hydrosphere, lithosphere and biosphere. Phosphorus is extracted by the weathering of rocks. Due to rains and erosion phosphorus is washed away in the soil and water bodies. Plants and animals obtain this phosphorus through the soil and water and grow. Microorganisms also require phosphorus for their growth. When the plants and animals die they decompose, and the stored phosphorus is returned to the soil and water bodies which is again consumed by plants and animals and the cycle continues.
Also Read:Phosphorus cycle
Sulphur Cycle
This biogeochemical cycle moves through the rocks, water bodies and living systems. Sulphur is released into the atmosphere by the weathering of rocks and is converted into sulphates. These sulphates are taken up by the microorganisms and plants and converted into organic forms. Organic sulphur is consumed by animals through food. When the animals die and decompose, sulphur is returned to the soil, which is again obtained by the plants and microbes, and the cycle continues.
Also Read:Sulphur cycle
Importance of Biogeochemical Cycles
These cycles demonstrate the way in which the energy is used. Through the ecosystem, these cycles move the essential elements for life to sustain. They are vital as they recycle elements and store them too, and regulate the vital elements through the physical facets. These cycles depict the association between living and non-living things in the ecosystems and enable the continuous survival of ecosystems.
It is important to comprehend these cycles to learn their effect on living entities. Some activities of humans disturb a few of these natural cycles and thereby affecting related ecosystems. A closer look at these mechanisms can help us restrict and stop their dangerous impact.
To learn more about biogeochemical cycles, and their types, keep visiting BYJU’S website or download BYJU’S app for further reference.
Explore Your Knowledge!
Q5
Put your understanding of this concept to test by answering a few MCQs. Click ‘Start Quiz’ to begin!
Select the correct answer and click on the “Finish” buttonCheck your score and answers at the end of the quiz
Congrats!
Visit BYJU’S for all Biology related queries and study materials
Your result is as below
0 out of 0 arewrong
0 out of 0 are correct
0 out of 0 are Unattempted
Login To View Results
Did not receive OTP?
Request OTP on
Login To View Results
Comments
Leave a Comment Cancel reply
Abhishek June 25, 2020 at 8:14 pm
Excellent work of byju’s app👌
Reply
- tanya September 2, 2020 at 3:49 pm
can i have digram of all cycles
Reply
- No way January 20, 2021 at 10:15 am
You are the best 👌🥰😇
Reply
- Rama Amit Sagare August 11, 2021 at 1:36 pm
Thanks Byjus for your Answer. It helped me a lot.
Reply
- Aman April 17, 2023 at 4:21 pm
I need some MCQ question on environmental awareness
Reply
Mentor April 24, 2023 at 10:29 am
You can find these here:
Reply
Register with BYJU'S & Download Free PDFs
Register with BYJU'S & Watch Live Videos |
10549 | https://www.youtube.com/playlist?list=PLa8j0YHOYQQIj0RV3sPSOfCkNc2xF9U5n | Symmedian Lines and the Symmedian Point - YouTube
Back
Skip navigation
Search
Search with your voice
Sign in
Home HomeShorts ShortsSubscriptions SubscriptionsYou YouHistory History
Play all
Symmedian Lines and the Symmedian Point
by Mr. Math
•
Playlist•10 videos•9,144 views
Play all
PLAY ALL
Symmedian Lines and the Symmedian Point
10 videos 9,144 views Last updated on Mar 14, 2021
Save playlist
Shuffle play
Share
Show more
Mr. Math
Mr. Math
Subscribe
Play all
Symmedian Lines and the Symmedian Point
by Mr. Math
Playlist•10 videos•9,144 views
Play all
1
19:16 19:16 Now playing
Symmedian Construction - First Proof
Mr. Math
Mr. Math
•
5.5K views • 9 years ago
•
2
12:34 12:34 Now playing
Symmedian Construction - Second Proof
Mr. Math
Mr. Math
•
1.9K views • 9 years ago
•
3
7:00 7:00 Now playing
Application of the Symmedian - 2000 Poland MO Problem 2
Mr. Math
Mr. Math
•
1.7K views • 9 years ago
•
4
11:28 11:28 Now playing
Application of the Symmedian - IMO SL 2003 Geometry 2
Mr. Math
Mr. Math
•
2K views • 9 years ago
•
5
8:28 8:28 Now playing
Symmedian - 2001 Vietnam TST Problem 2
Mr. Math
Mr. Math
•
2.3K views • 9 years ago
•
6
9:23 9:23 Now playing
Symmedian - USA TST 2007
Mr. Math
Mr. Math
•
2K views • 9 years ago
•
7
8:16 8:16 Now playing
Symmedian - Spiral Similarity Application
Mr. Math
Mr. Math
•
2.1K views • 9 years ago
•
8
9:46 9:46 Now playing
Symmedian - USA TST 2008 Problem 7
Mr. Math
Mr. Math
•
1.5K views • 9 years ago
•
9
8:13 8:13 Now playing
Symmedian - SS Application Second Proof
Mr. Math
Mr. Math
•
741 views • 9 years ago
•
10
31:06 31:06 Now playing
2019 Poland Math Olympiad Geometry problem (Symmedian line, Incenter Excenter Lemma, Monge Theorem)
Mr. Math
Mr. Math
•
3.8K views • 4 years ago
•
Search
Info
Shopping
Tap to unmute
2x
If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
Cancel Confirm
Share
- [x] Include playlist
An error occurred while retrieving sharing information. Please try again later.
Watch later
Share
Copy link
0:00
/
•Watch full video Live
•
•
NaN / NaN
[]( |
10550 | https://www.legislate.ai/blog/what-is-a-town-hall-meeting | Valentina Golubovic
|
October 29, 2024
Town hall meetings: Importance, how to lead and questions to ask
This article explains what a town hall meeting is, the steps required to set it up and the benefits of organising one for your business.
A town hall meeting is a type of gathering where employees can learn more about the company and its goals. It's also a chance for employees to give feedback on how they think things should be done and for management to reinforce company culture and convey any messages to the whole company.
Town hall meetings, also known as all hands meetings, are usually held in a large room, with all employees attending. The CEO of the company typically addresses the crowd at some point during the meeting, but other senior staff may also speak. Town hall meetings often include presentations from people who work in different departments of the company, such as the head of marketing or the head of sales.
Town halls don't have to be complicated— depending on the size of your company they can be as simple as having lunch with your team every once in a while or hosting an informal gathering. But they can also be more formal events that include presentations and discussions led by managers or executives.
3 reasons why town hall meetings are important
1. Sense of community
Having all employees in one room (physical or virtual) can bring a sense of community and cohesion to your company. Effective town hall meetings organised for company presentations, allow for direct interaction between managers and employees and create an environment where everyone feels like their voice is being heard.
2. Obtain feedback
It is a great way to get feedback from staff and answer any concerns in real-time. Reaching out to a CEO can often feel intimidating, by providing a designated time to ask questions, a town hall erases intimidating thoughts by facilitating an environment where questions and concerns are welcomed.
3. Employee engagement
A town hall meeting is a great way for medium and large-sized companies to keep in touch with their employees and make sure everyone knows what's going on. They're also a great way for employees to get answers to questions they may have about their jobs or the company. A study by Slack found that 80% of workers want to know more about how decisions are made, this means including your employees in the decision making process or at least explaining how and why significant decisions are made can be beneficial for employee morale and engagement.
A town hall meeting is a great way to connect with your employees. It's an opportunity for you to talk about the company's goals, engage with your employees, and get feedback from them on how things are going at work.
6 ways to lead a town hall meeting
If you're new to leading town hall meetings, here are some tips for getting started:
1. IT issues
Iron out any foreseeable IT-related issues. If you are hosting an online town hall meeting check that you have a reliable internet connection, good audio and video quality as well as a sufficient internet speed.
2. Location
Town hall meetings are usually held in a large room, where all employees are encouraged to attend. The CEO of the company typically addresses the crowd at some point during the meeting, but other senior staff may also speak. Town hall meetings often include presentations from people who work in different departments of the company. It's an opportunity for those heads of departments to discuss key projects and updates.
A study by the Centre for Economic Policy Research found that for a few employees, a virtual meeting may be beneficial however once that number goes above 10 there is a loss in meeting efficiency. Through clear communication, body language and increased focus and engagement, an in-person event can prove to be more efficient. Consider getting all staff together for your company town hall meeting at least once a year or more frequently if possible.
A virtual town hall meeting can be hosted over Zoom, Skype, Bluejeans or other popular platforms. Virtual town hall meetings are integral in an age where remote working is the norm and companies are globalised.
3. Timing
Try and coordinate with all departments to make sure all staff are available and can make it. Be clear about how the town hall will last so that attendees know how much time they need to allot. Allocate a specific amount of time for each section and make sure all participants stick to this.
4. Know your audience
Your audience will be your employees. Concentrate on what you want them to take away from this meeting as a collective. Avoid getting too technical unless someone asks a specific question. Your employees will be from different departments, so technological talk might not appeal to your sales team, it's vital to speak a common language all your employees understand.
5. Set an agenda
Timekeeping is important for a successful meeting, spending too long on a section or going over time can lead to employees feeling frustrated and disengaged, especially during a virtual town hall meeting. Set an agenda ahead of time so that there's enough time for each section of the meeting. Inform employees of the program for the meeting as well as updates on what's coming up after each section for a smooth meeting. To streamline information sharing during your town hall meeting, you can generate QR codes online and use them to provide easy access to agendas, presentation slides, and feedback forms, ensuring a smooth and interactive experience for all attendees.
Employees will like to hear from their senior leadership team and make sure that the meeting agenda is representative and includes all key members of the company.
6. Encourage active participation
Asking open-ended questions that require more than just a yes/no answer, such as "How do we make sure our product is useful?" or "How has this change affected your job?" will encourage employees to expand on their feelings and ideas. Allocate time for answering questions at the end of the meeting.
Common questions to ask during a town hall meeting
Whether you are a CEO who wants to prepare for any challenging questions or an employee who needs some inspiration on how to engage with the leadership team, below are some common questions that can get asked during town hall meetings.
New initiatives at work and the impact they will have?
Upcoming changes in your department, and what steps are being taken to prepare for them?
Employee benefits or other perks
Working styles, hybrid/remote and how the company is accommodating/planning to accommodate all staff
Company values and how they're being applied at work every day
Questions on recent changes in management
Progress update on recent projects
Conclusion
A town hall meeting is a great way to engage with your employees, and it's a great way to get feedback from them. Town hall meetings can be effective at increasing morale, improving communication between your company and its employees, and making sure that everyone feels heard.
About Legislate
As an Operations professional, you know that having clear, legally sound contracts in place is essential for smooth business operations. With Legislate, you can easily create and manage contracts that are tailored to your specific circumstances. Plus, our platform allows for easy electronic signing, making the contract process more efficient for your team. Book a demo or sign up today to put the confidence back into contracting.
The opinions on this page are for general information purposes only and do not constitute legal advice on which you should rely.
Operations
Keep reading
### February 20, 2023
Advantages and disadvantages of working with recruiters
This article discusses the pros and cons of using a recruitment agency and the steps to follow to work with one.
### June 15, 2023
What opportunities are there for SMEs to thrive?
Learn more about the opportunities for SMEs to thrive, including digitalisation, expansion, talent acquisition, and adoption of legal tech.
### February 20, 2023
Separate legal personality & limited liability
The article explains the concept of separate legal personality means that a company is considered a legal person separate from its owners and directors.
Book a demo and discover how Legislate can supercharge your business
Book a demo |
10551 | https://en.wikipedia.org/wiki/Tritium | Jump to content
Search
Contents
1 History
2 Decay
3 Production
3.1 Lithium
3.2 Boron
3.3 Deuterium
3.4 Fission
3.4.1 Fukushima Daiichi
3.5 Helium-3
3.6 Cosmic rays
3.7 Production history
3.7.1 USA
4 Properties
5 Health risks
6 Environmental contamination
6.1 Regulatory limits
7 Use
7.1 Radiometric assays in biology and medicine
7.2 Self-powered lighting
7.3 Nuclear weapons
7.3.1 Neutron initiator
7.3.2 Boosting
7.3.3 Tritium in hydrogen bomb secondaries
7.4 Controlled nuclear fusion
7.5 Electrical power source
7.6 Use in electron tubes
8 Use as an oceanic transient tracer
8.1 North Atlantic Ocean
8.2 Pacific and Indian oceans
8.3 Mississippi River system
9 See also
10 Footnotes
11 References
12 External links
Tritium
Afrikaans
العربية
Asturianu
Azərbaycanca
Basa Bali
বাংলা
Беларуская
Беларуская (тарашкевіца)
Български
Bosanski
Brezhoneg
Català
Чӑвашла
Čeština
Cymraeg
Dansk
الدارجة
Deutsch
Eesti
Ελληνικά
Español
Esperanto
Euskara
فارسی
Français
Gaeilge
Galego
贛語
한국어
Հայերեն
हिन्दी
Hornjoserbsce
Hrvatski
Bahasa Indonesia
Interlingua
Italiano
עברית
ქართული
Қазақша
Kiswahili
Latviešu
Lietuvių
Magyar
Македонски
Malagasy
മലയാളം
मराठी
Bahasa Melayu
Nederlands
日本語
Norsk bokmål
Occitan
پنجابی
Plattdüütsch
Polski
Português
Romnă
Русский
සිංහල
Simple English
Slovenčina
Slovenščina
Српски / srpski
Srpskohrvatski / српскохрватски
Suomi
Svenska
தமிழ்
ไทย
Türkçe
Українська
اردو
Tiếng Việt
吴语
粵語
中文
Edit links
Article
Talk
Read
Edit
View history
Tools
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Print/export
Download as PDF
Printable version
In other projects
Wikimedia Commons
Wikidata item
Appearance
From Wikipedia, the free encyclopedia
Isotope of hydrogen with two neutrons
For other uses, see Tritium (disambiguation).
"3H" redirects here. For other uses, see 3H (disambiguation).
Tritium
| General |
| Symbol | 3H |
| Names | Tritium,hydrogen-3, T, 3T |
| Protons (Z) | 1 |
| Neutrons (N) | 2 |
| Nuclide data |
| Natural abundance | 10−18 in hydrogen |
| Half-life (t1/2) | 12.32 years |
| Isotope mass | 3.01604928 Da |
| Spin | 1/2 ħ |
| Excess energy | 14949.794±0.001 keV |
| Binding energy | 8481.7963±0.0009 keV |
| Decay products | 3He |
| Decay modes |
| Decay mode | Decay energy (MeV) |
| Beta emission | 0.018592 |
| Isotopes of hydrogen Complete table of nuclides |
Tritium (from Ancient Greek τρίτος (trítos) 'third') or hydrogen-3 (symbol T or 3H) is a rare and radioactive isotope of hydrogen with a half-life of 12.32 years. The tritium nucleus (t, sometimes called a triton) contains one proton and two neutrons, whereas the nucleus of the common isotope hydrogen-1 (protium) contains one proton and no neutrons, and that of non-radioactive hydrogen-2 (deuterium) contains one proton and one neutron. Tritium is the heaviest particle-bound isotope of hydrogen. It is one of the few nuclides with a distinct name. The use of the name hydrogen-3, though more systematic, is much less common.
Naturally occurring tritium is extremely rare on Earth. The atmosphere has only trace amounts, formed by the interaction of its gases with cosmic rays. It can be produced artificially by irradiation of lithium or lithium-bearing ceramic pebbles in a nuclear reactor and is a low-abundance byproduct in normal operations of nuclear reactors.
Tritium is used as the energy source in radioluminescent lights for watches, night sights for firearms, numerous instruments and tools, and novelty items such as self-illuminating key chains. It is used in a medical and scientific setting as a radioactive tracer. Tritium is also used as a nuclear fusion fuel, along with more abundant deuterium, in tokamak reactors and in hydrogen bombs. Tritium has also been used commercially in betavoltaic devices such as NanoTritium batteries.
History
[edit]
Tritium was first detected in 1934 by Ernest Rutherford, Mark Oliphant and Paul Harteck after bombarding deuterium with deuterons (deuterium nuclei). Deuterium is another isotope of hydrogen (of mass 2), which occurs naturally with an abundance of 0.015%. Their experiment could not isolate tritium, which was first accomplished in 1939 by Luis Alvarez and Robert Cornog, who also realized tritium's radioactivity. Willard Libby recognized in 1954 that tritium could be used for radiometric dating of water and wine.
Decay
[edit]
Tritium decays into helium-3 by beta-minus decay as shown in this nuclear equation:
: | | | | | | | |
--- --- ---
| 31H | → | 32He | + | e− | + | νe |
releasing 18.6 keV of energy in the process. The electron's kinetic energy varies, with an average of 5.7 keV, while the remaining energy is carried off by the nearly undetectable electron antineutrino. Beta particles from tritium can penetrate only about 6 mm (0.24 in) of air, and they are incapable of passing through the dead outermost layer of human skin. Because of their low energy compared to other beta particles, the amount of bremsstrahlung generated is also lower. The unusually low energy released in the tritium beta decay makes the decay (along with that of rhenium-187) useful for attempts at absolute neutrino mass measurement, none of which has yet succeeded.
The low energy of tritium's radiation makes it difficult to detect tritium-labeled compounds except by using liquid scintillation counting.
Production
[edit]
Lithium
[edit]
Tritium is most often produced in nuclear reactors by neutron activation of lithium-6. The release and diffusion of tritium and helium produced by the fission of lithium can take place within ceramics known as breeder ceramics. Production of tritium from lithium-6 in such breeder ceramics is possible with neutrons of any energy, though the cross section is higher when the incident neutrons have lower energy, reaching more than 900 barns for thermal neutrons. This is an exothermic reaction, yielding 4.8 MeV. In comparison, fusion of deuterium with tritium releases about 17.6 MeV. For applications in proposed fusion energy reactors, such as ITER, pebbles consisting of lithium bearing ceramics including Li2TiO3 and Li4SiO4, are being developed for tritium breeding within a helium-cooled pebble bed, also known as a breeder blanket.
: 63Li + n → 42He (2.05 MeV) + 31H (2.75 MeV)
High-energy neutrons can also produce tritium from lithium-7 in an endothermic reaction, consuming 2.466 MeV. This was discovered when the 1954 Castle Bravo nuclear test produced an unexpectedly high yield. Prior to this test, it was incorrectly assumed that 73Li would absorb a neutron to become 83Li, which would beta-decay to 84Be, which in turn would decay to two 42He nuclei on a total timeframe much longer than the duration of the explosion.
: 73Li + n → 42He + 31H + n
The slowed neutrons from this reaction can still react with 63Li in the first, exothermic reaction; thus lithium can generate more tritium atoms than neutrons absorbed.
Boron
[edit]
High-energy neutrons irradiating boron-10, also occasionally produce tritium:
: 105B + n → 2 42He + 31H
A more common result of boron-10 neutron capture is 7Li and a single alpha particle.
Especially in pressurized water reactors which only partially thermalize neutrons, the interaction between relatively fast neutrons and the boric acid added as a chemical shim produces small but non-negligible quantities of tritium.
Deuterium
[edit]
See also: Heavy water § Tritium production
Tritium is also produced in heavy water-moderated reactors whenever a deuterium nucleus captures a neutron. This reaction has a small absorption cross section, making heavy water a good neutron moderator, and relatively little tritium is produced. Even so, cleaning tritium from the moderator may be desirable after several years to reduce the risk of its escaping to the environment. Ontario Power Generation's "Tritium Removal Facility" is capable of processing up to 2,500 tonnes (2,500 long tons; 2,800 short tons) of heavy water a year, and it separates out about 2.5 kg (5.5 lb) of tritium, making it available for other uses. CANDU reactors typically produce 130 grams (4.6 oz) of tritium per year, which is recovered at the Darlington Tritium Recovery Facility (DTRF) attached to the 3,512 MWelectric Darlington Nuclear Generating Station in Ontario. The total production at DTRF between 1989 and 2011 was 42.5 kilograms (94 lb) – with an activity of 409 megacuries (15,100 PBq): an average of about 2 kilograms (4.4 lb) per year.
Deuterium's absorption cross section for thermal neutrons is about 0.52 millibarn, whereas that of oxygen-16 (16O) is about 0.19 millibarn and that of oxygen-17 (17O) is about 240 millibarns. While 16O is by far the most common isotope of oxygen in both natural oxygen and heavy water; depending on the method of isotope separation, heavy water may be slightly richer in 17O and 18O. Due to both neutron capture and (n,α) reactions (the latter of which produce 14C, an undesirable long-lived beta emitter, from 17O) they are net "neutron consumers" and are thus undesirable in a moderator of a natural uranium reactor which needs to keep neutron absorption outside the fuel as low as feasible. Some facilities that remove tritium also remove (or at least reduce the content of) 17O and 18O, which can – at least in principle – be used for isotope labeling.
India, which also has a large fleet of pressurized heavy water reactors (initially CANDU technology but since indigenized and further developed IPHWR technology), also removes at least some of the tritium produced in the moderator/coolant of its reactors but due to the dual use nature of tritium and the Indian nuclear bomb program, less information about this is publicly available than for Canada.
Fission
[edit]
Tritium is an uncommon product of the nuclear fission of uranium-235, plutonium-239, and uranium-233, (by ternary fission), with a production of about one atom per 104 fissions, meaning it is in fact produced at all reactors. The release or recovery of tritium needs to be considered in the operation of nuclear reactors, especially in the reprocessing of nuclear fuel and storage of spent nuclear fuel. The production of tritium is not a goal, but a side-effect. It is discharged to the atmosphere in small quantities by some nuclear power plants. Voloxidation is an optional additional step in nuclear reprocessing that removes volatile fission products (such as all isotopes of hydrogen) before an aqueous process begins. This would in principle enable economic recovery of the produced tritium, but even if the tritium is only disposed of and not used, it has the potential to reduce tritium contamination in the water used, reducing radioactivity released when the water is discharged since tritiated water cannot be removed from "ordinary" water except by isotope separation.
Annual discharge of tritium from nuclear facilities
v
t
e
| Location | Nuclear facility | Closestwaters | Liquid(TBq) | Steam(TBq) | Total(TBq) | Total(mg) | year |
| United Kingdom | Heysham nuclear power station B | Irish Sea | 396 | 2.1 | 398 | 1,115 | 2019 |
| United Kingdom | Sellafield reprocessing facility | Irish Sea | 423 | 56 | 479 | 1,342 | 2019 |
| Romania | Cernavodă Nuclear Power Plant Unit 1 | Black Sea | 140 | 152 | 292 | 872 | 2018 |
| France | La Hague reprocessing plant | English Channel | 11,400 | 60 | 11,460 | 32,100 | 2018 |
| South Korea | Wolseong Nuclear Power Plant | Sea of Japan | 107 | 80.9 | 188 | 671 | 2020 |
| Taiwan | Maanshan Nuclear Power Plant | Luzon Strait | 35 | 9.4 | 44 | 123 | 2015 |
| China | Fuqing Nuclear Power Plant | Taiwan Strait | 52 | 0.8 | 52 | 146 | 2020 |
| China | Sanmen Nuclear Power Station | East China Sea | 20 | 0.4 | 20 | 56 | 2020 |
| Canada | Bruce Nuclear Generating Station A, B | Great Lakes | 756 | 994 | 1,750 | 4,901 | 2018 |
| Canada | Darlington Nuclear Generating Station | Great Lakes | 220 | 210 | 430 | 1,204 | 2018 |
| Canada | Pickering Nuclear Generating Station Units 1-4 | Great Lakes | 140 | 300 | 440 | 1,232 | 2015 |
| United States | Diablo Canyon Power Plant Units1, 2 | Pacific Ocean | 82 | 2.7 | 84 | 235 | 2019 |
Given the specific activity of tritium at 9,650 curies per gram (357 TBq/g), one TBq is equivalent to roughly 2.8 mg.
Fukushima Daiichi
[edit]
Main article: Fukushima disaster cleanup
In June 2016 the Tritiated Water Task Force released a report on the status of tritium in tritiated water at Fukushima Daiichi nuclear plant, as part of considering options for final disposal of the stored contaminated cooling water. This identified that the March 2016 holding of tritium on-site was 760 TBq (equivalent to 2.1 g of tritium or 14 mL of pure tritiated water) in a total of 860,000 m3 of stored water. This report also identified the reducing concentration of tritium in the water extracted from the buildings etc. for storage, seeing a factor of ten decrease over the five years considered (2011–2016), 3.3 MBq/L to 0.3 MBq/L (after correction for the 5% annual decay of tritium).
According to a report by an expert panel considering the best approach to dealing with this issue, "Tritium could be separated theoretically, but there is no practical separation technology on an industrial scale. Accordingly, a controlled environmental release is said to be the best way to treat low-tritium-concentration water." After a public information campaign sponsored by the Japanese government, the gradual release into the sea of the tritiated water began on 24 August 2023 and is the first of four releases through March 2024. The entire process will take "decades" to complete. China reacted with protest. The IAEA has endorsed the plan. The water released is diluted to reduce the tritium concentration to less than 1500 Bq/L, far below the limit recommended in drinking water by the WHO.
Helium-3
[edit]
Tritium's decay product helium-3 has a very large cross section (5330 barns) for reacting with thermal neutrons, expelling a proton; hence, it is rapidly converted back to tritium in nuclear reactors.
: 32He + n → 11H + 31H
This could allow tritium to be recycled as it decays, maintaining the desired inventory.
Cosmic rays
[edit]
Tritium occurs naturally due to cosmic rays interacting with atmospheric gases. In the most important reaction for natural production, a fast neutron (which must have energy greater than 4.0 MeV) interacts with atmospheric nitrogen:
: 147N + n → 126C + 31H
Worldwide, the production of tritium from natural sources is about 4 megacuries (148 PBq) per year. The global equilibrium inventory of tritium created by natural sources remains approximately constant at 70 megacuries (2,590 PBq), as a balance between the fixed production rate and nuclear decay. These may be taken as 415 g and 7,250 g respectively.
Production history
[edit]
USA
[edit]
Tritium for American nuclear weapons was produced in special heavy water reactors at the Savannah River Site until their closures in 1988. With the Strategic Arms Reduction Treaty (START) after the end of the Cold War, the existing supplies were sufficient for the new, smaller number of nuclear weapons for some time.
225 kg (496 lb) of tritium was produced in the United States from 1955 to 1996.[a] Since it continually decays into helium-3, the total amount remaining was about 75 kg (165 lb) at the time of the report, and about 16 kg (35 lb) as of 2023.
Tritium production was resumed with irradiation of rods containing lithium (replacing the usual control rods containing boron, cadmium, or hafnium), at the reactors of the commercial Watts Bar Nuclear Plant from 2003 to 2005 followed by extraction of tritium from the rods at the Tritium Extraction Facility at the Savannah River Site beginning in November 2006. Tritium leakage from the rods during reactor operations limits the number that can be used in any reactor without exceeding the maximum allowed tritium levels in the coolant.
Properties
[edit]
Tritium has an atomic mass of 3.01604928 Da. Diatomic tritium (T2 or 3H2) is a gas at standard temperature and pressure. Combined with oxygen, it forms tritiated water (3H2O).
Compared to hydrogen having its natural composition on Earth, tritium has a higher melting point (20.62 K vs. 13.99 K), a higher boiling point (25.04 K vs. 20.27 K), a higher critical temperature (40.59 K vs. 32.94 K) and a higher critical pressure (1.8317 MPa vs. 1.2858 MPa).
Tritium's specific activity is 9,650 curies per gram (3.57×1014 Bq/g).
Tritium figures prominently in studies of nuclear fusion due to its favorable reaction cross section and the large amount of energy (17.6 MeV) produced through its reaction with deuterium:
: 31H + 21H → 42He + n
All atomic nuclei have a positive charge from their protons, and therefore repel one another because like charges repel (Coulomb's law). However, if the atoms have a high enough temperature and pressure (for example, in the core of the Sun), then their random motions can overcome such repulsion, and they can come close enough for the strong nuclear force to take effect, fusing them into heavier atoms.
A tritium nucleus (triton), containing one proton and two neutrons, has the same charge as any hydrogen nucleus, and it experiences the same electrostatic repulsion when close to another nucleus. However, the neutrons in the triton increase the attractive strong nuclear force when close enough to another nucleus. As a result, tritium can fuse more easily with other light atoms than ordinary hydrogen can.
The same is true, albeit to a lesser extent, of deuterium. This is why brown dwarfs ("failed" stars) cannot fuse normal hydrogen, but they do fuse a small minority of deuterium nuclei.
Like the other isotopes of hydrogen, tritium is difficult to confine. Rubber, plastic, and some kinds of steel are all somewhat permeable. This has raised concerns that if tritium were used in large quantities, in particular for fusion reactors, it might contribute to radioactive contamination, though its short half-life should prevent significant long-term accumulation in the atmosphere.
The high levels of atmospheric nuclear weapons testing that took place prior to the enactment of the Partial Nuclear Test Ban Treaty proved to be unexpectedly useful to oceanographers. The high levels of tritium oxide introduced into upper layers of the oceans have been used in the years since then to measure the rate of mixing of the upper layers of the oceans with their lower levels.
Health risks
[edit]
Since tritium is a low energy beta (β) emitter, it is not dangerous externally (its β particles cannot penetrate the skin), but it can be a radiation hazard if inhaled, ingested via food or water, or absorbed through the skin.
Organisms can take up 31HHO, as they would H2O. Plants convert 31HHO into organically bound tritium (OBT), and are consumed by animals. 31HHO is retained in humans for around 12 days, with a small portion of it remaining in the body as OBT. Tritium can be passed along the food chain as one organism feeds on another, though the metabolism of OBT is less understood than that of 31HHO. Tritium can incorporate to RNA and DNA molecules within organisms which can lead to somatic and genetic impacts. These can emerge in later generations.
31HHO has a short biological half-life in the human body of 7 to 14 days, which both reduces the total effects of single-incident ingestion and precludes long-term bioaccumulation of 31HHO from the environment. The biological half-life of tritiated water in the human body, which is a measure of body water turn-over, varies with the season. Studies on the biological half-life of occupational radiation workers for free water tritium in a coastal region of Karnataka, India, show that the biological half-life in winter is twice that of the summer. If tritium exposure is suspected or known, drinking uncontaminated water will help replace the tritium from the body. Increasing sweating, urination or breathing can help the body expel water and thereby the tritium contained in it. However, care should be taken that neither dehydration nor a depletion of the body's electrolytes results, as the health consequences of those things (particularly in the short term) can be more severe than those of tritium exposure.
Environmental contamination
[edit]
| |
| The examples and perspective in this deal primarily with the United States and do not represent a worldwide view of the subject. You may improve this , discuss the issue on the talk page, or create a new, as appropriate. (January 2022) (Learn how and when to remove this message) |
Tritium has leaked from 48 of 65 nuclear sites in the US. In one case, leaking water contained 7.5 microcuries (280 kBq) of tritium per liter, which is 375 times the current EPA limit for drinking water, and 28 times the World Health Organization's recommended limit. This is equivalent to 0.777 nanograms per litre (5.45×10−8 gr/imp gal) or roughly 0.8 parts per trillion.
The US Nuclear Regulatory Commission states that in normal operation in 2003, 56 pressurized water reactors released 40,600 curies (1,500,000 GBq) of tritium (maximum: 2,080 Ci (77,000 GBq); minimum: 0.1 Ci (3.7 GBq); average: 725 Ci (26,800 GBq)) and 24 boiling water reactors released 665 Ci (24.6 TBq) (maximum: 174 Ci (6,400 GBq); minimum: 0 Ci; average: 27.7 Ci (1,020 GBq)), in liquid effluents. 40,600 Ci (1,500,000 GBq) of tritium weigh about 4.207 grams (0.1484 oz).
Regulatory limits
[edit]
The legal limits for tritium in drinking water vary widely from country to country. Some figures are given below:
: Tritium drinking water limits by country
| Country | Tritium limit(Bq/L) | Equivalent dose(μSv/year) |
| Australia | 76,103 | 1,000 |
| Japan | 60,000 | 788.4 |
| Finland | 30,000 | 394.2 |
| World Health Organization | 10,000 | 131.4 |
| Switzerland | 10,000 | 131.4 |
| Russia | 7,700 | 101.18 |
| Canada (Ontario) | 7,000 | 91.98 |
| United States | 740 | 9.72 |
| Norway | 100 | 1.31 |
The American limit results in a dose of 4.0 millirems (or 40 microsieverts in SI units) per year per EPA regulation 40CFR141, and is based on outdated dose calculation standards of National Bureau of Standards Handbook 69 circa 1963. Four millirem per year is about 1.3% of the average natural background radiation (~3 mSv). Updated dose calculation standards based on International Commission on Radiological Protection Report 30 and used in the NRC Regulation 10CFR20 results in a dose of 0.9 millirem (9 μSv) per year at 740 Bq/L (20 nCi/L).
Use
[edit]
| |
| This section needs additional citations for verification. Please help improve this article by adding citations to reliable sources in this section. Unsourced material may be challenged and removed. (January 2022) (Learn how and when to remove this message) |
Radiometric assays in biology and medicine
[edit]
Tritiation of drug candidates allows detailed analysis of their absorption and metabolism. Tritium has also been used for biological radiometric assays, in a process akin to radiocarbon dating. For example, [3H] retinyl acetate was traced through the bodies of rats.
Self-powered lighting
[edit]
Main article: Tritium radioluminescence
The beta particles from small amounts of tritium cause chemicals called phosphors to glow. This radioluminescence is used in self-powered lighting devices called betalights, which are used for night illumination of firearm sights, watches, exit signs, map lights, navigational compasses (such as current-use M-1950 U.S. military compasses), knives and a variety of other devices.[d] As of 2000[update], commercial demand for tritium is 400 grams (0.88 lb) per year and the cost is $30,000 per gram ($850,000/oz) or more.
Nuclear weapons
[edit]
Tritium is an important component in nuclear weapons; it is used to enhance the efficiency and yield of fission bombs and the fission stages of hydrogen bombs in a process known as "boosting" as well as in external neutron initiators for such weapons.
Neutron initiator
[edit]
These are devices incorporated in nuclear weapons which produce a pulse of neutrons when the bomb is detonated to initiate the fission reaction in the fissionable core (pit) of the bomb, after it is compressed to a critical mass by explosives. Actuated by an ultrafast switch like a krytron, a small particle accelerator drives ions of tritium and deuterium to energies above the 15 keV or so needed for deuterium-tritium fusion and directs them into a metal target where the tritium and deuterium are adsorbed as hydrides. High-energy fusion neutrons from the resulting fusion radiate in all directions. Some of these strike plutonium or uranium nuclei in the primary's pit, initiating a nuclear chain reaction. The quantity of neutrons produced is large in absolute numbers, allowing the pit to quickly achieve neutron levels that would otherwise need many more generations of chain reaction, though still small compared to the total number of nuclei in the pit.
Boosting
[edit]
Main article: Boosted fission weapon
Before detonation, a few grams of tritium–deuterium gas are injected into the hollow "pit" of fissile material. The early stages of the fission chain reaction supply enough heat and compression to start deuterium–tritium fusion; then both fission and fusion proceed in parallel, the fission assisting the fusion by continuing heating and compression, and the fusion assisting the fission with highly energetic (14.1 MeV) neutrons. As the fission fuel depletes and also explodes outward, it falls below the density needed to stay critical by itself, but the fusion neutrons make the fission process progress faster and continue longer than it would without boosting. Increased yield comes overwhelmingly from the increased fission. The energy from the fusion itself is much smaller because the amount of fusion fuel is much smaller. Effects of boosting include:
increased yield (for the same amount of fission fuel, compared to unboosted)
the possibility of variable yield by varying the amount of fusion fuel
allowing the bomb to require a smaller amount of the very expensive fissile material
eliminating the risk of predetonation by nearby nuclear explosions
not so stringent requirements on the implosion setup, allowing for a smaller and lighter amount of high explosives to be used
The tritium in a warhead is continually undergoing radioactive decay, becoming unavailable for fusion. Also, its decay product, helium-3, absorbs neutrons. This can offset or reverse the intended effect of the tritium, which was to generate many free neutrons, if too much helium-3 has accumulated. Therefore, boosted bombs need fresh tritium periodically. The estimated quantity needed is 4 grams (0.14 oz) per warhead. To maintain constant levels of tritium, about 0.20 grams (0.0071 oz) per warhead per year must be supplied to the bomb.
One mole of deuterium-tritium gas contains about 3.0 grams (0.11 oz) of tritium and 2.0 grams (0.071 oz) of deuterium. In comparison, the 20 moles of plutonium in a nuclear bomb consists of about 4.5 kilograms (9.9 lb) of plutonium-239.
Tritium in hydrogen bomb secondaries
[edit]
See also: Nuclear weapon design
Since tritium undergoes radioactive decay, and is also difficult to confine physically, the much larger secondary charge of heavy hydrogen isotopes needed in a true hydrogen bomb uses solid lithium deuteride as its source of deuterium and tritium, producing the tritium in situ during secondary ignition.
During the detonation of the primary fission bomb stage in a thermonuclear weapon (Teller–Ulam staging), the sparkplug, a cylinder of 235U/239Pu at the center of the fusion stage(s), begins to fission in a chain reaction, from excess neutrons channeled from the primary. The neutrons released from the fission of the sparkplug split lithium-6 into tritium and helium-4, while lithium-7 is split into helium-4, tritium, and one neutron. As these reactions occur, the fusion stage is compressed by photons from the primary and fission of the 238U or 238U/235U jacket surrounding the fusion stage. Therefore, the fusion stage breeds its own tritium as the device detonates. In the extreme heat and pressure of the explosion, some of the tritium is then forced into fusion with deuterium, and that reaction releases even more neutrons.
Since this fusion process requires an extremely high temperature for ignition, and it produces fewer and less energetic neutrons (only fission and fusion are net neutron producers), lithium deuteride is not used in boosted bombs, but rather for multi-stage hydrogen bombs.
Controlled nuclear fusion
[edit]
Tritium is an important fuel for controlled nuclear fusion in both magnetic confinement and inertial confinement fusion reactor designs. The National Ignition Facility (NIF) uses deuterium–tritium fuel, and the experimental fusion reactor ITER will also do so. The deuterium–tritium reaction is favorable since it has the largest fusion cross section (about 5.0 barns) and it reaches this maximum cross section at the lowest energy (about 65 keV center-of-mass) of any potential fusion fuel. As tritium is very rare on earth, concepts for fusion reactors often include the breeding of tritium. During the operation of envisioned breeder fusion reactors, Breeding blankets, often containing lithium as part of ceramic pebbles, are subjected to neutron fluxes to generate tritium to complete the fuel cycle.
The Tritium Systems Test Assembly (TSTA) was a facility at the Los Alamos National Laboratory dedicated to the development and demonstration of technologies required for fusion-relevant deuterium–tritium processing.
Electrical power source
[edit]
Tritium can be used in a betavoltaic device to create an atomic battery to generate electricity.
Use in electron tubes
[edit]
Tritium is used in various electron tubes, such as the Zellweger ZE22/3 glow tube. These devices contain a small amount of tritium to ionize the fill gas, typically a noble gas like neon or argon. This ionization ensures reliable and consistent operation by providing a steady current when a high voltage is applied, enhancing the device's performance and stability. The tritium is sealed within a glass envelope with two electrodes, one of which is coated with the radioactive material to create an ion path between the electrodes.
Use as an oceanic transient tracer
[edit]
Aside from chlorofluorocarbons, tritium can act as a transient tracer and can "outline" the biological, chemical, and physical paths throughout the world's oceans because of its evolving distribution. Tritium has thus been used as a tool to examine ocean circulation and ventilation and, for such purposes, is usually measured in tritium units, where 1 TU is defined as 1 tritium atom per 1018 hydrogen atoms, equal to about 0.118 Bq/liter. As noted earlier, nuclear tests, mainly in the Northern Hemisphere at high latitudes, throughout the late 1950s and early 1960s introduced lots of tritium into the atmosphere, especially the stratosphere. Before these nuclear tests, there were only about 3-4 kg of tritium on the Earth's surface; but these amounts rose by 2-3 orders of magnitude during the post-test period. Some sources reported natural background levels were exceeded by about 1,000 TU in 1963 and 1964 and the isotope is used in the northern hemisphere to estimate the age of groundwater and construct hydrogeologic simulation models. Estimated atmospheric levels at the height of weapons testing to approach 1,000 TU and pre-fallout levels of rainwater to be between 5 and 10 TU. In 1963 Valentia Island Ireland recorded 2,000 TU in precipitation.
North Atlantic Ocean
[edit]
While in the stratosphere (post-test period), the tritium interacted with and oxidized to water molecules and was present in much of the rapidly produced rainfall, making tritium a prognostic tool for studying the evolution and structure of the water cycle as well as the ventilation and formation of water masses in the North Atlantic.
Bomb-tritium data were used from the Transient Tracers in the Ocean (TTO) program in order to quantify the replenishment and overturning rates for deep water located in the North Atlantic.
Bomb-tritium also enters the deep ocean around the Antarctic. Most of the bomb tritiated water (H3HO) throughout the atmosphere can enter the ocean through the following processes:
precipitation
vapor exchange
river runoff
These processes make H3HO a good tracer for time scales of up to a few decades.
Using the data from these processes for 1981, the 1-TU isosurface lies between 500 and 1,000 meters deep in the subtropical regions and then extends to 1,500–2,000 meters south of the Gulf Stream due to recirculation and ventilation in the upper portion of the Atlantic Ocean. To the north, the isosurface deepens and reaches the floor of the abyssal plain which is directly related to the ventilation of the ocean floor over 10–20 year time-scales.
Also evident in the Atlantic Ocean is the tritium profile near Bermuda between the late 1960s and late 1980s. There is a downward propagation of the tritium maximum from the surface (1960s) to 400 meters (1980s), which corresponds to a deepening rate of about 18 meters per year. There are also tritium increases at 1,500 m depth in the late 1970s and 2,500 m in the middle of the 1980s, both of which correspond to cooling events in the deep water and associated deep water ventilation.
From a study in 1991, the tritium profile was used as a tool for studying the mixing and spreading of newly formed North Atlantic Deep Water (NADW), corresponding to tritium increases to 4 TU. This NADW tends to spill over sills that divide the Norwegian Sea from the North Atlantic Ocean and then flows to the west and equatorward in deep boundary currents. This process was explained via the large-scale tritium distribution in the deep North Atlantic between 1981 and 1983. The sub-polar gyre tends to be freshened (ventilated) by the NADW and is directly related to the high tritium values (>1.5 TU). Also evident was the decrease in tritium in the deep western boundary current by a factor of 10 from the Labrador Sea to the Tropics, which is indicative of loss to ocean interior due to turbulent mixing and recirculation.
Pacific and Indian oceans
[edit]
In a 1998 study, tritium concentrations in surface seawater and atmospheric water vapor (10 meters above the surface) were sampled at the following locations: the Sulu Sea, Fremantle Bay, the Bay of Bengal, Penang Bay, and the Strait of Malacca. Results indicated that the tritium concentration in surface seawater was highest at the Fremantle Bay (about 0.40 Bq/liter), which could be accredited to the mixing of runoff of freshwater from nearby lands due to large amounts found in coastal waters. Typically, lower concentrations were found between 35 and 45° south, and near the equator. Results also indicated that (in general) tritium has decreased over the years (up to 1997) due to the physical decay of bomb tritium in the Indian Ocean. As for water vapor, the tritium concentration was about one order of magnitude greater than surface seawater concentrations (ranging from 0.46 to 1.15 Bq/L). Therefore, the water vapor tritium is not affected by the surface seawater concentration; thus, the high tritium concentrations in the vapor were concluded to be a direct consequence of the downward movement of natural tritium from the stratosphere to the troposphere (therefore, the ocean air showed a dependence on latitudinal change).
In the North Pacific Ocean, the tritium (introduced as bomb tritium in the Northern Hemisphere) spread in three dimensions. There were subsurface maxima in the middle and low latitude regions, which is indicative of lateral mixing (advection) and diffusion processes along lines of constant potential density (isopycnals) in the upper ocean. Some of these maxima even correlate well with salinity extrema. In order to obtain the structure for ocean circulation, the tritium concentrations were mapped on 3 surfaces of constant potential density (23.90, 26.02, and 26.81). Results indicated that the tritium was well-mixed (at 6 to 7 TU) on the 26.81 isopycnal in the subarctic cyclonic gyre and there appeared to be a slow exchange of tritium (relative to shallower isopycnals) between this gyre and the anticyclonic gyre to the south; also, the tritium on the 23.90 and 26.02 surfaces appeared to be exchanged at a slower rate between the central gyre of the North Pacific and the equatorial regions.
The depth penetration of bomb tritium can be separated into three distinct layers:
Layer 1
: Layer 1 is the shallowest layer and includes the deepest, ventilated layer in winter; it has received tritium via radioactive fallout and lost some due to advection and/or vertical diffusion and contains about 28% of the total amount of tritium.
Layer 2
: Layer 2 is below the first layer but above the 26.81 isopycnal and is no longer part of the mixed layer. Its two sources are diffusion downward from the mixed layer and lateral expansions outcropping strata (poleward); it contains about 58% of the total tritium.
Layer 3
: Layer 3 is representative of waters that are deeper than the outcrop isopycnal and can only receive tritium via vertical diffusion; it contains the remaining 14% of the total tritium.
Mississippi River system
[edit]
Trace amounts of radioactive materials from atomic weapons testing settled throughout the Mississippi River System. Tritium concentrations have been used to understand the residence times of continental hydrologic systems such as lakes, streams, and rivers. In a 2004 study, several rivers were taken into account during the examination of tritium concentrations (starting in the 1960s) throughout the Mississippi River Basin: Ohio River (largest input to the Mississippi River flow), Missouri River, and Arkansas River. The highest tritium concentrations were found in 1963 across locations throughout these rivers. The peak correlates with implementation of the US & Soviet atmospheric test ban treaty in 1962. The overall highest concentrations occurred in the Missouri River (1963) and were greater than 1,200 TU while the lowest concentrations were found in the Arkansas River (never greater than 850 TU and less than 10 TU in the mid-1980s).
As for the mass flux of tritium through the main stem of the Mississippi River into the Gulf of Mexico, data indicated that approximately 780 grams of tritium has flowed out of the River and into the Gulf between 1961 and 1997, an average of 21.7 grams/yr and 7.7 PBq/yr. Current fluxes through the Mississippi River are 1 to 2 grams per year as opposed to the pre-bomb period fluxes of roughly 0.4 grams per year.
See also
[edit]
Hypertriton
List of elements facing shortage
Footnotes
[edit]
^ Total U.S. tritium production since 1955 has been about 225 kilograms, an estimated 150 kilograms of which have decayed into helium-3, leaving a current inventory of about 75 kg of tritium. — Zerriffi & Scoville (1996)
^ Based on ICRP Report 30 calculation: 1.8×10−11 Sv/Bq, 730 L/a, 1×106 μSv/Sv; quoted in
^ This figure is derived from the guideline dose of 1 mSv per year from all sources of radiation in drinking water in The Australian Drinking Water Guidelines 6, assuming that tritium is the only radionuclide present in the water.
^ Tritium has replaced radioluminescent paint containing radium in this application. Exposure to radium causes bone cancer, and its casual use has been banned in most countries for decades.
References
[edit]
^ Tritium. Encyclopædia Britannica. 21 July 2023.
^ Kondev, F. G.; Wang, M.; Huang, W. J.; Naimi, S.; Audi, G. (2021). "The NUBASE2020 evaluation of nuclear properties" (PDF). Chinese Physics C. 45 (3) 030001. doi:10.1088/1674-1137/abddae.
^ a b Wang, Meng; Huang, W.J.; Kondev, F.G.; Audi, G.; Naimi, S. (2021). "The AME 2020 atomic mass evaluation (II). Tables, graphs and references". Chinese Physics C. 45 (3) 030003. doi:10.1088/1674-1137/abddaf.
^ Oliphant, M.L.; Harteck, P.; Rutherford, L. (1934). "Transmutation effects observed with heavy hydrogen". Nature. 133 (3359): 413. Bibcode:1934Natur.133..413O. doi:10.1038/133413a0. S2CID 4078529.
^ Oliphant, M.L.E.; Harteck, P.; Rutherford, L. (1934). "Transmutation Effects Observed with Heavy Hydrogen". Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences. 144 (853): 692. Bibcode:1934RSPSA.144..692O. doi:10.1098/rspa.1934.0077.
^ Alvarez, Luis; Cornog, Robert (1939). "Helium and Hydrogen of Mass 3". Physical Review. 56 (6): 613. Bibcode:1939PhRv...56..613A. doi:10.1103/PhysRev.56.613.
^ Alvarez, Luis W.; Trower, W. Peter (1987). Discovering Alvarez: Selected works of Luis W. Alvarez, with commentary by his students and colleagues. University of Chicago Press. pp. 26–30. ISBN 978-0-226-81304-2.
^ Kaufman, Sheldon; Libby, W. (1954). "The natural distribution of tritium". Physical Review. 93 (6): 1337. Bibcode:1954PhRv...93.1337K. doi:10.1103/PhysRev.93.1337.
^ Hydrogen-3 (PDF). ehso.emory.edu (Report). Nuclide safety data sheet. Archived from the original (PDF) on 20 May 2013.
^ Rubel, M. (2019). "Fusion neutrons: tritium breeding and impact on wall materials and components of diagnostic systems". Journal of Fusion Energy. 38 (3–4): 315–329. Bibcode:2019JFuE...38..315R. doi:10.1007/s10894-018-0182-1. S2CID 125723024.
^ Hanaor, Dorian A.H.; Kolb, Matthias H.H.; Gan, Yixiang; Kamlah, Marc; Knitter, Regina (2015). "Solution based synthesis of mixed-phase materials in the Li2TiO3–Li4SiO4 system". Journal of Nuclear Materials. 456: 151–161. arXiv:1410.7128. Bibcode:2015JNuM..456..151H. doi:10.1016/j.jnucmat.2014.09.028. S2CID 94426898.
^ a b c d Zerriffi, Hisham (January 1996). Tritium: The environmental, health, budgetary, and strategic effects of the Department of Energy's decision to produce tritium (Report). Institute for Energy and Environmental Research. Retrieved 15 September 2010.
^ Jones, Greg (2008). "Tritium Issues in Commercial Pressurized Water Reactors". Fusion Science and Technology. 54 (2): 329–332. Bibcode:2008FuST...54..329J. doi:10.13182/FST08-A1824. S2CID 117472371.
^ Sublette, Carey (17 May 2006). "Nuclear Weapons FAQ Section 12.0 Useful Tables". Nuclear Weapons Archive. Retrieved 19 September 2010.
^ Whitlock, Jeremy. "Section D: Safety and Liability – How does Ontario Power Generation manage tritium production in its CANDU moderators?". Canadian Nuclear FAQ. Retrieved 19 September 2010.
^ Pearson, Richard J.; Antoniazzi, Armando B.; Nuttall, William J. (November 2018). "Tritium supply and use: a key issue for the development of nuclear fusion energy". Fusion Engineering and Design. 136. Elsevier: 1140–1148. Bibcode:2018FusED.136.1140P. doi:10.1016/j.fusengdes.2018.04.090.
^ "Tritium (Hydrogen-3) – Human Health Fact sheet" (PDF). Argonne National Laboratory. August 2005. Archived from the original (PDF) on 8 February 2010. Retrieved 19 September 2010.
^ Serot, O.; Wagemans, C.; Heyse, J. (2005). "New results on helium and tritium gas production from ternary fission". AIP Conference Proceedings. International Conference on Nuclear Data for Science and Technology. AIP Conference Proceedings. Vol. 769. American Institute of Physics. pp. 857–860. Bibcode:2005AIPC..769..857S. doi:10.1063/1.1945141.
^ Effluent Releases from Nuclear Power Plants and Fuel-Cycle Facilities. National Academies Press (US). 29 March 2012.
^ "Basic policy on handling of the ALPS treated water" (PDF). Ministry of Economy, Trade and Industry. 13 April 2021.
^ "2020년도 원전주변 환경방사능 조사 및 평가보고서" [2020 Environmental Radiation Survey and Evaluation Report Around Nuclear Power Plant]. Korea Hydro & Nuclear Power. 26 April 2021. p. 25. (table 8)
^ Tritiated Water Task Force Report (PDF). www.meti.go.jp/english (Report). Tokyo, Japan: Ministry of Economy, Trade and Industry.
^ "JP Gov "No drastic technology to remove Tritium was found in internationally collected knowledge"". Fukushima Diary. December 2013.
^ "The science behind the Fukushima waste water release". 26 August 2023. Retrieved 19 December 2023.
^ McCurry, Justin (16 April 2021). "Rosy-cheeked face of tritium dropped from Fukushima's publicity drive". the Guardian. p. 29.
^ "China to Japanese official: If treated radioactive water from Fukushima is safe, 'please drink it' - The Washington Post". The Washington Post.
^ "Japan Faces Growing Pressure to Rethink Releasing Fukushima's Wastewater into Ocean".
^ "Why is Japan dumping radioactive water at sea?". 13 April 2021.
^ "Helium-3 neutron proportional counters" (PDF). mit.edu. Cambridge, MA: Massachusetts Institute of Technology. Archived from the original (PDF) on 21 November 2004.
^ Young, P.G. & Foster, D.G. Jr. (September 1972). "An evaluation of the neutron and gamma-ray production cross-sections for nitrogen" (PDF). Los Alamos, NM: Los Alamos Scientific Laboratory. Retrieved 19 September 2010.
^ a b "Tritium information section". Physics Department. Radiation Information Network. Idaho State University. Archived from the original on 3 March 2016.
^ a b Zerriffi, Hisham; Scoville, Herbert Jr. (January 1996). "Tritium: The environmental, health, budgetary, and strategic effects of the Department of Energy's decision to produce tritium" (PDF). Institute for Energy and Environmental Research. p. 5. Archived from the original (PDF) on 16 October 2014. Retrieved 6 September 2018.
^ 27 years have passed since 1996, i.e. 2.25 half-lives, which reduce the 75kg of 1996 to 75/2^(2.25) ≈15.8 kg.
^ "Defense Programs". Savannah River Site. U.S. Department of Energy. Retrieved 20 March 2013.
^ "Tritium Extraction Facility" (PDF). Savannah River Site. Factsheets. U.S. Department of Energy. December 2007. Retrieved 19 September 2010.
^ Horner, Daniel (November 2010). "GAO finds problems in tritium production". Arms Control Today (Press release).
^ PubChem. "Hazardous Substances Data Bank (HSDB): 6467". pubchem.ncbi.nlm.nih.gov. Retrieved 27 February 2023.
^ H-3. OSEH (Report). Radionuclide Safety Data Sheets. University of Michigan. Retrieved 20 March 2013.
^ Fairlie, I. (June 2007). Tritium Hazard Report: Pollution and Radiation Risk from Canadian Nuclear Facilities (PDF) (Report). Archived from the original (PDF) on 20 May 2010. Retrieved 21 September 2008.
^ Osborne, R.V. (August 2007). Review of the Greenpeace report: "Tritium Hazard Report: Pollution and Radiation Risk from Canadian Nuclear Facilities" (PDF). nuclearfaq.ca (Report).
^ a b c Backgrounder on Tritium, Radiation Protection Limits, and Drinking Water Standards (Report). U.S. Nuclear Regulatory Commission. 15 March 2011. Retrieved 10 February 2012.
^ Tritium Facts and Information (Report). Pennsylvania Department of Environmental Protection. Archived from the original on 15 May 2013.
^ Travis, C.C. (1984). "Metabolism of organically-bound tritium" (PDF). Oak Ridge National Laboratory – via IAEA.
^ Bhatia, A.L. (2005). "Impact of low-level radiation with special reference to tritium in environment" (PDF). ISRE04. Proceedings of the Third International Symposium on Radiation Education – via IAEA.
^ a b Van Den Hoek, J.; Gerber, G.B.; Kirchmann, R. (1986). "Similarities and differences in the transfer of Tritium and Carbon-14 along the food chain" (PDF). Emergency Planning and Preparedness for Nuclear Facilities – via IAEA.
^ Šimek, Dalibor; Dubšek, Frantisek (1997). "Tritium in liquid releases on nuclear power plants with VVER and PWR reactors and some ways to solutions of its reduction" (PDF). Proceedings of the 2nd International Symposium on Safety and Reliability Systems of PWRS and VVERs – via IAEA.
^ a b Singh, V. P.; Pai, R. K.; Veerender, D. D.; Vishnu, M. S.; Vijayan, P.; Managanvi, S. S.; Badiger, N. M.; Bhat, H. R. (2010). "Estimation of biological half-life of tritium in coastal region of India". Radiation Protection Dosimetry. 142 (2–4): 153–159. doi:10.1093/rpd/ncq219. PMID 20870665.
^ Radioactive tritium leaks found at 48 US nuke sites. NBC News (21 June 2011). Retrieved on 16 October 2014.
^ NRC: Frequently Asked Questions About Liquid Radioactive Releases "What are normal amounts of tritium released from nuclear power plants?"
^ "Tritium in drinking water". Canadian Nuclear Safety Commission. 3 February 2014. Retrieved 23 February 2017.
^ "Standards and Guidelines for Tritium in Drinking Water (INFO-0766)". Canadian Nuclear Safety Commission. 3 February 2014.
^ "Australian Drinking Water Guidelines 6". National Health and Medical Research Council, National Resource Management Ministerial Council, Commonwealth of Australia, Canberra. March 2015. p. 98.
^ "Forskrift om visse forurensende stoffer i næringsmidler" (in Norwegian). Lovdata. 10 July 2015. Retrieved 7 January 2023.
^ Kopf, Sara; Bourriquen, Florian; Li, Wu; Neumann, Helfried; Junge, Kathrin; Beller, Matthias (2022). "Recent Developments for the Deuterium and Tritium Labeling of Organic Molecules". Chemical Reviews. 122 (6): 6634–6718. doi:10.1021/acs.chemrev.1c00795. PMID 35179363. S2CID 246942228.
^ Green, Joanne Balmer; Green, Michael H. (2020). "Vitamin A Absorption Determined in Rats Using a Plasma Isotope Ratio Method". The Journal of Nutrition. 150 (7): 1977–1981. doi:10.1093/jn/nxaa092. PMC 7330459. PMID 32271921.
^ Willms, Scott (14 January 2003). Tritium Supply Considerations (PDF) (Report). Los Alamos, NM: Los Alamos National Laboratory. Retrieved 1 August 2010.
^ Jassby, Daniel (25 May 2022). "The Quest for Fusion Energy". Inference. 7 (1).
^ Gan, Y; Hernandez, F; et, al (2017). "Thermal Discrete Element Analysis of EU Solid Breeder Blanket Subjected to Neutron Irradiation" (PDF). Fusion Science and Technology. 66 (1): 83–90. arXiv:1406.4199. doi:10.13182/FST13-727. hdl:1959.4/unsworks_60819.
^ "Electron Tubes". Museum of Radiation and Radioactivity. Retrieved 12 February 2025.
^ a b c d e f g h Jenkins, William J.; et al. (1996). "Transient Tracers Track Ocean Climate Signals". Oceanus (Report). Woods Hole Oceanographic Institution.
^ Stonestrom, David A.; et al. (2013). "On the conversion of tritium units to mass fractions for hydrologic applications". Isotopes Environ Health Stud. 9 (2): 250–256. Bibcode:2013IEHS...49..250S. doi:10.1080/10256016.2013.766610. PMC 3664909. PMID 23464868.
^ Swiss Federal Institute of Aquatic Science and Technology, Department Water Resources and Drinking Water. "Tritium (3H)". Eawag. Retrieved 9 November 2024.
^ Phillips, F. M.; Castro, M. C. (1 January 2014). "7.11 – Groundwater Dating and Residence-Time Measurements". Treatise on Geochemistry (Second ed.). Elsevier. pp. 361–400. doi:10.1016/B978-0-08-095975-7.00513-1. ISBN 978-0-08-098300-4.
^ Maidment, David R., ed. (1993). Handbook of Hydrology. New York, NY: McGraw-Hill. pp. 6–39. ISBN 0-07-039732-5.
^ Cossairt, J. Donald (September 2012). Background Levels of Tritium. Fermilab Environmental Safety & Health Section (Report). Environmental Protection Note. Batavia, Illinois: Fermi National Accelerator Laboratory. pp. 2–3. No. 28.
^ Wunsch, Carl. (2015). Modern observational physical oceanography : understanding the global ocean. Princeton : Princeton University Press. p. 44 Figure 2.29. ISBN 978-0-691-15882-2.
^ a b c d e Doney, Scott C. (1992). "Bomb tritium in the deep north Atlantic". Oceanography. 5 (3): 169–170. Bibcode:1992Ocgpy...5c.169D. doi:10.5670/oceanog.1992.11.
^ Michel, Robert; Williams, Peter M. (1973). "Bomb-produced tritium in the Antarctic Ocean". Earth and Planetary Science Letters. 20 (3): 381–384. Bibcode:1973E&PSL..20..381M. doi:10.1016/0012-821X(73)90013-7.
^ a b c d Kakiuchi, H.; Momoshima, N.; Okai, T.; Maeda, Y. (1999). "Tritium concentration in ocean". Journal of Radioanalytical and Nuclear Chemistry. 239 (3): 523. Bibcode:1999JRNC..239..523K. doi:10.1007/BF02349062. S2CID 94876087.
^ a b c d e f g Fine, Rana A.; Reid, Joseph L.; Östlund, H. Göte (1981). "Circulation of Tritium in the Pacific Ocean". Journal of Physical Oceanography. 11 (1): 3–14. Bibcode:1981JPO....11....3F. doi:10.1175/1520-0485(1981)011<0003:COTITP>2.0.CO;2.
^ a b c d e Michel, Robert L. (2004). "Tritium hydrology of the Mississippi River basin". Hydrological Processes. 18 (7): 1255. Bibcode:2004HyPr...18.1255M. doi:10.1002/hyp.1403. S2CID 130033605.
External links
[edit]
Wikimedia Commons has media related to Tritium.
"Annotated bibliography for tritium". Alsos Digital Library. Washington and Lee University. Archived from the original on 14 May 2006. Retrieved 3 March 2022.
"Nuclear Data Evaluation Lab".
Review of Risks from Tritium (Report). London, UK: Health Protection Agency. November 2007. RCE-4. Archived from the original on 17 May 2013. Retrieved 3 March 2022.
Bergeron, Kenneth D. (17 September 2004). Tritium on Ice: The dangerous new alliance of nuclear weapons and nuclear power. MIT Press. ISBN 978-0-262-26172-2.[full citation needed]
"Tritium production and recovery in the United States in FY2011". Fissile Materials. February 2010.
"Tritium removal mass transfer coefficient". ans.org.
| | | |
---
| Lighter: deuterium | Tritium is an isotope of hydrogen | Heavier: hydrogen-4 |
| Decay product of: hydrogen-4 | Decay chain of tritium | Decays to: helium-3 |
| Authority control databases |
| International | |
| National | United States Japan Israel |
| Other | Yale LUX |
Retrieved from "
Categories:
Tritium
Environmental isotopes
Isotopes of hydrogen
Nuclear fusion fuels
Radiochemistry
Radioisotope fuels
Radionuclides used in radiometric dating
Hidden categories:
CS1 Norwegian-language sources (no)
Articles with short description
Short description is different from Wikidata
Use American English from September 2020
All Wikipedia articles written in American English
Use dmy dates from September 2019
Isotope content page
Articles with limited geographic scope from January 2022
United States-centric
Articles needing additional references from January 2022
All articles needing additional references
Articles containing potentially dated statements from 2000
All articles containing potentially dated statements
Commons category link from Wikidata
All articles with incomplete citations
Articles with incomplete citations from November 2020
Add topic |
10552 | https://www.math.stonybrook.edu/Videos/MAT131Online/Handouts/Lecture-03-Handout.pdf | Lecture 3 Elementary Functions. Part 1 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Which functions are called elementary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Power functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Power functions y = xn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 All together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Power functions y = 1 xn = x−n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Power functions y = n √x = x1/n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 y = xn all together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Polynomials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Quadratic functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 How to draw a parabola . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Rational functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Exponential functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 The graphs of exponential functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Exponential functions y = ax all together. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 The laws of exponents (reminder) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Graphing exponential functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 The number e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Comprehension checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 1 Objectives In the next three lectures, we will discuss the class of elementary functions.
This lecture is devoted to • power functions • polynomials • rational functions • exponential functions.
2 / 21 Which functions are called elementary In our calculus course, we are going to deal mostly with elementary functions.
They are power functions ( x2, √x, x1/3, . . . ), exponential functions( 2x, πx, ex, . . . ), logarithmic functions ( ln x, log2 x, . . . ), trigonometric functions ( sin x, cos x, tan x, . . . ), inverse trigonometric functions ( arcsin x, arctan x, . . . ) and their sums, differences, products, quotients, and compositions.
For example, f(x) = arcsin √ x2 −3 ln(x4 + 5) −tan ecos x is an elementary function.
There are many non-elementary functions, for example f(x) = x Z 0 sin t t dt is not an elementary function.
3 / 21 2 Power functions Definition. A power function is a function of the form f(x) = xa , where a is a given constant.
For example, y = x, y = x5, y = 3 √x = x1/3, y = x2/3 are power functions.
In a power function f(x) = xa , the base x is a variable, and the exponent a is a constant.
The appearance of the graph of a power function depends on the constant a .
For a = 0 , y = x0 = 1 x y y = 1 For a = 1 , y = x1 = x x y y = x 4 / 21 Power functions y = xn If n is an integer greater than 1 , then the overall shape of the graph of y = xn is determined by the parity of n (whether n is even or odd).
If n is even, then the graph has a shape similar to the parabola y = x2 : x y y = x2 x y y = x4 x y y = x6 If n is odd, then the graph has a shape similar to the cubic parabola y = x3 : x y y = x3 x y y = x5 x y y = x7 5 / 21 3 All together x y y = x2 y = x4 y = x8 1 −1 1 x y y = x3 y = x5 y = x9 1 1 −1 −1 6 / 21 Power functions y = 1 xn = x−n If n is a positive integer greater than 1 , then the overall shape of the graph of y = 1 xn is determined by the parity of n (whether n is even or odd).
x y y = 1 xn n is odd x y y = 1 xn n is even 7 / 21 4 Power functions y = n √x = x1/n If n is an positive integer, then the overall shape of the graph of y = n √x = x1/n is determined by the parity of n (whether n is even or odd).
x y y = n √x n is even x y y = n √x n is odd 8 / 21 y = xn all together Here are the graphs of y = xn for some rational n and x > 0 : x y y = x y = x2 y = x0 y = x1/2 1 y = x−1 1 9 / 21 5 Polynomials Definition. Let n be a non-negative integer.
A polynomial in the variable x of degree n is a function of the form P(x) = anxn + an−1xn−1 + · · · + a1x + a0 , where a0, a1, . . . , an−1, an are constants (they are called the coefficients of the polynomial) and an ̸= 0 . The integer n is called the degree of the polynomial.
A polynomial is the sum of monomials akxk .
Example 1. A linear function y = mx + b , where m and b are constants, is a polynomial of degree 1 .
The graph of a linear function is a straight line: x y y = mx + b θ b m is the slope of the line, m = tan θ b is the y -intercept.
10 / 21 Quadratic functions Example 2. A quadratic function y = ax2 + bx + c , where a, b, c are constants, is a polynomial of degree 2 .
The graph of a quadratic function is a parabola.
Its appearance depends on the coefficients a, b, c .
x y x y x y ☞ Check your calculus readiness: Draw the graph of y = 3x2 + 2x −1 .
How long did it take?
If less than 2 minutes, then you are ready!
x y −1 1/3 1/3 −1 If you are not quite ready, let us review how to draw a parabola.
11 / 21 6 How to draw a parabola To draw a parabola y = ax2 + bx + c , follow the following scheme.
1. Determine the parabolas vertex. It is located at the point −b 2a , y −b 2a 2. Draw the axis of symmetry. It is the vertical line x = −b 2a .
3. Determine if the parabola opens up ( a > 0 ) or down ( a < 0 ) 4. Determine the intercepts. The y -intercept is (0, c) , the x -intercepts are (x1, 0), (x2, 0), where x1, x2 are the solutions of the quadratic equation ax2 + bx + c = 0 (if there are any).
5. Plot the vertex, the axis of symmetry, the intercepts on a coordinate system and construct a smooth parabola.
Exercise. Use the scheme above to draw the parabola y = 3x2 + 2x −1 .
12 / 21 Rational functions Definition. A rational function is a function of the form f(x) = P(x) Q(x) , where P(x) and Q(x) are polynomials.
For example, f(x) = 1 4x2 + 3x −1 and f(x) = 2x3 −x + 1 x2 −3 are rational function.
The domain of a rational function is the set of all real numbers for which the denominator is not zero.
13 / 21 7 Exponential functions Definition. An exponential function is a function of the form f(x) = ax , where a is a given positive constant.
For example, y = 2x, y = 3 5 x , y = ex, y = ( √ 2)x are exponential functions.
In an exponential function f(x) = ax , the base a is a constant, and the exponent x is a variable.
B Warning. Don’t confuse exponential (y = ax) and power (y = xa) functions!
The appearance of the graph of an exponential function depends on a.
The graph of each exponential function f(x) = ax intersects the y -axis at the point (0, 1) , since f(0) = a0 = 1 .
If a = 1, then the exponential function is y = 1x = 1. It is a constant function.
14 / 21 The graphs of exponential functions x y y = ax a > 1 1 x y y = ax 0 < a < 1 1 Remember: The domain of any exponential function is R , since y = ax is defined for all x .
The range of y = ax is (0, ∞) , since a is positive and therefore ax > 0 for any x .
15 / 21 8 Exponential functions y = ax all together x y a = 1 5 a = 1 2 a = 2 a = 5 a = 1 16 / 21 The laws of exponents (reminder) Let a > 0 , b > 0 , and x, y be any real numbers. Then a0 = 1 ax+y = axay a−x = 1 ax ax−y = ax ay (ax)y = axy (ab)x = axbx 17 / 21 9 Graphing exponential functions Problem. Draw the graph of the function f(x) = 2−x −1 .
Solution. We need to know the graph of the standard function y = 2x , and to be familiar with graph transformations.
Steps to follow in drawing the graph: step 1 y = 2x − − − − − − − − − − − → step 2 y = 2−x − − − − − − − − − − − → step 3 y = 2−x −1 x y y = 2x 1 flip about y -axis x y y = 2x 1 y = 2−x vert. shift down x y 1 y = 2−x -1 y = 2−x-1 18 / 21 The number e This is the most amazing number in mathematics!
It may be defined in many different ways. For example, like this: The number e is the base of the exponential function whose graph has the tangent line at (0, 1) with slope 1 .
x y y = ex 1 tangent of slope 1 45◦ The exact definition of the tangent line to the graph of a function at a point will be given later.
19 / 21 10 Summary In this lecture we reviewed the following topics: • power functions f(x) = xa and their graphs • polynomials • quadratic functions and their graphs • exponential functions f(x) = ax and their graphs • Laws of exponents • the number e .
20 / 21 Comprehension checkpoint • What are the names of the following functions: y = 3 √ x2 y = 2 3 x y = −5x3 + 6x2 + 1 y = 3x + 2 −x2 + 4x + 2 • What is e ?
• How does the graph of y = ex look like?
21 / 21 11 |
10553 | https://www.webpathology.com/images/gynecologic/uterus/endometrial-carcinoma/38929 | Papillary Serous Carcinoma of Endometrium : Psammoma Bodies
Home
Subspecialty
AboutFeedbackSubmit Images
Papillary Serous Carcinoma of Endometrium : Psammoma Bodies
Home
Gynecologic
Uterus
Endometrial Carcinoma
Papillary Serous Carcinoma of Endometrium : Psammoma Bodies
Previous
Image 27 of 30
Next
Image Description
Psammoma bodies are seen in approximately 30% cases of serous carcinomas of the endometrium. They may occasionally be seen in endometrioid carcinomas as well.
Previous
Image 27 of 30
Next
We recommend
Are you treating adults with obesity? Learn about a treatment option that may help your patientsLearn more
Explore data from two obesity clinical studiesLearn about a treatment option
Explore a treatment option for your adult patients with obesityLearn about the data
Powered by
Targeting settings
Do not sell my personal information
Terms of UsePrivacy PolicySite Map
© 2003-2025 WebPathology, LLC. All rights reserved
We use cookies to improve your experience. By continuing to use our site, you agree to our use of cookies. |
10554 | https://shakerscience.weebly.com/uploads/2/7/7/0/27700095/stoichiometry_1_worksheet_and_key.pdf | 2 KClO3 è 2 KCl + 3 O2 1. How many moles of O2 will be formed from 1.65 moles of KClO3? 2. How many moles of KClO3 are needed to make 3.50 moles of KCl? 3. How many moles of KCl will be formed from 2.73 moles of KClO3? 4 Fe + 3 O2 è 2 Fe2O3 4. How many moles of Fe2O3 are produced when 0.275 moles of Fe is reacted? 5. How many moles of Fe2O3 are produced when 31.0 moles of O2 is reacted? 6. How many moles of O2 are needed to react with 8.9 moles of Fe? 2 H2O è 2 H2 + O2 7. How many moles of O2 are produced when 1.26 moles of H2O is reacted? 8. How many moles of H2O are needed to produce 55.7 moles of H2? 9. If enough H2O is reacted to produce 3.40 moles of H2, then how may moles of O2 must have been made? (a bit challenging, but just think about it and you can probably figure it out) Stoichiometry Worksheet and Key 1.65 mol KClO3 mol KClO3 mol O2 = mol O2 3.50mol KCl = mol KClO3 = 0.275 mol Fe = mol Fe2O3 = = 2 KClO3 è 2 KCl + 3 O2 10. How many grams of O2 will be formed from 3.76 grams of KClO3? 11. How many grams of KClO3 are needed to make 30.0 grams of KCl? 12. How many grams of KCl will be formed from 2.73 g of KClO3? 4 Fe + 3 O2 è 2 Fe2O3 13. How many grams of Fe2O3 are produced when 42.7 grams of Fe is reacted? 14. How many grams of Fe2O3 are produced when 17.0 grams of O2 is reacted? 15. How many grams of O2 are needed to react with 125 grams of Fe? Some cars can use butane (C4H10) as fuel: 2 C4H10 + 13 O2 è 8 CO2 + 10 H2O 16. How many grams of CO2 are produced from the combustion of 100. grams of butane? 17. How many grams of O2 are needed to react with of 100. grams of butane? 18 How many grams of H2O are produced when 5.38g of O2 is reacted? 3.76g KClO3 mol O2 = g O2 1 mol KClO3 122.55 g KClO3 mol O2 g O2 mol KClO3 30.0 g KCl mol KClO3 mol KCl mol KClO3 mol KCl g KCl g KClO3 g KClO3 = 2.73 g KClO3 g KCl = 42.7 g Fe mol Fe2O3 mol Fe mol Fe2O3 mol Fe g Fe g Fe2O3 g Fe2O3 = 17.0 g O2 g Fe2O3 = = 100. g C4H10 g CO2 = 100. g C4H10 g O2 = KEY 2 KClO3 è 2 KCl + 3 O2 1. How many moles of O2 will be formed from 1.65 moles of KClO3? 2. How many moles of KClO3 are needed to make 3.50 moles of KCl? 3. How many moles of KCl will be formed from 2.73 moles of KClO3? 4 Fe + 3 O2 è 2 Fe2O3 4. How many moles of Fe2O3 are produced when 0.275 moles of Fe are reacted? 5. How many moles of Fe2O3 are produced when 31.0 moles of O2 are reacted? 6. How many moles of O2 are needed to react with 8.9 moles of Fe? 2 H2O è 2 H2 + O2 7. How many moles of O2 are produced when 1.26 moles of H2O is reacted? 8. How many moles of H2O are needed to produce 55.7 moles of H2? 9. If enough H2O is reacted to produce 3.40 moles of H2, then how may moles of O2 must have been made? (a bit challenging, but just think about it and you can probably figure it out) 1.65 mol KClO3 2 mol KClO3 = mol O2 2.48 3.50 mol KCl mol KCl mol KClO3 = mol KClO3 2 3.50 2.73 moles KClO3 mol KClO3 mol KCl = mol KCl 2 2.73 0.275 mol Fe = mol Fe2O3 4 mol Fe 2 mol Fe2O3 0.138 31.0 mol O2 = mol Fe2O3 3 mol O2 2 mol Fe2O3 20.7 8.9 mol Fe = mol O2 4 mol Fe 3 mol O2 6.7 1.26 mol H2O = mol O2 2 mol H2O 1 mol O2 .630 55.7 mol H2 = mol H2O 2 mol H2 2 mol H2O 55.7 3.40 mol H2 = mol O2 2 mol H2 1 mol O2 1.70 3 mol O2 2 2 2 KClO3 è 2 KCl + 3 O2 10. How many grams of O2 will be formed from 3.76 grams of KClO3? 11. How many grams of KClO3 are needed to make 30.0 grams of KCl? 12. How many grams of KCl will be formed from 2.73 g of KClO3? 4 Fe + 3 O2 è 2 Fe2O3 13. How many grams of Fe2O3 are produced when 42.7 grams of Fe is reacted? 14. How many grams of Fe2O3 are produced when 17.0 grams of O2 is reacted? 15. How many grams of O2 are needed to react with 125 grams of Fe? Some cars can use butane (C4H10) as fuel: 2 C4H10 + 13 O2 è 8 CO2 + 10 H2O 16. How many grams of CO2 are produced from the combustion of 100. grams of butane? 17. How many grams of O2 are needed to react with of 100. grams of butane? 18 How many grams of H2O are produced when 5.38g of O2 is reacted? 3.76g KClO3 mol O2 = g O2 1 mol KClO3 122.55 g KClO3 mol O2 g O2 mol KClO3 2 1 1.47 30.0 g KCl mol KClO3 mol KCl mol KClO3 mol KCl g KCl g KClO3 = 74.55 2 1 49.3 2.73 g KClO3 mol KCl mol KCl mol KCl O3 g KClO3 g KCl = 122.55 2 1 1.66 74.55 g KCl 42.7 g Fe mol Fe2O3 mole Fe mol Fe2O3 mol Fe g Fe g Fe2O3 g Fe2O3 = 55.85 4 1 61.0 17.0 g O2 1 mol O2 mol Fe2O3 mol O2 g O2 g Fe2O3 g Fe2O3 = 32.00 3 1 56.6 125 g Fe 1 mol Fe mol O2 mol Fe g Fe g O2 g O2 = 55.85 4 1 53.7 g 100. g C4H10 g CO2 = 58.14 g C4H10 2 mol C4H10 44.01 g CO2 303 100. g C4H10 g O2 = 58.14 g C4H10 2 mol C4H10 32.00 g O2 358 1 mol O2 5.38g O2 g H2O = 32.00 g O2 18.02 g H2O 2.33 1 mol H2O 13 mol O2 1 2 122.55 g KClO3 159.70 1 mol O2 10 mol H2O 3 32.00 1 2 1 2 159.70 mol Fe2O3 2 mol O2 3 32.00 1 mol C4H10 8 mol CO2 1 mol CO2 1 mol C4H10 13 mol O2 mol KCl O3 |
10555 | https://intellipaat.com/blog/backtracking-algorithm/ | Backtracking Algorithm - Definition, Usecase, and Example
Explore Online Courses Free CoursesHire from usBecome an InstructorReviews
All Courses
Categories
AI & Machine Learning Courses
Data Science & Business Analytics
Leadership & Management
Online Degrees & Study Abroad
Doctorate
Undergraduate
Cloud Computing
Cyber Security
Electric and Hybrid Vehicles
Product and Design
Finance
Marketing & CRM
Software Development
AI & Machine Learning Courses
Executive Post Graduate Certification in Data Science & Artificial Intelligence 11 Months
Data Science and Machine Learning Course with Guaranteed Placement Assistance 8 Months
Ex. M.Tech in Artificial Intelligence & ML 2 Years
Generative AI and Prompt Engineering Course Live Sessions: 50+
Artificial Intelligence Course Live Classes: 100 Hrs.
Machine Learning Course Live Classes: 100 Hrs.
View All
Data Science & Business Analytics
Data Science Course 7 Months
Adv. Certification in Data Analytics for Business - IITM Pravartak 7 Months
Executive Post Graduate Certification in Data Analytics 11 Months
Data Engineering Course 7 Months
Business Analytics Course Live Classes: 109 Hrs.
Data Analytics Program 7 Months
View All
Leadership & Management
Executive Post-Graduate Certification Program for Chief Human Resources Officer (CHRO) 10 Months
Executive Post-Graduate Certification Program for Chief Finance Officer (CFO) 10 Months
Executive Post-Graduate Certification Program for Chief Marketing Officer (CMO) 10 Months
Executive Post-Graduate Certification Program for Chief Operation Officer (COO) 10 Months
Global Senior Leadership Program with specialization in CMO/CHRO/COO/CFO 10 Months
Doctor of Business Administration SSBM, Geneva 36 Months
View All
Online Degrees & Study Abroad
Ex. M.Tech in Artificial Intelligence & ML 2 Years
M.Tech in Applied AI 2 Years
M.Tech in Applied AI & Communications 2 Years
Doctor of Business Administration SSBM, Geneva 36 Months
MBA in Data Science 12 Months
MBA in Cybersecurity Management 12 Months
View All
Doctorate
Doctor of Business Administration SSBM, Geneva 36 Months
View All
Undergraduate
AI & Data Science from DRISHTI CPS, The TIH of IIT Indore 1.5 Years
Professional Certification Program in Computer Science Engineering – iHub, IIT Roorkee 1.5 Years
Minor in Generative AI & Machine Learning – IIT Patna 1 Years
Electric Vehicle Technology Course from DRISHTI CPS, IIT Indore 1.5 Years
Minor in Business Analytics – IIT Patna 1 Years
Minor in Computer Science – IIT Patna 1 Years
View All
Cloud Computing
Executive Post Graduate Certification in Cloud Computing and DevOps 9 Months
Adv. Certification in DevOps & Cloud Computing 6 Months
Advanced Certification in Cloud Computing and DevOps 6 Months
Cloud & DevOps Course 7 Months
View All
Cyber Security
Executive Post Graduate Certification in Cyber Security and Ethical Hacking 11 Months
Ethical Hacking Course – CEH v13 Certification Live Classes: 40 Hrs.
Learn like an IIT Graduate and Land into High-Paying Tech Jobs! 1.5 YEARS
View All
Electric and Hybrid Vehicles
Exe. Post Graduate Certificate in EV Design 11 Months
Minor in Electric Vehicle – IIT Patna 1 Year
Advanced Certification in Electric Vehicle 6 Months
Electric Vehicle Technology Course from DRISHTI CPS, IIT Indore 1.5 Years
View All
Product and Design
Executive Post Graduate Certification in Product Management 9 Months
Executive Post Graduate Certification in UI UX Design 6 Months
Executive Professional Certification Program in Product Management 6 Months
Product Design Course 10 Months
UI UX Design Course 6 Month
View All
Finance
Executive Post-Graduate Certification Program for Chief Finance Officer (CFO) 10 Months
View All
Marketing & CRM
Salesforce Certification Course Live Classes: 36 Hrs.
Salesforce Developer Certification Course Live Classes: 38 Hrs.
Digital Marketing Course 6 Months
Executive Post Graduate Certification in Digital Marketing and Analytics 6 Months
View All
Software Development
Learn like an IIT Graduate and Land into High-Paying Tech Jobs! 1.5 YEARS
Professional Certification Program in Computer Science Engineering – iHub, IIT Roorkee 1.5 YEARS
Accelerator Program in Software Engineering 12 Months
Selenium Certification Course Training Live Classes: 45 Hrs.
View All
Looking for Free Courses?
Get access to in-demand skill courses for free!
Learn for Free
Submit
Submit
Category:
Articles
Interview Questions
Home>Blog>Software Engineering Articles>Backtracking Algorithm with Example
Trending Programming Articles
Understanding Asymptotic Notation in Data Structure
Backtracking Algorithm with Example
5 Best Pygame Projects in 2025
Boundary Fill Algorithm: A Detailed Guide
C# Classes and Objects
What is Dynamic Programming: Examples, Characteristics, and Working
What is Extreme Programming (XP)? Values, Principles & Practices
Factorial Program in C
Flood Fill Algorithm in Computer Graphics
Functional vs Object-oriented Programming
Graph Traversal in Data Structures: A Complete Guide
Greedy Algorithm: A Beginner’s Guide
What is Hamming Distance? Applications and Operations
Hashing in Data Structure
Introduction to Tree: Calculate the Height of a Tree
Learn How to Code as a Beginner
What is Huffman Coding in DAA?
What is Kadanes Algorithm?
Kruskal’s Algorithm in DAA: Steps and Implementation
Backtracking Algorithm with Example
By Anisha Verma| Last updated on September 20, 2025 | 88325 Views
Share this article
Previous
Next
Tutorial Playlist
Trending Programming Articles
Understanding Asymptotic Notation in Data Structure
Backtracking Algorithm with Example
5 Best Pygame Projects in 2025
Boundary Fill Algorithm: A Detailed Guide
C# Classes and Objects
What is Dynamic Programming: Examples, Characteristics, and Working
What is Extreme Programming (XP)? Values, Principles & Practices
Factorial Program in C
Flood Fill Algorithm in Computer Graphics
Functional vs Object-oriented Programming
Graph Traversal in Data Structures: A Complete Guide
Greedy Algorithm: A Beginner’s Guide
What is Hamming Distance? Applications and Operations
Hashing in Data Structure
Introduction to Tree: Calculate the Height of a Tree
Learn How to Code as a Beginner
What is Huffman Coding in DAA?
What is Kadanes Algorithm?
Kruskal’s Algorithm in DAA: Steps and Implementation
In this blog, we will examine the foundations of backtracking, its uses, and the secret to its ability to methodically traverse decision spaces. Come along as we walk you through every aspect of this effective algorithm, illuminating its operation and presenting instances from real-world applications where it excels. This blog serves as your entryway to grasp the particulars of backtracking, regardless of your level of programming experience or curiosity.
Table of Contents:
Introduction to Backtracking Algorithm
State Space Tree
Types of Backtracking Algorithm
Recursive Backtracking
Non-Recursive Backtracking
Working of Backtracking Algorithm
Examples of Backtracking Algorithm
When to use Backtracking Algorithm
Applications of Backtracking Algorithm
Wrap-up
FAQs
Learn Data Structures and Algorithms in this comprehensive video course:
Introduction to Backtracking Algorithm
Backtracking is a systematic problem-solving technique employed in computer science and mathematics to find solutions to problems, especially those involving combinatorial choices, such as finding all possible paths or arrangements. The fundamental idea behind backtracking is to explore all possible options systematically and backtrack when a dead end is reached.
Imagine you’re in a maze and want to find the exit. Backtracking works like this: you explore a path until you reach a point where it doesn’t lead to the solution. At that point, you backtrack to the last decision point and try a different path. This process continues until you find the exit or exhaust all possibilities.
In programming, backtracking is often implemented using recursion. The algorithm explores a branch of the solution space, backtracking to the previous step if it fails and exploring another branch. This continues until a solution is found or all possibilities are explored.
For example, solving Sudoku or the N-Queens problem involves backtracking. In Sudoku, you fill in numbers, and if you reach a point where the puzzle becomes unsolvable, you backtrack to the last valid move. Backtracking is a powerful technique for systematically solving complex problems by exploring solution spaces.
Interested in becoming a Full Stack Developer? Take ourFull Stack Development Courseto take your first step.
State Space Tree
A state space tree in the context of a backtracking algorithm as a roadmap for problem-solving. Imagine being on a journey, facing multiple choices at each point. The tree represents all potential paths, with each node serving as a decision point. Backtracking involves exploring these paths; if encounter a dead end, you backtrack to the last decision point and explore a different route.
For instance, in a maze, nodes might represent various paths, and backtracking aids in exploration until the correct path is found. The state space tree guides this exploration systematically, facilitating a methodical approach to problem-solving by navigating through choices, trying options, and backtracking when necessary to find the optimal solution.
Types of Backtracking Algorithm
Backtracking is a general algorithm for finding all (or some) solutions to computational problems, particularly constraint satisfaction problems. It incrementally builds candidates for solutions and abandons a candidate as soon as it determines that the candidate cannot possibly be completed to a valid solution. Here are some types of backtracking algorithms:
Recursive Backtracking
Non-Recursive Backtracking
Recursive Backtracking
In this basic form of backtracking, the algorithm explores each branch of the solution space recursively. If a solution is found, it is returned; otherwise, the algorithm backtracks to the previous decision point and explores alternative choices.
Here’s a simple example of a recursive backtracking algorithm for generating permutations of a set of elements:
def permute_recursive(nums, path, result):
# Base case: if all elements are used, add the current permutation to the result
if not nums:
result.append(path[:])
return
# Explore all possible choices
for i in range(len(nums)):
# Make a choice
path.append(nums[i])
# Explore with the chosen element removed from the options
permute_recursive(nums[:i] + nums[i+1:], path, result)
# Backtrack by undoing the choice
path.pop()
Example usage:
nums = [1, 2, 3]
result = []
permute_recursive(nums, [], result)
print(result)
Output:
This recursive algorithm generates all permutations of the input list “nums”. The “permute_recursive”function takes three parameters: the remaining elements to permute (nums), the current partial permutation (“path”), and the list to store the final result (“result”).
Non-Recursive Backtracking
Backtracking can also be implemented using iteration and an explicit stack or queue to manage the state of the search. This can be useful in situations where recursive calls are not desirable due to factors like memory constraints.
Here’s an example of a non-recursive backtracking algorithm for generating permutations using an explicit stack:
def permute_non_recursive(nums):
result = []
stack = [(nums, [])]
while stack:
current_nums, current_path = stack.pop()
if not current_nums:
result.append(current_path)
continue
for i in range(len(current_nums)):
stack.append((current_nums[:i] + current_nums[i+1:], current_path + [current_nums[I]]))
return result
Example usage:
nums = [1, 2, 3]
result = permute_non_recursive(nums)
print(result)
Output:
In this non-recursive version, a stack is used to simulate the recursive calls. The stack contains tuples representing the state of the algorithm, and the while loop continues until the stack is empty. The algorithm explores choices iteratively, and the stack is manipulated to simulate the recursive calls and backtracking.
Want a comprehensive list of interview questions? Here are theFull Stack Developer Interview Questions for Freshers!
Working of Backtracking Algorithm
Let us now break down how backtracking works, step by step. It builds solutions bit by bit, backtracking when needed, and cleverly explores different paths until it finds the right solution.
Step 1: Understanding the Problem
Backtracking is a technique used to systematically search for a solution to a problem, especially in cases where a brute-force approach would be impractical. Typically, backtracking is applied to problems with multiple possible solutions, such as puzzles, mazes, or optimization problems.
Step 2: Choose a Path
The algorithm begins by choosing a path to explore from the current state. It makes a decision and moves forward, marking the chosen path.
Step 3: Explore the Chosen Path
The algorithm explores the selected path and reaches a new state. At this point, it evaluates whether the current state is a solution to the problem. If it is, the algorithm stops; otherwise, it continues to explore further.
Step 4: Backtrack if Necessary
If the algorithm reaches a state where it cannot proceed or the chosen path does not lead to a solution, it backtracks. Backtracking involves undoing the last decision made, returning to the previous state, and exploring alternative paths.
Step 5: Explore Alternative Paths
Having backtracked, the algorithm continues to explore alternative paths from the previous state. It repeats the process of choosing a path, exploring, and backtracking until a solution is found or all possibilities are exhausted.
Let’s consider a scenario where you have three persons named A, B, and C. Now we have to create a seating arrangement for the three of them. There are multiple ways or combinations in which they can sit. The Backtracking algorithm helps in that.
Let us visualize the tree for this:
In this example, we began by placing A at the first position, followed by B and then C. Subsequently, we backtracked, positioning C at the second spot and B at the third. This yielded two options: ABC and ACB.
Continuing, we placed B at the first position, followed by A at the second, and C at the third. Once again, backtracking occurred, with C in the second position and A in the third. This resulted in two additional options: BAC and BCA.
Lastly, we positioned C at the first spot, followed by A in the second, and B in the third. A final backtrack led to B at the second and A at the third position, concluding with the last two options: CAB and CBA.
The entire backtracking process led us to the final six combinations of their seating, which are:
ABC, BAC, CAB
ACB, BCA, CBA
Examples of Backtracking Algorithm
Consider the N-Queens problem, where you need to place N queens on an N✕N chessboard in such a way that no two queens threaten each other. The backtracking algorithm for this problem involves placing queens row by row and backtracking when conflicts arise.
Choose a Path: Start with the first row and place a queen in an empty column.
Explore the Chosen Path: Move to the next row and repeat the process, ensuring that the queens do not threaten each other.
Backtrack if Necessary: If a conflict is detected, backtrack to the previous row and explore alternative columns for placing the queen.
Explore Alternative Paths: Continue exploring and backtracking until a valid placement for all queens is found.
There are ten solutions to the problem after it is solved, so we must use the backtracking algorithm to get each of them.
When to use Backtracking Algorithm
The backtracking algorithm explores all possible candidates for a solution and backtracks when it determines that a candidate cannot lead to a valid solution. Here’s when you might use a backtracking algorithm:
1. Permutation or Combination Problems: One can use this algorithm when one needs to generate all possible permutations or combinations of a set of elements. For example, solving puzzles like Sudoku, and N-Queens, or generating all possible combinations of elements from a set.
2. Constraint Satisfaction Problems: When you have a problem that can be broken down into smaller decisions, each with constraints, this technique can be used. Backtracking can efficiently solve problems where choices made need to satisfy specific conditions or constraints, like scheduling or resource allocation problems.
3. Decision Problems: This algorithm is employed when you need to find a feasible solution or not, rather than generating all possible solutions. Backtracking can be used to efficiently solve problems like graph coloring or finding a Hamiltonian cycle in a graph.
Applications of Backtracking Algorithm
Backtracking finds applications across various domains due to its ability to systematically explore and solve problems. Some common applications include:
1. Puzzle Solving: Backtracking is extensively used in puzzles like Sudoku, crosswords, word search, and maze solving. It efficiently explores the solution space to find a valid solution.
2. Game Playing: Games like chess, tic-tac-toe, and other board games often use backtracking to search through possible moves and find the best move or determine if a winning strategy exists.
3. Combinatorial Problems: Problems involving permutations, combinations, and subsets, such as generating all possible combinations of a set of elements or finding permutations of a sequence, utilize backtracking for efficient exploration.
4. Constraint Satisfaction Problems: Backtracking helps solve problems where constraints need to be satisfied, such as scheduling tasks, resource allocation, or job sequencing.
5. Graph Problems:It’s used in graph-related problems like finding a Hamiltonian cycle, solving the traveling salesman problem, graph coloring, and finding paths in a graph.
6. Optimization Problems:In some cases, backtracking can be used as part of an optimization strategy, exploring possible solutions and improving them incrementally to reach an optimal solution.
7. Robotics and Pathfinding:Backtracking is employed in robotics for pathfinding algorithms, helping robots find the shortest path from one point to another while avoiding obstacles.
Wrap-up
In conclusion, the backtracking algorithm stands as a powerful tool in the domain of problem-solving, offering an approach to exploring solution spaces while navigating through constraints and conditions. Through its recursive nature and depth-first search strategy, it efficiently seeks solutions to various combinatorial problems, puzzle-solving challenges, and constraint satisfaction scenarios.
Its adaptability across diverse domains, from puzzles and games to optimization and graph-related conundrums, showcases its versatility and applicability. Despite its effectiveness in exploring solution spaces, its efficiency may be affected by the size and complexity of the problem, warranting potential optimizations or alternative approaches for larger-scale scenarios.
Related BlogsWhat’s Inside
Learn Extreme ProgrammingUnderstand the core of XP for agile software practices.
Software Engineer vs Full Stack DeveloperA detailed comparison of development roles in modern tech teams.
Destructor Basics in C++Breaks down the functionality and use of destructors in C++.
Kotlin or Flutter?Evaluates strengths and weaknesses of both app development tools.
CSS with WebkitDiscusses how Webkit helps render CSS styles effectively.
Pygame for BeginnersA guide to getting started with Pygame and 2D game development.
Setup React NativeWalks you through React Native setup from scratch.
Understand Selection SortSimplifies the selection sort method using practical examples.
Start with C ProgrammingCovers key C programming samples for beginners and students.
FAQs
What is backtracking?
Backtracking is a systematic algorithmic technique used to find solutions to problems by incrementally exploring potential candidates and backtracking from paths that do not satisfy the problem constraints.
How does backtracking work?
Backtracking works by exploring the solution space incrementally. It makes a series of decisions, moving forward until it reaches a dead end or finds a solution. Upon encountering an invalid solution, it backtracks to the last valid decision point and explores other paths.
What are the key steps involved in implementing a backtracking algorithm?
The main steps in implementing a backtracking algorithm include defining the problem, identifying decision points, establishing constraints, recursively exploring solutions, making decisions, backtracking, and terminating when a solution is found or all possibilities are exhausted.
Are there any limitations or drawbacks of using backtracking?
Backtracking’s efficiency can decrease significantly with large problem space, leading to excessive exploration. Additionally, not all problems can be efficiently solved using backtracking, especially those with extremely large or complex solution spaces.
How can I optimize a backtracking algorithm?
Optimizations for backtracking may include pruning branches of the search tree early if they are determined to lead to invalid solutions, employing heuristics to guide the search, or using additional data structures to enhance efficiency.
Are there alternatives to backtracking for solving similar problems?
Yes, other techniques like dynamic programming, greedy algorithms, or even specialized algorithms tailored to specific problems can sometimes provide more efficient solutions compared to backtracking, especially for certain types of problems.
About the Author
Anisha Verma
Technical Content Lead | Software Developer
Anisha is an experienced Software Developer and Technical Content Lead with over 6.5 years of expertise in Full Stack Development. She excels at crafting clear, accurate, and engaging content that translates complex technical concepts into practical insights. With a strong passion for technology and education, Anisha writes on a wide range of IT topics, empowering learners and professionals to stay ahead in today’s fast-evolving digital landscape.
Recommended Programs
prev
Software Development Engineering Course 5 (23421)
Software Engineering and Application Development 5 (6315)
Accelerator Program in Software Engineering 5 (6058)
Python Course 5 (218118)
next
×
Course Preview
Expert-Led No.1
Backtracking Algorithm with Example
[x] By providing your contact details, you agree to our Terms of Use&Privacy Policy
facebooktwitterlinkedinyoutubeinstatelegram
facebooktwitterlinkedinyoutubeinstatelegram
Get Our App Now!
Get Our App Now!
Courses
Data Scientist Course
Machine Learning Course
Python Course
Devops Training
Business Analyst Certification
Cyber Security Courses
Business Analytics Training
Investment Banking Course
SQL Course
AWS DevOps Course
Full Stack Developer Course
Product Management Course
Courses
AWS Solutions Architect
UI UX Design Course
Salesforce Training
Selenium Training
Artificial Intelligence Course
Ethical Hacking Course
Azure Administrator Certification
Cyber Security Course
Digital Marketing Course
Electric Vehicle Course
Azure DevOps Course
Web Development Courses
Tutorials
Python Tutorial
AWS Tutorial
Devops Tutorial
Java Tutorial
Node Js Tutorial
Cyber Security Tutorial
Salesforce Tutorial
Azure Tutorial
Ethical Hacking Tutorial
Data Science Tutorial
Cloud Computing Courses
Python Data Science Course
Interview Questions
Python Interview Questions
AWS Interview Questions
Data Science Interview Questions
Devops Interview Questions
Salesforce Interview Questions
Java Interview Questions
SQL Interview Questions
React Interview Questions
Node Js Interview Questions
Digital Marketing Interview Questions
Browse By Domains
Data ScienceSalesforce CoursesCloud Computing CoursesAI & Machine Learning CoursesProject Management CoursesCyber Security and Ethical Hacking CoursesWeb Development CoursesJob Oriented CoursesDegree CoursesMarketing CRM CoursesSoftware Development CoursesDoctorate ProgramsUndergraduate CoursesBanking and Finance CoursesProduct Design CoursesElectric and Hybrid Vehicle CoursesLeadership & Management CoursesManagement CoursesGenerative AI CoursesDesign Thinking CoursesMicrosoft Certification Courses
Top Tutorials
Machine Learning TutorialPower BI TutorialSQL TutorialArtificial Intelligence TutorialDigital Marketing TutorialData Analytics TutorialUI/UX Tutorial
Top Articles
Cloud ComputingData ScienceMachine LearningWhat is AWSDigital MarketingCyber SecuritySalesforceArtificial Intelligence
Top Interview Questions
Selenium Interview QuestionsAzure Interview QuestionsMachine Learning Interview QuestionsCyber Security Interview QuestionsBusiness Analyst Interview Questions and AnswersC Interview QuestionsData Analyst Interview QuestionsSoftware Engineering Interview Questions
© Copyright 2011 - 2025 Intellipaat Software Solutions Pvt. Ltd.
Media
Contact Us
Tutorials
Interview Questions
Address: 6th Floor, Primeco Towers, Arekere Gate Junction, Bannerghatta Main Road, Bengaluru, Karnataka 560076, India.
Disclaimer: The certification names are the trademarks of their respective owners.
INTPL_2025-09-29 |
10556 | https://www.legislation.gov.uk/ukpga/2006/46/section/39 | Companies Act 2006
Skip to main content
Skip to navigation
Cookies on Legislation.gov.uk
The cookies on legislation.gov.uk do two things: they remember any settings you've chosen so you don't have to choose them on every page, and they help us understand how people browse our website, so we can make improvements and fix problems. We need your consent to use some of these cookies.
Yes, these cookies are OK
Find out more or set individual cookie preferences
No, I want to reject all cookies
legislation.gov.uk
Cymraeg
Home
Explore our collections
Research tools
Help and guidance
What's new
About us
Search Legislation Hide
Search Legislation
Title: (or keywords in the title)
Year:
Number:
Type:
Search
Advanced Search
Companies Act 2006
You are here:
UK Public General Acts
2006 c. 46
Part 4
Capacity of company and...
Section 39
Table of Contents
Content
Explanatory Notes
Explanatory Notes
Text created by the government department responsible for the subject matter of the Act to explain what the Act sets out to achieve and to make the Act accessible to readers who are not legally qualified. Explanatory Notes were introduced in 1999 and accompany all Public Acts except Appropriation, Consolidated Fund, Finance and Consolidation Acts.
More Resources
More Resources
Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:
the original print PDF of the as enacted version that was used for the print copy
lists of changes made by and/or affecting this legislation item
confers power and blanket amendment details
all formats of all associated documents
correction slips
links to related legislation and further information resources
Previous: Provision
Next: Provision
Plain View
Print Options
What Version
Legislation is available in different versions:
Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.
Original (As Enacted or Made):The original version of the legislation as it stood when it was enacted or made. No changes have been applied to the text.
Latest available (Revised)
Original (As enacted)
Advanced Features
See additional information alongside the content
Geographical Extent:Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.
Show Timeline of Changes:See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.
Show Geographical Extent(e.g. England, Wales, Scotland and Northern Ireland)
Show Timeline of Changes
Opening Options Expand opening options
Opening Options
Different options to open legislation in order to view more content on screen at once
Open whole Act
Open Act without Schedules
Open Schedules only
More Resources Expand PDF versions
Original: King's Printer Version
Original: King's Printer Version Volume 1
Original: King's Printer Version Volume 2
Original: King's Printer Version Volume 3
Correction Slip - 15/10/2010
View more
Print Options
Print The Whole Act
PDF The Whole Act
Web page The Whole Act
Print The Whole Part
PDF The Whole Part
Web page The Whole Part
Print The Whole Cross Heading
PDF The Whole Cross Heading
Web page The Whole Cross Heading
Print This Section only
PDF This Section only
Web page This Section only
Changes over time for: Section 39
Timeline of Changes
This timeline shows the different points in time where a change occurred. The dates will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. The first date in the timeline will usually be the earliest date when the provision came into force. In some cases the first date is 01/02/1991 (or for Northern Ireland legislation 01/01/2006). This date is our basedate. No versions before this date are available. For further information see the Editorial Practice Guide and Glossary under Help.
Alternative versions:
01/10/2009 - Amendment
Changes to legislation:
Companies Act 2006, Section 39 is up to date with all changes known to be in force on or before 29 September 2025. There are changes that may be brought into force at a future date. Changes that have been made appear in the content and are referenced with annotations.
Changes to Legislation
Revised legislation carried on this site may not be fully up to date. Changes and effects are recorded by our editorial team in lists which can be found in the ‘Changes to Legislation’ area. Where those effects have yet to be applied to the text of the legislation by the editorial team they are also listed alongside the legislation in the affected provisions. Use the ‘more’ link to open the changes and effects relevant to the provision you are viewing.
View outstanding changes status warnings
Changes and effects yet to be applied to Section 39:
More effects to be announced
Act amendment to earlier affecting provision S.I. 2014/3348, art. 220A by S.I. 2024/1115reg. 4(3)
s. 790EB(1A)(1B) inserted by S.I. 2025/1036reg. 4(a)
s. 790EB(3) inserted by S.I. 2025/1036reg. 4(b)
s. 790EC(1A)(1B) inserted by S.I. 2025/1036reg. 5(a)
s. 790EC(3) inserted by S.I. 2025/1036reg. 5(b)
s. 790ED-790EF inserted by S.I. 2025/1036reg. 6
s. 790LF(4) inserted by S.I. 2025/1036reg. 12(b)
s. 790LG(1A) inserted by S.I. 2025/1036reg. 13(3)
s. 790LH(4)(5) inserted by S.I. 2025/1036reg. 14(4)
s. 1098C(1)(ea) inserted by S.I. 2025/1037Sch. 1para. 2(a)(ii)
s. 1098C(2)(e) inserted by S.I. 2025/1037Sch. 1para. 2(b)(iii)
s. 1098C(4A) inserted by S.I. 2025/1037Sch. 1para. 2(c)
Sch. 2 Pt. 2 Section A para. 25(m)(ii) words omitted by S.I. 2025/381Sch.para. 19
Changes and effects yet to be applied to the whole Act associated Parts and Chapters:
More effects to be announced
Act amendment to earlier affecting provision S.I. 2014/3348, art. 220A by S.I. 2024/1115reg. 4(3)
Whole provisions yet to be inserted into this Act (including any effects on those provisions):
s. 790EB(1A)(1B) inserted by S.I. 2025/1036reg. 4(a)
s. 790EB(3) inserted by S.I. 2025/1036reg. 4(b)
s. 790EC(1A)(1B) inserted by S.I. 2025/1036reg. 5(a)
s. 790EC(3) inserted by S.I. 2025/1036reg. 5(b)
s. 790ED-790EF inserted by S.I. 2025/1036reg. 6
s. 790LF(4) inserted by S.I. 2025/1036reg. 12(b)
s. 790LG(1A) inserted by S.I. 2025/1036reg. 13(3)
s. 790LH(4)(5) inserted by S.I. 2025/1036reg. 14(4)
s. 1098C(1)(ea) inserted by S.I. 2025/1037Sch. 1para. 2(a)(ii)
s. 1098C(2)(e) inserted by S.I. 2025/1037Sch. 1para. 2(b)(iii)
s. 1098C(4A) inserted by S.I. 2025/1037Sch. 1para. 2(c)
Sch. 2 Pt. 2 Section A para. 25(m)(ii) words omitted by S.I. 2025/381Sch.para. 19
39 A company's capacity U.K.
This section has no associated Explanatory Notes
(1)The validity of an act done by a company shall not be called into question on the ground of lack of capacity by reason of anything in the company's constitution.
(2)This section has effect subject to section 42 (companies that are charities).
Modifications etc. (not altering text)
C1 S. 39 applied (with modifications) (1.10.2009) by The Unregistered Companies Regulations 2009 (S.I. 2009/2436), regs. 3-5, Sch. 1 para. 3(a) (with transitional provisions and savings in regs. 7, 9, Sch. 2)
Previous: Provision
Next: Provision
Back to top
Options/Help
You have chosen to open The Whole Act
The Whole Act you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Cancel
Continue to open
You have chosen to open The Whole Act as a PDF
The Whole Act you have selected contains over 200 provisions and might take some time to download.
Would you like to continue?
Cancel
Continue to open
You have chosen to open The Whole Act without Schedules
The Whole Act without Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Continue to open
You have chosen to open The Whole Act without Schedules as a PDF
The Whole Act without Schedules you have selected contains over 200 provisions and might take some time to download.
Would you like to continue?
Continue to open
You have chosen to open the Whole Act
The Whole Act you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Cancel
Continue to open
You have chosen to open the Whole Act without Schedules
The Whole Act without Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Cancel
Continue to open
You have chosen to open Schedules only
The Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Cancel
Continue to open
More Resources
Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:
the original print PDF of the as enacted version that was used for the print copy
correction slips
Click 'View More' or select 'More Resources' tab for additional information including:
lists of changes made by and/or affecting this legislation item
confers power and blanket amendment details
all formats of all associated documents
links to related legislation and further information resources
The data on this page is available in the alternative data formats listed:
HTML5 alternative version
HTML snippet alternative version
PDF alternative version
XML alternative version
Akoma Ntoso alternative version
HTML RDFa alternative version
RDF/XML alternative version
New site design
Help
About us
Site map
Accessibility
Contact us
Privacy notice
Cookies
All content is available under the Open Government Licence v3.0 except where otherwise stated. This site additionally contains content derived from EUR-Lex, reused under the terms of the Commission Decision 2011/833/EU on the reuse of documents from the EU institutions. For more information see the EUR-Lex public statement on re-use.
© Crown and database right |
10557 | https://chem.libretexts.org/Courses/Portland_Community_College/CH151%3A_Preparatory_Chemistry/03%3A_Dimensional_Anlaysis_and_Density | Skip to main content
3: Dimensional Anlaysis and Density
Last updated
: Jan 14, 2022
Save as PDF
2.5: The International System of Units
3.1: Problem Solving and Unit Conversions
Page ID
: 364764
( \newcommand{\kernel}{\mathrm{null}\,})
3.1: Problem Solving and Unit Conversions
: Converting from one unit to another is a particularly important skill in science and engineering. Dimensional analysis (also called the unit factor method) is a technique for making these conversions correctly. Dimensional analysis will be used in later chapters to perform other chemistry calculations besides just unit conversions.
3.2: Multi-Step Conversion Problems
: Sometimes you will have to perform more than one conversion to obtain the desired unit.
3.3: Units Raised to a Power
: Conversion factors for area and volume can also be produced by the dimensional analysis method. Just remember that if a quantity is raised to a power both the number and the unit must be raised to that same power.
3.4: Units in the Numerator and the Denominator
: Some complex units are composed of a unit in the numerator and a unit in the denominator. These include units of speed and mileage. Dimensional analysis can be used to make conversions with these units as well.
3.5: Density
: Density is a physical property found by dividing the mass of an object by its volume. Regardless of the sample size, density is always constant.
3.6: Temperature
: Three different scales are commonly used to measure temperature: Fahrenheit (expressed as °F), Celsius (°C), and Kelvin (K).
2.5: The International System of Units
3.1: Problem Solving and Unit Conversions |
10558 | https://math.stackexchange.com/questions/409057/confused-about-the-group-of-permutations-s-n | abstract algebra - Confused about the group of permutations $S_{n}$ - Mathematics Stack Exchange
Join Mathematics
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Mathematics helpchat
Mathematics Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Confused about the group of permutations S n
Ask Question
Asked 12 years, 4 months ago
Modified10 years, 7 months ago
Viewed 2k times
This question shows research effort; it is useful and clear
4
Save this question.
Show activity on this post.
In an exercise, I must prove S n is generated by 2 elements. I'll ignore here the trivial case n=1. Let I n={1,2,3,...,n}. I then defined f:I n→I n by f(1)=2, f(2)=1, and f(i)=i, for i≠1,2. Also g:I n→I n by g(1)=n and g(i+1)=i for i∈{1,...,n−1}. I claimed f,g generate S n, which is apparently correct. But my explanation is apparently completely wrong. I hope someone may undo my confusion.
So intuitively, f is a swap permutation which swaps the first two elements, and g is a shift permutation which shifts everything to the left. We note any permutation can be written as a series of "swaps" (transpositions). So it suffices to show f,g generate the swaps. So suppose I want to compose f and g in such a way to swap 1≤i<j≤n. The algorithm would go somewhat like this: shift everything to the left until i is the first element. Now apply swap once, then shift back again, apply swap, shift back, and so forth until you just swapped i with j. Count how many times you shifted left after you first swapped. Now you shift right (which is just the inverse of shifting left), swap, shift right, swap, .. and do that just as many times as you shifted left. In the end you should be left with exactly i,j swapped and everything else in its place. Let's do an example. Suppose I want to swap 1 and 4 in 1234. It'll go as:
2134 (swapped)
1342 (shifted left 1 time)
3142 (swapped)
1423 (shifted left 2 times)
4123 (swapped 4 and 1; I'll start shifting right now)
3412 (shifted right 1 time)
4312 (swapped)
2431 (shifted right 2 times)
4231 (swapped)
And we are done! Apparently the problem with this is that f doesn't actually swap the first and second elements, there is no order, it just swaps 1 with 2. Under which interpretation this makes little sense. My question is: is my way of thinking about this completely wrong? Is it merely coincidental that I achieved a correct answer? And if it is wrong, how should I be thinking about permutations? I am not familiar with the cycle notation.
abstract-algebra
group-theory
permutations
symmetric-groups
Share
Share a link to this question
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this question to receive notifications
edited Jun 2, 2013 at 6:19
anon
156k 14 14 gold badges 249 249 silver badges 422 422 bronze badges
asked Jun 2, 2013 at 5:54
PedroPedro
6,956 5 5 gold badges 35 35 silver badges 55 55 bronze badges
1
Hopefully all fixed now :p Pedro –Pedro 2013-06-02 06:01:21 +00:00 Commented Jun 2, 2013 at 6:01
Add a comment|
5 Answers 5
Sorted by: Reset to default
This answer is useful
3
Save this answer.
Show activity on this post.
Your solution is basically correct, though not very well formulated. But you are not clear about how you represent a permutation, and whether "applying" a permutation corresponds to multiplication on the left or on the right, and this makes it difficult to point precisely to what you should do different. But in any case you can salvage your kind of reasoning by making the proper choices.
In group theory permutations are defined as functions (bijections), not as permuted sequences. So first let us fix the correspondence: a sequence (a 1,…,a n) (with {a 1,…,a n}={1,…,n}) represents the permutation σ that sends i↦a i for all i. (This seems a natural choice, but a choice nonetheless.) Next we need to be clear about left and right in permutation composition; since you write (permutation) functions before their argument, let us choose as usual that the composition f.g is i↦f(g(i)) (the permutation on the right gets to operate first). Again this is a natural choice, but some prefer to have f act first (typically those who prefer to write i f instead of f(i)); I just want to make my choice clear.
With these choices, if σ is represented by (a 1,…,a n), then π.σ is represented by (π(σ(1)),…,π(σ(n)))=(π(a 1),…,π(a n)), in other words left multiplication by π corresponds to applying the function π to the values of individual entries of the sequence, not to permuting the entries of the sequence according to π. However if we multiply on the right by π, the situation is different: σ.π is represented by (σ(π(1)),…,σ(π(n)))=(a π(1),…,a π(n)). Here it is the positions that are permuted. Since you use this in your argument, it can be made valid if you stipulate that each successive permutation applied to the sequence corresponds to a right-multiplication.
I should warn about a slight twist that remains: right multiplication by π does permute the entries in the sequence, but it does so in such a way that the new entry at position i is a π(i), which is the one that used to be in position π(i); the old value a i will be found after permutation at position π−1(i). This is what you probably associate with permuting the entries according to the inverse permutation π−1. Indeed this is true for the usual definition of permutations acting (from the left!) on sequences, as I detailed in this answer. If you think of it, it is normal that when right-multiplication is related to a left-action on sequences, an inversion should be used in the process.
No doubt this somewhat unfortunate consequence of the otherwise natural choices above is what motivates people to make the opposite choice for one of the two. As I said it is often the second that is reversed, but this has other notational consequences that can be confusing. For me the real culprit is the first choice: it would be more natural to represent σ as the result of permuting the standard sequence (1,2,…,n) according to σ, and this gives (σ−1(1),σ−1(2),…,σ−1(n)) rather than (σ(1),σ(2),…,σ(n)). However, I would not really advocate doing this, as this would make the confusion between notations even worse.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
edited Apr 13, 2017 at 12:20
CommunityBot
1
answered Jun 2, 2013 at 7:56
Marc van LeeuwenMarc van Leeuwen
120k 8 8 gold badges 183 183 silver badges 373 373 bronze badges
Add a comment|
This answer is useful
1
Save this answer.
Show activity on this post.
Here's an easier way to think about. For 0≤j≤n−1, consider the element
(1…n)−j(12)(1…n)j
Let k∈{1,…,n}. Under the rightmost cycle, k→(k+j)mod n. (Think of 0 as the symbol n, here).
If (k+j)mod n≢1,2, then under the entire permutation, k→k. If 1≡(k+j)mod n, then k≡(1−j)mod n, and k→(2−j)mod n. Hence, (1…n)−j(12)(1…n)j is a transposition of adjacent elements, and we know adjacent transposition generate S n.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
answered Jun 2, 2013 at 6:46
HarryHarry
11 1 1 bronze badge
0
Add a comment|
This answer is useful
1
Save this answer.
Show activity on this post.
As you say, applying f only switches 1 and 2, it does not 'switch the first two entries in a permutation's cycle notation' (to paraphrase what you want to happen); such a thing is not even generically well-defined because there are multiple ways of representing a permutation with cycles.
The reason it works out is that if you could switch any two elements in a permutation's cycle representation, then you would indeed be able to generate all the necessary transpositions. But you haven't outlined how you would go about doing that with just f and g.
Here is a suggestion: show that adjacent transpositions generate all transpositions, which suffices for the task because transpositions generate all the rest of S n, as you know. You only need to construct every adjacent transposition (i i+1) for i=1,⋯,n−1. To do this, keep in mind the effect that not products but conjugations have on cycle representations:
σ(a 1 a 2⋯a l 1)⋯(b 1 b 2⋯b l m)σ−1=(σ a 1 σ a 2⋯σ a l 1)⋯(σ b 1 σ b 2⋯σ b l m).
So what permutations do you get upon repeatedly conjugating f=(1 2) by g=(1 2⋯n)?
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
edited Jun 2, 2013 at 7:04
answered Jun 2, 2013 at 6:15
anonanon
156k 14 14 gold badges 249 249 silver badges 422 422 bronze badges
1
The question does not mention cycle notation for permutation, and as far as I can tell does not suggest their implicit used in any way either. Instead a "permuted sequence" representation (one-line notation) seems to be used.Marc van Leeuwen –Marc van Leeuwen 2013-06-02 08:11:03 +00:00 Commented Jun 2, 2013 at 8:11
Add a comment|
This answer is useful
1
Save this answer.
Show activity on this post.
I think you would prefer better notation, in which the proof is more visually obvious. Consider: f=1 2…n 2 1…n g=1 2…n n 1…n−1 where the correspondence between an i in the first row and j in the second row is that j=f(i) or g(i), respectively. Your goal is to express the transpositions ("swaps" is not a standard term) in terms of f and g. Before I do that, there is a further simplification you missed:
Lemma:S n is generated by the "adjacent transpositions" s i exchanging i with i+1 (modulo n).
The diagram for s i is: s i=1…i i+1…n 1…i+1 i…n (with s n wrapping around). This is just f, "moved" i−1 places to the right. Note that g "moves" everything 1 place to the right, so g i−1 moves i−1 places. Therefore the following permutation is s i: 1…i i+1…n n−i+2…1 2…n−i+1(g i−1)n−i+2…2 1…n−i+1(f)1…i+1 i…n(g−(i−1)) where each row is marked with what we applied to the previous row. Note that every row but the first is out of order, but we just apply the indicated function to whatever value is in each place. Also, values such as n−i+2 should be taken modulo n, for example when i=1.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
edited Jun 2, 2013 at 14:29
answered Jun 2, 2013 at 6:25
Ryan ReichRyan Reich
6,446 23 23 silver badges 31 31 bronze badges
2
Since the question stipulates g(1)=n, I don't think you have got the correct two-line notation for g.Marc van Leeuwen –Marc van Leeuwen 2013-06-02 08:08:20 +00:00 Commented Jun 2, 2013 at 8:08
@Marc It seems I wrote g−1.Ryan Reich –Ryan Reich 2013-06-02 14:30:10 +00:00 Commented Jun 2, 2013 at 14:30
Add a comment|
This answer is useful
1
Save this answer.
Show activity on this post.
It would be very convenient to represent permutations in disjoint cycle notation, as anon has used. But if you want to use your notation of representing a permutation as a linear arrangement, you could understand why f,g generate S n, as follows.
Given any permutation, we need to obtain the given permutation starting from [1,2,…,n] by repeatedly using f (switching the first and second coordinates) and g (doing a cyclic shift of the elements). A right cyclic shift by i coordinates can be effected by applying the left cyclic shift g a total of n−i times.
First observe that any permutation can be obtained from the initial one by just swapping two consecutive coordinates at a time. For example, to go from 1234 to 4231, as you've done, you swap the first and second coordinate, then second and third, then third and fourth, to bring 1 to the fourth coordinate. Next, you can bring 3 to the third coordinate, 2 to second coordinate, and 4 will automatically be in the first coordinate.
It remains to be shown that swapping two consecutive coordinates can be achieved through a sequence of f's and g's. Swapping the first two coordinates is allowed since it is just f. To swap the i-th and i+1-th coordinate, just apply the cyclic shift g a certain number of times ((n−i) times) to bring the numbers in the i th and i+1 th coordinate to the 1st and 2nd coordinate, then swap the first and second coordinate by applying f, then apply g again the appropriate number of times to shift back these two numbers from the 1st and 2nd coordinate to the i th and i+1 th coordinates, respectively. In this manner, and I think you can visualize this intuitively, the numbers in any two consecutive coordinates can be swapped using the operation of cyclic shift, swapping the first two coordinates only, and cyclic shift again.
To understand further, you could learn about conjugation. It turns out that every permutation can be expressed as a disjoint union of cycles, and an important result here is that the type of a permutation (i.e. the lengths of these different cycles) remains the same if you conjugate a permutation a by another permutation b, i.e. b a b−1 has the same cycle structure as a. So, if a=(1,2) is an element of a permutation group, and b=(1,2,…,n) is also in the group, then by composing these two together in the special way b a b−1, we are effecting a cyclic shift, swap, and reverse cyclic shift to obtain that (2,3) is also in the group (or (1,n) rather than (2,3), depending on whether you compose left to right or right to left). The point is that such a product will again be some 2-cycle because conjugation preserves the type of a permutation. So we quickly obtain all consecutive swaps in this manner; for example, conjugating (2,3) by b gives (3,4), and so on.
More generally, it can be shown that if (i,j) denotes a swap of the i th and j th coordinate, then a set of swaps A generates S n if and only if the transposition graph of A is connected. In our case, by repeatedly conjugating a=(1,2) with b, we are able to obtain the path graph on the n vertices {1,2,…,n}. Since this graph is connected, a and b generate S n.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
answered Jun 3, 2013 at 3:45
AG.AG.
2,117 17 17 silver badges 24 24 bronze badges
Add a comment|
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
abstract-algebra
group-theory
permutations
symmetric-groups
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Linked
9How does the symmetric group act on tuples?
Related
3Proving a recursive definition about decreases in permutations
4Confusion about the hidden subgroup formulation of graph isomorphism
2What is the use and motivation for this particular concept in permutations?
2Permutations: Interpreting Image Notation
3What will be the possible permutations of set S={1,2,3,4}. And how many are of those odd and even?
4Generating permutations using swaps of adjacent elements
6"Encode" all n-permutations with the fewest number of swaps
Hot Network Questions
Do we declare the codomain of a function from the beginning, or do we determine it after defining the domain and operations?
PSTricks error regarding \pst@makenotverbbox
My dissertation is wrong, but I already defended. How to remedy?
Is it ok to place components "inside" the PCB
Passengers on a flight vote on the destination, "It's democracy!"
Xubuntu 24.04 - Libreoffice
Languages in the former Yugoslavia
RTC battery and VCC switching circuit
Is direct sum of finite spectra cancellative?
What’s the usual way to apply for a Saudi business visa from the UAE?
Does the Mishna or Gemara ever explicitly mention the second day of Shavuot?
Transforming wavefunction from energy basis to annihilation operator basis for quantum harmonic oscillator
On Chern roots and the Chern polynomial
Is encrypting the login keyring necessary if you have full disk encryption?
How exactly are random assignments of cases to US Federal Judges implemented? Who ensures randomness? Are there laws regulating how it should be done?
Drawing the structure of a matrix
Origin of Australian slang exclamation "struth" meaning greatly surprised
Storing a session token in localstorage
Overfilled my oil
Is there a way to defend from Spot kick?
Do we need the author's permission for reference
On being a Maître de conférence (France): Importance of Postdoc
Why include unadjusted estimates in a study when reporting adjusted estimates?
Riffle a list of binary functions into list of arguments to produce a result
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Mathematics
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
10559 | https://rjalvarado.people.amherst.edu/TeachingMaterials/F17_MATH413/HW5.pdf | HOMEWORK V Due: Thursday, October 12, 2017.
1. Use PMI to show that the union of finitely many finite sets is a finite set, i.e., show that for each n ∈N, if {A1, A2, . . . , An} is a collection of finite sets, then the set ∪n k=1 Ak is finite.
Be careful: these sets are not necessarily disjoint.
2. For each n ∈N suppose that An is a nonempty finite set. Prove or disprove (with a counterexam-ple): The union ∪∞ n=1 An is an infinite set.
3. Suppose that A is a finite set. Prove the if B is an infinite set then the set B \ A is infinite.
4. Given an infinite set A, show that if f : A →B is an injective function for some set B, then f(A) is an infinite set.
5. Let A be a set with n elements and B be a set with m elements for some n, m ∈N. Prove that n ≤m if and only if there is an injection φ : A →B.
6. Suppose that A and B are two finite sets both having n elements for some n ∈N. Show that any injective function f : A →B is also surjective. Show this is not necessarily true if A and B are infinite.
7. Show that if A is a countable set and B is a finite set, then the union A ∪B is countable.
Hint: Try constructing a piecewise function.
8. Suppose that A, B, C, and D are sets and that f : A →B and g : C →D are two bijective functions. Show that the function h : A × C →B × D defined by setting h(x, y) := ( f(x), g(y) ) , for every (x, y) ∈A × C, is bijective.
9. Show that if A and B are two countable sets then the Cartesian product A × B is countable.
Hint: Use the previous problem and the fact that N × N is countable.
1 |
10560 | https://www.open.edu/openlearn/mod/resource/view.php?id=70397 | %PDF-1.6 %ãÏÓ 501 0 obj <> endobj 515 0 obj <>/Filter/FlateDecode/ID[<963A6DB768D5F746A6D63FA3894FE19B><112A40C15D0DC242B1F465B7D22CFDA7>]/Index[501 35]/Info 500 0 R/Length 73/Prev 1209884/Root 502 0 R/Size 536/Type/XRef/W[1 2 1]>>stream hÞbbdb`ã Y@QDA!#Äë·Äj·B"8lÄÀÄÈØ 2
6Äï� �õP & endstream endobj startxref 0 %%EOF 535 0 obj <>stream hÞÌTßoSUÿÞ{Ûq;êmo×!DÚîv«Ôõf(» ¡´mm·-tc>,©Ù&efËÝä6bl+mò`AàÁLM :#åA×LÖ «¼4²Äðà²iàÁè9mú'xrïù~Ïç~Îçûãæ� �è# !ÐÿC°ô²7Í6 «esüǵX ÁLÝÉîY`l#ÙOm)QìO±W¬ SBí{L^Y4ïfv¿¤ÜÊîMÖõÐ\_ÁcóW·Ï0!¸4/í°03¿¾ã\èôÊÏ[ÓÜ�sV~÷ñ,½0²bTwØè§ÊµÔë79þK)Uÿöì9ÄÌÏlMù4/ÚøwÇÍÇê
mߨ ·óö®ò ì©Àé2ÓêÓñ+W§Î^¿qáþ³¥on¿=Ñøìö EoåöúäàãZ3-ê$g2^ÃSwÉk¼äËk¹p ö-Jb2^¬uÑü)%~®¯ä ÏM½÷¯xVà ÚKñrÙás}þ$DæË i÷\xÐ- tk·rÄìOLë$1:(ÏPônG¯C³ß'FNºKoºçÚ¥\Á/ ãn¿7Y %{ËåX(\½¼«+ðÙ®þÕöXq=1y¶·räÙÎ~¤ùV¥°%¦w§à@Rc¹#8D2ô{Ë(íHD~8à®ùùy!)Sð¹¤(t¤þ¬õrȱ&jK!ê²}|§wù¤<'Ù¦pÊ(¿ËmVïe?¡BfqDLn|µbÿÄ0iK×3Ãcjðw»
QcÉÕTɳGgæ<Ø ¨AÀüVì8×¾èzÆÓȳí¬Ïe¯ ËÕ1ô+²ªÊ(¬ °ªÒ£ª ¨hà ´Ú!|U)dææ3È(Í\a«Ð¦ª´-(SofUÊi-hÑ繦ҷµ°&QyÎEöuÇëÆ'JoÇ"Wx¢CÕἬd%E1ÞüZz¢Eg
jªÁBoÀsýzLvãQh;Õ±cm#iquxðVìÀ gHDò?ãèø~ ÛòåÐk#úÐA�¨Ò/hÌì(£¨[v.®v
¾|¿i%sÌñ²áÉ
ÊÐÒß8nbwöëÓlàUíy:ì»1±\ݸïÁö>Yj¿Ý¼,Ë ï|DPÐ^ÛD>UrÅRü? � ád endstream endobj 502 0 obj <> endobj 503 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageC]/XObject<>>>/Rotate 0/StructParents 58/Type/Page>> endobj 504 0 obj <>/Subtype/Form/Type/XObject>>stream H2P(ç25ѳ´02T030Ö3´4µT04Ñ3Q04R(JåÊã\ä2T0�BWy8PB:PK9W @�br endstream endobj 505 0 obj <>/Subtype/Form/Type/XObject>>stream H2P(ç2µÔ353¶T030Ö³050Q04ÑF E©\y\
\ @!sñ\j0PHj)ç ä0�c-t endstream endobj 506 0 obj <>/Subtype/Form/Type/XObject>>stream H2P(ç24³Ô35²P012Ð357³T04Ñ3Q04R(JåÊã\ä2T0�BWy8PB:PK9W @�bàv endstream endobj 507 0 obj <>/Subtype/Form/Type/XObject>>stream H2P(ç2±Ô3°44T016Ô3701R04Ñ3Q04R(JåÊã\ä2T0�BWy8PB:PK9W @�ZéP endstream endobj 508 0 obj <>/Subtype/Form/Type/XObject>>stream H2P(ç243Ñ3²44S02¶Ô³424U04Ñ3Q04R(JåÊã\ä2T0�B\_}8PB:PO9W @�
vÎ endstream endobj 509 0 obj <>stream hÞÌmoÛ6Ç¿ ½B"ïø¸n Ôm{}X²L9Ú\)Õ}ûeÇm1¶�] wÇyüé/Ñ``,[ÇÀµiE æ)C#0@ãÈ@¢%o ÅP£É FÃM̱ µ¦áÐ144FÏÐiJIÔED $#&KI"Ã{úOüEX~¡Z§ì/¨ãY×ó²Zy> ëü6À¤AJ¼8>棺j©ÿ¤)³åxʤv±Õr|çtK\::¿fÃ9°¾>På|uyu||Q¸CÔµ(6-lÚnÚ«8á9^3-Ô¦ÓI·ðnò&dmYWì á °#¤4Oqp j6}ÅÖåB\?Å'uÄÎYÕfP
]¦þ=JKÅMû3k÷6Éå¢:Zy½¬£D÷G GLñS>jBRîôðµ)ÛÐðñݪܶª×ãÁLÚ`Í,O >Qèd 'YfÆá!?§µËn¹!o/µJ½#L4Z Þ0ãSéÑѽϳ߷%´¡b±¤Ãn)¸-O³å úCsùIUÕíñq·îóy»ÿ#o%ú¼}1Ë$83w%3!
q9ÊLë0¿ÏÛ§ÚHßñvYúÎ%ÞN?"nÓÇàÖ ú¸ÑöqÓ³³»{d)úØté}×§`ìln\Nñ>É<¹8S¤(ÜW3|ãM¡Hµ¥÷§#¾ÑýGäkû|å|ÍîëãÇð5r¯µjîg!K¤#Í\P¸¹%1Óg"Gc!ä=¾Ê§OH-½BLUç+ýGäëú|Õ|ð?¯U¾ÏW�çy¢24r¡H¼"1t3Èf¡\_¢GÒné³n]j¢¯!úÿïó1uðÙ·öù¤%¼¾aE¶\
^ÆNèdªe4?Ën^rq½ñ®³fÚó ò\_x×ÅòKà%¯x]ÞòökMøÃzÙbÅ`¡ºÀéiýíRÄ>fµC\_uñQ¹ ¾êëÏE¼Î>þæíÙÑèÉÙx2ä/[º}ùIµX&ø¸\h§ñ®·×ÄVðI>¾e�r½ê8H¬¥)oÚºáï7«QZuK=ÍV!¦ÜãvÃßÕIµ\·þ¨lVmÄÀ¿3v·ùu¿Ê6)�f{§b1ð½$Þ¼ºTγxÄ ÉÝvSý\$3ÆÒaö¼eïj½©åÕÑßòEPåau Àj#¶Möôd¼ú®§!Æ3ó@#ðkÒÒzxÃWkMñÏ=U×YIÜu0cElWS¸«©/§£çï×÷Ûî©)²þQS w5µ;ÇvS·ä]-[-¹{ZrwµdÒíùöÖÍ>?e÷É2ôÙÕÝ6ý\_Í¡»3Øí9ê\_ÒëzÅØZ¥»ØºhIÚïÇÿ¤OÏF§ïm�÷·þ`�Oä endstream endobj 510 0 obj <>stream HdQËn0¼û+öhìú q JHð\Dé; öÿ»ë�Eêev3YÏÌÚÓ¤ÐÈ
|¨òj
ðÒ«2Ñ#UUp6ÔýHJzRwziè)"èDÒ;hÒµB-Ö pN4 WY Z¥ç&½+rÖW IÝ÷ÛL\_X6í´!U$ÅÎìúmô[nצð ?kwÁå¡×Ll3ñïç °ÉDÏ([ÉBó¤ÊËålÑrºÉdÚÎ@Í ÓtÜÒû¿ 8ë±ÍÚ÷HÞÍ¿²Ë8¸¯s/ÑÆ2®/f÷æ|¸?%<È˼¹hÑ7MÃä2ëhÏÚAà|£\Ft T¾²>x"Øtª\tí^ݪ\_�ýqo> endstream endobj 511 0 obj <>stream x-QmLSg}/·»½B©rÈv{Ý´|Ä ¦(+¡aR,%¥u D2Q{ÁÌDÆ`8cdÎ1uc È2+b)00\¶¶Ø1D¶éf²ñÞ»·¸v³aO½Ò¼,¸;&æÌ¬
[cÃíÀ¹8h¥ÆêoF®>WCO'º³°Eh?ó³ãád-B1üç°þ2ºÜ
ýy ;¸@ Ò£I( Jùê&%Ý<óñtݨ¶¬è¨ Údè+\_`-ü.ì7'×Ä¡O¦±ìäVöÝp;þbyøÒc8Åé»d³û©OF4çcõê¿6YÙÚ~R ßódé¡.ìÞ #ùXJ&sGP(µÓ>C¹oSÜ\_Õ û8ËK©îÞHDë·¾x)ï&ÉpN\_ãDí}cûÑs%¦RVK&í{K¶ëÍÏétüAÚ|ã ©!>Qv¥ºG7\ÔªèÜÝ©?Ym©o¯ìaȱk7æï§Å|ÇÕi ^vá//¤æ6¶ÍÜÆð
q÷R \·=x~Eè"ļÔ8ta .èô|§îJÛa0ÍÈÜ\! Bz|sØQ®ñÆ@Ëîáp¦Þ%jksßAà8yÈl6IÔ1v°Ãrtw ±ÞEbá\m»dÇ {§R¸ài$l`Ì ,Éõ>\·³$Ä·?AëÈLVÒçÔìñS =ËgXÒ5¢e= Ñçl0ÖÍÞ\8ÜÄ-P°Õ~t &ë»ûYrèª ù ÿµ2sÏÙñRIIÖ[z=ÍzÿñúA¿¨G¯«êôºÿ/Ú`Ãu¬¶Ìp.SãØ®±3äRÔÜä%Ë´hye¦%\_·@z»~ÿ{.sJÞK+ÎRq®N8¬ßNÝþ."/'^ Ê+KË·Ï?r³ðM{óS$b£
Kïo[N[¤úPhóvøÐÞ¨.ÑëIÈÑ\òà?lôM endstream endobj 512 0 obj <>stream x
SiLTW~7Ì{"ÏjgF¥Ñ]d-Èf©Ra 32 tÜ@®¸¦¬5 4Z Ȫc±j«ØÖÔ&=\HúÐhöGÜ{î=Ë÷{>$IÒAÒ¸¸¥SGn.ÉÍ3ã>¤^3î>k,)d)hgþ \kHIP$©ÎݤÎÖiéZcªd©³ÄÝÍÍK k©²,T¦Í«dZÞÈÄ©SrNè¡Õf{»ºæåå¹ÈT9.jMú 'gIB!çÈ5åiPuV%SÉ%oй¼ÙÔªì\\#ªÓä, l²ÔÁB49Ú\YªC snlL}r©ñÆÁÌrÏÛw]ÛUAhGj|ÙÙ$Q~X²cg;²ëÆá®+ꦯªÄÊÓù¼¾Ù^úyjcºzPeï
¼mu"+ø¯0¤UCݧÀcX£ÇsÀ:[û®~ c+Bú®¶W¸$ÚÚ³9+?Ù/î<5ÕÏB=LÔ¼.õÇ UlxQí·"òÇô\_|°ùÁÑ«7EIº TuX×°ÄCWN0F\þ×u$?[«¹ÀrPV×V qÊ×´Á4]d!Щ-§u²´4µAôå+ endstream endobj 513 0 obj <>stream Hì}¡¦,Åo"ÁF0@#ÁF ÁóÞ»Wð
AÝwýýµËÃæ< \_\_/ÿ'ÄÝ^%¿ÛÃË0ÏÇ´Å2BöæeFw¼xO¯å'U¢@Éñó²Å�M.8ßCËò´wî÷1²S1 ã2à}b[Úf¹-ZÔ¬èO¼iÿð ö6h]³èÌt]aóþWhtGÎiÓ¾Ã-¼ ÷kAñÔÙo¢(tKÎH}´r ?:i'Ç7 ´èÓ¦.jÐÒB
{V :[ÿ4£rO¾ù£, #²õoÕ éoàÜ5Aª[ÿ8Ù-<}I¿JÎ(y¹®¬è®Z²é¢}|ZmÓ?(jgq°×-Rº"kY°\ >X¼P
mð¯ì!ÐrX¼QÛ %»nÿz Mg¼ Ñû!PÕ°|®ÛÇ¿¶ø×$ri³0..o°ÃFàw¼¡PK«Ð) w.Þ �øgj¸¥CQ\_Ùz$Ýpjbx¾M~cÚ7(¢!·A¨Ðaƶo�EO.k´=«êò èpjB-ÆÉaÅ @ÒZµ3?V ±~M¼AÀ@Ó:×Dín~iÍ<ö´HOjD-oOnlñrÊ7¤Kͤ6¨íòð0J¾só7¤QÌÉ1¹5 Ç#÷V°n|hå^Û-Ü sä½oNfîÞ �fÕü60,aÞ �¢n¹··¡ÐÒ Þ �t\_´© ´ô6V'~ qOcº Ak¯Ð·Éß �t\_ ·Ü ÅA:VÇÕ ûR¸å-î0\^ÍÕ ûR¸å-þ'V75]½�z{ ·Ü ÅÍÏÁÕuõ\´å-®:^ÝÕ äíqþ©]½�É3HF,Äp]\_.ç ¸»[¹2Æ9¡.\¸»[¹$ÖÈök3è¹b}\5< 1.NaÁHõ ªåçÖ»ÞÖ6AÄÙö>÷Ã:yĵ| Ö¡O¼Õ 5VõAä¶ç:AøGé1-CTð7d2:s1 A`Ð3µ0J.¢é+¡Ð%]NB¾åÔ ÐæÁÕ£ - þs|cå: °|p ê:�¤6#¥þP
ʶ
¶ÛO!þc06åÅpMl ZO'w§ïþÏñ²[GI°o=èu µED'Ó^{Nß½)^7!]°Ò w~¤ôEDm§~ç9ývúÿN¸]îA°Þ÷1/ºNäàÛçô¹håxæµùr./Íó^ @TYÓw?Ú.MNθò�=ßQÖa! "Ú¤¥·§]¦.~T×w¿Ú>IOåU³' mhöh ØçhÊ:¼y}w³Iz¯Îv%BQÐlÑö¬$еT ·ú¾+;«iЩ»KßÃäðsªðÿGÐA®)ð=N"è tw;þúêk49¸»ò Àïv|ã½î®¼"Ø wþWérpwåÁAÝmø±Jã@ræ^ý$°Ahnôê¹ë Ô
Noî{Cß êUÀÝrCGÖZ@Z
P6¼Ì¨8éB?°VïÌ£ðÈ äså=Í(k0g+N¸Ô÷©jùµAAúË&£�]2¶,¶1±yõØf?\{Ä 8×T�Y §e)»ëyhoÚÝéÃðAK37Uú¡£M»ù\_ÿDÕ�þ" ëmѰ¹8OËCöp03 Y;9(×d�÷åOTóýg;Õöçyh½V;m½4.k¬ø&R�$Þç/à øßÇbµÝÔÑø÷¿ÿïÝjæ@ÝÿGvðÄ|ÎHm3Í3~ÄßPø4à/ýj&.ÒW5²{YÐz?sýDo¸Øû÷ü ¸ ±õ)èf@aÝï¸9~Æÿj%RÜìæíGü'lëº �
u¿ãíÉCîCnû¶»BãG|ÊDÐÖu;AAI;ó ëÞý·>}ö«
¼A¸º|¿ãg¹×·AañP°7Wwo0Hq}¶Z°\Z¤¯jt³� °^5ýv^; åà ¾ªQÒÎ|zRv MÄèæ½ÁrþÎ à\$æSÔv¯øDv÷Îqóÿ¯ÅæåÌ7Äü è\_þ×nÅÿ»/ÃöxðJm©AúªE·Z 1ïÞÖòø½àfÚïuÿåó#þó±øwAÆÖ�HÌ»÷Ǹ®X´xv>, ¾°AÀ«C·Z 1ïîǨé/nλÅ#W\_[´±: q§5�÷.Æm´¾/~YòÅnL®æ!�xg5Èh"@ãÞ}ÌÑbz`ÌQýHÔï¾ã° Bc7Z òïîæ�÷w»Ie¿»ÏÎæí "ÙRnº4!Óò|ûN®î¯f= ÍìÐq£U�ûìàhOµ~~\ëhqÀ;áR!´ÙËÇpßU±aÃÄrg,¸qãq\\¹É^<2\ÞyÀãZ!ÙëæÆoÇùÐêJ´'E7~AÞz äC+dcJE{0æª ¿õ@È&.¤RØ£jôøvì¢I®Æ s!0Ñ}Psßð´ð&¶À:ÒpÓCE\6¼KY&~®Ö6¥X2Ûãôj ±þ\n£ §¨u ôO(¹¢×J¦ u.T>kÃ4ª"gu !ãGÔ7ßçD!ðiÔ4¸ªn¸/ÞýbHB
qKM7w7d!\þr¸ýÅ$¬¨Jñ绺zW(à;Vyü4qlº»¡ áÚ/J'³Á2ðÜ¥¤¡UjÜ-\B¢;@,>¡Îl@°Ì6]ÛïU¢sÕ nI²4dBù`8ãéªã
ÐWÄLݤa¾RñßD§ÁBýT«=¬]rÀ§ºGóÀð¥xEñVêgõ3¨Õ:Õë¶ÛÁ;Uÿ7Ú0¤ÌEÇðµ;G¾~ÚìÅõ°»D'«ý¥/B¨
;~Ù
0O¡«\_x° ÈBÆ¿t`9#;:M]b,qÌ/ slýzYË´s°Ê6X×;ôR7²KÌÕ:§aû»×±}êÝÀ�øMýÀlŬ¯õè\õþkÑÊ.iwN«c6ÀÄy7Ëå#¨X]-¿/6ége×ófr$êÎûþ︳J^ÐÁ?È9Öíþyæüc9PÁ ØfaB4àé3áI`Né61 ½WS[íÃyûkÀ¾{T<ÇÁ\ÐÏcJ üÛè
w}B4)cqñëÀ CEMÀT0J~àÎhÙß:ÍA0 Ì¿!
ç»[¨fêàÛ-û(ÒT|ò¾¸çÌÑ©Às?tQ'ôìOBÃJæÈ²ÅZr=x¶HôTü8/ãAÖÀÍ© f½¸§·Åÿ³îë×òýÀå�±ìøÛ¤Á®wH ØÆXLÄjg²9Z³FfË¿¼«\_H¾v:b·´ô#3W¹ÉvAmÒ-Ls!Ê7ÞÄ\±1H¶ÊvaÜå7KBo9UƤ z2Ë«z Gcµ5®ÙM·¢\ìFfõ&ÌÍ;I³ü¿ ¿§ùTǧgÍñÊ%!Äßè0ý\nû; ýôúq¶
²g¹Ð5ÇûxcØëߦÏ#7àÆùHèºÁùÏij¡ {ýÛBX ©Ú·#¾Xcò/éYËçáGT0Ð~1B£/bùüÈMo ò5(³ZÞ¤/bùü·g)D|§-Ǭ~¿êmÄ
ýËDÌ Îà!&gá@gØ¡1Ëì7ÿ|clYLå3ñ·%V:½Èþ´és÷Mñxha?÷6ÄaR-F,ïT)óþ�oO6ÕüÏ~¹VÇ®ÃPx !!! B B AÏÜÞqfÚæ!;í<¾]k¶¤]ÇÖt ÷ý\¶/K2°¹<ã»
\_ÿÆ#bSÛP[ÿfûݰHÍésñT¹í.{7irû]\{3Ü˽ÄèÜÊy/éér[^&Mî½Äbì:jé÷uqnulèº7³?¿¯3`²í±¡[ÒdvQ öôTRë2ÿy#\mߨEET¸CÜ7±H©Ê:]Öh ;+.nÏ[Ðï òhvYä~AþfZóª'Çpmªôj¨A½·é È6'Öp ?Uܦױäú¬Ýѳk:÷ððEP Ýã꫸YºOdúu.<ïÃf¨öuy ïDÀÛ,¸ð¿ÜáûHx#s ||ú»2·[ê>&`·³Lú-¿¶Ù¸\_Jy\/a¿³{}Ç´`ÁËáÌaºÏ5Ȩî#áÁË9¦ Xqàs/ Ëáå S8k}&ë¢e±r)þÕ,jvÁ+1j+×Ü÷<ä»ROÇp¼øÀ#wß{#gñ5¶b¿ü}Ñðø8Ëðªa%Äýý®bÒÃ%®AÃdã,Ý«o'Ðþ8 ÉÆYêW7~.Ázɤ+`¹\E¿ª :÷·áÊËÃü%AIûëÝ[àu\_½È>W!'¢>¬÷% VB>ÙÏþÛÐ h+ׯ÷¥j¶BFNͿ߲?l7Oï&¼}PKÕTäl.Øûm¢ÁàRAx ^D^ÑÝ`p) L7Ð a'Ý õ® u°ó¢ÛÁàRBAx\ìÐO"º .%u©kB¯'ÝÊôÃ.£21º#j(ë\G#åatK(ÕQ ÀèuÑ89 ck)<êÜ>O{G)hs»|�ÔmnÁù¹->gOB¯r;¶DO¹1÷®$9pBu}ëôîzæÄI8rBð=«Û[ð¼Iϼ°Ú¡ãngų&!ÁyàKvp7cµ¯ä9o)¾ ¾hGák4ûj1 bXƾhÇáNZUlã«vT¾Fµ¯ªjÙVP-Ã&ør /Ü[÷TIpû÷@×mþånoá:éª$w{AÅWTgP~¤aØXä¹÷/ É\Σ»ùÝn93dX;)\_Ò\à㿸߯¦0ËêXiÕ~Èø¢°ææÍ ×dY#5 t|UHZuÇëÁ±/ áð¯ iËÎ3çþû 9 b±/ ëÎRùnF&ÁÃ~j&èøÊ¼òIÐòóЦñðµ!}é¦oåRTݼ×%Ó(®éðÅqÝLG¹åÓt;ÆÙî%º¯îEõ¡
,ÇÁ£Ø �«ìqÇEðP-ËÄa;èQ¢© <=˦DAÍ=u�ñ]Kt3Áòk×
æ�¢ûFn¦kWÍÚ<A`¢;Gn¯®%Ô ~?´Jdà�¢[Gf̤. þEµqÓj©yéD7Í´/ʹiéøn w#OôäM#Y¦¬( ïr7ò¼Ì½\_xl¥r¢PGá|G»ÏÅL;»´åÄ ØáíP nÆË3J0&ßdíB×ý§G:IQåú¿ëIº$3Òñ¶ ?MjzÇ´Y
±ÑÉF¤{m´I ô²rÉ/]p>2¾;Ð B%ÐÊ¿¾K²ôN%o´ãP t²
id¡¯uáhøA@;\P?:§3FBÒÿ N \ÊIݶR£à[íð h#SwÌa ? ^øvA@;4hàa»[ }{üG1AÀ².Rʾ4ôX{�$`JeÊïGÙºÁà8ôÎæn=É ckèpóQØ> sw{#²Ö:µÝt=ÿ»µKðO�JØ endstream endobj 514 0 obj <>stream ÿØÿî�Adobe�d����ÿÛ�Å� '$''''$25552;;;;;;;;;; ####''',,, ####''',,,ÿÝ��!ÿÀ�f �"�ÿÄ¢����������� ������������ � c�����!1ÓAQSUÒ"#2Taeq£¤³ã6 $%&'()5BERbt¡±ÁÃ\34789:CDFGHIJVWXYZcdfghijrsuvwxyz
¢¥¦§¨©ª²´µ¶·¸¹ºÄÅÆÇÈÉÊÑÔÕÖרÙÚáäåæçèéêðñòóôõö÷øùú� �������!AQ"12Ra±ÑBSbq¡¢Á$Òáð #%&'()\3456789:CDEFGHIJTUVWXYZcdefghijrstuvwxyz
£¤¥¦§¨©ª²³´µ¶·¸¹ºÃÄÅÆÇÈÉÊÓÔÕÖרÙÚãäåæçèéêñòóôõö÷øùúÿÚ� ���?�©É$qFéepcÒç½Ä5h$ �,F+Í2(Üø°zmí´lóÖ© qihЮ£M|Ý»Úië«eÁiLå¸2ÈÏàxV¸X+륲)ÒÐø¢eÒ!·nnb Kv¶fæ-w xïX¤í%å¼w¬RvòË"»jÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ+]^;Ö);Iydá/뤼²È¢Ö, vÕ¬¹rµÜ%ã½b´NñÞ±IÚKË,-bÀ×mZÈ\³»yEË t|éW'
i½àÖnZofõ.I²Õ(2§ìÑKÑIC]&ò®ÖsHÇÃ]ÎGtÅîIAÓ(bÔò#·3Fb\I/8GãÚ7s Õ""²È,²È¼j°ÙªIrׯ[ñÎÛ\^Ó÷^4\z¦±`´®1L.ÅѸ5Þö%®Í¦¢ö$)ê6AXÄcãÊéбéf°�N6ÙVül¯½ £O[+äïB¨ä¾« å|oUãgD¸ÛÇMVül¯½ £\_tûg³uSÇMfyf±ÆÝÔîy h¹©é© ïà ¸oÇúoTjáØ ' ú8×r®[MHmdZ:jÔb=eYGðÇp4APf
kDËkAk@¹ \_á¤q nÍ&w6,ZHr¶óGyb.�Ð3´\ SÓ]|Ge¥ØMa4Z: .¾§;�°·Èuéë¦[Ùok¤¦;ç üdI %·-¸[0¦¢R±¤nb]=ÞÝ/&t´w3wͲ®QWÑbP !T¶"ó¡òDQsî±�Y§Ë=+TÀ6g Ùø;7yRèÃ&©uó¿\Æä5·é ½Èºð¤R�K$óÑ»¸½ ÑݼfzWVKæmU5¦Æåçfk¾cã®ðÌo:f¸ê³Ã¶{AGo.l%Ã)³Þ\à-Òß&½K"ÒbÆÉ:C\\ç£áÀ"ÚîÎù¼W¢""Ë"ñ±]À±v¸ÏN!ÎsôàE)ss°!ÄÛáÀñ/ef½Ì3i-7AáÍkĪYì3^ZAѼ4-"aãF±Ü3ðÒíÍe^V\_j6&o=a:ZÐ\HÉ¡Æî/Ê ÍrNkxH¨ø!2k±¤C.
´ÑRä\Õt42QÖFb'e{ÆA4#P¸S�AmDª6YeYeYeY½°¾ÅT>×õW½í
ö\¡ö¿¨Ê¼ãò&'bÝ Wx<ga·D\Ú"$i²""Ë"",²""Ë/$(Ý,® c\÷¸µät�Äy¦SE$atpàÉåví¹®@v@ÒKx¥§¥¢àæÔ¶j|7BèEDÖ:HKÖ4^Í,'Ä-ÇaØmv-R)0øLóe�4q\@Ïi\_lÒH÷�É$®,µ¬Ì`mVXéÝ¡,eO9¥ÖÒúå^ñ Q RÙgVËt¼¡8Ƥ\çÕ¤ÁÿÓÍ¢" IYew0¬\·e 3ÈýI:1oqÖÍùéªÞÇì÷@0ßm«jlú;;F\Ù-a v¶¾¤êE
\ 2xîuM½^´x:òÖF9Ýg¯K ¨°j&Pг$lÔ«ÞãÆ÷.ãoX."NIq$Jf���$¤DEåeYeYx;Y³0cÔN6Ú¾ÜiÞÛû\rRx:z ɤH¤tR´±ìqkØàZæ¸AÔUÝa¹£` |Ch)ÅHªZ@-'+$'B\ h»§è QYeYeYe{Û ìUCíQx+ÞØ\_bªkú«Î?"bv-ÚwÈÆvtB¢"F"",²""Ë"",²m×±Uw´=F%¬ægc©4ºµÍsì3¶8ËAó�|+Øç¾ÄÚáúkQy[)µrläE,fzYÜöæ8´ IoÒö&k£ÐÚY mSÊÔt %Åõ]\_aVµÒþ øÿ�©Ì²; ìUCíQ{;k´Ø67ÓÁA1t¦9\_ö9ÝÈ$·-Áp³û)]Kcôµµ¯ÝA÷;ìç[4ohÑ 2:K@cÛD{KHqkê αqqí48DÙ\êÇU£8° EÒ80)Ú 3æ´kÓ$<µZÍ®ÛHñÚfPañÉ >a$ÎÍ{Ü/kÜ2=osn+kàà¸s±lV�<Íe-kcÃHà]¥Ã+#©H¸�\RbÑ\§tkDD©1DDYeçc&ÐR2±ò1J Ev`×6Þ¯³ÏIx|`]~¯·Zñ¼YUô¯{ÜÆ6hç8��uÉ%wW«bÆ0¡Îh¹¼Ì8QãwA3L ¯Õöñr+¿àe|赪÷q~P2Sä',bsW & ©]9JSÍ ²\`]~¯·N 0.¿WÛÅÈj/ \>¼rõ±áeÍÐìÎÑI¼|rUæ¹¢¡àµ¥¦þ5zaÀ
¤^F?´Ô;¸çØæw7!¶ï-ïìø¸\X×á»AVú:8§cÙ ZÆ·(s[o #ÍîñÒYíºØg4kGáY¦7j6áZãhcÝ^"/ê¿ÿÔÍ¢" IYe`pnã"®Qx0ü³;˺80]ÓÇTÖapçaû;x!õnuS-pö µºEi±ÖçÙ-OL©c:ã1#;ùLèÐõ1uÕýñ½YeYeYDUA%4íÏѺ9r.×× Ðô"-¶:bØt¸F%QLnè$-Ðfi³ëë]¤\_EÓ[~itqTÒbFA¯w2ffS$A#SÄÝ8!<Rkí^ÌTvéLfj8m jÙ""ô]YeYeY½°¾ÅT>×õW½í
ö\¡ö¿¨Ê¼ãò&'bÝ Wx<ga·D\Ú"$i²""Ë"",²""Ë.+
Qc4O¡®fxߨ#G±Ãí:Ùÿ�0t¸S,\_b1Ü.O×B]fILÒ÷j]lÌp6mϵÕe¼ TH6¶dãg\^Q¨ìY¨aA\j± ¼ûS 6òù7Ò2,ÖµíÚáqÁá5R¶ jÚy¥}òDZ½æÀ`IÐ]«=Bew W¤¡¬!9jQ;û% ð\Wp},Ýà8 ĺÌÝR¨û#²-Ùæ¾ª©ZÙZc&2íÓ#¸9EÃI$´HòL"/ôׯPZqÀ¬^ðh¬pÄá-
äDD\÷Eáí´E²õÎŶ&ÒAÊéck" Ê^᫤¦¯¦²1,2·+Øî"8üðAÔ¨:
Ú×Ã\ Íu{KæE𡽱ËQ³Lìξ0l
ï@8Ð3l5îª@×XçÆà ò±4ØùD¨§\X#¦¹"6ÇnMÀÑrI:.Jk'0éÌZ"Hz-ð\éHHÛQ㽫îò÷ÉÑüw²U}Þ^ùox4Àºý\_o"`]~¯·^öeæà¼ljEÝÉ`º?öJ¯»Ëß'GñÞÉU÷y{å½àÓëõ}¼\piuú¾Þ.Ek2spZƤ]Üæ¦²®¶A-dòT<7(|¯t ]Ä\±æcC#ªë1#pÈáíð§+÷ºÎ»CÇÆ³ö©¹lìË¿ª¶É,4ÄÛ¾[-%%54ttq¡¹XÆñÇçN¤IÔ¯\M6ápÁÅU9�%½ Q^×¼NfkÅÿÕÍ¢" IYÔqÉ,&½î c ç`�Jù]üáw øÿ�Mê\8áZMÀMåËDÈHVjx"¥:h(clq¶äÙ¬$ é®DD8ÆDDYdDEDDYdDEDDYdDEDDYeæMû54¯$Y¡µV:-!öjT¬ÛMU=Ç3s4RK #ÃFÓ#q9 ¨ÊiÎ' Ûá(Ýn(Ä\""Ë"",²""Ë"",²""Ë"÷¶ØªÚþ£\ðW½°¾ÅT>×õW~DÄì[´ ïì6è
[DD6DDYdDEDDYeæcøýÏÑGÜA�6|./©éyöYí&39üùRýÓôçxÉ�³´eÆÇºçAªöy¤U¶|v:fH\)i×Çá²²G<Ø.X[r<®¢ó¶[fåÚ\×0¿uKOÕ g³¯þå:ñ> ,è°¡À#?Ìaj[úÐf02¶mÍx«´³Tní£¾6Û4Î|¡ÆÙK×?kñYsÔì¶ÎÕÆ# ;5h×±:<x¯e BMt®Õ¡5
$²MÊôÄ0É7Sæ¹7×·3x5
EØý°èß½~!:ØãÛûfÌCr�uÔ�ÓÉÚÝ¥¡¢Áóµ°ÙÓSé�f.a±vnÌN7±ÈaÒa
=|w&fHZ×4 ËØ8\8îö¦.`ÅZ2
¢ºµÑ(±\q6Æ8"èVôDJSDEDEÐÇþ±/>¦åËFt}pL7ÃTsKÅ·òs¬ûã·[ÆI¼És5¦¶kqÙnp\ÊÜC¦®Ä#dSÔG¼-Æeq&2<3øÙcÆ¢ªëOT°GMrE m6Ü55¢ät4m:8M`c@.&»r}BÑ">#\@êYMµÚùð
ád6¨µ²K7~í¤Ü04æ9qÜa:?öJ¯»Ëß.m©©¯h± d�Ô¾!àeÄu'[0\_ËZmØÜ3Ãb3Ý ÷1pfc1Ù³1ß"Ǫ½Ú Ñ`5ÏlË@'\î/'®k] '\È�+K¶×Ãea¡õp 3I çx\±î{x´±°=#ê8n#MPÃRa¤·0ÊàA-sHêêuið/Ø¡¢lؤM qs@vf§N!§æaVã}¤k¢8¼(uÜÉ:dxVÒuW2 7Áá%#PÁ«è]èÑÈäÏÎDníäjÿÖÍ¢" IY�ø]Ã~?Óz£WAsQÔÉEWd@Óͬ¹is±×UÃÚà-¹i¸B¹¢"@"",²""Ë"",²""Ë"",²""Ë"",²ò¶¦¦:MÄ%Lø[oiÔ.ñ)FÕOW;ìÛá˪!÷¶[5øþu[Ù©biÍ'³Íàîi}8Î ·$¢"#È,²È,²È,ÞØ\_bªkú«Á^öûPû\_Ôe^qù±nÐ+¼F3°Û¢m4ÙeYe«4m,Ò¼\¡VZ÷ Xè5¼gÙ-3 ul e§eC$mÛñ8Û¥,®·4èhwuP+rÝ¥ÎåÍyÖÍ×Mn~\³û1´ÒìÜóÈ"çª#k\_ai»]#θ[ËòL+©6µ£��²&[,`Ã4¢\jÇÉ èªò, ^fzcÖ
/3=1ë; ܦ²àåöÎÒZ½£8° EÒ80)Ú 3æ´kÓ$<µZÌo$ÆðÉ0ÖQ q3æC)ÊÇØ ±»FºéÒYÜ2®: BºHÌfJ#keÎaÌÑrר\ éÅÔãGPà¾7á&a³
UãV¥EdW· q cÈÛ7½
/3=1ë ÖÙ³ðE\_%9ó¶îÓgÞïog1¶¶íê DÆ9Í»¢m&Èk]2sÓ""ð^¨ºXÜrK×ÅKÞú\±Îsn��5$ÝEËNpypDÁB+%ÒaUWEQlÉRÌÙ ¦G \_0!ºxnî§»[²Ó൲OI Îû>9äÞÀ±æÞÃ6übÚuM¢Mc -ñå0stèqEs[9Ú9Çd¹\'ªy\gvyfÒHëw<8Ø�§¤¬9q`sch`4P8g1®qÓ¦I$ùjY³ N?26wcê©AÊõ±!Ã1�qù@d^"ö!qYÕ ½¨,8§uvêóN7bTt 1ÓiÍ{ËZÃ¥ìÒF¿>Ï绪© ¼QÒnÞë#Øæ^úÝòKÎÛ¬E¸ÑNAe#[JÒIeËï~{.4°ökIÌ%mnkïªKqn÷¾·ßu:K»ø§A�ÔKEGb3Ð]¥h8î"Kjb=ÿ×Í¢" IYewbñ;;Jn3Ó7d �¬ÇÆK2F>É{oÌÛt¸T´UQ#iÌ|V=MáEÙ{5Ê5TQFp´ã1²;íI¥úM±QÙDEà½QYeYeY^¾¶ 6jêh ½ÚM¸.@ÌN\_R°d¬LÎ0SþiXU>»¨£s¤v¾:l ±à?)cb¾¶|J¶jêyg½Úø.IÊ\_@ºéäzYìÍgnÅ~¤{tí
Cl½DDEDDYdDEDDYdDEEïl/±UµýFUà¯{a}¨}¯ê2¯8üØ·hÞ#ØmÑ ¶l²È,²Ë ·;7c´U8u>ú&R27;#
ª»48±DÐÆ1¡¬c@kZÐ,�@�\_H4RéI`²Èée ¥{Þç½ÐÄç9ÄÜKnI+³<±6 hÙ L¾XãhcÉ&À�¦ë%Î"D3Jà4 À9p¹\_ÿÐÍ¢" IYeÔrI'=cÚK\×pA ²lî5=
Ç\Í$'PÛÊÐÒð.O
ÖãS¡×[¨Êôð ~·gëEM1Ïì'2FNÎÐô¼ë=.©ÙVM¸Û°½¨Ñµ «È»MYpÒUÓWÓGYG [o^x èAÔ æIÈ ÈÔBf ëÑYeYeY÷Ѷy:Fðèp}SØçk#Ik¡GO+)ã±Ò1ùò·FF ^~«±Á¦;×é;yyàÓëô¼¼nè´X5ïk¥w-l:C -k;^;Ö);Iydá/뤼²piõúNÞ^E84Çzý'o/"ºo`Û®ÛËØ¼w¬RvòËK±M\_´\ùϱÃ;nrnCÛ}æò÷Ì÷üP,×ï\_¤íåäVc6f¿gyódNyÜäܺ۽åïø¸^TQ;QápõJXø{eéÈÔÃá°µÎxØÇv´ÈF/ÿÑÍ¢" IYeYzøÓb[?(çgo) |ÔζG騨ºÝ1Ô¸U<ÃqÈ ø|¹òeFà[$eà8¸¸66&Ê\¹©\êh\c¬£Å4NÌÇ·/84 èF
I¢2>(b\_vÑÙé¯xB¨ræÉ\Ñ`ðNi>2¨Þz}².ö|%¾pjÙPx~'ò¢:×8Fà\ÐñvæoNDÅ£Äqmªè¬\_GCȹ]ÃQ¼»H¼¢""Ë""ðq=¶Ùì3(ßóÛÝc,Öúf éqf¾£K.ÌøLiqÌ]\ö°MĽåÚ]½¤¢J<¢¨µ¶¨nWÓÇH7!îÚZÚêt!eñý¶Å1¶x9RÞ(÷7)kÝás7S �kì Σèô IÑ«9Amì©ÄÚ´ÔI,W½î.{ÜKçrI:JùDG ÑYeYeYeY½°¾ÅT>×õW½í
ö\¡ö¿¨Ê¼ãò&'bÝ Wx<ga·D\Ú"$i²""Ë"",²ÁóRøùóBó9AÛBé$mÝ$²FnE\ÈÉÐëá^F«Ôæ£<6PÒX×T5ϱÊáh'ä4ÛÎ+9²ÔX2Ê)åÐLà Ö¸�sEøô½
Ó8 º
mdµõ5g "Ú\ÝÜ}UäDKè,¼©¦¯gq¤$Ó>QÀæÅZ5K°\_ÊQµQÛÜv<; ~ Ç=W7wBæn$y® e\d%2§Z©ã¦¹åFÇnÜòÑr@ií-ê]1<ÁYKé¤: ²#~ ®¨¦,æI#7K+Æ=î!k@¹$�e m}©®D/ámrvP8Üë`5+1WÍ/² :yê×Y
Á±Dð ³fÌçmEÙ~#Çëv´ÔÔ²»#iét®ãmOOΰxfãLùËæ
d`]¹ZÜÞi{¦0è0ØÜ4s]±94fMú[Üì,!Uª¦Nr×p¥æg¦=akp,S£XTëq¿Þxmå²=ÌãÊÛøÛñ(íu VTú\Ön§.v]®¶`5i#©ì/°µýZUÖ 8M|6Ë ñX$M²BïEñ×ɦ©X \ î£löny)§¬É,2:9ºÙÌ%®u%éÐ×Rt¬¢~ö sd}Ûå%§G�xÁé)§4:^wÚGÍ7=SÃ5l¶qü꿳^ç3 I\_F@ÉÑJÓ®lÒµÍp:ÚÖ[NªóE`£Ì.H$]FÐÆ+³)1')ê¬[6ÝÿÒÍ¢" IYeYe}G$HÙbqcØàæ=¤µÍp7¨ ¯YeìÓmÒÒFc¾Gì×2w^ÀxéòW²õxKÇzÅ'i/,²(¼GêÌ6Þî#En3Ý~k]^;Ö);Iyeתæ´w/-ï¹;5íkïL¼VéYfQaE õsÄôW&~~×õW~DÄì[´ ïì6è
[DD6DDYdDE^vÐaãxTô°{ºÞVêÃ|® \_Ca{£µt42QÖFb'e{ÆA4#P®kÊÆök ÇÚÓ]1¹Yf¹ÒÍZÚßÙ/+À.ÕyÑiùTa48Óq,Ç$áè¡¥BÒà Ø^ìÔd1¸E¼´äs¦/hu´$H¿JãÏ^eO4]¢0È·¤:ùb2ø£¤×©uÕð µ^AôZ~UsSs?ÚYä,é@móË# I¸|LÈo¯RËÊ+{°ÛbJÅô§UÎn@¢z©]=LWÛ48½æÀrI'Aeæ³²ÕV·«Ô´ù¹ß5$£@à MÚÝuÓÃZÜFÞ®ÌÚ6\ZsVr¶ðÇx¢ às¸\QÒ[ã(ÛM cÆ4µÀ�4�åI¦´°Ã
\Ä¥!+z@¢¸8>%£01ÌóWÒ"%èÔDEEÐÇþ±/>¦åß]|B¨\h³nùæXsÛ6]ãKokÚýUËi8ÀÃÚ@¶ atÑÖTrQS O-°pkÞÖ.½Q[c8£lQ41hkÐÖ´ ��Ð�3Åé'ø|Á'{²!Àd©øÝá3Uí{°Ñ|Áçq½ô×BXà7¼1ÍÍh3¼{h\ØÌ3\@&Xõg,VÝ{W{CÔb[Ý
ö¡ö¿«J§ûgQVÒVOM#&û²FàöE6 uZÝÚLÙ:N|©fõñÎñ$ä%{FPn.8¬5IcEÖN" +È 9¤E$1uVH/\_ì#õIç j¦ ê'9̹Ê\Ù# $q\yågñÌb|sdÏfÇ%ÍÑù3k\l.µüÌ)#¯¯tbÎtPÇ/
.»C#GL zGN¢ïº
v8hÍ$h.°Î¤¤á\Npµ»DD©0\_ÿÓÍ¢" IYeYeYeYeYeYeYeYeY½°¾ÅT>×õW½í
ö\¡ö¿¨Ê¼ãò&'bÝ Wx<ga·D\Ú"$i²""Ë"",²""Ë"",²""Ë"",²""Ë"",²""Ë,f×ìC± '° §ºóÓݬldi$�ï\ØñññÏêhêè¤VA%;ËsJÇFÒH½µÁ[|3on3KÕ-ÙY¥?Ï×7SNÖÑbØ67¢¦Éóm²ù7�àÝm¨ÖþZ`Øô+CbÃÃ4c:v¶uíÐN
pÐß
qÇÝT¢¨]�À»IÜ"ïW-6ÑHe£¤å¹K¸´mv´\ØàmC7àP]mòàÛ#ãÇÓÓ;#S+Kà\ÐrÜ 2ùW ª¦Sa40áô`i Ìs8Kz¤zEÚD%"úD©£¢íÓt¢`ÑÛr¬ex/UÿÔ͢欦®z9H/§H[rÒæ8´p ®:
P11m&"U"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²/{a}¨}¯ê2¯k¹|.ÏñOT
yRL Ä;Ĥ8¬ì!¶RÑ$MQYeYeYeYeYEñÆð¦×ÑÉC HqÊ.ö4ô¿É¯9^W]²Û?ɽ«¢¿3\_h\ç<ÝÅÆ2ãqÓºaµã3Û¤tÐO åí1¤§xvÝmÐÃ8«`iµ@ÈA'6lÀµäô
ÜE½×á\Ððjç2ƾWéy,ø.]£8±æ5ÕyØ3ËK°h´u@]}Nvan!ëÓ×LÆ%²öÕ4|MÞô>-Vq¼Üµ¶×Ãòë¹mC\nbLöF¢ºR`cææ
üp«ÐTAUg¦Dûå7°ØlA ê,¹:¾· TÐÌø%ðÌ6¸;)NmÀ¸:¾Ø«Åqª×áøA3åßäÎc@9He¬þB=Ð^×4]¨éí Ø4sÙ¢"¿ÿÕò±ÿ�
ÜKãýOª9t½·4üï´õvtÉwR2ÍÊ×fcs×õW¯íÕ5Oó¼ÐUO»ÓIÉ#\_ã®× ßñüÎìÞ'S5-{{±^sÆö Z8ÝÕ\QàÄe+ÒpòfÐ4W1¢1Ñá¼´afvN%Tv¦¦:MÄ%Lø[oiÔ.ñ)FÖiö¾§hãr)ivðÇzçIbÐìÐX�:·¾élÞìc¦£É-à¢ùDL ¾åº ªïEhÐbTk$cÈyu¤D42±P2¬È¦(ºXÖ) OHÃ(³@.sÑsÄ.ásÔéËAq @4® `&vAwQJÍiYRgtѽyÝѰEc{6í }
ôð×êÝR0\R%Öðï½Á:å-QN©#10¹ööõ&TFa!qß^u¤DD2÷DDYdDEDDYeÃWIM\_M%dbXenW±ÜDqùà¨#Pu wó9Äé¤Ï8VçhÇÅ3A.:æ!�¨ |j¥.ø¾K+ ©§V[4rK.À ×´ñ`¨ë²^Q¡C©cÈ©@1ÞÆÕ÷ {Ôè;ØÚ¾á/z«}À»%IÝï£ød©;¼]ò\Ï®´Pö$=y ¦t;´ÙÎÜí¼R¡,¶¿f² §
ùMUföZgbyc¹ª[\ܧ-îÑwenë©ãéÜèþÙ\Nï|¾£ÆðYdlQWÒ½ïpkÙ¢sl�×$ã0¶ànJõ
#0AuÒFÙwQ Eçm&3Tá± ^/xô·Òà�u]ƶ¼ ÑÛI5WqM84Çzý'o/"c½~·[loip¬Ò3ÛD3ÊæÜ6ü`ç{^Ë;SÍ>GA$¬Ë«¥°»5Îkeµµ¿²^ðãÓ" ± n@ ä
øTXfNtµ2NÙy|c½~·N 1Þ¿IÛËÈ®ÿ� ^fzcÖ
/3=1ë ¾nã½\-,w-%ÐàÓëô¼¼ÙlÖÍSlÝ4Ç!iÜ ÓÛähmÜ�ǦI'Î9õ
ïl¶Ôø%ç¯x¼íÎÛ¯£ÜÛÌÿ�eyR,³ êQ& NE·j8ëÒ5å9ܯK{ÈE/ÿЪ¯lðNàÒnYªóAaw:ÃÃÆ,×8æon{È»1æöã´Íu{CÚZqPdZ ´À]®&ÒV9òSøS¡@m.ÓKXouO!¼Dh{q7÷°±Å§DEÙp²È,²È,²È,²È,²È,²È,²È,±AE>%[ 0¼³ÈÝ ün6åRm ]uBæsFÊgcµ W::RlKXÛµïØ¸Ýº@B¼©eöñÍ8ÚkÒ 3á¶±ÎÈ-<RÁ4 É1¶8ÛrlÖ�ÖIÐt×""Iã"",²""Ë"",²""Ë,ßm%N8n)¢vºIdolD9Zl\o¨ ¾ZßO,ÛOQ»`ãÍ,lh5ðÏ'Uéó;Àék¹ï¯Ä̰DÙ[>CÀÀe±òϲk²FÇh&Xä»ôÒèÔåãñú òËV}BÜþÅzXDÜwÕ]üáw øÿ�MêV¤\;°ÀGÉ]îUÈ È©1W}DD@#Y eLtTÖJ e<2JðÛ±¥Ä /aÕ\Ë¡ü!b\_\}M˸l
ÃMÀTv¾¶|J¶jêyg½Úø.IÊ\_@»¸vËãØ0¬ ¤2B\Z×Ç%ºg{IÒãKéÒ^R»ÇqFØ¢hcÐÖ1 5h� �&´ºA£5©ãã�ÙZºQàåÅÄÕ,lyé)7]ªò¢Óò©àj¼è´üª¢V1²¬¼w²&ÁuׯxÚ¯ ú-?\µÛb¸/?tN Æÿ�÷~9/{Æ9ÖñÃkQtM
ÒÆuÝ7htVCpx.9¬J""{¯ÿѪ¢"Ë/3h°X±ì.Jé ñJw\´6V`|.¶:ÙGj y)§nIaÑÈÛg0¸\£¤®«·».êØßÑXM7©·c½«î÷©Ð w±µ}^õxØ4mxí©ºKÖËK´Õ3ÁÖÊù;Ъ9%ßñÜ+Þô2}þã&óI³æËãÚÛøÓĤ�Ç{WÜ%ïVׯ\_CÑ}¦yÎÙ7Ѿ,Öß^Ù½®"'=%RÍ8ä AwH k�3®DcmµDD -ÿÒª¢"Ë"",²íÖÊÇH1\62ÚY\wñ´ Ü/$e#[¸+X/¨ ®òG±º)ZÇ´µìpkE èA aµû!& !¯ ø{ݨÕÎÄè×2Ò|k½ÖIJ¡ÒðàBqCÆÞaÍÑ@Ò¨ØRb0bmk7d²èB"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²"/¨ãYM/{ÜÆ49Î&À�5$\_\£²! ¯¯øÛ ÑͤjÖ"~~¨åÐL[ÌsAÃÀ8Ú Ô×FTM²]À»%IÝï£ød©;¼]ò¢çU¬Ëºð\YÎÊ åZº?vJ»Åß.Í5e%lfZ9ã¨`vRøÙ�6»I± µì,)î¶Áe¦¯(¥ØÞ¸ty®¥Ì3ï<5CZK-y wq:üV\m<ñUALÏѶHÝb.׿ÐôÐèg oÖ
&¢1ÁÇ\¼W¢ÿÓª¢"Ë"",²""Ë,ÕlÉ1, &RùhÅî/º�X.rôºW¸¯+;´ÛEf«ó½xÍ|ëe tj<»�£SdȵO¶6wvhHôL4Ý£m¶³®)B.ö+-K©«,9 Å 9ë�E<±Ó±]Å®�´ÌaAi"ÑDD\¬²È,²È,²È,²È,ÝÀvCÇÚÀ¸Q'Ê@vF\u=ApEÁ]^öÃgÑt®ZÇ<É ¼JJúèèã2Í+²±ã'Î� I:©TÝØØ°ÖVO^s¹·1ÄÓ¥pb8ͼ¡Ó¿«`8~Lêz½Ù¤B+ζ¹¢À�½$ú)e&bÍijntb>C[¶ÃL¢"!(,²È,²È,²\Òþ øÿ�©Ì²; ìUCíQk¹¥ü!Añþ?SNèkª°Ê¦VÑ?uÍu³Ó£DôJ#Kè®hÇv ãL ). ¤5ǸSy\QI<mW½ O[UäïB§äú®eó½Wµã¯ 5[E$ðuµ^Nô\~I<mW½ [UѲ̾wªÖt;¼4ÕmÁÖÕy;Щù%Ü6Ïi\±j\ië3Å5\ÈÝÔí{Ú× Áàà|Vp̨OÚîU
6 IÕMSÑDDYeÒÁeÒËAJ÷½ÅÏ{¡Îs¹$ÜWÏ@0.ÆÒw»ÕßEÛü±¾WFåEàº�À»IÜ"ïS ci;]êï¢Úùg\_+#r¢ð]`]¤îw«ÊÄvgëc4S=Îx'8´8¦GÜ·7³mÅ`BÒ"å±¢0ͯpÏ+BcAÎQ K©k¦ÃêÀ@àæi5Àõ õz«}Ì×£ ¨Ã¤mtnÓÆÍŶ�q9¤ÜÇå/\_ì#õI§ìÿ�$õHS(ÇSÑ0îáC³Æ=úÐP¢¤áF4ÈÎ\R`¿ÿÔª¢"Ë"",²""Ë"",²á«¤¦¯¦²1,2·+Øî"8üðAÔ¨:
Æùxú ^«¹Öcöѳò@yåËxÒxN!Ò1ÁÎ]"AdQöï¨umn9¦®
ðJ/á^-p n`xÛb4+®®5´XºO¿
x½¹ãk¬MÔ,¦+ÌÚw:\&sHrºÐÉyb.�s´\AÒGÁ:¨nÛ¦q(Oml8asé)Ê/wؽ¢ÃoJjY4IKy$fñ g�qZýðl{b ±ÁÃ0Í æ9NÑ$DEÙp²È,²È,¹ §ªVÁMæ÷Ëm/y°$Ø�IÐ]h°ÞgøõvWÔµQÙ¼Æò»RCs²õ:¶èø¬&÷ìÍw±×fC{ò-'e¦³+Ñ6ÆäËAs²¾gxH[«ow.°¹·IQ0À°×6YØk¦ mÍEAÖ!Ä0 XßÙ¥Mh£8£lQ41hkÐÖ´ ��Ð�qpE¢¨MË:¡{AMq ³=õÀyáøsS]Qø 3K¸ò ìN-b"$WÅ8gþ0F2a4H"".²""Ë"",²""Ë"",²""Ë"",²ÉsKøBãü~§2Á`X\_F±X0Íîã¼ñL»ËdcÅ·ñ¶ã[ÞiP|ÔæY
ö\¡ö¿¨ÊÑ\[D{
E¡äÐIh8İ+ßà·Í?Kúúp[æ¥ý}o fÒ2ût6$¦ÝÚkÁo~õôà·Í?KúúÞ"Öm#/¸·IkSní5à·Í?KúúçÃùs}5oDwíQÙ7snÜkï¯n¢Ú¢ÆH úÝ%
3 ÆÍ:huì²ÈGãxÔXÕ|QWÕ1¨kÙ¥kZÑ#�X�G£øïdªû¼½ò5¸÷�p°1¶
4ÖFÔn
jEèþ;Ù\¾ï/|Ç{%WÝåï:~]·ÎnPß Ô¸jêé¨)¤¬¬E MÌ÷»/<t�jNFú?öJ¯»Ëß.µMe]lZÉä¨xnPù^é 6»6¹+ài)YµÁ§ TÃ<ÓRïí.6ì¸4²ÖÅ3cmȽ$¯k-G3 ÜMìø¥½®8)॰SFÈbeòÇC.I6��57\Çzc"",²""Ë"",²""Ë"",²""Ë"",²""Ë"",²ò6�ðEAÿ�·u >Míì×¶ÖÌÏõWlAqX1>~ßî7'¹Ýß;Î=ëã¯Äµ¨½[HÆmtg1!o¹Myº 78<¸J¹XÖä¼¢""Ë"",²""Ë"",²ËÖs=Ákjç¬j ú¤á¯49î. ^"msÕ\\`]~¯·ZÔ^ ¥æhðx@²\`]~¯·N 0.¿WÛÅÈj-eG×\Xð²d¸4Àºý\_o"¹i¹lìË¿ª¶É,4ÄÛ¾[-B,iQÍZ×ä¹xCX^ SPÈ"ð¬¹�71>/Font<>/ProcSet[/PDF/Text/ImageB]>>/Rotate 0/Type/Page>> endobj 2 0 obj <>stream HÄWÙÛÆÍ3¿@"RhtË/,%mÙE+åI¥¸fhqÏ¢¥òó¹{w'\¥ºûnç{úébôøï¯«ñÉõèñý»»j:¯æãÅWðÏ?¸mÝ4øùl¼8ýZ,ÊI(NËI[l˺¸.'¾vÅ%þ¾Å~ìà ¾]¡XMqSzú}ßÏaGoà?ú}UN áY¾æ³úæ Ìh%n #ûÇøª-~@`Ã@ç×Mñ3;W/ßp.¾¤#Á»'µÅGXßxöàÞtÅÆÁ8ÐkW`õ5>£ø¸SÃ\_Sþkñ ¥Ï%éóÞMkHàbùzë¯KGÇhú¾ÜPຼd«�^>¤ küÀTu\PóYõ\3íØ|1-¿&!ÌÆWOç-ûô Ré¸Ã1;©fÅöì2¥v¿[Z
²ì}óå ~3ÁÖJl<Ð;e칺ºIÐH>àr4Y×\nÜu+Á¶àQ`ùS9qôp1Üjh¸|OöøU%MtL%¬¬<Ï <sá!ëfdöÿo~@g}ñ´ÄÒú®øA×9üÍàO¿FÝI�IÃ~N¡Å³%P\iÅ«ÜF´÷ >Ãá|Y�xº�|¦½VØMùNªqTÀÝ
þMÙå¿àÎ�ë[¦uü>\á/ýQúÓóھ꣦ø±ø3Ô�Pùb¹jÌ@à.®IéãÛß1QZ·¸¿¢çaVêãCLáw:-F!M 1!æIR3sê\Té×@K %À<ñzrËiÀ\\ïкP" ÒÑ}!2~\_Ö¼7]BvüL"Þ£Éø19s`R«yßiVP §h|¤!VçÝ|M:9xɬÊéRJQô½vÆ&I³ÎÚEV+uûsÊmö®K80+pT9dÈ7)6yNÍeÈ)³BNüÈHùðóàÀ6J¸²ÃÁRVè ùT@çY±Èº< ÕZFh\mÚyZÏ8µm鶬-ÝR¤;Ûô¹ÅØuÉtsL0Îu]gCMû µÕ~Ðû=ñ �ÿüRÎëØC;í~oõÖkrÒAåyä ÿ>1úî¾Ñg£\ÆÑ|ü$}çäÓ¹z÷ä¥Ró/pLŵƫNPã4ÐÙðßóá©tZôBÇü}Åä"U$ÆÏïJÊØÑÿåüÁ© qä`Æ)Ù¹µé¡5AF8uÖÔôÄh- ùêçÑïþQ5 ³ù|ÞÌèr5q¾úºªª§{V/çðîø½íÆë³ÑӣǿÝèñ üxùj|su{ÃÌ µÝOÚðV§«r¯ÿKt?±.4Z¡ÁmL\_-úÁËWrfbÝ@Ñ"¯HÒ$¶T¡~Tªªõ:cÃGèºõ ù¸ Ê y1=µLÇ-#/;W]V´Ô.%M2&EJ£¬Xqrù@#æ!p%2>×ùÕG,GfC)Èeߣ:¯fOl®E|Å@Ru¤Àjü¾]'êÍD»Ý0¿ \_öÄhRUJËPERàá-øÒ¼SäMvî¢ O9uªØú¥|²»ÍhØ÷Órt
ªãL1ÖÉÝDWìÀÇ2+ÏYФº>¹+})ü©¶Ç÷T±´Ð&çCãSR:þ~·öa }�ßó
ñ] dhiëÔD`$ÔwÑoHÔ
!¹¼ÑA &>î¹$Ú=õÜR³(¢}:V;\1B¹#¹ÏdlTQù5Y~IiÍ2¹~),ÝDÌF@¿yôÆB÷d (~Bð÷I J«¼Ò]CW¶Ã³u{tõ ¹|dôfÁùèM¹$/¡5JL6Þj¿jà¡N1¡La©N©ÛxÞÚ|B eCr;"ÒX&ÙY§cÍcOz²+Ù`ª+¡³Ú;¥<¶PYÌIÜOÑÒñµ¶Aõ©¬Çê6å7Kýõ×ëlÚQ«>êaþ³ëÍ}/k¹ÞxÞd]Oÿ¤A\Xg éË=×/£¾¶mFëËÃÆF6m`÷½j¹±L#{Téç¦]7Ðñ&°Ø@ÖØ÷§¥ãÌ4& !ÖI?ùç°jû®¬¿¹ÒÉ^loxv
cSüZcI X[ÆP(^P¯ãÝ#ê¯ß
sÛñci&¯fp'ñ,nñû8èÝMq"q´ÏF�»ÅovÛ\û¯cxj§¡³åmT&±´;�+v[zsªIõjÜSáÃ?Ø¡a2ð5fÿSñP¤ds{§ø!æÓ¦WSßN(?DÕõIuëé¬Åûª¬9ºÒE ½¬ï{êÝnÇb áûVkß·z½B5ÛÌ]§EDºN¬æ@àò¤I\4½#ã"%ÕbI h¢æ® 0+yppÚL¾a.jÙ÷Øó e´á+
¥´è£3/7ÒêÐgÁæùÇÉ! ú?S8óµÃQå<ËLc}|¡¼~«ÖSÁS+ÿ±é[qçaݱJèòµ$/ÈP%®}gÉÁ@6¥ËT×ór2ãü±ïñi]tøæýk^Fh[xº²¬ ?`9Çr¶£¬L#M1æ·¸R±\_ÿ°°)`:.Ü2\_KdÀt|zÉÜåPµ37QÓö8b·,Q¬ØïMÜÑI$x¿©S¡§é´!+µ&ªÇ8±µzáP¥çÃAjN¿µÛ©i;Ð;Ú{q®·(i]a{tfÿ¨¶øÖd¥O,û®9$V:î@D¸æ04'ÞÚÈ´ÁVÐi(ØÇ¨éC`^ Ø©³û.fFå"6ªJûe®KïÛ=W}ÅxÈEèP\_#õ\ AµÕÓà{îÙ¿ìÝ[RbÚ-CüRb°\¤ýx8}ºýFTä° á`Ø~Ä\Ël¥Ó¹¾Ñ
VC!)t¿K/21£ì $h'Eéö2ø\Bé"euBÕ=n¶Ów»Ø¦é½a©#júÇk¬
¹öMï÷çªìBwXcֳȵOpK;¬}NrÉYÜß&4NÞs¢Ð¦CFúë¾ñ\¦#õ|0H³3H¡p8X½þÀ¨0g«{!øóx»5~qÇlª¦'ÖÖ~ è¡è~¡÷©
àÀNE¶HÁ|Õï·>!èPëé=B¹FÙkÚ|77WB¶AÖÚe\A¡eøªwÿF&«ìFhR7ó7¸ð\_Ú«]'böù¹¢8v\Ë£¡HD®9$¢á÷É>½v�!Nb¯wgfgq4AJv{Ò-äü\ùÙ{N¥jfÞízÝ@75 æCdBõ|Oº;$Î> ê£!K!øÕÜ3bó±¶ ZÉ{,`õý\_ÝKçÈRxï
¨pÊ&ª V¥K]rþHß\íBj
úæ1uDæè(íL17¬¢¯ðôñ¬#-8«$ªÖq®D{mÔ"Á¯G(Á)7réOÅíôÙ÷ajnx+Gä$\ðBÌ´µ¹
Ú(ôÎÚðXgæÝSibìñ(Çg-ÓÇfWGo\2µéÀUÓ~hÇÈ3äø~¹£#Fæ¸LGhºîáÑÑËNðý�c\ÖäéUß\ÏÕ§��d| endstream endobj 3 0 obj <>stream xTkPWþB ~\M+4ë¦v¿¤µu E¼´£kmi.(Öj]4@¹lI ¹orp á�rQ@¡µZÝ::]ÛÑm˺;;íþÙËìÎ ~þدÆíN÷ÏîtÎsÎó¼Ïó¾ÏyXXbÆb±VääÜ·eó·ÇçcëX±§b?aCõò˹IÌäħqM 2®A¥£÷ÀØ,¢Ú£PÖ¨¤eåjaZqºpKVÖö áÖͳ¯É$\i±X.Ì«Ë%2±¹T ßQK%êaÚOËÕjeö¦MZ6S,«ÊT¨Ê^IÏj¥êráÛ\J#)¾¡«
ùbD'ßr2eµZ¢æ)J$\9aÉrQZ\,)VʶbØ~lv;½íÁÞÀöa¹X¥b1J±DlJøq½`ßOM%]àY!9¹±«&\¶b¡²·ÀFµ(ç£üÝ>ªõ"¸;O·õLÝþ ð BMÞqzu}±À u6?Þ\_6óõîk¶Õ�®:aQ\Ó �×ímÑæÞ` ré¾2ç¨Ï¬WPÊÇÇ>]z:»`2Ã!¼B¹ó¹êßE=qÑàÁ» µ¢¶0¾ìza q§ïí 5©ÿPøËOõt/Þí5 E fÜä¯íéìm.:·^Yôa"õ>¼r½¾ßsÑã þ ʰÐêklÔ{·Äé AWKè;9£(± <àãw×úÌ\³~ ýRÒ6Ní¿ÝåäÐã¤Ã¡zþáÿrñU@ÖX÷\_}p%D;ÐèpcA¦èºJAØ"Ú½°6õsô׫¼ÐÑQÍY
îhû`x¬eÑú
$«mDý;ºIÿôµÅQQô;Ä\¬R;I¤NMê\:\ÖÑlzAoØ6-º-Hý|.tÏ¡�ï]`©ÈË>üc«shexB];Ï?zXì"í.ÃðBcw¦Ïpر7cñØ q±>¤?Õ×CÍ}~æÑÏÒÒ®îû=zòË?·û,!$͵[µRMÍ\_êû{ï`äúÜÙ)Á«½PRh'SsÙÇØÈô¼øµw¦ëÎ\�>]zîgéõhÑmúïø¹¦[çÆ§}?ÅD;þæm|üRú '5{#
J'XhéJù÷W·ðÖÇl^ÓLN"Íb$M$èø¦fhñXÍN§HN{pt1¦wñMMu]Ý!/ÑØ>~ègGÓÛ Mþêæ{ËËeų ñ¼òÁeñkScè+´÷¹òEÇRïîëmn|v7ftuñ/K¢¥¥tº=8¶F¢i¸÷ëyÀC!»ºÊ$·ê²Ffñë%hñ¢¿F/4©°ÇÔ¼¨6X¯Qjª¥-Òßu!Å´r7ÁúæÚÿØÄ5¤Ã®
:þ»#¥3c¾h+Ñy¶íð>t¸Ýv'aUÕtbðão÷÷¸Ëóÿìüôî¦ö,xZºOÏMÎß�|Þ«SZå®A.Ýú½$G/Çßð¿÷èÿ×Wc¢#ÇËËÃ]
°þüýX°úfB-:ÇHÏ@ÉZ2~ÃûݧçÃ(óÞ £»>ÚE§eÑ
¹Zÿ©;(y,ÜpÖ`³Ûm.p¹]ߨh�#./}&ßhöõ\_¿ îù;èç\_Þv(T«ÄEÛM" mñxûÃ#0ýÚhmoÍ`õ80µ¦Ñë¡G¤wêJöîõeÁ¦J0AËEÜj\BUCC+W-®&V%n$¯¤1ì[#¤ endstream endobj 4 0 obj <>stream xEmLSgÇRè½°ZÒðÖ^¦ò2oÌH&LhÕèa[RÊKÁ03KÏ¥&à"W¡££µ]Ä¡#Ùû07ãLìsY²/7r.>$[öésò;çÿ?"Hìü¥)Éé.qD|ÑO|I íë«ë@.¹¿ûùÕP4
à{Û±$H%SÃ
lSÕ\SUmá\¹ô.599{Ó 7×Tè\¾ÎR7è,¾ Wdª¨Ñ[¬\Üþj¥.3)©©©)Qg¨O4«Ä'pM5j®P\_¯77ê+¹\Ñè zn-q+d u ½Ë7UêÍFBc2[tzB"r$9$äÖwñ'§È²ôù
ù¹¤¢M!þÔî.É4aIE7U´JÓéëÉ»i$ þ-ßÀý+«¸]M?¦y\ª$+óp{à3ͧ{o¼#ÕÃ5P 'Ø4 \Õ Ñ�^ÁÅwC׬¡"\9§ñw04ó|¹×z/WËÌòó]\_ÜmQ¾SHÃlFùøÁ8\ªívk+Ùòé&§szسtÌY¢VÎç@E%UEíüGÀ¬!É3a }&F«èÃ4üøóüòCõ¶y«¶ÞtîªÑ1Á"-c=gc«
øu»Ë à;×ñUWè4ÀLCY¸²Q z¬:'ÿR/Èúal´ Ú4<\Qk'¾§ñ
TqqïéÙæ©éaïõæ[z²{ïöѬ.KSÃ(
C6Úóݵ?¨¿pcÄ˶`\ÙÔf.ý ¦~²èP+ÖC7iD© Þ óÉri嬸ÚMÕqßîü àÖ34çÿ70Ê[î²îvÐ÷ÒhñGÆig¿
±©q¿ó§¦ÍZ^,U�n{°�w®¹5N¯Ð;Ëà©1²ç O Æ.¤xg}ê\¿oô YµH6¾AÝn²ÕÛ:Á¬Y+s,Ûç¯àÆ+´ðÖ.£ÃÎÃ+1bÇÆ¯½òö«9G5#Fx~Ò1æèI`ÇÞV (wøhÇA°v:m¼ØxLc>©óf0sËçÿå>³ôÄTûòEÍû®ws}ii»hzú îÃÔkÍÐÑÒÙÑÚ®i>stream hÞÒ[k0ð¯Ç1þIZ» "´ÞÊ9ÄЦm ¦Ò6¿ýRÝ}L| ç$9çüàpvG(á,$as´G9%-êt #:©R¥s<)i£>ã¾Ê2YKH³a YLÆ=H Sl±8ì%>w»®^d©- Ú>zb?\/\Rô QÏ¥½� $ (ØAÃÀ¾T×èËÓï[Î1,Enó£>¶q\½nhsGB7¶ÇüPÒ#S>ãØI,£ÅójyÓ.&bbE©Hç¥$Se÷I¥¶ -J1·r·r®àäi4Ôjo«ëwïósàK8sÔ +Ô°ßTÁÿ¨ýmòFýÑÃýØõå¦öySË;.ߪR&ÕþPÛ?ð&À�þ$Ãi endstream endobj 6 0 obj <>/Rotate 0/Type/Page>> endobj 7 0 obj <>stream xÕY]oÔF}\_ªþ¿Õ[ÉSÏ÷ÌcK«ª-j¬Úª! É$@ø÷k{gî¬g³ J)!-ö|Ýsν㫦R5=ýÝü8<\_|÷,4'oÑÊñ½!êæ·Ï\_-®Ahú3¬Ã7?¬°¬Tª½6Äfõr1ÌodcñØK#iVç¿ÛÇK%dô&¶øe{¥lû~Ù^ûöݲBhM{¼ì´pVúPÿvÙ9Ñ[eÌ?«\_7ûGÕ´g\Ñ5ö"4«£akLv3°·ÄIXgî½uÃvÌw6ÇcºùT í{aaG¯hÿV§¾ùÿNîä,ÓH:U
³´èMã,Ìu£»~!/Xo{:V¯É F8DÉ´o\ø6uº K·GpóÆÇö:ý:$ë·\òùkXô0à,êc ®7Ëyd¶\Ùn´4Nö½ñ^vÓÛNi&OËe ¢ØþHÛ"ÈpÛëÑVÑëc¢ÞäUÇuBU{uLA¶g°> "ÁOÓCoÛ+Äì`sDS\_ó"ÛÝ@ñÖÏ%ß4¿>k·Ì÷lÍqtº)"HT:öHg]̬v:©[wÊ6ضoµÓ¾Qè
+ÃJ9ê M'm¯¢P\A±ø¤P[¤ºëGPaX <òî =4CÔG,BFdÓ»õA^Jû<åjihàéVºesòBùáë<ô-æPjµ6 )¯}>¦õð®u±¬NV«ªÕÛ\Ýtn ±R&Ö³}'y´ÜÝÍY «fÌô\2Weð>O¹!yYR5û^¤gøÇ#ð:PFbÐ㤠û1¶tÊ<<3¸^3@(à@EÜOª§çCTåÓe~xðI,ì[öô%á ;8ÕÞ,-ÄÚÛêê/2¤ÎRò/`£Å9HF?Y¬¾-ÍÎús$C9Ö/iØöCb5Ã÷Ér.;AzÆXc?U`)'<ܶ>§ÚÁ¥PX'¯ èÉc;Ö8Ã0½hÏñ³WÎÁ\_Ìzfe Xû=åNL/k8dZÌ �Ö¨9�\�ïFH/y ¤òÞû@ß\_dï' èQ9àÜQ°Òp Ö#UàÛ"GP,S³t°Dfs®+é2JD
ÁÁGy\B/ۻѰK<¤ðº$ØAÎæ¬DÉ¿ÍKT½$ðGDN«\_b}ó [GR©~Ä9ºÊ9Ïè) V=Ê\ËÏÊFput³û¨AèZ[õtw°Ä
=2 ®Ð¼¨³3Û"e·+¿t2ðw¤�ëxiò>å\:}¿ItÏû t"8µ$ &oXÖq"Þ"miûá8vþx4£Ù¦Vµ- c¿Ñ3£);çÌ©2/ #b¢Ò<¼£ø¢j»SÜNélØ�y?ê3Uê{2tÁ{¿Ññ§¬D4|Т3X¥n]rØÒltRêérÆI¦ÊI;$!9(U7ï\Å\_ÅÖ
(\4Í\_oÔ"4uRëàáÉÇÙj²qkÔ:aVå3kùØCÝgÝ1xs)áR FÇHòûÉ,|W)§<¿7ñ0í`½f:~«lÕE>dz §Eõ«N\eàî S:ÌÖ¼e·þëj챩>ζzÿ¡++ry§77EÑ{ª\LÀ¬z#ñ\å:rÖTPJrÿÞIJsKakjEä ö\_!Ôo>LºäÝ[3v¶«ÉBcIW¼?ËÅ4ìè;zpµ AX~ŹqÆvÙMТ&z]ôN§ J ê@jæÇ¬ÚÕÙ»]ÍlÛ×víõØM®ª¥ «¤)ï1ï[Çæ?@gd«"ÄúW5qVýêsÏ%àw2\_Õº²#.Hìò²èì.ºõ®Zpäá:ËÔ\ò]ÌaEëYõ`×/õþà\G8ÓG¡#ß!<:ºvÈýy³ïì\_© =LLͤÒ]ϳ}féófac½©h]©µºyþ¥&Üa¥! Úª½ò9j¦íww YKoÿ§ Ú¢êUGêàaJ¡å×¥öÕé¿>6qR¥»óTopJ>~¾oÎNÒo$>£êÍ·æt§øü endstream endobj 8 0 obj <>stream hÞ222T0P°±Ñ²P027²ìì� �,0 endstream endobj 9 0 obj <>/Rotate 0/Type/Page>> endobj 10 0 obj <>/Rotate 0/Type/Page>> endobj 11 0 obj <>stream xí[YoÇÎó:?bß¼gFÓçÌÈÛ s�QD v�)Á¢¨Ã´BøÏ»ª»ººz¶»KDlCp¦Ï:¾úªºõnÝwJ¯{ü?=^®ü{\\_|X)xií49¿iÌúï ïX½[Áÿ8òùôrýôUZ¯UßMnÖÇ߯BÿµZ»ÞÁëAÙNÛõñåêÍQ£:×k«7oÝ9×aócÓªNÙÉÙÍû¦í;=MVÙÍUÓ¾3v7gÜöNÖv|urWÁ'5Aw3igúïñßÒb§nÒÎàb[ëtg׺q}|ÖÃicCWØU?8t 7¸JÕÉN#.RrÓä¶×ùñÕ0¨ÁË^Ázg±¿±i¯ÒTjq\_¯úõ\_àÏÅ> P&( T¡�Óõvíî|ÿ1mó²i=®`ó$l4¬~^0#µ6ìVaÐ.ô8mìæþÐ(giOðeè<~zѸÍkhîúðíÈ1
R£«ÆÅÕÀÀzÓÁí´ù¢Ñ¤=cåNµ{½ÅAÏWØéf§÷ãÓFÁ:6H 4|tWä`h%Ô,.EÑÌ¥§)zV9IÓÆpùØ©5`hF¯[¥»ÉǦ;7^½ÌßAÀ#iÿº!½±ÏÕÀÀ>?5àr£¹ |û{ú8Ðïú^
¾üÜßÁX~ó±Ñþ¦¯²ÏÁû¦iýî;^¢PßиäÜ (÷ó¥¤Á<ÈhD"£üPÝ^ Ý ßÀØUÞA«è-¼º Ñg{OVOþ¹þñýõùêÉÖjõ䝸×Óý~}¹þÝê«£õ³»»Ù`;å×nò'Ûk(£ªi©>À&þþ d5LݸêÊÍ¥²5¨�¨Q²Q^§íüòrùø~zUìX·ì�ü·¬Ûõ¦wõ}ç¾QCtì8×£ÕIÊzû¨T9üE.k2u¯kaA°Pï¡1Éù30m7~ÙÌn [XÒ÷üMæqõQÿþnBÌ O¸®{ B4¨päÅFÝk{«§hoÐE¤ê}{D³êXå°ñíð C@ÎïGG¾mSÊæü9GírVû@ AÌasĺB 0¶ø1
xH\_rL¤Ð¥)FíK%êÒVèñ»°sûN¡^+Z&NÏB¾WÀ]«d(
¾-JÏùóY¥á½´, îl¸ ·´ôò=(ú\_-ô¨DÙKûD ÐÜÃNûÄ¥Ù¾(td}4´ú)E&Hæ ¤Ø²º4çºÃö48XæÏd{Ùz,H1óë´k7¿çU³
Ù,Ì6WdhØN¿ØW6ä6 a{éL¡°|û4ÎVGLú)¾½Ä}q\IfBAµÆWª£H]ÖÖaç+ÐÁÙDJ¶}JÊ\(ÓT`+µ¤$äI¸\<'¸õK©è©(¸»ñ¸±\-ÖçÐ7Í8¾X'ËÎf~å;�èqtÊíÙ(¸# yl>9þÄïhVoóþ¦'¨"¾I {gÛ¹J©¡~~§NbJ1ÀiÇR¸¥ç~Ì0AI9Ø},Ä87k¾P!(ð=ØêÄ» %i+½&yiLÞ+6qÍ&Î0dzvϬ=q©®ðbdK#Kác½".&y5ÚAQky³UAf©mµÈZm©?.pù~ó¼ð\aÄr³Dp±P"ßLX0Ñ"XOȵKX;´ÔMñA\}EÀ#©(fCs¯ä`¢LVÔ\Gúï êРΩµN¬|¢ -õj?UK²ZÕK²�'-WÁ1;A±ÎÅj^ðGp=1 ÉBïE(º%µaH-,!¨C®St«iv'¤øKÆ&ɰ¦`sb¿ËZ{Ã" ³ÌBÁLÑK9açô§±ÃBá½üØh¬ß®Ðº5\_À\ýKK/sù\n¾Qòyz>cÉîæÆmºIQîZýË×I¹g(£èN²ötcÊ+SæLb.Ú nmÇ5ò9ÎF£EG¦w^$Ket£4ÒERF&H
÷G9Õ¼IîÓmGÊ;D�-Ûz:ñ[Yûp/AOO)2\_ "¦;$H{H> ÔR2r:2r?OA¨V�óUqÌ·RÞKêð2+íÏeçRëB 7nd®ù}Î\ï\¦>|UvûEÙ`[òþfÞ,;hrU÷åæ$åÞÕS\_åF<ØûÒa¯ÃyÛH:ÉM§¿áë7Þû´wìE¥1Áè`ÐEà5@®±î YµÄØsY¥ÛR1Qf0ÇÑæ)a$ Jë9Ö-8ðßÇ$äH;øHã¥ÿñ@ܤÇEï³ Åʸ'ciAíèB(8·SºN38ñ<e×\º
!9±sy¾Ä¾QVL>4\^oyÛ�³ t×Z3ZÙ;¬«kê`ò¥| LeÉúä(Ã!pNNå2ÓÏÔ¹ú<±õ.e^¡c}(år!æ3ÚÊ$j©<"!o²öÀ!r|]^¾¸cÆ ñÚ8¦$øÑlC]P¢QJ@ö%1¹,YQö(
S3ÖE®�Þ<e
mj¿#i¥L¬vYH-${w¨ùbêY4AÒ£ÉÊAí¾ÔV Ë$?x
ÍÅ@Ê{ÊoNï# ¨F÷¥c&®>VSºè=©V;ºýN Õqfµ 6+ W@=¤ &Èq
foÍmQ>´RÓ°Ã\{dÏ®ÒÌÓ©[>b×JãÍ5¶Í|¶Rô y½õ`!-l&ý87ì}ɶSw û[Z]%³ÊÚG½ï¨¼ 7¦îíúU²-rÙ^jî:Þ½åvVv×ýxúËÆî^ÒÿEÉ@õÓ¼f ïÈÜå¢Ví$èTøyb)ÒæJ¬§Ì¶^7¢²¼Õý
>Ùg¯<5öG|>Ó¨ÕVá\Ä\qk&ä+¯æÇËùQçïq5Ï8~ÀÕ÷T+ð¥Ðµ¦U ÿ§hWiù^RæNE åöS¬\Å÷¥(yceÏ|AAéDäiIÒÅ&qóiWU¸KÔs·P¶Òã+1sÇÁº00í²ó½ª¢ù`«ó£ðUz\_ä¤\_>YZºÖ¤©íÝNbRµÞ̽á×ÕÅjt%®5| [[®tU²Ê³¾nLÄ;¾7>)~^&QË7ûÀ|
<Êl%ÞoÛNSÒÊåvrù¹ÌKË"! ÊrcÒü ß[¤.ùo b÷é�àKiÏÿÀ¥áÆy¶ú¡Ä?O endstream endobj 12 0 obj <>stream hÞ222R0P°±Ñ²P02±ìì� �,¤1 endstream endobj 13 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC]/XObject<>>>/Rotate 0/StructParents 31/Type/Page>> endobj 14 0 obj <>stream H´WYoÜÈÎóü ¾eû&űåÄZÀ{À öaòhlgË:ì5öaÿzêlöp(i¤
6û¨®úꫯö~¬¾ùfïå³ýª«¾ýöéþ³jñü%<.öÆoV¿ªk}¹]k|õa±÷¯W]õîj±whþÛU¦k0To¶o]U2±íC\_/~Yî×MXþ¯vË×qø{]7~yIÏ3¾®CßðÇIݸÐó0x£ò´søë®êÿ~ÇV??\|\tóº¬ìlfNmLÃ0Ø£Uãchcÿ¢©LïÚÐÃ×ä«8ÀýbßuÖU«ÓÅÓÅÞÏYì½ÀÇÁËêúòf½Ø{úã3x?Ø\_üeñü úÎ4¶¶ßhïÁú¡ï+k}Û[ßÙÎãÞ3fÚSzÀ³ ¡íLå}«fZ0ò²/÷}¬Ì ÞµÉé;Zçtk}í`¯·(èH H3Ö÷UL¶5Vãþ÷F!2ËËZ~qM9¿È>ñÇø¸ÁÇÜÒ¬óº±¼î æ&<ãW8¼Bààx )ò�@2Ûþ:xÏômï«Ã}°øÀÉÆµ±¯¯²¼¨]pÈ`1ÞPÀw5CªOáúm·Ë¿¯mZ~[ÑR ¦x~y&Û~y\7> ÖðñÁwÅì ò¾©k"}ÐIçðû Ñ3ÞÑû[øIÖ&hÍ%çecÀUÎ%L\_pé):¤³hïc=?oÊF¢ãq
mÈ®¸ÀeïÙ«[> ®µI|hÚ~så¶ÿÔn?è×/?ciV ¿b·|QÛeáOº\_¾8¾ÛÈWëÒõ.q;
î&à çºFo(×
¹=ð#4äE¬Z×Ù¼4bÎkô¢Äwýøi®fÑYäïÅn Wõ nÓuË¿0=ÌàÀSÁéê®ÞraÈ�h½¿SéôlûJÇoòÍYÃkÏpÎs¢À¬h¿j>¬(>N³ðAK>ÕSÍ÷ÓK;ëG¤hM|}ÏNc+æ9ÇÁdS¿ eÓxÁ4¥Î×$|úcÔ� åeè+üÔ\_ëS åér½ø¹:=íLk}ï&£ïÜPYçAPï»!¶]ôɪ{§]µE
ÊJ'ñ¡^V ¶ R~puOúÁA¢PÈI� k&?àë%øðø°øøô!å1úõºMaS 8¤6îÃ/y¿AJ~æÐa>4ÁQVyL9ün0GÛ¹iDÌLó¢ÕWdÊÃiÕz®eëÙZÒ?za®ÎIþ5«Ô#S0\_ä ÓIhuI c Ë!¤ í÷+!:ÎdåqÍèlà\_Äe)HmàFR;Õ°½ÓkÙ&]²{ïBå:ÈÞñëI~õðÞvFhòäU&çlÅ÷Él ]àH¸ ßÁ^²ÕÙ:£�6 ú¯Jzʺ/PèM¿|ÆÚÝñ Æ`ùð2g5§ g É'ä Òf5½þ¤÷%ÒGÓÀQ óðy'´Öeù ÏT0ÜŰ5Ý|ð¥\éMCûרQÀS$Å&æ¥×Ò¾Æüè)mtZ»®8SÆÙTÎÁ;SLL¢i©b÷4p^Û³ì#AXnÄp¶KJ
èèd¹äåÈ \_ºQ¡D»Ð\w©·±÷÷.nÙ²¥³Î¨Ó ¼Ná}Ñp1^ÜË`l(îZÄmÄöÏz0ÊÎÇÑeG³Þ,Àÿ%N\XÕèÝèQǼtÌv23\°II+!óft @-¾Û¢sG÷h¬2Oûô`TÝælF2K±íh X¾ ó\¯sö'cg^Í^ûNõÖDÍïÒV]¤£¢ÎÎI+zaª(]ÖìvC³Û�¯»Î¢ÆÜöðËò\_ Ë.ïå«ÔI&õËÔév¾M°m²U3N½ßÙ´(%m¬êB(¸/gµ&§÷4 Ò:µÔËBºõL©5\¾×¥Vw½m¡7ûZâ´zcbÀ¾§ÜP00ËpFÉq"j\hÆX5º§\ܦôüÔ89gw\Ì|B^ ÛÝ !4 ¬&/Ke§7§{J KÆ&G§àtöB!ý<Ûu $:&×xj÷ÔÛpßvø3%ÜÅtzå³)¹Ûøè>µÌl0úø}tòqÖÿ ¤É>»u©Ù?»t¦ê'¾ÍWýÔåHD® ¢(\}¯Dñ)
§¸åï0üªF�³òWLxô~4VÈ.|9ÌÜY24
9¦Eil Ev q? ¨Ûº¼ \ÝGµWtyähRfÙ¯{áEкv%ì1joAÏNFK%I¨÷Ó|)¬Eú? HûQ'\jùV§ÙÚ^î/&«~¤½éNgrÔØ
ã¸[¡0Æ´ÊõÌ²Õø%¡cáÝÛäDY¡wèk:ùEºóuòE!Ñ¥×%Z÷²yø`�Y¦Ë endstream endobj 15 0 obj <>stream ÿØÿî�Adobe�d�����ÿÛ�C� $, !$4.763.22:ASF:=N>22HbINVX]^]8EfmeZlS[]YÿÀ�/C"�M�Y�K"�ÿÄ����������� ÿÄ�µ���}�!1AQa"q2¡#B±ÁRÑð$3br %&'()\456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáãäåæçèéêñòóôõö÷øùúÿÚ�C�M�Y�K��?�èEÆO§ù÷§1ïjª°q´¥½«ePôàv
lî8µ}¶ÔÞ|¤È\_ ÿ�êÍÀmÿ�|çÚ³íÅM³ä/ÏþønYwyaoöÞ¦ÉêO=OÖà×úÒöé;cÍ0Vì=y¤Ãý§s?Î<ïÔ2ìyboöÿ�¿Sûþ1P£¸y6y ±þz3Á=¿©¥�dã==($sçéGòh�J3StÚ¾çþÎôè¶$1ï}gÜÿ�tØ!wÌèwìÏíÿ�rÿ�ëÐãóÓ±p:vúRý»HsßüqJ;ÿ�vA4GJ°É½Õ>çð¹MÖmù?£"y¿&ÿ�ýe.ýÇïÿ�}ï¤ÈÈüÍãOÖ¿=OjB38¦xÍD[�ñÎO:?ûíèòÿ�ѲÜþïÓ?{ÿ�¬ø\´éröûÝ7¿ÉòS·tî{AK»z?M¹îx½ip1Éõ"7T}\_äÙó¾ÿ�?¸}G/óýÇù?àt¦ÓÍù÷Ìv'÷þý?ÊM÷ý÷JN9ç×A?:\qüÿ�ÏåI8ôçÔãÿ�ÕMç=4Jùþïüõ:?ü´ûèøêgW¯ñÿ�û¡1'ò?ð|ïüo³ÿ�ب$'g·¯Ò |cQz:
ºUØ Î»ëUÝÎìúzÔåßÉÞü'Ïþå2&
~v}ÿ��û=W[ÌûÑ¿þßþ?S4H ÿ�¾?¬ç=yþ¢§×¿¶úÔ¸¨ÃFGZ1$du«"Rß|oùÓîÜ¥@¯³þ�îKbª?yÿ�{ýõßþÞÿ�îTÖåÍÇÿ�søï ãôN^Ã?OÊÚëL-ót¤dº·÷ÿ�ßÙInöÿ�ÏÏJä5ºBPß"îÿ�}Ïûy[¾¿ò}ôûô§sÏ=zLP:P»ã]ÄqëH²}õ\_î|ßçýʶ·-ü?Îÿ�z\
" üïÿ�·þÝEm¾TGÿ�?#ýÊW¼ó20Ï¥WxñL/¡k¢/lÔháÔñÓ4\_õîÀØ«nØïD?Îíüt³ã~Íþ×ܨF·-ü?çûõRMD¤¾^#Üßuô\·u -çIo^B{zãüþ^2¿çô©Ë¡.ðϬÆC(xÍi}ÿ�Æ~d÷ê'kLêÿ�&ýíüqë:MZ% Ó Úß6Ei¬[λ£Àù²ZµÅWcÜãÞ«4§§OZ
¦lUdòb[>lÖÐ$o¾>åEw&fþ?ø³eÔ-½ýÚ¦næhoÝþ««ÍÁÍY×sVZ] ]õ2ËçtÔL×øÛ¹üÄ´¤q6¸e¦í-³ÍËïwÿ�¾?û æ¼-Ëñýßÿ�V
¬áT¾ÆÊ7Þ§JÀô9 J1Ô~U >¢¬ Ôgó¨¾Ì0:ã´Õ|¦FÄ\_##¿þ9IBñ¨f;«À¨Ñ|ëþKxhäD¥çÒàüi~Zm.w7qZB2ÝMK+J~x\_z'ûõ^Û{ýé7ïÞê]Ïç'Ë÷þ}¶ø8ùÿ�
¿ÛJ<)OZ·µ?bß)äu¨sOÜù}¿"?ñ§þÿ�Ñ»tß:nttø3wîçûßÿ�ÿ�ì\% vùÿ�Ü«#¿ËÆ3ü¹ÿ�?ýzAíIϵ�qUÁéOÏJ±?¸}ÿ�ýçÿ�?ý:6Gûóìtþ &¹¾/î#ÿ�~õ;þcÓÏNLôïIο8éAäR¶^>ÏI3þëäO÷7ýÏãªí®ý÷ßϳî|écG\_îRµÇïrdoùßþòUjN¢¤�{R~Fü{ÿ�¿ýÍ4[!¿ø?ÏüTÆ÷þ=úú±¾HÉDùöJª}¨ÛVc''º×§ó¨E±�`së]ãø¹\ 1¿bìø?àtÿ�øôDùÈü]�«;üû>çþ9K$Êèÿ�îèuÇ~~EOï¾ÊmØ}ϸøåGÄoçÓb%8c=hïA4¤$c`T`�0zTpD»ÈÛ2þÆúYT¼»ÿ�ÿ�Øÿ�r¢IeùçþçðSãgOþþåX¤£#·Ë8'·òïPñSqíS¢§üfÿ�¹à£Í
¾Dþ?ãþÉ-Çü±ÿ�Ð?¢9ê?¯ÿ�ZCAELà1ê\ÀcÔþTûÿ�gcn6Àÿ�û (æ:Cü{Å"§Ê:tÏJqãÔa#'¾XÇ?Rx¨ÕÑÏj´°éL³CöJyK"'à\Ô©!ì|o÷¤± öþúD¿'à\\_-|¯?ÛwýÝQõÅ�jÈ^¸wúS=AüÍH8'òÁnN~uªzbB¿ðøGn¯4ßî©mã䨸ÿ�Ü«/JE÷Sÿ�Cz¬ <¯<íÅ!L6UOæ\Ñãÿ�ïMÁÏÝÜ}>§68íA\ cíUU'LBûþú±òT,o2}¶|'û{Ò¤gDOàÿ�ì?Ûªùdá<çþçû)¹©=?¥?\Ø{v£#Øý?EKøé"}÷îìo~ë7¿ûôø¾VÙ=>Gûßÿ�®ú@ý£JÆ?ÏZ²Tö{çAUzzzT¾iÇoJ6c·ãKN÷þÿ�ÿ�gDE>ÌCüû&ús«?ÜûÜxô:c$6?Ï÷?¹ýÊh=ûúPxÏ´që¦iÍ·Qé×`É Æ)ñL §úÏîQ+ìý¿ãÙýú~Ïùé³î}Íõ,ïì?sï§÷>ÿ�ÉM=À÷äJL}ú{PÏ·zVì?Ã×Ö×$o%úT²~òã~ÿ�ûyüügçûìSbGI¾¹üøå>vOÝ¦Ãø÷ÿ�¿@8ê0Nh#üúô£vxïÎ=hêõééÿ�Ö£8¥pqÏÖ
Ò]}÷ÒÈÉqÏûëóýÊh¹ÞþWñüû?¿ütö\èéýÿ�¹ýÏþ`\_n:õ¥ g=:qøu¦õ?Ï>ôïÓÚôïH1éÐÓ<®ùOýïýúbùÛÿ�ÜØð¿P7ï.?¿ü.¯³Ï²¬÷Óîq\Q1ÇZN{QjÁ<ôïPö=1´É|ÿ�Wÿ�ýÊtûÑöoÝ÷>ÿ�÷)$åùät¦mEoçùwïûôϲ0=éV+¾k/�f¨ËvÙÁã¯ùéQÆÞh9$ñëZr±« Ò²nþ6ûø÷ÏIå²§#çmÛ·ýݻ֫vÜ·ø¾ëT/w¶,,¨¿ð%ûÌß÷ÍX¤öü+.t;óÎ:`t¦¦4p3ÏSU®vã»hÖºU¿yå¨aß¿çK«HÖñü¾gßm»wv¹JKv¢BJä>æHûê¯\^H×3ïfÜ¿wæÿ�Ù¶Õ{û»H¤6y ¨Øyû«Ó=¾jHüOôªOßÒùüäѼ7�ñÛ4ÞUYxºÿ�Ö|¶÷Û>y%�)N}«8[ݳ6Ð�NHQyi®Ó))á½QzÒ,ËpJöØrÝ3þ°¦Ù k$çV6qÅW
�Æ(ÆM¤.7Óìþõ##x^çùÔTÜdy³ É;NÑÇLçñ®Þ,§$2y27ÊßÃ÷k5�13��ê;TÑ¥ÄÊÀ¶¶?N¼TñEV©Ð3VCÔPɶ7+(>¼V«ÄùWæù~mßíRÇ 3ÒuU¿½òÕ{u»O·Ìßu[æ«vólýÛynýË»åÝH¥[SÛ¥RNH«)V#s³Qµ©'§lÓá\Ïó|»vÿ�À·UûuW]¹ÿ�>z ¨Ïj¿Ê¿woùþõhÁUv¹ÛþîïýÊm8KÖ®õ>ºÕRÙ#>µmÅ$
Ò«nÍDÝ}ÿ�ïºs:nß±?øºHB/Ù¾oîßu>ñëI¿£òª4dÔ Ø$ +¢Ü«`ÿ�}ÿ�Û¤ÝÜãåÿ�Ç?ïºyTH¾öôþ?ûipå
ÿ�ø¿ïuìR´òH<Í7wÿ�þ"©´(áövþ/øOizÿ�úé;æsÔcñÇÖ«)úQùÓ<ÝÍòuþ«\QÕÿ�Üþÿ�÷?àuSzùÛÕþÿ�ýñòSöµÏOgûÿ�÷Å3
¼æ£!x#õ©à{óO×ÿ�ûE òÿ�"oÿ�Ç6U9ü¯Þ¼ß?ÜÝþýG»tI¿çtãw£§SKõÅ.ܽ (J|?u6ý÷J
7~ï÷Þ¥;Rc¿ïì«2äù'ý÷ýúIdÞ¸¢¡WÏÖyéíQ¾\äjÓ$§~w¨Çsø(©¯oø¨÷jFÞ~´à1ýìãëÆ)#ÿ�Vî/cüè\mSì\Êãjý\ýÿ�ľÕÓÉÏÿ� 8¶GòÉþÿ�ɲaÿ� èÿ�Wÿ�B?ð>ÿ�ûîÀëÇ~Ç¥ëî)Ùã¯N¢úúôÒN;óO ssUgçïÇü÷)Óòó¿åÿ�Xa¤}ÿ�¹÷Ò¡û}ÿ�oö¥uÇBLgéA9ãÜß(b½>¿þº068·Óô\mñ¯Éÿ�|=,ñ:}Ç
>æÍÿ�îSrÈ8ÑøþDJYõióÿ�ÿ�Û¦ðp<RäããIúÿ�78g×vp¼p:ñ×½1 ÷Å;}þµZÜÉÝGùeN£åùßäÙ÷Ý¿ßÿ�ê¶ï±fþÏòT»Åòåïüøê<`ã\_θÈü?úÔaϧ½!Ç'<ð8 =iàeNé1²m»áþÿ�ý÷KvûC¢¹ÿ�ØQ ççOàÿ�nü-ÝçùzQßÞôÇÓ?¯JnOZ ààô £�ê)³Ì;ßaßDéüsþ?÷)òù)4î;»ýúF]ÃcýÏþÎr;ò3ó ûtü©ßç ãÒ¼õéù5Fu¸Oã;Ó~Ïöÿ�ñúhY&;~çÜÿ�¾´6lÿ�ÇÓɨäÓþøª¸¥ëI@æ¸'8§´EA2ïFòvìJçù7íþ÷û¿çïÔsNÏ+¯ñº¾R¦4¿#|Èÿ�Åþþú]{Q½WDÌBúÖt²þ
)òBäôëÒ¬"ÜÈ9Å9ûDß·øicß¹û#lÿ�ìèÀò÷ìûÿ�&Ñÿ�ìV}æ¡äÄÿ�Û·å«8·dÝj ÊGzs}¹8À¬+Ë9Nìy#'µR¾ÕÚ/Ý«a}¾µNuTÏ'.rIzþoQ¾¦r 3ü?Ãÿ�®RïÄÆ9Ú;aó�ON ¯ÑEgjÚ±¸ûH$dç¹öúW:î[ÛúÖÔ¨6ãÔãÞ 7Fà}kÅ÷³ç5§ Ê7Fn¿JÍõçl#}1@Ù°Òö5·q¯Ï$¼×sNIÏ$÷ϽR}BIn$s×µgÕݰ3ÛþïZ¤-÷zý\XFÒqó1ÉÏ¥F]èÅY·SÕ·Ê£æ,}qÒÎ`,ìÇÔAS¹a\ò0@Èõö©#!ÈKÉ,z.sÛÖ ÈFF(ã¿>Çü\å6 ?ÏjG
ç58O ôíëNå31# ¬ ÷TÒ¥ ÊFÄ`O÷§%¡[qFÉ>Ý3Í][}ÖûbíÁà~CëNO8ñ ãy÷ïR 6I[¦Ä \/>¸ïøÒ,¥H2?\dw2<¥D cý\¾1XÏ2Î9SÕÝ<30�ã%HÉüj5Q;\ ÉÇ&ó�2àç3ýÑRZêw3ÝlKÊä rqÔÖªË 2«.îÿ�u~ë|ÔÄÔË)úbo=êÌv¹^«ñò¤ôö¤Xä,ÑÈõËîEv´qþ½WÑ·Ë"ù{¿U~\_üzªLÞP]£eùïm{!æ@1ß»ó7Ým»j³µ &¦©ªì}ªI$Xº¸ô¥xÒ\0ÊñÛüúS%³É\MµcûÒ\«nÿ�e«9%ºHËóÆß0ó>÷ü ªüólcû±®Õf\_nÝ¿íV5íä å]ÛW¦íß.ÚéOT¼Æ=ÿ�JQ78?Gàã,ËÛ$U)>2μã$dUøîåò÷¯ÍòîÚ¿ÝZ
u d/ÊÕ·÷M 1Cã¨SïV ×&IV)À$~?´[ºU0ãj@üu©áÎ8¨&\Üþµ$$ G¾Oáÿ�?íSàD\»öïßX)z7Àú±åü»¿»ü?û5[;Jî24[vYAó Õª©÷ªÊR«�©§`Äãÿ�oÆ+ìÔ¤/wù?Ùÿ�b¨¥Äo+ÅåÈ~öäfÛ÷~í[î"}ÄþýF4ÿ�¥7µZäzÕt9È8æ~Ï#Dëó"sýºuß\'?í¿÷÷ÕRß#»õtþ ³ n?ßù¾ûî¦4§§j(4ª¸ù¹æ9ªÓ£?Ïþ}ÏöêÙgûålþOãß¿ýº|sæH¿?¿½({oOöÿ�«�ãùÒÓ4îßÒ8j¹. ¤==ª¼ ³ø>tùÿ�àûÞ7Õ¯bOþS$b¬ÿ�~«c;P)ǧò©»q@ÊW¹ÿ�oûÿ�ð:fôKgÞvè{>Jr¾Ï!ßûÿ�#ÔÌë÷;¦ÿ�¹³î%W¢ü5#uàôzñÛ}ßwßùþçûõ ³Åò'Ïóÿ�YÓÎûû6|õ\_äi~ü\_'ßßÿ��«ts@ô'ãG~{UQÛ<vÏZ|§\:|7ÿ�ãý
;oû;ÿ�s䦯î×c6Ì'ËýýèKtÞÿ�wcÿ�søßïÒ1éE.8¢)¤óÖ#~éûSÏ�~6{ýú\êgË^øñô§ÿ�åzÓ-sò×±þqÐtÿ�õSÃmPOqWA'¨d[ì¸ùöD»þOhê§î#ùæwþýQ± ýlò±"ýÿ�àvøå?í æC±>çÿ�±R^¾çi<üàÆ}AÏ¡ô3ïÅ.ìûA}Þ·&Ìïûçªsüüõ¿ß?çØÿ�¨`to÷?Û¢'ØçÉßþßÉHFGÿ�ªíéþE('=yûsëïJ8\N?) ç¥5W'=)¦Çóÿ�Ø¢%þþçýÄßçOûóÿ�ýºØ!?ì|ð4JnÃè?úƾ¤úéÇ{uúAǸ=?Z6À 0½Wû#¸?$?ýÔóÍtÿ�öêÄ:|çÿ�qê(¶%Ë·ßGûøý1Ï<};tªÄ\´ÝöþµXi##9'¨¦¹Py#¯#l÷ ÿ�sø>å64ÿ�Fùúlþ Ñ-<´þçþÏBÞ~ù÷ýÇzÝ:Lägv÷ëGoÓÛÜõlu¥-¦]Ý>Oõìüôß7|[ÿ�u³ø?ÛûôÃÄNþ&ÏàÙUÎÍñ û{ø>JLÒ)ÎÜ1M-Ç56üÏJÒü§äûüÔr·þ¹U÷aÿ�é»Ó¤ï3fÁ'`ÅhOµJR2O^½jmÜV`bà`Zµ¹Zbà`°Ç'ß0¶Ç¿.2ÝFMO#¨@û«g¯QYVIàç£sïíV« ï\côÈÊ nG`4ø¦òÁÀÅ,ndïI,=èA(ýÛAõíI Tù¢bTÔ~5]æßç³Ü²ç{Õ¡xÜ)ÁñPØ
ÚNp=i$²ò=yèúúµ ù#5©mHÍbd=¸©ÒðÇÓµJ$ó1åõgë}¨@#dµ±§ÜyÐF®{ ÿ�{øk^xmA"ǵZ<ýåf®Edd ò
s×
kÛj{s¹wc黿Qþøª·{0¨÷¬ïµl'§:i ¤Óc³õéI3/;ÅA/M¾?w\Þ¥u )U
üÎ$/Ëþísó\E¶É\¯>é,Øçñ«s\_µþ±&ÝÁô¬éE&XÔ°ùTÇÒ©y»\ÎïP\Ôo¯ÓDJzOL°ªåz÷÷ª\ñn$=�äT- }ÌçrúH¬i.XJ7`d vç?YYKÇ¿ïe<úçÿ�×VÍjvÊRÈÏz{I`RñmXå{A§@Á¸íÚ¦fµE õeÛýß¼«Z\Ùã$ésTûj\_~~zIîÿ�ØûéRqéE.i8ëC¶îAïëM5fqÎÿ�¸éóÕgÿ¿ýºÏO;öqþçߦO±Oþÿ�ðþ.zÓp}éyi¸ Ó¹É#"Pþoî¿ï ÊMÃ~6}Ïö)æ/î|>Oûîìg÷?ñÍ´RRÒãåæ®Z7¶ôþú=««#¯÷þMµ9Dÿ�öþÿ�ñÒÌÎ?ðÀ)OðÒw4 o!>´Ü÷¨%Ödþ #ß4g¿ï¿øÑ+~÷îÿ�sæÿ�ce5Õc¿þ9ÿ�ìRÑQñ\»)ÏÊ2\Ó1Îä}zT̾J
6·ý÷EC8>Oäÿ�fØ^#gþ~´¤yì)FÑôýÇiôçúñHlT«÷FzV½£Flî{~ÿ�«,ß?%©Ø25½¼cî¼Pÿ�!V<×û4Üùÿ�ö£üqÇ/Þÿ�ëúR69ì=è×üÿ�ú©¹ÁÇnô àã·zgOgÉò?ß©·ý§zqÿ�þåW¸dI>ÿ�ð#ìÿ�n
g÷ÿ�?þÅ+ |ój9#×�þç4n=3õçéMç~3 ÈÎ .FI©n"Øñºýýÿ�>Ïö(]ïÝó|Üÿ�;éhrQwÿ�¿ùÿ�rsù¢=þtÆûéÍÆsÆ~½qÿ�פÝǽ O~qÓ§7±<ZBÄ1ÇJirÆ}©nY~ð¿ûÿ�gÿ�gNûgîÛûÿ�ìT7lùùþwO¹ßªê¸G?üGߦ9é×5VO¼ ²{UwïøS¡c¸QRHä¤òrJ¶n7ÍÓ.ÿ�ãÛÿ� Q3þèÿ�WéUÛ÷~\_Ïÿ�í£ÒÛ¶øû±?ß«¸äsK»ÔJ«¿Þ\_ùïÞacßóÉíùÓR}ûnÿ�¾?$þ6s~ÿ�àÿ�ì\8èÓwÜØ{gñ¥YØÈÏæyߟÿ�o©Ëg?V²zÓóß8RVêqÒÉ·Í?ÎûEÛ1 ?\j@á¿¿çÿ�~¡¹É s·æûÉ÷êÎÕRÿ�û3ÖF¤JFîëµ@Ý»åoåÝóU{©r=9¬K¬0,ÄÍ\ÃóY×2)Ù÷¬k©x9ÆA´Ù¦6HÇ8\ÿ�+T¹E}ûaQ?ÅþïÝ®bí̤¹ /��éWne÷ª°/îAq£9>õm1«;Óbçk¥EÁd~§9ÏÒ$ðMlÍò(89ÈôËX¼Ö9`¨:±« 'ËåÆ`¼`~g4É1uõ¥ OúÒ
Ú8Å#1\±SÙ@;J2YÁOJp¡õ9É#iR'<��#¨ëUnÀëÉ=òywN]x<: "p ã§BHF\ÏöUìO¯ZÔWÞ2sVRË MFmDÄm`«ÐäÐmvQ^ÜÕì,
8do,í8>µ$ Î I"qÏÒ§d¹ÅH$à¶HÇZÓHÑîÃdã©ö¦Ím0´uEVç9ïV~ú)\ÆVÞßÏw³ø·}Þ?©@V0ÍOdÓá(Ìj É©'�RF®UF��¡ÁILrP08ëÞ±¬¯ Ó¢òc>lÇÆnäñSÜHDlVåÉÆ}x©äÑÙ#kK$lçëSÝX-íÈÞûúûêª
ç a·ç\zOçK'ÎpGÿ�^£ùD«Î?Y®£"2P çÖøuhÕäß:uö§ÜÛ媷3þ½Óýª©æ3;2ÇAÎ=éÃq¯§¥L9ªI-ÑãÞ¤î8'éQ¹ Týî;S2±R²¼c$E¼c`Ç=:ÔÄ©KN ;©qÒ;\ahÔÆ9�õé¿Ú C#êðçµJq©ÐñUóNµaWÒ¤óOZj #Xöõ«+ <;pxàïWákìY7nÿ�í¬d Ë&ÞQ°ÙééW£\A·ü¥ß4'AS!Å@{ÕÀùèzR<;pxÇ~õ£lYmËuWwÍ»åÿ�{þNYU¤oáeo»ü\_úAÅ¢Ë,«ÿ�6Úµ²7ïHòýÖÿ�ÙjæìóR£p=U}\Lôõö©aæëÞ �Wæëß½ÒÜöïOx£ù:léþvUx ¶±ÿ�ÏHºÿ�ß?ìÔ¾~62}Ï÷7sÿ�g¥ÅQÍ8ôg!{äTJ@ïyù-Õzÿ�ØU§ey\_ïÿ�ð|?ÏQ Îåbçäùé³Héóô}ý¿M÷ u§}ïy£!õÎ)r ®ÿ�ý7ÿ�ß^}Çoö>MnØ÷ÿ�þ�õ,í+@ç÷©òlßþåZ&8ëGj¨xäÓgGe;î'ϱ?¹I±¼çîT)Wþçßù÷ÿ�·FïÝ}ïóòRsíKÏéGÖPqsøR.ȾLÿ�¿þÝJÿ�åÿ�?%#ïgýê¶ÿ��§lþ?ùgÿ�ÙÕ~xRÿ�èTU§ÔÓ?WBdÙªn¢§pû¿à?5¤äãÛÖ9ãÛ¡¦ ù1p§CùÖzpÑOº¼vüê{Óì0íù1ÿ�÷À«£¸ÙþÆÏüqê½°Åû®QbÙù =»1±ÿ�ïºkÄàZjc8Ï#óëN<öú|Òm})§ïS;óÖ¡ºc¾Äÿ�Ùê½¾Æfÿ�?ï¿¿V';ÿ�ýôÿ�o}Eåe·ÿ�rAÇ8Î:Ñ÷íAÁúP:pzqúTê3QºL©µÚû>ý?c¤»ÿ�}Ê'Ù4\|ÿ�ìDߺÌ.>Oÿ�¦x<})ê:Þ½x÷¦Ð¼¥R3»
,ðØèûÿ�ثȩæ;·Éýÿ�¿ò·U¢ßò'û}\i?ÕîS ¤ïÚu¤8Ï"¥=IÁ§\\û#Ô{6}çÿ�ûôïÍÿ�(û=F]ö|¯¿øÓ~Ï<ÒG#Cþ}é�$úJZ@@çE8ç´Cæä6Ïûÿ�çûSÄ6å×åÙ÷àû=T·O¹¾GþçÏþÇÉþýI¸½ïlÿ�sîSQø 1ÇÐ+>õcïSÇòç£xß?ZI#[Ö®<wê})Ä BEMßù~Uþ÷ÿ�Y:Öõª·Þ;Jÿ�µÿ�}V¼ßèØUË$¿ï7ÿ�XzÜÌd[\_¼ª¿çûµu/ËÛK£;ppHëüëF�&fÏÎ)¶öäv" ääp zU #Y$ù¾ê8ôÿ�9®>îUÊ˾[ðª\
µréA½ûpØü³N··uRûAè¸ëóÍ<�QT`S£^3)çùGË| ¬aSÎ8§!ß ;xU §°0£B HÇ^iöôr¡GBhWË'hÆXöã§ó¨æ/!X>¯¹';qÅOl ¨Çµ9#Þ§Tàc8°f=i#XËÈÈè9ïDdSiÛý?¹iÇÊß ¸#§ùÕkò\¿8è:d óZVÊcÚ9ÛñÏOJ¬ÈïW&ɺ¹ y<Ó¤AÌx¤¸;ÏÀ;Öuݦ Ç yÙßíT|¥ks|ØnÝä@NTàýy®fîäUYºçÓ¿Ö¬%Á§ÕIcVd0 @Á'?¦Dl =Hºÿ�UWíPí¯©vöäôé ѲtÏn´è¡@Á ¶í+%¹]ÿ¥FÑ>ôT¸Ç9'#¦0Ã^û[³J(b)ã1/Ì8êyèmüÇéøÖágǯ¶ãràW<ì (9¯d¨Ï\V³`Ód¹5< ³õ-Û«a¨Í=¡òÐËzxýk«Óå;
¥Ë£}ï½»þù®!d`Nþ8g©íÚº1£I(åb9<æ¯2~]Ö×ÜZ²ø+ܲdsQ Ëÿ�
tëï¶¯ÝØÛ«7Qt®´7ßN¬»¿Ù©¨T³nÃ7Þ¬öÔ£Á¨¹ÏãÖ° «É'äZ+Z´ #ëÞ£û7aëÊò>@ù\w&öd5Û#
oîmùNïîÖ}Õ´\m´¶
8$=WÖ¥`'~x=ñ[Ö£í6ànO½òÿ�ß\_wÿ�ªOp)¾^vÕ¢¸ëÖÖÚáy©©ùRvõm3˳ü ®ßáÇÞÝUÎä¿yü«¤×lÞ[|¬Ûv²ÿ�´¿ïS/bºßyÿ�ù¿Úª.wd`úÔQɱ²:J½wkjà8#êEUTòÉàr Fê% pWÊÏq÷kå\R»\_;ºHä6s¬ÌNI\AãZÒ¾Ódwcïq·oþ
UãO³¼ A ]×?ì¯=ûÕC@éþ4g·» §½)»ðªJóÚ· (m2í.ïø mÿ�©ª#\_½ü5^ÔH|Õ÷&åPÿ�tü«óS%c;+ ¿.éøïªZ¬£þu×ZÓð¨ ãýjÚ4nå´ÏÊßþÕXËå¶|ìûk;Vf!Ãß\ÛàU©o2¸Ü<¿áû¿ÞùÚ« ÔTÖ£N¢\Ô\H<ûRÜ>þµ©nß¼)øÓÎôöüÿ�~eûñ|ÿ�üEH×ïÿ�sÿ�gÿ�nø>¥ãÞµHÊF{`sU #µWÛû¤¹³øê/7l[?Øùêy÷'ûhÿ�sÿ�·UåO\ßÿ�ùþæúNKÇZfüÝÛ¥IòùHßîoþý7ïyjßsäÙóÕIy{¾ïû?îS£aMßüM%)Îi¼{ÒÓÇ'¡§Y?.Ïåþç÷\ozoû¡þDûðÿ�r¤ýò|ëü÷)´Pïû´¹Vää¥ä
LiËrÔTqOqÁü¡óÿ�ötV²gË^zõÅ(Î>´Ô'`ÇaÛÞç#¡Dt¦Ú=jYu¿Í÷¢]Ïþø§zÃÞ ²gû;~o.%ûíV·ýÍß>ôûKïÖ«Ì9Z³/j´½¿O:!ê9¦J9bzÕi¶L¿þ²D\ìþ=ûÿ�ÏÏSºí÷þó`¨åùáÿ�q7§ûôëÚ´wÇáÅööÏéPôô¨Cò¸óì¥bL³ýÿ�ïÒ1&Øÿ�î|C.>}¸þ¦QEé\` <~4îò;Þ}ú]û¾Mÿ�:PÛ>}ÿ�sïü%HûÝÿ�ì¿H{UwïøU5ZN¦¥·]ÎqC.p\6ùü¿þþÝ4& Þß2.ß5?ÛJ¿ÞtMÿ�²UxþDfþ?ïüÿ�ïÔ¸t'ð?I ÷¤h=ë5¼7¿Üjµ/+þÇÝo¿÷^ûpêÿ�°Jä|íµ6lû=@Ý V~¥YaÁòÝ�¢åráSÚ¦èc¿ZI·yLÛ¶íù¿ÕVV¥G]Ñ!ÚY6~UZײÿ�ο{ý¯ïnªëûÈw\+mÿ�ÐUÚª?±ïvà¬H sTª°1ÔôI
î?çó®UìÐÞ¹m¸;@þt8E!óÔ+Iʪ<0mÇþù¬ûf'LnãÎ
)TñÛàç+Z°Ò¤HsqEV`¹@=\·G´TìNzqÏn\å¥ir¬Ñb°©£5@àôÅkF#DF,ì°çæeªI«°Ç´Ö8¡%éVT? Å ñÉnFC¹Îk-b,ÌØAÛ=±þ§kyJûølÿ�ß\_ú 6y¡ò7E6ï ¿ï|´û]n¹ûÍ?ïªÊ¾oãÞ¹»Hb`IçÖ·õ\¼}îk¹9nýNO~¿áYícÒ«ÞHd-Ðÿ�Jæu×!øÛÊ�ãµÌÍnë?rÏÎI9ÏqjÁ48eÚÄpIõ§¬ê2CçºNõKóIXr]y'îÕ&#gn}(¢\غĻàúô¤2?'ÊHÇ^NjöïùE3íNeùFhÍQZqÜ¢71qÓñÃr2»sóÚ°sÆ &p@Þ@iÙêèHTð\Ú¤mNV�y\LU3OZé£sÒ´\ æfà ¶sÓØVNvòMmÚMæFK¦\òɺRÎyÇH¯å�1íÞ·b¹+?.æä½kFÚÀÕäºo+3ñ«pÅTk
ÝU7á×®1##�Bé&T+ß<9�<î<õ¨/¼É àîÁõíYßlROÝ?x~µQ¥%ïÏ÷õ®U[viZJìOÌ:÷=+©³æÿ�<Ô÷$ÖMüàV±'õj<²q¸ôÍCqIÔ¶70õ¯B³¸7fù¿Õÿ�³S¼kGr}Ïåÿ�ÇwÖFcC»ïqöZ¶LS§ÙäûÛ~ó}Ú¯sKV1�<Jcûµ\_`.TX B¥3øªrÚ$÷¿Eÿ�SMNroïµ¶ßÛ;ï[tÙ±¿»·}MfÊ®ÇæVû¿Å÷«=FH?NhàÀVÝÆ»0ãñük{RÏé'¶C Ê÷£óæÊg?sú
«Ø)r¿»ue\mm»~îÖ¨"¹îdµºDÞÊÛO÷«°6ÑÝ[¼YýÓýÍþ¹OA6ò´¨Òcæo»»ï-REÞ|(¥uéUØÐ`úÒÌEÓ»OR ò+'Q·
fò×~6×ÿ�Ð~jmÝßÄ¿/ðµGZF຾0;w55 ù]£}ì \_
ðÿ�Z´dç×t«±Vѳn85Í×AÎkzlm~ÿ�AÎÒ;?Øÿ�¾ëN½¹ÊíÚÝGÊßv¯ÛSìµ`ñMÿ�j¹=ÅX9`xÍTÝW.Û ï¨®cùwMî¹Uÿ�
ý¬J¿ºùÏܤ=¨nÔ½½¨ÁénÞAÎ(ÅWeݳªCýÏþ"¿,ªÿ�sÜ©Ý6Cò¿Ïÿ�íÓÿ�å·ÛRS¿ oª?»/Üß³øýÏý¥zlÝÿ�ßþýF¯æËµL[?¶ÿ�r¹ÿ�¾>ÿ�ÉHvÑJ>íON)ÞXnN\ bG¡ûÄnÿ�Ð(«1ß)gîìÿ�bÔÒWש>¼Óc·�Ë¥?¶=sý\¼|F¥jF3àV=í^|¥ÿ�Ñb¯H¢ù>qwþøßTtÈÅð.'Oû÷÷\þ26þÉQ7qÆ={ÑÔã¾?<ç¸4íÞzÔÁúñU®?å¢þçg÷ÿ�D'ñìÿ�Ðè yÇï£ÓAÿ�Iÿ�ÕìO¸õ:véA?§éN zw÷¡ä§\_¡òÜóÖ®¦Û÷êFhÆÍsä¢UæØîã4Xv8ýçñï¦NÃíÿ�ßÙ÷ÿ�ลÁ<qÏåÿ�ê ãéý ½»ZxÇ<ñU��pj¤\_8ù\VYGÈz'Ïÿ�|ûJMwO¹ÿ��zRßèÿ�+|Áòßtv=ùéJ=¹>¢ÈÏLRãÎqϵ/Aj>qnû¾DþæÏý¥FØ»çï§÷)"ExÙÏßÇÜòj7\Þÿ�÷ßߦÉB{þ5Äzk];w¨ä×1Eçµ]1$ãð¡"/\_ïýÿ�à¢U\}Ï¿½þÞíÔÖÖ\_¼¿Ä¿ü]U¸ºòfl\ÿ�ûÔ÷ Uä§Z¢×Ø'ð\_í®Xð@÷¢[¨ÁÛÇ=ª¬±~ïyrIÎÚó$´nÛýß½ónÛÿ�¡UKÕ-'÷¿w·oñmùk÷ÄQ ¸Tg9þsü?Þ¬S^<w: `öúUûÉ`7dªÉµRIrÌO�~4ûv,ÅÀª1L1À9'§ L«w¹AË?�á÷«Ú«r?xÜíöùÒÃ)A¹ Û$ò>¦°þÔëtn$vÝI-×·jÎFá§¢rG¨ìk3ç¾j3ÍWG$dÕ
æ®BáXþTæÛ3 ½;u®®Bc©þë|ßwvïá©áx®Üÿ�÷ùk+×s³ò==ºV£»«³iÝÎ=
"K¯q&I« W¸¥b¿9qÅJO>V�¼µ5ÌÀ¿Ìë³oÝZ§{p!DQÁußlÕíüæm¼à6 ×üþ5[R÷\z»yìúV=ûdqXW�¸}ÐpF=MhêNB c<õúV\ìOãÎyõ¬}@á=jÙÚÒ×)ª¾é½N2Or}k6^çpcªÕ}ß6p>¨õ4ã4VÊÉÆ+>Lõ<÷¢(¥'4QTdçÚ¢Á'h¢( QÍèÃÆr? xàç¥QEK \O\}
ÚN0:{qùU \»{u[¶áÛ'³øêù¿y÷¿ÝûnWswý÷ýÊa§§§3aê Øü)OÈSÿ�w¨×ýb:·Èwg÷Òmÿ�'ñ§ð½V¶üË÷aÙSï´oæ ¥ª[ô«o§XÚ¿{ÿ�¦þr.è¾Eû¯þÅWûSüÿ�7Ëóÿ�ãô½7·ð}Ý¿ìÔx>T¸úQRþðú` wqô5"yÌ ~WËÃnO»ECp=ÉòÑZ?v§¶8ü)ç¨õ'§×ñö¨Ðê@#éKm<O¥\° >¡ £è:WIjÉýlË÷|¨ÿ�pTÒb9Óþz;ýß÷ÿ�àìU[PYÛþ±¢WAþÆM¸ùp7ßt¹þå:pOùïG;wcJØ xÀôöÉ tõööÍäö¤Ç={áþLçäGÞÿ�çøêM¯%¸@Iÿ�éÒ:¤òoP©»þÆ÷¡6y\_ßÜÿ�c}FrsüñF>\g>ÞÔAÏ ëAÏ�ý:úg=zSxíMdwß¿øþ¡hwZlß¿ýÿ�:Fãbaÿ�¸~ tTVÿ�sïÿ�}é9çØ v¤ÈÙÏz\Ol ö£·¯ÖÓ¥3wæ«ìïu<"&Ïà§HÉä>ïãûð Q+íyüz£o0)ÿ�oýúzqúR´`�ùCÚx\TÝ[ª¤?Øù?Ï÷éÏþ÷Ï÷?ào²¤\ã?þÏP·úÏÿ�ogÉ÷\çҲ¥?6Ovv,¿fÌÜÓ]¹#8·M9ç½½j+Ùc¶µbßîn®bY®dYeaQþ{nÇËZÚ¼¬JûªWrçus×Óãh2ãO+6ªò³�õ5;OCô¨ÎÇçªû¥Ý´{UY7 (hè�úÓe¸HVá(誣?:Ë»¸EÚûÄcµ]F÷?+î!xZdhöê\TÆOß9'·ý;Ö´²j«éÁß-òç+<ÛLt?çÉÞÆ(¾v' ?×ñ¬É|6Kõ¨AÏnµÅVMÑ¡`Aêzð¨)Û`[nsJÚeC/"¯Äìq
¢ëÉ¥ãs�¼/ÓiEpT(§zt.BF£aÇÝî~wN' dF3OUÏ7pl UÈäýãPÚíüÈüüÿ�ã¿ìÿ�üz³ï¥ G¸ùì~¾Ø¬¤ Æ1¸äúóWî÷§?9=s?ÔS±äO¿^Õ.}ÓÀÏ'5y'ÛyÆ{~56+4
qÿ�׬¹ y%`I8 ÆÙguÆIl\¤1>Þãïq{ñTªÕìI#=iÖÍq Qß§½eì^Äu©ÊåÇOã]Lb$�S+G×"è !g»Qý0Týçñ"EAÖ±»}Õ'¿Jê`5Ü]çôÇ·øÕûg³hüÈÜ;Ü×&ÚeÀ9ô=)|ÿ�«n=¸®ØÚÔjøv'mëRýÖ8'®Ü×Ñ:õ\_ÊËsÑò¯@:dR1Ä£=±íÞ¬A¥Ç 9y?ë\D71çtL;ÔB6ÇO»ù`RµgͧFä£v85èrËq¿ØÓN3 gÇ;YpkÍÙ>òõÚô»»h?{MÀÆEaê:&1FË\éøW�jE·c&ÏN¿§øÖÚX,nIä{þ5� ç1Uã§ä\DÒíìXàø¥H¡�á¶
ï\
ôæIOòªÇ>W Ó ÿ�Ö¬
Fc?Æ®EfÊs ÀÀ8íɼÅ[[@Ç$àö¤M,òU,V
i#f?NÕ.Ò:µzy HØÖh3ÈaAh¬G-·?OY^:~=ºÖÓèyÿ�>õ'Ø8àÕ¤Ê<sRF¬<ì7^£5R¯ÔÖËèåp;\h²:þå·áëT£¹ùùàõÓh�à÷ºaWíßÒ-°ÀsV«¹3PÜìkv '}k:²«cq×§Ýøm«îZäcðõÛJW �î[®³ÃP5½Él�7»û«]�ãéÇ4§îôöæ8á ü)`¾«díBpzt"¦cÁ®Ü|¡výßæ¦¾ÝÃÿ�wýjxÜÁw,lßðçæÙ·ûßøîú:à{~µ.3ÇLñW'bÄÉÀêjô¥Ók?Ȧ«"®N3ëK,kEhÿ�ýº¡uq@Þ[|»·\Õ.c; Í÷>fûÕ¨Ý\ÆË÷w7þ=U®¤Üß-6Í@Ïõ+%Î}ë5>`îߪÿ�víä~}
s>#¹\n¸ºªÿ�À¶ÿ�»Si¶d[ĸÌù·7üïVcì7Jîù¾\_÷kzÜÄo»wÞû¿Þ¦u59éUÜüƤ�qÍ`ÀÈñ¬ps÷þ]ÿ�|Õwfûcªÿ�µþ~íZMÑyr7Ïÿ�²üµKí2AÍòÿ�woûÕbN£ë".Aæ¡.AÁ«1GûÜ~ïæþ/ý¦å×þylþîêÒOÞå|¼«ãÛ©ómv\û>Zyô¢}©i&£$ÿ�úéÒÌÍõ??ÿ�·PnMÛòÿ�wþRí}Îbo½ÿ�Øÿ�èTÆ/ïüÍPÓQIü©)HÎE?¤ò×åþÿ�ü¿Ö´¿Åÿ�©d§~ßým'Êñ"ÿ�À¾õJ(¤Ïz)ÛÅ4>Þ1úÒ[¬gÞÏËÿ�|ÑMvýØoö?ø+aA1®z9ÿ�=©À ÓMLyjz zsKÈÁ¿5N�ÈÈÇ5y8QÆx½jút;³±Q¿ðøå\P÷>DªvB!alÇäAìÏÜùÅKO-×ÿ�¦¶rO¯~Ýésí×Ô[רüóFIÎ:üª\{zMäI×øÿ�ø?.eëûû?Ø©eg;ÿ�}?ï½ôÝìûú1¹l=N=M4±ÛÉÿ�õP[åÁéßëAéíLc×+7\¢£#Ü|ï¢ÿ�}ê)®ì;þ{ÖÛ&ûdzߤ÷dzø?¢(¥õ¤ì)ǰç¨ã}¶îîû÷ýÏìï³gÜOã©{¬ÈGÎòßu [ùuç{üÿ�ߨäàzT�w©d5«"Îx¦;.52ná6ßq·ÿ�ʾrÛÿ�ÚEþçðUx¦V~÷gðøÿ�ñút· mß.w¹Uo\פ¬?É¢òeO¼qéT
Àçf²ßÉRÀ°Ï¡5=ܬ yþàåµ5¥Oåá~ígJ8^¸#ϧ\_z·«ÞÅ Ê:ci'ÿ�ZÅõO88úç©«¤±©öx¥çvHé�õ£vù@ÈÏo¥B&há+ßJÓXþ)ç'=icFEÚO$Ǿk?í\Ye½8ãüið\+nc´ ùUz#Ú¬÷§n¨sK°¨¸9«² #ÒP (欢ÿ�,ùÜ\>ñÆ?©cNòÛp1ý1Rª=O¦ñÀ¨PàÕ
º()ÑÆÀÇôiȾ8iÑYÛ°%¢OAqÎ\Ý
bP¹ùÎ�<¹ªwCq cÛ¯å[6¢XQSænFæmµÅùÕyùªKU§dÔ§å-´sÒ§zK ç>ÕY¬V)1/@ì·ñT7Eó¸«rÞnú2¼|Û~ïª.Øôò2R+dIü
©õ«Vó £;Vn§VrrqÈq¡ ÃBr }}+1/b¶5Sí Ë+ÇÖ¸× JÀç�Ö
á2 �~¦³îF.3Q« ©Á¥uÄjh ÝÔþÏ[jlø @cÅ]¶Ô\(Y8eþ.Æ´
Ôr@'¸ã>þõf+òÑX÷Q.xëê~µÖÃFsóî[
'\Õ«[&¼ÝBó�>Zt<¹85 ãCû?§zûJY£Hçcçqèzò}ù®L¶Í´gµ~ûO 2ÏÖ¹ûD£îSþ\¹sªÈÜ9ÇóëÚ®Ùb&FMù9è8¦K
w-Ã9Îå]ÞöÚÔ±Çop¶éÁ¥èyãÐÉa'É¿qé\®-Ñí1¸ Ê:3Ítø¢ÍaÞ!ã Û=iK^Ï4ôª2Nq˹ÔÄ{À`JñQÊñÛ&çäÇ54F±ù³ò�>Ù¦ÌÀ7\öéýÚ{\²î9çø¿Þ¬Oí$û!$±¾N:×5s«Ü&WåNÖï|µ ¼³\©¥Ì\363U Û´ºÔ RZJÑ1=ºÁRw×öû®©5Ë>£µ`�½
Xñ%ðàE6k7Np·v0qýj¬dmÍÖbuÜ$EÓ¶Ê¥dùp{RßNTWD�F9` Kr²M4và °Ûé6¶AÁòíë÷Ei o+næû¿Ã»ûµ\_O.ÉÎõËÿ�S^Poc½þZ7þËÿ�|ÒÉ}©« 9éI|ÀgÔÖ²F»và=yëOÇ\ùÊP�qÓ
£¸)öxÊm Fpjw¨Íç·÷¾oýmQIZ]°M&á÷¦^Áuª¥»@À6î\_îÿ�tÖßýY]²7û¿Õ2`ÔößÒ,xÆáVlSçÊsÍFêD\çOb&QÖ±Àu¾÷Ëÿ�¡Töß¹~þÖÚßúêqµS}¶ðߺÿ�z¦²Qæ¨QûþïÝ« /aÆ^j;¼¢;u§Û«ºî§£¾ÿ�Wÿ�éRH~8ç=iïÄ$: Ö!ªñýÝ¿ÅóUiÑÊß/Í·ïTÛIüÛßîUîO¿ñ7ËU%ûTÛ}jäpÕ&Ïdf¨Lp¬y9ô¥vÚ©éÓéÖ³ï¶Ä¿ßù+\ÿ�rBã¿ï/ðÖÃ'ÙSÛç¬Q®v#ó"uû¿ÄµRUÚÙéWtù¶\½ÀÏZ&({ Ê85VX¼Ø2«ò·Zɸ%ȹ~õhZ]Fð²7Þù¿ÎÚÏx×|ß+À»M
fÿ�Ë?ïÀjà´¸;}©\qó/½GÃ/¡¥]Êþÿ�ü ýêämwÝÚ¿/÷imLËο+moîÔÌþfÆ\_+k+}ßöèçÞÒ½%(ïF8ëÖ¡ ÿ�Ã÷¾ý:Mß?û;výêX¶¡Îø×oÝÛ÷~V§®Ö×oüýÒZ;4ôç'Í.ïºÊÄÔ´Êw|Ïýßö©W÷6ßürV]î?Õ|ºO¢FëMo½Mkÿ�;¾í4°Ûþßû\_ÅþÏÞ©fm±ì¿÷ÍEò´»¿ñïþ\#Ö3ÍÞÀc½,GÍ,Ëòíþ\)¾h1z0ùñÚ+aUz?JPqøSS\uÀ{{Ò©yïZK
QàWEdímGî÷K³ò¯ä¼HûöúãU¬¿u§ÛmûþR|ðOfIQ\_äwþöé2 OåM�rAì}ù õî=¹Í )Ç×)ÉǵÉÇýÈðÉ÷;ÿ�ßÄ>sÿ�Àÿ�íüô»q½)ûäÿ�cçßI?èÏäÿ�×MÇ7JqíØñ¦þÕ V�ût¨dDtçù?}W'OüsïÕ©>}ïÓ%ÙçFvTdsÚhÿ�ÉQ(Uo+î|ÿ�îS"~#ò¬ûÇË\xγ®ßæ<þÉ[ÉêiÍpã=y§ãk¾|¬µòÿ�²/ïËùUÝ\_öªû¼qÅ&>áûª¿Å÷¿¹[éJ»sµ[£ýÑþ5rà±. ÇL ϸº2I}ºÿ�õªÝÌo,¥ã ÷ªZO¼Bp Ëñx
4
¥}àç-Þ¨ÏÁÚIËɬ çinÌI\0¸T.1ßK9inêFj¸è? º¦ùÆ77=AV¢¹ÈE=jµfÃ8Û¾¢©y.ìn OôÏo Ä\ÿ�:¸³ÚƬåFIÝÏsáØtb?]ìs<ÖÍÕòG%¾c w¬äff<·\_óøR1y bKzmb\_êÍ}v¨FØÇAUg¸iÊälVÖ¡º"O ñøgË''&)ØY$ç¥pàõ¥\ylÔqHt=HBsxc8ãó¥¼ezàcó¢(®ëK?ºüFÖ4ãñô¨Éýéú×k#!Fü+EP¬·#{#Ðd}z
(Mº7$ø{uª÷³\Á8òþP¹ý ^³b@çýj©ßïÝû¾¹úõªXeà ٳÔP¬EÔÁHo\¤È&¢Ø²È¬¤ómëÛÞ#@2ãÓ®;WQ"1,n £ïÿ�ýó\Ì/ Üt�ýE\_¶¶]áL÷9þëVNkSNoα5¡§¾$>µ&ÿ�Ý\nºÕ(Q n§«nÊí¦dlíUû\_õÉ»ï¬w¼¶³
S(Íò·Þù¿àU¥¢Ïçß÷l?ýïîÖÆ@;}AÎ 2FÊ×#ô©Ë÷Gÿ�¬w¦79ôôü?#ça\õ«¤õ¶YDW2¶í¿+T7³÷¶¦åÿ�ÇjÉèü?«Ì7Ï+ýßøþ
Y:ÛçpÆ9ªÊã8"ñç?
V¯¨ÿ�õÖdKçäÕr-ÖGÇ9 öÉêçËIº"}ïáÿ�Ç«:=E~ÚÑ1ùþ÷ÌÔëéþÏ <.|ÆÄ@|¬Û¾ïñVc®É͸îVþ/¼Õgi<{T£�Òíc4Ã!#!~´¦=Ãpê8#úÖ«F.#ó ùg\_¾ïðÕxÜIûÅùY·yßõ©ð³Çx§ïµ÷·/ÿ�eNÜü«m]¿Ãòÿ�v«/Þi:ªZAÁÅN2E5·6ßsÅIWt~^ßùçS«mÝÎß½Um̬vïø ÿ�½Wmão-Ðÿ�uþfoöû]ÃÖREK\·GJlj»wÊÝ»þNUUa\_øû?-\ȤíYñ÷ñæ¥æØ»~êüÿ�.Ê9ö¤?vNo»1Jx\Þ§ÚYà?øåA4{%Ýü¾ýK³]ß4Ë÷ïúGg ü?2ÿ� IE0Ni¹\JéWoÞù×e7oEoýF¹'Êþ÷÷~÷Ý£ÏgÍ÷÷·Qö¢V<SÛà\i1~X ªß'û4S%°«/÷~j+iî×Ü×)Oݹþ´Ôÿ�V¤uÅ9OaÁíQ£pî\äN��÷ZÛ°aö oöWûÿ�'È\çì©ýÿ�þγ¬Û]³§úÏ)«óq±>Gþ �9#>üô g§·céN8~)3þµ89üéÄ�p?Zb%tßþßÏ÷)æýÏö?ÿ�¹VeØ¿É÷\ þpÿ�)¦AöõúdúÓ³Îz¾¿3ûtÏÒÇ¥Un÷¦H~Mñ?û�ù[çÿ�s{ÿ�~§ Îåùïÿ�þTäÙö>Gù7ÿ�¹QçZ`§MQªÌ2Õ¡j }i×,ÿ�3l{¦ú Y·m\_ûëýïãÕjm»ölûÿ�²RG9ù¾myþ¿òVc&åU}y'LoçU]#Öè1×>µX±xð:r@5rZ²¯Ì£îÿ�`\_¤v ïÚº§W`[?{åù¿ºßËX[Á9ËgåÜ8m¹¬À`$c'5 Gæ0ãÒ´Y'=ê"£8ôª^@èqíPVNÝkHÓÉVeÆæ$ãò¨¼3«?:×ÈÄî �yéMhÔ0V?YÒ.qÁÀɰ g'¿Õt¨.3¸éüé[KÔñ³4ð§¬ãû @õõ?j"9RÀö-ô7Ir îäqÛÿ�õÒ\
¬F;·¯Z£p§R3Óñ¦%±H Sǯy##Ç\_>8À^)E©rHÆAïÒ£òc ã³®SkV}Oµ4DÞQ 7ÉÇnýU|Úr -Ç ßæ ä±ih¾Aa» rq׫imµ· JÖ·M£¸ëøÔHqS©ýjí¤`"Ĩ¥o¿SëTì¬Îg??κ :ÌZÈcÆCìå9äÔ6vÊè ñøýk}-ÄSòü¯ósW`Bj+¤`ƯÛgz¯zÙnÍkD±Èì:B÷K8\(æµ-Rۯ͹[îÿ�á§NwVù¿¼ßÅVmT´çËùåÿ�?ïSoQR Ëòÿ�á®wSMÈk¸k£k¶½L©®bú02AÁç^;Ö]ÔS´ [Öeóp¼ûĶØw`·bk=k·ÕÓÎÞ÷ü+B±¬×SÊ2°®-<ɬÖçɨ¨¢Pp:RQE@êNsÜFqÒ(¢\UZRÑÓÞ£�Nzv©VÑÜ e�2µ7ÀvÀ$eGN(¢q))ñäÊÜcó¦R¡Ã©ô4º¯ "eÄ'°`QE¨¢îí[ÿ�E>Ê»@8þkNRZelg÷jJô-9[Äò8ÁúÎÖTt�çcG'û:,í>ÿ�Z[FÛ¸ðk5ØëÅÜce#/ò9ÿ�ëÕsÓ X~4ö+$DFX óÍsYæùyÀ([É�Û¸0>¾¹¨¥$x$c°¨±Ø¶,+ÑaóÎ3?ÏÒ¹;h6°®³DÉ?þTûo,ȹRc#(û0ù±Î~µ½¦ÎoÞ>7p3ïþs]çÈ"Vó·Þ\_ö¿øóý:$ FàXsÞ½@·\_ûßïV<7ûTÇëÓ®?¥<óÓ}ÀéHÃþß#PðF\wåOjÝÇÞùdÿ�j©Þ}ÍÒýϽ³ÿ�d©%w$ÎÃûÊ¿v óø ÿ�u~\_áÿ�W8S<ñÒ¶;ñWnSvæ?xk2f©s çròsÅG,Ë6÷Þ£<õë\v³�gï«"Ȩ¿¿í½¶³o»\ÿ�ñ-]=óÙHC/ºMÏ'ü ¹Næ×ÊÙ ü»ûëîÕþô¡ùëúT j8ǽ"¸ç¯ëB0}÷d\_îýß½þÏÍW"]»¾îïý¨Ä@ì¾EùÏðÓ";¤Û÷\_ïb¬o Å.ÒÃ5]&´"PTTé×9é h "®ÉN+JÆä$·ï%þø MhdòwÍþ
ü5SM(nãäÎÝ÷[åùøªÖHãû {OÊ˱j\>¹£òzQ½j)[æþü}rÿ�"²4Û6îO»»þù©¼Åó··ð7þÕ{|È/î\_ý vÕÒqHÝqÆ)Oj.UzSIVôUÛÊò¢oãÿ�Ç\¥úîÛEò¯÷\ôÇÛ:ýÏï}ú5TUî R ()jBQÍGÈQÖ³×oîÿ�xÉóÿ�ßJ¿z&Úê«æloïÀªxWËûßu7|ß%6e\_1Ö/øjOåE'|ÑA¾?Qìú¨¨øhñ'ä¯\îݺ´[bì§ð+Z06}jL `�y=j4è§`íõ¥ÎÓëÏJb`(¯ÇjÒÓ¢O°C&È|´wÿ�¥\_XfÄH\_ç¿YöG÷ÎL;<¥Gÿ�c÷êá÷Ýwåþå)äcüÿ�Ji9íÏ`hèpGQÇçÖõÏAéS3w¨ñíRI³fοû&ÿ�ý£÷ýôùÿ�»÷Ûýôù?ï¿¿QÎïþÿ�÷ûÃÆà?ÓI8éAãßvÉéÓó¨ ÉÅFÇ$Æ\C±ûýÔÿ�ïªî!ß²á>MûöP>k}îÿ�'Üÿ�¾ÿ�àtÁE½éL9§¢ÿ�\_öø>Jp]çùÿ�¸ÍMÿ�rÿ�Îõ\æ¾äß÷þoà¨$RF;ÕfOëúÖ®}\9çÿ�L\$×lyvÊá¾ðRNdÛ òíÝ»æùªÍfT¬÷¿àU±#>w«G÷~÷ðü¿ztþtLªÑ¯óVKuZcs|yïéL9æ«®<Æ\_LT�%1 ãn@A?¼õæ" [Ìê¥Ö$¼+æ)!ø>nsþ4ª%r0ÙíPªhaJ8 Ú¥ÙçÚ´vÒ9<j¼!bß9OóéKy.àqÐ}3S¡1FXò:ãû¼õýi$FAä
eî{9¦L½8¥
:qÒÑ'©IVÈW»'ÎO¯zÞÛlå0Qz\_zVm©»gv;VQîä fIﹿÈÇ5z%ªñ¯5¡}\Í?Jlå9ÏRq¯kÌäuÆ=þµÑØÄÎDª¸¯ÈÕ`UÊÉ·þêôø\_ìßÝ?þÍOj£±¨oæç½j /¸æ«ß/Ìzwþµr93;|±¶8jüH±Ú/÷£ÝUîGú)ÿ�i[åÿ�wîÿ�ìµb<}GÝùwm¤#tRgËÝÿ�Ù«ºèkèà·AÖ·®ºçîXþCëéT¤=»úPN ç8ÅpÚ!5ï»öæ¸ë`qJëµ !fA÷Wî3ä.söã5&·þücBÀéøUW³uOóÍC´ã®{ö÷¬û¸üçüsUÜë¬zÑEͬ3ÁàòiéçùÎu5"IgÀM2iÈTÈJªÑÁd¾tÜú)=jFI0Üðõ¢×(¥Ä ýÀp�ôíhÜgkSé÷)æ�ÆÝÏc]M¤ ((#fÖÙu[f;´Vèjż tg4p0c#h4TöE¿¿|d`Ozìlí4Ë}¯ÊA�úƸ¾GZ@pr+¤Ô4ÈðY@V¬¬&~ çÞ¨ÜisÛÝA8FsP½2¥øÊÞ¸z+wXѬf{f/NA }?c%¼²cllA8È«§ÝùÐàÖª>ECc¥hÉ'éüêó[ìãò®¢Ø¿¾]5|:cìÃæôû¹ÀëY![k%@1÷³îüÛkd\I ÆIÏôúV
êmÎ\+dÝêixå±Þ#{/¹Çø×wfÀç ãµ Æy=r;qÐV¾µÉú{p~Ê«YE¹ùúøÖµÌ® `açÓ8ÿ�õÖ=ùëUî k|½3ND?(V×j¿ÝZètm«íÎÒ¹QÓwýõ]BÑyÿ�Ùwmÿ�ö«·uX©ù[níßîÿ�ã¿zºÛ~ OîýÚ¿3áºçµgËqÎÐîxþtãO�dþµÓ>"éüGÒ¤]À
@QË1©]6Èvÿ�ᬫÝzÞ9ÖæÉ¿Çþ=Uõ«é?²Z®íw2·ñv³¢Ò±FwïÍó7ðî]ÔÛ¨@çÖo[>ÕÖp Gowöêj¼í|8¨£Á+üÏ©¤»
n¾eMù[-óU´{<¶Ø£þ÷i/õGd\¸r̸ ¶ªCª5äC;FçaÓéO»<J?¼jk΢©¨8ÅNà¼ù#?M|ñÝü°îùÞÝþõT@Æp{oþµ?óùæ\_¼ÿ�ÞÝIjæeÙÙ¾ïËþòÕê\Êæª§a°§XI6ïPù;QF1\Þ̣߯åoøðÖ°|[íeÚÛ¾\_øfÚÞ2´ßwýáÿ�ЪÄ33Êê«ü;·³OÝÍ)a¸úÒî=FW®:Ó3»o&7¼É»Íþ%¿Ýÿ�TsK L¸¾i2\_éTeÜÊ={k¨�í^sR IÉqÉ\:ÔXá ØÅß÷Ö±.oÛìÚò·û¿÷ÕRÖõ¦FKqJíôÔÖ$× 8/æßà?[¶Ë®iª¥Ó¸ Xô¿\1>b01Ðñÿ�Öª)w·Ìc\¹ÌÍ»æ`y©5{¹Ô�òOrFO%ÖYXòøÎÓëXr¼h,Ùrr3ê}éáÇ00{¦É0Àϵ5»üÒ¹ûËõQÃ|Ç ààV[.z¨§Ãt'wEêi-¥Vã 0«ÔÒøË|ÿ�{ð<µjÞ\_ôHO FÓÎÉ)sÖµ,.#[2$þ÷àt«éUÄûÕN>õu95kç5nW]ÙçØuÅiÄ 20?Õ¡2&ù\n¿µjámßòã> ÖȦEß÷°>aþÖêdkóV°Ç#¯§¯R%Áô;uÀ÷ÿ�·nLEqÆNi¢A:¨é¸äÒiðî¼Æ×Ú>Wcë´Àk¨ÓåVÊÿ�Ýÿ�wmaikû÷7Í#nùÞÿ�ì«wM?/Íó»wþÍI$x8<×Ú¢a×9ëÔú÷�3øuô¨%VêG@Óü¯Ç'ÊOåQÊ'JÐÙ´²ýÖþ\Aµ+»æfþïTñõÿ�wïv£ºrü¿Ýÿ�?øírz ç¥s ÃõÑ^çêkÆ\Ö\ß)#§&¤ß½xùjómd "d©ÉI÷\gêõVòpv( 9ÇJæ\Äýqøõ¬ä·POOóíA;yÞsëNq· òÌr§k|dÇÿ�¯T§|+J®Ù ì:V¢SP q(Î[¿µG3SGn]È�Z/cå.åñÊ}k\ki¯¥,GÊÒ«¤³m%Pv)(¢¦{y0åN+´mn0In½ý\'µfÿ�Vr:vüQguå
Ú£<óÔTöv×ò
ÝVmØ.±ÊHç(§Ö¡§Å+ÄáG"î~¤û4ßóÍ«¥²L89rÖ\ÚH»Áî5©k|Òí\1ßtöó,ÀÒ£}¤G8«Ñ³fT7òÃ?º½P=¬è»q{Û·Ó Ê|¢>èÇÿ�®¸ Kìf=ñ[:n·toçjà[ü+¦¼õªWpå³OsRÎùü)ë,ò�#µ@ð¤7Gnǽvò$!TOʪ¿uvÿ� SÔ~hð¿ÞÛ¹[ûÌÔø¦¡å?òÍ©ÜFcòæVù~oûÕ(ȦƩd³kn?$ÇS8nÁÈõ®~ýO\µ,$Ý8«wAüÐ30ßÿ�Ù55+²L£nùjÕ|ãð °z®yªJn}yüëzHÇÔcøÒìʳwÎ?\KyÚÈã¯ò4ó'µHþî>jéX×]»?½»æ¬ )j÷6ìVù»þÕtÑ çÍè üËÿ�¬³ýrجËÛ¿/=�~çÎ}¸Îjß9òÃ`õ5¨\gó8+�ïNvÙ,ÈG�ÔúV£½"8ã\_áÿ�Ǿ\_ûæ¹ OS$�ȤG?Þo\¸¹\ç+
Ûþ÷ðîZã5yWä·F$(³ëΫ\^Hï
îHnõ©¦Kå 1ëXë�f8ãúsW¬Ñ¶îsÉÎÐk2ÝöÊf,ÄqÒ WÚÍ·.ì2xP{Õ[»Én¥,ÍߥmhÅ-,^VÁAÊã'h9oÐW>«òîcJµ %þbE=ðZÕFã>´¹ªù ÈäóRçhDû°¡±á½?oÃ.#B~ûd¶©©"]íßû/ÞjËC)E<4c{äZ¶Òé÷ößH£Y·Òª¯¯n.¢B28楸£Î0rr+R;uIyÝò¯ýó÷jÚ.çó?UÞù¿Úª °Ü¯ïpÇï¼3\ñZÑßyÇ"ü¿Ýÿ�ЩÍÐUvûÕaºUw¥8ÜÜScÆé>^õõºùÊÊ62¯Ýoý :.øäû²6Õeÿ�vÝÑÎükþÖï»MH°¯ð¯÷¿à5"¦>µ2¡©3Û8©Ä($u¦È08éæß ¬WÍ,qya]¾Vû»¿ÙÝSH>ûËQ»æfþ\57v¸Î×Mß-[Êq<¿&ÿ�øùûÕC9¦¥úQ
§´@3ôÅF÷qøT7qü»· +-Ub¯q÷³À·U½á#Ucüìu© 7Q½v¯ðýíÔÞh¢óÈ£fçE6në±·Àh¦N~G]±«az}Ú+hµ2xÀ§ ã{ñIú¥ÿ�t`S¸N}ªõ\õÒÀ©öK-î6ù 5qÏå·òTzwüí½~λð>Q%ùÿ�¹óÿ�±U¤BÙ<É5Qñ+IÁ=ÿ� ®è=óMm§<ãÞ2sƪL÷È
þû½19ùÿ�ÏÏR¼}Ïãùê±Ùÿ�õ¿ïÒ·|ÐMQIÞ U;¿ïåu)Á)¸îø÷÷kW]òL¸²¥k+åÛ `{ÕØÿ�y(wPYGÌßé]æÚ-ÊmU�`g¶zþµnÞxDYF§Ò²,®ä¼°òvã¡-sBd\ çg¥j×̸éW-æÜGLµl]A<ôýk~ÆÕLa^±U/¹Æ�íéM+
S$´ã}8÷Ô#D¶ß þ!þÍtWÍfR«¹Z¹ 'O&ÜÉÛbO« îü«¹µGþöø´29ûôªï gFÐsUÙRÝ÷>µr!ë$R=jÌ[Ü¿Åü\_v×t[U¶Óó¹v¯Ëÿ�²¯ÍL`¾[7ñnoýêæ'C°ûW9¨!Ï=v71\W?{É?¥P»SìG~i¼ÉJ½-à|Alí+º¦ a°k¼\99AÞ½GT¶Yí¯ÞZóýRØG:îç×sS9ÉùIàíÅI»zªã·øTGÎç¾OoÆ¥ sÔæ¨º©F©
.3ÁëÅbAJG< pSëRé¿)$óäõ©®µQö3j«?ÀçÇZÇmÒH[$çÿ�^
º|cÈ Y¾öFh3¼Q¬JÌܶåÏ-:�sÒµ.µ[bLm ÈÇù±÷�Ö¢ë] ÞFFc!½\_ʯÕNA¬8àiõ«ð[É\m 8Ï^+RËUóð¯V=¶\Ì)ùz#ÿ�[¨[F?s�ÇLdýqÖÕáÀ :|ßZéíásµWpéW÷Fr3ÍMN¦5o\_óÖ¬C¥ÈGÓüjô¨@ì#úæç)#Ml`ÃÃ5¦ÒÚÈ.cn¿7=Oÿ�ZY}@s¼~¨ÓERÎIãÖ¥M8/pNßAUg%ªÞIéU ¶ÁÍ]ÚzUInz¾R¨8çÅUÌqïc'JÛ¶kWL,Þ»àUq^Ë>\+Ý»q\_ø¿²í
J'Þ'¯N«°Ã±Y¢·Þ?ÝùwT>= ëMsSÚ gÍà1$u5¨»pIý:9pqW`½åéþ~OÉæPMÛX0àw÷òÙ®1Aî)r1ÓðéZf¨H ye[1¸ûÁ¾o»Y¨|ÃvÔ#æ¦H±/Î8�dgµm»nñU] Y{.%Lÿ�ywUè\WsevîVÛ»îÔªÀô9©Æ9<Õn~21¢FàQH´yÕU æi~Vmß/ñêsNZ0ê﹪¼R·tO/oñm¤
äÝÿ� ÿ�´QE!§ã¯ÃT
Uäm¯÷V·y7ü ©ûwI÷coö©)Ù»ï÷©9÷¢h>�;sMò·-V¢ó]¿ÅþVÞR|µ�uzôÅ;py§qè=éNOç¦GÖ¥ê¹ÉäTÎO"º;iØÚÆò¼9Ý÷þà¥Ù¶?Î÷?¿I§·ú ?çÿ�·ÚMî6oýçÜÞïÓdÉçÖ«MÉbBp1ÛV¯·o¥GGzb9ïT.ÿ�?÷ê óéO[þàûõ^oï7îý´§q»ð?ýjB1øQßß¼1Þ£ûÙéǸÿ�:ñÄ^Qþ EÚ³£¿½÷®í¿'ÏSCþ mh·ÿ�wý¬9¾éçü¨\·Ï´óÐÖ|ý ý?g]î ã¡cR˼¡v�óÚ¹=k/rû$äíúm]µªÌ<Å6á@ó®X·PÅþïS·o÷¹Ë
ø¶@éÁæ¢h¶7¯Dc�Õ3ÉîOJpç×K»´n `(?UuÉêvΣÀCqùI'3cÃ#ôÕyÎx8÷¨É sïOm¥@§CQ¹Î)à~åg"òqÓò§FI8û¼ûM$`dúÔÒ1
UÆAÏÓ&¡.qãüͧ8ý3ÆpTcê)¨F8 ÅÇ®iã÷ã&¿ ô¦ Æ9¯aÚg.On9¯50ÀÏ^Zci$AçÜúÕÈ8=êuéTm¤RÀwXSrúÕë20¤`z °Î«0\@<×5¡d ÿ�ÆsÜäñ=D²´ íV Qz»×sútñ0ùOãÿ�]-²ËålÜ>ú
Ý·ÿ�99«p/N¹æ©©Í]erNµ© .Ü g¿åH¥v¸ÎÞ:é¬ Fc3?Ï"«7û+Zëµaoî·ñV«qü½Ëò²ýÖÿ�f¶¡lÚ,~ê«7ýóVbÞ9Á¥5Àϧ\_çNàØç, ã8ÅzUÇ3/Ý\_ö¨æÚvÇUnL¿wvïüuªÐ\ÈßÛ¶Ös¯?Jǹ²,íÔ¼³ÁÏùJ§ÉQ..#0B0W?Ea½YÏOéY÷.¥µö׬ibv&¡õýBA³ ϵî¯þMÜ·2îBÅY[ý¿þÕr2çj$ýßµt:¥°N+&8ðO¥f4/òÒ85$©lq í^aulñ3¸ÇéµBbݨëú×o¯i"E çæbÀuù¹1 BY\|½ük\XNRFp{~<Õq�SÛt©o85Bn$gòF sÛµDcTs£±¬öR3ßÞQW®c1°ÊHÎ=ª£t »23øÕ¨®T©Æ�}ûVc¹ ÀÏ4Ià\5½{vy¨àoè'Ó¨êU�w¨¨Ãx eH?Nj{{¼ô®tÁ9Î$Ác×·û¶ÝÙôÀI;¹'¥,îbXOLÌÔîÚwòÕíþÛYkÔ¡ Y&ÕVÏû\_/Ë],êo°¤ÍÄ3e£-·ýæÿ�ök!#à~µ:ü ÔÍÜc¥@~º và|Øô¬¤}8+òÀý9ÿ�ǪҷÔlmÍòÿ�³N2(caÑWnÏû¿ýWÞÙ½·n ßîîùi[¥BÝjféP±ç¥¼Ô q.Q¶íÎÝÄ|Ëü5£÷ 1°0aüG+eûꩵ«4»¾úî£nÒ¨u©sÛ ¼tü)Oß`ôõ¦¨ù0yQßñ¨ G#nàcrñéÍITò1LTw£Ì$Ù¼qüXïëRÛ7 ÉßïNZt¨WïTËÐÔð~´î`uÈ©T(û¥7+6ß§8y|Ëm²¶íª«T#ÿ�^Û¾ë'þÍÅZ´Ü üß#}ïøñT«É.8¤RcéR4\_(çµDó Íïݯ˹ñí´öÙåü·ÿ�§Ù8wnÝ÷·m©ÊwÝûQQE õÍH¿Îsõ¨÷0Ú~öÕÚßû-XùYq°îþÿ�Ðj%ù£Ýðýíµ.×Ü©ýæù¿ÏüÞg±¢¢ó¶÷§Õ¢ûÙáwÕ¢~HdÜ[hE%[ûß-ª Ôò8P\?JTË<�)N@#çéVü ô /Ê ôûTvÓà|Ê"|¦¤.öÈ?©l³àÚÿ�\D³ð$ãGMçýÊÖÉÏ^¼v§cæ>Ùç¥5ÉÝÏ¿¹¤aIõ§¸ÈéÞ£ïÔ&ùwòÿ�äþ ³³÷¯þÆÿ�îUk½þp ü|ÿ�í½RÛ´p1BÈæ¬Ü®óϯֲ¥|7]æ!÷j\_(³^G`j¦ vÇæ>ýçýúÊòdÚß+7û5óyÖóüÿ�ßÿ�~°îxÑS~ÕþÝýÚåÕà ÿ�\ÊÁÉþ\idË)\yBV,¿íκL[jàúT2N}íìAkÄQÛ´'÷ð¥°ß{®6öUuÝIÐ}3R]\]ùÓDU¶1ÈÀÏZÎtò~rz µ¥Wæ?V2p è9¸©6\õ,y'ç~B£13¶A¦zýjK!
Å@Ì3
+íI1Pw8ÈùÔÏÒÁÉjiFÉÝçÞ¦¶9®$¥IrÃnÐ21PÛ£qàü)ò°e< FFMOR¹~<�~bqÓ×¥X¹y~Rr?Ìp?Täã)ÌáÔçg§èµ@\õÇüþu&vÉ\0>ßáþ#ÀcíSÄO8êE fÊòÊÁ
&ì¿~ÃéVR\_\ì}ðßPOÿ�®©±;²y8ý;~;©fÏ¿ÀÞ eo1>¸ôæµmÜ0 ;¥ \´\àsVíÁÕÁWå¸#Ò§òòPRaB9zS®UÄd׺õþ`×UczqÛÉxpdíÿ�ZÉÒgËx' ´°Ê§"(Ù$¨êè »ÜñÆkTÉ{x'aQÐàÿ�
fÅ!fÍiÁ:r ^³l1~}:Ñ&ØËH8ú£ßw¼±¯Þ]¿\ýÖfeí8IÆÝ®Öÿ�e~íq¶³,¬\_óR¬¿í{WUæüÎëÑ[åû˺¬ôô¸Ú§ÖRTdôç¿§¥eÉ&Íàt§d©ó: \²$>i.ê¹x«$+'ñ'ÎÅNÓîíU£ßü-InÍ»îoþï÷k"yOív9~êÛ¾òÿ�µþÕW¿}e V¯:nOzÀ¾fCÄñQK\$ÊÈÄ¡ò·Ëó}ï²£UÙïòß÷Õ\·xî °\_ý»~j(ÿ�ûIfûô»]¿óÅ?ôR(ÿ�Ç}FA súSæ¤'=Z³ÀÎ}N(�;@�îieIwᲩO ß+JGûè9ùïÖe×H¿÷ñó¾Ê®«PºÊ±éÕdÚ�Ï?×5z2OùïP]LÄSf2Û6>YOzmÁv|û7¢W5xd²ãj4,»æù«hÇ4%\_çÿ�Ù÷Ó5x#»ãÛ¿wåþ\Ï'ñLn?f¥+qM >b=«.xØç=iÌÎÀç9úW#s>[zÚxϳn¬éÊ©8 }kZ{VGþfôþõV)<Äýó¡Æ6°ªR wª³ 6H÷ÎkNHÇçÞ«M'�UibËcÞ¢¸Ùç¸ÏÌ+\}Î ùjêO\_¥T\ä÷úÖ½Õº+¯Í¿v2ÇÎ\ÔX|\?l~µ%sÕ9ëþ\KÃ1��OãJÐ àéE±cÈÀì3Q¦U¸Ëp ¡¸¦G�3`c¦>¿ãMdóôçõ¥;ã8üi£ærH8«P§Ê $q.BµinÚdÜÃ=êäQ·æÈ2:ýM�ï³dø«öÞ`W=LçØ- UQ¼µÁo¯k^(DP¨³ '»0£g~A©£×8,qß,j§ý\Ê ð@穼¥H2¬£ügú¬mae]ËôïÅ[³òÁHÉù¦)àrJ¶ßg+y$P!Êÿ�{9©E£ÜÛ&UÕdÊí\Y¾eæ¢DÁëZ6ÑuªÅp3éAr1²<° äfÿ�h`Ì2¤ãÊíUÝk1W+¹sZá¤|!cÝ&Ý«ü\_\®ê§3Íçõj˵ø¶²ü»©×7RM²\·\_þ/ø jÁ 'õ泯.~¦¦µîúÔcß54C|G¡=j&Ú¤ñÎ3ôÿ�&¶ìZYY[væÝó|ÕOYµ]rÿ�ºÊßݦiSlýÛrÿ�{ýªÐ½
gÜÊß{ÿ�eo°ÄcàV&©|ó
oçµsQ¢¼ ®ÞG¾MBJö?wóéYÍ,r5Ä8c½5Ùå1Û{\áZD²{q$hÞãX´j·LñÇ!$x'üóW¼M!Z1vÆv>RG#Ðõª0"4,>W!ÇqçYÖ×nÀéÐöû+ \ÓF¾b7ÿ�vöÅ\µoq[[ !<ùS£Êò\¥¼ÆvEtzUÿ�\Ëêrñö=+#jky<¶È#8>¾ÙGr ÿ�?áWá\7ãÖµmæ$g<ÖÜDêaÍ>1.ç,@æ½WNÔÖ{u ¾m»¿Þ`à ·æÝ·mydÍä¨ó°b/ÿ�Utún¨î®vÁÿ�ÖÙTãw׿ù5ÙyëÅ)»>ô}§¦\I¢ó1©>¸¥·y-d
O¾+ ÖÆê"fãûßÅÿ�ÿ�zª¾i¸¶ù6¯þÊÕm²)åÜ¿+GþíG¹SçÛÿ�,¿æj
m[8è\e´`3Þ7±ÙqÜú³N°Û^6¶4ȪÇFµÚª ãs/ÞwæZX4Ût>`y>\/º³mùªD#Ê~¿ÿ� ÿ�ßbÎ×")Ï÷?ñýê {|°Iϸ± [0§ ?½68V6ÉIõ«àvÒ¤E¨z ·,�ǰ¥³²·AÆQË337÷KmXí=ª>êÃþÕ65XÁlÆÛ¿½R8+6íÇýóQ¨çÜý© vëÈæà§ýjB8àr?�1Þ9Æj>.>^UOÞþ\|çO¾<"¶76ßþÆ£+µ+>ê®Ý¿wÚ¢nC×½T�ïUÎ5o¶} UüÃ9Ïñf¡ãkw¥àïZhù~÷ñT6êÑMånù¥fÍÿ�ܪw}©¿ä7ü!Ì zæµ<ã#§§trÜóϹIÄW<+/Ê2p¤àNh»Ê ±
$¢¿ Ö ?þýy¶³,²C2x0:ýÕükÐï°-$o½±FÏø÷+͵cöMT å8àã3ƳþÐÍN7rÈå÷)ϨíÞ¬5¢W:{T"Ý£l9;?fIº9vXzx¾æ_ï-fµÃ¼@1=xÍ"³ïÞ§¥YkTt, cÓªÞL±9ùÞ5½ÑéR¹2Å6ÒË¡$ñïS:ydô©÷±ÚS¡¦F;OÕ¸nä (ÆqÉ÷ÅÌ�ä úÒéö~seßb¯''1B!A&rÇ·®)Ds¸çÕd.?l}z.îjTòü¬%H(lC>þµ%µ£æÈ$ÐsëWåç¾8ûÕh¦ÜJÜ\¹äy¿1?tp>õ)'µ2©Å }\d^±S¯P3~üLs-;÷åùO§rÝX!ñí«QBñ+´ªØþñûµ=Mæ¨]êWþóSQyçj- ¼ýjÊ.�8Áõ\½ 1jíM±Ý»¿î³VIºá�ó6ýÕÿ�¾¿û\U]²ïUÛ¹YñÚgÛûÅýßüv«QÛ¿
YÉQj0N8=(ö¶Ö\_¼«òÔ¦ç÷¿8Ù³îÅÿ�ÅS {Ë\_»ü?wøiûÊwïÚz(Å£=6ùWyÎïýpýëe~fZ+}såEé ÀãçùbƼt¯cNÎG ê«a¸ôõ# ñÐt®×ÙÖ\_Üòýò)îÛ@Ú6,ñתÐ0}:´|'ßþÚ\ÆýëýÄ?::RÈÚ3þ5ã)ا¿\_0öü±U¤c/½»wÈ»Úû¿5q¶÷IÜ6Íónù¿øÝ²£%Q·»7ðüÛjDä bµ-Û¹Iùº~¢£·¶IÁV>£ñ«H6£©éùzTÈJpzTóEµ2{×~ó Ãýý÷Çß$b/_ÿ�Z[h �áÏÊOV_ø$¹H¼È¿Ýÿ�¾?¹Kæß¿§LÒ÷GUè5@ Éàzvû?à(RÄØÎ3Sdñ±öû?;±÷~îêz®6¯ ÝU¨bUK}Íó?Èî½RlOH¿ø¥ÎO' çòȦ{(³Ç¸¥QòõÇÏõ£%¥EM7ve\¶ýÛÈÿ�wzÐÿ�
8O¹M ½åReÚÿ�&Aù$>OßÛòlÝÿ�³Ò1à=ùéÅC8ÎßnN¢¬8ÉãÁúúª¼ßx¸1ûc¥Fòc9íéRJ¹ã¶cùÓý¯îüÉÐMá~Vû¿}ÁØÍv ßîÿ�û5± ù°"M»?à~åGlTnÉÓúV&©g²@qÁ þµí$eR20ZmìeÏLñôéU/c·pPö8îgQê PU );zìû%qÚÞò$.Wl¬«Ê
àï·ø«°Ô7 ÚH-ü?ߪ״-<ÍÊÛînùkkymr Nìb§b§�½©µg9ÈÏ=Mf´RCY )Æ3Ú 1E
"s$cg¨¯-hn,^H%PTR :V pÁ^àóÔ×okÈÈÐÕ-þÿ�ì×?$&<8i'æ'>uéÅN&G¼Pe�sôÅ4DXdqÔ ËòàéÞô¾[íáw¾ÿ�J³ÊHtÄx�0 cëH|¤FBÅU ý\5IG¿(NB¼ÿ�U!
¦1óî úsÇáI ®Æ¹ç\´G·¨8PÅ> eÆF)×çN=1R[Q÷Ys¦·íc lê§pÿ�ÐvÓ�ÅèÍ%Y ·Ú(P0:SmÑì ]»nïý¦·VYrßy~Uo÷vÿ�ñTò¶«7ÝmªßÃþÕ5ËK|Íò·÷~êüßz¥¶ûÇéVfÆV«[g'éV¦)å¿CKp?ѯz´æ3oÍ·ýö©4dV\_ïì´(¸íº5fù¾eÿ�{ýªY¼Õmÿ�wwÌÕV(©ã¡Û;ÒÁ¨Û÷wnÿ�¾[æ©$/7ïíùvüßï¿P ¿û»7mÿ�koûÔýÛ¤ÿ�ÐhãÚ;{ÑNÈïÎ uýU#¡OõÌ¿5 À±nTï÷¿ßF ´ zs0?59sÇò§¨3ÓõüêÊ+GLÓ³.Ç®Îtk;X×Ëd"l_üÑð«Î#@åÝÿ�ñúbwiÐoù?t÷Æ]SìûÀÙÿ�ÿ�ßtyÏ;ñI×#¯åþ>OûM¸Ðãz\Ç&{úëYNáññ§5°9öãÔ2&ðYAßÖ®ä¦å?>3ÔW¿k·bß2²åûû¹ûè^Êë;Wø·wsWSD\_ë>Mﺯ¨éñÞA\_Þî|~zÉáçYÇ$UA \£§+(
Ln8ê@ë\ê[¥®J"¨Ú«þëñU¨Û,LW)°ýÖÿ�ÕûÛy,L±
ÝnÝÿ�}T3yF±¡ÚÛî¯Þª¨Cµb;vnê
£nÕÖÞ8÷Em |Í#û«¶µôëH÷Æï|ÌÍò³5Kj¸çjk«�ôÎ~µfX|¤b1ßë\æ£9BÍÖ¹òÕÞC1UnQgI¦q
©nfRTkgoøåþ«làúѸ»ó-CÄøl1é£róW,=zóM=Êôÿ�9¨.ÕÚMã¬/=ò+L)1.-6K-ÚíØãTkPZäÇ^½k7RE{!ÆÉ·Æäôüx¤º²m�:é×9?U¸.ÒovÜÅA'9?½to±>Ò KÈõÀÍgF£ Ç#ñ«¨ç(1Øq×)é7#¥K�J· 9¬Õ·a{f¯¤"XÉ;ÅÀ¡94YJm :c<þµÝúÔÑ Þ88K�ËdYö±uÛ×ÑXÄ:z]VBp£§åSC¸VÀQ÷Gägδ¡c8ñ¸g'@Ϻÿ� D«3ªüÓ ¾aù~\_îsE]=³ù¬L@Ðmoÿ�ß5Þ[¬ªë Ä¥¾f\_¹ÿ�}Õç
]ݿϥ5yUf¡,oÉè\FáqëǧaïWFçÏÓåÉç"´åº ,|øÏ÷j80ÑDÒ/;~]ÿ�#ü´ûeýîæû´æQå²1ûß//ð¯ûTáÁ9þ]3ÿ�ëéB»=I?Ïñü)x;8ÀÅ"gòÔïÔgΡæ·jbíW}ÃõOº[ÿ�Úû´±27Y<ãø¿à\_ðå}í³(»6.Ê!Þ/îu/aÏn?JLôyã4É8ôëøcò¡NÜr¨£¿Cÿ�|QÙW;þ}F±0¾ÎÜ«uÚà4ø¤Û Ëò|ÈÞZ8Éä }i¡H\gðÏpiݰCt¦g¹áS×§ÖØÈ'ÐÒ¶8Ï¥KóK|È»YXD±å� ýÝßÄR»µLí]Õ\_rçs/ÞcópÅÿ�U\[úõAÜU%Èÿ�õ Õ2 ª=ÇÌT0s80å@àîªVØ^Rùÿ�àiT¥Ë6ýïö?ÛJn¦ÒIv|Ã×Dm¿ØªPydW\_Wÿ�ZñH#j01HN1úU^#©SüªHÌÄ1H�pY¿WÙì|cÚß&ﻹªÏmey¶ä|ßz¨ÜjÝÉöFh=ÙÞ>oáùïT@mÌJKÏÈ>öÓóm¤6¹ÍQ(B9çÓoza H#Õ7Ëvd äS !¡F0\ü¿ÖªÜiòY7,%ÏNÕÍå@l»è=k¢qöhØìó6ü¿v©[Úr» f6éÈ ~4ÆÝµbÐõªòö©¬Æ ÅN¡Î=i4p
Æ95^päáúuæ´¬îB£~>VOÿ�fªÜÅó½ÁLv]Õ&Æ6mܹo½ò«U»u,h¸^Gó«¶Qe°�ÏÊqß½Gp£9?
XÚrîÿ�3HÌ ß×JØÓÙ®Õv¾êÿ�»R\'Ú&wýÝÍ»þùÿ�зV
íÌlûÖ5ÌÝÿ�øªórÇ»îÅþíV÷¤ùÑíRüb«°ÎxÀ¥¸4v¶×Qÿ�ßùª>mªÍþïü%¾æ]·oÝo0_X¾çm7¢2(üØà#ò×wñíÿ�Çï|YgFßÇû4Ùp«÷6ÿ�ÀöRBcûD?ê¾ÿ�Ëÿ�}Ô½è v¢ ÿ�צsÛÞ¤EiU3þ±c\_á¢ß6 ßsÿ�A¢·#ÎÕ'°þFs´ ñϧ4t¿ÞÀþT§øÿ�ëÕ¤á@ô§!ùvñµÑX E¥»¾6$Hïÿ�~Ú¬HÉtûé'Èwÿ�sç¨-]ÿ�³àÇÞòÿ�E °ûøÊötr}³Ür)3Ëëõæ(-Ôý1ïÍ)yéAcäÒþñÇ÷7ÿ�|éQïØè£Éþþýÿ�}\iW?sçHÒ£Eó¿Ýÿ�·óÓHútÿ�?
1ùëéÔºi¸È¯ó¦2ç#c Üõ¦H©ü|'Üÿ�?ð §xÛÄ{û¦ýõyèÿ�óÅéK¤iÃüÿ�}Ô]y#æëüéÄãå=±Ï¿jf@éÓ=}hݾÿ�ÇáQ�c<ÿ�:63Ïó¨ÓçùÝ?÷ÿ�ô:WQþÿ�Á³çÿ�oø°î'î÷ýÿ�ïÓ~ѽ¾nFÇÿ�ì>OøSÆ}ëks¿5±æ9~ l¦~¹É#¸>Ó&DRzR\ÚÅt¹eܾß5bÍ¡ÆÎGÛõù»[Í]Õ·«'¯ÈõÎÝù_sîoÿ�r¨}õÏéMûÖò8£Î9ÿ�ëÐcäaÔ>¹ÍecåwµÖñòüÊ¿woñT_eã÷¿.ößþæï¹Zͼÿ�þdµÓå± ÉäµÔ·WLXî,åîs]ÇoV++{Em¢b]Îs\áqþñ?yë¾e-vóÇJdò9±ã×°çêy«l
à9åù�V>DÒ·ðIéÏ=1Ú´mä?k5"©Ïùü«6ÍÏøKmÜ~ªÛ34ÀʳìU÷' ¦HvË·wýkGN+äÈÒÈw9á}9?Ò²ÜÀg¯z¿aûíFÇÝ@@=1Áçó«PÙ´Áár¿7ý=ªä©R+8¬ûíB(3½sÐrkFK<³0R~óÔ¯;¤6lìê
ñ½ûÇÿ�¯RÚi²^HÈÈëaø~µ¿8Ìù0£ XF1÷ÇáY÷ú1å÷~QÓîóÖ¥s¥28vÛF?íUÒÞg'שÍ>!·9¤~Õ OO~7ÿ�õª/øú
o³<Ïþµ%Ú1»Àý=ê;IuK±ü¶êáX÷±>½j&3êN[iÛ9-·8õç¿ç]_4øÚð;Á 2Çï3eªòGÀµ[?Àã9¡W°äÒ0oNíò+V%/� ´òªpª?:èôûµ´bLbÚÕ!wm\_üz¯[íóýÍ÷ÿ�¸õÃì¿ðÿ�·WíV ¤¾ÝÇîoÿ�+Oè0N;\iÈ\ô#üÔ!Î ^GébàFqþEYdÆ;céUAcõ©ü°©±¾U/þQ2:E¸�¥B¯=ïÔ½§øTøZ~ú}Ïòez{§éIF¬µ8NáëÏçMv9÷é¹ç¥FxºzUÀ&¦CðÈwc(îÿ�ã´ýûaGTÿ�b®[æ^ì7ßu ð¸Ý÷q÷·üÿ�vǹÀéïÅI#n?>ÏOz\ó£<÷íëþ wSÏáPõ<þùvìÛÇß;)¿#³ºù[?NÛ¿îÿ�·M KS¹w~óø¿ûßçþFp·Cüÿ� =¾{õ¡ëmÏãøú©OpjpjPÁIÛò/Êÿ�úü¥,Ý8ûÛ¿ïÒÊÍ÷H
öãýêh#ìÛò:ïÿ�ûVæß 1cƳ% K&¢ÍÜÿ�ÃÞªµÙoUî]åAÀü\?6kthüßðp3øU Z0'îÓåoø×?®O-ä\_gÞUûÚ¯Ýj°¨Ø{K
þ¿¿ÿ�ÛªgUÃÄ,¤þtݯl3Kt<Æ$uãÎT~Ëoj¼ÑÛ©Ù=2iÐÊãRú{óÍeYèÿ�gNã rÍ÷vÿ�À¿à4í^×1d\®6ü¿ÃSêÚ¼b ðÈB>í¿wýÚ©§©fº»q±>ê·Ý?ì\¯ÝsSBúP×ÕjÆàz.éÀÆqµ$kEùr1§ÿ�[õ¡ca}íÛ~juªùÁÜùgwÎß7÷ާɳó|ÕûÑ«2îùYÿ�«ö¶»æ·ÍÛ±}~]¿z³ïV!·ëAÁ9éVíÜ';p@ãëR´aÎG7¶gy Þ<\(GvÜÍÿ� µXÅåÛæûÛ~oùªåÊ-«¤Ëª|¿ÜmÕ\j1�ò}k§(ß?ßßV7 Ç$>UÛñÍ,¼Ô qÍ"�û«À¨g0ØqzVlÕ´½-a/{³6Õ;ܬ¹[|¯»î·ÈÍÿ�|SîîÞéB¹ÏÞþ÷÷) "mfûþßý÷SòM/=éZ\õ {Ó;ô6ùgÙ·ûÛ?Ïüó9Ý"üîÿ�·þL&tÛþÇ÷åz¦uÙ¾tOjS2hïKÚ§Ò{Ôäc¹<Ô{äùßgÈ}¿ß_÷©rÌ÷77û¿ÿ�Ù«,ïä:¯ßù÷/ÍüiPía&äû;í¨è QV78T#v]Q£(vô]¿v²±K;Æ7eJîÝÿ��OöèØÎQG^äRÿ� #¸<ÿ�Zlcî0à`ÜnØG ÅZRvÓ´d~5ÑØ>ë¿s ïO ©útþ4ÿ�gªú|YKYC'ð|ûJ¾wØÝû²3Ó¸§gØ4ÞÀÿ�<æ7qéÉïO^¹ëjÉ]î¿îT76=W 4¬¹Fÿ�Ð÷oÿ�>Õ?Éçürß§_¥ñÿ�^Hú{Ówg#§cýi1ÞsÀ==éìóºôù>ÿ�ûJ¥¾êÿ�Àÿ�øºLo¹pî·Mû@}é÷GÜýÏÿ�NôÏ,nÇcÞÄ�Äôyç´Ç¸�{Qá>rSÇþçñÕqdvÏàã«SºF»¼)þÝE:Fïó|û?¹ýúbF3Èþuû¼}GåOÁ ûñùÑØ^?,Td1Ö¥# q~´øbÙ¼oOý¨¢Ûj¾÷ÅZ(îþßÉ÷èãkúvÿ�l¦ì%¶ätÇåHǧ>þZzçíÎÏãLÎ09ô¦°�qÆiä�;óQýݼñgýñMí óÿ�·ýÏ÷êÌGÏ¿üÿ�Àê,F¾þåÓÓ·Ò�Û9
ç÷?ýʱ©]ì;|"ÿ�ãÿ�øå9bÄó˳ÿ�©J¡÷y_úý÷FFï~Ý{Èù½ÏçU|îzsJ.>qùqM :c=©P;M@#bá¾ß.w}Ö_»ÿ�SÉýö|üùÀª¸íò?÷©Ñ^1ùÿ�Ù4295NgÒãÐ@öZéõ~\‚FÒó®Nüˆ¬‚‚IiKÌæ¹«÷dÎ8OçþMUÔd&KTàûôμëÇN>ÜTmÚ ÈÇb[å\Kvoï6ßʺ/3K©²Ê1ìÆ¹Æ%mÕOBÅýÅ~f§?ç±d ·²>AÚÇ×ñö¦XÖ%ï´ÓÓü»f~¥qþ[FRK\d.öS,c(�±¡ÁíëIáó/QÈúÕý/%msÇ#§5U ÇÇxôÏz×Òht«¬|Ç:ó1ùQ\_HëµS=O÷EU²¶Yrå~LÕð:ÖåÈoJ#;î}\ÔÖæf\·øiÆ<ªÎI)ÝBFOùõ¨õ+·0@ÁI-¹x=zÖ}¥§û×B¿{Ôý+n6IçûMò36JÀç>¼ÔRÜ=Ëy6$ùà vý)Ö)ÀàzzWAÛ;f³tÈKÈHÆÞ;ãÖµgb³±9 ;| ú~u<2R÷åþýÚ!vÄÝÁ¾oûê1Ü|ÀÙ¹¾ÿ�ñwþúZø¾½;P¬ çõÅ'¸í{îÎ8ÏaQgãÞi%çøþçðSbhEÎ7vCÿ�ì£ý¤þÓÍß³äßü O²KtÝÚÜNÑÇ8õb&IB½Ò¿ÈÈݬø!;ºkbÚ<ééÍ=-cH7f¬Æ1ÇçýjÜ6Þb0/éÿ�êPn b²4»kw÷¯ïºÿ�÷ßÜzÞ¦ßý¤µÒì Qµ#%QVFnõmBãÿ�ö«2{vÜÇàòqÛÞ¨: bºLðz.¼Õ;1¿)¸|¤óLв óÎjXä$óÀÔtÓwüÿ�3íþöê«À;ü¹ø¿¹þÝumÌ»[òþïÞùªÖÜyÊ]NÆÎ+3g=?Z6ÿ�³úÕ¶þÊcçVréÛõFH ÷þ?T7qrèÿ�{÷[þ¿S±¾÷Éòÿ�ïù7ÿ�·PÑ@¢¬ £ò4À@ê?#NHÃ_Þ=U±óßMf?Ô¦7ý¤qû»ùwÙóìß÷Þrv¯y§� äôüȦ/?Ôÿ�j~ç£?¥=OÉÓ¯ZI ß#ï|Ãòç©$f�2Î>OûíÒ æSÿ�¿ùÿ�b¤dtî¿?þ9L<(ÏP8ý:Rw?åõ¤�ãsýh<{§·çMí8¤íÈ8ÈëQåÄ7äÿ�Ç>å=į4Ã??ýñþý5Q¼¿çßÿ�³Ód$w<Æ4À6§Ëÿ�¡ÓXüÃÿ�IµwyÁàþ4nGxÁö¤çv}ºÿ�:i<ò;÷¨³½é³¿ï£ù÷ÿ�¦y0ùþ}û·ÿ�ÐðÌÁÓþY£üýf_Íß÷>ÿ�þH«Ð|DZüÅ38$r)ÅNrÏ4Ï¿¿^j"¤àp�ÅK[ IûçÇÈçþ\_vÉ=üé¶b;Ì~¿ýE¸ý¿¿óÓ@ÜGn¹ÏãRªË=ûÿ� cîàgñ¡²=Æ)èN äN R8¼æOà˾ýÿ�ð:ÑÑ"Ùÿ�|n?øÿ�øº:Īàñܦÿ�øI¶Ýäþ4ÙCµWñ=2)²HG©ãùUGnzälK»8àT\d TÎwûu Îå\_gÞûÒ©ÉpåÆäÙÿ�|S]PCò]Óÿ�@«08ÏZp�¶;ú~4Üs×éøf3þ÷ö¨Tt c#9õ¦D¿3§î¶'É¿ïÕ'¸ÙüÜÿ�ÔE?½ÿ��ÿ�o§A¼ïßÿ��ßþßûÒwH¹,ÙÇ=ÍJÀ ßîÇ\ȨShû´>Cý}ÅHcÁ«Y;[t"3HS|»gÍüoR]4bÞs
p±2íO½¹WæZ Åö´I>î?øåÐ¥ÛåoÛ÷ÿ�ÚJæuE z×9�ì¸å#Û×Wª¨TÏ¡54cÍ<Æùü+ö-Ë #ïmþúV}ÌbH&ÈÜ'êAþ¼Ëı¸x&\ß8fÚ{rGô¬+ÛÚ༺B«§Á(?vIsü;³ÿ�³W7¨©I¡²DqéÏçQc Øé9ï[(¢ VB͸çõx¸jØ�ÎqÁ«6¡CJÅr ãùT«óí'GÓ>ÞÙé]d0+é°OÉßøÅró6:à>ÅtÈÌ,B®zëR\6ãQ-»0XOÌ}¹þµ!ûÀ¶ó³Û!ºt¨ÛOä·Ób?½P§$n>¤õú ±aIêUR±º¤k¬ßuEtÚU¨¶²7ì3u9Ï» ¹¾ëã¿^E¡ J0Ktãü\0x©ãRzç:±n àÖè<ÅUTãëÅhéö©i V°Ä¨¨ ÿ�Õ]§ÜËÛ¿þQùwÿ�¾\ý¼^Txûå¾Gûê¦ÿ�?zÍB{éJwÀ-ÔçùÖs·RyÍ\2ÄzÓÖ©Å)eÀåÊ¥@øãþÕg\I¾à&ñòr§Hÿ�¿ò¿ý÷U ý¦V Éýú±ÚÙÉÏoóô«rÙ#òàð\�ô5r¥¹íϽ#qÆ'íR[ݦÝû¾¾ ÿ�îTÐKmûÿ�ìl¤KUþtwûî¯Ã×þ?þÝ?$t'$sOf Üþ»ÔyêHëk6y?ç5hàþu3É×Þ¥ÜËó§ñ¯ÏMtoþüÇPùïÞzoªÝ!ùßüï¦Á»8ÏN:ÔFåAõã=¹¦XüªO²30?ãô xå<óUC¼\ò!&ÎïüåO»óUå£ççO¾Nÿ�gÏT ͸Oùçý×ÿ�}7ÖZ¨aãÞwÿ�ÿ�ÜJ¶ c?j@ äÿ�; 2H:÷õ¦äÏpoLSO�dc
ZÎ�㻢Cò>çÙòÀ?ا";üíþߦl21ÝÇ÷ÿ�ûôЩ}ôTÉÙýÍ.r;óþæþú§ÿ�û?\_øg¼ïD ¢>þñÇ©ä¹Îà©óûýÏ¿V>bzÿ�³Í7<¯?\Ô|ýïÖc¹í<Ìö#¿4íþÄwæüìÇæÇð|Ô¾t;þDªÿ�?ßÿ�ÇéÛölÈÞÿ�Á¶¦çô§ ®ooPØë×ü ¤�<òOår?Î)Á% ¸cf?à[ju\_Þ}àÏßýÚ«
òþtzHXn%úôÿ�¾êW\_çµQß °Ý·sÛéZ,¶i¤àÓnmмsíD¾VÆzñS¾Ö?{Ò±õ-|§#!L«>ã÷ýÓÊ&pÞÿ�Åÿ�¡ÔËE»æù}kH_åUyôé¡p3íT&®¿ùþUJKrHä/ZHÐ+N@Æy®B}6hú(þçÏUíÐyèíùö?û+°¹)~Br²îì [.7aÿ�³þ~åV¥£SZ¦0=kWøwð¹V¶ûßûçüÿ�¹Qìt6üÿ�Ùÿ�ñtåÿ�ßûLQQv¢¤hsHì\Oj±rí5/·!Q"7¾EmG÷Tà~_äÒnÈúþ¦¹1¦:ã·ãN$§5 ÆÁÇ©AÊ ôÇzÚÓÇú%º?ñ÷Æ?û:VTûAuÿ�ÿ�zØ;é>ÿ�~çû¯Vät^§÷c}?üG9¥zúöc?Ò@À=Lu5dddÀ§®Ï¹³þ>úr°ß?÷ÿ�ä¥Û³ýñþåGÆ6Hp7§ßzMÇ+ëO8û½FÀýqè1R×ßdUþµþt3³b|ÿ�³Õ·ØO¹Q[Êý þl¼?û[>ÿ�_ø0 9Q;w®xýi\r3ÇOÎìW§'9Ï)Úzc¯§jÐýVüé @Saß>Ôós÷·üøý-ï'ɼlû÷ÝW»ã£>ðÃøêgnx ¾gó¨ÚMêOOSÅWi 1éM.@QÁàZY²F:v©$ØäɳûôÛgD÷ÝSñ$týØ;å i<ÛýSÿ�©ú/¿oÿ�UgæëÎ~&¥79ltÁï×õÆ~¬1 ¹ûÁÿ�ìT!pKçÞ?ØÞïW6ý_ûL:I6Çù6?ñýÿ�øêÉúc?ÿ�^£ßÜô¥=?ÒÏNxZ}©Às×£8ý÷ÏÓý÷ÿ�ÙÓ÷ý¾þcýÊt¼AY7üõ"$ßwçMÿ�¿L<øruÏaA>ÜsI¹ôÿ�ëÑѳØS['°ÍA7ÈOüéÖßwùMßì|=F-bÿ�ϳþû¦Yñ)ÈáN¿ Aäcú÷¦iË9'ñÿ� uùýÞ=TlDÍI5f6&gnì ýh¶emnáwnHÓäþïü®Þ7¦Èñ/Ëÿ�íÿ�eè |۶Ǻ@ý¯þËWµ6caK÷îQw|Ûk2ïkB»ëÿ�Ö®rúU³Ç·Ló[wòíV'�.y®BíËÎÎÓÓ¿SYz¼È>m£?ÓùÕ[ëdXåÛA?OçX¥rhI^V@?ïqÿ�²p:´©&¡+ àëìu»·³ÒÑCFÈY\ÿ�zWV Æ pOAÚ¶OLU >0ª(°öE8ìOøÔFá"@¹b9À§ÙÆéä \_®I=&%räÇùÈÇã[aÇ)ÎÑ·Uù¿öZ¡¤ÛlÅîrF=WÛÑôÉîú
É?.~cÿ�Ån«vãÓ#Æ®]dÅ[´·½8ǹ5Jý¾cÏóÒ"Ý@4ù Ç9ÇjhÚbÉ//"Çå³½[Ó1bþùv}ÏürÎÚ=:Éc òªü¼3½Tí®n~÷ÍóûãïÕ¸Ôäû~cëRaDjAàÿ�ÓUJL�ÙõéCGRR?:|"r1ÿ�ë¡�UïRØ@ÆGmùÙò§ü ?ß-ª°++ÌþwÕ{Td·Q÷QU%ßýÿ�»RÌï!áÙw«/ý÷Lséï××j¹ãw£;ã§ù8__cQub{ gW$ñ¥zÜ|¿sçÆÿ�ïüõ º>_Íý´Ùò3µÃüö¥/µ:ýÿ�ïÿ�°ô dgëôëA#Û¥'SÈ#¿§:IïïKÐSàbösÏ÷ÿ�ÜûôëS/~JoßMó£ÿ�û%2WE\_9ËO¾ïüíÔsH'¯×ëT¥ïõ«·<ñ^¢¨ÉÔçÚíó§Æÿ�¼UÎsþ5$®ï½ÿ�?Ûÿ�~³¦}çÿ�J³¨J\_Þüö}ÿ�¾jÎÒ7ø>çþÏZ\¸ç¦=iÇ�ûõ#nN3ëHzãÇ=±J>UQqÅ\_°´ØÍ÷6~¦VHÏÈÿ�}ÓÉØsîS¬Ñ>Í¿ûéü 0ݰ'|¿ø6TÞn2m'·µ ÜÌ9ã?^¿þªjõÏ{tö§ eÏEî\PùÁv8ö©·�XñZ{÷ÑSdÜÿ�b£L´èwó»ýÿ�¿ÿ�ìUKpwpåþOäûÿ�Á÷?Ø«éÖTCïH¼>×·øSq·ñÒîzúqO8#9ÉéWè##à ÿ�ø?ør§óïù6o¡gGÙüütöØÿ�íýÏ( ûtüµ@)#åbmxÿ�xYws}Ú\HcY^ ùóxßþå¢òÀ=6Ò°9Æ~i©þ~§·ÿ�®uéNlÏAW«Áã¹c¼éÐ#«û:oü
>T;Ë/îð=õckÇ>Jý?øº·¿gÄ ÷\N¼cßõ�àmÏáKéÐrLôÏéVÎ1øTg8Èÿ�½òÿ�oÿ�ù)$TO<ÿ�ð zðS{ýÅùþK¿ý^ÿ�ürózî§×¸¦sÇ®=øãµùx9ì(V §4)Øæ£\_¯ß«G/üITrûåÛù>Oà§4¿¹>[ïþ¢sòãÖªÊ e×ÿ�UY|¿ëó»Ûÿ�QÇó0÷¨g9byüª+öÌ2'ð=Q]Ú4~~ý§;ùÿ�øþú@Ï6rý
\áw�1¿¥M�ßúÕxË9;»óùõ«(¤÷³D9'G9\ãµ>]ù³gßÿ�Ç)ªnÇÿ�³Õ{v{µpq¿þûûõ¢"uòÛ}DySÜãã7 Ç;9?\_ÿ�U5¹©ë×ñÍ5Çnõi½}»Ó¥ËÛ¿ñ¾Ï~Ï¿QügGþóÔÿ�?Ùþwçøÿ�ý60°Ã·>øú\:ÐÇÓëO#çx?N1þEDð©úzÕxWÎI#ûüÓÑåù??ß©voó?vïò8ÿ�~=°Äï÷6?ùJ
>ݪ)N#>ÿ�¥HzóéMu àz}:«>LGqKòÃûÎÝùþOàÙýÊÏ×.éî mi\_?îUÔåýïßÙ÷ÿ�ߨ5 e»Ô"FûëÇÜûÈ)²3ø¨5.xüJ±iOëþMT¿<àTã弤ùWq�1ô«úZ´ZlAï¦äݳøöSµ²Ë L¾óüßsîUÎ MýSïÿ�¿þ^²&ÞóÊÉålMøæúæõÙT|N~¿ZEóîøãmÏ®9÷ÿ�=«C]ï>U�=ÿ�¨ôXüé]Ý@ @^ý;ÖäÝßøüfÌ7\_Ç\$ ;-qÞ2»V0Û)=YËwqØO$ä×0¾UUã$ Ññ×Û5~êäv>ÜTz<K1±û¾g'å[¶ÍtDPmïÔþ=ê�Ýàfñðùb$Ãç#Ó¥]VE,¿½#Ðé¶fêó»?(û¿Åýêîì,àÓ¬¼¨Ïûlÿ�ïPðõ³ÓØmR®?ï·wtó6ÅO-Iw.ó» JN[ö#Çjäp8Ç'?
=Ý^³ÀþtF¦ÖÇÌ'\½¿ùÅTÔo(Þqäîcûô¼,·oånoº÷ÍC.ËÙ¾ÌY~qÿ�|ºÖìR$Tù?·ÿ�À\^{tþ§)%yöÇ\_|R60sÒ
Á ûqÆ;SóZV²Üõÿ�mö}Ê}ο?sgßÿ�oeX«r«Á±¼·ÿ�gäù6 ã'¹Èþtª 'úñÔÒ¨ùÛÏ·
>!ÀÁê}±Ò#É¥ ¹Æ2)¢=¨îÜ»ïOý�o5ý?Ûù>ûÔ±#áùÿ�Øù?à=ª|¨»bþóãø6ýÊsº¯=õÿ�"³n¥òÔÉßgéV-´}_óíY%·Ý»{SnÙ^úc°ïI"Adànõ©#¢lþÿ�ùJñ.¤Úu¼pZdvß¹òªÿ�þËøVô¯¶ ÌñùK»svëÇñök6¯©KtÇdr5þîåù?øªêNî3άÙ>3ßVeÛæPÈ¸æ¬Ø¹Ç°ªòÎÞÜëÿ�]6ËDêAÀà~]½¿²mÒà$î§þü?øõNýÿ�¾ÁóÖv¦Íu8aÜZ8vÿ�ïáþ·¦HÒØï>æû¿ÜÝZC
éP \ç8>´ô##9Ϧj7?1©ýZTSt¡°¨§9éÜ|Vs}"Bï÷}ö|ýú³i4Oj»çMÿ�¹¾³o÷²Cÿ�º·÷ÿ�ñúoW·\duéëLóÎWqϸíTüÃêhó=èg=1Ú¥xÜdmÇ¥]/^¾d7ÿ�ÜþýV{.Ïäÿ�¾Óø\¼ÙÛþ;§þ?Qm/ oH·ÿ�û\Ü�r? Cps}»Ñä ã4y+Øÿ�Jzg gµgï±WRõñG¿gÜÿ�cäªîYÑñóº}Íÿ�ÁU,ÿ�'ýöï÷\ETUGOÿ�þçð|õhóOéO}@ú3I\Gqÿ�סYxPI«(>PG÷© mé¼¾ø>wÿ�ä«8I~þýî'ɾ£ÓS{ùÏó§ñ§ßÿ�Çêg~ÞåÎ3ü¸éAëõ ¶onÿ�§¥&ò?<ÿ�H4ì0jH<Ï&I¯û'Ü¥¸ûøîõíXü·o¾òuþçÉÿ�R5Û§ý÷¿?çýq3Òäs9ÀëÞ×4£'õÏ×4ÐsÀÎiÏ�Óãÿ�³äó>å&ç7ù>}÷ÿ�«nhæÞïó¾ý\ktÿ�ñýçý½ôaúpOµ,d®zcnô0 ¿N¿ÖÊG^}úw¥IÀ7^´L³�ǯwºîænϹwÿ�b§²D?³gÎì:xá´³ßýÏ¿ÿ�³Ðom¥þ?ý¿¹üutàò=>óMõÇ>ùS@#'··ó§äwîr?²xäÓÃnÙl1.¿Ýãø~o¢<«ímÜ|ÿ� UxÑÓÌq÷÷?ô:´1÷¿÷'üÉÇÝÇ Ò°êOê}éßÃ}ÿ�J9÷¥<®sy§íÎy<Ñ.÷(?rSçG¥q½Ûÿ�i¿Û©sû¯1ý¿ürÈþúl_üv²¤ÉóÏãEhÉnvç=xÍF[r_åÆ�Ç5 ÇÍ&Wh�cÍêV+,´_:ÄWw¯ÎVìó©YîKn>æê)±¸®{ýƤ mÇÿ�ªª#ÐÇ·5 fÝïéRÇpÛT{c¢;È¿OZ¡biðq±!Oý¿øº´sÈÏÿ�±T¬T& >v<'î?ða«B5¥ùþÿ�÷je,F;ñ§©ùjhr2:ñøþT=ð=ZP'õ8SÆ)Ð<ÌOßoþ.¥øNvTQ+¯Ì Ãüð?ûÓý½ýÿ�ýç;qÒ ùªYO cU¦oql/´ óQÌÝsK»~Í¿r&ÏùmPÊÙ7ÿ�±%V¼¸< ËÙJÏ NzzÑÉ=xþ´ÕÉËÜô£?/ùëa%=J±<ìÇrðÄãÌ}ÿ�sûõ ¡Þoõ'þÔ¦[ï2åÿ�çû»Ûÿ�³ÙOr{c éÍZAÀëÛÓ¯o§ðÇ¥[©¤\&~§ ©ß<ý\õºpgÜO¹óÕÒ$ïÿ�÷>JËgÙ¾N&ÏîTƹ8ü1Q0%Î@ïR7ʸþtÒN~¼lÔröÇÒ¬ÉÛJDL>ßøÊ£:³Ë#ïùøêÄß"º/ûúDÍÛûÿ�;ÿ�±¾Àdw¾=±Uú'¹éÿ�ê©ø»þ¸¨dþ ÆsQ\÷èµ8E$ýj£¢&÷\_àûl%¸ãû³øßøê=FYaO\/+çûÿ�ìl[(ÞÚÁRsólGÜ©òS-[÷|öç>q.Ôi?/BiéÓô¬Na±ç rN};~¹¨®&G?uz.ëf=#BQ![|oÎïþV4MäiºÎðio¸ÍZ·¯æá>çþ9\ÿ�ä>U¤Ë8=q?ñêän¼¸çæÀÁês]hcX×3Ö±4ëq-dp2OçÇò®ãMa�ägVvÞó\}Üàgó5VÆ7H¥%põë^o1-4NIcϯ5ÛøKKT0M:È#ʲ:¾îGå\¦b÷ÚQ¢åAÜÄôßõD +qbRª6ÔçØÃÁïJx¹5}²H�dÔ²å@'ô©¥÷^LGcÄ©¿o÷+>]˳|»þ=[í·gþ=óÿ�üªiöNò;ú?Ü©Uv䦤,Oÿ�Zßyzcô×ÿ�R°EÛ/U«+µ}ùzVÏ?q?û ®Ëêvã%A»b:ñ c<àõmW�}ßcõR!Ï<zrx«ð03ϧëVË Ýiçô«^g gÝ÷"þ:±yy\_7Ü|y\´ ³ä?¸7¿ÉWaü|ÿ�Ýÿ�Çè¸}¼öÓ¡ªà÷éÓJ¯zþ\|g$g#=?:¡fÒrz�>Ò&6Ñ",[®;Z[ûM
VËu ð½E lù¿àfË©1qÎïàþ-¥$²-¥«Î@áwáÿ�ßUÏh¶×Ò\_ýB\_1Qsÿ�V¬Û~ïçòÕT·£§Ö³áãwVc¹W�9¯J¡^ÕVá÷NØ=0¼Ð¬8ÆúÖØÿ�clnò~û®åÝXq:Å¡bFþùM¿ñÄ«>#»?ÚÅ(ÝoÞùvÿ�½÷j¼L©lc5iM1½ºjê&Hã IBÇ©cüê/ÊÌy%OãYq¯ÉªÛýùkbòä·÷»ÕQ?ØûéYútEµ»©#û0ß±·5k0ÝvÎÿ�sø? \_ä}¨<ÒzzZmLxàò\#òðyèåeO¹±ÿ�ýù>åOptÎìûñüÁóÓ¥O3Ózìû\Þèû\_þK)3J4c\ÏáA�óÇ¥YwG¶Ø|sûéPnëüqìÙSÅþ¹ÿ�àiýÊsE²dþæÿ�ö?¹H)Y1^½=)@'ÐÅ3Üð=i\Å p¸\_'Wÿ�¾ßøþå×jð¢þëßGûÿ�:r¦®ÿ�ÜÈï±7ÿ�·Yxîþ5s²ïèu8|Ƕ3N/qïɪÆV'9õýiBH%EJcD\_\}jc2¢úÖÕ²:Û¦ÿ�÷\̨«³çþ=ÿ�=V|¯~Mûÿ�ñýõRò÷øñó£§ÿ�aRÒ.[ ùRg¯¡£=ÅD\;{w¨KÝxôõ©%hãùölýç»Éþàÿ�c}Aæ»ïq÷øþ¹òP²ÝÍÈsçÿ�ö)í0ÈÎ=\'ß®[ØÓØ\A¢\_íç5°+®qÒ´A s ¡}ïQÞêF$q÷ÿ�ýú¥ï溿Î?¿ÿ��ªw\Ò^meË«?ÊÑryźÃÔÜ[Aéÿ�ë¨ÙHPÞ§ü?ÆåbÈèxü°iIó$ óMgdoÞ 3Ͻ]ynNùä}!OgÈYÛù~{\yQìùöÿ�±ÿ�²|ôë»9mlCòLíþÇûFgiD\|Íòmù¾l¿¶·áùPÐñùf>wõ¥céA.6ö÷ÅXà̸9à À¸>Ø#¬ü×?ïÔÅ/¹7y¯ó|Ëÿ�©meO³B?¤MÏ\mä'üÔuéO=z uþt?ô¤r~jÚ¨ôÕ@>aÞHÁ ßO¿÷\VÀgùb\ïýüþtõeÁÝ¿ÅVÝæ0Çð}ê^P{{z\Fü¾´T-ç8§É ³ÇVéwDÑ3 s·ûËEYÛ°y6Ú\¬×éÅÌïûÿ�ï½VÓáO°@û>%?ÕþÛ<ã¹Nê}óQ>wsØT¾qM|ääb§ez櫾 õç4}ù?é¦úͼÞgùÿ�åu£¿ý_ÉòTÞ_÷Dz 'Àí@È=¸ÒN}I4§¡àj§<ñOêsÏZgpåÉû´þ b#Çç7Üù6ì÷ÄßßÞ7ú§Dÿ�úæõ ȳ{Q[ÛÓñ¥£¾{zÐ8!±î?:\gÖúÔ¼q"+ÿ�«ß°'û÷=~OîÛJ!æ|éü{ÿ�ûôè/Û8ûéÿ�}ÕÌ@þTà2[·½(Ûê@Æ? 3Éãßñ«j wÍJ };õ ªÃËO0oDéþåK üíÑßM³güÏ»zì/ñÿ�Àê#ÐäçåØû÷á>û|ÿ�ïÓ&WY
ùÙÿ�©n6¢;°þ7Ùÿ�|=2ãïýô§19ãàþ~õ/ß)ªgÐ÷¬éÌHî2:÷¦L>\ïÖ¤´u=i¶»
ÖPoݲNßÿ�n«Í¼ÉòIîU¥cýÄØÿ�ÇPýÃ<_ÆÓïÿ�CfÒ öþ«VFÆyP1úæªZ)ߥB8éQ°Ý+·rMIò-ÿ�?ýjɵæ±å£ lù¿ÜO¹] ´¿Ï 'þϾ ²mÄï¹Qêÿ�cØ©óü'ܨì~Tæ±üJXØäôÅmÄ6²¹ìù¦Þ@&#Ç'úÿ�ת·Ò[Ï(?|cëSî-×;HçÜT7!äxÛ;#ûõÌøåËØ&l@ t;p>\_nk¨#ÿ�·üø÷Õ?Ûý¾Èéå弫ÿ�ÙÖFnÑùÜXîÏ·a[7õïïìj;hP�¥ºùFÐxn¿>Ùq²µOÖîàDÉãäg×M= Àì ó¥bÃ)mìÀ9Ï×½t«µv©Zß÷Ï,ÃîÀúTq.Ó4Üm-
ãW3ÐÞÃiÈþ^ZPøNÝÿ�ÞùVFükjÑ#[4X× ±+ûÜ®7Mµ_ ©FÓ4UÝ÷w/Þÿ�¾v×|ê·ÿ�ÙþæÕ¬«³¹ò@Ïÿ�®n¢pwûÒÛúqPÙI-b×D\_?¥qÑ{Ks,{Ûÿ�}ÿ�ö5fÝ]5tvx·f©Itò^Etÿ�)ïl«òUoÖ5óæùÿ�öJh¥?i ÍO$[åõQ´ð}yëa¸¨Rp ïV4ÛYÖvÝÇÌÌìßÁ÷¿øºU2û#ì}¿'É¿e\_
÷I±>ý³&g£ç~Ï¿ýϾô´¢'joðqëS¢î^Iô¨� ¼±>ÔÏñÿ�ôJ>Û}ï³gÉO¢>ßàÙWíäÿ�Wýú³:ÑN?3 u?ÔÓj|£ÛiHB©�çÔÓJÍå#£mûÿ�ýÊéÑ!Ùÿ�S¦bÄ¿û;üRvDùßïý÷ù\}\ݸ!³íøÕHêÜ<ÏOzhbï»ý\¼d$×Þ«ÍrøÚ¯³ûÿ�ïì¦é©.ç¾ÄÙýÿ�¸õÓ.[/½7ûþÅj[/Ù,}èà?ÉþßürOjw¦÷¥l÷9æ¡l÷9æ×öI¾tùÓþQÝûMÿ�åê¤>vwþïÿ�ªlööQ»#¯ê)TíÎ1ì= !\ô8¡CdÛ¥"É'·J®Ó~ÿ�ãÞÿ�¾?§dfÓI[û÷ö=G-K/Éç&ò?þÏþý]¸ýèý¨£Õf(È#¾ô©ÈÇ#ùÕÕª
#üjS<°à{T°HîuÈ^]äH÷ìêþû«VjùÞwñýýsg÷) 7lîûÿ�=j!·Û÷ùÿ�Ðë&Tù¿úôØÓ(çÕ©)-¸pHúX¶Kc¿>XÈÏy· ¹¿ ¡ÅS Xݬ;Ùmãò¸ûV8È[{3¼JðÄ÷Îú°|«EkxÊî¿þϲB±ó|÷c?Íÿ��«ñd¹58ãì×ü±<Ëé}Ã×éVØ ¤rB!Æ'èm7Ãf¨é±ïïz¯9wØ~HÛýÿ�òõî\1Ï÷ÜßS ±Ø7üÅþêÔc©§?»üºT|ãqOjH¸Ï=©ÈO~Ô#¢ý÷© ?åþ÷j±ß· þÚUlûlÿ�½Í/Ý#ÓéíE4°ã}úQOYd.0Ni@¹§åÉþßóÏý'p»~ñÅ÷(¨;úÓ»}x¤X$öæäàvçßUEýÞsÛ¥WQû°sÛ¥eØoû®Ìªùÿ�¿÷EZoõ?ïü³û:wÿ�)ü
MqóÍå©'Ïþßߤê?¡úÒucøfùuý1MGZFê=)¨ô¦ýôéÿ��÷ê/õ×/±ùþæú¾\a>ø÷ù6TQ||é÷ê.Gïü¨bsÊð1Ç^¿ÓÞ·õ¦7Ô'FjOÌþ?ýKrîóÿ�¿u%æËù?vÿ�ÿ�dÙPe£ÿ�±ÿ�µ)HËÇøù|cå7Lýqßÿ�ê¤ýãßϵH$\þÅ@éæL?Vl>k?pàFdÇ'~Ïãùßÿ�ئX6|÷ãÈ?ûlNqü¨É㧯çP;güiåóʰco&§3 cúÖ¬+å§Q¿gþD«³Ìù>oùÿ�ïºîNvûtÅuÆ?ô _#óÿ�?/UüÆÇ G_Χ8úx#&¸çô©å´¿ð?óÿ�§Þ'üÿ�ª×²ÿ�oþû«hY>ýý·§ËBöÏøVtã¼O¥hÍɺþU1êN>ÕfÈ|À(Ï^jHag''fÿ�þ""ì÷Có§÷?ܧ¾ê5Éä;ïÿ�¾)ddó£Õ°?V'Ôøþ^OÓÚ¨'·lÛ5Aå@Í(A°d¿ïh¾þSzMiò®çÿ�sýahUØ!&ÇOàßYñÿ�¬Æ{Õ°ã#ÐñõbF�=?Ãõ«ÙÈǯLT|lpÀ¤RC´«©ìqDzù/,|÷çþ:¿=²Ê±îOî?Éþú}ÊËüqx¶L¿'÷ÿ�Üÿ�Çë^Yw®ÿ�¿÷6SpI¼ÿ�_ÖªIËþYþµqã}úÕ7l=½:ÒÊ=³I0ù8òj�¿+»®çØÿ�û?þ?T/?{té³b ÿ�à~µ7HügÏþßߪSDl½×ýqþz}2xç¯hlGNÄ}) Á=?Jü£¿g3Éàv¦Dèû§É½hÝÒ'Üüß{þôéNÜcäî:¹P]Ë·xÄ[ý´ªQ°ÈÀö«ñ ñëì@éT#ä;Ö¶sÈã¯áRÆ7Iǽ=;Uy_ö?oÜùÝêí¼N°dóò?û÷½¹A,Qÿ�>ßþ"· دó|Éþ×ü§ö!GQ¸ )È$±ôýjôÅBç°íéú×5ªNZécmÈ#îÏOÊtÅ4äü«ù5'4®Í&G×$[ìJÅñ]ÇÙ4®á FÇð±þøêÜR¯óçåOáþïþ?\OçkÍ^ËO%»¯¹cþ÷ÍM¥[pûa[$ªpséÅ%H2?f¢ØÈè3ÏåH±ÛÐãxYÄy.z{Uï Ù
µ[¦0ÙùOñî¥t7NÇØ»û%W°ÖÉ ¬\¦äÙþÝ-ýÒv~ûÓ}gbÌORJ:u¦zSmÚzsÒ¨F1·üö®^Þç²mß±v®Ïî¿ðU»EÍÕóíÜìÛñîgßþÇûtÛTÄ .ì33|éþ¥\_Iûé÷?ànAòÄú÷ú~UJJ¹.6\ ©!8ÍHã(Z¶!\_ÿ�]jÛñïoßx?í¹ÿ�|V]Ê$²¤¿½ùþÿ�ûÜ}çìï·ý¹ÿ�Ö|ÛÞ¿|û?àoüwQNè�çßúRRíÏ>§üiàesqP¢æ<ûU¨b?çÿ�ìÒ¦eÙo?)üû%2É?wýüÿ�Õ¿wo¿þÿ�ü]C/ÝnþõQ»}j̼gª{}j±ÜqÇj]²ØãÖ²µ ëóºõ¿ççª2Üî·ß÷ÿ�ÿ�Ø©o¥ÒDËòJ®g÷þíQò×ä;¥ÿ�Çv!Ø©ú±MsOþʧl¯,i.TG$ä~?o$Þ¯÷[þùû÷Íi]3¬gûèsÿ�@¢ÌF·vù¶7Ï÷?ÿ�بgͼKò'ûßþ µÓ: ö¥¥�cåíB®p3ÅSP9ÓÚºò7üÿ�ßÿ�¾éʼ$Ëþ®7DDÿ�oøÓþV uÙ°sþxÿ�ÊsøëAgÒóHÈëO|êqÇ^j5]Ä °�¨¢D}çïù;7Ô¾Oñÿ�SUþ}û!ýã¦ôûõvÒ-÷0¸\_Ýýÿ�ÞT±ÆOO\_~¼Òʸp=²{¨æxÅFO Ǹãó«EU"Ûqô©Ê
hã½MehÊxÇßÏWûÿ�=Iz32CþÆ÷þ=kå'¾MµVgýÔÓ7ñ'Ëÿ�}ÖT Þ´à\.1=sYðNN+Z$$\_EW´t(ï÷ipÏ$¿óÓ ö+×£K¸-Wïîù¾ooÉ]F¸eYDa6¢ßX:Bý¶vºÌ£sìùÿ�öJé>à $Äv¦Ê~21ÿ�õúÒmÎ;úSóÜÔnFÑNFåVj®IϵáW'(ò÷©SþÏïÒùA÷)åÿ�Ù©^JJyNMé±?ïw?ã½\QÒ¢V?ÏKþE3ß¡©!îrjfßü?ð=ÿ�îTË÷·où¿Ùÿ�~¡IÛí³þø«æû¹ùzðßøíG �¢´ã�dÿ�Oãÿ�«cïÔG?Ü'ðÍ4ÆYy梧ʪ(¨ZB%¿n?ýú)"»SßÒÿ�>>¹¤LSp?.1Ï~i«.=8ü)«/Ðf«éÿ�ëW{Éùÿ�!S:°l/«ï¨ìJ®i·ïy+ÿ� µK·gÏ?ÏHzi'©ïK·æ¤ÛîÆÎîGAIÎîGjdêÞÇùßï¿ñÓÚßbÿ�³ÓGÿ�éËÔð 0zçó4÷#áLbqÙþt>76y¨y¦ÜáîQ0O$ª^Qò|Íßßÿ�}½]¼týÛ£ãý¥rïoOþû¦tÿ�=¨SÔtÉÍõíǤ\_¼8çõÐNb£'Sþüÿ�ñËwÙ½?Õï}>y°dþòþMR/øù
ö|û7ÿ�}>z°Ý×Û
??Ðÿ�:¤[¶: ~íÍÈûÕid?ϳþRæ6Îß1þOøÏUfíÙ?gÉ÷êݪG^;TóÏ¥gXJNW=GNjäîÁëÎjGQ,¡<ãNPöàäóÅj·[\_'Çþå2@ùÉ¿¾ÿ�÷+;A½i¬v7Èÿ�Ýùë]-¾a÷Åg�wåW@lG?ãMò¿z0=3úU¬zò'®ÖÛCýîMMÆÏby"¹©ínµ ÃÛø?عUÇÙóÿ�ñtut?ïûó;ö4× ýjOÝ;&þ7ßþ~J\_%¤¹Ý²TýÍÀéOõÛÓýºdí·fß&9>Gùé9>Ý8ôéMläç×ÓùÓºuôõ£ÐþäSgëÖ¢pÇ~µÞçäù>çÉýÄÙ÷\
Îï568ïÿ�sÿ�C«ìá÷½6#ÿ�ãõÞü\lwßÿ��ÿ�)UÓ¯¥p sêqì\C2ócýµ er}:tãf(öÔÓ Héêimß³bB%i®ÿ�%~ï¾Ïöã}å3.ÁÝ~ýI( ÏÊ~O¹ò5[Uù8È�ÍaÛÄeêGùý+SSlF£$ wëN°®1ÜvªóɾtNv§ÌÀzÔLdá"Î=OJ\EÑ#·Ï\fªk·Î$$³ö\_óòÿ�ñ5ÑøçìÚ,bFÞª«ïS4K9,mbÄYÏλ~JN1ÿ�=ÿ� ϸc»iëü¥hOTöç¯JÍçáp=?:à êÇ ¶c\e
hCû¬îù×üÿ�ü°uˤڲT\_þ'øÿ�Ü®GòÉêÿ�r¹&Íö½S[wûaÛåOûãu]$mÀééíU]I')pý?Oð«!.y9'úQ°EG\sNòݸv+5òî¹+þÅE8ÞÏòöß÷êÝÞTh»ð}ÿ�î'ÿ�S\®òsç~óþÉQÌX©çøG¯cÅP~~\ØmÉdþ¨ËÐT²tJj ¼}°?¨¥]ím¿Áþßð?ÉYA¾Üý÷µäßöaº/ÞzüYcæ?çÞÁüu®¹çëÀïíMcǯ½($FIèxþT®z[ûħ^Ô~ï¯æ´-·ù29ó~ÿ�Èïÿ�±Mºôïÿ�·N¶p¶.ó}ϸÿ�øåMr=òî÷ÌT\äØqóùÓÞç< ÿ�ëRíQUgÿ�X§¹©-Ôà±~þªÃÔ1QòCÙµÿ�ßûÿ�û=Tÿ�¥®ï7ýwmûßîãõ¤ÙKxÓ~a/¿þ�FÖuv]ûöÿ�ý¥a~µYã$sÅYWg#·¿ÖEeä?¥YVT¸üé\�0F9{Gx$þ7û?ü«K§o( îv|îsîTþ|ÁÌ!·¿ûí¿ßÿ�ÇëFÁc{}[Ðãoû䲯)ËÇZعTd}ÞþÕ7ÊÇÕd rG,I£1ß>õÏÜYÏgù¿¾òFÿ�¿·çgzu²º|Þwëýÿ�~ÊÛ»hPlMûÿ�جtò¢<^GßÙÿ� U
?§~õ¥ ÷588¸ÁÏ9XFAëR:äz{V
ºïø>Oãþ:Ô5û1ýÿ�ê¬/¶4ù1¿øêú¶ÅÜóïOü~nîÛa½rÓZÜ_øÇÉ· ò¯û[ÎßüsjÕz(íÎ}M\0ÍW·ºñïÍYä¿áëAûtüªkUòÕF: tÙ#¶Ý?åÎïý÷GCPAæ¿<íõ<ßÌÙ®ßïSd= Umë?FÉäg¿ãÿ�ë5]ùÛ»Ðÿ�ΣGÉÀ9äÓ'{àS$o³·$Çäò~þ÷OûKÌ0?üÿ�ÛzØoH<ßóþ^¬ð?ñ«=OåþZ¬ðƬô©ÇGGs¸uéWßÊßÏþW§Uü_.ßóÿ�ª3:l_g«ÄmM¤ýÏþ"£È'Å»rz~TR
~~U>äRÞþôwùä¢åobvþåF ÿ�tS²sjò}�§¿§_çåQ/ÝàöýÐ3Ú¨X>Ý>Õþ}ù °3÷¾}û꽩ͣôÙ 'þ:)ó0Ë¡?yÿ�¿³ÿ�@ ÇÎýÐ? Òõlw=qõ¥Rºý3Í(äýx¥¯æß|û¿ã?ð:?åiÿ��ßLûólþ7ûû?ß©dlïÿ�sÏIw(?5#üöϽMuÑ@ÏòÕ¿$ã¨ã=i¿.)%º5Vëaø3Ïð|)×üýÍÿ�íÕþ¥Ta\_îÿ�¸ìQeóÚ>tù7ýúb9>õ\ñVg':NÎjýXÔÕLo~ûÿ�poÿ�;éÍï³÷'ÿ�|%E\_OzÐ<úãÏïÑôýh·èKC¡ªêû8ù?Ûÿ�}ú·>Ä¿÷ü¿©Ç÷äOö\ýÉkÿ�ãô ͼçR¸cÏ?ÿ�®£ÁFzñ×µ8·Ã:Ö¸Ï\ÔãtÎ÷þwÿ�ÐêØÌɳÏ÷ÿ�ýº£Æ2é¼eþO¿ü(dò\_àMKg¨=ÍgKÆ?^iÈF3ñÿ�ëV\´ª[eèFzO~èäûèÿ�ÆõááµþÇÏò%hACð©ÿ�÷ßÿ�aUîÑþÊÁ>C÷ S:Õè¹ùñ5E\ ®BõþµÉÎå=EG ´Xr½¬E»xÎÛ.÷þïÏ[:UûݦÉßçþýeÛùWÛî?ÜO¹üoU.UíoËùþo¾ô:¼ù#woj«$!ù°>^ e¼ç8= ÷q=9j°©µ}{UµgPÊsý+°daó¹þÅBª7ìHö|ÿ�ð ÏÒut6³ÿ�p·Zj@¹ÿ��þ F¸ëTÛ§ùö«Ì8ëÔôªNIeÉϽF«òãÔROQ
uÞO¿To>H~wÙþR´Êþïïý÷ûMß{&çßþÝ4úsK×}:S¶/Nþ¹§"îbj$]ÄU.¹säüÿ�üZU
Gûå?ýº¬Ãæ"|ìlQ }Ïãþý^Á Æß×ë@'÷ÿ�õR±ùr9îRsøÓNUG<Vù}@5dð çõ§toÊ;?¿þý³üïüþÅ$¯·Çó½åã{¶ÿ�ø6säÁÿ�$?ýñXãùúÕø¨ä=ªGtoN8ïZ1sØ ~yÅCïݺ×üûRºG3gÚ¹íoeÝüQ7ðkkWµd(výßö+.ÌoÔÚxÖFGù~OßãÔ(fá~_Á·mªºUÉÎáÏZ¥�ÏqÎ9«:ÝÇ|gÿ�¯Uÿ�×M%vêüè|È
H�vêk'Ä òú8 »û;üÕ_O%)#´O4»Øÿ�¶©Uu÷{ mó>Çÿ�ìÿ�ñÚÖ ·(Wçݳý¿øêó)ÆqëùÐr^ߥ üm<ôäÿ�úèÇC×ÓéRX2zÕ UZeå6îêßÿ�¾è²½}ЯÞO¹óý÷}wÛ¡û;H_î|òûu4p"ltù÷ìÙþTÓcn1ÍgË÷_¨Ï9ªõ?
G/DÆ:ãõ à¦?Ï5¢Q>ÎèËÅa³ì¹
Ýÿ�ßþ.·=w|û»VsïØï³ç«ù,ztÿ�<}i·íÖ_¼}/ëO¼Á>?׿53e¤$qòÕlHë¶´÷ÖßòÇîýúU¸q¦\¶Ïfôz['w¶ýçßOûÜÿ�n©Íç»ì>ß?ñüõ[Pq½8ªÖnÏ<_2êMÍì@´´¨Á±Ó§nsTmÆû÷ûå»Èvç5«Íö[!c?&?Û¨<7lµÉoºþö?öz§¯Ý7Ûj0+y\_Áº·l X´ÕU]®Á>úçëWg< uü\´ GÓÓ¾:UÀ>\_ùgWv ú¤¶<{Õèáý÷cýÊÐ6ºþçË÷ÿ�àNÄpàþçñìû¯·äù<ªÎÔ¦ÃO#çUmeù«KQ´ÜIÿ�ÕPYÚáó£>õ<&LsÔE!´>¿
aj!¹ù×þÏUWrÉ"lÞóãÿ�@«Ú3@ãcýÿ�÷\+Ähãzpÿ�í¿ß©´õç'è1üëH@ÅAn¸L¸ÿ�òhºË9àV $�ö¨¡Ä6üÖ®éé²Oølÿ�ÐêúáæÚ«Ç¥AnËè:|×?wæÿ�-S]Ý {g<scÕ{×>^çñüj+ pÌ{ýãõ÷¥ºû;jKPdgrqí:0ǧþ M¥îCvQ©wrR2±ü{7ûÿ�ð:ÊÑ xòÍÃÊ7Êÿ�ïÿ�·SI±Ûîq½Þ´£Xãå&Çw}ì«ò8j±ÎOLZYq{pk2IOáÚ( ò©É9ÇlT±Ü\¡�z}8©¢eIU&o²éÌ·¾Í»ßçÿ�ÇêĨ/Õ>G¬6ºóÿ�¸äÙüêp§=�ÿ�vüñÖÿ�×ϵ;�üÃ{w¨xïǽ@uóE¼3¼)¿î"ñua!x?òþýCkÓæ|ÿ�öç#ï6}ÿ�àþ:°{íãð©Æp:c¯áUWî{ÈàÛò«Ä·qëøÕÈI+Z1³ù({¾ÏþSa ¶cÙ÷÷?ðPEgDßçþùú�ªËþùÝM<¡_fÇËáS9(rX{t¦&{Ôé¼¾ôJ¡:²6ÿ�÷ßÌþåOÒ<(óÿ�}¿òSÚ]Òíßð?ü©¢N9éÞ® 8Èúfªøã®?ƪü«ççHË$v¢9ÐõªÓßgϳgñÕ¸Uñ½?ÜßUñ¿ïìûû?øº´"ÉD_~ÿ�ÿ�C§üxëýj¥Á�pp?©ÏyªÓ²ç°ÊÈõÅå0îx¥YQãç\?Ë÷÷¯þÏPêMûE;]Ê4§ÆÛGÍóÕk¡¾T/ü6·÷;$¶p=jåÃ<õü>$1
^ÈJÞwýËíùyþûûp¨fþûß÷ö}úµgÛ#éÇéKuGaÎ)-r¿¯ôëN¼<#ñÛ¦.µH ôª¿òïÎ=ëNÄ !$Þ|ñ÷w§þ9RLwÛ»·È\_eW²@É7zïþçߥ¾±ÊÛ9Má1òýÄûãïÖ2¡i=êGÐ)°Æ2N3ZPEÆH8ëôéUíÌz¹É¥_.'sdb ãIX(òÕÕýêí2ìo¹òlÙýϰô UfäçHÛìa0¤¾^würIúð}ø«0öëøõ
S¸ùx?ìô«,rÞÄ/ò«2Fr9'úTñ&Hä»I??Êßí|béG Jýÿ�øÿ�µ¢Mºù?ÜûLw<Ü}¿úf
nÐ@ÇóëW#¨^ìÇÀÜ8Á?j§<i²HYCd,O=3éU/]6¯ùÿ�/Vm¢x¢L|Îÿ�ýúìo¾¿»\ãîo«UKûîôàäçðªnäÆ>53d{ëT¤jÀÁÇo^ýê',#ÎpH5YòÁîiÍö»ül?ýÜÿ�ÇêÔ׺ÊüÜÿ�cýºOvüþö>ý+ìqÈÙýÿ�ãþ:&N;ªýkBá6{sÒ²å|±¨\wå¹&
n@fr3ÛU½iYFÏÿ� Is&ýMÞ¬Ã2Fwoù>}øåaÍ«ù³.ìïßþßÉVÐóïÒ®EÁðÏO¨ª{Ô¹8ëÓ¿4XàmíVÝ+úû×CªÁþîtÿ�ä«)òH>ýÿ�çîÀ+;&ò_wúôþ7JÔÑ1ÛíòÏVbÁÝ XïÒ«Eä{góëVzV^£îjA±¡O÷>ãÕ̦Ýò¶Ú¥nzwÙ¼Àþý_mòq÷~o÷j1ÉSí×S2O=ÿ�ÏãE=Bó¸Ó×h3�j$ùÌo×äûÛ(§£¤k½Ûç{üÿ�Àè¡HòÇùGò¨Üqùþ¿þºgÊSþÈÍC!ÈÆ9ª7îÀ#9îÆ}eغe[üÿ�rɪKáºÿ�øÿ�ÿ�·PÙnþÏ´nÞRnÿ�¾EItÛãtÙóÒ~éK×ÃóÎxüzRô8ëüóô¦+S«¿û>åHX7È}vßIT¾oÿ�ûd²:qö}ýaÿ�ýu =9ÿ�õóÁéÛ=ª³dÏ@i# 7ÔsëPN{sçýÏûMBvçæÿ�>ÿ�¦Ý~_ùi÷ö·U¾wçî#ÔLFy9=y§ì?ȧ÷þ~;Ôhy>ô 9'¨ª×gï{ýñ¾¯£ùÑgþY§§ÏT6;Íù?xl 2| ±Î~ÿ�Éüt/\þcò§wÖçÒôüj/8 PI�wªðyÛÿ�ï´ÿ�¾ÒýäoïÓ6üÛÿ�¹SÙCÆÄéüt¹Ï×Ðq×å=óÚ�x÷æ¦CèzÔÇI¿ûÿ�>úf<ÏÜ¿ñïþ |ë>OöþzøÉ²x úv~OSíM#åÖXäÒçiǨ¦ÚÄzFù^7þûÔÁÿ�Ñÿ�ç£ÿ�±PJ¹Gþý6 Ëïz¡q_·5@´ïù³ÇãïY¸Èõ¨§R¤ß=iQYAÓ¿ªÈÐÌî&ÿ�J£>|ÿ�}>MïþãÖåÜO»9þÿ�ûuÖ°´O¼&ï÷ö|ÿ�åÌ3c´à´R@ÃpûÄç°½jÜ2á²õªÑL~ã}µZ÷r½\ýúùK�®oßûèõ£"£ëþ±ßÉÿ��®MA/ßVÿ�ÐÑ+\_J¾ýîÍß!ÿ�Õ²2 tnàc§<Òç?Lã°:~OçJLuéÇò÷¥9¡÷¦Ct«§ß¸Ù²oãD)÷>mùfÏàØsÿ�§Ï ²|ÿ��ûr¢lßóÃòèíÔKÐ9$~ip1úÕEèyÉúw«c3ÇåSLrOÒ9ÇqWÜþ7tÿ�SÎÄú@ßê¿Ûÿ�®?ÇR´lÝòßJßJ¨y?Z³&G·Ö«£¶1jÒwüM$¼ÉzÓîÒR©ÙüþåR\_ï¿Üû-öô ïÙóÿ�6ùþ#¦Ê00zªjäÇn\ìa¶nÏ#¿~\£×jLù¾:U°I¶#»õ«R2#£ýý¬JÚ8¿øÿ�à ªÑÄ\_vv'Îÿ�ÇòVn¢ûnÑÏÜ}õ!#vqþsOÎÇÿ�^£ló«äÓî23þ÷\_ΩQgß·zoDûß÷ÝiýÁòöÊÉÎ|g ¿ÿ�?ÿ�êÊ}ÿ�÷\RxÏáhÎüzcµ9OÍÆ;ñìiù¿3SH9ïYǧ=éÓ?îwÿ�Û=õZßÚ.Ò¼ß}ölþ Ýîß'øþOö£ÿ�Òý·»ÒJ>UÇOʨIÔ8 zqèk>o¼ \_¸µqÕçÖ òO¹ÿ�|VÙDJÏ;ßýÇûõ¼ßêo÷kýÿ�Òvsfú»§GL?&¥¸è§öúÒiùÃcoãÖD´GcSõ ªxÍÀ�usM\éêu7²'û-&©Æ\ýÄtù¾Ïáÿ�~îúIoÜýú.bf·oÈþKÕH»Uëqã¨ëúU8S¦jìØÈúªñ® °ëµBp;Vnª°ìß÷>GÙZpüÿ�sï§ßÿ�Ç´qVÏ¿¿äOö7Õ»_õi]Äìé÷îo«÷3óíô¤ sÏá͵O\¾ßÔRH#Û¿Òõð¥^·?èÛÁÓý÷)$Hãh\_çÿ�üÔËcºÚ|66pü}ÏýjK´O.D8û§ïÿ�¹HÙÉ#n;ýéÜöþäR6zOlwÆi¤üð¤'¤u¤'§½2Mþs²ùEqò¯ñÿ�Iò=Ïùûå\9Kÿ�¬\_ú&ßãÙ¾#0?Íÿ�Ù(i2NáÎ1·ñVd²ääYeÉääÖª; UBç>ôõýÕÉ ÔÍF~wÇü<¯O>JÇ»½Ý t9÷üÿ��©ïnäLowùÞãû"Iï³?úC.Ýÿ�Ýûõ¤X©¤,Yy÷ýI¦ÄåëÇ|ÒÏçU¼àG>´ÃJ:½±ì×{¿Ïýúxò½»n?ßÿ�ÇÝê¬Mpyqu,¯ÓwÉü{êÏ k¿ñ¿þ8õÞ¬ÅÓÓµ$qúu« mÏ·áÒ¦w±%½ù¦T0¤Ë{äÕ+Ô.¶î¦6³ÿ�÷~ÿ�ÏþÅZÓ¬ÒÖDiSkÅhZØ÷ßþûùéóÞ$[Û"À>å"¾N8'Óe¿ ÜVZ¹Ï'«Q9#ÿ�õêiw G_¥6@�úóStùÈwþæÊá3'¾H¿²ÅõËÃþ¤TÚs3DÞv?ýú»qüÍMùT1ç÷ü½jQÐq×ó¥ÎÐ:ʯÆIÆlGæÆ~çñ½LYJ=2vüß/û5nòÝÔ|ÿ�÷Ç÷©4VWAµ>öÏøþõ7%FG^P½°;ôü(«¬GË#(ôQP�Äpì£ØTìí oA%CÆ<¥ÁÞ7/ürª_¡ü£×çÝ.?º>µ#ëùuª1boz\ùCéYö.ÿ�d´ùÿ�åÿ�èªK÷ýÇûg~ýÿ�%6ÍÐÿ�òÅ?ßè)×ê7E#þøûô¾cÏÝÏ4àzzQ¯¯×IÆ9éëRFÇÖ£$w?éOýßûüüõnå?¸Ypÿ�§ßÙÿ�m+GäÛóÿ�«þýOÛ?UbãþhMW9=ÈüqLPH>ǰ©nAéÔªé²?ãOàÿ�¾\
ÄÈ 'ü´ÿ�u¡7É÷SçÙU®üèöy?íºÀöT\~|}2?µÝãÛñõª«Ãøg¶\ÜC>Ù©,ó¸ÔWÙ xÏJß÷å?ÜÞð:¶¹òMçfÛþÿ�õªn»$^öoþ p&Ì¿ûe3§=ÿ� §wõ¦?\~0¾¿XN¤ÐTIËGj>çï?ÿ�è V7Ã&äïÕgM'oà« ù>Nïü~ÔúéÎF=³ÖãýiI¹õzc"¤=1õõ´K'ÜÞ÷Ý$¿¼Þ:üþý+ùf2UùMÿ�øý,®S»ûè̹?QLÏ,;ú÷§1ú:~0ê>´×'8ªÎ@¢Næí¥W/fA÷ÿ�¿üu,îcûïò}ÏøBaOß§ßýú.4|wè\Ź\Èîô9[ óÏ ª{Qp d¼Qn ÿ�^iò:L¨êx¸ÿ�÷ÅdHe®ôþ;ÿ�ß ZÈ~gFùûj ¡ýéþ ¤~åF:ø)ÁúÕÆÓ»Ô¬[±85ÏÝ®ò¿?ò2'Ϲ)°¶ÐWvĹýÊÑUÿ�H}ï°ÿ�ÖQ͵÷Ìÿ�$7þ9ÿ�ÄV\m n wýyß?Ñú U=ÝðsRc8+Æpëß8ë;·¥Ïñÿ�ãÿ�:Uj þÇÉýÊÊY<ÔûçÎDþÙQÜE,Ãí0y©w˱ö|ìÿ�ÀêøÎæà}zbJwtÏSú~u>å÷¥ÉÎiã!YR7ûÿ�ãÇüuGIÔ>×a½¿×'ÈßçþR�}ÿ�p'Îÿ�ØUõàóÛõàõ �?(ð;þþp9À=¿.iê3Ï¥D«Ó»cÍÃôMøþGûôø ï÷Ý)°ìwØ£îÿ�øå[ù·/Ì68û¿÷ÇÏHû»¯ãYîû³r}óß?Ê®LÓÏ^1ùÕ<õô>ÞÅA#Bò2sÏnåäD^;Ïÿ�ÕAÆÔÏ÷ÿ�àuÎ5ã]HÏ'ü,Ûÿ�þZûÊR÷ÓfÏûî©ZüÁßÿ�Üþã¾Ê±Ôc8r§~h'ºg×(£Ô �ØÎ{UD�{QyOtò~O¸ÿ�ð:¿ ù¶òe?Ûÿ�oç¦Jû:§Üßýÿ�ä§Áó¦õùÑÿ�àÁH2Ýíÿ�ë¥'¡£_qǵuÇÓÚ
Û4ª9¶j´¡oàûÿ�úY7ÜÙ7ûôdvûÿ�í§ÉþÅ>ÃýaO÷?Ø©&ÝíÉük.NXý+Vo p~ljË?
[Ó3JûFOpjo'ÿ�øf^l@þOür¶c>jqþ}þÅcÞ¦ûméóÿ�sþû«O1í c'¿ÓµOu÷Wj¶ü^¼Õ°0yøõ4ÙaûQ¶ò3íÚ¥ÒgùX ûÿ�ðà«Ýäù Òÿ�ãÔ9;Ýÿ�ø¸O+øþOï½g®7®=óV9©§/ÔûÕÈF_Ó§ZYA z±ß¥e®Ï6|ÿ�Çþæÿ�þ"µ"oÿ�ªe|ÿ�Cûÿ�ÇRZ&ùQölûþVúöã?§JIãéKÀüûSXÇcù}iï§5#ô?NkD|é¿ø~MØéür§M¹ÿ�bH§ÿ�±QN¬§äû¯ÿ�|¿J{sqúÕ'rXNA«NFÀ£µS|§L óO/==jQ÷]÷ïß³ÿ�¨e¸ÞÇæùÑêI¶%°Eþ ¡(û'ÈË>w¨}~b£Î}03úÓ³1IÛÏ·ËR[¶Øû¤öúU+Çû;¤hé?swñ§ûòwóÄÝÿ�ÿ�sýún>Ö4m¼ÿ�·ÿ��¦Ëî¿ØùàN=sIiOáGJ\g9ª )Î{T,Û'ó¯ñ¿ý÷@´ýö>ÿ�ßÿ�ïÒHÅ3óÅüu?îÆûüEX^OËßøÿ�úèÚr9ÆÃùÓsÏÒîoêiÊɰüªÚH@$d{f´lv=¶cìûÿ�ßÿ�öéÒÇmæïeùÑ7ÿ�ñúRùQÆÏ¬.©7ûÿ�&÷ÙMKn¹éf¤C 9'òªqx籩£¸c§QS»J½3éUhT�¸¥Õ~äyD}óZ+"©O)6Æý
g¥Ü¼^#øþJl28¶q÷ïCVÔü¸Î8Å= g§F£¯µ(�óÏZ8¥KÏC Ø[l/³ ²¬@ÀlPùÙòûïJ éæ'Îçù?¿WÕwF®«zÀ¾÷õ¦7Ýþ.zý(§õù{õëE åI?
ssøUi07úÒeX?o´9òÿ�üÿ�~
Gî{�hÏÌF:gó¡9qè)xÜ}zãñíPBãÐTC¢ãÐV]²·öDÛîB¯ÿ�h3ºlÿ�W¿þû§Yüú}®ßùäÈRáËõ/÷öÀÿ�¡ïRù3ü©aÎFyüûR@ÛØRƸê íKã¨ÏjiÀØêßøëFÑ÷¿ìUxdÎ÷¦ÿ�üÿ�±V-ãxSÉÿ�qÔì2HõãpÅNÝ? C¦)�:QS\t>Ô¥wÆéÓzü gÚFÌæ§}û2ù}>ç÷;§ÙþîÉ6Tc#iÏáRûÇý#lñ©G íÅwç¥CÆFjEÓÈ}ãËÿ�+Izîtù2?ñÊÍ&åþøºÓ_-þÇÉMÝÏr=iýÓðõ¦ç×ÒöúæNAÇ9IÁ$絸 ½çã{§÷êÏÜîÀ?¿Qù¾îT·N>þúoðçß§_Z2Cs×·ùúÒ)äô÷À¥=Î?©3ÀÅàbþYÇñýß¿ýú7:Jwã9ùÏûôËv¤FÀþýýEªð7ßgþçôÇ4åϨïùÓB ¤y®z{ÓÛÏz®F= %Ï]>zbþçÌìéü÷ÝLÛÖÿ�qO¹óÒ Xµ@zûT±u÷æ;F1ÃrXÙõ«3±Nq¾ÄwÙìõ£Jv|é³þóÕÌ·ÜþR[ºlÿ�¾Ý>zKF2h¹ÜþOûïeN¤äç©þf§ÌMTZäßÖÌsÐÅ>8ÁéZÐËå»þ[|ÿ�ð7«±º]Äò}÷¬ÔMZ'ñý÷ÿ�ÙêÕ«îNÿ�ó¾ º�(Ç ççT_¡öÿ�ëÕÙzô=Z¢ýMBäùå±Û¥^+! øTzÎõµ¿sçÞßwø>ÿ�ý÷T¤fåû'ñÿ�·ZÈYÕ[[ìÞ÷Þ²ï!ý´þïÕçPß.>¿Ó¥'4ªÄU(Ü{Ô°Ü;üÏæ¿ñýÿ�Á:!Ûû7ÿ�ûr³¾uý´ý¦6Kþÿ�ɳïÕ²{àcäq¿ûþ´?9öÅïïM'¡÷«S:9ß²O¿Lÿ�hOgßÿ�ºRÄû<ÌÜãïÔeÝ?Ütùÿ�ØÙVp[v;uIÉõÇ�ýjÙi=ñJ¦Ã}ª~J ddSî2ËùÖêþô>ÏàûéY7³?~}"HíÖïû6ÿ�ãÙ¿oܪRÃÇÏ÷ÿ�wSXUzñÇéV¥û¼dsÉúÕ]?;O9vþÌà6ë¸éëR[Ǫ Öþäòøå_é¶Tþó¿T´A³Oß÷Ó~ýð Ñù%¿ÜtJ1ϯÔ!ÃðËk®14Á'ø?ô§¶AÇJpL7Òª2.Sçý}ÿ�÷Ñê{5&Ù/ÊÑý>çÉRλvm?}ê8~Yÿ�åñãlvÈïc0ç¯ÍÇãÒÎðGéL|ç=ñÏY8^ý;ÕµBo_vÌmûÕïýèÙÏ÷þåIóQ°díeÿ�ǽÆýáÇßÚw~ë;e%Ë|¬¹ìÓÚÊAÎ21ßéQ}X(©Xc!qYÿ�gUÿ�«Íæüãï:÷þJÜ:|1|îûMçaù?Üÿ�b¥òíbxÉüîVaFÎBÒÜ ü«Co9ö=óïÓ¿H© 9óýk¯Yd ßÝãýÿ�þ.¾c²»ìvûük©7quÎôùÒ«Ë:ÅÞù?ßwßû¢Ú¹4ãi ëy£í;#]3ãü?n�¸ûTHUiç±JÁµñÛÿ�¾äOóÿ�ÄU¹í/W~åÊ7ÏüoýúWÕ#ý\JÛäÿ�?%E4²ÝL!q¿gɱ?ïdjV£R ôØ¢féz(@\ûûþ§éN]Òr3:L'~~�àR¹Rñ3ì÷þê$ó¡ßÿ�§ÛZ\]åÙýï¾ÿ�#Ö´6 Él¾C|}ÿ�ܧDN:Ì;£éþM@)㯷j²¸ß×9'¥]´ ÉäÝÈÊ'8Ïhiïl¯üoVJ±h!I;ýßòõXî-ÛgðUÒ{ nß»îÒ.p1Ô{öæ`îoÀÑVPíP üqP¯Ê0I8ÛO¾¿ígåù±EHP+dú+QP§úµïÀ÷é¤ãÄzT}õ¥Ûó{ñú©@8ªP8²lÿ�äoü¹N£ztjY¼±¼ÿ�¾éþÝ:É6éÐ=aOýªCï£ÞÜù/þ?²}òO<óLÓ¯ãLaÎp=?Ï<??Êûrdìiánä¾s¿çÙWä(÷>ÿ�ü©Î}á=Üüÿ�ô:¸Sù¸ÿ�TÇÇ¡ø@ü¿üÀ j4áXlô©n8nͬ"&Ϲÿ�²Sn1¢ßð:{E³ï¾?»´T7óÏïÔ|}Gü8ëÞ9ÇáNÀÚ}¿\ÏõªêÏõª9wòÿ�ßä«ûÑùyãªþ\¢hãQ&Ï¢Uöy8ûÿ�Àè^[©ÍõüÏÖTóÇ8'¯½&yÀ'w?JxùWɧɢáÓ?%K(Oïÿ�Àÿ�ÏûôÈ!oÌk¼«·Þÿ�n¿÷ÞR; °ÿ�/ðR~yãô)éüϵ0e?7Öc·Lý\Pß6GëJÖ¬H©ß?>ÿ�äþ:|.×ûíÿ�ب£ß'Þýçûô&ݸpÈáÿ�Ü©8ç<^ Í;i¨ ×¥=¹ª·#°üi~OÈóÓîUyUÜ=Mòañjw
¿÷)ß?äÓüçù4§¶2yãÜûÓX1ê?ÏåN'»ÎOZYzI¿§þÏOWÙpû?çzB¥]Yy¾^ÆGÿ�n¡ØlÙÇÎçþøª¯%Wqë¨àgõ®FãþB©çùÿ�oýº³uùòI|Ô]©þÚTN¾\MæÍÛàø&häÚTr竦@'±?QNË?¥38ã4½qèúÔ)¥Vöæ¯Èñ#¢LûþG÷Ò¬ÍçcýÍÿ�øåPXáܧá_ür§Tåàïÿ�ãòr�<éÍ#Øàÿ�ëK»rG>£ÃÁnÕ#aóCO8t?ί³U_ö>z©¨Ä6G.ßÿ�üÿ�¿RC(Ýc+ÊíhþOàMµ,¼#ÅÙÿ�åðVRFGJ°¿(©åËc @Ä{Ì2¶Öàæ#(Øn8¬AûÙw«}ýsýÿ�¹O!ÏïçDß¾{mö[×áeþöàu5³´Ùyþ÷ûuk¶}1Í/Lú§ÜSzS<èGOZUäã½ r@ïV9û>ýsgÏN\_¿Îÿ�í¥SãØîV«Ðqw@~GAò|=H§ à
1ðrzû÷éR.BúóÈüx¦ì3Þ§ÙÆ\îøÀíéZ°2%¿Éþ¥?+6ùdwûÿ�íÿ�ÜwyY óüß÷ßÉQO·UñænCuè=:U\n«Z¯À%¹ïÞ1úÔás×§éQ[.cRz\-\Hå¶\pØÝûµ£ådÎT´xRíG3orw>~zÒue
m¼.ßüz£~½jçñæªJ)ÀèF§Éçïvôÿ�9§ì,Á¹ý¥7"7ÜÝýÿ�øC�eûÿ�}>}õ$q±6Fä/ÝuØS,;Ç÷
þïùÝLsq VBÄ\ò?¦\YH�Lw¢uÙuÏW˨ÙUêE>WÜJ©\_jß+§ÈÕVk§üùãÏþ9² »¿ '%гmþ/§XRÞßæ#vüüÿ�ïÒôÏÿ�®¤ëPCHHEúÿ�Óv)~})¼·§©¦Øùp=Í/+¿ÿ�Û¦\j0Sßß±öRH³ÝnH#+¿¸öuµ¶l}̧ûT»AØÎ0zÓ.xõí@#rOri'o¾ÙÍF\H0ÎzöéUcÔRsþ³~Äù\ë+|ÿ�ß¿þÅn¤6ì)&ün\_»RF F\¤?ñ°¬AÆ \Or;TOÜ»ëÏó¨Å²àgßù eÊ~9¥1$E}ì ç¥}غ³Hùó[û¿ùÙYå¨5¶x»~}Í]=Ú#³©lþQE¥@÷øV=¼,n«fÚ<úÿ�Y©<^TGN{ñNÛ´ÙélvÁHÏ87®Üî z×3¦YMåêlÞjÿ�nÛi}ZTßçùßÿ�ÛzÔHmàXö# þøþJ²bPUB�þæúã§ÔáзNùÅ:dcëGðzàý1ÿ�ë©e#�?:P8�ñPÀR¹ò'Éüø°ÊY|¬?/ñoÙ@µQË»ËWb~p°iWãøvÿ�ûTõéýÿ�/þ½?¢ôÇ·çM9þt×§·¥L(=p8éÒ¢O>1Q÷Ïüÿ�³«v>oû÷ÝBûûãøêI ÆüÎ>_îTZ(ä:MdíÀSNá÷CcØTC>aéóßTRáÌxL<µÿÙ endstream endobj 16 0 obj <>stream ÿØÿî�Adobe�d�����ÿÛ�C� $, !$4.763.22:ASF:=N>22HbINVX]^]8EfmeZlS[]YÿÀ�ZMC"�M�Y�K"�ÿÄ����������� ÿÄ�µ���}�!1AQa"q2¡#B±ÁRÑð$3br %&'()456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáãäåæçèéêñòóôõö÷øùúÿÚ�C�M�Y�K��?�ój(¢¼Ú¼Ú¼Ú(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢HËnqôÆi@É¥&(¢£¢¯\Z;�È'¯j Ò®e'rQÜÔg¾ÕFo ©>Ï)}ªßAEQTh³¢¢ã,Üݪhl-ã]øëS.1l6êje°6êh¢+¢º/ìërÛUPgûÜò6cëÐÓ¿³fõ_J_ìé}V(¢¹Ú+¡m2ÕÔ»[Ú«&&S²Bu¦¶2ôÚßCMk ¦Öú(¢Ç¢¯¶(#k=iˤ\áw ûÇ b¢û,äàDÇè?²ÏØýQEgQWÝ,£Ë<1ÉÏÒ¡hwÈ :S&_¥1¢e÷úQET4PAF(¦S(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(«¶6cqØbª ˨Î2z×Oeû6U2Ç5jÜO)Ï!yÅZ±M)ÏEçQELèaÝY\È<:»o§ÛÇAÉJ¥5Ѳgßi>Þøëϸ«ÈÖ9"!»ó«¨Ö9"1»ó¢(ExálG߯ÿ�ªöÇÙ5oÒöÇÞãëOþÐ =)ßo =(¢+zg>V@ÿ�Ò£ÆqÀSÜÿ�ZÄóÛÖ·,ð) ò³d!½VlEQ[éx ãýð¤DÙ@ûTõáY tääUËÌ9bGz.ðy>çN(ø<(¢ÐkhNçVôzT\ðù·QÍ>==ò¡³i謪Täãõ©ÄR¾ ¨=êo\FÁXG½QéK´î}»ç vm\ÊIä1eõÕHÛ æ²TBæ4#Ôf²TBåQJ)@ɡԣzÓÙæXó÷O³îôg3Ç9 óÁû¾Øüªìvìx\ªh®ZÌÈt$ F'¨?Åê)f üYÿ� J\qLr0VÉPG¡®:æÝãÎã#m=JúÕZî®ìàºFeQpOJäµ &µ|òG5¨éÏjw©Ý¨¬BÁíàw'¨¦ÑN %p¥6©QJÈzö¤¬ú¡EQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE©÷×ëZOtÞPIÛüê.ÁûÔ¹&¦HÝÖ¦HÝÖ(¢'é@'±¤ô¹KEQFN}E&8ààRãôc:QEQE ÎiÊÀ6 ((Q@Å(ÅQEXne®NX¾ÌìÉ»nI®~Ñ2ã}k£´B°î°äÖÆ§ylÇqZÚRå°Åô�ç#8÷¦S8ÎxÎ _¡ pG~9¥ ÁÎ@éÛÈg ¶68+ÇÖ¬©%xãÀ|ØþV�÷ÏjÚÌO=óÚ¦NT:)äwàÓdAÓéMI6àtÁ©ñÊI^8À5Rݱ,s´^süêòÌ[sz°ö¡rqÃÖ¤hÒH²T1ëRÇm"£!#¹ÁïÍI»ª2=p{óPF@Ï]ݪGq"ª°ÁïVçÓÌ9Êä°Ï ¾EXxbÔ>Äf Ŀֲ)b\Ôöd%|î{Õ¹,£ûÀ¶=Ò °
<gó¨þÌPm(_Qý?³d�/¨¬t^ èúS[Ø"[¥^OUÐîJbÜäg¿CTãÅ!À\þUÏkäͲHKFFAs]¤¯k,yn æ²oí>Ðm&.GoVÔìwZÕû©?ªúëbº·u#ð5[aI ?Ê}úSbÁû©´«efPAqÏnkTÁXüØÕI8+²5ڿΡ«WöOe6Æ;'ª×(u¬ ¼cÒ¹)C¬
daÆ=\\(¢(¢L¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢\HT3óÐ Ôu<# SNAäaEQN+Ö¤T'ãH«Ï9«q®ÑÞÆ¬F¥On4QE\§4m÷üªÓ Ü0)»?»ù¤ò°jO+ÑETry¥ÙØT2N8#Ú¦iDT¢\(¢¬T¢#ù¸Î\ÉLsÚ;ëíOåñX (¢±fS+0ÈsÞ·òl¸,z?Σ·²[�nÇìi-Ñvõ�Ü´íö «:VÕ¬/o°XpqÒví=r{bBã=©I8ëQÝÀèé(,¹ôÏ>¿J5,HËÜrsÌU1¸GË»×ޣȽ6°ô5Û~ð´8Üõ9·ýáh°ÀõïC£( A�ô4 ÜØêO¾?XFá£9GÈOcïúÓc¶2;zÒ"ÊXÃ"cûäjxg V-Ô Sky ¹\_2W0±ÀùGÖĪÈ@&?+)SÈlJ|r4dðÊTòXÛ!YH¶¸ò¦Båï«ÉÄÀ9 zgA×è#åÊ1Û$©Cb;µSG¹ÊÏO}
^T¸,vïØVä-ö"ÏÀ¸LsÚ¬<O»û,´[iØ[í;X(,àsM¼Ò-ÚGkÙGÞrÁ÷Z£à}PÛÊð;£,¹è£×ð5¯©An÷Ñ=É6ÑLi;ä9õEÄbC\¨Æ\_#\Iö )&@Hê:UËÄHq}\µÄ>Z}jµÄ>ZòôBy®bkg³Vómàßïy£'Ó©MíÛäw»'Õ¾mi,j+#E´:¸F!N9Ès7f Ø8£Tî\uõÏò®O\·KÉ Ä¯÷¶ñçg¶hyÎåõÛk¶Öû¢ $^¨o¸ÓfvO\{W®ÛùWlYæçr?\ãu¸<«¦,£ssÄVòµeÀ%¸ +ÒXe Æiuöì&zGPiuöì.zGPj¸päèTóM' Ù÷«wqbÚvOE<¥[1N¿hQ"r?\ÒÚD¸n6õ9®ni ( ?(ÆãWí.ÖicGÿ�W9=éö· ãqUoZuØ£8ÜHÇ·I0ÆÒpsWfÚÌ>TW©³ªDYv¿+ vQÈèjçS+»úTkpnï¤c 3ØzÖ° ;ÜßûT ý§|NÕþ>Æ¥íÝ Ú¿ÅØÓå0®@ÎE9Û̸ÏAéVf¶6öûäÆçù@î1×úRéÒÃ/ÊqZHë8!9ÿ�ç-ÜÁ6ÒAGkiò .[åù²OJ·§]eV&�w µ§Üä,D�;H¸·oî~uÐÚ\¦©æÍÉD(ZUÇËç9ÿ�xWWèzÖ¶0Iã.ʨî.~\qÖ¯<
ÈõÏ8ô¬ËUV.>R:Z2¸P lb¬MX\yvÌ0Sq 9©µQfñ×Û6 ÃÊË øÀÀý1[×Z³è lÞX÷û?ºk¹>úìòÇÖºÙ0F«o3+=OÔXZÌPEx«k&äd ò·§ò?Vi¥9aU½þ¸öo´2áãë]lhí ±Ü¹ÎëñïyÇ=ÅrÖùmRFÝòd÷«Ö7Él²6~SãµSy^E!ÀfÅÞ¢£´V]QXUEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEféQ±¸=ë}¬J.m>ÍÛÌ%Q§8®êê=[Mrªßºþ"FAô5¢Å É8£xbµtx¢dMÉQ¢(«Q!ÖQ°Ý» z{Õ+<É'�1V®t\¼Uý¤\>ðëè]Wj¹º};FêılsÚºM?HæÈ±lsÚ«ÇJáQKØT²YÜF2Ñ0ã½áЪFÀãô«ë{s°U©cÎIú×ÜÛK Sas¸ d÷®ÒÊ6²í'¦GZÍDóPj¥Æ<2ÜQÜU[h¤&3¸£¸¯ ¢ºÝWC¶¤V¶(vÎÁüë&ëA Yã|pMf.î0MNUqNO¡Ï8µ9°Û¶ñúÔ O^ zSLOÄA÷íM1bÔ \Í©c ¹«$m}iTÀÕ§e"ÛîÜ®cu8dþ}}EfwbÞuøäSþÏLUÔØÖæVäúU)-Ñ< õ=jÕ´F[cFãojr[Î Ø«M8÷DJê=}jÓFfDÝ\W¨õõ)4é.¤Ägç'9\_ÿ�\_ô¬ï É ÎÀ=\í£\ÙKdÏ?wÛñ§®¨B¾Q(Çü²[O|=1õ¤¶Óc-ÔätÕ §8b0)b2XçiqW\vI¨Æeb§häËò\_im¤t6Ï,þPá³í[ZKs,cc\¬0:Ú¶Ré°¤î]Ó?ªÚýS±B©ïÞ »/#ùMþèúÖÌqÉ.X\SÄ÷¦]ØFÑ4a÷;ÓÀ©ä°snÞP!:àñaSIbæÝ¼ BuÁã>±M»Á60@ìj)ÚBG\ö®¢ÇO½ÔCÌÁ¶Ó4 {þµ.«áÛ{hÄ\«×p"?"±=½z~Î\ñ&UÇÐU«¡TLÌê§îïþOáW.4m²DÕ@<}j8´ìûÕ¤CÀ §§ãTVÆê+¢L$àNý?¥R[+¨®IòI9ÁúJä2qÒ§µh@fRè:¨8Ïùþ«¨øf÷OÞe0xÇçñ>Ô$¸8Q[vÃ
qÁÎ8õü\åÜë6Ør;óÆ?Ê
Ð:ªÜäuªÓÙ]FSqàüêY,ÑÚ[¾\_^8«¯,3à8=I�ÿ�<ÕÇÖV3qÜ�Z±¬j1ß$VðÇòG×ë×üækk5²IFÅÉ'k÷" »Ðu 9DMÞ[ËÀõÆR 5Å$|ïéW¢¶]ìÛ=Mq^\¬ûÔ®ÐØ#¾}uçPsdgònÜçmq#¹{%Rq0<óY^#{s¦ìïqÖg^§lO¼~aÆ3Zºv÷g19çô¬iÙ}+aõk©,Yü¢ü öúµ#»u'&°h¢ãë¦ÑEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEiiZö)\£÷¬Ú½kE@2ZÕ¤IÃDÅ\p©ZD4LUú(§+²gk¸ã¸¦Ñ]_æÁóú×Hn +,!qÍVñ¡¹$pjꬵfÓHz÷Öº{=Q¬"Hz÷X±Awà)Íu±ø·}¼x,súÅQ]äw±dÊ î3Ú6 nû$ç3n#ÔU´m̨µÓSóå~µª0(À$cõ®úÓÄöCMºKQt�E²ØùON ý£Y¬çXùÇÙÞB̧Øã§¶kYH#Õ2J1û@ãÖ´ÝÕk)ß½c_©RH�ö©eÕQcØ=²:U7§]ÅLuÿ�>µ^þî)×j6æÇP:U{ë¨ç]¨Û@é]EÝÜ3Ú&ÖUä³ôǧáí\¥Òl3ØäUÉ5y^ØCÁ
,2V³Ù±ÍgÈXIÀµfÓ®IúJÖ¬\°Èüø«BªØàöïY\ZÎ'äÓhúR[\"Æ7 w«¢xyIÞ:3æ¡»ò$I;óÜwükR[f
IO&·lõå67ªãkÃ5·g~<¶ÁMÊ1µáèt½JÚÞ MÙ'LéàÖ4¸´Òæõ~êKbN01Û¨'ÓÞ¼öÚàÛÈ Àà÷¨]BúÒæÚEs!cæ±ã=ÿ�ÀUÌÛ'�àÕÔh>Ò�eÆ88ã=9ªnUÀxùFJô4Çe.¹[=êÜS}v«ád¿JµÞB\á\_6O¥jxT<^ahØ»yB'àHÌÏÚº{Yts¯¬qOSXØ!\ ªNxÎÓ#5ËÝy7;%ã\_"?5�«.ó õ?¥Tºx¥º{tkHe;R2I�çz²ß3yAö\¯&¥g A$ óïYR¼W0#¯øçÝoÅ"Þ\É"Á#¦:b
»UÓ�8Î 1ÓÐO¶äiév,ímG°Þù#éØsÓ÷+N9í¢w) hÆBpAêO©ºzû q:ÅäöúµéeäÉI9ûÓàÔ·émʸ^¸ìÇôd PÌ¥V�~èÿ�&9b·8<òÕ¬Ín
ùX¢¬<Ñ1ÚTÿ�·ý+J'/¼ y Ýÿ�^´"rñ«Ä Øÿ�õëÑlã¸ÞMR&¶R¸UhòsäG?üxÎM-ö¢Û«4«#9Ý,ÜcëXº«&nÖrOÜMà4xç ãn\èéÓ?ÐKÍÁÉ\_U{«¨Ì¸Q¸· Gò¬k»Y®±¼)Lýùà+BGHØ+¯äÆÏDE k.ïmã0@ Bð?̺ÛvÄNà�9øÖ½+&Ó6éVêdi[l0[¿¦GJ.¬o®ÒgÈ å¿Ýî Ö»¸·¶¹X.¡;7e5ÚO<0^;~b=N h\ÆobAt%¯\¯òÍfƪBÇ1/µK(>ÊóDªW×Y'»»-å N:õúÕ}ZU{W
PùÎW9¬Kåk TWËÉúgµc^¬sXʤ9̼§µröì¦TK¦i ã" ¹ïÌ(?3ÇçVn%û}Ù8RÚÆÕ<(÷=ÍAq2°òR±§Þ¼þ·snFH$<9R¸·Bë\{¡FÃuªôQEQE6EQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQNEÜÞ½oéÇZÆ
7� ry®Ò# J]p uÅhépîqõ¡¦EºMÄp;ÑES¤
£8ïTf$ñ½i-óÛãØ÷«70 m maÖµÝ'F1±,£$bµÆÄ#QJ )Jü½ñT¹Çå®wHÍ#¨Ë94Ù}A÷Ñ[ná×èUÚÎx$yÒÇ)´QJ95îy$ÖµmNsÉö§¬JÆ3OÏr:sµol"$±É«0[XäÒSf¸4¹õíJðª¹5Zæñmbf£"β«#68QÀϽ ̲ƺ¶rÍR¹,¹8o\dR9,¿¹8>¸È³Qõ¡2fzç8¤V8�÷ ¡òà |PBby'BÍ+sÀæ¦ÝÖð-ãòÿ�wÜTé1¶Awíõ©"ópÎálséØ X BSæf s¸¾¼ýic
NYä¾¼ýi½#;»¥¸¸ Ñ:¼U;zÿ�Pí!QcôýMJ9Fl+HGA?½blÎÀeÈ
í y#IØòl}+ëShÛl__æ+XeAS¿=ÄVÑ¢Ê2<§5¹á£ÄÜÅÃ$%['¡þ¸¨m,VF_1NôRØàuÇn¿Zåü»utq¡x#1Æ?Ò²åDZQüë _2l0QÁÅdî/ñ+=.'pdm±øÚÑíåÄÍò
áAïÁ?Ò©ÜÆ«K¤hÀoA×#øÔ±ïÎÉ$QÅA$kó�äö®
¡÷$a1ÏÐþU¾ÈÑEûà 0c¡ü««·Ðõl,\_òKjs$R6B°�r:sÆÜøÚk%sökÄÀa"¯êrGÔÖ
¡UºÜ6×vÁ¥ÉdùXqëɬËý>Ø£ÝY%sÇ ý\+]@d.ºd~5FØ)}£I<ç ãÚ¯w(B·^µBfÉ8eèZ¡<2¼É'p:þ5FxdyO,àu'ük#\kUfµæØgË#hhøÏßæP[¯|W/¤Ç·B1mÙÄK)Áîô®´øzøÀñE2ü±·#nr@êzã&³¢ðÌúl,²FÆ8°XH¦Kn ~ñþP3òñ\ö¸ÏöbDi2ØÉ®Ù@ äþÏxT{)RF°ïYzÐAg&Òå=úûf³uÒM¤/Ê{õöÍR¾Ñã¶?é·JaT,<}0Es7 !lü¢º«L¬eÕܧv5Ì]Êeî'åà ô®á¤2²ÈIÁéàï|ãcÀ?ß<ÏzáïIç½W¢(¢)´Ú(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢)ʹ8õé@ ÑER&.MNü2{÷ëëVËyË31éR¤,ÿ�tdÔ© ?Ý¢(ªà£æ'°¤Ç=+GìmàFvü)ÍdÝòF #¯øS¾Êøû¦ögÇÝ4QEÃw{8ï (ÀBÝ»èá£ñ³û W g¥¬J<È#?ùÍwväÛ
|sAæ»/ «,-Äq¨Q÷¶ò~¾µ×xaYbh®#E >öÞ¿_ZØBdýñ!{z~5ÚXiÖ3YÆoÿ�W üÀ{ÃW{áÛøô½+e×Ë! 8sU§Ñ,CéUMO˵4#h<Ö«\Ÿ�0sZÄ7÷,êFWu\_" w6'ä F8÷«º w6°§çqïQj ÓÑCÙê~g]ѲàLzçu«A°ÀÑ´oYXãêe×lÑù"Ìár\_Ðç¸ÍNêmCPR]&«íÃdåS¢¸Æyèj;\1H>aúúÕ
\6v¦²!P@lp{zVDJ j§E~,dãOùÿ�ëÔ
[ïmè ¤UÚqÍ]XÏÔÕøag\ =\ü13 )ÊiÛ[®Þ4\ãqZpØK: »8ÜÀtª-q·b"6Ün!4q>õÉ ó«YkFDhÆXb«©æDrWÌ!²{#¤BËÀ'éÛÔ®¤ xã;v5樸^§hçó©[dÎÕZÜÿ�x¯&G�gr Ǿ\ytémLr\ o$qqëU2HÌ! IG\¤·&(V7Çïa÷«AÌ
Ààm ¨^å/¢t@Ëäg4Yù¬È!(qÀ-È÷«
VX±°À¿8÷«p
VXÐcaÀ~ãÞ¬DÒÃirÀb··ù¬ë�Èàã§^³,?lµP¬òb'åOnzpxõ¨îõ®YÉ[¯ú8Þ£pT<pIêsß$Ô:wrÝDök}ç#&#ø=ïÇ55ŸÙ,9]½?Á¼Ò® Î+£H(سÜã3T¯]ÔaȤÔm"-Ò£#z)àRj±Ké½éWµ &; KÏ,À3 9ã¦îýOå\åÆwnOn)§Gë]||ºuÏ<î¤
@²©a ï\þµ$ë Y£J@Á9ç?LVlz!o÷sVý¦D'ú¾ÓÒ±M¬9\3Ï<Ö¥³¡P'Ò¥¢À^1×MÓq¿Èñ¼ÌX6°ó~èëø×káÓ0ÓfXÚÌ·%3ïÎOJcrJóÚº}tá-åÈäãéZp;åãØ¤3ôÞeÏ\¼sM
R)³v==>¹¢áÚ0K8;Ó§ÐîŶç$ìÏÛ5¿»ùs¹ã ;f»ýêåÞæÊKxÞHbBw±ù8v#¸þ´KíjEMà#BB°<Éîj¶mk§j7=Ô]NÄPp¹'ïïòh×®g°GinUÄðåÓ;rT
ãë»QEØP³qÏ®GéSìr¨Ï¦F³y¡Çµ�g«ñ'·æS85jÞ-ãyÏqVpÀ縢('[1³Pû9ó®Ä¯¸õÍs²FÅg ÁyC"�Iã[ºIXüØr ÈÏå[zQXüÈÜdÊ¥¶ \Ä[ aíNÊÜM»s>ÿ�Ä+=yà{Vþ{º8bÅÊ=©o¶V!~5SiêÝEjÜe@,0)9a cß~K4¶ðØ$W¤³Po @5ÆÐ]ÊÙm°7÷ô º³6QªH@y�%}½ÿ�Oλ§û@1´
ËM0ůJͼ÷J"Qr«Í÷òH÷<õëúVI·çéBŶlðJ½·Ë?0ûËÇùüi¡rÄç>õPÚÎ0Gjªmç#µq¦Ü
Î9�ñE¬Üà ãÖ¶<²©3ÄGÈO|Ï"<sV!·¹ c+K.U{ÜúêuVdà(=©bt /±ÏQRù-ÙÔ í&CÈ6åñV¢årǸai^&x¢?48^ ÈÖ1OyÄko6On9íRi×¶ö%
Xµ >¡Ï©¯ vëìÃ÷±(vI�ÛÎO=}ª¤M3)#åûæÄÑfEõ óéÇçD0JÛ�O5ùAf9;·mÇLÕvg ;¿½céUÙáÜ0-ýìcJÆïS¹ò-À'Z£¶�ç8ð9ÏSP;§x¯m¼Ë˹ç vêx8?JK-:æá&¸óQ#.å=¹àUhØ.]ðÅ\?GÞ9dsÓ5qÚ@£î<²Æ68À?62ÞnZc{y+éRÛÓ6 ³�©^ÕÑ#ä(ÀÅ[Xe B¨ã(?\¶±K QÏo¯5ÑMs¤^[¶×VËË1®Ð¡òÀËrqT´é¤ûxi5ÓíÌxy!!GðrrqþEhh\úÇ×hVÜy¯^�0O>¸+[³¥åð1GÈ É;xíyÿ�!©pHDbLjxãT¿ÁÔ�§Þµ|¨Ü�(¶jÉQf8bGSô¥¿IYw ê:Rß$«î=OQÇJ«g;µ¥ÄIc¸SûÀ{__ưüJèÚ«Q¿nöÎ3ô1£³í+RÚ«ÙÚ@:WÞÇWͲBè9nÃèáúÕ TdþYÿ�>µcOmBjá¾ðSÓ½GnrÊ{>µ"ºrA¬aÈ#±¬õ{FÁ| V^AÕ[)Î;úÓ"$:ÔWF³Ï Ö5vNzJ¹çdí x¹ëØÎ;ò8õëÒkòEHÉäòsVukéMª¤dòy9¯S¶Ö¤¼¼Øk®pHàûô®Å³êÓ¯1µ²ªÎÑÉÀÆ?8\_1ýÊÈåWå�=ÇÒ°Y\0<æµg3À;+= ׿=±Óü¢p<ð�ëõ4±Å¸z~ÎK$Ó°ÞÅé\üM3 ä±)ò\<8Ú: )VsÆrµ Ý{ñÚ¥åB¡ù½:gñ¥D{²xôäàçhg¦?o3Óõ¢(¨Ìj§I$ðÿ�8¨+0xÇSÀÿ�=juB»{Ï^¢°dddÓü/wlQ³wlQEU)á1/?wµPkdRÃç¹æ¶Xmnó¨4eúF?Æ«Ïnç>õÐ9ÀϽQEbÜF¨À# õª³ýãÆ=±Ñc'¶OÔÕ)+Hû î?fÎ'+:tÁ§"mV/9QùÖê2&ؤbøTd~uÖi¾. )-ä ¿ñó¹== cí÷1=Ä Üð®Ýýút¬;³ ×s7rz ®&9Ãç#׫ks©lGÁqµdeHö#§9#S.ôíéW7ùêpOzËK\_:!ÜçÚ&É9À=IõíV\êC3©SÔV«ª
\eJÄT¶v°I}åܼ¸a¹OðPN+¨µÓ¯ÊôJ6Ë.ÆaÅ~O8æ³äÓô˯ FÁ >$%u9ÏL¹áí6}^îYÌ£gη;p¨å´3ºÄ0)NEXÇ ÷Ö§ÄZM²ñ ëRÁ[[@û¥º>HµH-¡}ÅÕKu8l;j¯yáùuètë{¶´v$òN:ùÓn|Ívöcr@1!À3KÙÁ<`~õ£äèúZÈe¾0ê AÀ¾A ¤ß=+RC6¼G2Ü6ÐùÉçÙ#¾{cð¤Ë6·(8³R+ªX!Àà
~ÐË'Î$©ájIò#g˧|~b2Ë TÈÆ==¥X°ªdcµö6Í£²ä!eoïNpxRzÙªWø,cv1µJû enéµ_V{Í2êÄÆf¶IV! Ë19={ñ\ í+]%òÏ #jü£=zëd×.5+&µ·�áaX]2t#°¬{L:e©8ÎräO@prAÁèxǸª ©´äOL 8|.ãÀ«rKÚ«7gùÖ,À8Ò±åÀϰaÉfrr¶AßUyrYUø}~\õ©#ÔjM,[êö÷·ß|:à×+¬j¹v··o3úûVæû@¢td"ªØê1ͬChTKß$ñÅV²Ô#VÔ¨6%¾IwHõ9ïiå¥Ý«·|$F·|X§ÚsÚ¹Ã[Þ xüIÛDu>ë´~8÷Å:êÕf(Ë û´ ¡ÉÛºmj4.dUà×µsdm9<zv£f,î5!ò§Ú¨Y;E!ò§Ú±®¥´¹ÞuÛ,mµsùãÞ¢®ßÇ6ö³Ãoy ?Ë]Ò,eD>\ú;×Q$gy88Ç@�àRàô«;K´äc-h1«ªÄ¯CÍVñÇ'¶j·ÇúQEUs$õõ¥Ü2G^G¥Y¡Pqס¤E~rÃÐcLþ"äò;får;f(¢«ÏmÃéøUE¾Dly$p=(µ®&UU%G_AOÇ8 µºñÔ»°Ã c¸ùS¹aô¬ë¸dvYqÏ\õïýiæhCH¼´à"íýa.¥Q%Fc'páGµ_Tû@!ï95N&.NåÁAËéU#bäî\m±¨rOZS´c{m?;®ÑÜïü£ä©û¼z®ÊïÜ3À=:U«HÕÖb¢@¼ÛëMÁ´ßw? t¨ØJÛdw!9îú µÝÈN@ãîûRo»séM§ N=( ®AÔöq´(ì7uëÅj[6\_ 2U}:¡§"g)úJÓcò¨ÝoJÓÓÐÐî#®V´¬PÈ9#®E,Q´²
�y 9÷¸"1ÀU,ä0ÜÅ2Ø6=@í[29Xÿ�µìù2e@S¹H#¦Fxüªh ÚA«Å5»³FÅÓÔzÕaT
$Ãøÿ�÷»X°kZ d"3Ã)û¿ýjÕ¨%ðÊ~ïÿ�Zi7Z¡«ÄlI9=§ozÜ´Óµ] æy´éZêÓîPvs¸æ°Åô'QÉms2Ì2¤aÊà®zà1=ùÀ/øxpÁs¤Ú´± kny'P\9~ÞÆ" c¹éTÉ¸È Ús»péR@ûsÏ»'#§½Oo ßµÔ²òÇ54 û]K/ øæÓX(gê;§º;[Ê9) 8ÆI9Q]5µ¤:µ¼Ò§´ÛѦÉSס?¿5Ë4ÚÕýÓ¥¶ÁÈc(0B×'{véW´kÖ&ïYnb®¬'ø:Ó ,s mëN¸^HÕH ±MæG¼÷x"«yLÁr½ ¦È /³nvúóMpQJ+XîÝõ樼ÐéúÚ\×ìèæ&Á$¿XÖu[{»û8ax¥§eeUe] 288GóC{§éQIÝì
¤Ü"Ìl½BqX åõÁÕåXÀÊÁß'vz=\rÛ0 çåeγî&UròvcÀ¸©¤ÙöÞJÞÝ\7�¡OÌ3µNEAræ@Tprj .rkjIVØ }NKeé¶¹.FGFïÜg½qÚÚ3%ÍÏUA6É'?ÅÙÅh_N·ÍF)<@\ 8@$ÔqjÒ<ÔÞ°Äûß¿Læ©Þxü« Ä7«k~ùúü#ükJþ梮êÿ�i·�<} ãê+HNÖ;
Ü;Rm#Àà çã½piÚÖ¬ë'Ä^;ìk´TÛ²B®ýßóû¼c§Pñ&hÛ˯, ÈlðN0ÃW>céR
Ç-Û8'ú sDÑ9G\0GqR"î#´w<ÅHÈlwzÇHÈ8 îô5ÇÒô§Ëåa§4(ÉëÇE¸|½N(|¿x©ÞqóÍZ¡ÎÐ0iþYàö§l<ÔÊ;ôð ©ãv ®9ÇCPrS8$çè&EàýìölÇ03ÇBx¨Ù9ÆRx¦á0k@Z¤§saÿ�µÅ_©)ÜØÚ¨e¶î(¾ÍpHÆ<°�ÇÓÞ£Hä°<©ïdÇè±h,uPÐÛ[EqèxúäÑÖÞeT½ QJvöÆIïùÖ¦Öö ¿wi?γ§}¾k8Ûª·QZÌqÌIÎZ$'ñ5$KqÕ'Ø©Ìʧ Nå ~°õc¹TáIÊ
?A\^l¶w¾T|ªÕ"IêI-m£{¥ûPo?í¢³(·I.æy2¾açk«¡^ÉOcçn8ª¶Áe@Oæ$wóZ{®Q÷IÄÿ�õª uÚPsæÆsß5 ´çÌ=F3zP zs¨¸ìiàæ¤. ªáõ§é²FG]~¢ÚHAÁÿ�U'Þ�t=ë &É1+c®;Vý¸C¹@äú ½§ÊϱpËãüäUÛ ö.쥷xżªù/Õ=ïúJN¸ò£v"Ú|, (brH¸ÇgÕûDI¨pMÄÓú~ubÄS2ò§µráK®ÎhÇP1ÏqÞ×mb¹¿ÓíÊ0·RÁÉRrpFI¹+o6Ù@di9 xÀ�ä~ ×a¬LÒØ¤ÖѪùª¿2ÁÐcpS0ÆH¥[(!läóÐH$ܪ$ǽO$»ù}�éS"Dû¸p28©"}ÎIÜ8Vf¦¡¶:ÎN@ÇnÕ4zi©j÷Õäe@0>ÛMBö+ã<GxÌðéÏ¥nÞê~s@u-=VB�ýÚáP÷ ß#¦).ÐHUѾéïÅ!;vv Ò¹ÚUYÄd��T2˾<)\_\¨©&eRxfÆ@=úÿ�
I3(óIáï×ü)\³[É"º´¸Rb ä/^{p{Ó|C ´í\ÀÖÁ®ü8íõíO¼Baií\Ìëæ${%HÔ
~~õhie3¡Y'n I×>Þ£xSUÖá76ðNØ ävÓ¯5éÚ/
tÝ2EXG 4²¼;väíQ¦¹hÛßé¾Då±$aQÐqÚ´Õô«ÉVïbyd0Nz tϵ&FHð:çGw.Ør =1Æ1S1À%GÔí/µV¼pcqæ~ªíËl· Oz¹rÛ Ozx ¼«,ArX9±ÖWõk¥["ÊáBª¥vôÜØ°NN]°Ç\W9»¨þŧÄÑýµC(d.9#§\ñÅQÜ1$ ôïC°�sS�!IïÛÔî¤duèÍbî$c§¸W¬1Í#³+ªËÜA�sïÐñMº
²�߷ǰü=ªª«G 3 ämþµHÚHË\+îÈç¯qÓõ¨.£JßÁúJ©<~[^éÒµÌû§8ɪÝÃzwÝeÎ}êµÔCvsïTµHÌÖÐ\¾>@õéÞ²î"òÛ#XdmäWTKd\ØÇ n(ÌÇæÁSÐô?Lu湬ok)Þ§õ¦FÈø{úÓÓ#U@È'zNÀ�äàãò\ªÈÄwªË 0GzdL@'iõõ§,ddtÊõ<櫺X4ôÃ1ÁÇ ô©y uÇ5 ÎÔäÕ¢¼ôëÏ /]£¾:ÆñîÍ+ÇÒ²àAéÍF@Æ8άç Áãüi~Oî/^'ñª.IU\÷$þxüj0V%¾b0 Ï
i2&v@Ï©ük>ñ]#ÜÉÁ¿\Õ ¤ÄLqÇ|U¤ÄlqǵV÷À¦zÐ 3Þ£"¹ËÈrÇ$óp?!ýk9ϸç+Nö'÷¬\_ü¼Ç©É¬Ù�R@yè½+»ðGÔó\ÝÐÄ>§(¢eQUê½QEô§¥2ß¹¥^¢z(¢ÜÓ¡Çóa'Û¿á×óF@ä×ÖM¨Ê.ãÇnÿ�ëVå¢mòz¯õ®N@UT ]j¨QEðsVa^�laNqÇùô¦O$1Ëæû§<ò N_dEÏ@:u¨6[ÌUUn'¯Óªã9n¹"´ÜaB¯-×NAÏ8Àç)\¬¤s{ÓÃa3Æ�Æ08¨ÕsHQÜ;¸@fwAÀ :z y¦[+FïÁúãV
YDavª}ÑØ[WnåYÁÔZzLåUXvîAÏ¿4äʪ±¹Û¹Gõ©ã=ÄÉ£ QÒ¬\\´ Elàe¸-ß$gÞ©D¾dÐz| $S°!·\xçõf,2Õwà» #À(�1ê)ðÜG#' úÔÖèÒÚ~UÉ5zU¶mÍ裥^%m¡[sz(éRÃ?v] {ñ·´2,dbFÚ2vÒ¬éÚ6¸¶r<Bvp:㱫z5÷Ë8·#ÊZG'�tSÀÀ¬Ùm]ÿÔÃ=Gù5u ob-»Ãë];Û¬ &b¤ýÔädV,ñEvÆÙSº£¨ÙíU;WkðryúãµRÔ-6
8\?\~¸íX2XÌRg!D1Þ»»zûõªGë]TÚlsiéysäÊçÚ°o1sõÏë\ÝØ]ÉäFéï²@ôÏzlÐH_qU\àwOøRGæ5Em¸½ÙsÍiËh¦84ë'aCµvúôúR1ö¾fÀêy¥ÏÛ¿hu<Ôn¸È#Y6
'êì°k¿¶Ò;Õ"[}¯Æ$eÈ2¤á?ZÏ4§ËæÏ89«2Fb�ý ç;¤n /!\_Kt<ÉQAÀÉÍJ-ar6¥áC·ämÅeé»,oÛÇ~Õ5Ä oq°NÒO @w¢ÌFæb;dTÚ°Ýö=ÄÜÿ�.iMÄaÓæ$/5.ég9
D aÍBc"A (ëVy8'=êÜDe²÷¯5j"K2ÈY{áWO·@ä±ta=Ggÿ�¯Z®õ,¶jðYFÌ¥Ün#=íǰ5µÅH2 å°Eá±èG§ZܵÕuGVÚI7>l!b{2'û8)!Ã1È õ«r4L)çøÕT ;y°cÐñÅJÃ~Õ QqÈÿ�õUX¬ECtQÐ{ñV!b± qÑGB9ïÅW°º})g&)§\êèãuöï] ýÎ¥ö;K-å¸cäÉ»¹sÕÏYI S\ ûyW÷d2èN?>E\_5ÓÛ[EÛ@CÅã¯Ë´ÊL2 Î: Ãã@ z< ØpH8ÈÇãK· î #ø¥hÙä!äQY³?:VBÔgï6pG¬jKqxeEi¼§ ?.F95t86ëlIªF=\~5¹¨Gcifö¶ðyö³¤2¥7p~l¼I¦Ã¡é·wbVhòÈJ#¯9>VÚeÀbÏÀë~U³USíäsT×S±Ý±%Ø;ó?NsS$Ù
Ù6CÝz\ÕÚÀÉVç=?ÏY²[hAÙ\ÊÜò§ùõ®wJÓÞçPX¡mó«ÃîÁèz~uêfý Aol"nä,þäýqXø»ÃË"[Á4Ðs ª tùBÛ¸ÎGvßUݦÜOk¤öù0ä¬_.q¸ÍT¿Ëv?¿Ð}ÔY'm²?£rÏ9eS½3í^»¼vÐ(±Z#wêum£>Z«C$nò\ΧhÏ¡®oź¢YÞOghÚ>äÒrO¿?À1W|+áuõ UͽÑ|¢È6íÇÿ�¯\¶kwªjsH,F n%síÈÉ\ྣ¯Zè¼E+D
Î\U1ÓÝ\É»u°Ê÷ª÷ 2©Ç5½©ÒÈGòqQÍ/ï³Ïqôô©'¹ÃMÀb6ú¤V¸ Fß\WA'¡W1NE#,Ã'ñ ÚK|³&&·Ä{_|¸ÎÞ¥SÐü>÷M©^4a�f+¹ºð?ÍÕoÃêm.Ô.Ä1>;GU~~
G¡Éëþ}ëE×pÈ8ªî<{U'9Çz©<=qÞ³&¥ryÉäàgÐvã¨êAú润Î@è¬^¸î?Nÿ�ʳå3výÐsôçÿ�¯UÕo°çhÎWül WåSÛµBS�¹&£n9Áo¥A¼ ¯¥C¸ Á_J¬ÊãWün&ÎÁµ[¢½BWh=@æ}}þé>Qg
µBìþïd~Cÿ�¯VLÁ²1:EPº9\ç$ç;¿¥S»Î:bª]H tÅ+ü¹g·JÓg¯4ÚŽXCäÐþC§éYRýöÈ çõKÐO¯?¬§rxjú æ/1æ�ç·zæï1æ�úw¢(¦QEVªÑEQNSàã=ý©´äûÃ>½zQÖu¢(½8O^ÿ�®×n Éàu¥sÖ[¶©b ëÆºBÛpqÀÅtZO@=« ÒúíE\sÐsVöøµG#úSeòþu$ÉÁÆxã ¨À- mÎMk¸\í�´fµ\.pÎÑËÌyÜ�Ó8SÕ#3,XÏ f EÇSÅ:Þ#°f+·;u«-æ2üñoeèAÁÅH#1Àã|c8ç¿¥Z ª8ϧάÅÕ Ó>êKhW!Ü¢2qøUóæP²Aæ4c¥XA
CÏçqùÔö¨&xãÞçtºíú÷¨m¬ÏºLs×8FcáPmöéPüêHAÜã=HÆÒGÈaÔUûXÖ+Çøªõ¬k @T¨´í)¤|Åioz ìçm°YGöv$BÜ=9ãozÆ_´DòÇf¡Öã÷
w�P�søuúsWôôò&Þþì4WU?OL÷æ;n ÄàíÙïýj̼LF|Ͻíè+EaóW pÒ»Þ<à1ÇáS½©2¸ \ óøTïlfB2Yp3ÏáN·¹òµÇÔå>[yX0~Länç¶FîÍsúÖt$Q7gt§#p¤ú3ø×cm¤Çw$ɱ$ÙÜÜ÷$õí~ëP@³J~\à¯'æêrryéY\<ª¡¿b¡¢¯ÍqFÛd'ÀëQÚê2ÁÏO,Å®G9Á5A¯JÜv¨×C·Ý¢¯°9Eu0êÉþËü¤/zéì!eA½¹"¹¯ ØÈÊnZ<ªk°Êc1ÓhÀ÷®ÇÃpË,"æåT7Lw"ºïE,ý¦áTõn û¸esk3ÀÒå»ì}§JôoiRAny&I�#×=ó\G4«Éd»Kw PYö08$uôÇjõ´0Åi#PFü¥Ú Üv¨.Üò¸$óÀéëY²S'¯BzÔ÷b!G üê²>W3Ú¦¾KpÀ1:T·³ 'Ç+Å-û¥É.ʧz¶{kÏ®ÜHàïÉV'éyéùq[%ÕEÍË$ÒÞ? òpyÉçòö¬8¦&" \ÿ�#qØÑæ|ÏNJmÙçûúT{yÁô4qߦj3v8Î8£í$@Jí/pú~U}ápsÐàcÿ�Pì0ç ÿ�ÿ�áAÆÜzfþy©P2LTML
$XÏ9¥ózÊBýjÌNBKsÆOáåüª ¸ÿ�úªÜÃ|±4
¤C¹êGääËühW!É'xîgÄ=G©õU«v2@ÉÅHoóéíU§½Ã·'· ÿ�õtæ®Ù+CpÑÌ<ò»88öü?!Uï4¤l�¼ñÇ?úÕ[#9ÆGCíùÕy@ä)O?ç@N§·¯_ëU.·8ÉÇ5BsµNqþ5Fs
9ÅgdnÉäþ¿ÏDàsqÜ¿áRËAÈê{sþzÕy'®sÏÖ«3á3¿ëþzþF«» í®9ÇùÅJÄã©õöªSJ8íØýk.y6O+2gÀäûS{RQET¼d\¡G8ã=«UÃpq[Dä¸ôéTî"YG£sÍc]§ó/ÓÖ².ÓÌùüè¢+6ÁÅB¨ÑEQOnlgê}sL§ ÉÆqêiW¨¥^¢(¢¶ìØí]ÇZßµq ä×X6OµQòàcfµ¼häà+ Ób98àVõìPG' )TÐG/o¿3×üþ5%êÕ «y¸#f2¨÷þU-°ò¥ëóþ}«^wDùÈ+kV"wFÙÈ#ÉLýqRC@PÙîiÊãN¼¹Ny8Î+H�@úQ�Ë£Ö¬6õö§Û¯ïZÖDÝ"cÖ¢.éæµÀC:�}yÏÿ�ª¦©k�ç9ÇP1íúu§Å"}0qÈ=¶¹¢ÇR5\_˽´uîqÏ¿µK2m|}{PGT}Õ_SïO»;
ÆóÁÇoDß3ÏÎzU©�I]Wãñ«R�²0^WƯêvÓÙ47{ÀÆ
¹h϶OñøqU¾Ö0«¼²?ÌAbK×Å[ñLé H|¶¼sµNJ~ñ9Áü{VeÀûEÌvOc̳é;vééSÆá÷' àÓs$,øÃÆwt v4,¡wÐõÎÓóõ¦)bÞl ò1éϵ<¸Ú¸c¼¼¼�?Î)åÆÕùðz¯Aþx Øî."ÌÊó³ìT103NzT,÷úMÅÌiå]%dJ#¢bR7c4êp[¬¢ÒAUPXaBÙÜz±<öoªI1¸kûò«w+mxåPÈrËÏ!vã9¤62´¤·Êǽ{õªÿ�eèÞ³Áüêê|Ñ&erqõ© F#>YQµAÝikpܼã$ÿ�¥4Úà Ü7/çxÉ?çéJ|#¨Ý_¹¸)o;üí!¸,Fr3Ä]QÝÄÇjKªÇ8Æ[õÓÚ3]X´ê@¬|³h° ($à?V÷éÞ¯É&º|¢ÁàAn¯æªÀòÏw=Orj¥&qÀ+çåaÐûqWVØÍóI´ üÍA-¾ñ¼ü£ ÔsDsÉ[çP@ëìE>�°9вç ÿ�x{ý)ð
Î¥9ûÃÞ¹ï °:ÄVº,7%Ã,dI va³Öºt 5IÚí8aØg9lt'©¬GFûl7ûde0;Xnd#p×'$úÑe®^ZI ÜÅ©túWî:ûúõ;An$ öíO»vܸ9_OJj¿Êø�çõSV£ÓebzûôÆIþu<Ò¤6³Èå$íÇ×ùTòÊZÎè¡>RNÑ}kf}DKÔ\ÑG ÿ�T ØÇ_LU]Íi¤É!ÌpyN>Ü#íHæmyû¥û0ìr~s0#§áÅbxÚi¡ðôB UU ÅqcÏÞ|×ë¦öFÏ8¬ýù¡LÈ}ûÓCòi®iÝØä±$×ÍpÒÎîÇ%kÌäs$íÕi´QS´ÐüÔ%©TFNj3'4QEgy5Jµ7·)å ¬Øù5ÞøkM¶il GOJÓÑlP½Tÿ�kó9öͯ¯~g>ÔS¢É"¢õ?§½6·´ Uîg&0#fÊ28wɺ+8ÖÚ?(¨U/L\Y¤+äó:vsÀÜy$gòP£õ½ÌÚ²©p1^æmYTª¸®ßö±éV²ZÞG©-üouÎAr:ÑÖoÚ íAçí\_,|ÈOSG·Dp±§Úù®ÑùGSóg'ñÍWñN¤¶úoD%Ê ä±Ø;sÎ:õ¬édà,TEÈÁi«IÆù4Ñ8ë°BÍñëéXO!-Ö¸{©ÃªFÐ9êOùÍV22àpr)«6IÇ<úýi¿tgµ:�H ãÞ¬^ïTÆ09$?ÏjÜgK ®p@õ©!eεf )S´dsûZ¼°FBȪûö=§ÿ�^²ò1sJ¹k(h[Æ>¿Ò¬¤coNL´
Xç9ô©@<Ò¯C·jì[xÀæ´ílÕ£lÇò¨Æ@í×ÔÖ¥·MÀ¤n§Ó{þUo4°w3�\òsÁ:väõ;fÝTá] + ÀàsÞà«1 3±ª~UÔsuÛ}iÊÄ36rXÆqõ§j°Ç¶9P"HeHÎ�#Ï>µ
~Uó0±©ÀÆO<~_çéWÞY5 Aa5Ãc·npN3µ\»�{Ò Àà ¨?µM¼OD³Háݲ>béî}ºT1Þa=H$dõýë&3ÈÀçÔT¹Î #9ëþµcÍÇ|~Tæ|õ$ñ}β$çñÿ�9¥9ãöãüÿ�N¶Þ¹á+mëZñÕxbËÈõ÷÷õ4ùî ,ìù]6#ÏӳУ»ç9ÿ�ëþ½)@ÏýzU½êÉ0O#&ÙÀêGr|àsÁ©Cò2 ÇZ9ùÝéíRG?;½=«\ÝBöáR-¬Øeùù9ÀàÏøÕí:ä[� ÚýéÎ ßׯJæÒRH ÝÃvëë×Ú$Þ[|ñï Ã<õÆsÈçhÙïf8ç¥a)سã¨ì \àäó¸Gß0'h8HØ-ç¯UHØ-¢ç¯Q]Ç
æYÖÍÞ5òÎÖ(ãÛ«:épȶ¥´ó8m6B}²?³¼%´vÍ6÷ Vn@äR]ÜÇsãQq
Ë8à<þµvýÖ=8ZÊñyti%!I<õçÿ�¬jô3ÀfOOZòök#fXn.mÜÊîQGåqÏãT/~ÎöþTláÙS0�=Þô¯#pCvx8õ rÌÙê�>Fé̯/6wÇ̧¼ÖhÚ 62äè¥uåNr9¤ ÒAZFúÚ áù$1<ò¬q©gc$1<Ò¬q©fcQND.áW©8«þÓöö7u>JIÇÚ½, yxÎéÅgYZ¥¬ kµHè§Ò¯,¼ey'$ö¯AÐlMµÚy¹cßè+¼ÐìWN¶Úy¹cýKennn£ßi¡w"Ø7 ªàçïc8'¦1Årö6ÆT8Ìé¸ílÿ�d;Ûw¹·\¡¡;Ýçf Àý
Xm³Àã�ô5BýÁ�.qÖ©8�c¹¬»§,ÌHíÐÖ
ü¡mBÿ�_¾ £½tV1m=å¹o-2
!%õëÎ8èZãüSqFûü°¹ÃÀààéÉ<Ð[ËÚQÛÊDBìbKJ qÏ·?qï=ÌàçzsU:ô¦(��HàRä©�ãp¥ ²ÈîpJÅ<qÚ±Ï'éT¨¤öð{n½»cßJIÄÎï»ï×Ó5Öøu,l,ßì³L¤Ë\YG÷G¿Z[¹T" \ qKu"\A
A[-&'G1èæÈOqÆÐ>§¯N+½pfßQ¼søÖÖ¹ª²¹. ÁßÓÓ§¸®jêIV2dËüÄúóïíTæríFåU/dX-/Þ~¤Õ\òÇ^¨L%¸lk¼d,ÜnoV Üû"fãs|¢¨JåÛ®@ü©p:NA9$Õf#i$¿J¾@I4ùi$ð3ÇPbǵ4>µ4>´QE,Äôªs¶[²Hz)é×59¬ùdÝÆj²nã4QEQEEEQEKl �äÔTõ-·�àuôÿ�?ýzT8})Páô¢(®OZ&brG�dÕY<¹{þMfiSËÞI~~á'ÿ�Óüô¡NÞ=Ä3�N11AÀeñjfì: npxè(ÏIÇ{Û tÿ�õR#ù|dgñJk°w�Ä d Rät¿ÏùæE'w#êsïN©å½9¨ò0 Ï\qOL1!pÀc:ÓÔò9O TÈÄ7 ìr=ziêü±æBräÉ?¥@Whvzã_èjhö:¨2Z×´ G ×ïê=ª&ªOZ|MåÁòÉÐÔ,yÊ:æµd¬1�p@ÉükRG"8 dþ5è¾d[/:d)&Vf\¹I9ÛÉükui ¶}ÑC.Ü+x>¸Ç\ÒçûÏo|b%s4h(Àáp}ÇáX³²ï2B¨ù¹bH ¸ì{wç4îDNÅÎ8 ¨!túc?áP¤nzcpr¯Ô0'§¥B$R9éýª"ÏLþUct}39µ+¿Þí[jF1ÈëÒH"t¹¹Ä0#دÍýÜäãk{²c½@! BÛ9íøf¤é®r&Øî®à¸?äv®wźpßÏU;ÓO8®¯5êw?¾£#äat®ïF¸[ãGÇØW!m<µØ¸ 8zå 6Ð�>èRyÿ�wÞ¸é\cÇÐq]Íé.õgl®JósþJç$pOʽO©ÿ�?þºÜqß@uÆ}ÎGëQ±;@'qýoÊ¥A¸ýÒyéÔ\ÏS¹ºdÕ9n4Χ¯ ~~pÿ�9³Y7ó»4QEQEAPQEQEQEQEQEQEUYvJ¡x9àã½o¼§p$ÏÞ¹pr {ÍÁR@I'ÝqéÚ®Y\y¡8ÏJ·gq°'éEQ]µÀ$çÒ¯Å:¶HëÇùÿ�æá¹ Ððp3Ó?çòrtcl}~lZ^p9 ×µ»às(àxÆx¦Ñ] «~óp8éZS¸H÷¬=:@p¾øÍjJwDsÎF+¡±6dß²6¯d»bÅgRÅuÒ.ÐMÀ$ ì1Æükµ#ÌQdã#jÝ?m'ø~qU÷nUÍ6I~RrG~§¥BeqÔSJ3q¼u5]çg=j³ÏÎzÕ�ûsê=¿ZGÁ sÈÿ� 6WæÍóÖ§R dO¡?çü^r¼Gn�¦FTóÚùÏcÁ¦ò4ùGz¶Iäû_î2JD©À^ø¤=yôéRsÀ9è?ùéSEüjªÝÆs?NjÄLô?Ïÿ�Z¦
²Ã>µ,Mõ©go#�ç ?§ùéV-ò³ ¤ß¨ëÒª&íÃnwgñ«0:¬çý?ÏjÓÀÉý3U]HäÈ {b«ÜIãÇ'^¸«ÇLb¯O);WÅvò8tEDTY%\âÆr?Ý'õ®~{/µÁ@
8ãí21Î=«Êj)´8Á\Éò Ç>òįAéLäÑþfç$æibD»Àr"6pA9ÅPRNX( üý\{×Ë�dó¸ÿ�?þ¨X¤8@Á$Iôÿ�>´¦b9?Ëê!ó1?Ja|qgüÿ�:h~ ùb iwOãP´»É'ñ©ò\_!²ÙÉÆr0:÷ìUäÌFIöÿ�?äÓñyÿ�?Îó\Ê7u=?Ïz~ü÷Á=xWx8À+O q:~4õ°ÇáNY;\ÜOÝçþ½Kçg9 ä¸D¸èÚ1#>§ùÓ®eÛNÒ³R®Ä/'§ãÓµ¨8T$÷8éÿ�ë¬vië¼ì?ȪWóéU/§+.3Ò¥¼( ÀrzwãT Ã\Íãd+Ûðªgx?Iø9ÉÜ\èk-§==¶óøÒµÃg¯¯5H]
9ªBè)È8Å.iUȦÑ[+p%ùP
¼g¡úSÇïp:ÿ�a¬ü®á=°?Ïò«PêGÄÑïGÐÔñ_#ÞOóô©¢½V8óúTÛ¼ÀðÇøOCô£ÿ�eéµ H³0@ èéøõ«rîIÆ.}?ÿ�=ÙP9<Ôúf«\\Ç")ÛpO#Û5æH² ±æîe;NïNr)uYÓNx¤l©#ßÚH49Rß.qïÚ[väÆÒH~wç þU¨Î?^:ç®\;LíX÷¾ôÈþ\_PÔ±!ùW×Ö ¿ÔÉXð¾µvÖan#}öè01ùU7;Î ïAbF %\l"ª®ã@Î:çÞ±æSøË. ñÏJk±�&OÏó zñúûôNMaÝÜ ?¬k«Äcø(¢RIíIERªQEQEQEQEQEQEQEQEQE¹¤¢(¢\Ìo8àÙãßüóWíîIÀ9ÀÁÏ×üÿ�ú«sßµ=$d «>µ¼c×ÿ�TèÏOj·¡c ±þÿ�Jlln½ãéYþfüÓòÿ�ëTöÒ�7¶=IéÇéïßó§%ÆöU8À¥Y÷² PqH:Ñ@@à0Hã ÿ�ÐÌ »½R¿$¶¯ltéþzRA È ÿ�άý æjÇÇó©àvúbAQÔt«i ã rztÿ�?þº·�äc=eäÏ9ëW psàv©í¥°OçSÛÊ Î¤cÏÒ§ dãUÍM qsÛ«Ó¾ÅVÎô棹2 §1ÅWôänÆGëý\iîAàô¥àNJÔ¿¾Fp===}+8HA¶ÏN).§KT§z9#5¢-s×üçÚÄýÕûÇéTáIÀéþu%¼¸{ÿ�ZzN¬gä)é0m£8Ü\ÐYün\Äã=¿¯N 9˱ÆI°£1ÛÞ¨Ç)^§§CEKipaº3\´qÔÿ�:´6»Y¾vÆ{ÔX.7&z÷ýj9ÌwX8FÇ!29a02°r
i^Q¿iÚ"6 +Ê7í;Dc¡Ý¾vhcÀñ¸xçñôª¾[Já\ê;ñ×CxñÈå¾À9î;>TpI 1È Ò ò(Æ?%F�6=@êvlqùÒIzN "lZ®×Ùà©ô#üûÕ)§"©Ë4@9º¨;[iè@àÔ[8ã=iòNÌÃç.MÃrjÌo·p�y§G Á±ìzÕpc äñø{QÁsÉÿ�?çÕøÒ,cÆr=O4ªØãÎ8íïEUÔ®÷9¸ñ¬æ{㿽2æViÔûUi&IvÆ+ê輬Ìx&².nKÊÌO¥w.ı$ûÓh¢¬ÜîóÖ${ßÝê¨}à
c×ò)rdÃ+Aÿ�ªgéïULý=è¢\ï~)N@÷ç«9Y=Ý'p rß{ Ä?jAq¼H.1×ÑEV¸òqo{ý\30··9a½¹?áY¾ac ïõüª9ei%1îÎ q
ÿ�k]:ã(¢¦ºº3§'9ªÁ°ùRWÐúShª#;n'¨îÎÛæ(¢±äçÒ)½i½h¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢)ÈÀ}+JÚýbD wm99=÷çlÖ]©"9SÍIÍÊh¢+PÞ+IÆ@ÏR?OÒ®Å8pÃ@?òkÏ50á¶ä1ëÅOã)%¿J+¶RK~QEÐ Ëß õ©ÁOQÏNzÖÝÉÄc?BGJ·¸Ý¹ªON{úöéVÒù{ÄÕ½^çñ4QEº&&<�Hè>ç½<ǯùö5ÏGrv×ÎO<·òöüªÒj+� Ò�è ïúÕË{Õs6Ö®Ax îfúÑJ§J+Bfgr½=çþzTã98É=ñXj Îw9¥Wûäç¿cQÉy"Håqß\_Ç¥A&¤¥ã5$ÒIEÒ¬ß09''¦yãS$Øi{g9øÎ[îòHü2}¿ÉúS¦idBÎXýåÈú~}±SǨF�%ú{ô©Òù�¿SÒ\õ¤¢¶lÄàvÿ�?ç¥B³¹ÈíÏ.¡ w61»úàt÷ç¶{ÕOµ¤
$Wawq·¤óëéèi%¿PÀÛ4\_(í3EVÊPtÆqþýu ÝÆc 3Ç@©çcµÏÍ&ß-ò~fä�ÿ�'·JyÃF¤89É\÷qPI¨aNÜp:
ïð§àt&ÑE¯ç ÙõÛÎOaîéÇ=p¦þ%TXîL0}Ã;ãÛ#<Öº+ \ ÎÖ9#õãçÅ@& »J©9'p8Óê%~î9
@u¿w(¢¤k© 8ltÇ9ÛùÔFf=Ïàj2xêOÖ³ÚF=Iª #¤ÑETk ³6qÔÓKÁÎ3fE4±=é¥ïEQO2ygñCH[IcÔÿ�ÆEQE)9úRh¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(£>QEQE¤äcÒ¿QEQEMæ$çh#}Oÿ�^~=6õíéÇ5íæ¼ÑESºù£'½i\_÷Ö4¢(§q÷ç4ÎÜ#ýqéL¢ÆÆ(¢¸tïÐÐ[(aÛ&E¨ÍQE)bFj7yëÖLL(¢RsIEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEÿÙ endstream endobj 17 0 obj <>stream ÿØÿî�Adobe�d�����ÿÛ�C� $, !$4.763.22:ASF:=N>22HbINVX]^]8EfmeZlS[]YÿÀ�XC"�M�Y�K"�ÿÄ����������� ÿÄ�µ���}�!1AQa"q2¡#B±ÁRÑð$3br %&'()\456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáãäåæçèéêñòóôõö÷øùúÿÚ�C�M�Y�K��?�èm?ã×þßÒO4Ë\_øõÿ�µ)5°§D?Ù¤÷öEjx8ãÃòóɹù-ZÈÀã¯òª>m¾?óó'·¥JòIÎM¦ ¤ÍFÆ£cMwéÎ3ÍT|Ý3ïUD¤æ ]´ÔñN@ 9�"¦+ëß¹«?bù$qÆ;¯o.Ö¾µïC9ö¡F)h£>µ àb¤qE¬^X-ÆOjI=°\<?.GúR«îCéþ´QE:¤°¤nÒØ·ry¦$sÚ'JÔò\UçûÕÿ�z¨êñî½=úW=) ÿ�t,6s50äuç\¢ û}('§øR7#® '~:(¢ÑE)Æ8ôôÍ�ç§ôc¯ô¤Ý×?
QES½ Í{SsÇ¿|ѸsQZNôQ3NÜ�ÎN=)rO'©¨É;õF K4øùaN4EBrjÕ+;qȪØOJÒÓçÈç5qz ZAÒ´ÇAZc ®æ ùä0 ×QÅòJãµJ}¸4QE´´ç½zuéKyý(äÅ%QE%7h'¯Ö)O?G?Î(¥¢8ã tëA�qÞ íÓÓÞ rqùÑERÒÒòpõ§2ð>Ziöñ§vqEè¢
è9¤àçÚyÏ#µ/|÷£Rô£Þ{ôéKÆIÆ}(d{3Æïz>´Pz J(¥Á ç>ø¡ Î ¢Qõ¢E(ë´ |½dà=±J@ÛÇP}i)hM 8$q S>÷´óÉ @i1@Òv¤ïGziQ¸r¯jD®F:s Ò�vòOéAi½éðil9©dõ8É¡ïþ4´QE-.ÞÇqÆA ôQESpã(�qÞ=GQ(¢bè ©ëAP{w§c¯"Å¥¢¦ÀéÒP(ÛéR:ÒØÒQKII1QëÁÁÆQ÷p0!ä )Öj#Ö!À¨ä8�;gúU;£óÙyÆjë°ç«v>cÁõ¥iÔÁÔTÔéHHWRCÄÕÜ/;Z£ eã°«
ód¨,"ýÐlô9Å2wa'pyÈÍIH:Ч"Ö¤Îq9Æ+YW{f BVm½i-¥/ÝËûR¢³HÅ:(§ÓªÙ==3A äúÒÓ¤)®>Zªvû¦ j㨨gêµú£±c§æg>O\ñ]=Ö~Ï <Jæ® ÝÉïM4´«®j»_Æ×RÎ)pxÅR)3Iqn¹ý) áiÇCÛµ4·´RQ3FjPO8éïFq×ô¦g ðM-¤¢Ñvpsß¿§áFî3×=)ÜælgzûÒænh¤Í&iá³éA g ozBIçÓ¥.i®p¢ÜF'i¤bvw|àU{©HNp ëOÏ çQN(t4Õ>´NÅ#zTd¼ÔgîÔ9ÇÍM9µI°cÓýi²ñ>´QÅKZ|#ç$C)ªÇ×ÒT½g"ü¼ ~5¥¥ó'##©éWWîZEè)sZ«ÐV¢ôÝÛónÇ.0H>¹>B�Nõ0a¢(¥¥¤Æqøbþª3×øRûJZJZ))£�ààúRùRF)À x¢(¥¥§ð)¼ßÚ7?SÓÚ(¢(}ñAãä_JQÁôúP(¢)hPsyô¥Ç'÷£ó§ÎQGLÑÚõïJ£¹é>îîq\ü£AúQFh£ÑÆi¥J¥�J[¦ ë~(¤íJ1ÞÐÑ(èFy¯4®OLf»NsùÒ)Oã¥uüèëGJ?Ê@à<÷¥Æìu¤Éè¢ôw£bW�Ñ@ìM.0Ýr;Pz®á¥%7½<ÒSHäSHäS9È
VUÛ bHíVcpqǵ1T×»ÑERÑO8ã×Ö{u¿AF~^¢BqIBÀRt ã� u9¨¤ H¨|ò$éëK7sQGzÊsLójc:zZ<õ,òsÚ³&1Æ:b2%Áà·9©h¤Z\LäSóÅln 29ïAßþ=ûÍAëIoÿ�Ãýæþt¦?ÔÇþèþU ÿ�Sû£ùVñÿ�êu¸ù\_¿Ð@Ïü#¨9ÿ�])ýúÕ §æã¡èi´fLñL&£& ÏÍGZhm£8éQÊTØ¡G\Óñx~1Zv·^\_ÆO¯ëO¸\ï9ïëY!È ÷õ©|Óg"THy©GJ.EK"´í$$àu=+V5P<÷ÏZŰ|¸ ·cá@l-%/j\ZómÇ\u¤Û»y§S#'½!8ÎÝ¥¸ê)¡ªíV0j»õ¨.: ã ¨®>X$%wg×/vvxÆy®®uFG àäW-zBÈ@é¦w¤£4UlÕlÕ#Ç= 5>´
<ääþT
¹äÐi(ÍÜÒR1zÿ�h,ïØNÛh£4RQLÒéuÅ&üMÝ1ØSNpy¥Í%¢XÓ¯½&@Îi sÎGãF99ÏãA Rw¢½5©Í\OçM 㥠8üéi ¢ÐOÅJI8è3øTR8óJppi9ïIÛ4¯4´ÎsLcL&H+¸TlrÃw\_ZðñÀ¨I!¸Î H KZTÐõ5,'ç,?|U¨¥jig2r3ɬ
ç×Ò2zUÅè)iANEè+Qz îmÈ0 ÁéÚ¥ç½E�Çzq}¨¢E--.p;~t¢QcNôcQKE%!8à)9ý(Ü9ùMGÒÛ(¢)isÇN{æØÁǨ¤ IëÀàR¥QJx4´´ r'¾ðsÞ¥ éÆ)){ÒÑF{ö4½è}) 33Küg¥sEQZ\_½»ÿ�AôëAAçÓ4¸<(ïG§j;ÑE7Ò}ìÑÈÚ9SëKÆzgßÖÒ×éIøQKE ¦)A#=ºsRÓb1½%méÎ¥'\_.Üg9Ýô)ÆìóÞ{ÒRÑE%)�)¤zfÀRädÿ�U%èëøÓOÒqÏji8çµ1è>´ózϦ)Kã ¯+yr7c¡íKKLèiNM"ÎRÀéÞ¥S¸p8÷ª%sòÞA·fQ×ôÇ42jJi R8Ú�ûRËËtõÍgË;²ÀÇAÚ´Ø|£>Æ«I"Fs=óM#iKdÒéQgÆ}ª´° Z% ã$gëRIp%nGýóQ<Áq³§û\Ô¸¢vj@ãðã© �:®1·ò§1à³çÎèÆù8ÓÖ¥ûXu9qKN¢)xO^sߥJe]ÃhqÒ<à)b¼×h<T±ÇéÖiO'i óÒ¢~j¤¸ÎЬ}}k2åp[ ç·5¥4 ÉÎGJhËdóëQ÷§¡æE(ä5F¹ YE\sÛ½c0YxÈÏTC=@íO
6ýÓ\jkRÀ¤jËS±º.HãÖ©\>Åfù>µf) F8ΪܰÁÎyM74¦ bsP19ªWîçwATÚVÚsSÌ9 d®Ý0F=é(¢Si´ÐÙéëÉ¥P àqÍN9?¥\|§9Î}iE58SZ¾í8ýÚ>9îO>õf,õç«( ÞES:1ëE7Àãð¢oÿ�ëþó:SIoÿ�ãê)©úÿ�Ýʤêcÿ�tÖÐÇüS¶øëçKûê.¿¥Ñ<7%çþPJ'½6ÒS 0ÕsÔó×®jnÞ£
ôô÷¦±îqAèj»ÕÒ«½Aq÷ECq÷E«§§Êߨóƺåé\½öCd3QMÍ)¤ªÕBk9Zqé´²É#5=ûzQE¤Í)ëÎixàgqL?) 4QFi)3I\NriÉëM-Î}ºÒg4£è<ÒQI3OR¹Ër:ûæìÊ£ÎO#õ¢)(¤¥'ÔÒtçfô£½.i éEñHM?pirWØRÆ1HsCÖzCÒô¢ÿ�{ SñéLrC¥?µM ASA×ñ©aÿ�X\XÖ hmNp9OZÇ[Ý?NWGJZJ^õª:V é]ÔyØ1§J lp�üiãpSN§S8³Å(#89Å-%¨¥¢øsÀP2\_Ê ñÆi$Í-Py¢ îA=Ï¥('#ó¦är:q9ç4P(Í-\_^ÔªOOAé@nP8çüisØÒv4g½ÐM;vpiTý(É;²:ûô¤S÷{zÑøQGJJJJqÈäôÐyç©¥äg79ê)O¥4ZB)ÔÔçýEUS©ÉǨíV:sÔÕy"ˤwÅ�ÐqëIÜñȦçië n¸ï´ÇUÄ7�4ÁRFì©àzÒÌv ÄäiëJÞsH\=Ø5ì&KôÓã¸ÚÄ$pp\¬ÅÐH9äQ! Á9©}©¬)sJNE<ËN$0¥ÜÇ ´ò[=jÌ{X�ØíMIÎð�æ¤]èC=QQ8@Õ9¬Xï9<{pib]Ê2¥X.H<Ó4Æ~ö8>´@ëRE!ÓÊwòÅ$ðí�óÉì9ÔGÞ8'úV�ñ}Þà ´× Þ¹§/JFéH!nÔòÃn3N,6ã5=¿Í'¹ätÏÖ£»$BNOCI»æã¸Í@÷JÁqÍ0õ¤Í)¦UØ cÎrÈNrÀõ=)¯/Þ¥¸l§4ÝÒ4f£É§i²i²ií'ÌNwg'ùR 9>ÍPi ¦ ¡=V© êiÿ�fæ°éO Á+À§ÇààW21õ«¢gÏ88ùªùðÓoÀ¹«Vº Ö§äÁç×¥OEGó)rþ5t?¨oÊ®ö?tJFÁÓûÕ'$ÇÍd£\_À<µÁÁã85Í~¼ÈNx%%D]óÿ�Ö ÈÞ9}ò£Í_Fü«C± ;Ò1ÀÎî ô¬G½Ô\là8¤}NðÄIÉë·KEGæ7¥iÆqG§ò£Í_SùVØ9n3zQÃÔV7ö¥Ðå _sÅX v·^×-ÇJO8ÿ�vÎNý(óPwý+iIîqJÇ##Ç:¹X·,'ßu×n¶À5MEF²ü8¥ó¡¥']Ôá"uÍn0äý/Aãm¬,äî¯Ëü'4ó«;$Ôú)hëG¾ô¾bxQæ'÷
igyÏ¥ëY¿ÛíRLLSV¶êD}IEFfA¦ÌLw¥'?0¥'?0,sÆJ8Áï×ZË}rÊ&Pw³0_ík5q2ûS½)GÀêzvá¢Àô"0=«¿Ýí´£ãU#Ôm¤Èÿ�ÅN·ìÎôÛõ¥£9¦î´oSÞzÿ�x~tn\_QùÔ¼vúRdtéºnã"PJÕÉýéG?-)Æ) ¤ó<i7.FOÆu=~tÒÀôaùÕ\rzÔ; ò£àúTcRµ-òÉÒ¢7vÌ˾òAéj=ëýêpeþð¥V^çJ¬½2?:· $ýàWµXÛ g ÛA÷nØ�ýe¾´ã7ûç
Õ}«2g3�H#¥W3±b}yÍ>l9Ýù¿º{Õfʧ¹£4¥ Ð3éIÏ¥M½[Î{)Þc'vyïÐÔ $MLöï´Õx§)§ÔC\XÛ#¥²0jí¼ÙÆqò1Wæù5 yL7tÍjA6ä \3ÅKQ8æQIFhÌ çZÈc tȲ\g¨¡ÓäM&iÆ«·5]¹ªs8+òÇ5J\_©ßÓ�Ã�gÐÓqNRÒÅ \UaäúU¨g8F69ÅH8¤ZR2) Ó§R ÔêFÚÕµUpÀ:ÔÓ'síTíåÁ#<µqä >ª6ëM4¬y¦P±æ¡cÍc].%?\_Z¬ùÏ9ëVnl¬N <óT^BIÉïKN^µæ¤Zå¨C© P09«{Yð γ·ç?½iY¬1ÁÏ¥:zÓé¦Ã{\áQÀäúÕ+
ÈÈö«ìÓɪ ã>)E3�Õ+!ºQSFX=MDz~?ÎÑü{'ãüè4¿òÊ?÷ò¥ÿ�Qÿ�º?M¤Èµgõÿ�Cj^½HôgG\_ø¦lºÿ�ËOý ª´£,Üm0ÓÍ4ÔmQ5UnHj¼<µe²#ªïÏáM®OR]úÞ®¬×3M\º·ñ¹Á¨ÞòÄm©VLu£Í¨wHJúÒ¤30ZÖÚÄÉôÕ×{rG=}+OÅ@Ï'sc¿¦óÖ"±ëPaHë@ ´s>\_ÎÎsÇËùÖòêç׺º(ÀéXaeÈb;X£·2ÞGnÕcÌ^¦AØñPm^Æ�ÅeúÒ¡%±NaÇ v§1NP6M°iús´%6ª÷õræ cùçÐ dF C&ÕäúÕec Y@õ¦ã Í'ËMw�ñMóLgÀ�Î3ÅB¨7íÀGãPl§úôðª
ú#ÏGJpç§¥H�ç¥!QäPÀS¶åAÀ¥ÛòZQÁß½GËLÞ-Ãzm X°MÈÜñÐç½Ãb@!½=j-¶h Óñ@ {Ô{~3LØ>¬dÜîl{ RK
¶ªdÒ¯¬M´1´ýã½9' ûãíQ=©G4Ù$^ü})@qÍFYCcpÅG¹CcpÅd»R m=iɹÆT¨êväà¦3\ÇzÞþ²®¬X Ï¥?B9¥xä abÄ R±\psJÌ¸àæ®"¨]¤sÎsP¼;%r3REª#9hþdE;8ϧZ§-Ôs\ªm aéx2ÒE<8ÆéJ»HÁ»HÁ¯CÆy\襸²l§èj´R¼E~PAÒRËñ2VëÞ+=êO1}iÁ×Ö¤Æx,ãNÆx$ƪCbÌ9,¢tVYºÖö£t©=«QÞÚ1ÎQ=\$ç£ØÍJÅq÷³UÕËMu µTnçµ#¨Mª£w=«ÇJe\_êIéJ}°ÆeàgkÜÜ@#Ú'V$àb¹«{©5RT7d ñS'½4ÆHëSS[¥JÑ.9ÍJÑ®9ÍnI§Êáv¸ìj tɤjȹÆkl!P�èZàCµ7×Taàh1jpÓñH±«Aüé0G ÖT6Eór¤ÎÀd;FO"Áé -ÎäÕðæÎ1Ó À¨Ç¿8«f½#[3 R5¸$aW9&{3Øf³uv¤»AÆ+¶aÇAni¸ àãºQ hS{ò)Ð˵ÆÞ2ín:V4¶³A I/\dôûiöq÷kBñ7@Á9 æ³cÇ0î¾æ¤)¬)GJkô§¹ù9§¹ù9tmèÝúsT¯#V\éf!ã¡è @C×9Ȧ;SqKGj®p{UsÚ³ç·O¡Ëg>\Ä�ÀÁ_ÒÍËfÁLÔsHi3Í#nrj2ÜÔlÜÔNJ§¨L¤¿=Å2NO¥W¹øéïR©æQJ�ÅKÈ©c9«m&$=ôõ«Ë\ú\ÖDäcñcO!sÁ<ÔMÖ{u¦µ£aóVEÖï1àgV7õ«ßZ«ä(Å9i ¥iF¥
åxïVìÀæäTnëÆÏ:|Ð~}©ôÔ¥HzV¦íÃ=\¼È7søSã¸9ÀëQÊpîA)¦CEDO5ëT\_ ¹àc§4S%#9' QNþ=cü ÑüzÇøÿ�3A§ÿ�Ë(ÿ�Ü\_åNÿ�Qÿ�¸?]ÑüRö'¶$ÿ�ÑPN¼zÕ XçÑÿ�ôcUiÉ$ÿ�Ja¦q¦
ªª.0}sÚ«ÉL}jÃsÓÒ«¿�þÃX÷åÜ>¢¶ d^¦^³õ,ù#oPj£(c¨5ZCÛ¯ã\µÓ´1\{WQ\åîÆ&jjß1�T«vHô¬ümp YR1T"¸\_¥QyIåúP.åÚãOÔÕZp«ËtÞ¦.ïYûð:Ò\ݸÀÞjuºqÆãZQêùhÕ Õf#5»Õ '¥óê¢Wȯ ¤Óì×5°ºêO4óO²wibkHÏa¹P2j° ·©fÁéH×2qþ´q'ïëZ|{õö¦}¸rXf¨á¶óLÁ&¯-Ú1àóïR¬ªÝÅQ[Á©DTøæøSi¿ Ò?ýz.±+,AÈæ¤ÕÕGSOój¢´üTëpøè\u¸|tµôkÇ'¦sÖ¬M3òýßzç7Z\ÕÃ("
}óU¥Î\Aps)àç;øVU !#Ö¹f (VÝódäUó"ã'£¥RϽ;<ißjbx�S¾ÒÄð�®¾Kû/¯Z
5x£? ÏáÅsv§È7$t«@{ÒëTKc½\»QuÏ#QtsÈæº
Ô"ß´$7¿k?Ê:×&Ò#,sJ19é¼Ì§¡¤,1jr:SÕò9éN9'RÆ+®º¸Êäyæ÷´AðG|õ®QçeÆÓÍOÁ)ûµ;Ky§Få»Õn=iH#½fÝ£ÐP&mÙê=3[3êf(#Ädàð\{ É&$ùÇL·zÀ%sÃ&VRpß^
99ªÞV×Ü^Õî=éØqY'ªYOËÐÓ¤:©eï¦r;ã2�OuÍI×jtl®Iýjtl®Iýk^##ÊÀ±!£Ç }ýýªqçàF$Þ½\) §fÚ¸@ m
aÉÝÉ«¥BLRgØrÙö©ÎHQOá¢=Hö=©é»¨û¾21Î521Î5zA²É\)è7¯�{¼ sÁÎø³'ëY ´"n2~V' ?Þ«¶+9ýìjM±ë~\úç×éNòÁîxýi<²SN'ÖêWéëRlgoOJ~ÀFvôô«'NI7(!�ðþõÒåIOï üU¤XB%i~ð>µ=í¬Ö´sèàñÚ°úÒ
9ëH$E'jUÎh_/#æñ lãæñªBÊE :{õ$6ó £úæßR²
Ü]òjkmZ)wä}Ñ+Ö£Ã{ÓÌÑã0:÷©ï³#ëOr�ùZ½µühüddÝ+;É»v ÛÉëÍhK®éæ0¡Ü9ç¦jwÖé&å;RíjpVi®¨Ì÷¦îEîOãMÜÜAiv¨ÝW¡·»DJÓ-TäÔøo.EÇ^µ&£; Pr9«;±ÔH$sPn÷¥SÏZIÿ�<=+¬7JòFäòrj4½Y'.¸Éé\×Ú7/Í -¼¿V :°ý)«Í Á«Ò¥$4ÏÁÈ®ý@H;Ô£yas×µ%ÍÜw1bH¦µÁBTäð§HÃ"µ8S1 ¸È¯5ÔBhø'59Ú¿{�þ6ï=j,Ry4Æ5]]ÐØ$¥E6Õ3úVî«næ³îd,zóéTmH?½ÞsQmç58níLHÈÏ
[!Kõǵ ª¤x¥QRt¥'H¦µE p1+UX%¾ ²ÌTàvÏZä""ÔÖ<ÓGZRy Tg¨Ï-Un¤%Û3U×ïgé'§=(wõ£½8Rb¢£riÀüÃÌ.3Pª|ÝqW-Ñär :ÆiÖç{×@�ÕZ8%ÔÆµpK¬ó#Æ1Çñή±R¼¸¨®¨¬¡{xÕ(¼¸S§mæBJªçê³0ÉÛæny�TRo´»b¢}ñsöjÎÞØúÒ ¤ÎwRI"BêZàsVí.B;S¼ÐìØÚ8J OÊÜíÆA?Ze tÛ\qJr\«¹² ô§$äªîljA;'±àj7î' àT@àÓl¯b2[ :{ V<úrT»NH Lòn)Ú:@EL |�ÿ�?L ry� Y[Aùzc¤,ôϨÕdlu©^Lƪv®HüiÄ1K( /ÿ�úêtF'já@õ?úôBxÉ£'¿Ö®íc¡«B[%¸üjÜå¸üiÛ¿xÊmàÿ�]Y'w1®Õ ;®pO·$¬ÅY? z\ús[hRæ=¹\ÜsñcÎæbO' Jü nM�y¦z\¯ò¡Î8É«hOËçsVÑ6
Ïæ«hmUÄÓÎdnXy@)öÎx?
\v6ØR4é¡#qO!¨O¸4{yÌ{±³ÇïzÔ¶¯,[±FÑ÷°G@;jwË1éÞ�c=\7, g:ÓPvÉëx}®8öô§ÚãoJPmü¶\èÊ@ùI!Áüx«zlÉE7FWi¬û·¸ÌÒÈe\ºHãÜ¢8I0î@rø z:zµî}åõô¨TÍXùæt÷«QÀ³ Á®ËdU(ÊØõÛÿ�׫«º51.-fÆ /©¢¹ûYdÜI>qO 篸ãu,ÓÀæxÆm\_yç×ùÕk?ºG±ªe k\TúU
ÀÍA{lªw¯íP^[ªëÆ{W1 f)F¨®YÞ/æ½iÒ'¶e#rmÏNkÖí¼±æ
�ª6F9 çÖàÒ}k<õ5@õ5ÏJHJC¼?ü¬ õÅ'
w¦dÏZ$84
TLÇ$n#õ1ÏÞ#ôÃ,£?9¨ÍÌÙûÇ&¦QG&psO¿cQ¶h'kcÜs¼;wSþ×?BíùÔ{8èçó¨�zfV¥«^jÚÕ #5}zVÝÝ sÅmYЩ'µvþ¹e!Ø:]¾@m¸ÆF æ¸? ¸>�»Ûr|ùRÓNI§S¥X~aúT£ ~5RvglGøUÃÐ}\
áØrì>¾ôÃL4úeVj¬Õçss´9'Q¸b[óVØlÑO?Òªlvè))i@æÐ¦)ªù%±À4ü1îháÜøÀ÷©<»P8)HZ\qKÁ#ɧÈ
SãO¡Ï9Æri~f9#<þ´Îô´¸¤éISq ÃæçÖ¥�óÓ¯çRr}øíH@E#ßÓ(ëO0iàÓÐÓÐÓáu æ´!¢®Ñɬ´|¶GÖ´mqÎ8&Ôêi¥næéS0Èû¸Jé} àu5NVO¥4 )h¦TuV4Áǧ¥î1íE:/øõéýM4Ó¢ÿ�X¿Ýþ¦Óú¸ÿ�Ü_åN?ê£ÿ�q]ÒäWÓøêÛÿ�Cj9ùi#þ);þ¹ý ª´ÿ�{>üÓ 4Ó0Ô-Q5Sv=꬧rEYJ« ç Óî¥bÝs!5³/Üo¥aÝ}óY©-fjgäNä ÛMrÓÈMt×ýNüW1'ß5UÀcN øP5&0+%W<ÖZ®y¦ÑE(¤1Q úT»DÆ9©æ1E.j&ûÆ¥QïUÜüÝjD&ç4ÔoÒRJÚ)ñ®;Ueb¹«ÇmZÆzµõõéRF½È¨AÅJ¬qRMvÆ8Í!4¹)jµHIíHíq)¤MÜ£ó¸¨÷R<~à'4ýØsS#ÔR�Î9¨ûÓZCÈ¥-MÔÄRE0½0½=$Ó7óL,i"¥Qùcq=©äÓÇ#H~£ ÔsR }©XÉ=© óR/#HHÙÇF£ ½JÀÅV¸¹ÕAb2G)79 £½2Bnr�餴ÁÖ¤ñL,äÔ³H±®\à ÏU%¶[®ì÷ª.5)×±}kZÖÎ+e\Z¨²Ïu!òuãy¥UYf¹ù?»¥+bæ°û¼SycêjT@¼ SÜO¾g!} ]>ÞH\z6XJEK ¼0b7±9ÜÜ+xbmÄnbz·5RƧ$çw?Ê,M"ÉÅN�^�=©Äô¨·Òs·æ(jÖðZ°0¿t�=©Ìx�çCKT¬3J¦§æ ç8ÏZ'#µ8)çæ£�)Ë/'pÍ)Èù§ðF:ÓÁëR.Gç½<¨ÖNy5#LÆ\å V½VòUäjæuû2 nÕVr¦7ÜØùj´åLo¸ãåªÏÌgëQL§b7j{6caïÖòA×½Q7ÙUîiQyý¢qÃtaTïܰH"à1û>þ¬júvöéI¹ðp«øÖW¤y[äpBMeùÊ +|±èI¨Å�qRSݲª»²n£7A®YW¢ÈnÜ·ÖìYí'¨+È"¹¿ÞJÈÛÐdÒ2mó õª+ª,l[ï;Õ5Ô¾1ÞJ1ÞëMí»ü¡ ®zÕ¨."cÇ!}+Y[¸t«ÞÈ Ä; pîËÆ1è;Ô°ëGv^1AÞXg\d0ûÀÿ�Ö«Ñ^éÐí'е(9É88=«Y>°í¹§'\íϯ»�9úbµaÖ?LVŽìj0ʬGûWÎá¥f �B²vúf¹¼P̽ Ö W'©ëü©|ÝÄ ñÊçõØàXåóÜñÞ®Gª«àíVÓTVÀںŻ´�çpÇϵr '¾};S¥æH²ÕÃ.)ÊÃ= :gä¼ÇþñüéÉ3©êOµlKº]¥@ã¨=qLÜÛÀ<öÏ¥Gdµ$ÛYÁV£ûÕÛÔ¾pzzÕÛÔ¾pzz×G|ò_´o&Waþ¹ªÅæó9ÜS ýJ©nü©zõëÅ,(ÍE\«Æ1÷öªx6s÷¥[L®nÕ.:Cþz97¼ôÈ«VwúõjÒ~G?ýzÒÓî]ÆF>r}ÖSGjëtML5³Å. x?yÍ´²kñSÈPΦéôûÿ�4Ò·Ë.ädsèsVÁê2xõ¨f©IOà)Ü0z¾ÀK3ô«Ì±õúWkªÌñ«±(Ø;1G®ÀêÞs¡'8õ 2ádÀܧj ²£ÿ�z¹"Çsò)+"ó¾ÄVUÊ
#°¨Î\ÍÒF=ê¡à±®ÉXb±ç%aòÝbe�aHȪ-·¦{Vçü)#\À7ưm½éÖÀw¢@r)ONXòOXòOÍ1÷üé%pïJè�¤)ç§î´§î:Ó¢�RKiðÎEFÀ _ÓÁúV¨X.Õ&¯/JÙÓø¶AÞ¶4þ-w®¯Á¦i m?.0k¿BUrxé\'ÐÄfwýk¸·û{<ðOzZCÍKP¹É©æ8Zc
©XàzY·Þ·okÁ':Ï_N$íPr:ÓI¢[7¼gVÞ3Ö«É.2qõ¤ñ¨÷,ÆÐ(ÇçRóQ4¨ù£ÌÛ<Á¹8¥HòHÃm8$qMyrå¶9Qk{à8Í·bLÆJ ©Jz jñÏõÓj'nk=M@ çdZ®¤S#Öddt¬èÈéIESÇ©Üc¥G¿æSËñÓ(aR0h¥¤¥ÍBBî< Ô¨£T¾j{S##qéLÇ¥%P)ä~50éP3 ðiÊÃÖ§V�XiiôÃJ JiüÜÓAçKS÷wì÷êüÔÜóKjp{SN3MÏÓùSËqR¦{SN3M¤4òGzh i¨j6|v¨ÙñÚH¦¤4ÜÔêFM80ÍU Ök·{sÅ'Ib�$ÒyÁT �2M=Hɧ¨)ÙÀ÷¥ÔoÖ.¿1à ¥id×Efg TÀ×}¢bJg
5·1
�UXÁ½É(ÄCî'¯¹ªÑy9yGîÜ__sO±òb©o¥6¤SÅ< UU��:bõ5 ¹ v©7óWÕ$Óºr@Çý¸�p)ØÏSQ3é۹¦ªµGͿަÚý&aòCQ>SïHª jbðÔ¡±npjÃíLÆir)Á\Sò¬zvC¢¥=©Í9àÃÒ¸Æ(#u§¡SNRE=H8åÆ0h#æ¦ôO5"\ÜÒb°�j�jW"´ 9¥\cשè±Ì}þ³fÎW¦ìgJ±$$¬AÁùe¬k&úóý(%²q¨OóÅc^Ϋùc©¬ÉÆ>cp1ÔÕ5?xe;'ÓñÒ»óXù{2 g¿ÿ�Z±5lD#^r}êíã,væF,Ü.9Ü}kÖ%üço �NãX·Ó¾P�w(¢3ÇZ3IÅ(ªª9¢(¥'¶jen¹ÇÒ¡\Õ\zg?JzzÑETÈs?JеÜݾPk>3úVµö9ü\íÜã¹h78¢(uÍ\_
=²CmË÷yã+£³!s] ¤9Û)È2zf ³nc8Îjd©{sLEàfg�hÆ ÅjF0=\xÆÑÜUèݹEvàjbÃèjÄd¤rîÁmß(QJ¬çkëùIFÈÎ:0¨ÙXÎäÓÜy\ð¿Ä¿ãJP{=zR¦TÅO^ÓÇ ·CÜQVw¶¼aOË,mýGqüª«¬|³ÉÃ9'ú}jÌæ$o»¾ÅD$þöO<§hûÆ7ç=»Ö£ïÝö®ÏTã2ÛK"HIQ.½õÓ£¬ñ4ªÒMö¡Fã¸Ï#éÚʱ?òW=qìG5ÜØ^Ct¬mkù;:}jµØÜ¤~uÏóZÕ¸ ¡9áºYçÌãúwª:äµGR\Ö¹ïFe·Ò&:çsÐýkyrìqí^
9aͤ÷sbHÎqè:}+Îî?×ëô»#qèx¨³óltÍSCäÕE9ÎM&òXdTÐàTù>ã¨ÆFhSóÒy¡$Óí#¯Zc¤u¨áJþòX½j�HrkbÇM\ªZqÌdÕÚÞ±æÕ¨Û.mPúï¼¢A'p9ú×cò®Bã§û5Æø�þîä´½vgõ溪Ƕx©È~j.ø³;d+¹vó9îkµBí×'<× ¨È>Ð[\÷
qÒrMM·åªê»Á«ªïСO$HJ Ê #½22GÈ:Ö¸µÍ©f98üª³úS\PWæ©ûÌj'ï2k¸R yozµ¦ÀÁ>ù¤{oßON¥d¤ðr£¹§c(ÅV�À«TÊ
qWSåaÒ¬\Ï#®{R8Xáà M!4i¨sPæ¨JüõÁö¨$lÎy¦ÌÇ<ÔJÙ# QÖ¦5©jX©bêh/Çm[äF=+>Ð.A##?øõýßêißêãÿ�q=¿ÕÇþàþU¥¥çþ½8Óýªçç õ{MðÖùãÓþÕBãï7Öi¦zÓM@ÕU9OÍÏ\ôªÏS¾wô8ªòôAsþ¥«^A{³ ¬åO½dêG2íYZÌ{Vn¨H³aµÎè5fÅ<ç8®~ª0Í=AÏzvHÇJÊsY®pi(¢^riÌNÚEGJSÒ:xèph¢\ yéN,N´ g0ýêfp)QEHyÅ=W8硨}; z1½9HÏ4å#<ÑETôðÿ�¼ÆEF3lh|ÒÄñxbÀ<xbÀêh¥J\Ù-ëLÜÔíݱI¸uÅNyþ\óÞsëIK3Mf8æ¢-×5>c"ÇZc=é÷¤$ÒS¸¤¨ËÕîÚ¥òF¹!©õk&¼U2Ô[Ú)?}¹5FRnnE¸?»@Oj¥!7�~E¤÷ö¤¢\ë\¢\(ùEIaN8¨\ãæ¥QòZ¾ç8À«Ê~s S1J§�ÓiÃ¥5°dÔÙ :ÕnzÓò94#à±Ç9¡[w¤=iù£ïKBò §më#4î6òhR íBTj t4v§�ð0\(úõÍ?4å#Å9HÆqJ(SE-(^\T�{}ÚpoNôõ qOR¸§ Zt§V¥#t4Ðßþª«sr(N9µI$ªå©òJ¨j°½)piÇ×ð¨ä~Ã¥P»p"dè?ZÅ ¾yrØþx¤suu±@ÒyV( q÷^Ms7}¢MÊTî=«o=÷eS¸ö¦gv¤¢Ï½<ü(]£TÔ³db¤ã¶zÔU+nîkVÝ#ÜÑEQKÇ¥'µ.)´Ú(¢UàúÔ±üê!NO9M9MQE[
P@äóÖµ;È$ëXѳ§ã �ý+BÄåÀý(¢+bÔݰ:+R {VuºRkJº8®¢Áp�5ÒÙ.�zÕûd y�qÆjд+À« ?¥)#·jpNÎkT!Æ+P!Æ+J 6ãÝèÆEà¨ÎÞ « lNÐ>n3¸T«b� ÷�wªò;F¹É9¨|×2.Ñ
#%Ê1ëéZG½FÜóFCm/¸á=©ÀûÆíãÉa}ã vñ̹kh§È ç9êªÜH$RQJåä1Üu>¾ÕÔÞØý®Ú/!YXàs»úb³E¬¢'É Bàó»Ò¡ÞÌÈ È
ã?
M¬�m=9ç§ò§Ø8 ¬øgÓiè¤ÇwÓr#©qÝôæ¨N÷(Îîı£8èW¸Ç§JÑÓµìÙV(Ìoò®$ùeãÛozr[}2²DÍÆFï÷Z ì'j¯¸�vÉãzGàð+>B»ÎÕ«ÈßÇÏJ¬ËbWiDÈñEÑ.ñZÚèû&ùP®i NFsr\®Ú=¼¤ vÜyÑGµàgAuò»7TúøÖ,ñïVxL½ëUÀö§ò)PrsJMTUÀÎjª®sYÀgøjQ¹{RÄ0Ç4öiRÌjßjïÊdËòär{S&_#Ú¢l«0 X¾AéT¤]ìTsZ¶¸ïW+>ÛäEY kfÒ]°"ÐVŤ»E# ®÷Á2Gcv ÏJì;g'^w¢¿ÙíQNFèmîÜ(#,>9éÍUeÉ©YÚiÓ°r£éØ9Qè¥ÇÛÈ�jç¶ó'ÛÜþuµws+Ybrç²b3èsN+µi»êW9QUȪ9~R6ô¨äùHÛÒ¬ÉjmóuúU?µ°8ÝøVÅë-£'κ§ÈÏþ 8R(Í8õ¥QÆiTq¸ª²1cÉ«1©R3ÚerãÕC¿8àÓ» iéN M"ÀÀÉÛÐU)Ûr|¿CÍ^Ù߳ǹªmP~^zãÖ¢jANaL´Tÿ�Ǭ?îSü{Eþí0ÓßýZº?=ÿ�Õ§û£ùV¦ÿ�"æzþà3Y׳c=kFÀ1ðî7yåɬùñ¸òqL4ÓN4ÃUÚ«µQs×À½yé\ùé[ºËbÑ=KJÁ¦ÆriÒ#=(qQÜÝÜÕvÄOµQ'lDûQET¨ÙÒê�4ÛõB¤NP< }©êµJ(5GM1¨<ö« ÷j6h(6ÑÅ&(¥)ANEêi3Kæ£\dTk(¢DM'ÎÝ4ç}±QYn!¿ å¢ry©~Q(=iph\ñBu5+)ɦ¨Á5a¹¨³jF@Z{(h§·4Ún"r3æ¥ÏJ§ªÌÐZ3 Ë±Ú w&¢q3áFj9XG9Îf4Ê:¦Òc÷jkd1ã¥UÑáò¬Ãs¾@Þ«YDDcOV³|Æ?<3J(¥¨$c¹xëV2vw¨ä5'ü³ÉïVPÏVÏIKÚøjÇͧ$¥ ¾Á§2
,1ÚÁ9ã46 ÷¤¢sJF8ÏîùàÓùÛK iò D¦ìÏ §ôRJË$r Í;Í9æ¤sÖ\ Æi
Ê´Ú3El8ïvîjN2:ÔäXK\ÓijÆ\Ö6¦Ù]wÆNyôÅlº}ê
É®Ø1ÉÈÉ£¡ ,Àx£íye>YuRyé[:iVà ÜGÈíRvúS_ñ¸ÅhÆÚ'î³Æ ÓcRY1òüÀÒJm]«³ #=¢Þn\§å,ju^V#l¬[§O¥Xµ$±û³óc©éRÈãVAõ©]7Ƭ:[öGtsnÎÝã¶k>Í©\¼ûÒ"vgÑ:ûÖº1äaÎzàdÓ5m6µ4,åNçw&ß÷qÍD£ s;ÐdíÈ>´ªqÆxÏÁ³jb | sLD Þ±m¡2F\³(Û»oÝ¡÷&
´´¢ñȬNíÄÀÜc}£²a)òªÎk^É$¸à\oXáûªHù9úæíÑ·Þ¢ª6í dþõ9QV5)µÀ9æ¬$jSÈÍG§bIZd+ m¾g{c¹úÕ«ÿ�ØÎ&RHf$à©À>ØéÒÚ6´I oòTp¼òIèíWí¦2Z#°ÁpsÓ¤ö¤Ç^}ê0pzúVÉm¹n μ;®IÎC õNöÞ8Ð2s?S½·5 §àë\E×g6&XÃ$îb>¹X«uR1õËÖÙéz!æ¼óÅ2ùúó̮β¢ºï�ÈèqPX.$$´MB@Ïd©ô5BQ¡¬éÀÇ@.%$Ðc\£�$'nÝÁ�U²B£j²ü½näCêjí»©Í"ä¨FFîÓÊëo`ª<ûW¦:÷9«¢eà)ûhHÒ¦\XEg]Äb¬"³¨cÅ\_ûJÌV'>o/ëMÒ,e�©Iè+ Ê8:õUä穦54.iÌi¥ñHÛsɤm¹äÖmÎæU<\´6Í#qv«3p ª×PÀÎ}fëéO¦µ) nì#SØ}Bç?Ãp1UîÐ2)àúzS¦ @ï÷±Ó5\^æMÛæ£jjCÖj³Õg¬3×¥P<·µhLÙ~\³¼~T(©JT«Ò踦Û./jÞ·\DZÄpÝó[6Ç÷\1KM4êi§·JºT¼dæªÎÁsì\ÉcÀçS2zóȦ(íEDG5 N^rG~´SG ~tTÿ�°ÿ�¹LjzÇ´?î cT¯÷ýÑüªWûþèþU¯b�ðæ1ÏÙÇõ¬Û2F{ÖÓsÓìéýk6çÝ3ô¦a§ÕgªïYò £<ÕIjO˧/ÉÅU¾Ç3ëXÒ(]KýHõ¬[à�9¬MQ±3{XºbSìekñí¼kµõ¢éÔô¬6¢¼;aúµ$Eò 2ùó ñÉ5Ißý¾Mß÷ ô¢(«VÇ÷C'¨§±ê¼$ù+R°ã÷céR+~ì})E%SÃ~TÇ=iá¸üi®r¾ïC?ËHÏòÑERæÉÞ ¦¨À<æ/Qó-FÌ´QEbrCSíØl�u/@¢`ԡȸpGZ9ëJzP¦WXãRjC%3EJçO4ÚSȦÓÔkÄùÁ÷95³8¬+²%×Ñ0[f\¤Çì¢>cªÕ=EÙ}<Ç J;PÇ&CÖ¶c (øT y ûRmWç¥/9ÍZ�ã 1ÅY�ã ;RÒRõ£|(5!`6¯jtÅÈÛRØõ¦)mî�ç8¦ÛÜÞÒðhÅHriç�5WQ(n9©1·SÕø9¿jz· ÷íJ:ÒúÓi{Tþ¯¥$Å0îÚ1éQo3 øP0{ V|(=©GݤcÒ{óõª®>|Àæ¬f©Èïçà§ËëPNÃ�æ =ÍQEZc52^+sÜU5$DmÈ©"#nE¢>õm#ksÕ.r@ÇL!§|Ç"¦|Ç"m/\b ι3ÇqnйÚÞ¹éÓ'»¡Ç¶M>ö)TÁÚ¼ñÁ9ïU¯¾Ðñu2=¾ÿ�YO7õ¨ôþ1dóxP:Oé@$IE±ïH%@+ÁÇ=ø¯e¥ÍæãU¨ ,²<ÿ�SX3^ãi¦ njz·�·E1\3 ÙåPúuªfß|óNHFBzñìz~µFÐÁ¾ig' õãØôýh©a·iUòÌç~µJeÄ-£%ÃÏ=8kÚÚGudò,±M yF,ý¥sºí·`Á·!ä+@øòúo¼?0ÃbÄþ«#XyAÙ; qF!?êÚKd<
fÀ�É}9ÿ�µ©Ok-òU�fL3øÕÓÌOѼp¶Ö8+÷íõÅRaVæÔfÔ[ELä,}ùªgµá=Î'Ò»ÁÛÇµÇøR߬¸ºöc¯áéäV¯&ÇÞ9äu¦º²CÄ||ǽsvªZuö9®KµòÀn ¨ªJ¾KÊAþ²Q×è=Ígè£pm¡&"HÙ7JÞ±ªz»«ûCÅòñPXÚJ-�ö)0Nj)o%:A ÊF~a¿#úÔr^Hoã QÌ=.Gõª©8[yR¡Èà 1ÜSÜAü©Úi >M¬vèÙYC<êrsôÀö¬9£=¨Ub~U,}«¯+oÀUgoÿ�Z'Ú>éä³l£\_)k±½NIüI«óÈ�Òv<`VÌSÈcíäq¥kÅ0xÄ{y`cÒºùÓ-¯^ÜÑXn+úþX^yq6ò Ásó'®3×éX0]Çfw2Tð}rzV¦£:¦\MÄïy ÍLÒí!r9SóÈÇJÏKFRSÜÕËr\e543�ç?¥K FÀ9ÏéZ\_¼$%ã!×å$ð=ÏøU±"Q)ÇÌG\_S\ªj�&`³6Ï.$~u·£»ÜfI'#Ò«]1X°$çÏf%²zgÞÅëÒ«¶3X÷rydÒ².äó$È8¥s>(´ÃJ7O7¡[¢á$Ú]îIcÇ5©«]µåÄÈÁóÅeHT°#×SÒ«XóSÈF\®rç5Nvä ©3rp9ªLrÇjÔäcðªYËÕûu;EZj¤3mÖ®¡ 3Wív�jõ®ÒÍméPHê óÎ1[ñBTáúg¦kÓõ³ª
æºË)"¹;0sK¸RÍ5¹¥d¼UNzñO7À¨Uà`Sá»i r3Îj½ù8äqN
aF 4Í5¥< ÔFNÔÙ Ïzl
@ç½=íÌÆX¥uhÙRT¯äVÎcÍ\/jÉQÞvÌOrz U¤VÅEÉéOQI ñI ñNll+VÊëc£¯ZÆ;Sòгv¡&£"o=)@ÀéO�ɧKdÒÜ\ùI&¥´BèX¶1Q5³´¬B7Õi"há9CÙ©Ö4ý¤ö¤d"UºU¹8¬ÙÛçcéMßwìr¹#f\+!äAÖ¤^Ô1KZXúÔýîlr1Áô&²¢ùÓ´ËP2qØ7$RÒKHƤ=9©NjÀ$PJïA©ðFIçµ^åÊàr:ôïL=( ÑPMBy5Jb6 À¢'#=è©þ=¢ÿ�pS¤\_ø÷ýÁQ5K'ÜO÷Gò©dûþèþUµl?Ó¹ä[!¬«¼{úÖ´O¶±óøVEÇÞ~~qL#çJa2ÑETÒå°¤·AµjRÛÆ:TÉÌÞø©S½ñE(¤¥.v\_jFCæj{EHäQFqIJi\\ôÍbÛ~óİ?w5¶ÍXJyä¨&ªÞÓZ¯\ÉÈU[°ZkUõ?¢ô½éo àt§ñ1Ò�®EÉ0¢¯
áÚÆhQÅÍVr ÐÇ¥O{ÕQÌÇjØ'bý\(KÜÔqï'¹¦½NÇÊaLrþ´®�LEçÆiÍ÷piÃîSܤ^ôÅô¤s"£#sSî/ivÇØR78
!çÒµ'SAè(Ç&L+ûÎ9 ¨Ë\OáMe� w¦²N)(§tUãU6pæ®éÇ5´LÓ$ôãÚ¬9Á©° ÌFÐO3OjTjV<Ó@9¨¥c1±ÇµU~T{Ô¶ÕÀ+m\�i@Å5)&hv >nGzκË;JçyÅYýá#)Û~UsT¥r ã§5NQç8éÍQEr÷%Ô©àÔ+2´$ãÍf9;æ´|EÉmÛ<²íÁíXÏÝÓÆ9�äÏjÁ» t {QEV¡Öf=±Çl¸Á(2OãYûÙÛ,Kze9:Q<òL@w$°ü\7IHäÐv
¢+·ðÞ5½o?«ðÖ7/9Àæºß)\x5ÜhJeÓP.8®ÓDS.¡qÅX² \®FAÆ×#8+2Óæ2Fy®³û:Ù9µ«Ç¾.sò×1(h(ÄgÐ×aªG¶6ã×Ò¹{\_4nÞÃz5fk1brzäîs¼g+qFm(ÀÅi[B"PY~r;UÞA�t©¤ ëJ1Æ¢¾é4§Öãp�t=ið}qC®(<QPܶ¿B£×, .qÏ'NõêK$»t )Àü£éKH´£8 t«îÞ&ÎPsõ!^OÞ8ô¦C¤H«÷Tm× ñÞ«Éjß»Vt±²9F#k0 Í!ì§ñ¬É»ÝqÒ³uã�»\_=ºY÷ñÆ�!v¾{t"¹ýG¶W1ÊÖ»¡ªÀ©>þÀ\_YÏevö×ì3óð¯Pº;[©õ7 QÉcØýkÎ5;©n®cyøF2ééPËÀÎj«0>Õfb1Ö©)Ã6k&á°àv5pØ|v5qÀÎ~M>Õrä:þu@ZpAº5jº´TV¼ÛNÚµc ²¢µm£ Ê:ßÓ´Ó=²J8ë]Ey\>µ ~óI@;?#5³ « ÇJS3PïËTÒ¢UËf!;$î�SåhMäd@5öÒóàgÐô+®Qs:JÈÜ5Æò~©"£ò¹¤^GÖ¯È hÎ1Mµ2�sÒ±p)á@£ ¤c"¨Î1SUÅY·ÒÕÓÒ´"´Hªg8©QFxéyÖÎi1JM4oãM,�SKc\/(++tÉÅ:fìyÇéU®%s+¸nîOj,¤¾TóO§§4S»S»V@ǧ:S¼d#ÿ�V2Ùã1Ç'4Ò¢AæSéL<ZKhæil®9©g êpqýj¤,ÊÀ7¾´´Ö§R7J¥Z=O§aU.yÁéÖwǯpNIlvÊ(¢¢5ÅR(7{QJÍp~ÔTþ¢?÷EFÝiÙÛnýüªKóu¢yB®Ê(=p+Zÿ�-8@¶Lû|µpWy¹Í\_am X°àhÏþ;\|÷ìfÎêÎ5q9�Õ£&TäÖmÐàóYײ/\k>öSååMhܸH"¹Û¦f95¦×Eá`[aÜÕGE¤¸ÿ�X1N¹<Ö9ù£rO9¬óFÄsPHhi[D>çµSÔ±åÆ?Ú«¿ÁÚ³õ2r1üU^ìݾùÕ{®-Ûè)(¢Ñ~èÁE<i±ÿ�ªv¥úÕ
ûª=ªÀû {QERw4ÌvíRÍE #Ô×àg×àf(¢§¯EÞ´¸ÁÅ$'ð¨Áµ#róEQN¹ DjklùkJ«vÅ îzÕËe\�=qOî¹o@1Oî¸>(R¯ZõkoZ²Ä UhÎwf§�ëSÈ�u¥¦y8Å2¥AÀìk'CQçÞû±úÖ²c õ¢qu|½>oÇA6>×iõoý j´ú·ò¥/¥¶h^ÿ�JÜ'S¦OÈ3ÍDçåãÞ®9þmÎð©Ý¦bj%PX1±ØÚ«Y°LzfúÓiþ¦ zû@§0=ôy ~~Óø×2k²Öcó49PìkÆMakí½ ?þÒ±5öÞÆ ÿ�OéGj){JTBÙÇ@2iÑ£À<ÕøVÚ\ÁZIÅöõ©4o&K°%4;±½WØ4¦ðùúUxíÁ$Þ??J(¢�Hàz×Qá»&H09ï]À1µ%»@<Ôµq `ýëÐôÛ4ODÁã¨=k¿ÓDpxê;Õí"Ñîn×jäº=N7ES$À¾Ê;fQ,yÜ;áÿ�:è.buO&(¡ÛÉnK«qn%¶`ÃW!}jÑÊqÐõÛ<ma\_§Ä§Úªk±Ë?8ªëV±ÈTüàcç/´£>ÒûØO½r 0H=«Ñ/µ(#·6ëßïg©5Á^a§%{Ö=¬CvµíÁ±Ïj«mÐÖ¼ 6RÓ
R
W©¡¾}{T@dÖd�55¼AO¥hÄj®B8Ítv)±]ím Uí2×lôÇ5èZ+éÛõ®\4òþLyÈ«¶Ð#ýÁöéRÑE´jýkô9QøÑÔ>´}:w§7Þ4Ù>í"R²æ
P£Þ£ÃyíS0|ÌöÅQÕ+ÆOqK@±p ?Jîݦa´àc¡¢ÞÑ- Ĺ<±æ`½sãè0NzSNG$¨QÜõªS]± FØ®6iÖ�w÷èZdÓ¬ ïд·7pÚ¨2n,Çj\.I=µI)?uB4
øVl}qêG¥AsæÃ/Ò[¤ÌÌ ÔñÁþÆjÞ+»@scn ~lzîìOµI{8U(ïéTR}iÌr:MçA§j¶FZEn0zÔ`ÚãÜÕ¡íç9ÎGlUøåYçozóJ:RJLäøZ¯÷¤$8¤¹¸a!�qÒ¤~ì?|sE!éKE¥¥/Ì$æ«ÏÌgµXëzÓÈ#µDh§0¢¡#¡#²$R¹Ïä(«�ü9¢)ýÄîåYçhJ3îåT\`Õ{Ðw ¨/AÞ>¬HF§/û$ú qOç9ë]¶´
´M8ùõÿ�A®6eÚÆOj8Ü:ÔØ5qÎI¬ùX´±fªMÉëRHü·5[nÙi85bC¹À¨'8Ú\ªr( öj,`ÐiîrÔÓL?t}+?R#t�õÍh·³5LmþµN÷vü?T¼ü?%QZ«Ê¥;Ôû½ºR´: ´: (¢5\_znãÁ¦2FÔ=¨¢):çÅGi»#J3ïL?½DFYFÚFÚ(¢Ð5×ñÍiF8,o¦µ \_s}¡I�ÅÍ:Ô2@9ærö¦ÓS u Sä?'µNáÐTÈT~$Ò
8JJ±móæ¬s»&«Y±OµL<Óá?ºR{Ó¢?»\÷¥^M;$jõ¢²ðiçµDOZuä9ÜÓäsKüT¾ÑÁ§¢¡éHþ´³ Ä㯥\© µú f3!¦´ºÑHrßAO\ö¨z³f¥HãOS=)Ë¢\ÇÒ«`« TX S(¥Å%G:`8hý+Qý+ÐËóz ×{öet1ü«+^$÷ ÿ�OëYä|Bÿ�QþZQIJ=i+JÏLkÈØá5½m¥,QykÑÆ<@9lÒ3ØÃ}ky|¸SH2½ëKJÓíÚw/,OéZ:] Ê@9^XÒ`vsD!Y±ÀcÀ÷®~Ámå¸!]@n§oÖ·¬a·RáXQü©e1=F S@æc#9æwzU¶Y³·9«MÎÞ´íWLLä)GÆp¼µJ=\&d@ñÇ+¨XhL`Wn0¿{¿Ja®Ubq¸.Å!y>õsdy:S¢û Ö«ª¶:c5n$TZ,®ÌaÇoZkUuÙ8íë\V«¡IkÚ#ýj;Qûµ|:^wmo.Ð2ÆÅbeÝ3ÿ�ë¯:Òm²IAàô\Ç'¥[üµTb¬[sVmHYqÜÕRLw5vÌÎ!qí´gÐp:`q\tbÙ´Ñqô®ÃR¼
ÈÎݸ ¦¢\õ]®½8ý1ÉïÒzPx¢ÖÅVn|©ZØy\ àQÈû;YýdÓ$}¬ÞÊ2iô'$÷'iAÚsÏÌßÛëFÖö]t3#Ì2Æ °Æ:÷Eè=qÖJ RÀ)I�@�GjnÐ'4Ùd+üUèy¤Hõ4êJ\J ®Øéµ3ííN¤¬´ÞÝ)f q¦i�i�qd¸ôÈmü¥gµY<8ïéP\M±rq'ÐqE39<ÓÇJ`lhlk$ KR¨F:ViC¿¥\_,Ö(¢qã<àö4ÅèsÏOçOnyÉ8íMÎAõÇõ¦·J)®h¨üÕ«^q ^úCÈÝÀ¢W0§û£ùVuÇÊMiýÑü«&èüõ£òƾ¸¨µ5õÅ^¸·hv ÿ�ϼú p:òæuë^ãncÿ�^Ñÿ�è¼×Um×Oõª2±5Oí�¾Ú·sÀÇc
o7Ð×7w#$¹æ¹ë©ÜóYlNiù84ÊÓÿ�ç4Ùp@§D7}ýÑìiÄf2}iÇ&ôR´ú ÌÔÁ2ÛÖAÁ?eë D ÕKì}¸þuR÷gcî?%QZxê8ªA÷¨#R9ã,@rENN8ÅLN8¢(©�ùÏ4ÀNy©;\689Å9¸üéíÇçEQLr}:Q)ħÖÇÌ1LÇÎiÆh¢\¡kþ@æ¶"»ßu/iF@@)ö\HßÞ&f 3·©4T8¨êE#m6CÈ\u«0j¸#$sTýþ´ù~÷ZkSiÍM©·~+V'S´¸íµãÆV³uÈ<Û'eÆèÎðj½ò±²b¿yHaøsP^lدUÃÃQAë@ëHjüÔäTõïKm/Ú,ac%FiBÈ ÷8¥ aʰ~4®Á0û¬^Ôbܵ\sQÆp¬1íN t©
¥N{ Q@¤¥íD\n'RõØTpçÓÇúÖôÅ9>êýiÉ÷Wë@¥ AKüF¢,=j`>é>^Qû°j`ç¡"íHæ ûSiØéM¥Í4·p=éÒ㹦ÓÞÆG ÷£±÷£¶h4PjxËÅHÃl
'µ9ºð{ÕqVb!ÅI'¥9ÇÍD+Á=¨~¸½/ñj+
ÏNÄ«v¨fÑsI+ $m`isLsQJÄ«v¦3gjø=¸¤NÑ»Å6gs`:TË? pä7b\5ÃݱHz¥�P:Ó¢+ë·Íkv
Lw pFÇǯjén[pybW¸
nC ýÓ \¦¡n.Q¾ßcUoàÉ߯xOnw¦w®wK½kVãcÚ¢¸Ôî'¹ÎYºgµ6îÚK+8?ÞµDõϽ`I<ñÆ ,ʹ\_zyã@Y#r´JÌYc{Ò+ZÁ®w ·¾+¥ÓÀùí>æ¸û;Ãv�õDÖB®¥^Ó/! ò>Gl»¦ÝÃä|Ù¢¥·ó£àùÅEEvrTïBßåþR+·½iq,G¥[µróûÖüZ»ÈPFN õæ·bÕ]Ê'úó[±jÓÄ£ÌôÍN$¸£|LW7JÜ1Ö·ä¸vCÒ¤³Îܵ )E\6ÆkZÜ<«±'Õ·$ªìIº[½fê{vUf�¹á¥%]Ø ãßãYVP" 2Ojê4;C ¬ÃåçG!%ñV× éPÉç¶£h®Z¡23·jÖ}û3Ý º¯ [²ã+ùóXÚ¥%rÍØôÛÛÆ 8ãj/qKEõ&¢y3Ààw÷«NêøUuAÏåO#¨=h �síMyØ^¬ÏZÅ¿Õ ß»1ÅÑ?3Ò»çÓÖÒ£QOQÇbçð¦GbÇð©ïïñ2w0?{éV,#dµ;±=:óÞ²láiî#@¸�äã¦+¢ãh³ïf¹EË�ïïT##·¾ùæ³.¬üó#ºcÓû§Ò¨êxo>!ÁåÇõª7öxo:!ÁåÇõ®#Æ~g-«ÛǺFéH÷ÿ�Çÿ�¯\LDqkÛxFGqýáéC^so fMö»@MÌ~\s wéèjá§F8§ÍT ÍUÁ9Ø1ÜÔ¹<qJÊ3ÍHϵFÊCsY×ÀÛµªÇqªS®wqÅAyèÈóP]ÇÈê¬2ÉózV|ßxýkfF7<+\uùRI ¥dËÜäÖÍÇܪÀ¹¦9¬¨ÚIPoa˹FyToaP³1Uð6»RV`Îk^7 Õ`UøÀ#nØ!Dq5·b
ÄÕVpß-tö/)b &°,Ôe}ý«¤±EuÆI8ç6jt9¨qRÚ:V$5¥ üÆ´aºg|@ïÐió! I%{Jçá¶Ø$± êÛ£gÊ;}FüTäTNrÕ$¤lÎjIÙÑl2
b¸ÁéY߸`«ÔµiAp³ l¨Ìà2�ÀÅ�J\_)j-åWD\ªõ¦Ã<©õéj°÷þ\|Ç >ÕIàðv×5RîB7|Æd$õ§µXiáª5sQ¬Äµ&©#±ñÛbÖE;Û§jæÜcÖ¯C;czµ5"ÔrjD95¦ÅYN®[>åê+!ç9KV'pxéKHx´Æ4æ8æ8?ÔR0D9<ö)#¹Èª720�ÓIÍÒh¨ æ '©3«EWNr(«'ýR¸?e\zÕ?êÓýÑü«2ézÑ© ã¥ÌcÕ:ÿ�ÄÓ?óí?ï^e©¦.\ïW¦>²,½>Íÿ�ÇEyγY{Õ W}U1ÞõoÕWS¾°§£É¬I8$sXÒ Æ¢ÅY Í@ü{TRç&îH5Ì B6zTFÃíH))i)JÇÖà+`@ëXÚ£§B=
QÔú/^¤Ö©\_ô^½HþtQEª§áR æ¢NÕ2æ¬GÎ>b>qô¢(§Çjp6 4¯µ<ä<çmQEGç?ý)��N\_<àf=éª0AïEQLµPÒÊØ9«È£mP·ý 0÷jkL8ìNjk\ã±4£z)H:Tr.j¸AÏÒ¬¹Ç�ôô§H µ:E©¬)ö¦Ò Ù#YC+}ÖMH«Ê© }ûÓJå0FGzi\®Èï@£½�Q ÅÐØÇ=ÅæBHæ¯]GûÈÇ|TuTkKÈuÇÝ!\\Ó2%Ò$«TmÀXäµo¿|¾êNERíïFß/ºÅ ëEóJy4îxú÷«# ÁäÓc¢�}ió&èÍ] ¡?Źÿ�))zF)Ì>AÅEqõ4æ,ñÀ4èÓs×4Ç;ô`ª´¸!0RääÒ¨äR¦©\³°3ÀUpéÎIlS#ËËq´Ãi'ùÔP¦Y¤Éô¨¢L±'Ò@ëJx&>ð禾wj^[1`zT¬¼{f¤aÇãIE/ZDqiÁÁÆ$Ò"áàu«jÕúU¥h©cá3K¼`rM ¿\Ó°µ~µYðÅýÜU\¾µZI#6Tñr;Ô3Üf£�FiîFãõ¦fbQE$ zÓ Ìpç<àT¿(Àªf ̧æýßZª8ÇÆ&PqE\/4¬¸SÝ!o+¸ OÈ?1äÆÅêOZr¨8éɧdøÍ.Fö#¾3JãIÅð(Fò $©Cªk¸àËH?N¿JîVá&ùÅQÔlã¾¶Ãa$\_¸ÞýjÎÔ¬å<ÈÜ4 ß\ ÏÔ,Vá<ÈÜ4 ßTN3INÜ1Ò\pBÝX·#ëV£³«·ýé]Y¬°+6ÓNyU¶+>×OyU¶(¢P UM\Ojè,öµGK¶euÆÓ]lUÔèÖJ!VqtÍtÚ=c´¥e`îUÉ=1Tíb2J=v6k1´·ëN,jÃ|«Q+Òç5Ðǵ#Ú½}k~=©ÕëWt=$UÀÆIõö®ëö~TkÉ+Úð.�fU<õïSùvɶiñ=¤UéÉý\@e¥7 í^¾´¦uv¯\_Z½¤Úm;¶pãüñVï5H-þX¿|ýÊ>¦°ïu=yHJF8n[ü+]G'íS3êi:ÔAªh·?ÃÜÔHÆWÀÉ&£F2¾I5¯w¨IpI@Øè£ úõêbî¸ÀÉè>·ÜO5¹£YIvá�`ZCÐûZ5ä÷§ÑE^U º \+sI¶1[\ ÏÓjÿ�E^yô `à{ ^§9¢Äc öõ¢CÔzfʲFñ²VÈenCB)ýÿ�úôÎR¸·òÁtÉON¡×©Øç¸Á÷ªZtwCÖ¨ÜZa·Ä¤ÕGj¥qkßäª;W¶êÌ3YçæSËEþ#Þ°ãC»9¯T`¬®®»)VSÑê r:æÓßí)ÿ�<ßü=jàñUe<¶ã¨ª²c,+2à fÎ+sàu¬ùÃdw;Ù$1¸!Ôà©"³&ÆæûÔlaÓó¢Ú%/qU¦|À¤Õv ÐñTQÕçÉ ÁªHÊóò
ON)mÐ4=\&95$,³Wòp)ðKá×Q zÑGeq÷jú9Yvµ ,J\_Ö®iwÎ ;ö¬ÆÄ«ÁëEhgÅj%E!¥·&)®qZm·ËVÅi¶ß,0î+Ñ"´kX\_ÕMVUv
oáïW4 ±qd#?y{JÏÔ%ebª AÞ60nI4¢£/¸cµF\°Çj+{CzqT¦Ì ñU¼ÆfÇ#¥=sÆij74þÕ ddÐAíéTnÜ`jã +wÏJθ^¾½qMïOÀ)ÄëP(ù¹8æ®Dp:æª"295r.ïR-H)OÅYqVcUËqÈ5©À íT-Æ{¢´m^@ÏÖa'4mrzzVkÆC>¤i¢TGBzÕI;Ï¥\\_º\À@©» ³
^=\Ä\xô t¦v§öÉ:÷éM +Ó@È41ù ~cMn´Ö§æ"ü©Í Öçäìis
Í/EÍ(ë
¤'¢YHä¬}=ÛK¿k û9ÍmǹCR´[Ø6tc>þJê6OúèÉÇûC¸ªw1$Ñ®BqþÐî(èy RV8\=ªF8AX^ ×PùR."áþ!ë[}ÕúU{
$t³o:Í>éãÆ)Äü£Í=ú/Ò@%jx¤Sü)®Ø=ϧ¾ sõ§> sõ¡pH¦°æu£¶j e;Õ§Z±/P UDiÇ=)¯þ´æª¤ £½ i{µ1ÈTÜͧ(¦§E lSCdàPwÀ ÍU{
f8Áàãó©à`ê WÔÑE8§äcS´äpzSNzÿ�Jgc±ë;w4Ù"IGÎ9u{áà¡8èk`74ì¤#zukÒv?f×Ö«\ÚÇr¯ÙõªºgªFEÌx~äÊ>eÿ�¡¯6×ô;ÍVóÀÝÿ�ÕÎäoocìkÓÒä4îÀ>Ýiòäã8Ý~xä\¼ð|sÞ´ãÜzýkn}ÉmÛ®ÃÓð=ª¬|êWßµs\_Ù6ÆLO ¼\çöUÅ£1O ¼^Ez±à[yÙæÑæ7Þû<òÿ�À[ük½Ò/,%ÙwÄsÁ#å?CÒÑëZ^Nà T0¸«Èý
jYFx´ì££ZµL\húUûld=ø5¢�n1YVÁtÔÁeiÆMi\Ó »æªä9Å]e{t¬É[9õ¦)¤ÑP³sP3sPÍÁJÍsºÔRóç5¬Å!LÆ9ÍqúÄJ%$Ï¥`?ß5×jf@J/5ÊÜBñLÊÊG5Z̳Æ[ÔÔÒ4ÑyPô¥ñÀö¬Ô`\õÇ5 ¬#=qÍCEST÷Åbé-ºæäúçùÖÛü°Ç W/ ñ¶i<¸×-×5JþEkvs2z{U;é)ÙÎ�ÉéEQ]g5ê0)êØúQEWJ§)Q¶3À:ÝÉ @¶\3¬]0F>#j¶øç?ð{jvøç?ð;QEÐÆ¤^Æítý±r½åHúåÃÆTªç>Ïí;`¸ùóü4ßíp¸ù³Ïj(¢é7S;sç"×e!CF¼ µææ=NÛi>aÿ�f§MJßi>açÚ\ñIEnyÍ�ðk |Ab,~57öå¾ÞQ©ãQµnDËøÓ
ý³r&QElG÷) ZÏ͹½'ö½³�A$íøÇñ©~×o Tþ4«Ö3IZ Àn;Õfqæ¦CR[ÉçAæÃtªÍ
¹P:I+üW¡Å$ò! /%U-Z¶¸£ctbµ«msöhߣmç vV<&]'P1Ü6 rv·b;Uvo²]|N½j»7ÙnKù6:)õ£½)9¤ïF0y®vÕ^S¹õ©7£¶å`A\\2»¤P\ܸ`r3VämÃZJZ\`7HN�ìNx§( £ÔRàT¡8úòj@¼~¦¸¢t£ÆQZpÄç4uSO�zÐHõ ëIÚÖÔ£¨«=E ÷ÿ� R)¸¿ ´x"¬©óQHð§Ú[ð§«0RÍg59ÏLPM¯ç®\+ QÜ8T ^Ln?Zç¦OÖ«µkhùN{Óå+e§CtSü>µ8<ç½H³&@=ÍH3.@=Í?iîS¯5$í\Ñ}}~e-¢nltnÕZÚDù52[ã~`zóSÀÍNê£qëS$ £qT
ä\Ç©éVc³èY²=ºUµ\¶Ið§6ì=iBÕRïü
+Ƨ·PÒ·AÍH½ôQÉ©7¸^95ÄséÒm<ê�ç çbää÷µ´HVÝd¿@¼ÎHéÇÖ¸OçkÒD>íº,cëÔÿ�:À5ÚÞé3ê¬ò¤J'¯ÔÜäÒ¼ÙàR¼¹àVä\·@qõsxe)óüje³´2zµPH$}ÌÌ<äÓóOFüª\?Z#b\Q´<íÀ�#GQZ}Æp ù ÆHÁÍan-Û8V¦®ß;ʦ;ÔÎ\JÛ-O°Z|ÍúÖÁé õªÜ7�¢òkSoSÇzæu÷'æ$ ÇoZb7½Dǹ\Hj¸ÒÇrcÝó=p\t»�`JA#ò¬tUNÀ�ôÓî d`õ>õ)n~´
²0zw>´¾a4ï0Ù{Ê1~Áx4É.ıuPáú`ñËYØ#§9éK3¹²AáFS°þeO#ò©§¤¡`Ø�ûSDhX6�>Ô·zMÄlöÒ}³Áë~EW±Ó'¶¸Û2qSjìNÛ@ y?Þ«Ñ\\¨\ÿ�3ëO£óO¢cRÊ~@K)ù0+J(ªïµ«L|Í»¸\_jÒUÀË(# -Xwe² ·u9Ȧf¤ïUÅW'H¶yJ\oN=)®ô¨²Áø§HhqX£Þ~PMh>Çnº\_åYÒI ý)¤ c\í$x§dêßýÓUÜ ;UwÕJXbÎv¯'jÕ¬ÚVhQQ¹#§¡"·L|j H°º9$ù-ü«á=êx� W¾µÇä¥?&OS\¬s'©¯/<IKI@9³¦Ò`%s ö«ã;Pç+ÀÎN\¼±$ÉûÅ ªòƯï6:f(¢©E§[íûµ7Ø-¸>PÎj<ºÃn;éWú'¸¦Kg¯jnP.[jäuÁ¨¡å(Ú2:ÑETÊÜ|¥ÈRñíWئW÷ÍY$\b5ú ±$h¸/\_J(¢Z[Èhþu«.ß)G=ªìs5¤¤sDEåÑ¡ãGÀZ5~~ôè-<&x´øé=�ëW%8Aô4éM>'AÍXQÜô« ;Ð@û¸ ,q{f£PIÚ=ÍX8Eù½ÀÇz�Ç^\69ã¥)9#ÓÒÒ1Ïx\m¶Tz¯+�zhvÉaGEèÖù°µ%ÑÚð\_Ýí�æ¨Ý\ùPÜÞÆX~s ±,q¼EiÏÉcÙϲ´ø"2Ê�#×=kOYo³ÚA¦CÃϸíùõüª}Ò5s1QjZLö�VDMssw¨7RW\_ËäµÝQæïÈbIa½8úkÁíÐí<çÜw¤¼'|jzúOó©tõã$+\àg¸ëQVrF\_éú× 4ïu¨+9#/ÀôÉÉýk.úUîRs!Tú0?W¢ß
|Ùr:Åu\)äò3Zçôø "¨ú×]oQÇu¾·,í+/ֺܳ´¼Z+¢ðŤSXÄÎÓÞ¹øãidTAc+¿Ñì>ǧÄåwl¶}H¢Wøª7Ú¤pfºíÜú@:TüAvÑ@Jp¡z±ìA¡iFÊ&ãæ¼|ç©QýÑýjýÅü¯vlícUUyº=¯¥^¸¾®¾Émªû£ÛÞ´-EÒáS½CíT»~¹¬ÍCÄ0HJÚbvÅ ¯ú¶zþ{½A®ï\,`á@ôiäG¼çÎpxTz}Oÿ�Z´àC \_3ù¿/&>ózý=\Ê|«éQ}é=BÔØ«®Ñ
è¼ ± àqÑxxHðÆîe2Ï9ËKÔ»äóÛ°ÿ�ëÕëOÜÄF9ò{Õo0pÉÀã©Åi$g{ÎñM`ЧwëSnýjÜpYáP{SÌÛQA=9àuªÈêbp[\ÄORzÓa/$0m½:S³@£Ò f ÕÁ3ÐtÁP»ÁÁçwoÃ4)'n<T<¶äõÆO?¥&9éSEÅGR§N\XWç©a\_"mÙ(0Ç æ¶ôeYHf$ufçj íP[ÚÓ 8#9ç=hs
ªÄÔ²¶[
@N3L¸|¶;)ÇaEìæ F ¸nÈ ×%+çq$ñÈqõmbè½ÆÅ8D$qÁ5#
Ýà{`ÒnÎiAɦßp«ÍWÎ XxÉéOY70 ô=¸ªîä�ß7<`u4E[ǯ)ã8 m!8Ï;vµ;vµYM1~W88'p,AäOzåòË{÷üª@iØíQ'èjxÖ¤8©"Èy%ì9=Áè¿ýz´¸ ØêØfÚü̪2#a¹®J·È,ÁJ¨�ä{R¢I¬¹èiÀ`zQV ¸"¬pEIci³ÅdôãùSîôøîWÌÜÑÉ·È«Æ#OlÆH1\84©ÙC a¢xÊ9ÆAã\ÄÑɾ\ã æ=EGåqøWKsn0ynC´÷SXd«½84ÊCO(i
MFÊGjÕS�qÅWã9lfUÈõÅPÝzÒfsMÁÍHª})ª =)qp¥A¸öÎj±]ü\Ñ´·v# LSS¨Å` µo �í¶8�sJ#\9íÅ+~4iæi)\
ùOZÍ`ýkQ×rµfÊ»GFÔS
MP½h©]2¤qϵq¾êÿ�º\&5;µÝVàWæ5Ý9+i ):ýf\±w×t\_²CÔÿ�\ȸL±G4¨ç8·ÿ�²i梸?èòºj¬§¿û¦«Êqý V3å¾j««8]ñÉòN\˪àg�tÀ¬½fLiC�eÅsjI õíUåÖ ¬=ê q+~A\¬ò ó)z J`à}é²8&vè£56>QYÚÔ¾V@¹ÛPNÞTçøW5 ÍåBî
sEQY0]0HãæY ôÐéÖimîQæõ$ö®~$°6÷nW<Jê"pȬ:«¤¦XGï�ªG@yÍVÒ×,L£ç@0¤tÑJ)(¤xÖo)#îÔDe¹®zòáßTUûÁ°µ»�³¡ïã&¦ïí2È»xBp}EMßÚ%vðàúSIEi¯\¹~\®jåG`=êÓ.ô�U]È8¢(¥RA¤cófc4ç>¸§qûÓ8Á4QE ç éD$ aãTl¿¼úSH\SJ¸¢1E< $2)ÿ�¦M÷1ßöCô§
?J(¥íAªìOGò¤
NáÈÅ=²#9õ$#·�¡ ¯J.dJJ( R[ä J~ø=©!\yÔè¸TȸP:Ò÷ u¢¢;²N(BCc'Jb!1ìE&ÒuäÑ´Ï&KÚ9¦Iw²ÊÔ÷Åe\é²ÄîÖÎmÛ¸ÇjÞYúS0£eÅL ²á±ÃLÑ&\°Ãxph¤§
%N4` çÆ±%±D"p>lðkn×P·º1Üd®J÷¯m˶Xûr;U ô8ÄìNa`:v¨Q/mUxøùO > %å¹Ê²Î|§¦Óà Ê}) {Rù¸ÍÏ)ÈrHº¿é>dèì¾gOÆ=ê;³å[Çÿ�`øü½ £û¾|©áå[Roº>0+ñt1g]§oÃ
ýMS×& gvàáU<¥üN?©ªºÔ Z]08P¾XüN?©¨'ü+KÄ·¦÷]¸)ò×8ªÖ"Êß9! §ñ8ÿ�ýk½2òV7`}ihÌÓùbPW® : ÉEie 9g8üMvVv"1+ÈAqÚ\ qveÆB¶ätØìË
lþ5@÷¢Af�wÁùºg®+NyÑ&Xw�ÅK}�îj;Xv"îÝ%»-UY9ëBý;ïaGµ°DW9ÕÜB¯m`ä{Vç
Ò5¼2J=º}^éa¼Î'�¼LåÏDLrÄúpk+DÓD>¸Á¨õØXa¬ÊbDg+ÑôàïUã·ûMà¼î'/׫sÛÚ¯1Ú·JP0?ZBw¾; #D§}ÎIõ4GN>ûêj0¬×ää&rÉë÷ÏùþUnRaF$(ùqÔª JF77!7Tü³KàdÔ½½éëHx@U« O§Ã±K·CÉÈäúÕàGFß÷çQÆXdrp:õFXÐn§ÖyãÔgç¯ja"¼?@rqM'×Þ((ê}iw5e1/ðãzUGeÜAú³oѰ7|Àã¸÷©4áÒ§µ?ðL\däqWÐo^>SrjÒSjn>áqúÕ Y8\Ã8Á«é˵#B»JjXù\ÓU22x§¨ÛV"R1U)î¸ÈÈP\ÖÖD3ãpFF\sO þFÜ÷KhEª° I?Nxð\ëRÈy5j¤Çæ?Z©1äýkÕ 5ä "ðÇñ¬{!³µ5VFSÃEbLØÁþtñÓhëíRi8&i¤sômI1 £¯ ã¥Wn§ÔÕù¢Ûö#¾zhïÚ·ÒÇhÍ1xíMcÈÖ<U,ÊÀð@ÎÀÕBÛæ88 p3SJþR�AöÏZyíÞ¦Aõ«(xéUÐzÕU»lÕ»|Ö¢8!¶õ t^õÕXº\""ü ÏOë\Å 9=z§ð®¢&XNîÄpF)Ô´U¬`o¥7÷§ÛõqFézJ( ÒQI9ÚzuÏßåÊ0ü«Iwgwô¦ænh¨sPæ«nÉôüh¨4UÆ~@ö¢öÒ1ýåGr~QV&ìsèjy¥;úìç¼ÄFª§ò¬íjõ \L¯w!þÓPM¿Ê³üM)Áì)êùVî\DãÚ¤ü¦¨ê û·úU+©µ-ê SºRÞ Õ{Ó,MÉb:V¹|Z £ÜzsV4¹ù'#ÁÖ\_2¿jÌ Ì¼ÓHÎ28§d�S1ë\ûvÏ5{gÈ¢ÔPIíÚ²µtyã ÎOÖµ!ê8¨®"ó(XHÏçQOBÄFh¢\®©n%Ó^5^P\_EËb)Ç5}8éM
2@Ô¾F/e8vëéKäbíenÒ=}(¢s·6fZ4Ý·~µ¼@äÀéb¤2塨ÏMǽE°¶yvãÙÐTQ[vn0í=QEN¿êP®9#µ.?r½©è8Í\Uε[Qj;QKÚM�רF|ã�·z¾cV\ S`bCÖG¦sJ«úSÈ+Þ«zsHÙ$qHÙ$RJR1ISù@59ÍM##:SÜqÒGM5^\_¸q½Ò§EÁ>»j)Ñõ5,yÃ?û5Þõ¨~ðç%(ëIJ;jXÈëN+ÓÞ#òíK»,9©WJ¸Ø)WP´gJrzdqB)Îi±0n©ØùÀÍ.>lf(æè)»lFÜt5Þ ü½
0g3ê:й2zÔ`|©Z3ëLÒûÓZ|?)>£"äÈqÜÓÎáüêXQPªnNZgr\X2Ùî\ÄIÏqO#;ýjͲCÞêJÕøPíÇ¥X·Î1Ú«ó1ì\RLqzð\ÙA¬ÊØD^¬HØD^¶´=Ä\ 7=«G|T¥\_iÒÅðØ2aSü\Ëc"V;GZhN4t¥8õ¨íQÚ,§¯¦jC×õ¤/c¦=éÈ¡ïS\\û »¹êEn3Q
sWÞÑå?x/Ö¯F½«Ê~ñ\_[°·2Ê6H®òV/nnE!OqéXþ±ÜÁÈÊ»·AÖ¢ñî §£W÷:ÇéTáß=r:|Ssçê7eyEuO²Ö»q\Û[ÏrøÛ ?¯7Ôw-·ÿ�¬4V5ÊøR|QËíôè?ü«ñ$
,#Xo§AüÏå\mut0 ³·�¼j¦³\Ë«\È1£yhGBgñeº½`[DÎ þðá?ñµËÓô|ÝEX¬`·øWy¦ÀÌEr^fáÏ\_Ew6ÀCr?ZO [/ÙÖFÆ ,ô¤ðͺù #c,ÏáEiè¶¾}Êäp?JÌÔhû,ld» ap9$ö<²ùj~ñéíïPªð==M4ÌY¾ñ©GùÍteÐtÐ26OAÐV¥ýøÓí;r|÷nÜø¾¾ y@X§øSþME½çæ¿xç'ÛÐUÅÁÜxÜõ ÷3éKç=y4Ù9iã¦M8s'ÐS/ôùx¶2ÑÈ÷§iñíyo½ó7=\ø¤ Ç'ßëV¢ºÜÜ(Oǽ´yæúRøÒJM,¥Afg\9\²Ap:qNSnHðô¨|Ç è)Rx=©)Ý8E ŲäÇ#Ò¥Xymü#¸ìi�Ä»¦�-µW¡©R=íjÀP9Z6ØEZ WB<|Ýêí°R§½kiúi½ºYQ°½Xûº{Hà êåg¹®OL¹6s©V8ãÖ»äI¡DåXqÎqKøÓ$l)ÇUØÓæ}«æ¤ö®=iÀAÜxÀÕª]mÝnùéëW¤;±ãßËÞLYÌ0ÄñÖÆ¢'R5GßµgÉɬù95q!ÜAý=+6V1UéÉn3GU#ÙÊ
<�9§ ÉTÄ|´Èù59\_õ41å M yCSÙǾE;AÀè{lKmóÊO\ã>õJÁwÈ0§×ÚºIìÊéò?-.Ñצ=\½
,c'4×åÏ5,CAéP(Ý/ãP(Ý/ã\UùÁT<yÉü©Ö1q òzÔ7\Ý¿Í ié;.Yc';F�oM:}\Z`~09I?J¿Ð�~= �+sL¶Es!S#=kk § üGñ¬È¯±HÐ3n<ájÜ<swcÀ tcúûÒö¢}>±|Ó ç6\ð}
<
\16þ4Ú½-RSrw�@ü©OCÆsJpXtÅ4¸íE !¤4iÏ®1Å1ñ<þ=)Öô¥¤=)¥4ô¨øç'ã"#NjÁëÛñªód!<ã=©¢RÓGJhéUí× xç<æ¦n=yõ¨¢ ôZO®TƦ¿Jkô¦w T§f\6Nqߥi°ÈÏóª;wp1ÁÍFÔPh¨æ #Íg#®8æ¿ÖTW]JÖS.y¤f)>µ$£1Iõ;¡Q~lð?gø d&?JÐÚ«zSÄà2Ç3La gêY>+J/¹Yºú§úÕáþéªW£Gèk?LR¶ÎO>Õ¬®Ù¤8tÚ`d9=û浯õÒ½YrZEZNC8¬AÀ¬aÀERúr})9)@äRÍQ@¥#p=sJþ£)øù¾ü|ßJ)EC@¢UÄCiýîi.` Êäý\&?+ôQA§ùTTrA·%1ØSà?&IïNF;°})ÈÇv¥£¥%¤-òïH¼°¤b0 ûãq<ô¤ò;ÒçQHh©&ã¥"�1Ö¢v;½j@H¨Ü K¸&Ýx¤µ1#Ó¨'ïQÎvÄäv#6>Ç�AN'NÔô¨Î%n¼ÐÒb&ÛqLhHèMHàØûT�¹|¿Ò ÇËý);Q(ì(§@ù@OaO ¸çm±ù ö§z 3±yíR¦v/=©A£\÷¤÷§6þµ¾T` ¹ =EEsÓýjRõN="§ ¦¯Z¶ 8ö¥'æ9ô¦ÿ�7qËjv:úÔû±Ö¦¶=©Iù>ߤÜrƤB77æ>ûvæägÞ9$óÖ?výÚ277æ>ûÒ'<ûÒ'$µb!¹öéVTvøÇ=êv]£päUØS÷a¿:» |¿:¹n¾c»véZ)·zN\Þ3»¥iÍn`Q2ÑwÇÒ¢@
F(?3÷§{SIÜäÓIÜÄÕ FR]c£zɪÀOáýhrdä·jp» þT£RĹlFH«È3§·|TÖñï z|«~cÕý>Û͸Àéëôªq&æu$×[áy·ü¬9$dÔêQn2k&G2JÎÜÍ]Ôd;V!ߪH7>z~¡&éû©úPt ýÔýMté¦É4À?1óÔÃ5å××r\_ßÏw>KÈÅ ô
v>Ô,tdËæÍÿ�ÝÖ¸Ëtó¦T;ªÓ ¢K°×|Í»ÿ�¸z@úªà,`(°ÖÉ ÄZ¡<R8Øc'õ®öO6ògõs\ofÞ ãJ vT$<ƹM¼Ç2ÊçøÕùãG&[ó'm¤�÷@õÉÉüs篯ɻ[¾^1òF8á0¿Óõ¬ê¼%l ¼äÿ�JéKv½©õ¬méö¶Ê91ob;[H¸¶´xÄz|1¯÷AcïÖÆ,"Eþè,}ñSÙÅæÎ ôïZ9¸hñYØ�êOR¥f[ÀF#Ò´¡¨þX©ÿ�¯R/xÇjbNp@¦kUx\õÅi¯=qVbÎ��àóW"rXª\íîj¬l¹Ï§�zT÷HÉ 2çÚybǽIÓj =Þ ïL'iÜgspsÎ\úü¸lãzAj4R98ö©Ù±§iäSIãÖç4¼KëMëIÖ«;©�îçóïLrÛÀ9'×E#·ÌJªóÀê{¦ÔàdðKg¥8ö§üé¹§ëOZrÒ®í'+oZqR¸$½B¬ g$üU÷ÛN·Lv¥èjh[±ýïÆ¥È©bb²)ù !lήÃ÷
ÙØÇûW=»;vôîqÖ¬éà¥ÚØ%üô«dU`ÕQÎF\Íå3ÜU×)»7EJ°È#¡®Rú#9ºÁÕ²lòjÁÖcVÉ£ýÓj»R §5�gÞ©óU">jææãpÁçòj(° Ê®xÛV.n`{t'·áM°ãw<îïRĹ"¦oºj8Z|¹ôr!¶ôÍ[mý+\_E·\(éÎF+¡¼ÚÉÎkã9À¬4B$ÆTí5¡ªIäéwn@"88õ¬õäÔOáõ¦F¹§³ã¦\c ¸ñT£çQüÒ»g{±<ZVï·��]ÍÔ~UNÆßy Ç\ïW&mEJ`ú~>õØ¢(ÁÀïE<ÿ�¬¨®1Rùµ ßlRÎs'Öcû>µ~Sÿ�lNt¬ïɵÐsô«î¾1üB³|S\XÉYe÷(GîëV'ü ¨j,E}ª ÄXþlìÖ¹ZBó¶½]§ìm×sZ;gûÆ lÇZi÷'Lö§6÷¬¼µÕjj(¢éÒéOtR¨ç4ª9Í¢µ~¹¥sÆi Ç4¤üÜRóqA¤¥4Ðäg©ÁÅ1͵®7\QER¯ò±/îñÜ3Î.JSÉíJ�ÎOj(¢ð¿(úSq3è4ùO~E±!£z0;r1ëKNôQNÆH©ÅFdÓÔîp{R®1îiW§¹¢ÒRµ&Þ�¨ä|l¹ëVXdçÒàmÔ£Û+&A±K©dÒ0ù~µQ¤0§p +ݰ#è|ñÚ¢c8¨]v3(ì1úT.»Yvý) ¤§ËÔ})ªHxCNbÓc03OÈÀ'"ýÀ=ªEû{R¯CJzR½©;Ð cD9cÞlçßG4ËCíÍòÓéͨ¡G_jq¥F'³Æ HÙ㤻Nh"3mZb1ÁÈèj@vT6òh$¼z3�0)ªÇ8¢¡&1ÏZIèi}ÅõÅ#ÎOáWÔíòF\ú± HÅjÙ¡x@ »sy\Yýúú;~uZÐ~î<Ë<ÙÙAòíH){M'ãÖ Ò@)ª:ôïéN1ôè wäñÍK±8ÉÍ_p zÕ{xÆjÄ6oAZvqã.Ý
iZ 2íW4è<ÙC:9ükдsHÜàë\ßtõuÈ;qÉ^]>£v¶zl÷Y ²2TwÉà ͼm×R¶w àd2¯!äçy&¥·zVp&KÇø?gd¸Ü³ú×x¢çí>!¿w¡ö)²U=(Ô ÃnÓ
¾g,HËüÄ¿¢¨#nìÿ�]só=l} qÆ'»1F»¤wÀQÜæ»>Oõ|a{à ]Iò%úaá\õúæ.¬^þá \ û£vsW6O}p°®@Iæóû£vejÀ¶µ©rDÒàu$�2O@+OZS½¨§MÒ¹üÎj 8Hiàô\ÿ�:Õ°´V=ÅÜã{ücÚÎ:Ð '¥N�å^d=O¥tÐ@¨TmEàWI!¨¼ ±~BÆ ó¹ã¥XE!XçîçÓ±C$®±Dîç ª9eTÓ I¨6 I×ÊöôèãTÃJ~:þ4É̦Õ�)çäBOëQÆ8欱ÀXÀÀê}MXc±Ôú³c§Ai¶mMÛqåmSo÷ÏðnµRþèßê ÖÞØãNþ{ÔÛÚ¼®IfèÍMR²\Ì 'ÔF?
)ý)æ8ò£%p}1Úq&àO zc§Hr¸8+¯éÉ )cC0ÎjUÀéNeÜ7£ _½éü¼uïBó>1ÛjIåO0ƪWaèJt,±rxëÅO=°á]>÷©´ZzzÔ¥9 IÏ'-×éÇ"£ sÇò¬è@C�Æ3Wî@A!GozRéR6zS#« À«6ñîmç «6ñîmç ©5|p{VÎdÍreû£+7N·{©£UÉ9Ç·Ö»bHGEÏsîisïLü½áO¨e9éV&lF}êy[z'¨lsÎyÍfêûÔíUBNp þU£Æ:÷¬-b_0íC¸ ô¨)È2qTÕrÕQFZ°åÀbTúqõ©-b9SÁÀÈ'«?»cyÕfÜ3´w÷©Pw¤f&ð0)²±15mt5itàÖÍ kìXdn G®©m&áGC´}Gz¾Qv ªºÉròãqÈîzUF;§ô¦">´»dÔÈ�¬åRï裥PU.Þ:WpΪ�ÏÛïUmay$î9ÉëG%ÜæI ýqíZöQ$MÔù©cLPsíWÓhP^M¡@µ¥YÑAÎÜÐcúÖ¡z¥kv³" ;.ã´tö«+
ÊíÅ´±¥§ QKN9Ï\Jy\§¥1>m¯øw§�}ñÍé){ÒPh4¥pô~cÎ8§µúÅ0I<ÒÓXnRÑÞóÁ¤ðiIzqŒU{¨EÌF1–95”ûÔÍÁÉéŠhåøàõªÈNêššS÷™ìy§µ¹Ö¡@T}k–³‘ÅÁ‚µ¼ ܸíU'³Û« $ÃãÒ¬:å³sõ¢O§ ds×½+1ÔÙ¦�ØÜNFjC\ÓM0Ô£#cӫ˧wcÐÖlÏÊ@À=+REÈaY²FÁö<E-GUéíE8;ZB?{Q(8¥y¿?ΣMøÅ,®
JèQÀ99éZrÀXby¬Ï¦Hûfw«Ç ÎW<öj¡ªßÖWA´zg8§Æ0±õm^¶ý]cjíÏQÕ1ö{U-ObǵY±m¢7s\µ·íiÏ&º»V?תfäçTå8§IF\5c¨%sY 2¹ª4QJG4Χ~Þ3úSOcP:ÓëIKJ^ÔÖû¥|´p8Í=F£ïý(ûÿ�AGjJ ¥Dü~Ryæä°¡õ$ÔNØ5 ¶ %QRã;¼
vóHÛ¸àÔÀañ×ÞËd@Í'- 4QE6@¥0.sÒ¬/ñ>XæÊ2¼M9äóE´Öa¾µ$2£}å8õ¡£YÞ2Ì Ox§E8Þndà´Rw"�E(u=¥9俣«HÃhÚ=o( uàÕÀð=8«ÓÒ#Ö(,GaRyc�ó×ÓT;3äUØÍ0 ÀãÞè ßü©® »wàÿ�\dàô¦cRÌrØÐ?tßZÔ�}r§Fq'9»{ç½4/Ê)¡~QLR®2sF)dãÚ®qSH2ÜqL Ïzs/ÌiÌ¿1¥oOjojÇ={SGJr¢Ò¦IE;°§v«ÞÒ®Lr)ùùy¨ÓÒF4G9�tîiØ%ÁÍ.1Í;?-1zt§N'QÇséWíð¦(èR ®Ðz ¸OAè+R1Ûä¸üê1òàãÒýÈG'ÔshäûS?çKäyõ«®p?JÝ7¸© Mî)ãÇêýäUê1§$íÒº}ÐÏ,hØ=ç ïSÄWÜÔ7¯
Tù5h³®Ìã àUëÃåZì^7p\õÙòí¶¯ñp+¦Òl
¥¨AÀãÜV'ï [ÛÙ¡ïap:WUB¦rz×øëíúÌÌJGò'ÐT8àSD»\Ù¦
Èü\HÈ q£áÁ?Z¥áÁ?ZÊÚv©a=�ãØ6¶ ÿ�ëT©ÝHN0¾ý1OdLPtè[¹¦CgS\\ËÒÇv8òëLÎ8¥¸¸$æ~;±ÇAùVwmOü$0dEfÏl åNÓ4ûJäAl9êz(õ>´-¬/3�WæÎjòG7¦=¹äs@ SÇôMÎJs u=ªP§µ-äðÑ äãíõ¥=î±à<0íVR]fGÍÓ5oO²¨8ÜݱRĸ\ôÍ>QWB¨QÚ¯\íP¾³¢Ûy0·×´z=zP� )3ô�ôÍ# {ÓæÞ Ë«ÌåJæu#P}ë¹».'Ýêþ¡6ö;x\àsÉ5ÊL±Ï®J>$b¢¦SæÍ,)ófjÞ¶tp½Ç>ÕNÚ2NqË}Þkv!@Á&¢f01Þ¥¨æ8Ê¥SýYqå7Ò¤ã4-§Æ ̹lÀV»×Ú²õù1ÙÌH÷Ç5U^;Ò¡'éMqÉ©ÔcEfÏATPlôÉO"À6ñ¼hÒÈAà&yÉê¼qyòlOLqÞ´QÔFC)è¼q4Ýøÿ� nþoUP«[ÕTZz}¡Hãæaü9ÖHàÌB¾µIuBÙàc ëURf÷?\_ʤúð(zÔî9<ÓÕqUbݪź+S ).J&��ð¨úSã�1Gnyô¬xîÍ·¥I''JѶ¶ØÕã8ÇAéN¢)ôê³$ÆGOZ0G4qÜ
ëJF3ÈéA¤¢CE5Ô~é:\ãF<:ÞN¦w¨ßµFýª3Ç8�qÚ© aÓ¯CpJÌ'÷c©ëN¢ÔRÒÕ½¸ô##R0G»bá�) $�~ö{RRÅ-!¦·Jkt¦}sPL³q8À5ç%rÖ«OqQÑHh¨ æ 'ÍcZ)ô¢²¯ft'¦ÌfàÔ�@ÍUt!ûÃYGÌVHØðÝ«,ùª$lxjãõäûC|ÇM¢;Mt°wU¿iël [\_ãv±ö=«l/ËYüÃ"¶À±õv
µwT@,Ë®êh¡cÐWa±Çt{W «¡K×&½28ÇW 9ÏS\b]Æ++90iÌ~j
sîjDÉa1XÙÆ+R´´ÍIÐfÜÔìü {SÀÁ4à0M´;S$'v¡Æ@æ¡=i¬ÅXZk¬OñA¤§ |Ù¨ØzVÏAA88"¢nx¨ÏÕ 9Ûõ§qõ¥R忢¡&~cÅÝsÞNe°Òs(µQRò@=jtùR«¡íSç TÑýñSF{÷¥§¯ Q~xAõ+ñzÓ#À\¦SçÖ¦_/¥_/.õ#«°iÀÀêid8{ÔNÿ�08íBDÄw4A¥êÕNöÏ¥G¸çÒÇhä?ZFëKôèÇÈM"ôüiË÷:ÒôîËô§v_¥AÓñ¥vqHýOÒ£ÎÕú sLÎw{ V<R±ç{ýãô¦t¬rNi=jTÆÓPýØíQ®vã5(ÏéOC8éOS8éOB6r8íQí©ì~mÜÁ}jÒ.ÐGKÏ¥Xj±ïV AËô»wÈÖ´bjª ã½VµLÉôqZ·3×ÍFÜ=8 c8<Òc'4õÒZ95VOÙGðð(M¹Á%©¸.ÛrO?Z%ÇA ë5É«Ñ(UÏz ÕÜb´ì£ÀÜkJÊ< ÕrÊ"ÒsÅwº-²AnhWeÇ=ÅrºM¶ó¬Çû sïÐ&xÀ¤vÚ}±Y§¯5~o¹øÕ#É9¦ß]G)·ÄQØ ¯©ÜkæÝ³h$ôÏ¥y£s!,µßëä<p^¸iç}Ç;P§=xÍI >fYÎØGSëP8$Ò3¢6 àÚ d¸Ý·¢úý}ªÊ¶öõúûS¡ß+ºçôÍhèúPÔÏu(KCûÇÎ<; ÆrjàãÒ´u[ù®í¢TFÊ 8¢ãÔÿ�xt÷;Êå~µVä bײ4¯<ô°ö¨å¥|±ç¦;j³¬ëë4ÙÚZ,©è\ýk3Òä
¨ÁïB¸SÆz©¶FÆ!Ôw'%T}jÀýÜã8§»Ù©ýè¢}:¯#±\t¤Ýó|½¤z°Áö¥Ò(¢Ði¯ ñùSzvNOlÎר8¤¦´úNôƦ0Í3àôéYÒ©6Ñ»©=0j&;_$ãéERRRS
çëAê>´n¸éA<úækS©5Ö~~Aþ#BçMÈT¬ßº=ªV?»=©ëÁBr3ÞsÍ»±.Ù9�ÓÉõ¨ó´1éIæ+.ÝÀv3ɨ7c9<aëFxv«v2r(GÖF(Fà úÔ¸\Ô¸\ÓÁùy¤iJäSÜòqJ>ëg¸Ýzeþ\ý($NcÉ t4ÜóN�n3O^T uæ£\
�ñR(ñSÇÚ¥Jpà =ª1ÀÁ¥@àTñ .}éÌxSÀ0ËpzU°AùU AVíØËdò{SäÒà Ë
líúúÒ ãÒ¤f½zU¨&¤ 8¤
8ÀÇðjål2{ÕXÆ_A9®D³ó¦P9íbÀò©i�Ú�¥àV¼k±�ôx×bé]h#Uq_¸Äw²ð3éQ÷8'oNÕ#2 ÜܪI=ª)È :TóÉãλ<t¬û¹ÉÇJÇñ,ɤj[ IlW3îs·>¶µÍDÜNÎN9úX%¶9b ÕÃ0Ø ¬HfGbÉ2 äñsô¥UÁ�çPÌJP{
ã?Z¯ìHXs·¥WEÙ(±8çoôª×20U\G$3¯^+SîçSDT nC°Gû¸¨P쯸î(yõ§Kw+Úµ´JpY"]¡ÏûG©út¦Èò½±N~´pjD2iê¹|à r®\_8¡½HêT·eq(W<Ýiö±«:d7R;S|¬1ûUË5ùÐÈÛB÷ÅL01Uß)=
Lçjjõ©%%ñ©$%ñhYFyÇÁÇ|V }®ýäçh<}+Fáͼ9b%ííYú\[¤-ËÔ °\@)=êb¸Z®¶¢Jç ÌÔr+/µh£j¨Î3Ð÷ªwK¸»Éêi¹ëæOjP2ØÅGQóTüKÁÜÝ8§1^@1Óñ¦@ Î;w¡Wt¢6QÀ}iÀSÜÜ Ó@íÚ¬DùºzTÑF]íÞ¦ °»Õ¨.ÒyÇñSÄìÐ1n
¢vw8º}ÄÀZáÀRÀÀô§¨Ú kǵäúÕ©h«.p»E^´ì֨ʿ1ªºÌÀ¢csV®ed¼û ËrÒ8$!¾:ôN=zG5ÕsA$>S¾w�À?b)+çOxÉmЧ%ÁéÑi@�SÅ4têFL£³I(6áÉ«h¤)ÎA ¸mèx5g'§Z))i)iÔ3´òO^;øs×ð¦þ¥ª÷$nÀô©ê½Çßü£ûõ¨nOîOÖ=OLðErþ(qö°8 ÖºvÜAÆ+ñ.N¢ùÁ/áÅB:Ó»óH=©FyªkTÖ±#b\©ÎzõíS¨ùl#<Õ(ßSNjeKãè´äõéO¦êxðÍ;W?(àzUðWÌTpÞ㿵P+& #¹Ïoj�Üb2GlRíN^õy÷§; ÓóNSÍH~e,ãZµ!Aqùb+3~çP ó êOAW¢28v.=ù$sϽIKMwzt©ÇJÕRÛT0ÁIç íRÇ©à &fs¸máëÍLAÜGlRQEJaê)¬s×ô§¾ÔÍ à ý)) -!¦ÓÒ£# ì\ I&§ã¸À4ÉF äwéIKIE ¤][Õ)y+ØgÕÎN~QÒîãqëA¦Sé¤SXfÃ4É� ÿ�]Paóò \_'Üuªî è?J(4S)T fW+>îÉ<Ø:bµæûÆ "ÚlPÝ%µ5´è¢¹2IÕÊêÚ Üs9Èyô«Ó&c4Sr+ÓuyécΤzÓ ¬k¤úVóVµµ-SÖ¿ãÈÿ�¼\¦±ÿ�D´+9åe]\/ؾ±!=vå]ÕÊðuäW \lË�Àéôª~Z38¨Ùø ½9WXa³9ÇzÄ8VMQHÙb}\T5 iCsÍ ÙïBðsÞ(¢AæÇåHzQiå!9&(¢099© n\úv¥q1ÍFùUÏJCò=!ùKÆ(¢¤ ãw$Q«e©GaN^\zóùQERõRÉׯjsAæJwðsNì}ÍéOZZNôä\§L|بÐr\b0j%ÀÍMàf z÷¦¨æ¤Æ¤R×=�Í=øÇZa߯múR¾q·éH4×9aNn�ã4òÕ^UY«g¦$1¨AÏ®jWÆHÍ7>YoÉ�Þ«2ù )PzÑRÆi¨yLkÈUi/-3κOåCÈ©ì@êN+º¦ ªRqKÚu¥í@÷4ûÚ7SÓïí\Þ§uw1wÕs+(©5]Mï)ÈSÔûÏ 3XùO."%êzn5¨ßäòb"ãIA$õ¢ë|1çKò<ÑSWFQmÚf «Ôö®ÃÓ,jUQoAZϯêgïÇe�¹õ>õÐé.«§Bn]°Oê}
oén«§.]°Oê}
MirdçúVY%[¡Á=¦+>ÎAÔn[SØÎnOë�\,¡P %Ôú±?ç µ¾Ôoõ°mÆHám¤Õ!E äôÕµ-í$rÉ3Í#6æ' >v§¬îY&isÐ@; ¡k=åÕØ6¨í\_3 èwoñ©.ÄsZÝÕR%°²AgD%¿Þ=ê6í¯i±®OãWá\ ÔGÏJ¶£hÀæ´ì¡ÛóZVpíùªöy(¹WwáûAm)®�aÖ°t½<Wå×vð¼"4mÜäç®}½©j6½ûÔÕB³RÝÈR©©nä)MH8ÀÎMxQè-üÇ#ß+ Äã^w¹í¶ì¾µ¶sAËR´à03ëY³sYæ³gybÕc̶oZB\_"¥EÚ2OÞö¤'&~Tc@íúÐ:óJ:óLvÞÄzgiÈ$ÇÞ¡IËuçÜR¦Üz|Ù§-H£úÔc¯©; ?åR§ò©aÈÈç¥^·EPÄÀtãImü{ÕܰE\ã:dÇ õ§D6;¥<çUDZÒDct¤úU]F@Ì ËZ±§Äx Uóoæ åÜ?¥nXD ¹ùºbM§Ój°Õaª÷ERC~Tw1'©ÇOJ¶ÊX\²Z¥&AM£=G'½4õ÷¦ô"I¨ÏNµéÖ«¸Ì¤üãõ.àF9\ä@ÎRi¢3© �©b]ƬÓ6(úsp\ô)åÇÏ^¦¯DZs×½ji¦æP6ü Àv®½UA =ªd¶Vq#�Î¥Or|¸éÏ\SXÔÞ($ÑÔSIÜiî5^îGÜ<7f#U0»"äc9-ëCÈìÇËgþºw.¸ü£å�uÍ8ëJ8ëÞÞ=)UyåXÕ.×!$¨ïïS@¾Y;Î{Ñ \Kc³©q$ËJ:RÑEKÚ¥©¢�&ÕyÅ8 çq(?Z(¢(¤å9ÈqùRÁúúvõ¤ª×ëHô«UNndlzÔg÷@zèþèSH¹2Re »n9ö®¿¯Îx"¸hµ+¸ÃHqíhæ9ëB÷¥5X9ªÀqU¢bÜdñÈííS.XaºzÒÛFUªáÇþµ>PANOc4wLö£4¹¥Í"áA8qÅ+H- {ÓBóÜ 1ô¥Î)ëÍF=©ÀóÏJT84¨piw$dí ôÅiZEWÊ¡ÆU¶ç¥f/Ì~AF0MYQ¼3°prpI©é{ÓTóÓÔµiNEY"º%fc¸ôÛwï1 «m#;®ä îµg®NqíAëHiM%! ÓYÿ�1ÉÇ9ðOiô4u ÑE%% ÝÆ@Î=©®8Ï^iÜd×9¤9Áý)(¢IQ0üÇzAÕOxÍ8òݽ0p@íE!¥¦CÒzS=@ãG!%niþ¼©ªó8 rsÇOZ E7¦õ¦H2F:NôPQV%?15 54£Í@Õ=Á;ÛëSNNöú×O¨IµÉ$~U4çqéÇ mIo¼k äóüé ®{WË^ã8®×?ªÿ�Çáæ±µ£1þø¬dæÐ¼ $ÜsW¯±mfäïWs"Ò¸MlçV¸?íUDP{Òä (¦w"°ú�Ð�8ªQE"óÍH8§Ö QE5ÎX}jLnäÓ6üùëïRô¥AsJ£$æ(¢# ÄyíRäõ÷¦63ÜÒ? ö¤~A¢(§FÑÚ¤ÏÍɤP8 õ4õùTSÇÊ¢(¢Ri«ôèøOF¿qà%8ðu¤¥)Ücæ©1d_xÓùZNñ«)ýjDÓÎ1lzÓ_ô¦/úÃéW'4äN[ñ¦ó~4sô¦¼hlæòj¼1ª·YFcÔaTuj²Ä³äu{q©ÊÙʡأРÌÔ®þËåûìp¹þu¨]}Ë÷Øásüé´U滽¿U0ç"ãÜ÷§&$l$Aôpr¬}ûLÕÙ cÒº« {L(Òù@D °Òøsx½·¨lbµ½ ÜÝ/mç§çÚÒ¡°vôkéWIåÜ|°È1 uÜåÎ}ëÊv»eòsÐsÅ2êÕ W Ãz j4¬;Ø2xÈíXÚ©us[[³ÄJÆØÉf=ÿ�/4X!;Èæfo! ü¨»Ñà6d»V-ÆùVEÑÝC »¨PTSÁo!ÎÑùV=ü¶òÎÆ ò¦î]ÿ�Úosè8KHµ¸¼u¶÷j9Ü?®òÊÑ-Ò'Ôú¯¤i«aj¯ï\_?Ò´vç=Muzö(åÌà áÔhZWØàV3sü#Òcg5ýÚ[Û®]ýx�w'ØW£éZÃlVÄãä|ÿ�xç·¥Uðîú}°óP©ósÆÑ×gòÉ®ÆÕ¼Ã&ÒïéÑV£òòÝ¿8ÇéRQ["$õq ázÖkxv3zónÄg®{ý\ÓéHGÊÙ�vükGR9Æ}éÊ� SUvóÞEðð�¥Ûeþ_0j¶Êsç erz£» ç¥+eªµî6.j½æ6 Òx9ç5Àj±7@'ë]ó:Ä¥Ë
EäkÕgó.iÇ=�ç½Wl p:f2çj©ÐS%¤Ep sRÃ^Qå ç'©ö¨";K·iÚqϵQEs&ݧiÇ>Õ U¯BH«1£Ý¸]\eÛî=²j;6êÉ.bBêIUëõÅ_Ò´Ù"+ÝI~Åiî|õ NNzg¥Gø}sE:CºBÊÉÎj0�£o'Þo'zË#iÆ29¦22Ií ± ¹½tó\±F�íϸ¦²¨ õàæzÔ3Þo8ªiÀíSMþó'ëVÌGÀ$äu8ÛU£M»¾é pOjK©Eׯö¦¡ÉÉêMZN´c¹«HqO¶äÓíÆ95 ½÷7Ö=Çyè:Sí£ÉÞzL±/Ó£dcüè|?d?ãáá>èÇSY]³^]ÛÓ'·¿Ò»TEH£Z{qLç?JCÚ§ö¥'(w g]K»xß»Õrá¼µÀ8ç¦jÞÄm °Í7½:{Òúc¦\Ó�ªänp@ʱ« ¬ÙÀà¨êy¡c!6³�ÎIç58U%-ÀcÖIµ((,Q©ØøÇ/øÕr�ÉoZaµ °$t5'8ϯj(¢u-.8¤<ßúQÆ@ä ô£Nz÷¢))(¥·i¼ääçÓÚy=) õ ÒÍSo¾O½\ªL95^ï¢ýMW»è¿SJ¤È= p5ÜÙÉ~Nzó]ßñGùÁÜ&e=2IÇÖwÏ=©:P éUwU]Ôñ8Ùz@ëQwü
8Æ;ÿ�
B BØéÔ$¬Ä) AßÒ?çÒtç@æQEI¿'ß=R)UzûýhLIt#!P9Ï� xJu8)ã(ö4ày§ÍL0�ÈÀ-ÆOJ±
AëÓ?ÅÖªî% ÝÀ=NrjXö¢'Ç w©³õúJµ%y«HI^kzÊàIÔ|ȸR¨õ&´>îI98ëYV�ªe½ðÿ�
je(¢ihèrFwr3L=?p=º4Öõô¤ïESi)¤|Ý;ÓH8/ãN8È'i2ñIEÚmDzóùÒd)Q×1JNyìi�§éE1ºÓé¤S[¥5ºSvI8ÎyªW#ç$UÞ¼ÜU§EÝÇZh¢Í0fªÆÍ E9S¦0?ÜË<æ aV'?7Ò«±æ®]7ÖÜ
k²¾,ÜçëXW AÀÚ°ngÚÝM3×3ªoØc¡®æoþk×Èç&°ußøö@?¿XzÙÿ�G@?¿T<£½xþó}Xª\çþzú×¢Ë1yqàó}@¿¸$ó¨IíIÔýh\ö¥C)0ia;)ÝÕºHëw¤uÆx¤uÁ¦R²Õ×]¸ãõ;VSpy;ÇÐó]ÌÁs¾!íµH]Bÿ�ª0È#&±õ¾@IAëY:ÄjÖ¡Û +ÕëE)àÐÃÃX5:[¹\_n ¿ku¦IrBÙþ¸Ú´¸ÑB9ÁLVu¥SøúAé�þF³ílcÿ�ÇÌ+WÁü%ª=jÔI@ó&¹Ú%ÿ�«ÇNòíÞYÑj¦k[H÷ÏVòcA5·i&~äàävRØé]&¢ª+¤P½vø×Ea£\+¤P½vøÕJÒYº[~%FxÏ5aýÉ,®^< ~uÐiÑh[Ðc'ñ«jrzg¥<AÊt¦D#nKg¡ô®·!@$ðp:u5Õgh=p:u5Ö[ίiÔÁ·4!ÛN3üªÚ87¡Ê² EÙ-ÑcÜ#ÛÁÏ5YõºÒéÛyEºI«nÈ{}~´ælRÌÕ% I$öíBI=ªÅÕÇUó»úTÑݼô¬³Ýêy<ý+X00½fJ}>ÿ�צoU]ŰÉ&§°>ZGÆC=;F-ì¹_^µe¢#æ©Ì¤·Z§2rÝkÕn§¹ùpÉgüi$êip©¦ùXbÜ2¯-VàfÓOJÔP ùgåÒ²Ðù·$÷'¦1S"ñR(AJjt(©Ñpµ§kÈsWÐPY¾cØS-2ä¶{t©åPrGQK)ÉÆ)»ªÄ+üF¤|Æ RF<ƤÞÅ:ðOZcBdfÎÇZ®'Ê Ä=«£Ñ-~QpáXºcëN6~ôãGZCVðp:oW «ZeØÁþÛ ¹ôiØî=)Ç$äzÔSò1¿SMcɦ¼ÐNM«q&Ø3d j¬_3üäpp=OÖ3³¹�¯9ÈZGV�Ï@)ËKAÓzz)ê8«ãÅz¯9ëVUÚBã§µWN̹ùT äÕßå#ÏÒµ- ô¥§p¤ ÷þSðw0{óQ¢ãå-:àwïR0# z÷(¢Z:ïFsÆyëA<@äg=MQIEzñóHxÍÅ!Å-Un¦wª®pÆ ºû«P\ýÕ¥É g·¸Ë¶çsìÁÃúG�W¨0[©ùZi¦f·=é3ëÖ©³ ¦Ì»z§=�ªîyèp~¿
G$ìüÎ9ê;ÔeÉÉlî' =)y§SGZp¡iV¥Ë/aØÏéS¨ÈÆ3d§),03¼ö«§8ÇÊ¥§H?¥9EH£4õ§IµNx8�çÔS#ÉÀä cß¹«VÈY-ÉèÙíëO~üSW§ÖVa@«(0¢´tÅ6AÊÓ9æ´6Ôpj¦P~q¸±ùÇhuêǼQEv¥4¦©¬éüéßN?aÆÜt÷¤¦¿Ü&HÃ#Öèi¡¦×zÛl¥lÔ}jÖOÊ;ùÔ æBQ^j ÔðÔhÛP®áQ ±¡¹t8ÎG¥^ä1ä Úquô [¸àôìÒNi3J[RÞµidBsQIãù¨Bº.Xäõ¦bO'¨éKE ¢N)Ç$ò´R!ÀÉÀç±¢®\«7Z»:äf©0ùªåêCïV¯zì5%%N:×9t¸r ÉÏ5ÕÞG¾2@®Zé¹\Nis7M¾ùǽus\̪ ôÞ°5°|¸G«Ö´ÈG«Vk ¸îkÎ.uÔ¤÷cüëÔ%ïç ʼºøùÓq¦Ë�Tlb¬È7ðM@W ÇFì1Y2¨ÝqL#§J6gÅHé@ $Rªíäb1ÈÅQE8SÐÔCÖ¤GõÅ=ÈÍHg)E%(8©9ëL.ÜzÓ@x¨üÐ_Û4÷eé´çeé´êFäÒ¶£ 2i¥qR S[\ÁQ·éÒ§ mút©ÔaG4Ҹɩê$^x§úÐ4näôÅ0�¢�¢QÍ8Ö8É£w=©B§±cÒx\E9qÀÍ=q¸cåÆáR
ùN)ÐÜSw¤SÓ 2=Å&áã=jCõ©$S@9öeÅ&áqþ5y¹¬iyn³B¹~\_ï/ÿ�Z¶ïý\BF~µZÚ;¨eOºýý=ê´öés ±I÷[ô÷¨%ÿ�[éK2ddWùQ&<Êxçõ¯6¶ÍoÖ¹í6ÞÉfÙ)ÊüÀàãÞ°të{5H¯&X¤W+ó?:§J=,ªF <}+BÊòÒ6h·|w(rOçWì4ý¤dVÔVüÕõF�À
ÁéVc½^é]}²BÇ ýÑë,
J$º3PYÙI<m8®·MÐd(XË÷ $±¶lÚé¹ qæ6M5 ¢FÕè:Vª4µ JXeªjÛîPqÚ¶£;v¯A¶E¶µDym\ õ Pw6�f^OJÆÒ-¥î Ç\g¥mÎ�sý)�¥¢xà)¹§$úÿ�^7OQIAúÓ2GAE¨¤cA8 ÓÆXËêzS<EAu(<°ÊúñÍGïëK+
RÄñLIC÷ªNêdÁ<Õ7u/y¬BSäµó¶9~¾¦¦ÔîÒÎÙ^¼úbª[j+p¨²EånQ´(\t�qBÆ®Ø×búcÚF?óúQÓ4óJVéHNN:Ò¹íJçµ5E,Ü(ϽTUI)ÜtÍX¾P ¡ÅVMͰ2¿^§§Þ{QôuÁÍ/Ò£?ÒÕfóíFÝãhæ£$,çøºò>R)ûL~NqçßJ°Vã{ÒÓ4´§½;Ô8¤QÇ,QF]W\3üÔܨ É8$ÔmT¶2zõd r£å÷¢(§RÐG=~´¤û÷¥íõ¤=IûzÑEQE)ö¤(&õ¨¤¥¢n=:RÉæÐãÒÏQÅR^¦ÕiÔC1At?v>´ ®'V,.%#æ'ëÍvÝêkÖã)8P #ßÖ«ýtìRÖ ê\^\^+UñÇ'ïjFp7§8êsþ§ã Iµ² /bx¦»8äÓhA<±ÉæJxúTiÇJµ,|Ô±óW#sù8ùqÈ®ÁÈ!l~¾³°»$ ÓµPÇî£ãñ©OjwzjÓªÊô«+Òµaù¢À\_Ýã
�½êë}ãýj¥±T¨'«\ {E´ãJiÜLééRs9üj2¹>Pi)¦ÓOÞw¦ùyýiÌaÐÓsÀõ¤Å´SqM¨6øf�ÀÀéRf~ðôÍ%&ÚZ)j2 ¨éÍ@ÖêXõéSä�;gÓ½ÅMÅê)6M¢«vÁ¢¬¢ÐîóU|Õqþéã5MºÖèéZ¥v3FsX¯OVô+r_¸~]ÇÒ±îq»9ÉÏ_Oj¹×ý1±Ó5Ó9±ö5Í ;zæõ°wÉ5ÏkX"ß$ÖEÊ)ÁÏxÏ·cÚ¼á@¹/Mƽrõ¶ZNÃn+È]·JÇÔÔmÓBÏz±¥U ¬jÊÙ¦QN4U6Ê_Úç$UÞÓµ: æ�rÆ�rÆE?¥!ÀíU78õq¶;Ub»ÔÙ#+ѳLt+ѳM¢qéM¦o,3No Zz¢ãÖªÃqúШK ÇëER¢àñid¸Þ½jñ±«¤ZSHã'ýàt¦õëHi»@cÖ¤hrÝ)6 õ¤Ú1ÏZ@3I·÷zPN[ ¦"èiHàqKɧôý)Ápz~Ò¢ wTíRòxP@£�uò8÷¦änçÒF=)äb aTrµ#/ËïL$oätéAþSÛ©çéHsȤ9äTlAþSÛV#uHÅs¿gjº+jöÿ�¸�\D Oö÷k[MY. ÷¯TÓ×3¤Öü>× ú¹Ëyí/¿·z§¬øÏ´[èP3"/V\_Qî\®¯ ùö«{3JdEêËê=ÅMg¥Üê»ÒÑ7Ë Ý ÷ôÿ�õV]zG-¶ØÜ].;ìÛü©øÇÃbc&§b LrÓßî]GêGãSi:Ö<¨Skb8R!¸p:f««$±Å¯"0þµ×·S(óO=ñV´[ëiok.ä�|ÃýjÆ{o,¶r>aÆkÒôy.£°õ×XèÖÖù÷2¬JA?x@;Wkyj@¶¸?@ZVðjZ
wy õ9¹#UÎÁ¦ ¶·Ø2jÅt6B7ÊpOEô®ÜHFùN è¾×\xþXéèU�àõ$×M§ -);Ýw6zÁðß
² ®K¨5Ó QEOSRm%¿\QçhëÛiÃTrTàf«»g$ÔS°UÇzf ¸ïH8Æ ¬½YöRÜ~sÑüþ¹{Û³7äj)ã2¡U 0 ÿ�\"gÊ:´åZ¤BoF[ëÁªd&ðädýx5¨Ù>£Ã"ʬ7w#øsI§éÓE2ð-¡S¾Mï|zçô§C\ìi2�l} VmÍ·JY{³2zf½½é1íM$,yÍ4X±ç5&£vn®î'PP»vxÿ�& b294X àúү˻޴êpô¦Þ·å§-J§=HÁ\_j°¸¨8÷5jQ9 :÷8mÏïüóUæ9ÐP¾ô˱÷¥Õ\_9©ªù˱õ5ªHe¿bÌIPéL�{{Ó.s+üdSÓÃOS¶G~=ÒX±Fx?Væt�aÀþrtx?6:däZJZJSKOñ¦gqOÝÔ8àã))h¤¤¦Kc'=©¯zsuë3ÐgJ(¢ÒS8ÉÎi¤tëNn¤´aÇJ(¢IL �éß=))xÀî1IO~QERSxwÓÖ3ØQWfb?Z¬ÆJ¤ôª¬3W¯7nþUvï;«¯ºró«îPsɹ԰±n1À$óéPÊqöMsùÜäú×M0ýÓý+÷rS\Þ·$,z.x®wYÈ=ÃÔæ)¦Þ9o%¸¯,^µêÔatËü£aÁï^a ÚäSöäO P,¤àf¦Ò³£e<ÏFSÈ£§Å3&à23LOj:t¥+ëÞ¥)¹\B»Fi\TÏ¥yúÔ�䱤Sü¡ô§mzÒ,gø4ø5ëp@AæåúRzÔB�\_Ò¤0ÀD?zó§FAùGZz"~^ôÁ[© ?0ÇJb½OǸ¨öÍ8 v9×\u§à/0$)¦ºs)ÜcÚQ
ÇéOR}1OR})䣦)᪻xÇ ¦qRdS1óç4/Ni3÷¥8q956å#µFTy(îò8¤Ï.¸éùP}Í<UÝXGXPGQMåÛMCã ϵR×ôÛ«Í>Ê/&"c+qÎ{=+©Ôî~Ç"NÀãÿ�×X·ÃxÑ0#KpØêGAüªhªó5%EúÙÞ©jÔG÷zqùqV¢?»ÓËØðü©ýoÏæÛ¦Ö×i VFOö¾¬Cp³0<þu¬íдQE¡§ûÓýéÌryÉÎ;QM¼S&"¹\sVçÚ«¿4÷~~ò�}jÝô .Czr#Ï1É+TóA¦ã)0~Æ^i¼ÐèV2¤OíÍV(LyÈÎ;jѸ! qØõ¨<¶ ONÁ×4 xLQ{PY2~KsNEaóOp9mbÁ+)ÜãÓÖ6ßü9ê�¤¬v©>2c 8ü¨O § ôjA�|Àõ$îbFeª}ïJ8r�Ç[V>]|îà ª99©¡Bì�PZ6±ùi¸ýãÐÔ6peøG$ÔVy²ü#k^H$ôäñZzU·1Ååð==OåY¨¤1ß¹¯Bð,ìÅÔyÒÈ\_ñ?ʦ�\
QZÿ�ÈVmÁvöé |"~§ÖÔõÎN2hÏ</¯q(¢(¤èç½8H>¿JSQÚÙÈÝÈéô9Z^ÔÎi¦¡uftÀùGmÝ5·1]ì9ÉìÜyû¥xÏN;T# ®Ò»Ùô½Hõ ~Kþ zÒZS¹Ý8åúÓ£lá~Fì1ôÀþ´ÔBrr¸Éã!èÀ¶à#9¢½'zZp§~H$Ôõ§®w~bÆþ£p 9I'7cæÇj;ÑÑE-ìüç Ò·sqÁëA�0ý)NwqÑEQE IÉ={Ð:7$RÀòE! Ú(¢B:ÒÉëM9j(¢«Å#�ÊQ¸Ü0iÞ£ 4zcëP2áª9@Ù¾bbª¯aëU@i-Ó°ì\à)(9'·¥S%$öô®bêÓɹeÛ�#;PÕQhå#oo¨®\ÞÚÕfî%c@>ùþ¹EêWI°" ~ñJpéOÛF1ME4!Ø"Ú¡Á^qïÒ§| O¯ 2¤9¦Y`ô¥8n)Gµ9x§¯È�( Ïàz· GÝþ«à|Å@'8ï2#L°F=vô¤êhn:§R;TËqZp 1U.ÑË{¥[Ú»22xªQÝîHÔ'ç°ÿ�WãÐzõ¢(§SN n)¯=}iüÃu<æIÈùqÏZJ(¢IL<Öz s÷y¤ þTPh¤4ÓÖÝW½9ÇÇãM8%qïIESM%FÇ8Í!=A¥Éàr1L9´QIE%%(û½;QL<ã¼fÒ»Urjã}Ú¨ÿ�xÖààVØàWo'ÝüU¸äÚ¹aÉ8ÉèùÏåU5 h ~ý°\Ìr|¹ÆW;vÖ³µgi®ãF[¦=Ïo:Î/5É<"õ÷úv¦E%AÛ¯¹§UûX|B¾ycïW¡òa üG>õoºCj·nòem¡ ¹XöQï^ÀÆÊ¦\§¦¥Ãh¿yFéþ'=M\(¥¤©jj3ÁéØQÐdJ>½FzRpO=è¤84§})¤àvãÒÇÍ53BFIÝõÜÓ¥; îÎ9 ã\¬Òl@~B©%A'?Lsô qINq@ägù=é¤ð1L'b©ÀËpoz\fIlÔícãéÇ4äêC=ÐÓ¦ÑÎ@# Cc êiqÅ(ö¤ôíKÚb1SùNT';yè1Ö¤GsÏ#·j6ÊËqÏL1³¾qß×ÚZ(§~TêU@\�Ý×'©¥ùr2¡Hã¯Z(U wæ�Xäp@>´QE&izQÒ¸' {)pxÈÀ94Æ1Øò íM,Oäô òsKEQE;ÁÈçµúÒc¦1\Óº°ÈÎZ(¢AË{RqN>ÃÃíKIKIE%®(Æ G¥q«ps>@�b ^Ôûx\®Ôb¨ÊLs¿=NAª2ÍÏSkñ¦M{Êr¢"\sëÏêi±êÛ¶ä dUÿ�Û$êUn!:¯cõ¹µh;Ô®?7f£x¥Å&ö=NiC±ês[Wó~ò®[Å!º»A=ylt¬èð2zuíR¬|0{àÓóG|ӥϡ¨ WC«{àúÐwoÇ$ãȪHÌ¥KpW<óÍHª sNíRüª isiÊøæ¯¶ ÆWÀ('m É#Ó+nÜdÀ>ôï0FÅ;AÆORjj)ªsÜSªpr3Sè¸Î2 \çÌñ;úÔù¡ÈdôO©üêÆzëIÞ(¤¤¦ÏOw¤$AïN< <ºØ#¯ÓÚ(¤4ÃóM$�9F)xü)))h¦Ój<;SqOÉ 3ùÒÔQER 19Æ(¥b»;QZMÐÕI>ñ«mÒª9ÉKδnú íîʺåϱG?-eÝ6[°ÍW¸ÿ�RkõC)ÈÛ¶Û&² \_hL®+ÕÇ02ÅzW=«1·¥sÞ$ÿ�D¾äWÝcy¯Lñl-ð=ëÎD t¥úÕ(£�Þ¬¨À¥ÏóÖQ«68 ÖtqÀAª@TÊ0)íi,cç>ôÕF4õn(=y #zPQÉéS|ÛG¦ù°85>JFûÙ°úÔÖÑ2ËRÄÌÒ/g6fuã#<Õ¥Þ¦²q$ÁIëT@'×¹§[¿ÚÖK
¨CT× Ì ¯"0ÀTóîp�©çÜà Ô¾Ûdw>µ²9=ëOWI"@¥dÜA${Ò Ó·sMÜsKLAÏZ8j£¾8#4ÅW|pFiæL°Á¢21l{ÔÖ¶rJàZ´²pu9÷üÓzXðoZ%i̤8SéOe! 03ݪ0K/QéZÖ]±�S§eÉqoç,3ZqD>ÚQµ@ôTAôÍ.#gÞ>¼ÕæãëÚEE$@£Aq9úñzFmªI¬ù\ÅXº||¢©µBúl¾Åè:Õ ÙrÛAÖ¡»¸û-¤³¸ÆÑ´gÔóFíç¯'+¢ñuñWÈNÕ9<÷ô®=ìîÎOøÒ¯$zTÀjw8£ôªË¼wªë¿ZXrdLp üäÓ+;lõïP[7I´j6eþï^I§Ç½(þT´TÄqü¹ä·QÀ9§¯$t;HÈM\$õ>ýÿ�úÔàö_» ÑÅ(õ RíJ(P äÉ8§Å÷¡'¤v3Ï#ýT0,nW¡¥æWuÖOðô§íOµyÞ¥7M>¹üªXÓt±ën<àÖ¦ÐÅDZÉû¹õ4ø.ܯ?;æ´¼%òþáz9ÎúÕhóJ(Ñ®³,AçÔÓGjGP1Gã(< ÑHið(l=çv3nõäíèô¡úÑÚñJ>~jfy¨e?$
wg@zÿ�õ©Tul7ðýãÍC.ààÄ¿çÿ�×NrÙ p9Ü~F3L'ñ¡¸¤n)ø%¶ì9988üj¸pÑ63Ð3q?õn@P6õÛÁÈÎqþEQy0FFæ>¼v¥§gÓ½3'^´½(Ò§SÞÛ�HàÔÌàä&q×5HNÿ�!SÁÉÛú{b§�:®w2çilg<ÓÅø£ëÚëRUÄ#n{cÐ2`ëFÓÆü¼?Ï1#-}qÔÒR})O¥'Oõ¦´Æ;J3qb ´aCvç9ɯÝ+¸ b³(V]Ìô¥¥¢Zp©x<FN?H:ñMí·j@{ÑEQE(éëô£¨4¿¸ô¢£@§ïs¨Äuªn¯5 òì ç5 òìÀÞÿ�»sôïYÚ¨®aoðSëV5 dæhÇï?ú{zÄʬ7Ääÿ�õé]³ÔÓ8<s ô ÔxÅRrwr2»EMytÒòO9æ¨�® ÎF:Ub2(Êþzz #11 1n¸+È9§«×3'×2^¾´v?#H§iãò4õI";£}êGçWm®SÀnùçò5H³ ØaÔoSûÌ«ôÜ;ÿ�õê\fÜSyæ¦ÆEJ¸aÇZpõ«å3à84ÝÇf«orË( 09þ±µfIô�¥7©¤4ìsJ4í¤ñÞ´\¨PíµTGQéL6î÷9TíWÛÉã#
«ZùãÐsD}qRP(©J¨¦E\¸4í%JÈxÝ jtÇ$Ó[¡@IÁÈã §°É_LQE´µì±ÏãëJx/=($zã8ÇZfAê8 ÑA¤¤4<ç®)§å= 9Ç9÷æxÆ QE4ÒR0;g4NiÜ ô¦°#4QIE%%qÖ$u9¢´Û¥Uït5iºUY>÷Òµnþè+¯º+·oºk2ç!¾éÁíZm÷}+6èüÜv©j ¾Ù
fX~CÔÔ½8·?Z£$ãçoSv¥;y¬ ÅݨÇÎÞkñ²y^H×á4Ï(pIô®ûÆLYNÇxj0÷LØ$U¶9¤X0}jpiKg¥MäÇØæ¥òcÎqÍhÏ£Ë1\8'ûSÑðÃn$9Á�VÌs8êzýi^à»/: c58ï+äS 6sN+ö$ÓÆ½5Li%Ùtª3FvÒ^2pfKùT/ÊÍRbåñ}) c RÚ¤Sȧ~¢5#ëN©Zìö2G¹ïRKbåFÒuIx5lzYRè×p<60j»Fà;yã\ÕòxP k0Ë7©ÙY¸íXé×
ltük>×BÕ%ÖxYWûÄð~ÛÍ7ÊhÆìtÍ,RÆ=&³ßOÜÙ&ôòËò+HÝh�zSNÏËÁ÷¦~^½pòøJç;UädÍ5ü)u$[¢Ø�îOZï$'P\_'o¾)Ѥj¸ ´g¹Í¶tÁãëKýsÆH?nÇjj.öD¸/þÕCýî àÿ�µ^a7µhHßlÀQ«äÜöí]<¶QMÏ8Ýj´:U½»2Èç¸#«JB¡8¨W3¨ô©/H]ª¹¤²ÀUR3|×UR3z×W/©ºÅlìSSðÔ>f»j ´Å_ñÁmq½³ùbà¸|Í]¤ÉÛyÕ~ôQZu§]æì«dv¥QûsÔQúbxõÎÓÍS¹\±=ª±ãüjíÓ�? ¢Îª¥áWË» 7>õvfn}ëñ5»}²W9ÚXÀ¼pk´ñdȨ ¼'Ẕ4B',Tsj.ëB$S;ýõP§£K¤ pFG½
çJU ÀÎ>£%mÁ¹©¢rs×#Ò¤µÔç¹�M +©yÞ;þ'¼UæCo2!UòÝCDÄãrö8íÿ�Ö¦ì4¾\_ðÀPÜÔ¡Ö¥µUlÙàç=pëRdÎ�zp\äWJ¼ çéSGx<ÁòtÆqé.HÚv{SÄiØÓÄiØÕô÷ íMÄço¥=-Y[§¯zÔü ÈÅGÍ
ýOÓ¶Cv®s±Iþ¿ãQRZpþõ.GãE¶<¶þ#Í>%Û:{|K¶d ö5LÀö¿iø´£@hî{bí´ÚXã ¤&=hÏz¶j2Ù¦Èà goj¬äí ryüz~µ8ì:ÓVp[=xu4wü)àçéMZpëJ©R y¬æ;yàÿ�Oÿ�UZ÷²¤cpæ«[ää0~ðÿ�U[EÚÇiÀb9Çò¤n:TDÔQd§dq
àãåcÔOÇ5#òApqÍh\² ásFGóYÏÉÜ pr8'éKÆjETcõ4±ã4±õ© pT)ÛÉõéþx+u àvB~µ BÊ\àç°íÚ´pÀcs7CëNúQÛéE!©I© «=ð½5ó°àËÈÏJBH ÃI8p''úQÎsiL BIÔ%ÆN2j"ÃT ³w,wQúóéL>a8FÇ^Êú5ë)ÛÄnáG|ñQÊÏ6RØlç'&qÞbSÀ§©$ zEiT'æ_?óþ{þU"±Ý·ib$gިبçxç±úÕØãÎqÀÏJZ(Æj'pqOjWuEÜÇuEË 9õ÷îÛ¥.2@xðaê~"ÕÌV'NÛîíëScîOJÏn ǯçJò4æ%½¦òjÄË6©�w=êÄË.©�wõU?ʱts!Ú zó{©3laÄýáµ5î¡u&éåy½ Ò %g-Àæ PXÏ4Êv2x¢ qQ$Uç,r;ç§ÖÓ#°ó0Çø©çy¹=êbF£-éJ@¦íì)ÀOJp^=évîíNÛ»µJéRrÇ5·líR g'¸ÅOLª¤´ä=ý\x[Î7gzTxæ§NE © 9©a ¨|Ï|t#ÞÓ ª¸ üCm¾¿nJ×Ê4:³vÁÅõýi@Å-(�)¾å÷�zoV#GÀÀ\qz¨UàqÜhäð:QIKM Ði ÉÉcÇëM<sô¥nWת$±ÈàRÒQE4ÓiØcHTgO" Æ@ÀéCcy4RRÒRJiÎ9ô4Ö>ý©Ç''¾ir{QERQHzzM'vsu¤'i(¥¢Òcdtô¢+IºUGë×5mþíTïÔ¼è+Fë ®ÕþïLÖUÆrpC{«'Ýõ¬Ë±8ýz¥~Ñþ¦¨éÏÔUÍL1·ùGzΰÜ$W9xåuDàà/ZçîÜM88qþ7p4xÇ÷¤5Éxjm%}GZéüzÚd%®sÕÆhò43ùr+S½/�Ôw=)ûòadSÐÔë"ºý¥FîÙ( ¸ÜþµuF -ÞõS·ÖòÆç"·¿Ý5BåZk¬g3P ©^bªd÷¨E̯1 ªdÕëJÊÕÜ\ô\sZ¯·ep ¦wz\¶¥¾óUq»#;GÐU«8¡pÄ>®yñ¯R1¯ V Xj YrEC.¸rÇ"%ÅÐÏp{Y..F|´CÜ×Tºí?+aþ,ò üY§¤»0À|Ã\ýåW2n Sè3UåÑ£ûÞyëÅhùèÃøÓVt^¦«UP�§nH§yÒFÜ)çåÈ®µµëY tW)¸}àjµ¹ojHÉìcD ªzã$Ôïc y\q×58¹ô4á¨
AÐSAÃp 'ÚäÜý)¿kcpSô®?X1ùF=sR¦¯i P²ãyÍq(Tp½jÛdùü+DÊüT!ÕÅPܨ ¤mÕOçGÛ$ÏÊñÍ/Û$ÏÊñ®ñõ{8;Ætå^ã ô® Ȳ}õ?áKäÛ8¸5ÌF!R¸Þ3T¼µ ΫKg½· Yh{¹Ux\£v)êU^"W'¨ÝìÚþÖæd¸õU0¨ÍO=îr}º5qêz×ÖÐxÈîsTeÓ·Ë6=rê7®i#ePw:óïX2YIÿ�?Ú>Ý¿h5öÁóöN>qQhÊ?eéÓçè²^[¤F?¶(·ô¦Í²HgÔ-þ�ƼÒK7CÌþtÓlÃÍSo³¸T¿.sXIg&ûA¬Co"¼Å
O ì§myû¦öCÁ¶À?í ôÈ%±àÉöØ!@læµÚ³«¼ëÀWŦÈên@>ÕÛ]6e>dD¨ê$Ö¶~U�#4t=ªÁ»ï'Z°nê{õêTѰë»vE"' pR\JVîHÊvÅ2kù£ùcÛëQܶùØç§X®"-ýê¢Î঵cPª: ÅL1 þf¢²S%ÃJGùÄ7&ïYMÃjÓÓx"×˰åúã´};×mo-ÕÊÅ,òê:}²ØØAn «Ï×½:j{RÕkÇ
«Ó?7 ®Lþ\LÞ¬äaØ9¨nîVÒÚYå8XÇOSSpww¹]+u$d8ïUf».îz\sO2ì�¬GÉ$ÖOÍ#äkÔïÞöæFfÜIªÅæwÿ�jßÐÕ«+)/.(ÀÜÇΦ&éÐúçó¥ê¨rª1QòÈÝ©zã «RyÏ_¥X {sÎO?JØÓ4»ÇÙr¤x÷u'íVX¤¼ÞÍÛ[ 9àÉ?Læ³$²ºÎã£8ëíÁ§çy]¥F:vëJ3ÛÚ)ñë@$Å�¤[zä
øG µd0(Üåzwà÷ªêJäØÀzjÈèÄrÏãéÍ;qÇ_.OzÏ|QÖ1¥Üjɼ¡Ê±ù³ÑjA3
ùÎ9àýj¤
ðwmàÇÿ�¯Jî[GçIº¤µ?+ÿ�5\_ÿ�ëÔÖ§æz¤·sç¦}ÇéR@ÇÏLûÒ¯ # '5µá ¶½MÙeîÌfR§<×?^ÜVߤêùÞ¬qÜÕcÙ§1ÀëLÎjäÚ®H{WYÓÛ¡s&Qd MZ¸u3ó¡çô¬ã!va°Oy"4v£4 zÔ]ù¨»ÔfCÔ»=8ì;ÓFv¶Õcdõ#OçR4r >]½ÁÏ
E¢æNM9O~U''¥1HÎ;52:þU2:ÕûvVåb ?ʯÍÏSÏáU-eRûp¤äóÛÜv©ÄBü§×=±M#üÔyçô©ïQ^ E/¡ð¸Ýó·N:}k%?1Kº�@N?:Õ»ÕÞç¯øV;¶æÊÃtíJµ)cëMzÓÓA=3RA2Ä9 rO×Ú¥k¹"cRG#lrsëÚ¬Û¯ïç#=êQCt PßtÔçîýÃ[ ãG¿=é·DÆyqN7Jmà o '®�úæ¡'¥(¢¥# LíÍDËÇ.f¬Klc'ÊÙþÔÝÄ:c=Híô)"ßH¸n²?ÏHWæÐÓpçJ=)vçëHGäMï1ßEsÀèÜç©ú re[hÏÔ:x>H;Xr{})3´ªÌ3ëÒ¤zSÇNj58?J¼?ëRÇÏÖ®@ÈêXá3ÉQþmØþpNÓ(#YÈU#½ëÒ·mwO2wx£õþtîÔÅú°v¬/J·j íãýi©æ(¤¤¦M7ô¢´%l/Q¦íÍO;sªÇ¹{'Î@=8«w|äg¥vW.V>Ía^Ü0n0kSP�¯µsþó'íMc¢µ@áF=©ãFàUùRaÕK¹<àUÐ0n¡ºVy· oRb¯ 22ñÓ{\cT'hì)¾ô¦ÈFjNIvÕNIvÕ#B9ȨM÷Gò¨/dVvÁÍfÉ> æ0f-S Û'®jÙ:Ó £,zl�²z|òc¹«ª8ÍPÓkÇ5¶öd£ûÔÑÐÓ[8©R2)Y}EOå½ÅMå½Å@\ÀqÒ£xB ýzÖ3OZ{bF$þUXnïRüÅiþM.>ÕsR,L:æ°Ozº¯¯¨éº4Øe JsX¼lS´uªÄi0zÔ¸>1FÆ'¥FcÉ8ÏZ¦IÆzÖ£¤=j2GZÐJ·63×ÎvnQ¨pئn9Çj£nqH±daFÎ�4�k?d{b¡óq\ü¶(ªEGw2ý(ßÒÙúÐcbi¥S¼uã¨8£í Ç R4ÅÆ1Í9&fRhÛ¡ü©=iv)ȸñNlLÛ$7nTiºW8þÉc(áG5$È\ðG¥I dsH¤u$V52ÇJ&>ø§ÄÇߨàp+N)¢À�zÖBrzÕøRà(Ú¹ÏZk 3'½HTç¥G¾¡ëAVg�g$¬Î�ÎIÅE;8bsÞ ÞIÁ«RC&òp)ú]ÛµHNv¹ùê�ëV,¢Àó~n��:QZ°Æ!Pvê}MjÃ5AÛ©õ5Ñx/L¶£.2xç]nã¥2(8c5 .z váÏ Ùýáô«Fì~ôûÔwÄùzÔW¹ò?RGÍÛµpþ.v¬êrU@» ôèkñTl5ir8cïPÅ]µL!c×µR�+IØ×éUìS2=T) áÁô®ÏV~]»ÞH>v§y®9¹ N+Òl#[].Ý[oçT®Î.O
5O=¨¹}Óì)x¨]³q!#q5¶gÆkñcYÎÆF;ü¢©E&�®2 ÈÍI+±s¬É6Ì«ßÚ«©à�9©Î3Ú 0> áô©C\_£$ TúTë¥ ¼H¸àã¿O~õX°©yõ~~θ 0sÔíCÕ4ö>©G!ɦHrindÉ ÅO ô+=G@8«·2¶pªÇÓåïìk>@¾iÎTc®h©sM R
À¥I9¥I9¥L¶~VçÐu5©iË0wq§çTà·ß/ A zVÌ4\_úÒ4S\àTäá}ªbp¾Õ,kÇRqê10àô8=OÒªÞÍäGÐä\7<мi94 íF|t[9r{MWÎ\ÃYÓ\ɹIÆ9]¸JeÌø9ls×ê´òo|stÿ� ±KïýÈÎß]Ý©ÓKå «÷ÿ�TÝózæáòy¨Èç^y^F¢ö^i^F¢ö>·¬.ÙíúQ^N3åR;ãþÐÆbÍ,rNr[Þ§XþÒÛËLãsüMþShÈU °<ú©ùÏ¥0õ¥ Å.0>£ µõ©ËïÀùzðG\_¡ôªìãÆ0:OáëR,fz0zýiá6©Ú¹Àôö©"nÆÉ D:Õ¢²!(eäp=+wM½ù!ç¨Î;TTîæ¤dî9¤Û½iÞYï,Ë�û:b¦ u\~ VÍ3,D:Áÿ�mU.Aqݽ~´À½êEãÞ¼SÀÅ=ô§¢cdî�ܦkNÔ¼!X®òÜ.ïð§GjDjÊ3úUå@%îÿ�ëSZ)�ÇJ\~Õ7j²>ìO8§8$úTiíLgoaÖþM-%R(lIäm¤8Ïg¯¦ýìö¤4¦i¦Ç9?
FËü;zæÙäú{ÔDá@uïEQIIC¸^´'?#Ó´ ç°=qHzÑEÓ\|íëL|v§0Á8=ûÓOÍQHi)1½ýi¤{RÎ}M1¸ÉÇëEQIIM\qÀçÐQHGÌ;EXåVnµvuÎj³/½X»¼Æ«Q·ÕÒjwsW9WäÍvð« ÆkêÍI?8ÍBÏU¤Õ¶ÛP9[
8Fd¸SÅO|a�&¹û½NYêntµX+>OÇÏ'ÜVs9ÍE"3ò+PÛ- \UF²v8cÅTk7cNsÍA$nük±@i-´¨+@ë£fGÌ1W7t¨Þ2óÅÆgZÒ}E¸ç\Òù÷£Ì&´ÍÙÎHR}H¦5ÞGpqYsù³ùS½:TèÖ\¦M4Ì@t6á¶}iVî3ÆÁJÉïN=j³ÎcÔµ¸R¡ NQ.iD¹®íPª¹ÇJî$ìFé·5åsEO¤),zÔ ®: ByQLiëNÞp8ð§o8èáZO P|ñÆxÅ+Ëg+%º=;Õ7¥Dù2©@NÊ)ÙQØT!;4ªã°¸ìåZ¨X!-ÔsÇq-¼xýÒ2? ÇIÛ>Þ0|½{ {ÚIfzSßLe.Êýê¸ÐtøWÌy ÓÜÓá_2mäp=Í_¹ÏÉy%Òx:É\jN6ù"uç? Ê /. ´30ØWu x¡"Æ¡W·¯ãKEw«uj¤�Øþ4cæ!ätægÒ¯vPã·¬S&æ&úTs(xLÓ&Pñ8>¥fÎN#Îø¶Ä¼0Þ ÆÏÝ¿ô®ô<£ú=ÞîF?>µD½3mµPÎWÜU¶&Ä0ï§nûa¡3U }°ÌGP¹® =¥Ô¾�È×u®MömY
\©^ùÀÅÁÁS]G&i|o2¼P} gÈä¿x«)ÈÁªiË{Õµ8|{U8X±=MSåÔ× s+<§'�V¶YB7p{ãëXÑòà &¶"-ÀN �=êP )£Ö íWñVÀ¯Ä ÇN¼z{!\¹ÉÆ3íRF¸ùøÉ8éO µB§�Þ£üýiÝÿ� Z\R¡û
Fݹmç·Z?Þè�=>õLoùA�©ýzDl
±Æ{Rc.)GZAK\SB¸tb2Böö§-ääc"¸�òöÍ"årÈ=©ð@ÏҤǥD1ô"¥ëSD~@&¦üµ¡£HÒª È&=Äô#ðF,Û99ù{�Ebéøæe lt§aîzÖ¾ævAÉõéEÆu§Óè«»° ã'óÚ2®AèWu+PÈå¾aÏ=?¯zj¶Ù¹ÀÛÚ·Z)(¤Í&hVf3¸,xÇl{{Ó
�ÜXò�Æß¦j0Øe%FNG4Þ<áFáÇJ æ \R¨ÏZLhÆM,î¹ Àä>µ]#Ëp~QÀúU/ÛÏî©m¡Fö/¸œ8§ àS¨Rа�U8@«¶Pͬqè3VúãúÓQvmÀÇ\Ó^Aq~P»dÒ³f¢cMA4¹úTI¥Ê¡ -1Ò°o®ÙÜò14û»çz(¬D¼+y'Ú1ÔzlÒ)MÏ©¨Y<ÓyMUiþR pzõU¦ùJÁê{Ôñmv ,»Ë¶¦kz´c±>$ovss$Ì 8p£Ú¡Ë)ú{þU,GæPrED8ïÍ<6?"°Û´Ý¤V.Ï�lóØÔ×Vé+»EÌsÇoZÎ+9 ;U¸§d=0TzÒcùTô¦¥+(+=ÍÉ'øc4+¼mÇ$qZÇ#pWüô¨$ìF[ß©3ɧi¿( ¦+.öÔtë7(ìßNxêj c1A�uw0Ç }?LzSñÉÅBµ09«16åÁ«1ËÍnØ\¹ýÓ�WûÃ+@ŶI pTò}+´l±ä�<þ}+~ÞX)-w@1H¥¿ÈÒTÇJ~1Ò£HYU±'èEJpÌIfàó×ò©Áh'(ÝGP=ª£�yÃþÀÓ©(¥¥íNíS.yùH qMni#/O£9~êúb RSppqÓ($äjéÅ&NrØÎ1Å%%-%4ÒºóÇ¥3GÁç<N\S¼9ê{Ðh¢IM|üÄsÅ&Ïjs¼Ó¤QERf4c·�Ni 8¦õÛÆ¥#J Újüäýêc°ì0=E. lNXàg¥4(¢))) ÇãÖkc¹¢¬LÄÔZæKµ§ÞØëÒwzv!$ïniw¨·bNöæº=NvÉééXW/ýj/êRÙX+íú\f©L÷B)°sÐÖozMôÓÓ9¨ÚCõHsÞºnÛwx¨>ÚÃøýj´
÷ôè\©ó3Ó4ýæþõi¹¦0È}jó^¶y&oNFXÕÇÓ±ý;Ó¦½KÍ+ýêaåwSz®êWiØzàsKfûºÓ®88ëëHx¥)@à;ÒÞò {úSã�®H>¼Ó¢UsÏ'(qK(Å. . F/AÖÈØ uÏJs.ãÒlÏ?41ÎiÇALv4ìjr[æSågJÔ/=A¦Ç· ¤f�dô¦
ÝÈæªê1M!AÀïVlþ@ò@äÔ\åîLl(èǹ¨ËÜÙHQѽj9¤U\¶�÷¨£Î;ÓæÇ¥TÖ"æc ëWô RXnþ÷&8éIV0yJ´ð²Õ
¥1\_»a9ã½uwzZH«48årW5 Êj Nq\AJbTER+)$ÛpBúÕÕÀrTh�¨{Rùy<1LÇ4à)qMrBåE £A5PDKµ2# ß7öÈ�'§^+î<ô4W×IjmLîañZjV¤9ÜHíH£
ÇJZòñMEùx¨!S½:õþµaÉ3.r¦ @ëV?y ÷©(4þÕGiú·ezÕ¸Û(3Öµm%Y V'æã=êÖá´¼8=8ÇzÈÓÜC"ô±bW#=GéEÍ Ë�j\_-PeúúT¥�u&¤U,8à¤Ó�bG#§jaÄ
ÉÈÁµ¤Ì°ÄÅ;ÖªéÖ)¾ù°Ý¢^¼{ÓT8µPüíø cMm«,Æ#è7·¿JDp7·éTí¡æMDXàdqZ&ÒÒɾ¹çï£äý3T®uÓùvH¶èØû½HúÖÒ¼Ó¹f<æ¬<èÜÎ{ÔÕD\3òóÔpib²ØçÒ)Y-}+vÿ�[µ··XEpÿ�ÅÏ'éZH3¸1ù¦GrvEubFp+{Ot ¼Ñü¥Ji¹ç¨©I©IW;Tc'j»H<Ñ$Å À PÁNKg'ñ¦³ääm(¤©¾q÷H'¢ªYØîÝü8Þ«ùxÇ=êhI$z~4ìgüEÊ?OZp52Ô©sVü²ìH l#'ð5~Ý�QW¯Q8U 01O$«k&1R2¼qÖQHÝ©Îp\lri³ÉGçML\s߯Ôî¸ò×;�äã½\¾Ë®jþçËc#£Ú'¥@͸秥#19¦k>I7jÏMÇÚ¢»¸P»á½cM;\H p½öÓg¸yIÉ8Zã®G$ÿ�
?¯=i@ÎqH:v(QíBjÀ¶wjboQÎF\à äûÔÁ00G�ò6òOlRt= Hmíõ¦u\ôÁ§ çÚjòsì>y!\_!T8vôªÊ �È'ß§'©õn«d0W=}©¼ö¥ÏñNÅ&)ûH©6P.à£o H§;åmð,öö«b¯<ã A´®3»ÓÏÿ�ª¡zúRx©r¦i
39}oI ¹\à 8ÇpqSD½ �yÏZ¿hA u8i�=
KëH)Õa§DÀ¨ Õ¾D;Çù³·®FxÇ�ñéÚl 3ÐU¥ÉÜ ddv£¥è ÚÚ ¨tÎHbx¤?4j¸%µ=~î;gªñC
Úr{ð(¢J))N:bãqè9¥ÉÝN1ëMe%G§Z Pi !¤~ü )Ǧ)pÇð¤4QL¦ÔRmÇ#Òp}© ;zæ÷,p3ÒJSIHi)¼äò=!ã×W8 a=úö4R(4ÒnÃ(Å1ÊäÈ¥'Ç u¦9$aº^h¤4Pi¤ÓI¤8ûÜà)ËÎ3ÐI'¯²sQ¹ç<õç)3E&i3Fáh¦ÝÛ)ukbðë3L³0¹&ºiYpÃ5MC v©¯ôÄkå¹Èã ©otÔkÕ¸Èã «´ÆKCÎ×ÏJ<5§Iöÿ�2E!PkÚ® xJÔõ±d°µ
Ï ¦Ü ®W4ݧ zSp=\6{S!í\ËÚ< ®lÔðEt²C¶g5UíãÇ(85ÊiÚ§À£aÒaÒ°Èp0¹¨O´cº"?îôõ4Ó{XmþTÕ@jqN$Å+ª0ª�G¡®6%"§W<úwªò°[ìqi69ÇÒqKi½¨¥ H\\0ÑïIÈ<øS¨¤¤£4¹©sÓ4nÇ9¦ï)õ¥àLc¥i{QøR~òçïL�¯=3Ö[¯$S÷q}iFZz
#4¹Å9Xp)ÊÀsS G!¨ãð«En¹vzñYhÇ=zT¡öýjÐqkÔ!©Ûª_7pÁ©¼ÝÃê£ÔbdU02jÉI1òüØíXÑÏ'ò©ÖrGR=éM%)¤4ÒiÓääãÒÒõ¨Øñÿ�Ö¢ÖÄbÀ ð)änÀàsM}ª�cÃqOàzá¯>¾½)ðpäõb«BxÍX¶?ºÇ¡«ç÷CZ^Û ì¨§W }+¤Î1ÏÒ¹MÈÕ º®zíÁ¢;ÑRÔ´îxg"ämÈÎ{úRäï�ÿ�vHàAïE2C
úÓê½ÃàL¶FOáL¶FM=:j©?fT°Lã¨UíÜÀãµs^%» p¯#=óY¤|äzSGj{Þ·½4pÄv¬6oÇFñ®Çï]Obiz} Op1w ùEBnÕ$GäüjcËTHõb¦4\ «Vû¢3ÐWæÎ³í Ëê§ÒÈ8=p>µ:ã9æ¢d~5.>\U²qùÕ²qùÒF¤¢ð8c[Íl<¦8V=ojʱº× Wʳ¤ëRB =ªl=j2x4ùef=;NVaÓÐVÓêÐÛ!
9ÉQÏçXW,é»$°=I C`õ3TY²ÉëÏ
áF)EJ£"Sc@>òïÏÝô«Q
jõç ã&j©,xç&§uRO8R(§SúrÊùiéÖ¢6udjUfùw»¨ßäõ=7õ¦N94¨ª¡Ûdîã´-ÈÉe ®X©xe,F3Î¥[3xÁëÓo¿Ò)i¥/L:TÃ¥\L cwª]ØÜ£r E$#=¸ÎBKnäíE)iiã ½w�Þ¤s¹y97Ï|ÓçJ)){ÒRCI÷IgaaôÅ(ùù¦19úQEé !¡Ï478Æ0)Ì2pyúÓ %à¢i¦¢9ä#'w N{ÔóËqÈõ¦é´QEÐü2ß\Óàjòý©GLRw¤4½é ¤4ÓM|ÎAÖ¢sýªFHI$îôè\'|¶ÀÇãE%i¦iaòí¹ÛLo§½+}ÁÀö¦°çñEQIILྴRc'íÔQZp ªy¬©å¸-òÈ©<ßóñ´çÒïZ\ãìò=¥ºÖ8ò$ }+Ѥ8Rzý+&é°rx=1òýGUÖZbõÈçqYO©êÀ÷Óïkzó®eßRÉÛwQíb7 Í£ßAµ°:ZN~ÿ�¢ÚÈíi9úcükÕKlÙÎÅDÙçåoʼ¨êz97×ÿ�®¦íú }²àÛSþ5ÔÐzãÌÚ¨ûu0\k ãûhõ T'Ä>ÉqøøÔ'^AÇÙgý?ƽ@ $Àd¶7ÈcòWÿ�ißÿ�ÏíÏýýoñ¥þÕÔ?çúçþþ·ø×Q¿4|ÕÊuo4¯ÛÎ@ÏÝ¥ó5ØþÐꢫl¡Ïú$ýÙÿ�ý°?è³õÿ�gük¡1¯Ú²sø dy½?Zç>Ùu»?h>»ÍmºÏü|Íÿ�}êÁ£5˳êÀ j9>0Iÿ�§½Ô
Û\üz\~Æû]Aÿ�[À/ø×H®:Î[o=qé\ßÛn¿çæ\_ûìÑöÛ¯ùøþû5Õæå·k\_ôOûãÿ�Oεù§ýñÿ�Ö§ùt¹üüiF¬üºÜ~Kþ5Òïê=é�ä×7öë¿ùùþû4¿n»ÿ�ï£]6EÌÖÉþ,{§ÿ�Zºz_ÃõÙÿ�Ö¥°=-.%ÿ�pÕéiqù/ø×I¹sëÎqïA ÷5Î ë¼ÿ�ÇËÿ�ßTå¼¼Ï ù×EK\ã>¶=õ·åÏò¦yúØÏú}¹ú¯ô êȧ[ÿ�_ñ¤:¢/[kø/øÖðàdñp8ÀÏàÁkûÕ7MôÍ7ûJ÷§ÚXzéÁ§ÅrßhÖÁúÜp
i×OK»oûä
Y˵×ýò¿ãJ5Çü»\ÿ�ß#ük¤V�H§I>OÀW5KÕ<\È
8j÷ý®ä¿á]Vi ®\ëÇ8»¶öù(]êo ÿ�¾¥;ûiK[¯ûáÆý°¥×ýò?ƺÀþã>´Ùd±W,5Cþ~Oýò¿áIý«~9ûAüøWP É®enuÑÒæØÿ�À)ßj×@Ïjßð S±Û]ßüiFÛ\ÿ�ßük«FÜF;ÒíÞãÛåSXÔågçýÅ?Ò5ÍOn>иÿ�®iþÓ'µg½r©s¯u2Y 2µôïæi~Þð0 6yIsÎjõ¥ÒXð]�]±ÔcAu,x, Zì´óåêç
u_yòGZò×uddu0Èr§Ê¯å]wõOVººé,QŹBƪw;;f´è¢ÒêIÈéëÒpy ý)7G9Ç®i@Q=:QT.÷íWë.ätãÞªê ¶÷j©¨6ØÝ©®Ä7õ»ã°1^¸c®¼ÇÄ G/í!¨\üàÒȸÁZcãëR¸VP! Ìb³§oß+zÒÎv°ëÖ¡²F}jÀéÏAH ¿\TêrUû§ëV1ÐÔH©!<Mí=qZ¶Urze¡�úäV¬,»sµ5,}êAb¯z]§¦jäÅ[\8+6zþv"$TqÍUÊ·LÒX¬ã°íLcE0÷¥aÆ9Í4u¨XòAã¢cɵUÈëÓ#òª¬yoJö=·î 2j&;N Á#½ñÁ5ªxÛOÃÃm8Uö'Ö«x\6jÖvþÃçqÿ�,Áì=Ír64óã<ýkX× ¾ËbA8wÆvAïXZ¶²ÐÍök" ¹Ã>3´úz6³m³�î}>µ Ö£ ¥"Ûs <Û#ü¾µ ý÷\JÃßÜßÔþµ]l×úä É É®�ïéYé§É,Ï#Íê]:»s{n©)Ý1,�óõ>«Ù]Ü^ùAùò{ÕkIgDY&¦ìãð'éU§dtIåYqÊnÎ?Àuéåû:«�ÙúOk8I$ORiåv/Ìy?ÃÞ ìqS.Ú¹àͬ2´PûN ^F~µqtææ}î3ÖF'5«i¦
\�ªp([7¹ÇþÖsÅ h÷8Ååÿ�µñ@F8ã¯sÅ!8£Õ-nsµGSXqä|ÜsÅX¦{Z-¦æà¶#�ý¬¡ Q·(£»p)~ÊðʹQÇ=é~ÌÐàʹQÇÖ«ÑS}·°äªä Ô8#µ:æWbtëTH8ÀíÒ®7TÈÇwOJK#bfÖ¢MÏ ChëíK,RI¹ámiX�x¤£qRÉÅøV6°I ù§®i×c �ÊcçRzûz\_)·°S3ÞãYdùß4Cº)# ¨øíIè¤I" ¯¬Ù]µ¬Æä?yOóªÔWQ ͼL[¡(¹¬k2lä\¹1kn6 eäél¦óÓædx èìæóÓæd@®²ÙQ¡ {z¸±p $z×'ctösäd¡ê=k³². ÈqOùë@íëKJ4¸«jØZld¤\_50 c>çô©£y°@ÇJwÊ7 uôçphZpåZrB¸±«ÀíÎriR0ª¾8öb$w0£>¤ÔÒ\RéÍ< xÄäp ã¦p=jd\Ǫzx@®¤ùFO¯4øãaI|sZ1NíIÞ5 �SÀñXg#æ'úU £"qÜc¯JnFò?)?Í˱Æ1ÐQKIKJ)
�K0èÃRdr˸¨ÎIÁ'åéO HàÎx¢(¢×f°ùpx}ù¤$�sÜãsE Ò1'#áGP)Äàmíüª&|a»téEgLÓr)3JNI$ò;zÓJóÆó¦ù¿9ä0è=©¬àæJ3E6LïØCMÀ yü!rI�©úÐÎA"JSIIIMçvã#¿4Ó·ÏsK!Éä Äþ ^J) -%!¤4ÆæSÓ?¦:çµ9r§8üÍ4ãh%Bó))i)¦j6à2iÍJp¹ëÒ¢>Þæ)(¤¤¦dzñëE'ùOz\¼ÇÕ9¬Í ݧ,s¹>µtã'ιaÍj\ö'Ò±& 7SZÊ´ÌÏzÈðÄÐÓÍGæ²®#Þ£êûÒ.j«^Ûçoó¬Ùn[ýjþõgK:©ÿ�X£ñ¨]Í7Ì c¨¡õ[òFÑùS0¸ÎÎj²]Û0ϧ4BÙIfûU ¸ZHÿ�1Qã#-"~b»ØR~µ,Si#¿ÅaΨÚþ]¦eöÅ7íP?z{¥vU×QQ´±îʺãê("E%XÏ ¤ëzÝÛæAH.íËMúO93þ±?1Iæ¦Ö'æ(¢êuÇ54a±Y§Q·ä$¤ uc\«ä0jhî æp= KÌ�üÒ®½(§¢GOIY3´µvª¿Çê;UYhÀgcT[R1÷Ü)«}nO2®}Å,°· Ê;}êt7 Ê?àU9E@W«úÕpi$§J¸öàÇ^GzRYGáUí©ëü\Uº·+:m²ÆßòÑOü ²ÆÜyàT»1ÚM%+îXftI u(ÔR<ØÈ#ûæB÷ãöÅ<-ãn={ÓÁ²c´¸8£�äÑK.xüê|½Ï¨¦P9;wz(ÍTßæ¾ÿ�õU$®éO÷EH%'î~F:õdÉÜvdÿ�uECÉï@OÎ¥7Dãäã½'ýv®L029ü qQR)ÀÈO/J òõ!p)<Öã
ãÔSp3S�r@üiæNÔÒÜH6O5!1'ߥiélRÞCØüªö# ÕÜåJ»¦» ÅÜÄ ýQw. E»_�°5 °¨qä×ð®= 'Þ»]µ{""3JáFìã}>µ§EB²À¥/[bT#lù¨GZïÊg'ÔV4:Ó²9¸HPçåÚIÈõ>ôÿ�í¥ÏÜÔõPûQNXå¹Wõ7ÌKgéV¬®NrØÄ3S-åóÛxZz説Ä\>O\_Ýÿ�õéí?J §uÜóǵ/Ùù'éRsÛõ6&=¿QOSs´9è)¯¨Iæ)é¤#2tæÏþ½;ûï0¹ëê\9¬ÍgXlCnǸaò)==ϵXÖnLÓÍ˸ó>ìi¼ßà:àÍypÓ¹.ìÙwnþªÄÖõ9,ÏÙÏÚg çõúÖ.³©Ih~Ïú÷ÈçhõúÖt×-;}EE=ãÁVg{Õ«ý?ìv"æiÔ>íÇ·;Û¿àSê@¬2KIÉ=M,0KytwwscÔZ\&mp×Äç°÷þTÿ�´µ°O!§KÏýÁÜ/øÕ{ ^Lúþz×>Á¾ô¾ÀúûÖS¼íÖAÎß}}é9cÎI4 980UùGÌzO¥2 {-ÌÇ,[}ÍtZF«óLKó÷GJNÓDjÎÀ"f8ܧ©xF|(F¸#¯û¹þu£mkkszy?u:>¯ÛÛCcÜÞOEê[è(©mÑ^A¸=z}¤%¶¨£,ìpª=É©é-~K#óÌøÁ?îú}zý+zúîÞÊ0÷N±®>XÇÞo\:ÄÓíò¡Øáwå}ûV¥3ù³ry.ç%«zÎÅÁ~@§ë¹íÝä¡¢C G ±úð«q^]]ËÐÅè,~¦N¨
Zä¬1
53}o©ªÇRl£Px$n?xý\1f,Ä'$¦¤°8÷5 ÿ�h\LR[ÉF &ùU¸tÔuL³ïkN ePp¥¸$õ5R÷U³°>I6ãþyGÉüOAVþÇf¼\{ÈÄý=êßÙ"
×reOyÃôùnneb²Jçýp?!Å$6Í('¦+ZÏO,6G Ìã ò)g{m9<¶d}èã!ö-ÓòÍAqk²03´vöªRvûĨàn«Ê×ÔGÿ�xÜßÒÞI,ê ÿ�"¡³Æû'jaiûÔ³G¹zTÖöùÿJtI(¹3sKJ.ã×5&¿¢ê²XÜmpdÎ}=ǽV"@ ÷«ÚvÒáðN=«IHa ÷¥Å65Çò=«mA ë[J POZííÙ'@Ã2®úRìd @T÷¾¢-%©ij »×pÎXààÓ×q?60 1×Ò° ã'¾ô@�qÖ3M ѺÕ:ÈH�SÀ{Ðf8û²¯Üöª»lzS]�óß8§gFi¹¥¥ PÙ«>×Éüõ§+9Ï<ñT|ÌäìnµaàðÇ9áÍ/Ò{RÔ¥ôÌûÔ[³îê3y³ Ç¿J
æè$^}1JY$?+á·t¥Í¦ÑAj7T¾nI8$ô9ô¤ir;x¨Ha§põéQaÏ#õ¢MÔݸU ß׸ëHHÙªm;n'''7í <u¤ÝFhÍô«yÈ+¥D\8zTbàÉÁÎ8oV9ÇähÍRf4¦L�:E1OÊ0GNI¢,Hz¨üª¬FOÜ_ʯH»ýòÊ¡¸I?(üª SN{~ê1Ï¥\YDíGá]~¨9À¹û~R\[Åÿ�<Óþù¦xÉÎÄÏûµlaMáOîʪ4)ýÑùV+Û ãb¢0 ô\_Ê´]}Z¡ÏNj¯Ù£Îv'ýò) ¬\_ÜOûäU¬Rb£0GýÁùTfþèüªg·åHã[# ¦ã¡ÇJªm"Ç(÷Ȥ[H×î¤÷È«GÓ?pSL1ç'~Ue±Ò/¥W6àLº(û:¶2±èPU�¥ò=)|ÏJ®a$sÁiDD÷>EX ë@qU~ÊþYÆàZ 9òÿ�¾YÅ(Ô xÿ�º('÷j·OM¿;È=~\_N)=³N £µUkTa3ÿ�Ác?ÕÇÿ�|ÕÒ( ÛFNJøPmã'ðªùR |¢® zzÓ@?J¦,ÿ�Qð»Nþ϶?òïÜ«\ÒÐ-¡ÿ�kùP-ÿ�kùUQn=©ÿ�fò5cë\p�J¦4Ë@1öxqþå/öe¦?ãÚûàU¾Æ(¶§÷Í8[AÓÊOûæ kßüißcLgÀÔħõ&8íTÿ�³lóͼ\_÷Í8i¶} }- òÆ?ûäRhGü±OûæªX÷rëO[8[=?Z±·8àÐLýj¯öu§8
0}¨þεã÷qþÍZ¥ü)E´þXÇÿ�|QoüòOûäTÎÇÆeÀÚ¿¯øÔù9íÁúTãªõª¿Ùö£þXGùUûHÖ6F.IÀ\h±¶§¶8åÊ")Æ2\{h92ªqÔ U\_±?~9ÿ�è4|çb£ÈX
Ïê=GæíÜÍÙ\wÚÄRµµäO¾íÑißjÊÖö0ï>û7E¬«-"if�dû}k@\éys\IßËÆãÞ³5 ëp¶GÞP8@=Uhí$xZfPp þ#íRj:ýô/fÚã}Ù§°úTN½Ojé-mÀ\2F:u©á"¿ t¹¸K©L§ÅÀ\_ íR®÷7 qs!ãø¸è;Vö½$ð¼Pý'Aè[{æ³-Þáö¨8k¡Ñt¯7çh³@Êð}ë_OÒ-l9D-FÞi¶Ë äqÎE;>Ô£ë[1Äp+^8\C¡hØ Ì2\ÿ�Ø¢Y"àUµ
@ïRF¥ýã(=�QM¨¤]õchÅ&Õ§<{JsǸôªÌ»Wlÿ�zË¿
¦gÞ'Ñ TÙËà´Ãmn¬2À÷>Õ[ÈëS"T_J]ÃÐP¢BBr0 sk¢w:tK;/¿ÅZÁíÔ¨¸ê¤Ó¾Õø£aíÛÞÓsõ¥èx¢¬py«@\RØB|ÍÙ!G'rÜL«ÐHËÏQèj\_¸^£hàÐ Æ9-àj3IR0ÏNµFãaYR.�þðÎr8¨>NI]Ä
i\B$;WÌ f¹ùTôRÒÅ7¦ã5 ëfî'{TëÄõ©ÉVcÐÒSÅ¥§¨Å=F\,2ãäfÆ9´# §?/=0sI³ 1p\Bzc 袵:B° xôühf:gýz\Çr©4q8ñ¼ÑGj3III@#îî^Õ (=M¾]ËûñHHã½-%Rf
b:Ȥà7x$[¶{Su�bôQJ Óýã�+íLb7q¨æ~Óòò¨Î[$éÓ@§a8¨Þ£ozL9õª²F,¼ç=@«àÉ?TÕIZ(ÝE%74i el©uÈ4à>Æ[Àñõ¨Éÿ�Z^)¤R´r)¤ûSIö©FdC$g8fãÍ4FÎzcBhÎ)wÖi§ØÓO±¤g\ØÁ5PàñÔÎFûØãÖÎREPN)A8©" )ª cå#ëELõ]úô«u<Ô íN¸|ã[zä@ükºbBðk§Õç#ë\íÊĨéÍBÙ¦RÏJaªn\ Ë7l{ ®TÄ µ ËWÚ«¶\2Å&)TdT$qéô¤Á=3O8'Rmê)£½-£äÒzy×Z?IJ�¥sþbSpqx¤ ~
?h�nÎ}¶ÑJ(ñ¥ÇÖ P(ÁëÍ\ô¡GnOÖ¡9úRw¢)iqFNzûRÛ?�ñàp9>ÜRÒÑILTe}SÍ(¶8ã&N@õ£Óó¤ÅîÔRB3zpàtÎ0)à £ÚÒv¥ÑÅ/åJ)E7 8�Oq@Æ?¦)AãúÒ~t´QïKKIÜJO�ѹïNܸ ëÖ,| b¢z;TðsÅ>>x¥ ;Z6,#£STjÔ.õCèjjZÓ.ïN§ Z}ÕlúÔ2Áxã ÝOûæ¥Y¹ÀÀèäãÖH#Ò¦õ¦±úbÇéGÚ1uÆFj¼®®RþWh7ǨɪÌF~ap9Å'~¦ÇJB}$g}iàÓsÁ¦!Fi×9@BñÖÒ`ÿ�«c2IÅÙwm;GûfJ?ùÐ:Ñ×µ¥ éBÏHïøûÓÁ«8÷lRE»v��g©
õ5ª»,ÀªñË60(YÎñópOZ¡¨ÙÛ]O Ü!WLuê+RcP7;>�=A",+ L§QA%IJlBXq×µ¢O$#uúÕ[´NL¾YÇÞAüësO³²Ps,Óm�"¶GáYW ³ÎFX g5n6!TLóÒîãA¹×5{Îjï �×SöZ±oE+f3¼�=+ ®cÇoLZ}µÙ<¶î¾¦Å8>zÐXSÃÍ<8ÖÈBNKajth8ýzÎëse5ÒÀqëyjBÔãÖÍî)'i'jü·æä k¢:1éTÚñ¹O éUn.~u!zÒÍWêjT jHÌÞÔÔ{U׿�ãÞ¦çv9àñÎkæGûÒ´FE³}ÌmáOÍWÏ¥L§ [ò1ÜU¨ß#ÅtúeÖõòò9uêöñÀçäé\ÒÈTmÀR;ݵg·IG%Xw ÞÃ#4êN´æö9'vrÜÃU.aóSz º¨8ÎuÆsÏÿ�1ÿ�ã4Ð)ÀRt4½é bhàî$uúÕ¨ r8ÅDHGÎÖÎ\k¸|ädÚ±!ºÕöüȧ-é]c¯áúÑETÕ578éETÒu¨ßbCÏJ®Æ¥¸ÆMI>2k Õw}+¼PÜ»FGò®TK±Ù=swRî'!@õcAõ§··4ÃZ¤øªOÌ>¼JªêØ1�{U©Hè¸c×"«ÙûÆÞ?Z?ÏJÌTrtä)ää�w{äfsÿ�
%ii¥½�4CÅ7ä¥� uÍ?·B¤ á\Qô¤RÐS÷'ðÐ0iûrqB1Ó¨¤ !ÆYGÑiá±±>ø¤çÐÒôõü©sõ ~4ìRnà�@>ù¥é½LS8ßÅç®~=i)? 1E-4c×äR|Àþ£$ãn?6ôsíG4QÀZ>´¶FÍ. 4m\_c\
£ñ4¼ÒsKíG¸¥Ç½/ãF8cÛO ÇåN ¤tZ^ÊÒø£Ú¯z ÷¸E-Èlfüz yÁþ1ÇqHHÀÃ>ÔsíFhÈö¥¢
,OG±§Ç¦Ì}izÄS.ò¥QùÓöýi8ö£ò))Èd>Û±S\¡A>ÒT®?ò§,þí<{ãó§p;Î�?þªvÑþEH3íR ú ¶¹' ãuJ<´# ¥êª¤mÀÏ}¦§ñ�þø§pGjiô¸´Óõ¥=9§§#õ©°¤.ÀO¡¨d°C8r)þJw¦�ÈÇ9Û@Z÷¤�zÒ0ÓÓ üé§§AùÒ¤ r ûSe}àÙçª)ª/?îÓ&TÎ7}.)iôì.zÒôüéú~tý¤G½8ghÁöëKëKÏ�QIzwùëNÿ�=j]®AÄ~4�û@.@Å m'zþ¦ù@¿þqHEFÜõ© ûÓJûÔn íLp})Uºäu稪å¾÷5yáä¶F=qUÞÜ
$·_Bj¬OC©Ô~Ua×ÞÏÕfoÎ VhÆüóY7ðÃñ¢H~òÿ�ß5£4X8 ZPïùri@ uí§ÚjQô©UEHR¢0¦¤òØá:p 20µ"ävΩÈ>zP9êiÁy§Í1£mË
ǪUÆQ½(<üÙ#è\DA¸|ìN})´g¤Í£>ôfHç§ëN OAL,1»¿¥.hÏÖ"3ïF}éÛ:äÐÇ4ÀÀñJÏAùÒæ1G4QNÜ3ÈëFG¿åHz~aºäsKEô£ÒÒÓºôÆ?\\ðAõÍ&ßB3JS¶M/ãE&("§WØS²1Ït¦
Ç<~Y¤+Ær? \Z2;Ò~Q3OÊ÷nÔ|ÇéQyÀ�f3ÏãO¥n£bÓÁ=±NíYW¤ôÁ©#p[ø¹êsP
Fè8÷æÈ zuïùÓãùÔc ðiù=)ê}jE>µq0[«ãÙªu^GÍ'ýõTb ²e`z´%rÛIëè){÷¤ ö&&ÉúRÆþ4ó¸·&N?Ú¨Ù$uÛÛ=ªBÌ:ðMBÆFÆOËÍ>´úCi3õ¦çëK²E 9u¤q&Îþ£SÌÉÈ$ÔàsÒ®hçÒÔÒRR;˱ü)>~0¹Áë)7Vý)Q@É,Ã
Õ(ܧPyÎñE/ÅØæÆ¥¶cS©ÚË"ç¥o[\@FG ÇJç·ànãU«Y3ûÑ© ÖÔ¦¶ûC6IÁɦ?ÝÁ;ô¥q¿=¦ñg ¾QE%%%!$¹àõ÷ Ãô¯OJØdúzRÒQE!4JX.YSéHÇ®�Á<JMÄÐcô¦Æ7mäçÿ�×ëE!¢Bi¦Î3z:{TOÆ8<VÜW~£8ÎW=2Ù¢(£4f¤ Øv<Ç£zÎÑ^WØ}isIGj(Í©CðH# cFbº¸8SK@H'$Á4QE&i3LÈ#·z3òçéMq�?:iÛäÆÒZJi¦GlÏ9éQ>N{iìAÎ?
FNxÈ#ÒIEÓM4ÇëÉïëL'' ëNlñLld}i¹¤ ç¯ß®h Í�úÓ©( P)Açϵ<zS{Ó»sÍÒõ¤ÍcéJ Ïzn})IãýiÜÒçm ?,MI»Ó·>½±ÏçK)(ͤÍ<°ùÅ&AÆOåLç4¹è3KJ)´´J <{Óôêpj<úRçßp8£}%%;$t4¹#¡©C=?ZwÎ8¨òê ¦gðý;p¦KiÁÚ½ªÊμÅMçǪ,|õ#ð§±ùSÃHOµ4°dÔ»»dfv{´·Ä§ó¨ÞPßÀqéÊ=ñÞêÝsKØÐO½'µdÑÍ;Ì\|¬AúÒ4lÒ ¤ãn õÔ@§¹>´4v¢NiK¸$îûRrzäg4Ü ¸Å.zõí\\_Æ(Í(úÓÖ§ÄrÇ©¨È¤ä´yF=
)úu¤$RdRÏjB~>ñZhÁQó~´ÆcAïfS×@)[ ëIJpúRu4Þ¦/ Î ö¦ ËrZBØ?.áOLp6àûÒÑv( )ø4ü~Nqê (lt�~µ2¨$� "3À<3ÜÓsÍ.iqê(Çá@ C¸íÃJq×4¬ÄÇQMÉ EÜóLÏ5Ø<
b{(¥æµSÇJxéR!È9õ§ç ÅRAEÓÖ½FÙãjóùÑE½>´QIIH9&SÅSqõ ûÕ�ñOFpU¹�ÑE§ÆÄ6;QE98qNNPTd�1Æx«Z|î\p¤ò(¢§¢\ÕZÖl±È�n\úQE¢i¤5y>stream ÿØÿî�Adobe�d�����ÿÛ�C� $, !$4.763.22:ASF:=N>22HbINVX]^]8EfmeZlS[]YÿÀ��»�C"�M�Y�K"�ÿÄ����������� ÿÄ�µ���}�!1AQa"q2¡#B±ÁRÑð$3br %&'()\456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáãäåæçèéêñòóôõö÷øùúÿÚ�C�M�Y�K��?�ój(¢¼Ú¼Ú¼Ú(¢(¢(¢(¢(¢(¢UVv Y@I{ úuYüXóÒC}ñ×-½´×/¶ÙÏ}£8©·áöÅ9ï´gQEH°HÑ�AÆ7 þ©¬ái;&àÔçðëNû ׿È}¿Jë,<6mÞ)¤c,ýIOµ]}�6¦$ð¨síÛúÖ´^¸xÃ4n6äpþµjÅ \0ûäócЮ¾gÙLÓ¹òqì+ Áy¸´2Ê0fÛ¾ÓAìFµ®IçF@Lð?½]®#³ÐxÔeÊîî}OãÒ»0%¦F ³ ÝÏ©üsúU;s4óøwyÒÝÄ÷23ó¹Pyè=ª-1+;È�XÇqÙàûpN{U=ZëíW�ûÞ²õrúþVKbmmð¯Þr{}g%ÕÌ'+<÷Ñ« ª'#PI,lÃ#±ê+&æI¥ÍåÚCêq§¥f\I4²y²Ü9úOJS×'½ -mIÉ,}X÷útö¬ H<>QW¬|Cöy=A«6zÌ ,ëçÀ>öy {UË]J{vO»\!ÜÆFkWʱÕ}²çDÜñÉÿ�wÔwõ®z¤·[iã),lXv"¤ñ%¥¬-Ét¹p!\_Ø{×(zצj6kZt3Ñï]£,ÛÜÝëÏu¶IpdêJôoqõª$²0\Ô/. ² þuGÄ6F:
ò¤ÁVQF)nÊ(ÊHlÔUÓê¶ÑjVÐßÅ´4ÐòGðàÁ}Áz¯½súÕZ(¢±+(¢(¢(¢(¢(¢(¢(¢(¢(¢QEWQà¾Ù5ù L?ºG×Ð\_À÷LÉ|¸ò.8AÞ©ieÓ´he-Ò´[å¹fû}?ÕËcØ·n¸®çL!·¼VÆpÌ?¨cÚ³fÕDú¼1ƲDp$I½Áôþu3ÙYC�6]Ø\æ2¸?×ñ©^ÎÎq#eÝ®c+P¤qYÌ}7
öãúf¥¾ÓÞÌK«¬É½vqî;é!¿ÔmÒ8¢VOÌ 4H1ÙÆåÀNùÏãX÷ºz© ÈRyì2óÉçÙ>>5¹¯«cµMË4f<«;t¹ªGq.èà½Ê§ÌÍ~-³1ÜLÈ. 70g£cü:ÔWÖw«yCï³cøçùöFÚg+yCï³c5$RGèW<etúÒM%ä¶Þ c +Jóó|V>¡dÖª«26aÊ:G<ò8àUý'Ëk�Äl׫\-Σ<ÈLzf½P¼L°72ä?Õåò¿+¾îbp;U²Áoih® (%|t×òª^&eÞÒÕ\PKøíý\LWkw%XÛ\AèN2~gð¬¶Ás·¦x®CoekXáòû9#üæ¹ÊmQ\Ýs´QEQEQEQEù Ë$¦x'©ÊÁÅ(¢(¢(¢(¢(¢(¢»-5
Î F 2¿üYÛ}&Ûq\pIî}½«ð«kJþy¾>¸®Ñ§Jîã(ÀpN? ì49"Í'¸[iòù9¯ê+Ñd{DxÔí>_'#×õ.\ÛmÇÈÆ�ê}Oá[vo&é¯nDVÈÛ2ÌץdZ({¤Ý>¬µåãó"p\ã8íEyn·ÑKb ÛÈ8sèjÑo#-3FN6êka$°]öñK¼�X£|àý;Õ×3º2ÛÊ»´ÎÛ4î>éð}8?Ò´Ó4w¸û¦Áôàÿ�J±0PYØÊÙó3mÄô�T'CÔ[I7cò}3ec¨! ¼2\_Ð)ê3ÜvY[V»¶=#RMóy¨©åË´8ëÏ'<[ƳùÞCÈ ºÉôcý EúIÈðáÎÉ®°
iVÇ(ÁµvZ\_¨�ò¦]y°ld3ÃNA={£¹óÛ"¸r ëßμóZ·>sE5ÀÝ$rÄ$b8É#vsÁàó«©$(ñD,ãËWk)9|¼xïÍ_#m:KKÌÅ,gp ëGÖ±®¢[k½±¾BàúÖîf{øíÊ:@¹7ÿ�ôÅsU£®j'TÔã@º?É?gWªÎ.u+QË£9ÚO§jãµ9ÅÆ£<ªåÕí'ÓµM«±ûHUYÖ nL0Ìñ~8ý
Oyw-ìþlÍ ©ø(�(¢ªUZ(¢(¢(¢(¥Çé´Ç$m¯¼QEQEQEQEQEQEUíåíukYSþz>àðC]¾¦¹+Þ«ÒgÒñ&¹Ì ãîïR+ÐìÏla(#¨ä0õÒøm<ë9àó0ÌÛþï×úWEáåó&ÌÃÈÝãúÿ�J L3¤§8õÅIy3¦NÓê;TP²#"oR¬1@?Áü+FÊ1¸?ç¯\ʰ"B\_ËÞVG?6ÊO®ùÅF¢y|.dó%#÷hýûì}>½jÒûlä:»ov "¤×#ÜÙ1àñíTn Öw'T8dq? (®j¹Ú(¢)îÁ\F�Àþtc´c(¢Î(e¸CC dþ6¥mWkö\´2 >¯èvqÝ¡³1IsÊJS8ük¥ÃK0E#«ùY¶òÊN رÒ'½³ýÔjA92g?Ý?ÍkYi3ÞZ~î5 î÷#(8Ï\kH~Óuy1ã?JÑ:JUÝ0,}úÕçç9¦ÔÑùhq÷¿J²êÒ²ê dQEQSÚZO{8Ú&CØv÷>º«ß\;Çÿ�ÙøU«-2îüÿ�£ÄYsç
Z³Ó®¯î",¹ÁcÀS¢å$jY@+F×K Á®¶ XN3Ó=3ù×+oo-Ôé´¹¢k¯²ð) QºØÄgÊ#êÇéôí6ÏMLZÛ$NÃÀËéÍKwt6ÝJ@Xб÷=ç]fá{KXZmH ÄB ©®£Nðͬ&]D ùÎ)&"I
TQÄöº¼,[F£v°ÌÃwù¬ª:9 ?zÖ¾g,VËÄÄq&Ïîz:ãb[¿°ÛÝ\_K·ÌHË?¢/¿8ü®ÄÖªuÓôøÏi¦ÞIä}óÉ©t¤Ô´ùvLJFæ8ÇÓ=ýÁ¬Ý:io5 ØË8f$ sbº=$Z¬r\_"ÆÌ@]Çè6õ"²¬¢këé/-ÑBw#m®x08Ç^+2Î3{{%ݺ<@¹9VÚ#\ð:qµÆx{]bKKA¶eX<ÁFüçqoéÆÎ³ªÛîz(Éö÷úTR<ÌÒHÍ$1fcÉbzÓMÕRmF/³#ãËYÎÒäôù>ö:óÀ÷ìu¬u4ºH¶Êå_?Z¨Ët-A-¾edþT©w¤É+2Ã:í8ÈwàRecç ©a¾\îÇ = è¤å¶Ú×Q0æõ#Ö·äå¶Ú×10æÄñýkoKÖà¸A °¹¾»ü±¢ÇûÃ^Õ¬Í~8ÙlTõ3ÈÏbs¦ûn$Ò7Ù¼± Úpz){Uhímcó$óSdk½wJ1&;c9=¿-{¸#Á Ë6ÍÙØ£=ù+©0±±%qÜ tרx.h5ÌðH6·çÓùW7qesjÄ\A$XãæSνuÇÍÇqUÌa²#¸=ꮡá[I6ÌÖçÓï/ëÏëU¯ü1k#æÙé÷ëÍp×þØ¿:Nà©RõÁãõ¬vVF\êUPF z ô{®2.åÆ'öewn~PySßÚ¼ëJÑW´Ú¹ûLmó+ð¥qëëWO&ìË
BNc¨?Zê'Ñáf2[´9Bvîúyxm5Ô $m
gd|vh6Ð@~Ô¥]F åzÔ®¼´©£9F÷#¨5ca> í¬m$ª¥ÊîÍ2[I¡/÷rzs}?×L�oLÅ 9W^ ü?ÃË« ½¶ócu dN^£>f ¢ÁóB>V1Z¤ç=)¢06
ÇN ¢4 ¸Á'½tVÐ xÄHz~UÐÛ@-ã¢(QéK¦Ú[Ãx#o¹Bv¶Lú×C"©Cù(ü°Tx¤y¤®3Û¿¡Á¢ÎÑbCÆñ f$g:×WA¢øjMF¹\_&Ý,Àu#Ò³2ê dèC³ 9=kÓb;x#B'ÐWáí/'îáùvr2ßýl\ä4 %.ç®ãoL·ùʸ½i¦¼ð¬î8YöäIï=½ÈþuMQ@>bp½u¤Q\b8Û×e ÅB Q? ë¡X¡ªp ¦°Fn$b®Xÿ�¼{þÚµ´ËdE2FÜ>ñî~³®Ù"'�Fsô«IªÄñÖíÀÚª\0÷qì\qçü¹o^ôèm¹÷·û«ÿ�×?¥t,Ìܱz à¼g?¬ÁÈ%ô'üë;Ä×e^ ¤Güõýª$»1hò
àÈDyúõýxÎ^f+ó ô }ÏCïX)¿ÙÃg ïIç9ÁÆP ê9j}ÅÌ×82ºQä(Ç ¬]÷ÞàE 'õ&°ààcÓÞ¨hp}B²çw¾Í\nGã^¦Eö].Ö 0@÷<ÔôM6/³i±#¯¹äþ¤×aáh4ËÅD³".È 8÷ù×õ¡qöà 1;ð´9Ú}ê¦ [xzÉrÆ33ÿ�Gþ8£æPóÁä½x¨GúÎM8;:zgV$f¬HÀ#9ÏJF©ëÒ´æ²²
pcÜHa\b±a_ΡÐÕ¿¸EØÇÌ@CýïÁ¿Ç5OwpÌ»½N¸¥h ó´æúSãA&($ÔFÙ�§½,p ²Fùäáý1éb�¨cÉÆ :ýjÔq¤©\zíéUþxÿ�vò0ì{~èË0U#/Þ'¡¥r'Þ¤¼Ä;õúÓO·qàp=©¨¿>ÝÇÀö¬xìFgmèRØðv?ðá=1ÚnòÊb§uýéü¯ëøÒê·%¤ÌÍcÛÒµ¶Ú-Êò$}ÝpGçüë.(Òiãr¾nGz¾>õU¶^ý?´=ª UtåMAj¸N±É®;OA-än¸&/äqÐVßÁÆ@Ædi©ÄÐqö½
kÚsð;Ôrçx�véH¼u4ù9rG®)ÏãNaûÆúÒ°ýáúÕKðE _áå{úÔqü£,I÷«àµÜµD=Å@j�çÔw2y¯-Õ.¾Ù©ÜÜu9#éÛô¯EÕn¦s?÷#8úó¯/®cÆû5¸>®Gè?s~-?gW#ô֧ꪶäóÎ:Ò¹¹ä3O$]{Ù¸\¶²¾ ëÔèIü+QßéIJ;ý+Í(¢J½¤ZíF QÖg~ÿ�@j9ë]W-ßÍrüÜ,ÕÝ"Ô^jÐUÜnÿ�trLÕÍ\Ø]êvðUnÿ�w©ý3EOcj÷×ööy5' $ã5nxR=ºÝm0'ûÌ6¯2Oü»¦ÆN8ôíL9§IHéLrkÑä×StèÒ¿NØÁ
�U7ÜÄqëíRÌÄ�.�#ôüê%I]3Ï< zÒ�4OJH~¾´Ìe ®�îsHW�w9¤2ò¤q¶sê¹>ÝÅ9Ñî0¤�àwlõ8ô«¶î)F[8gãôª{7ÎÀ'9Ïoë@ëSH>ðç Æ~´áÀçÖ8Ñ L3ÆF?ýUp¨y,>ð# ÿ�=ê(Ôðʶ9<$ �üØ#Áô¤uíÆ£ H q»wçRßéL5°]Ãûsa½R=qL#÷G®\¨6åK�8ùûúÕm)ä]AþïÏzg#¦ ³1w|üÊTÏ'Ê¡°>¡=»Ì°yñ»»ù¶ýqUí±´U�·8î)®ÈqÖ¥OíQÀUAôæ£
vªéÍbéFHÉ v{8ãyÆöTq¹{zñÒ«ÚEäY&0åéÇj½cbjÓQ7ÝÇ©-L8ÅHXlT]xÅ5ý kúþBcþugizûàçUX(\t«¢¼ê÷äsú ~P)'úJç¼g7¤Ç<Ë(Èö?Ì᫨ñ¼¤ÝÚÃ2ß?ýa\½p~#ÍÖf£åÏêMq!ÌÕåøæªjGe¢'<û£ýþUWµVýì1çîF3õ$äEQ¢wúRS©úËk0u¢(¤8�סø\ßÈÐ÷°Á¸·üFõ¯=BAàd׬éð}M³·^© Æ9ÆMt ~¡4øÿ�UÕ¸þY®Áðï¿|ªL©ãùfë¼2«Û¹k«zx?sÿ�|×#]Ô²Óm ÇÈF>¹aæq÷±èqVO-Jp®rqNcÈÎ\ÔdóÖ»Sò£qý+²#hê7Ò¤uó'Ø$
Æ3SÈÐÚ' BÛ¥\OÍì?Z¶¿fÓRE2+ßʰpì§ZÊL><À2r§ÿ�Zu¤QÏ"R¨æ;SGj AÛÀ yêi°GºeW^~n û£ùSÄ�vxíê>´øT Cd c8ïÞ¼?©¤ãñÀÈëO µb8¹pc±$àÊ¥AjÞd´÷¢Ûo#PxfÁ¡Û#é÷ÿ� ëAºA©ñJki²)\sÖ"^zÒË"²&YIäZ˼AYAdã©ÁëíÁ5¯¸ (;[$ûô=½ýêµÊ-(-Üö>ØÎ¡Ý¸àðô¤ ° jAPwuÅF s׿dÆÄ9'° 0<þUÛxDöþté[9È<IÇNi©Ç#©¦óØr+¬ÏãL#(3ëL#(3ëUíI2±~VbNáU$lò(?ÈrsïÚ¬ZF�BH<óô¥¸é
Áêg×W!ã-9dná}Ò
Hýq}u~(Ýîø$';OU?Ôæ¦¿x±åº}+×6©;";¾A÷®] Úì¨îù9Þ±5¥í\É&é "ã¡ÇjΫ:í²ù;g£UªrðN;ñM§¨û§ÐàÖëYÃQE:Ú68Ò0Asö&_(íSÈ.+Ë|<úíÈûBÿ�õ«Ó¤l¾q]Ggw/ñ3ªlþ5×x5vRÿ�:¨öÀ?ã@$×§Ü'öl PBYp0¨{täWhquÝ:6PÊ÷1©¾XW[re¼fØdrY8Ç99©7dã5>náêsL'Jé\äk¢s sç;F\°#:g
e249äã·\³0u$ç
ç'ÒªI Ü)À÷ô¥øR®NzR9õô })jAÔSÔáR¾^}{ÔÐ}à 0¿Z2¤°îáÿ�tD'f: +gz6x£8?ÊÚ=é0£ùT½©{ Z6øònØ" rg3Ì«¸aÉÜ)Éç§ZÊD[uV4µWðëH±Z ÞÖA9!sÐÐ@#ëéHøl�§ër§ :÷¦³àá¹´Ö|G¨¡/"
IU�Èéÿ�QÚHÑÔ yØGãéPÝ´wjÅnÀãåG·g=Mg%Ô¿±Èbx'¿ãMY:p$æ&ü)ÛñÔ ëMVªÄmÏ1P²Ùã¦\¯8\+Üý)÷d6;t%ç=zTÆìF1$q¯BU-íïQê· %¨\
㥠ÓòB³:ýåC··=©&Æ© cOÆ{ \ÚÍ £ "ã÷ëPK!1H±ýð¼sqÅC+æ)>ø^;s(FÈÉÿ�õê évN;c|ÀyÏp7R<· Í÷Áç=ëØ»n§%Q4f6Ær§oQM^sô©àeíCÐÿ�túÓ$í¦Û äsìG¨¨ð}ÜàûT%x>ïCíEQWü?'Ðyëú×¢=ÚG}$ I0¨Ç¸ÔW ÛÚË\ݲà08ØÝ\Ô,®\_ É,³¨wÞX×'©º=æk -ÙJ]Àì8<~?
tZ=ÄÖ:k² 4»Øpxü »¢¸\ÓÜÜÆr1ó èå/YÞvùlËæNB«Ã'¸ÏJåìRÞK´K© P·@3³ÐãÓ4ÙüàJÈ\¨bÀÜ2x'=N¾Õ×ÛTîÙsë\óúÓÑÖ^buq2p?yÀÐɶY~ÎG÷Î\c2ÛJLx 'ß"NãKdÙáåVá$q%²lÏðËÍv±Oí}d¤0gN}3jº#M6ËvYö\BD3:zô5Æ~4ªÌIV +ÓGÔbd@9>ÕÉè f-µ.
sÊ{õýk©Ûúô{-F;ø<Ë~Ü0nªkVÎþ;è<È;pCuS]²§ Èg°0}=Õv±©Ãù0·ò¬[øçePçIgúU(®=¨¶ç$nêÃÖîá¤Ãi¶¯OéLyCùjä)# qN'M£¬`}é2Wú×=Ëí!´"Bq÷#ë]t¬Ï$pÛÄû¹R�b¨kG\ÿ�;)ÀÁ^ÇpÅRÖ4ÉþvS½F)&ܫǯO¥gj¼¨OPYÉ?íqÿ�Ö8µª;yQ®ãµÙÄ~5Ç\]ý¿|9þõ@±¶ì3Ôs×éI:
ÕF�4÷ÛàÙä%þfÏ&¸vbÎKòÙëYQE8¶x|äzÕ»w!m9Æ?ÕÉ»ÿ�Ö¨yåöðN8Å9XÆÙáÜS6x`G ÷QEhùöLbu2Çéê+¼TÊxSÍ·D û¹8ô®RÓý#IÎùü®S?Ãô®ÚÙÛû&ÏÌ-ÏüºoÛçì33ÝpNG½t~8aáî¸ÎG½µso>¢æÎxR`¢@ONÀV-v«#IáµÞwm°ÀÈ騬i/4Ëç):}~f\ÿ�«¡Z2þé£s×ýh5&§mn¬È¤É±îl' ¬G$SîNÉ\Ü[Ã9QÃä$~G}ÁÙ#àbwãò5ÍMö¬´,öÒàÿ�¾õ ÒäcÙþ¾cÿ�¯rª¢" 'ëPUËW\¢dz¶ºhË£.råIõÅq2¨Hp¼×wrrêO ¥\Ñ<k/(ÙÎsþ·£yL× ^V6änÎzÿ�ƬKg,LÊû2½pàþ¢ºfhàwÏð¡Ës´ ûçük®×R;¯-Éäù0¯áå3ô£=¨n8¦· ÅjÔ'K£\wÍ81ÈQÛ{õèå%Wüê ~Hò¼ q\_SM-Tõþt ð~´ÃɤcÞêi\à6~û¢i÷ÆÑ¿ íÈj6>[ó¼UW;ÇÿÙ endstream endobj 19 0 obj <>/Rotate 0/Type/Page>> endobj 20 0 obj <>stream xÕËr·Ñ¹®õ{ÜM´£Ás�»|c»¢ÈNE «r°sDÉQY"MI£¿Owã1Ì.VäR]E1@£ÑïnôèjÝwB®{ü?=<{½zðw·þùíJÀ ÖÞÞ+ï¼Z?Zÿeuµrÿ~özýõR®EßyãüúìÅÖ¯ÅZI×¹õ t'õúìõêÇØîèU§ÍæíÎtJ{e6/·ªÚ ¿ù{ÀAoowª³0\6o¶»¾0(áìéÕ°y`Ñ Ö\e¼sÒm^Á\ã:Ù à\¸ÎO|Uì%LE" lÿ·�s�bùøþÞ[ß ÒØq~<#·y¶ÝénÐ3²°-ªþß÷R|Óé²¼Á¿Îþ²úölõxÕwÎz¡t¨ ð§£dyFC©jçDë\2;)ÀçI Ó,Z LÍä«b3Æ÷&á¾ ´xp¸¨X@Ds.SððEyy`ËÅP2ð"
R°DSèóé'x!ɬIÛÆpgAç½oaÊD÷±Y¤Î!D]9¤uÍêK¯ö$ÚMäd¿êQiE4$ üg\_¯{åæ!ô~ÃÏ0¼ÄçS+Òf0U¬¼laúÝ8VÕ$Sz&-ç<þx<ò¼H5s.¼ßZªìÈÍ{>}õ|9pسàqnÊDñ2a~ÜRËCï$µäÁÄþ Ǩ9\¯£ dx¦Yäyq$ѳ¿3A1rR;%ìÍ\ Noq-zZD&]B0JéÁHëV¿¨¤)]7,ÉäAËI
at¶²CÙùH<Í ¨Ò\¦M¸.R?C0ù}05Á&NQ'¼eãôÇm)xKêèE£àÚx¤7´LæÖ8 1,à:ÙñÕ9 z.|¥f ͦbò±z8#ÍN(Ûô\9EQ©Èv@s@Ä`I;)#¼ÑáØ¼7W�ydtN-F¸~l^À¨/ûÊÍ~õr/BõLG\ͱYtu2|?iMç!qÌXo]TjpcÇTÉ GÆïWg¿ÿqóÇSYI1ßï#6¯®Öý´-ª¥Óð)JÅ·>Gu.pÏñþÿû/¹rÑ=
îÍËK-7qÒ5p7$m,ô6!J«æ2Åß×ázOM²>îYh§J´-
tF%ÓX¶4(3Í¥Zvø"ÁÓMÖÞ{ó.ZzX'Þ`ÛR[¯)úxSè3j\_UÊ:~-ìå°¿ÕÀÐõ²Ð}þqnr×=KÊĨԬk$zcN?© î)¾Oz¬\V°é³ÅÐZ:|D'Ì¡pÑSOÃÝE½Ëß ÝN>p9égj[ûC¡Ð¤Tbѹö[úÈN»CnZYO ÀJ2Þ.~Ðss¶(À^¦ÊìTýR"F¶/)\_Ù)qÎ=^(çåË=^"TM÷}üßû8©Æ'~VÞ©&[EÞëtÙ0á ¶iZ6?¿·wç§ÐB· rz;)@L¾¾£-©³¡?i~FK½j7Öh[§¢ÓQÿ=íð»ù©Á\?ÆX<¨%4nå iÜ@v@üÛ?7{|ÍN 3µ(üE \.¦ñyµ·2uUæçª\_¸3f¯ÙÞêq\ÞÙ?/߯=ÔñFlÒ¿^y¼ú/ÅyV endstream endobj 21 0 obj <>stream hÞ222V0P°±Ñ²P027²ìì� �,·2 endstream endobj 22 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageB]>>/Rotate 0/StructParents 33/Type/Page>> endobj 23 0 obj <>stream HÌWkoÛÈígý ~$%=oÎtEg».`ª »(¿F¿üûÞÇÌèH¥E>Ä9Ã;wîãs~/~úé\_¾(&øûàÕ£ÃBñÝËWðçùt" Ñ ïE#Mñnrð·òvr0ÿ
M°¡^L´iLëVFbz69.«ÚW.OÔøû¼ªMyCðú®ª%ÏðǼªµõ¼ç#¼¼O yÛ5üÃïn«ÿLÿ>y9Í> t¯èx%É+A^I¯W8w`þU)ø¾V`¾v`ß¹þ}ó#µ²å.\_Ákôý¼·ùè¹jÁ'M«l�´ö]ÍÓ¦kø½@ëmù6Z«ò=üGëÑ<¼dãy#~¨]²áÒºÃutN\:Í DÒò×\Èt6üü~¢u:ÿîF;¸ôWµTMpÅô¦]ù¤HÖ F§ÿÃú Øc¤mChéûUÙÆÿ:Æå-ßÅ$¯6¸Ìp´.0z\_I:)áç \_Ú7 |VÜaäè)2=ëSõêSù¶Q¾àx~Áx.W°o «ïgRÀµ1SÒ5AEKçÉ.ÚSq1±0
y(UÚ`òèÛøõç1?°9Iç?³t¹³ñËÉFª¯ßͧ»ÿÖmÿJË7!Æmä-6÷°P¯{ ÅäÕ:W÷X¡ßà\_\ÍEpϵ
µ1ëJí<>Rù\_ è´Òm×'ôôKûºå~²`´¢D;©ô~àrç Ф\:Õë°A¥¼z?öÚ H×õë »K¾OþqùÐ)Ö%PjHÐîø Iè-^Ä7eß,E¦c|«]ßz(4Ú¤mW®ÏÆ[wý~Åd
¨7cÀõQQrSêá «ß®
Ø¥ÜoJ/] 1ñ9&ÓÊ£×)nZ§ëÞéAÐA7P 2]Z¢îùC¥ Õ¨wt]ßgW,;$¾$;$ÊÒ¦¼a8ZÃ;>VpÕÇ7°ÜH^dtF®ãaCïsnÓG\Øw$nèãÜgÜÛËdJ`ºq']-[Þ~ef ûX£eN»12±Juå¹ ¶Ð|:ãË¡¨gÖ \Uõ½R\SÌqyI÷Ç,sÆs½µ¥ËùýºäÑ ë!åòÀTq0.9ZFzjE/s=¶ªûëdƤkr¡ä¥¯ pÞ"W8±½Ììñ@¦s%älÇΣô²ÌJo¼0Ó?CÐ:vJ@o\_éË\I½NIÚ¾ÖÛ=ÞÁx2ÔÚG?"42QÜ÷LæqìvÑ´ïìæ¦U,Vî¡À4W<.è+OxÓ9¶×Á§¼~ ;(í!'?µ"«íxC´ãã0I,VÏ2 tê Ê÷:©<,\_ãÓù!Õù ºO9ëúö¡²&Êý#ð©µÍº2y¥»Kx¡±è18\_Ó¹Õ·mШcö0õ¹TöÑ4Þmûðçä-KqµGh ´£1©>/Ý0¢Ý9¿Ù©êhwsÑî{ Ö3\CèFاæþÇ=¸Å UÀFW8;Ôª @'£Ñp]0öpÐýYJçÙ8Is¶Ì}$/'Bqy ,òÔÞ¢å&j:î ¨P\_K¤e`Õ¨Ðè¡æ[ÖsIA7mõÚn(Ãq¼ë©äoÙDã]À»6Éü.n��b`qî¡J8ªQUÝP² & # ®áZöB U«4£pôªdÛJ¦ð ,)¼²-NßOM^rrðþ9zUÜÝÜOÿþ'¼<\þ1y>]ÉU
Qf#GÛ~ìic6ã1#.ÍwØ #Ö@
ë°è«ßÿejZA L ñ[ö$5~ÓG 0$0]ÍÔàÉV´+D
Åìmªà:íêá?|nº6:K6¤]Õî$`3ÓS³å.! ÙLê�i²XRKNʬ£\:Õäî4Kï³ ¶ÓÄù³$Ðæi0µ@ÈùZCæñzLîw9ƶ' 3R/8sÆB«[þ¬<$Ý×x`ö.M³¼yÜÈü7ÄM6+Ùq)`{úÅ¡öåë\ä±ç´2˼¸ÔRüQ÷iw¥ºÄ}ÜCåUfôR´¹|˳«süFãå¡ÖS#3ÃK·Hë¿Jz)Dc<5\_ »¶q4v¦Ën-¶Gý·(7W6Ê7Y³n¢ÀÿÆMÖ Ä½Y+üàõT\ó¦ZN£2 1«m!½îòhxgüvyçCXÚHb,à2² °,å e{Éýg§¨øï\å Nnüã 4�wꥶgËuÔ|\¡?ã1Î@Æ .îúQ%wÉ
£$!(WuèÇõàq3¤20¼àÓM%!WFMÏñåTyûMFOÚ>ÃK¾¡çl Ç ~©³Ù£\_ÍyÒÅ÷³.X55`~ÁZ£ëÕ �È 6VÈ�¯!çá->iÓrAð53uàãê'tP^²-§¥H\¤Ü:dn8å3N¹|ÈGÌQÑÁx4î¹Ì ØUý&[jRd0aºTxòþ¬øW2Pó¦:õöIY±'@³è¾¦KHZòl víiQ¡·Ò[ütÒ7qN ÀÄ^sLÜbßûzÜ,Ï+ÙË!±åXéúQEyz¬cV\\_qØ8¿·cWð&IÏåW (¼6¿Ñã»±�ðø{Ím 7[ºx»[ÍÒ(å=I©5èáfªi»¼!ñ!ì.¯Å<5¯ê;èÙ».§`9
Ýõ2tlC#
õ^´Àáß¾§¿sø[Ãx%`^2Û!4Nü7>Ò Ü6óÕ?È9®-6Êb TǨõ®QRϽcU.Ù¶{F$J5©]q
2¯Z¹\_# $®~æje]lßS·jôûr.㧬 Ð ¬PGyÊc=Ð?Ç ÎS#±í~ÇÔQÍæÉñ9Þ$YX$H¥^®/J¯/ª#µ t³§v·ãk»Ö& ¦õÏe°ô÷). 9'ùì êõNEy> ��K.a endstream endobj 24 0 obj <>/Rotate 0/Type/Page>> endobj 25 0 obj <>stream xí[Û·u^Ûþ~Ëiñ~qàǬØxqò°ÚÕ-^íJ²%Esìnö\´³¶.0 Ñ6Ùd«X¬:Å®yÚ«A^ñ¿ñáìqwë©ðs§Ñé\Î^÷6§lû¯ôÿÔ=íÒ`ù?¡Ó>=î¿8YmL¯Õ}ÊýÉýNæ÷º·& ©Ú Æõ'»Wz½ÑZÙÁùÕë¬ËÖ¯í ]Öyõ1;ÖàV÷Ö;ôêÕ³õF zÑ}¹6÷ÊÆÕ/ K Þ5´N9ËçLZ]`OQº%ðt"ð|zjgí%{
¡TRløÿ ñéóûs¼yOcßLqW<¯cZ7n.&Ï
ØÍ¤½7³ð½2Æ/È%]61øÏÉߺÛ'ÝwªÛúõôtmh+¶¡²nmÃ[ìsL®Æ÷ëMÀB ãál]¤1c¡ }¢PT¶N¸ZsÉTsyÇ/ÖÖÈô`J»å,7¥ÿx\_íáV¦1)é8Ò M0ãÒØ¬ísf5ÕmذÐF²é7<çÐÁ+,¢[j- 1@m2èsØEªÕÇ9tCJeä¿°ºýlÍÁ¶zºäñ¿Wk»Î÷8æ0ªt äHhQÁÈZ^\ýemöÝ$3¨D ®"û|ÅýóU[ªï<Á¡ßûqQïóÑA<%»ÏÞ0zY9´)µi2Ùñ§LÖ<ÈÕ¼e ~i2ýóòb´Oؼí¬IÓÙç4'Z38ePRÕçE1ßFÊf9gmê´ v#ÉLª8Ó)Ý>û-D Nok<ÁCö¸·nÖÝC;/{ÞäúNënóÿÔÏËãã;-àüѳ{Üø³uq¿)A3yõèrmtTUË XȳÓqëGWè½\ï4{¼IVSôíóàô&}3ú,úÇÙ¬(ÔJ.ÿP´WXÏNmòge&»<Þú$]õ$?bÅ%0q§IÚ(&9[¡\RÞ;¨ÁeÐÊ#®ò!OA"MoG$zlÆszÀ¿):üºùNwëηý/ÏßënýÐëîÖWüç¿ÿî|ÙÔݾÓ×9gzlM÷Ú²vèÐ@ÙbïÁ\¨\gB¢=Kób·ümib³HungÝýð«71H»±²H½¾´°ÞN©Å6l³¸`©ÄíÛÀ °j¹ß%p×õ`ÓÅN@ÝÁO>! ñY ;�N½Ëù!2³ÀNàOëèÆW=¢Z³m Ïi»ï×8ZÑ[#æjdc䩨I
Í ò)fZïÜ}¹&>v9fxU7(ÓòA4 ÷±`'Uñq`Áhãç¾þ/P `ôYqVr!g?g?ë 5ɹÍF T»º»éNº C·#JÄ£ã¸øª)s^Ø<ÿÁ¼¬þͤ¼LZÛ 4Ãúgq¹fÄoнܺ×0©è>í µ~´.flî Øñç¯
4æJ3&ñPlBæ^ecbHQúÆ!t^ ¾óúÕ çªá!Pøø¨ÕD®´ügo¡VÁß»ä,r`¸'¥kÔFÓvZ¤YÓÿ(�O}.1w5ô-e÷»~¸ÆIm¦N&ÅË©UÁDÆ|Ç''[#Vd1}æJÓï¯Ç9Z̰ ªóÎ6#Ï6Ü¥¥ "npH\_veìE÷°û¡¿ì oà ôVîEå=z4á#lõcxD¬m Q}ï#|^t¥cñ¢8z÷>e¤ß¡P±ÕùSÈvÁJ; àETÙDÎaÞ7mÌÈ ä1d]:|À<ÁBÑDDC RQ«¢á/¹haðu #4 b¦ççð1ص¶§Ò¹&,%Ë\½'\ ÁSÚq0$p¢# Àmà¢CÌ¡T dà½áT3×bË�çE3¼\_ vcÙ(IÄH ]¼P¢oô@ !%mlh7ĪÍèñÐ);®Xh@¤(¾Ù{,Ê@4Ø[SDÑØeXOr"+^ è t¨¯4$#ÈÃ'Êæ|ùM¾®`(6fJkEÓ/b[ÐoÖa3cÐð¶äíhb¬¥xÜb}uËZ\_J3ÉWa`ú/;×ûÁ°?öïÚ°vßËÎ!2T\6ÌíWt $òÌ)Ä"±±ÀJÇCd¢Å ¯u ãÕ@ÊßfÔìÓ÷ÁUµLDEȨ<Ùb¶¶(ÉÏ¡Ð]K:¡ÎPòí¨F
pÃ`½$s hêÛ<¼ï
q9QpMÛXO/Î 2Å8sG´a³É¶!\_¨¶ wswÚ
Do3¨ò¾s®ö·@[¹iú¤2\_íÉ^w¯=eG\q>ßÕµEVbc¹¼ÓæüÖ¾æz7k:ø9m@òôùzÿÍ·c¡®ËA¶î÷\_º5WÐO÷t×Cùw}7nå ÍóM¶ñõòWò̳);wè.þäí Ü�宲¸}y¦Ü07~÷|O;D 8§/8¾4#ðEô¸ÝÛÍ:øX ¯£ÏôE6©Xðzà¥Gñ ÍPWÚxtä5; ïèHOP`u:"ÞÁÅ£í ÞA¥eO ÞÛðswУ¸ÕÒÃEðÆYçm hxt×`OF/FزlB(-$8ÇÊe=Úqýò:6˲àÈ i8MDðÇW%="ØäUe¡íó¬J: ta§®�;Ù(S�@Ùe[ .Lz y`C,ÕçC<:b®(XÇqD{pa\GGäsN¶üÒ£HðE Æ}AM #;.ØÜThɲ�& \¶ÕêQÁ¾Ôq\:OÑVò¢MZ߬£|é& �»ùhê°MÙb,^H {vÕþDإžÌ0îÆý{7nb Ùºì\ v \±>ì aÊ¢%ϱ1Çeg½ !)l`¼b øë¸®%|ï«2ËsV\¸ãÄzDI;¡$oºVè0]c[\ 6m¹Ëh;ê ÝÛ,¸ïoXÑäÐë °F)z<µPñ±P°F[Ë©bÛ[\Ó�GÍOfÑ
Yoså}çl "r( ÿaÛõKÐÖ^Õ· >ßÖ"©f¬ÛKl|¢
×d>^6Ë×SRÁÏ![\_4dÙOj-å1«hy2¦ÆjJ\ ¼|¯½o,=CX@lø¸ßAiÏ\_"¤8Ih÷~Øo¤Úªrm£¯ùʲ]ÏóÙ¡z¨©±Óú¿¯ªÚ'ß®íº%%µëåÚäßÝNgÇíåuÀþgvÝðúÓÁ/Y·êp9[ÔÅãÌ[þ²¹ßÝï~·¦f6,ÅLGM¡Úx`·>wÛª³É¦å¡ÞÕ³yÙT¸´êI®ý6¹¿ÔÅXÝÄÚÞXQ\Ö2}ýaÝ(¿êç}?¥~¾¸³iñáþµ7-µêÆ¡õ«ºÉ«Ö~«Tðr^ð½Z)¦Kê¸w¡ÁµF³U£x:{är7ucgrEÆYÒúËm Çi¶.[- `ÐQõçsIàpl-ãhu&¢³Û¹Ôj¶éN3´Q¨ÙÕda²7\ôWhÌ5B¨õ´ØMí,ü6³]¶ñ[c)5pÇÏJ£XUùnJY|»Q@QüX
q\6;"¢H!©ñzFÇFqà-³£CÊQ¾¾:°Û´üÕo4^Ô[èmä3ÒNÎdÓÞ±yQ,z¾U뼿öxzýëjÊ@ö&øwìG}àMk\{¸ü)HùÜÆ¼ò§(iáç·pC`~£ (~°oûG.»àµ×»ÔüÆÈ©=ò/³/ùpÄBS~t3dõ(¼vSnsª¨SoIA¯\_¡ÆG][}Æf¦Æ»ëý¡ Ö´6c×]t, myÝÔ.÷QÊ ÒXþa&¶í67óÀ7UñD¬øCÞ
Öèá`þ@]óç0zOþ@7b°öÎn{á,ÕßZã¿ÿî¿HGß|t`p;\_>stream hÞ222Q0P°±Ñ24·P060òô,Ì@L;;��tþÐ endstream endobj 27 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageB]>>/Rotate 0/StructParents 32/Type/Page>> endobj 28 0 obj <>stream HìWÙn¹Ísßro2lqo2³çÙn©µ8ò /~ÐUw,«NÕ9ÜùA}óÍλQß}÷àÑCÕ=~{ÝÎÅǬ2}kzÔOÝÎ\_õêC·³gÿm5}EíwÞõW ½ jï°{¾y´ÕqóãÖoöõ|>Úê°y/¿oðùãV[ÁÓö1×9ïðñl¦½Å×}ØþkïoÕçÇ{Ý»N\3 ¿Ædx S}J)n ëJ{z16+}3F R1½:xÝ=Øív)Ûí|ÏÝ'êãû³£nçÁñ¾û¨ûC÷xWýöÖ|´bþMlJÎÊÇÔ{Sô¶×üäbQ§øÕ1öƪú¤t)}²ªþ¶Îå{¸Ú>®|(Á3í#pb4=¾Ø:îxËùe 'ãëÑ4ø-± Ϋ4\<ß=nÄXÅŦq#F³J±ô�çñÖm~»yÍ Óm <|\' )KS%FJC\#O±öL³'@d�VöþÓÕ£Ùz"�¡n?xôºË®i²óKE10øæ6·¨ßÒ¯ðôä|7o62±Ýnê@ýÿSeTíÞÉÈ»3ù2á7·[=dzKÍöhï@ ÇÓÍ\_m}\_\uºúKûª¡Ù%×{éÌ >.p«U×hÍ4k?I4#@;T¡©¥ýsÜìoMTùÓN°Æ:DX"¡QØÊoN8xÔÍç11=�Þ×FÎÑb ÄÈØ;:{Æ¥'q¿ê|°½Ëppà? àAüì ©·®¢�)ÀøØlÚ¹Vµ0ZI¨v>õÑà%& ÊýÅÚO¯yXŨS± ~ÝþmÁjD
s¾]³WpQêèð ~gX¥§)ûÒ5¾q¸æ³ ÿem½F,Ð3´s}Ê3¤½dæ5A}áöÎkß ¹7u`b? ®R1H7lp ,¹aóqê.pZbÍ�¯ äIG +í&¤ËÀ°6ÔIs¨ÊýãqçæÅ\_>qàc?6%ë]»µZí>³çdþk ·v'ú¬R7G¨\_oëÖÔÞ£KýB¸~ïÆå\Ë%ª\îUãkO; Ê"]ymO»îzsA Ùù>C: 9bÍ`AÙ ®ÉáDd?é¾G ·¤ìÈ ¡ðà£êÎ&J!×èdÿ!ªs3×>"V Ì1Ý^#º4VøB²@(VÁS!³àÙÈÁèÁ ÊÊÞ!rÀ8ï¢LƦèVÑö¾(ÿì5&(>øÊ¡pWúyR=¿aÄgt7è&ú ´a:#k´FH%EE\ÊüÄh[ºpFA{.FÍj^lbý/ãVÌHÍ¡i£ñW~èECXòØPÁ3°Á!CÏ1[<ÓL¶¡�,E`WT÷Bÿ² GK@¿f ¢Ä)H3Ô/p9µ,¿wUwüªz¢¨-uó¸| árÒ=:ÎçMÉÅ;è2ÚvcPÔf ñl!
VçM q�æ:î4~ã5Ln�Be¦jý?}Fcs×A þ!NoJIh¼ ß3·EA:ÝLË&19JÈÖ¼þßÍÌýEÚJ¯ØÄ° 3w©¯Àãøñ,ÙãEe$jH/ceÔ\_ñø¾è´Á5\^ C-ªBtPñUûï+£E·L èC½Î\VïǼ/p¾lÇ÷ðe¼»-4gA)O.^y2Äé8s¡-ñjnÀ7éßÈ»ißã5è±m\eÅ@èoÔߤ¶~Ë ßäéW yÊ´òj\õUº8Lî=µ%¢ZÛtèÁ6HRªàBË-¬-ô±/cµ]Åÿ$:Ϋä04aqOÌá÷ J{5fýyYçM"9¡U¬«¯Ág¨6o´®Ë¯mòeYç-\æh )¼¬ÓDöòÄÔzNÕzÁÕd]Yk²uÙZÏéZ/øZ°]%lMÆv±õ²õ³õ´õµõ¶õ·õ¸5;4æÖKêÖsîÖ$ïa"oMöN½õ¾É(¹ñ·æa"pÏNVù{NßdïXÙ{IÞäîÔ¸{IÝ3æ^÷·IÛ#kÏH{ÁÙ¤l\_){ÉØ÷Ów\_pó7+BOSéÙrHkJoT98N \Ͳ¨´¦Ìæ Úgpë2ïÞ^ TG×DÞ()I¦uTgì¯M¸]«ñîeeá.]D`MYÕx]® ³ B]tÙBQ» Méë%Þ} M Ï4ÇW´ 6( D¸{t};Ó Ë¾Itÿ¶T½ ´ÏU¯
QÃÑÜs)ðá½ÆNÃEU@%¬¨ÌÑKj+-ÕV B®ÙàËJugÝP¬Èü¨º/gàÇ q¶~è%
mÊ>�t½3ME "-Ý]§jIÔ^'G'9øíU·ÙYÐÔØÓ8ÃrFMb8ÈûWoAõ.èÙ)ñÅ£úéuð`·Ûy¦l·ó=v¨ïϺ?<Äûî£îÝã]%È\º#&¡²ô}zÖ2AÈúqÆÉ%ÈÅ5Üü|?¯ÞæÉ>@í|½z!Ñv \_·»×¯õîŬ £¸?{Ê
-Èé÷h³C¾0Õö\°\mÕ´|°~¶é2ÅjnÅýîöbl/G]Ïî05y ò÷Vtþ$Ý¥qpjµÕQô:)Òjõ9Õ×-X)¡¸Í3X·;Y=\U.榶2\¹Ä}ªq¸CV ã"ÑÏá=ªFLòÆ~H÷¬ÅΦü~U3ÿ¶ª¹.Ølä6ê¹tñ\zðbàá:Ée(åÒ®X®¯ûÆzn1]c'sÛV0[�`v-¢Ïeö»ZÚFT|=åÙ¼´]F¤´c§6
pXسu+.s+Vn!½×
Tiïp-ØéR¥\¹å80é С£Á Ш>»ôé@\_ÈEáÀßÅéUá)øýKCåÙ·ÃO;,Jp¬äÏwXÍ·õòAçò§P&"ÃSÍ+v^øU\Vøí,£'¤ 1|ÏÏÚMòÜù¶^6¸[@¼MSþ½lÔ¯k Í05Ʈﻦ}»ºeåÜ&`[8®°HÉg Ù×këµÍ,)vjeMòHæ8ÌtÏÁB÷ ¥ÊóvÔ=AíÌb»¤Ê%øe;wý³¾&S´Ï÷kæK·§=ÞoNÆ¿Î.PGW¯G\_ÑN®o«{÷øtÁÃÅh Rin]K¢è¦8ÓäÃþñè¶øTÕ4 d¢éèm@ë ¦ÏlÞÍcl¢¶� lÎC°ÄÏ>Þ¯kZÐcR¾\Nü}£ü)X¼Èú¨W}=Ìo Ìôy´\$û3ò21¥ýÈ4 ò}JÇ^zw-Üÿ¥½Zvà¯ðÑÊjçµ»x3äB¤8OU÷Ì쮽~ûèé®®ªn¢ús´ÅNïo,|e�d»v÷ãi
0ó5©GNe(³¦ÞÒ!2õíi T,®n+GîÚÇå~»Ö¬ºmÖ"² 3Ið{}É^¾[ü~~¯] fÊÉ4й¹-Ý b5½¨/ç \ &ÛÌ7C.Õq\]?ภ3 º2¹ÜkÓ¢è·×¬G
ðæ\_ä"ÛßWtý¾Õ½ NpíÞù½Yõg»0R1Ájv;ÇãØGÜà¾nän¡á¸!yj2\ÏÞëóBC¡Yë%sR@Îͼm`Ïéf¥é¥û
Ó}÷4~QÕGÙL|®¡×´'ù¨Gº\$¸±ï�VÿÖE;¾1= ´Ë~ñÛïp°¶ÖY¦Wì\J|ê9wXã\_Lj|b¸°¶¸ùhÆa [Ihµu+qBÁôU'}´ó7Å%(véïÚ}wCfëF+êíüRåÆ6²³tPÄ=áüà /8ÎÃþ0}´>L¶îªØù¦ñÐ ¾ûC>oð ¨jI 5kÌL?ÓK¸õ®£On&.D«îò}TÎåÐùoX\_PtÓÊè'eÿ8è6§¼Ðq<^Ç&Wÿ×ùFP¢ëÍ +¾fþ(6éeÛ?y4ã¬ü¹J»XXþÄ ÜvÐÈúp 9Ø:w¼\ìW÷÷[ɪ¼¥HÚ£ë±l/h9ɸÑÞCÏIëõ>3²ÊIIê·÷X6\¡[zþ~M±>þ SúæB\Þ1úaßfôÉ«rÅá#³\;LÒÄ ÅPï&ÿü«CÏAS´j\_µT\¶²±øÀ§©Éë=YµÎ0ÇÚ©U,|¡³ý$¬QPk$Uv^$úT«ÉÏÊÎȧåP-yKBê¤(ÕÉjºã»a`»Ê:̨Æ6Úr¢rÖ ^4¤±ø�cÄ7%ÿN¨ÀtDvAÓðj7í�bøJ · G# 0¶nÊBEN~M3Þ>ýf¬ 3øüt½þÄå'öÃÈo
&vJ<Äj]ÕRþËR [G7TÀØLRÎ\_ ÁyíèºP5@(X\yaÙÛ¢DNS8°Ëh/§!`Ë.ï¡®h¹¦×u&Å3HÄGÞüÊ·Üó»J2ëv'sn gÊ·ápbOx´Á�
Íãr$¹ö+kÏïó,é®sSWðÅRlò¾æóêÛb¹Ï'©ÙxÜá8}P£êÓ[ Ö ìQL-Spu6»�Ùz4 endstream endobj 29 0 obj <>/Rotate 0/Type/Page>> endobj 30 0 obj <>stream xí]m·öçÉè³q¶Mßs8Î(¹�ç�ÜieÉ%Ù²%'ú÷÷<Å~a÷NÏÌJ»+ XM»/ÅSUìÒ«ÎôV:ÃÿÆ«»Ïþ'wÏ~ÜYTz\_J°õwWrqÝ7ê¿Ý½ÚåÞñÒi¯^t?Y+ÒYÓK÷ðéNßïlç$÷¹KÖ÷»/vÛÛKkë}Øÿþ2ôÎöÿ¸p½õÅý¯XiпÿúÒõµvÿÃÅ¥évQýòBúKû× K Á7´ñPr¼·BîÅØÀ«Àé©}ë ÙïÐþ?fÄÅëóïOð{,} xëf×lÊû«Kß'r`G\ÄÍKß¼ý¿° Öèêkÿ{ø§Ýw\_ḭ̂¬Î ëT6L±luîbÈUÑÀ ج`=.#:èгZù=fÄý.ÕJÌùQûý¿0.ì\_ nÿ=[ú j\QJOùèöo/\¥úåXY³)8r´è´NSv2úýð zz5µZ-õqjóï Ê>Tä8Lë×êR2V軬e¿Wu>íÿ¾G]DùïxÁvßð¥ÐËÊd=\>>ç,Æ^øt GticèKì.ë¥3V;©+pU'i±,gÌKd·ØÕg,÷)63æGRP}IÆ.$ÆÚD=íêÄ÷ÆY'}Õ¹¨í/}WRìKBöø êïó»Ïü¥{ýïw}ÕÙÝgäÿ>ÿïß᯿ï>Ù}ñ ûò>ÞÁýk]ÛÁëb5¾(S? ||2¨Z³N-/Á©^t±7¹åõ)DU¹Zt¿Ag Tçbeyµ{ºµ:f°v£5>Üh´[�ïL gÏR«3"1Y²ª3¾�8b1-D)Bn{g¼uP÷ÆïbB±R �'ùUä µø 9ý¨ïaJ oÕôPmþ@ÑtÙð`ªÉôË "^\_pø>7Z<ã6ÖL Üà µÒgRU3.§Ò¾4ÕýºÅJ}ÏÙ+ÔDg-¤Ãµbu77y3Ó|©9]ô´yOÑz ^6Úå`Á¥j]H,5ÎVfÙû³+V~µÝmi]Rú} ï0È5ßÅ §¶Ý»ADCÈpR«ÚTÕþ%0ÅkDL±ÎnlaêègA5ïË
¯$ÜÜø¼[0¨Ã;z 4-@Í`.\_rÕæO¶Ý×FP7À.Xu#îÊ8yKçCt·»6 QH\¢««yºû ZQ¥îä ñ:.]¢7Å¡fî8^ÃIÀ>ú2õQVx 'Có¢OÖQ
b[H:"}¦¼ç\_Ê·õ¬½6Fb#�N(ý0Jµ(ÿàµÿê<.®'Fq®BærÅ8ÓVzV©aX´ªAFÀö¦hå$øT8Z{dêw< ¾5§Y^ÍvëNÈÎÞ®Ð'±iÜÿÇ ²6HTWmU Gjôì0q¤/ºQ;låkvTP!àðº'Clèaѹ°Þk[vX!È 7éé}íÁsaòûnë íæ#94}¢Á7AJ³(VëVAä& ßîQÆÞTH\ÉA`W§x§ °ÙóRktý±%n®ßÐæÀt^ö¤@üA!h½ ÁØÁµÈƱ>½oª &ù28½¯À`"B[+ª»R`J
Ã#ÒMp ÷\J ¬"P¬~ÉtL¶fïèm2Ew`²Mìàø!ÁªsÅÞÛ!S{]¿è¶pç±wña/j>À죸&{GÇPJ¿éöà8t¯lZ;/]w T+Îû4ùþÊäRµ+MDèùäõÁ.%Òe¤ÃX:ÆÇw¬"®¡å]Z B4ö½µ@çÉ|µKØ.ªô]i)d×=ßecfʺ8´}¾ûf÷U÷rgzí`SJQU� j3pråBòp¹ [µC|èCòµ ˧] Ðs(Ô$ïR}TÎ R÷v¢Á;¹¶ÈXèï´\z/¤x %¾¹7 i𰵽ȶÏJÕT@g]\ ùÕ.e¼çØ `^ü ïµ XN¼IP̯H KA¨èèÌb W {1%XƳÑ4 §ÄN`NØ�]tötô·GÔ5p|\_é.;a}#ëïà\id8Øæ.æ�KQ\_ó¨ãý 9äM ùäBWä Ô¸º{vµU2\$emåjY@%CVmÅ ÑèÀ[\_;½f ãý�\9Ø;[¾bõÚ¶¸ëaU¯þm{îèîüfümði®<§êÓ¼§ÊòÅ?lÕA|bëÑqfÕaÓËê-sʵ\_¯7Umz¶äOg®K8bÇ6çØAMǦ 3G¯ïç]\Wñ£&#ØÕPS':=Æ e
ù§Uäý1%äf!䧺¸yuÄß«~ÐñÛÌ\_aá7 N15jÑÇÀ/×^/ÏµÄøLåå|Î ¡ë¤5B$ÐùPµ¬ 5¶O¬pDHb§RP ß¡ 8P ¡íXæ2£$1õÕvèÙ¢n OTS
HÀ¾lS=¯ÑB´Û©Æä© À åH4r® 5 Ò! ß{¶À#¡Ær.` jBårP¤cUï98925ðp`¡\mà@<`Õ:9øEM?Ôy`A)G` %Nh�òlÔ.V¦Ä�¬y[Ùbg¢\Mú½½ÒHRç¡dÎ0ñß�ÞÉFʽ"a ¬4².k�ð[È×:çI=(Û Q/ (Ïýð%TLG©c9«ãª°% n:÷éǯ{¦Ómé-`¼P2/xÑCI14áuqh{Ó衤ìÛ`$HCLÑò"ÒS"¢-`0&²¦ÊM0岦hÅLúkç`¤j}ÍÁÔ6"t¶ÁT¤6"êwLAMn)Å,)¨Hm0E2ä¨ ¦ "´Ám°¦ ¦´Á¬YS´¦ ¦à · ¦ &·Á度(ß&e0EÒS0ö² ¦ ƶÁ¡xL:
`Ð#¾¦zÕç` ÊvLQÙi)\)M0E¥¯ ¦ÒúÑÃÿQàßF+6'ü©ãQ"§8 ~ÇCiãx\ÀMod°Þ#×6z(¿EO'© )Ý&£1/xÙñû° <ÑÃûeÜF
ºã¡F8mxZnxmO;ÚÄñFèá=rý0ÑC~h5àÐß-À¢~&ñ-c¿E}4gW{PÄ·}
qa×~³6ªZ"£³¨1 IN µø5äZV@k-0nbE$EQ#V¤ p§qmŰüz¡^ðR8k-^ÌMÒ5åXá¬åG<k ;ÁKnZÔÊ$h¨á0ü¡ã 5zSÅX» XZÃa�ï ±[Ü`ìf±C8 \@^wC93rª5ѳK[^twJ¢^®T?;°L¸06ðT.T¬ Ýá:9A·Öy`:ALE´:Ö ¢X%V¦hÑqËp²¥;\_iÒcëFÖït$3 N.± Ipv @=-ZH]ÖÆ¡ð«J:çY]@X\_r!æ±ÑNýD8C? Ãa\>ó$ÃCúAþt°K=fÃ}îý nréÈhX"c¹Ñq²Ð 1êJ©dAL5j~UWÆiÄñ¨l�¥Ux¡V%nÁ ïk,Pvæ^ª1Wý[ê$J¿ºE.c®ü7 xµ·Æ\-$$¯ÿ2æj ãºgÕ3±f1 ÷ðÕh|)AW-ªßW\\ÞiÐÕ½A¡e º0èJ, AWqO¾vA×:ÞÀöb½õC)eñ9Õò[öåOÎþú\rL¹»[¨oýùÆ£Æ;
z3ÐúëÒM¦Û±UÞéÃv6#õ£v=»þ´~+GX'qþåÝH3Ýo<¶YÔFÔ×Ù3NÇ26Ì×,çD]®ßÐ}>'S®¦9ý£2ãÆã¶#¯|àÿfk+è53Þ]ûcl{b26ìUMï$MÊaVHté¾nɳľDaRVß^ä¤Yý¢á:N¬¦6Áé=Ì=;n\_~,ÝF¹!ÔwC`YRM nåìÈ~;ææËàÞM×%ëÊ" ůb6ǵqüðõ
Jóï¾à5zÆC÷¯|K[éú2ÁT'ö¾\KcC\
ÇO¦ë£ßkÐûLçÑ:#Ñ3«÷¾vQ6út3qáúÓ7É,¯¥<o%ó ×Õõ¼7 tß$^a½ÝJ©éNÅø)5äÉ,sjRVköÀ iu¤6ç'?ôÎáäÞTX^óý±×oëÚ ÛħÍÝÈj3jµ c}|j3,< RÄaü¬G7úãyèãKtMÁbLN¥:Ã$ÖéJ¡f´uîòïÝúðAA¯MnÿyC¦vÌ«òÁOÝ Dõ´X1Ŧc):fè>¤¡/¶îÞ[ÊÉ'Ô¹îp ùøp·oH¸·oHÙw/ù¼ý.üYdä« ÉfÜ2òAÏÈwÎ-Ï6Å÷×wÍȧ OµúÇÍ£-×sò /A@j´{HÊçDs+ÒYêϾºyÔ+\mN>V&½ÈÍ ºï$79hư¡Ñpf¨Þ ê]Óä¡{H7··éM8?M^;ä4yøëç&/³\\¦gwA[¯#Zýq¯ ÞØ0²ëð\_L b;/Ë/³çÜØ+Çqr�5`�ak�Ìöǵ ³ýáïømãÚ9U]Ø9²½è¸-M¬OÖñè#ý÷ÒÑé³±I¿·¹þ+Å
ãÜ\¼wS ö碷[E×Ì ñYä »üË9IÍFç¡|&üf:&÷~±(ÕdàúaÉS6pc2p>ϹÀYz~T3³4fþ)Nåßv&ð;ø×XB5v3ù ìô}LOÓ,~¹ûÈ¡�Å endstream endobj 31 0 obj <>stream hÞ222U0P°±Ñ24·P060òô,Ì@L;;��uÑ endstream endobj 32 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageB]>>/Rotate 0/StructParents 34/Type/Page>> endobj 33 0 obj <>stream H´WÛ·ÍsE?Î$î^Þ/ðåA8r ÀÐÊ®¤M²ZE+9¶þ>çTÝ=³][fYM²X¬:uªxöýøÕWß|sïÁýq8ãøìñýGF3¶oãçÞù`G3ïf¶aü÷pöí3¾|;ۿѹÆ:¿¼KÌc¶ Ëx~9ü¸{°î{¿ûÉXÏñóýv·ò{Ïïöùg\ï'®y?÷eÙküç¾·û¿7<<\_4´o´4fY1ËY¶ø9©àjÓÓ}Ø]í§shÄä}Ißî'S?¦ÝK̸¸»äyî¸Õkp«Ë°ÌËì³}Tó̽¡Á¢}Ñko¾àÑu÷~ïuË}È2|¡ìÚxÓMæÿK]ûN\"Ó?½à¼,¤ ô'þÓû)P"ö]7ãoÅ£f¬kÏÀSbæk¨svãdèAl9ÿQ!§{cU<ìkÍãù«:¸¼©¢Óå¬#?ô\~ÅeßRvý"/÷Qvÿë ®¼l÷ÖPÝñwÜ-îWp¾-aÅÆ¼ÁPwçûº©ñºý\_ñ³doôs®Þ\¬ÉÜ}ÙCØ.G йÓ]1>p9PpK¥q]q!¸¨®zÖÜu£Iu`K¿® AîÞW4ÉïÒþ\_¹õYû¨a 'Õê ggà4'!X ¸1«Ý&«Ó¨X|ÏIðÀ À>üKòiBæg ÜäL³àÀÞÏ>càùWýGÃÙÓÑgáÏ£Çã»Ûg÷¾¿ùÑáÃÃGã¤c¥nLÑs·ø×>y@R°1?\óõ)ÖÎÑ+ñØÄþÙ
1ÌQ�´s§4¹Ó²äËSL ,(" ¿¯. ͳ .¶\à³%xpAT.|S8Ðx¥ uçÇ)C·Ê'yvôüé$D SÀt óÀXÁȲí6 È\_a¯çÇø\¨1¸m¯Eð,î¶ÕÕìTô5rèÞ ¼+ý¡¼®Õá¥þc[nhÊà=Ú$þnßu5eI}Rø ÃC;W4
x\_/
üøÎxñ£J ýåãõB K$µdÜHEûXJ5OÏúÇ˵GXB!'\_µ-¾uY/´$sÍgXÒ'ZɰtÚÅe²\_{פm÷IÿÔ&ï$=)èAͬ¡¿¡ xVÒÇòYIÃÿQI74FÚÌ\ �[¨ìËT¶^É}3¹8\ÃÕßìJT>áJáĶdånÉiWj¸éÐXÏõRä7ÏrC6s,røÍÜ�餶w¬l<º~Üeäëj3|p%ĵȼR|?¿s#yü
T@gRçuxh׶ǹá2Ö$aløcÃæ\uædE%^láf ÑNDøÈÒá;ªïèÑVÜx¦T.6øÊ½Öó7µsux1 {±M0üÉ3Ø©çÇ8ó:J2>#óJ[<Á0·hl¥ám ídY³±}×EQ¦"¬á/O!å&p!ªuXæ=%"QhûÁpwácJw^öùܬCÿLE/\C8ÝqYËé,ï"ªàbÅÀsØ;CJ³×/7A#t¸,tÒÊÑäQp\´ª×o$CQbVV3lLVçÔ.]ð]]g³>4Äg]¯649ɽ`¡á©EhD�Îe²CÛc ÜÒAw¹gÀ×w×uUX¥ES %I°&Æ@`/¢h+~«p!D^æW:ز°ù"hƹ¨HÐu{x¢ÀEÒ.cC2H½ÈbôdÊwÕ]ÖI)jò>Å:cÁc \_¶4±«ÉøÍÚFmBtE®ÑßõpgæÈ &¤E³ÁÀ\_PCR[îÃM�7ÖaÒ(QƨrR-ßnt-7ÈPÝØI¨ÎK¾DjrK¯ÇX?�cê
2I{T
ØTLRÒ±ØQDu%R§`Ä;4ûm#L2Æ/¬Á4(]Ðd`tûdÉAq^¥Ô·É¶'QºðJkD>V4VSd¸GÎyÛF1\:�B ú²Ìcwfæ\ÁÓ oèMh6©J®¢+ n#RT ¾\Öé&CWùBçd24× ¤ÑÞ@G1qbë°@ÆêºÌ7·c êêg+ĦB÷jSî!,ô!
jB7Pe/ \"è£,eºÔ WXf4¨+³³ qõZjp4K=¯»?+É 2³4Ðô^( ¨uÇh©¨B[\ÑZKõYX¨CÊro×êR½½ÊrÍUpæ4©µºn%)h²£ `Ò¥rÑ\àñB'gUÒØog+3NHip'áa¯æ·ù@$ú }\_fQaZ lÆp=QéF©+ÀÕ ¬é¢RP ØÙ´r((m9zÊ+8ÏÔº¥oûsFaT(|}8í¿A<|IøÖRLÚªÐI¼º,D6²yT"«Fôæ $!AÇÆ¨ô,l ³RîÃÁ1J\È(bs{ïðöQ= ÷×\_RÞÆ¢®¯9Q:Öºøæ±½Ktl ØAH¦h ¸½r±tyÕ$00ûð:Za Ï�Ù²'!»²§¥{«DWUñGQô¢jÙBê¹"ÈB§èéMPÃt!E'À¤i` o§ -Bd#mÃÿ¸/$I"îóq(±y8CaUìHÖ\÷¿ÇTÐB lªL3ÜÝÌtøú4ºÖÉ=}¤é´¬rDÇt3rõè³æf:<Á~Y rÖç(¯{Kà)Øcz¢ýA.þ07þ0ë¿êÑþ÷ô¨¿ëQÿ}=jDæMæ£w5úbD,È¾Ç ZÊy K2}+\[Ô¼ÇjÿêÙû|Î "\_úK5Slíçå="ùw z`e-Ök-q ¿·-0õ �vKXÑ
ÝÏ +{ðµVóöÚߢ`\\dPjç³ÑÐÃX: GbÖr¦XaôëùÅùXãÖ%Z"f3×[4û¥ %é0,«¶ðÀZ0<Ö?ÙÒì±îãYrÏÅ` Û>GcÓµûZû\_>,ãóDã©4Úô<5 kÀ·À¦S¥sĦù"IÊ?9=ö-[{Ó ³ ÐX|Ì]ÿáþÖýýö§Îå¸6¬óÏéöÛCb´®Î6#Ö×^Ò5gr4,}jvM=å½
¼Y5ìxø7ê°lúº\O7'ÞGEinIîåÕÝ>?h
ûJ(>?fRÆí¥j ñ qrþüà¯êzd¥-3¥ÛÁØ8GQ`Ûsyå;v7¡çMºÈúPoÙ¿®¢RbvÁÞC#l)#д¨ÁÒw§\_.,lÝmñ§Ñ©¤½ J´Ç(\§L7)y#¹/ Ü!»0·ï󣦥¤¤¹|«¶Ñ Ò'K°U¶7=Õu´Jkø¡&Q¯$ÓÒnuRÔj ×]ØÛ͸Ë$%£#P<Ù%I}ðy¾ÛÊ MZÇç[ÞÃkJ ùRDIÿSÐÅeS]lo«3Ãhä=£ZTË$'ÊN!ÅΨ;bÚÄ\_¶ÉszéT3ô ¨Çsët RÏÕyÈJZ!2ÎívÐ(g÷GjA\ÓæñhÎÃÉß|Ã)>Ú5çËÕR3kĹP~D· ã}ä¢~EWø\_)£¢êñÆ]^é äNG#Êoã¾ÝUõV4ƹcM¢¸¡Æä@EY%WqaÃø¦?På6ÈD+¯ò
8Ï4+µHf9yÄÛì&ø×ÎéVÄh#¥7å}®{:~ÔYþzxÏ'5éqMºq7Æ3ºa»¢ëN>¯×§;y3úy;Ã(ú¨»³2nx§þÍo¯áÐÆåä?WÓ;¿áQÎLõ°=Þ
zÃcZÏ /³êý{`ÄY75
ï î>/k.y0ËtuÐLftÕV¬Ú¯ª5>È5í¯°tÝ\_9n)5ÁÑ+5õuUÛýö¤{D¢J 'Ñ�ùm×ÛX¡üN± .Y¡{XD×Ê ¢y''0nÏTi¾PDr¸Lü¢jÀ-mªjÀíîý<ÈtXÞ7}³±À=íÑ`ÌWE´¾m³¾-«÷ìÝ£9ñê¢9eɬ|5Í'Mø¦{èîQéï¦wØPÄu&ÊfЪ(ð fbKÅ,hØ«l&¢[JæRxÍ¡`/|->3Ô66+²÷nlÖϦñ]6Íg;pÞ}¯®¼Ö4lrVmêØ²~öð#wTéÝìrx\_ØËáwi�(jøÙÎCRůa/OMðAÄe¤äËìqÕíi /AìÛ³¦Þõ-Û4ØTݾh�Ьisyª´ é}¥ä8 \_\_ìÖô+É×}z²ÌÌÏ×G|Þ|~³«Î 0²mræ6³wîY¾o0ÿ6çÀºéðͦºcÇ8Ó´ÒÚ×{ u:�¿W]ªèËÒÜiV�>®s:ì Dw:\>øîrèªøÞ<ÌÓa.ÝøÝølä\áãX
M¹Ùз[|1ÒÃáà=; ",}A&®`úf=ÓäÛÖnDOóè¦6rM V0üTîζcR¾¡BÊl+YVBàúI
:h¯¯j¢¹0Ü[tʺá°ôÿÜÏ?æýöàý¾ÀïÖý ~wõò·ÿ�ùÇòwä¿�ùç¯ þúSÏ¿ùÿOx¿¾ò~}ò~ýÞïOÞï÷û;ï÷wÞﯼßûõ÷ë+ï×7Þ¯\_Îÿ
÷' ó rí=÷KÔíþ>Ò]KÏ
Ao²f\_fuÊ%ç(ÇÉt³Á·×1?æIDÔ]×WÖ¾"É;ëïÃsGX9ÇÎaÀ××(³°ÎV¾Ã9Ö¡Å?kßK;É\¡´]ûf$Gv¢FŲÑúùÿû14ª»]ˬþ|�%è±ÇY½\_ñÅxFY4<£èÕ4 ÔѹçT§"Í:ÃY$g5ªU¸I½YU[öJ(ßQ)x=þáÁêQÕP#÷Ú<þ�ªî ²É§ûÿ.«[0Vç]ÛÝS.ÖEüiéÙ|=ë\_³ã8|§áúÙ&¹ûç«êêFD>ÛõÐÆÓQÎÞÜ29. ~,I§tX)Èßo;ÎK9« ýl<ÔÝ!?¦frUvkd+\"Äë·ä¬ºochÑ6¬×ÊTFÖ&ŶÛ0Êe¢DÙk=k Í=¬¦¥7byíFS5Á?ø.,InÎ{µô¨ÿ<ôzèÞÿظ "³ÚïRÈÐ"AàPDîH·«9;ÞvxxfA ãPinzFÈP|³ãaªok7.¿D?Í1ùj¶½0ûk~snÝ¿8öU}n^ ¤;L^'GÄ `VÞZìoAç4íÍóL÷gq衺Wwo}ÞÒ}ªn´±Ý"÷~#åEï÷ê#wS·éðè窵\_U F}?H"ÜÎíTT÷'%µÄwy-'Z¦ÄP]Éeö\Ø]Ð}{+ñ/e Ob«qP<{mDêl; ð
<åõfaüùÈóûsÑ+ÎåÛ�Q«Ñ°¿WhÏÁIWA°Ë,bò>éF]Ûô0©ÌPú2 7=E>¾¢ÿRwf®IYtÍܵ[ /ón'ØÆ¢&¦ÇQ΢I:ö3ußÿÑ\_þ~ QµEÙ¢Å\_¾í×ÓåmÆ^fv¼Ku³\qzM+û¹OżcwÛ1z9R9 éEbc@údÏÒÆ 0@$~n l ÌobúRBjÒ°]ÿÕd
4Ôò« nj,ýFØXêÉ£Ï@àÛß¶Q{ ÔÐU-¥%Í[þ\_ãA)Zγ«G:íîÚV58¢Í!J2$\Ã¿ÎÆ©)ugéh¶Fñ(kæÐQçþ\_Ù¥c¡Õÿ®n¥ãÒÌlXíÓ®ìí0JåËvàþÔ?òºA(渣EëyÕ¹ÌÈR.%ßÈ©ë·q½©h 4ηôüç±F^A/ß½%È}òêî2ìzývËýÍ]Öçï÷6ÞíüyèïWð¹üü¾á\_¿Ïtö9ýøË\Õú¹m+½Nqи¶é®O=|hé"ÕäRnv%ÔÔ½¿È ÉÒþFF³à;̨ñ«$ëöAÍÿÃ×MSÒðäwÜ^7)í^¬S¼vþ\Î6dÛCeÄáTZÎjVt[§J±¹ÿ1~Áù¶a¼°ð: f#°ýHÀvWϳ=5·ä \ê¼hHÇèD|ÿ·¹ÃÖ%EÕ9$ø\¥³Äp³®dH9|ÖLÐM)í×ÌFåI]í¶l .%veÉøµ×aBíi¸fódäEË(%4Æ3~Ù%ñZB²ûÍÛݸÞ÷zÞHuhEa ]C<PeÔ~þ0Ð
ÎÉRN÷uÁVÖáýðÓã5+ØB"oj<m£ ã¼÷)=z¿×o<©ßbMtjTG{£Ì)Ô}ª Ù#n:W$\,Ý¿»?)©mP<¾Ë ~þp7¸H¯¢,eÍO.Ü4s)dsm¥ýKxh9Yy¬¾Ì¥Ïpä³ÿh½Ç2 |ýùȹ4²jß&mÖ|îú4b2dtúºkY¦L|&Ej +Ód&Q®¡ýLW}Nkn®=\_)
õ<íkCnª}·P§Ý äf¢×tëû\$¦rZ~%8ß1Kê^ty2+Çæ"v\îF²É]x2.Uf-cÿTp ^C\RNºÜØÎ\Y3¶D·Ú¬[ëuKúòdÌÒ65Éõnêàá«,Ö½`¯ïÃÝtU"Ð××Ñé¨ÃMߨ§}!ô¾Ñ(ú$Æ@Yßlà$¼Pîs k ÅÑ·}ð0Å=DxûõIè¶»êOq§§×mKÞTñs¶Y6VÌ1g:'9W[¸¹Ë¸Ò
}p,
¨ÍáÛ¯Þꨨ ã7ϧê¯P2÷§ê[ÈdZmVÊ¢ ô`ëÊÒÖÛM¨5ª©½:BxZ(Ô>Ò ¬eæSùsBá½à:l-RUx{;3³N·yaÚ-oRp§ÏÔe±(,Ý«¦U×ÌÙªg FµhU²»BÕõ{úm¬ª}Gkì\B÷I½ê
ÇP³|òõHo(ï#¦:¶Ê%´©b¬$T¹DÒ°Õ©ÓZP%òý¢H'H´¯ûº]åCùRÿ¸[ûá? ¯¦úÕ¸-ZL;¨EVÉP¨wÎ@åG õò£ÊÚW[÷ÊDº ùÌ#
|/·kfjWæs¯Ê©÷A]tê©ë2Z¾1l\úsMbëíçj§pÄ¡üló¯wï¨ÜXÙ:ò±nɸ³þ\_çøûv5¢´Ê~µãÓ·!CÖv, ÉÙþ¯o}d~¿¬}¥ø/:}Á9rÁ m4fX¨ÃkZ>P Ñ]íþ[qD&¬Ô¶ x:ø i¼wñR+´öY)SÆ[ð ºÑÐÀ×zÆTøùã\n�;æãø÷\[ã8~Þ¯À㮥]ö5==vøÁ´¤a
Døt8@,(P¢ÿÞUÕ3=»³8DÐ$º¶{ú¨#3«@ñ"»ÔReŦ.§l"DÒE"RFUo
þRKeÈ0Ͳ¼<:¾ZvxµEè¢x
÷íj·"|Ç&·A\n+DMɳõw/eN§9Si: )ç\f àÆ1 CIýÔ9xíÐÙþ@ßH¸¥o"Är¶B2¯ãµØ¶$£.ú4ëf u5±Sk¨G(ÚíÔЫ5ÃÉe÷Ã@÷©/dèì¯^'¨9ÞSM»Į̈ûVSN´¯ª!Wã|vã7{ÖLWDÅä\tm£{ÔAs¬zÅÖZÛNļ
ýÕvìtÕ4aöRÁÉlK¾àW¥hÆ0ÏxS-éw 1( ³ÌE-= JÑì7Ý+²RSà ÖÔdX3<¡«¨ãÆ¡Ô ÏWÕ´óôÕ²=ÄÒ²Ó^NSk µò ,m¢À:B2dÔ¥:ÊQî}³scî[uH¿`õwY(\Ã2èÄ¿$×
¡ÍÎ\ÉÒ¯V'6Y¾·oÅibիŵ¾®YÏ`²ÓµIêrß?XÛEp8#)@0ô hôL¦ úJ¤\i#C/- % §Ò2&ãÒWmN ì8£ªá7XsH3jÏF=\ÑÇQ±7CÛÍ.sN®[#3C¹PL/ÏíÆ4jèå A Ð%¶ª³d,µîU+±\ÉAYõ<5Ý"Ý©ÊXø½ÓäÄpR÷ôL@©T¨AEs-Ø@'8©léÃd¨JìX³»,"ãéé\Xb¦2 ~cF¡Õ±0 -«æÝ U¼I+#úÕ)ã(bS}&ÛÝ:ç;Õ¼-Jn¸Î&¶" .ËùQÊh!/¬èÌÐüǣmyk2ÚÆG6s'«Ö`ãè^ó¿ð/ë+þúr¼Ph.Ĭ&ɹÿå¹ûW.R 2ÿ:Nvp]èÄgqç¯OW?6I HÞr!É/¨ïA;YÙ¡`¯9L�
P¬ýóį}Ëÿüåäúý«Gÿú'ØO¾Zýfõõ1FÍ}¢¢E×ó>±^¹}´ M´®?.¼JdùlÖ/½bi]óÅÒA^HCw¾´ ùßø%b: Wô¾|yÕ¦¼/J:Pzk:
kô~é2¨@oºL¿û\N·iÄ ´ìYíúË
WñÍã½Þ©Èü`oáoÒ´Ùà \Èų6odkOqÜä ˸Û;¢ÆÅmø±4øÉWé^¾ÊL9(=¯¸çB¡«¯ø È©xêXÐòÄï6%Þ»P}õËÌWÜ:îù boöçÀÍÈ=;�:~ý^¼Ä9¯ðÛëMè××\XpJ~~¼k\iÏ7±'rgþìù¤t©LÓHe?'³<õ|x¼~Ãfcʺ·äï² ~q%W»ÿB®°+4ã°Wõn)'wH¥ïÔkÇqã}e\_Ûá7áÛ^üñðE"=¤Ça'nK¾XòÊèeN;æhäQ=K¸eºWØU·ünÌû©À|©ù¥óµÎk®\¶2Ú"Rt wýl3VÒ>ÎÉæÓÌãÆ¼¿¶15">K"
ceXm.b}-òw:\5SÝમãGVWÓ·r3Ú|T©à�ôB?%Øæ ~Ë[É)üYæåë·ËvþHr¸QËzÀ : =;Cã§e=·DÖçXz[Öï7"{`p¬©`àÊñ>ÄÝÖTçÞÎÑû·r·s²8LxeÐ4¬ÿaÃöçh)Yeð(9æÌتó æ6KëYÍë"@ì(Bp¯"Ìs~,ÎÐßáíxRjÖ·,Uób-Õª]\£pGýövNÊrà 2\Má7[¯\_rçMä ¦¨bHIV @Ïмÿ{îz<ùsE»ÛP¼aý+\çï¼ÀáûäÈÙ½B·û¿\ ¦··^Ô9G¡Ô8V÷Pocçöî¬7:8èS«õlôX=öÊêôçM #¡èYK´
?¶R'ÚRh²Ï\4'·5Æb6ðHé©ÞV"é§%cÖ¦zÄ.å>¹Úÿ¾IIÇþþºSb Ò=áJ§èêÙ9áÙ˪.ôíKº£Ù¦õséEt AWI0Ù|ÿ\ê X;K£XyCòãÒ·$ÿñ{å{¼Ir-qßMáÏÓ35hß3f+3j]±ªjªkø|^Ðï.¯¥Ó;£/=sNëw6)Ƹ[«Ö^Wò÷>å½>ògµZÇÒodðsó)Þ8ºÛÒi\_5>le,iNTïÿ]k¢«ªúÒç´ë¨=ºüIZ[ßA»Oì;oaIiîõñ×4±Ã!hÞFìRÇ4Ùù\gtD·è¢I#øl½ cyxläk@Äÿ�ÌMå endstream endobj 34 0 obj <>/Rotate 0/Type/Page>> endobj 35 0 obj <>stream xí\[µ¦ò8äGôãL´u¿ÊS8U!¸¼ÆkcMüïó}GêMO÷ÎÙ]Cqa·ÔÒtnútzwª×¦Sü3<\\®îü;uß¿XiT:³×å½Í)Ûîó
úWÏW©·üOè´ÏÝÇ÷AVÓiÕgrwÿÑJúwº³&õ©ÚõÆu÷/WÿYëÍVke{ç×l¶¾·.[¿þac{í²Îë÷Y©0·þn³µ}@^ÿ¼ÙªÞ RïU?ÝÞ{eãú%ïZß²Ï)´~^>õFéÀóÀËñ©í5KöI±ÿhF0Æïuß½÷!÷Ñãi¨ÛQ<\×1/6[×GçDl@ǦÓìÞßó½2Æï?iu¥Û8Àïÿsu÷þêË(
òX:rQ^©§ ©(Êð·&ZÝ9§ûÜùè þ~|ouçÞÝ/?¿ünuçëN¯î|Æ¿>þ×?ðϽOº÷Vwïu\_®3UF÷ z¹Wz"%CèCçRàZPúy T.
4TõÑÃbò}´¥hÞY;PëGËÑUY°)`µZÎjO4/ £uZ þö}6źîBd\k×ÿÛl u'h\÷V9mÖÔkë¨[>kaP>öxï×v¨utÒÇ ¢ ²÷¦¶¦·aomH8sºcnPSï5'RÌ ¸«~ºký=fd\¯l¢æÚ>· ¶ÖBuµ]ê×Vÿõc£÷jrô &aB0ð/Ù}KöáU#$çöjgI´¶$ü||:ÉÏj+~BÑ îapá ù.¡T/J@ñ¬ÛÈáB ÿ 5·;ò öüvîÿ G?d×ÙèlÚÕUZùüh¿ÿÝÆÑùx¼±}Î)KÒ HÌ·¹iñ}¹£4夰@þÁ,¡s[ cÅjbµë0o°GZ@ÕüÈûçhRøºuØ"V»ó\ÔË >KÃbT ;Y=
W[LÒ-uIÿâfIÁv½!g±=÷9\½7GmµNã$íf¨ü0Síç§Mì=;:.R:¾·ÒÁÜó8%¿ñl£åZ¶qåͨnÜc¡{êf\õKBX7¨WEIÙÅSªCeNo 3tè`%àÒ(ªVó¼
ä±D
S·Ú¥FCm4Ac2ö:¥¯[A¯ ð¯wí95t%®Ìp︦¿\ 7ÒüXKæéëÚ±ÎR´EøÞµ¶Ø84ú뢥µ£a?Yÿmcf©ms 4o5 ^Ö Ê=ºÎùa°ÿùÐ ³0a𨶡ÓãxZ<<eצq&$¯e»Å n´bTlZhU§Þ¥nm¦"pe©:¦O«ÉIçeì©%ÿ4Xº:)}9lWõuá¸Y[À>>hv7ZÃv«öëݰ§êȲsÅÜ»Q"ÍZ7Ú]w©øsaÎ0ë½ÌVQs¦¼y=´>0N^és¢oWoæ'ÖÜîJöFº@}CYª,u¦ ÙMÕ ClLä
|CQó!¨.hÎ+G!kûI1Æ\U0áøäDý5"dü¦4êðzè£Eªµån¯YyTNã[RRÞ#L a!88-Ö¶OVW\_wOW� `2\=bA+ç =ú 6>ãÉ©)1K¼¿ÇV])Ó½ZùLØ 5Ä;2ÚP(ÄØ½^ù0#¦Ò"%�\HÁÊ héÈl¹kÊèAábu©ð�-¾OÐ #}�PdE²l~±ç9 ÌFàQ¨SÈh¡I±g¹«D],bN�V³Ô !@ ÊÐGãIp)\¢4P Ö FeU\_ °r·Å.b- Î0n÷¬7ìHq"g| ½"¿Yc·B^ØÃiX¸©Ë:´Ó ¯\_2.Öì=e%<Õ! À.S»÷ÐädíÐp 3Õ¬gIåDÃǵ�«²'˽ø3e(L¡A\û[Îet=Q®Aù×\Ç\Ú-ðÿ&zyV§ñGbæÞHÜà|fK¿Ø\_m¼«�½3µïÌ´ÀßÊL^qm8Ó½p¬Æ!³ºÔåSÁ N &mOðèñ~´´À<@ÕP8M56>³d³#^β?¶§çÀt@&TÁ#¡ ½àÄ}ûg$l!{ÖÎH<Í)e¤àÈ{ìÓ £e$ì» je4å2#{L©Á$¡Öd¡r¬8#ÁX¶3,0S
É:qó¨PÒ§Àr®8#ñ[sYpvwìôªä¸�bK 8 ñ;º� .U¼¤àÊΫ+ÎH¼¤g$ì ¯L
ðS)5¥+ÌHY ;Q#[onʪu
³+þ¬X@ÆvW¶wUaFFxoë:@~(YyE´±K²FPFôò¼ 22¶TWjdd2B æ¬1Ìå 2²3¢:o&L3±( AFh\E÷¸Ô¶^ß)ö;Åþ#+6åÝ@@êÈ5d·½·Z4B ¹XJÕk©äh%ý
ÒMé ººýAe©@¬sЪbXDAà-,F¥8 ]K:%þX1l2d¢ÔMÌ¡Øée¹oeY²&?¤U
±±²X®'%B! h8Ñ2a,à@EàØ¤½À|)NG( ~ Ãø|×ÒZç§ z�ÅEìÝ( Ñã~m?=CÌn<$?Êà ÏÞÏC|ãUÉx\>5wß8þf \_ÉÓËU»ÝÝÍj®ÿUlø×ßlåzPoD\ã4óÛ¥[MÙ¿Ú?d©kuM°pvTKFHíl½Ü>¸Õ¥©Duí)WÏÐ ÜhnEw×ï 7°V®nueé7°<Jkæ[¸u°ÚÁ~§W°³äh¬¶éA Ú}¼Uîü\_17faö³Õ�¼3vçÝi¨NP\©v®Ü|8Àíjëím©m¢\ãλË7r¸Ì#äªHºBF©-¤¯aþLÍbÍ®Òìt¨Øûtc£Wl× [Á·¬ár³~DÃc£á×xÏ-�¡£rl<áV²ííQ»}»hîß^Nl&^AÄcÑìM4ö±ºèÝ@jBp¸N³x�(÷ëçÏ·åo.oÉòë$÷Sò¬üºÛË[²Áß$oÉ"øÕ'ï%oÜo·Ôuë¦1n}x4ûa>Ú\{̯!Ö@mM!ÓG%õZ²ah´lØdO=¨GúJ$'Eìsè\7tÞáêq>ÌoÖnB¦¾1k�óÀºKÝ'XH"�[¯BUø>ð
¶Þþp)B°�²Mcz9Þ¤üH\+ùÇnÈgò»É4nn²g£Hc1Ú?(¹]{iÐRoîöÄ]Ô^)=U¥î¸¶AØÓ0]ù|gLs>=O {û;ÁudkÙpÃÙZy�Û,@¯
}swðP"VjcM5^8D8=)xj
rqD+2É.óY îLÝ>\ÌRa¶µóYµ_M0ômó]ÀÈA>L0UhùZ»,é{>ú0ÔDÔ÷îÞÚ¯²R)ærufÒþà$ê÷H:ùpÖþtk©>S qd61Õ^È=1?'ÒÿWLìKѶCp¯Måf¶P°ü´§fÎ~ÚBãqnécÍEmóÑúú)OÁ1:©W,³ß׸ùDel+§¼óMM£ËÕýÚ^ÿ·pó|+Y><RîØg5ÍÎþ²FÎvvÕGën~¾ÕõËGµnfá8Ë ªª©%uÞ§GÉÈØñ÷
(,rj°(mpeEÍ}&ôûû,¨EÌC«@ªi86\\·¢£v·$¹Mn¥]îUG³c�såÙ±kºácF´pnìÛ êø05X:qbëû$fø0%MÙQ¿åa®À^vÝÐ�÷¦^ùQ9<Ñêb
ànfýýaÊðÙwRÃW%ñ <5oñûK»7l2,¢Áֶܬÿ|¨aÿÈñ6óÁ}£ÓJÑ-ÆINÝQ\Ï\Më ¥ò©²õ�Çàóî÷XzrP\¿ÀÒðk�ű\Ç[þuø= ï=UÏHÒg=~®ÁO#¿\ýZï$ endstream endobj 36 0 obj <>stream hÞ222S0P°±Ñ24·P060òô,Ì@L;;��u>Ò endstream endobj 37 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageB]>>/Rotate 0/StructParents 35/Type/Page>> endobj 38 0 obj <>stream H¼WioGÍçùóÜÍ4§ïîMbe9±°.¬¼XPdk-Q¶'þ÷[U}LÙ©À²8}ÔÔñêUÕìuûã³WÏÛ¾}öìàðyÛ¼xy3öxÚãmϳ=ãªýÐÌ~ùoßÝ6³9ÿoßòyíÛùy#9sZµkƹlç§ÍñäpÚéÉÅTNÞö\ï³i§&7ô\ÁòÝ´ã´¿ÀÓNjÎ|Åû´]üw;ýÏü× u¶H!N õ¤×YeÚNfFÓùÿÇ8¬ö´p <ʰyøÒÛv~Õp¡F!9¬ºHiA+ÚÀOªJiðMê\ÁBx,¦:Üúo¢;ôä~¶ÉÉ{<E¼t6-6®A éé¦áCø~9Ä+¨.®P¼L
¥¯" íGÔdIßïCVx
àÞ»¤3?ÎO>ãN2N3®gÒ§I�mp1C¿7@U¤Þøû¡x3cẰ$¯F1ÓÃ?E;Ø
KÆh& Ý.¯£fö{ËÙK|½jïnîÏÙÁëçð~tØ|×¼8jßOr¯ºÃ[P[(ï\«ú k0eojW¯èy ÏNkÖóV¢mç=MÃ3¾,áCûãeeÁ+ɬL ÔR&ÑéµYçÍÌLÐÐxRJ:Ò)¦ VkB»×L¹Ö(ËKÙYùÏ0
YoãicKÝw'<» ÌtÁ#¾=ÓÀ'Ü1oÚùa3c¸-ó"¥Øû2ÅHMpAEmÌ1Åze ê1gAQC?2 +úýr ÈQ¶Aúæ@ʹ»éÒÓÞ't}I°f(ðð�:MN3§ ù2dHö1LDÑÛ¼¶�Á9-zË8¦
|LZ Ó¯
V{ìÙKç?ÓþrAK(Hxæ§ ¬NBÎkBP°ývR�Üü îOñ@gh©õ!¸,>oK|sÎÈÚ;ÄgÒáj8Õ ë´èÞOTßã¯UXL³áì6ª½$íU'Ôu»³ÉoÙïrÃï Nøw58hj8õ´:ÆA¢mªY ê$À,Ⱥò¹Rbç(¶QïãÉÈuï÷SHö÷¡bÑ[²£´¦ÐÐе¥e¼x[×ÕçeÛ?JÛ²ã纼ÿU/ ·ø{Ý ËL> Üæ{k÷àúQk\_Qoi¬.wlJFÄIòá=QúéÈ\ù<ÕjÄú§Ðú!z´
¦ä«ó·½h)XAn¶$ðXuÌeÝûYä¨ÍÕe2gNJËL;^ü6ÀÚ2:ÁdIíET ùÝTcÀbãèîû®ý30-~?nútY«¡;}átýà~.Ó>YsõRÿdG<Æ)¶ªÇ×a1~�3~¨;ZüP�AÍô²£Ì51ù¾ª¡rôUéÁc»bQ»Î °¯ê!5$åIÕÀNôf³7 )JÈÇæW#|AJ@ÈÜtÝÑäJ-覩þd^ÉlRê |îDo;®ê#MÅ4¡°Í KåaàÒßpô\_-ýIÃÜvZ©$of.½½ û"@WSN£ÐûÅൽæ:Tr;-á=ÉÚÅX``×ûÁG äD¡wN@o®äwrÉ:4¾ =H°¶ Jcç£ ½#80d¦¬ tÜl¾ÿ s§C¬rù0´f< þ1Å÷"¦ÝéF+4e í?rì\_íHQF\cÞÿ üµ^JÀ\_Û\_èrNaöºÁø¢y¢È¿4±=¦|¾EB¥�·¸ØgSÃqYñ]ÙÓöm7¶Æ¸\m¤ê×Ý@?úT+¨gbR9CIÛSjoÈ~9 ¾^¯2W¡Q¹ú í³Îz)ðTfEÊÝîà ^eö#Þ¢ýZ éòDIZëSödþX«1æeD#?È·½ÛÑbDIhF÷]ù.<±Üw±º¸C\,ÐTÁPÙ =ÆÓÞ\'g踫-,#ÖK¼é'¿ÄXF¤RUä-%Jüä;[pÐBp]ÔãÔ¢ ÓS( 4è_#{°bÔ+D¶X¥¦}È®¨míÌv¤hLñóæSÓ3nÑ=ë©£ýÐ�^±Þ{aq½íú¾7¶åN2íî@óʤs°¡ÛåUspÔÌ~oy3{£WíÝÍýY3;xýÞïGíðEÒ5'éÃÉöBy î,ÈÖZI²7Ä«Wô¼ÄþDkÖóVA¿×vÞ3ÃÛð/K8 9"-\V¼ÌÊ´ @ &e^{uÞ¼iæ 3tBlö-%¯u½h°Za%¤þ¸¨GÈwØ\R9!"¢$ÁÇ[Ô´ÜÇø;îw¢8Nñ7Ø¥To¦ñS'¸G<"×·>/Rotate 0/Type/Page>> endobj 40 0 obj <>stream xí][¯ÇqÖóÚ oû]';êû%D1È& q¨CQR|x)óßçûª/Ó3»{.yÇt¶zzª»««»¾ªê¾ÜªIÿÛ§Oÿ¶ß¾Þh:³×å¹Í)ÛíïÏÿuór&Ëÿ ñ÷ÅÓígÁV³ÕjÊ>åíÃ'y«·Ö¤)m£vqÛO7ÿ½ÓûÖÊNÎï>ßüd]¶~÷ýÞNÚew¿b¡BÜîýÁN¥z÷jPA¡^?ÛÉ{eãî°%ï^øÏ)´»Ä[>MFéÁËÎàMÿ5¾uísT¥Ðþkð_¼>?ç!OÑãW+9Ïëvû¢É³#6àÅá¥ÞþÏ1~ÁþF£+¯õþçá¿o¾x¸ùj#J¡<ι(ʤTį ©([É?¬ãÖ9=åÞð³Oüaûë7ßl>ýóVo>ýÿùì?ÿ|¾ýdóÅíWçÌÖ$&p}º . Ö¥À±´qëÑTP¹h¨¢)äå1üm!Ã3k×NÖ&/6Oί ¼U°.´ZÑÞpyi,8®®ÀÿI²º¾À©¬UÜým0Ô 1åz²Êi³{Jí°Ö¹¸{AÝòY¥1£hgû~ç¹µNsöѨØì½» lXôáO{ìpc¡KèD²jI½K¥·l;¤ ôn.~¶çVårÌÐÝ5nR6Qaí!R (ÕþÜ{cñ61zQ:°ã ¯Ç-+ô÷ÞÌPJ:N }±ª¹ÆßÒX7è¿ß}ÛB%ß×ØË úç·Þzj¿ Ps
´ÞEþòT¡,25¾h=f+vØdAt0k©v
Ì¢´©ýPYÆ qYrÉÕߥÎûÒØfR¿J¯üÖ& Ýz=ÓmP½¤Y¶P¥1Jêbóçí3YfÏXì÷ÊPNëÒºPÖå§4XP?¸Eà«Aæþh¨GYIïX¼f/DTHm²¸ÃFdáµóɵ¶H%OÁP8!j¿=LJ-á¤ä$kï4 6®í2.ºJj9oÆÌ9ÙõÔ¯5ãH|Ì"À DË}TX
Äk3&; 4vm4"ÊÛº¡µ¢+Cö7FB¦KgAÄTóÀ¡¥áÜËFÖ ézcMb5ÊË¡á"û§s;Ï~ô½4åHyêFô> 9÷©qÞv>>WEª-ù®v7¾Ï{$«¹èT_xÎtV2OD/©]n<ÛxV2(ëK¿_ó¯Û¾¾xv¿ïWåýªü«òI³ó¤)s´Îõ\/µaÐA6kZ(Ü0Mڬͳ»ô¥$òR KUê6rÐ\ð§Ó¶S³X6´é5eF E»8RÆaúç©ZOeZÉy¥\³V©
ÒËà²Á+:¼Ò){¬(ÁUÀUÙ6Ë®÷´T¯ûÙìæwÒ&¶¨¨àÐÕÌJ¥óWT\$nüóôÎà~Á,ë·x83%Ü=ÑLtqò®Ón°Q¶^C9 ³shtmo´ÀJ A4Ãpfn£ÒÚV£÷»rXãB7&DûM, $ÒÛ4{j0¦¹ÏjÁ Ó}hy Xm¥Wh¬ö¡Õh}l V£(#sÏ¥D;´øú½^E^¾u} ¢r¹»²Ë¾Ã¨O ½ßµÀ.4KÈQ)êó¦åí®�
ý¨hÆQ%ÑU¢
®¥Fïrå°R%æaµß'Ìá¥Øæv =«D«ÐU 2ètÚ¬iÊzP4éQ#H.BÏúPÞ^ a©}X]¬!³
>¤¶9.ߺ»¥jx÷ý×ÚJS¡Çaî{©
8n>£f÷voÄ$gwßña¥¿Çóg¤ùù÷¼çïzWi³{3¼ø¿_í^ù«|³wÄa´Àhîh/>F·£ZÖ@uCj¼Ç9Ұ;D®ÜjM\;ó¾#W§eÅ Z#"Óë;ÿÃþj%Ó4ÁjG.©÷»ýÁ±võ~z´mèÙ4ôå8zÈ ýbÈlû02ØÌíÝòDµswÌñ1íÒIÌñ9O- h³Åçþ²ÛÛvb×»¨SÚýsä1{ìÏ®þegëývzö´ÄK¥Ñb[A®,�ü8ÉèÃ)ö ÝÀ¢U]1LÌLAXØ�cN1µùìºÌÍò:u OMbËËæO2ÅÎ]ðÿT$Jú²4ÇAܺ=ºy¶K1ÆÍTÁDî@¿lU, 10\_ 4¯íq{G3ÐjNøKHN¦P¨îr°kÌê¬uDÁcôðyàÑIºa! : ¿nTC@§´p ®ÐØ=ßn< ´ä@\ ¤#àãöÝÆÃ1+5dï,X¡=ÁÜÛMP°Àö(DÎN0²)×/&] <%4ª¸Fgvddõ 8%Ëá/r˪HÉÐ S|
aqôÉÀzãUÐwf ½L Ô[ÙBÚæE .9-ÐEXsÒk£ëÀN8Ù||î ¶Tp^$Ã<ç,Y©7%%²ðtc�w¥Ä�í6#í"GEñ 0ÁTZEwÀÃë)Þ ]/�¯ÊH2Üàa¡h¢vGjàðpÀ@tBÄ 1u,°AÚÕÑ 'Ùê[iErÅÎØsïòÌr|ÑMÐ?ÐÑOP´c]ië;@&\$UËôêÿ¸qÛ?Ü+ö½bÿ¢û»Ídæ8ýʲoP½{X5¨|) ¦c>Ð lSQ0¿nàbóä7£U¬eî"JÌþ³Y¼§¡"$¸Z\ Qø$IÔÚò-Û&Æ{Žd£¹èðº2ÞÒp2Åv'BCËðeõFÀ~-lD9É6ñ¬R²
f$@WuÀè=QÓ®t+zÝ@ï·ÊÁþg /i ëߪ(¨÷5 ú°i÷kSq#yÄø¥iîÛ½ÀäR§çægzU¸=ýÌæ²P^¼]Þ=�8yOvIí\_Í ¹bó3xäá¢å¹ º.móñª}ëbiÏ^ïÅ¿µógW0u&%Ó 0Ô|nVzHoÙÚóÞ%T8 N¤ý»ýiOBKZ]çjÓV·òNû7e_V}Pá «Îé¦ÝI>vè½¹Ý?rúSÓñJCTòb_uê¾Æz0/FG¨®O¨ =yG&Zté¢ÿª0JU°¹Þ·mO(Ú .É6N|B¨BR0ïØ±×d|S§ÃC6)lÃØJ$KiæThAgVA# Då¢!Í×ä©©�tÃC\4G CÁf&3YÍf5¡Dì·xT+@3ÐÆtè %ÑD@'évT© 3(¾ë¢6\w è\àJS.+g©2vYÇ�(ÏP#Nù�'ÝÜ®yêJX ¿b]�n;JÄZ+¦tÌ$å$® ÏS¤¡DI+öa¨:·l�N"JøCå.½O$i¡¥'e88º7Yä0Ñ9§ýs®}\]+)Ã8ÝO¾¨ {nÕ?J¨![yÑGöÖQnb;§Î®o-?7ë|0r~åÜÏK<Á¸ r{vØb¤¯Ç"}Ã5PhKkÔÈãUmÎ2ÚÁªÍL´«M. Õ5YëÞ6ÁjSðcÊ&�!%ô"
7Ô<ÔòP Í2
7æ¡lîÌy()óP¨<ºeʦ¤Æ<h·ÈC¡ y(²\_æ¡PÇ<ÍJ/òP(HcÊfmy(1%y(ÌóP õ2%%C <Ü2
<桤ÕEJÚòPèxXæ¡d(C ´Zæ¡ 3æ¡ ¿¼ÌC¡$y(LJZæ¡PbÇ<h³ÌCî y(Ñ!%Ú7ä¡¶^ç8wæ^áïþ¬ðcµpS (c ÙS o)Pè1\ <¤@[Äë¶:&^ñVXæ?EHCþSøùOËÌü"ÿiÍòV²ýsþ³µ±H¼ÞmÃcÕò¨Á"jyaN Û!\ô%8S ÒÑ!ÚX$^ï°Õûø�Çã®HÔb+çjÿóüõ5 ×ýê½í©àÜ{¼®8dLK°A~.rÄg¼´4ú9竲«5a@
,8Ò8êø1yKXixCÁÁÊ¢$Èjge4 vÖð2\ìfÖXZÁÊ¢@ÑÍÊäDÇle /ÇÛìL7+kx?θffAZ¹S]Í,h%1éng ¦{³³¨aJ·E Çw¡5¼L× -Jäv\_3´àáe -J´Ü#©Vºólie¬\wKkxI§Up
E¤·Ø á#3ZL@¹!P LÕÙЧ$Ý -èHWy6´î´/<¡
i0´ }i¥ZSï4C ©Lk3´¨eh´dxfC+).¶÷£Zf¡'Ù{ª¡Åà½Ðfi×{´¼Wî{åþ¥+·$Y8uÙ NT÷×\ ÃÌX&³Ðáa,Et2³ C]t¡�ºu%Çr÷ÁÌ$? 9Ô3Å©\hNVX çLØv4³jh´f0·n¢÷#´[lDåf8zº,^sEt³À9Ãë8Ã9)Ïx´çÖ-ÔñÞ}³,
ÆKt> X±>"»saElsé§Ýg"ïûÜ\_Ca�¨?îMn¶ßOk!É6X9'n¹$ú-¬Iú�zË»o#t"'ä|µß}Áws«W»àÐ
mÙé¤úçÖëç£×!îÁk /ÆÑ<84'ÛöqòsÎAñàél9X¹ÜO¸Ú1QgËöÙÒ:ËtY¹ø~SxWvpNxß0³äøU;}¿SWÏ~Y¯hkýäµÐ-;-AþæØñ
7í¦g}ÊOq]³m®?@[MÊc\ ~½¼ìvIÏ×&~ KRÑÉÍÉ÷¼¶]p.WÒ~Jùfy¹ÛÊé£ã¶¯ÙYeõ]¥½|hA6ѧWmÛ"y�m£ÁôéqöÌÀ´ìùÙùë©aYÝ0µ·¹ÃëÎêõ×1OÐ$»ÛÄï{@JÎÅõí¶mG5)[OßuÝ7_r}J!¬¶$rýÏÙßíS\ÄÆM¶¯ð·IJû£oNòÌ+Æäæ3pg·m½äñ íöMÔÙã7#ü§å§}:y¯ö-/Ó¦èÍXÑÁ!ÖõX½³ü|c½µ{òóa¾¯6j÷Þ>Ëȳ¦ÿ>ÊE¶¶ã'Pß»P¬q~øxæ/K|S/\tpi§ç;ºÔÞe]¼Ï÷6¸>±w¥A÷êÌ7\ÐÆÙoT4h!ì%uA¹Xñð?6SötáÛ6b#÷}æMÿFÇuÞ-¿h¡U?FjîÄE9µgàøÛ76zî¾s'>kqÛÈ=(©ø¢~ ¤Ä[H¡¬;-2£üÖ¦ÈãìPGyÀÅÔJ«ÛÈqÃq£wçab\{´¾Ný)óÙ¡H(uÙ+æ y 6uÇUÖ¬aèѵ½aQ>üßó ù¶;\�5Ëô@s«8EÛ"ÁsÖ�º'ý í§¬]}»µ æv°ÌÆuzñs¼ñô ¹ Û8\»© /äö¤MÔÔX£�}ÚOwÒÕ7F>§\¾W¿u0ÍÐqCÏna�Pô u;MòÞßUçëfè\_+ׯ·/7ê²R6 \_2¼týKæBÌ\_2òò,\_2²}º¼rÉÒ$?êøÞfu [ªá:èý�äXÙ@JÅ9\ºWÑ\zr�º![ïTº%ÛØ<.ïÔ6ÅxãuP©G{º'gzÀvywî�¯Ë®ãD#ÿ°ÿ4ÛÜA=>þ´R¿rªÊ1ËóÊC¯ÃÕÈ\5>{\_\\rä�®çß·èßiÍ!ÖëåÒÎÿVïWT¼U©êÑîS7¸>Ü~ÔÏËxFn}ñ={%ÿ
óÖ" \F¡\_íOîö>L}·g2ýrWæïOf PIEó ^óc+ù¨Jpû?òkfRîþÏpç§6· É>Zoem6]¸:ªQCÏç�Çx{xZþå«rïÄ;ûG[¼oÆy{×ýßñíWïÖWÿþ¶Ó endstream endobj 41 0 obj <>stream hÞLM 0
¯2°I&iÚtãÏF RÝH颴A JLEooQB^xóæ1 9 D È)Hô@A9åT,ËÓÐQÊç3 ߢ5D³3#áIÿtÇþª«ñ:ÚÃí4YëÇÐéUyÚyw´ý½1jÈæé´ékg' áiÈv2FÉH>\Ú~0çãë¦#ºlõ&4Æ¥_"QJ¥? ¤à Ãì[ç´5Þþ\_ì-À�+,P5 endstream endobj 42 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageB]>>/Rotate 0/Type/Page>> endobj 43 0 obj <>stream H´WYoݸîóýz«4°hîÓId¶.0À¹À<ÄEáØqÆ[¼4É¿ïYHÒ¥¯íNòàk-yï|ç;»¿5?ÿüÅ«½\_Õë\_áçÕz¥)¬k$üS¶ù´ÚýÛÙ|¸Yí®Õ¿e£¤.4ë÷24²BÛf}¼zÛîu½kO;ÓHeðú}×Ûö~/àñm×+zg]oÜÈk>Ãûô"/»?üî¦û×ú«×ëÕç sÑ>©G06~!è6½¶"x)¥5áFx9ØÆZ ×ãЯ^í¯voÔj÷ïø³ÿks{}÷~µûê·\_à~oõ§Õëýæè¹Ïz®Æ ìØxïòìùË#ô¶Ó·mÿÛõ|qÛÓ~?GÓzr÷RÅ^Þ á.ínýÇ{~p9ßà©=ëЬÏWÃËã÷o1¢ Ç$ÀÕÅ8Y[ \Æ®U|qÊaÖ|Kï1Fó×éjï ;FíUgd{Ý)0©7í;z÷2s\_Éö \æ=?3ÚÕh×^vÚÓ§´ëyÇBüMQÑÇOM(²~´x IuyòòM×{°Ã
h¯ÁàÄ£ût ï/ð/nÉD V8ö5À·ÎÆ{ è>¼ëkóïÎÈ^´íU³Ö+/üH:ÆL¡í¦°ÝǼ~ÅÞì'ì£Ò3f%å68lpb@jßx5/Ƨ#¶¢ ^Ýx9 §6ø6½,÷Xæ°TëíóÚ÷àÔ aá3>Uü¸+ôS-ÝÖPµ#1$û¸]Ú£4ÁnW=S
kmÍ7+tø$éê¦ Ï䲬c2Êa£Y |:¶®îÛö ¸ît}�þøuqmï3ÌL1ürýf O\µpê,¢Ãü5M®2åÚ#0QeÑÊ["n|¢¹w¸¾Óªãª¹JÍjd½Ïá¤!´Yez8æh ¢=c¾½ª[JÕÃ;=@=òtG='hFèRAÞhP®t/üö~Ïà·wNHÕX+|Ó ¼jø7Þô8Rã³ÊLz ÁaLÚ:ÝJØëdUg pÀ7Î, κ7Äß·'xCÉMªGº<¶aC©:XÙÀLØ Ö0¢0©åFoÆ&R &mÀÒ.Þåæ3tÆuAéäN¤^à\´�ß,�Ñ'±uõ@{�¤õ^dUêèNçO¡5\ù; oA¥Ú©(t;UÙ¾¤w©I§4, å) y6´ûx}\_à~z fíVcÅùwó¯3ØñRÐÞf{òBCi¦
3ºXOïdí¼¢<õü#=>kÐÞH-ì,\_Ë0\³b§£¸Ûk¸ÿ2FYúйʥA©EßLPÞ©³S8¯ójö+·8÷!åO/ÉäO©nqYN=cñMßTÊpòr!n@á²{ÜDØmé4#ÖÍ8ã+NQªyÛ'¶cêy½/ pfQJ¹Ê:>,;kLüÔÌ¡\'³T ÆC'|ZU±ÿ±;ÎÒ(eƹÊX\ò%X#ùïîì^bªH£ñØØlHzV®í¨ù\mf ÿ2õE¦ kr-îðö\Ñ= Øú§J>BY]y«\óu}hücTÙ"÷× O.m5/mJÄe$^ã~0msµ;3C)¾zÖÆ;èñóHKHLÏÄ2P(
b{ÿtÇs¦¶(GûQ^à eQûIBë¥AB·çô{¿ TµÞ>lP ÿƣǵG|pVy�GI4Ø!I[§[ {¬Hg:öÁIl3Xõ ùF£Õ)Û7T0PLWKaäðJAÄå ³=°Uî±Äãbºº×·Üwüs}·¼åtkZÍÌ4)ñ%@%i4úzoÕî# "¿R³q¾@³p
tµyY[Ml¢ä¼æmÀE£hü¬,ç@¹Üt ãÌl}ëÑmû(YC½4¼ÍHíVN7ð#4áN5wì©SB81¤rñförEîMÈé¦#i±¸As25¤ Ó.%¬k¨úë1uÃ2»úG »ìº6n)µQF1Oð˳ÜaÈ)=Íe~ÈåK²²9ë£ éOÁ4ß}8ðIØù�³3JæM+Ps!ÖBδP]Ó!'¡Ò }Äh¿',GÇ.±²)ÕÓúS¨?or¶E1¶»£9©GQ!F©sïfRoÉx@A¿Jñ=%X$¾ûq×%z.Ï£t(®7jbÏóC!Ò\_ãIí3OZÑÒx,iÆyG(ÉedgQGØVØìRE?#rT.Zá)|©Î,ðÏyB8®Ê==Á êj 2ë㤠gÃZ|ùµ&0éýóÚÇØ~£}uØË jkØäEý|/þG|µã ÃPæ"(MÒ|Z±ÈÄÆØ ½=¶[ÒRBÄR5©\'þ<¿§pêÈ\¦á®:U~Í@§]Ì ý±¤ääï´¿Èè =l8ÐëráìWú§è¾ >© %H&-êd5ø±¥ê zPS!,meÀlÒrÇ4 °P ì÷+dåµgùKðáüq^Y^¶°ö;¶b{Ï)O+þ©¸6kýÅy£E o0-\GÿÝØío1{Ó/å¿Û÷Èð¿Ù+£¼±UÊÔ.SÞ0¥êãÞúQBàÈ£Ì該ثäN7ûV
/�Ôa#! endstream endobj 44 0 obj <>/Rotate 0/Type/Page>> endobj 45 0 obj <>stream xÅ\ëoÜÆïçKÿû#£wgß Z NRT RÔ�}|%[q#Y-Çõß}qHw¤|º&sw.gç=¿ún-Z kAÿç׫góëË÷+?jéº >¨õ÷¿ÿ¼º[ùVÑ?qþùüzýü·�k)Ú|X¾^Åû×rl¬Ô-èõéõêh¶RhÍæïÍZBÚÍ«f«Z«Û¯¡Üæ¬QxÝHؼk¶¢
´Ôø+~6Á{ðuíU£Z÷¸3mÐasQ/¿©¿h¶¦xFÍÊ~6ÒùÍÛºÁ=RM;Íö¤\á]6´ÒH¾Á]Ýà;Vw×è¶7´T�öü÷ÍÖ¶Öÿ>ýóê»ÓÕÈ<þ¾~%(©¢ D\PF!SÖÖ£ü>6[½ù ÇÑÄÏiVåV!iñÚ6Á àmYuÖÐ9ðÃ-·tË/ʸ'}Ç J+¾}<+¬tdcPjHõéÒyÛ¿kG®Y{äôVmÎé)÷ äúV¡U¶lp·¼¦GGÕ" éíbÝç(¼ó4¢ô&Ö» ¥?ÇÙÖúòÿ¢¨G© ¯§2k!E°/[ë6Øþ!GÉÄuºù ¥9J¦i]åYÊ¡üæÇ&@ öHî¨ÿ²!æ#é>
¿ý]n>äã89í9®ÐÃ#=yIöîIhQÖÓΨH y[T´[wo}àWdÚ¸Uató³¨uÄ5ð¶UPØ4¼E7ÇU;ßå¥níÉë³m 9zQ÷6®ë=RpMNÇ»É ø)+ÓCe1Yߣzà@"k:åþ¤?Ý4(±äLP0ËaDÙÃm÷LÛWIß1ZÛóùצ·D{9k)pºvmèÇë¹ÔO꺤ttíÈ;KÔûm0r¢ò¸EpBö)'µÈªêV(©'¼ÞåIоE¢èƯ'² ð 'c<8 1ãJRjK>ëéD .tkÒaesr{Oék^D©í=.LK´tÇ03%D¥(Í~ °ÇµEÐ~¦1>F|;c¢n=×ý²of÷'îz0¸HUåÉ^?^ÀKXr0áÊ}Aë)f(ÅòèJ¦Ð#:8IE:.íwÒ°P=deetTiT#³¬Ëdæ»Ä@GìX6¥b5XBRãפ\%¯¡T/:å)g¼DzÙÏ\òø[LêîSvûD©¶Ñc/Ñ@:Ôzi63òº:ì7[ JWê°ÊÒGBz¦¬æz9êä¬3² ct%4Eaì8-% ¢Q@×Iè�z#3å.:(bGè¥71òOæ@ <ÃÐBtv±¬ÝѱúIe<§Bü>$Ò¥¢]:Pú0êÒ3bzhÜ^!Ù5\ÐÞ�@ÙCµ~SÊ|.zU! uþÛ ü°cZ+6ð1¡qAtöY"Zúð\_FÎRð¥g%Ú¦xYÿ�}Òaa4ýºÈ´ëFôÌ«L?=®or ¾HÇàÀè~¼h©$EÃe(1tÍVÔWjE»}µ¼&v.0a.) :k-ÉH9'êl!-C2oª8µ³Äè{þÐ,�!S·zå aÔË2 ³ÑÍ[Ðoeëþã=5»¬Ì¢s ·RO2¼îSsÓb¹W;- "PÏOàj
ÜF×ßî)CBßP+Ê[À"
$´j¢@Ó�½lK5Z"¥êsÛ-:kÐ~DÛ¨ ÁD¤Ï^£¢Ö¥Wì1öÞu»ÞuK?ðĽ¤ùL^ëÅ7t&3øJõS¶Ò4ê5ã\
ã{ðk´L8ª@×r£+¼+2o-�hAÍu¢´´ëº$3àà^§c(<=Ñçh±ã.mgü)Ïý:rÏkäÄÍ3nºÍÛsW½Z÷cX«QtÜMÔD/¸ÅòSÖ¼Ê$P{gSI#CGatGLÔ®f9 ºB+ÚUÚÛã¤c&VZ°T,¹êáüÃK»èð\ÃÅûë.Y¶Xz§;�ÙÀtHѯËá/ëªaÌíªE®dÅ ±,ݱÃ5p´xqúÛIL}$.#LÁt×^×øy-¤N¼
àËNw8ð±ÆfÛ4©#)·µûú6{KÞ¬»ºs ¾³û Óã9ݤ9PnØÝ9ünÏûdsT·ôÒà¿
F;¥>Kí@-¬µ%Ì? , XrÇÿWìð½ñ²�ïZ8£1yºy0Ä;FÐ'mÕQ\± ð~¦D ý÷K¥\_TîeÒÜWdˤ9¹%¶\J³s>U¤n^(ÒÛ?dÆUl ¬9ªDÁ
¦Å6:-ÔÍ3.×:Ìo ¨ý£¤Í[ð5êÒÏ0YL,NÿSe[Û/6öµÁiu4ïAm+¯HvÒ·
ù©§éqb§ãèO:\ÕOb)sYn;%'uDg': 3EwT¹uYÔ.¹Õ£\_(?¦,2£&f^pÙÉy¹Ï È;ª�ÁÆnø2 >¯ï5wön)h?ØÔÖ0nY¹¾î}»Êß0Ú5é&xÙ RZ¶VôåõA ò¶ñëÕïc¼J_Æk(¼k÷5=ò|õúpRäVÔiã)³àÊ DÑ]ËÞmîÕLÓdÜ«3ùÒ+àx µãÅ[Ù/ºê¹\¶q¬¬ÄÖAÝ6Eû$iT] ¢Q¡iÄ��£U\_f¤+ÕFis^UîÖ3åj·bÃyrZ\_g¦é¹¹¦3RòÙ3ÆHá:l¾¡g÷êϱOá@>ÿ øÎå®<| ,
<^nþ ¬³JÇY
lÇF8¦Ýð#%ÙJoå±rbÒSX¢ór:K Ç®.ïkëµIµù}ÇÑA'¨¹ ~<Û:¸r jà©Ì<Ûðº:¬sÚCÏ3lÆ>cèÑG|\÷8ôis_Á´ûaÊ»O^sò1½g!b¯©PkQÀòtÉV=Jyù 0»>ãbW<
kIlõÝ ³#eãðæWlªe~R²�úxç,by·mïË[Í :®\_,dïÛ0@¤}èúÊ»Ó1UN21�¤k&8ÿ9§Û÷bU7uߢé~^ðåðo&îpsK$¾k×c/Bö\À ÷ëüs¦±ï·°¨úïíÐ ?Ó¼"UÌBU}-Ä^Iä»¶êõ^ñqÿFGNÍjæÕÖs}Ñku3gR} °äõ¡îG
aßèñ=<5U)ìïë)nÅd¬]°ºIݶ0K~¾²ëuÕ[õZ¥üP$õÓúRÌ4æub: lßÞ}Ð+Jz^'ÝÏÙúTÝá"qöõx¨a¹¸Zµ,ßò[À?ÔY»ÎL«}ÔèÝë³õÁû¨c.Z³ÑY~· ÍÉñ|MÃпV~Ùn zßJqR¾ÌåOîïfÎêÎ+McG%y¤Ê4¶k7ýèvçΩ0+H§ ÅôJ q²;Þ89ñ<÷ýÝ¿°-¥Íð uýðÝtRkFìÌ} Ûj\eeÞ7GBZ}35\_üG\_l/Ò§wC}9åŤ¸ Ö=öx8kqqÊD8çÖ";Lì±�Ƽ$ô¶zµWµ;;¬»Ðîs¿XZUy3ï ii¼ævaéË;@Lå°J°JT££ý];ÆÄyÃ4>(ë\_$ãʧJÖÕÿ�i~ endstream endobj 46 0 obj <>stream hÞ226V0P°±Ñ²P027²ìì� �,Ë3 endstream endobj 47 0 obj <>/Font<>/ProcSet[/PDF/Text/ImageB]>>/Rotate 0/StructParents 36/Type/Page>> endobj 48 0 obj <>stream HÄWioÜÈÝÏüü¶dböôMÒ»6IÆZlxáY,)HtÙr$Y-ùø÷[U}°Éé9tlbÀ#ÝÅêWU¯^ÍÞ?ÿ<{µ½»Sòòùóí²xñ ~¶æÅlx';Qr¦ ¬åLèò¬ýòï?³¹ø7/g½éËù»B¶L÷¢l
aB¨r~\ìU;ucªµªö¹Px}R7ºúD¿áñMÝzçu£LçÖ\ÃÃÛð".»ÿ¸ïsý¯ùß×=oÏÈ!AqrHË\6J³ÖyT½®çÿ-:&lÙpzp·Ñ ÖÃ?ø«T}[Î/ !53°)ÖiwªoÞ'¥ºê;®àÿAmàÒÃUÖÅ)iÝÚ[|üÃwðÎeðR#Êv£á÷î!ëøWà°ÁöÕ!.þàÒH÷
Cü¡Û°å
§SÊ;AÁøPU¯Ý[Ü0Çx! öè3í8S½Kqø.¹CJæ'hú)wøäÌ6~k#$ëÛïÀ ß: ÐÓ#èü£eøäóÿ7·ÙúÓS¸ÚÁ¡¯xªÓðþ¨V-Þ¡¼ %9ª´ûûb ¯ Ù? |@´\M'Ï£ÒìÀÀ Pç2Íóõ²lz&)?«bJã".¬
EØ]G«Þ
UiÉXf]èªý\gÊ¿¿Ím¯ök\'Á¬.?Ç9K6µób^\'
¾\Ëá¥G ðO yfÚRªY7ª´Ú2ÅáºkË£bk·ý^böv\_7nOÙÖm¸ßÝ)~(^ì¿ÉM¼&£]i جôø[îäþ3!WV²n>¢íiJ¤4E·Xxèrë Oöµ6ú°WqÈ+-Ý!{5Rù#î
TÊÕà5VåmÈæsW"7D¹±&ÒĤEHÕÕ@jz3";\_Ê�Õÿ7÷»FXéÙiÁr4x³ÐXñl }h98¢ªÝÀÉ?Ìr{ê#Á>R'aí.G%Ç%±ÍöagèZ·±]ø% gÑ6²#":ÃDñ~{ñ×{ûZË~Møv¾N,7u)÷vÛÁ�øzY8úUe±8}GúÑYOË4³C£!¯B? ;llÃIϦVz¬o"îÏr
Öx°;ø Xá7ÕÅ1¦ÉH6Ä.òd(îÓpDÚzºÐF1.q ðyBÌ"¬EÆIö¤/2=b¹þM8³
nP)dQn]ÅÄÿc8ÏU]̪-Xî253U¤vÆÐ¯+´Ø:<¾lRØèkÇng¬¡ãDK�i¡ï<"îé]KP <K äÉ3,'¹yÊ%£n£°Lh}'9}³ xîD¨Ò1PúîFúiùe Ò´ÿ=ßÁï ñ:0ô±CÓaûáQþ.k,Q4!_cá�T{R£Ú»s.û4]ÙÛrkÜÅ×ë«ìæM»÷Ïû¸lægd]Ôn(£<çê ää2eÑèMÔFhGzO(A½{aæ«RãEÛw$÷¸íWDNêyøbAþÁ7 SLzÊCÏÌÜ3¥²/µq6¨~1Ùðæ0ÕóUÙò!®Ktu[9cRÄv¹¾ýà0_j%ÃA]ä[Hèà«�Ũµº!ÞóòÜJ[ûåsW¸CÖm¡×hg÷ïñeÅj¡a8>íûHåB,¶0Á7 ¡cKï Sø6B(LzÌEÊ?÷iÖø~4A|çCÊ£BæRÕOÙ×tÒ¡^ µ
+¬ÓQúûõ¹Æ´Lw£¢Íɦ08ûGy-!cç ìç§avóÕy«.Ö+]$#lZ·n©³åëùÆL½,=é°Ô=öã8n»F2Kwcb!¿aN$F G¾GûNI:üÞ|IA9¸.§/ó0îRäÅê1¸ ìs}wy-½»]Å]®@ýu:ÀðMô'ð7b·ø®+V¤ºCqÄ6?þh²Kñ\_Å>�ËÒØõ ùxȦNðSÎFJºFr&<¥ººÇrÁY<ÑÞ¶ïB¢Úâ'¢íñ©©Ùêò2ßdJÇÆ;¿dQ@Üþñuò½,)ë6
H©16n¼¨xöcØr<ÈEÏé¶È{Pêݯòt+Ñ M4´Ì µTÐÞH|j;§ÔÄ%LIø[J¸?0dR'À,a$½Ô© 0ó± ú$;ÈsÉúµn4d;qfËWd$àúú7Pã}È?©Ï¦4¿RQVûµÓ"½ø²h(Í-tP
lVñ[Jt·9¼9 S)ÆÅ9fC(Ï àf à� kä
+?R]çªS08(~A1@£xKÀu§ã|õÅ )d«SÞÚXànä®[Å4:$&a¼CÎv
iqÑÚ!Oa\#aõCÞvÝ´Ý1OëCvÀH¶4 «Y\[HÕÞ¥ª´4áù/Iè¡ÀqÉ1uRòís(]Éù°Ã IÙ=HêÈ>¥#»x¡ªçùLLÆDà4"7ExÖÑå>» rìgÆE=5±YÜò>Îþ縨·Ï
JMpã[·zVÚàpùuÝ'|ÁCÙ¬ûj:¤rÈ¢ <ÞùUßQz):R >Ó3S\³Òy³>l òKB·qÎ0CGq±8ÿýßrûå|ª�_@¶.oh 8gNQ#« @D0'ÀdÐãÚfw"Æ©@}ý¥6ÚçãFF|ÆÝXß)0Ó@a>Æu1ïÄ\IJ ¼|ëÕîØ ù&YüÄùFÔP;TKlpþdZE&åaóBõHÍ?´n®^äB²ÞW(ÍZTÒ¢ÀñJ)eðXuÅ=¤ îFMUÀpÆ-¼�ÍðYU·B<2w&¶æÛ 0jCab¬Îö8¾8aÒÈr{ànFØ(LþV«EþMè|×p¨ÚhõÑÕÐho?»²>ª¡£ »3¬QýÞFLqnxú»5kªÑ÷Î«ßØ}aÇ'wÈà e?ò0Ú&µ{(]ËÍÿaÏ¿ 5Ê×T0.îÓ·¸j ¯^LÀ%Îþ6ÚòxÐ]%IÃ0ìEdÈ üoÐé0á�ÿÇñBo=4µ¬Xa§Óu^nÒ©Øb¥ÇÑV\µ�÷¶h3o2ädJCwÎ}WIÊ\P÷±u¶,è»ìÌ\é¾»9D[rë|ɳÅ}uª~G H0k~g¡]hIù) lxh,¦;¶!ÿ8 ÑÃlpXÉSYb£ÊàoÜw9Òc©êcºIþoçðW3Úu8°½Bro6u(µ¯ë Ø\_\_ö{\öý.¶Ü²æ²\_?a°Î¯��¤u endstream endobj 49 0 obj <>/Rotate 0/Type/Page>> endobj 50 0 obj <>stream x½ZÝsܶÏôñ?mI\_$ÑNj7«I;us36í¤eO$KJ,'ùï³»� ~èîGÉÅ#Å·ß ÜÛFéuÿ§óëÕ³ëËV ^Zë½Sá»ñ7ë/Þ·º[ Áÿ|>¿^?ßY¥õZµw\_o\_¯hþZW×ë^ÙFÛõözõíFWµj½nÜæëªÖn[Õm.ªÚ4õJmn+øæZÓoN+ßÒ﫺m´÷VYx ÏÎ6g<öª2ùHõ®ñÖovüù-þ´ª]Ó\T.^;ÕwLà=p´$+W0«órJ¸c÷b[yÖ,ÙÚjíÄú?Tu×´N[ûÿíßW\_lW¯VmÄøK~:HPÊ Z¯¤ PÖÝ�òbúg¥MoΫèÕàvßkcÄ;ü^§ ò.¼³°£ ñ¸¡°À¿ÇQi%|ùWê7¯áý¦Dk¯t t,ÿT%²×B·¦ñ~� jº'ò8 JÀqÞár&ìø<«eíÛf�í�ÁyH7B?�ql×J7¾ 3²¸.ì7ñÀ ýyhé²c aõ;ÀÝáO¤ñy´ª+ݼ$°÷?V:0D´#ñBÛø.¡eú±à½ ¼aúy Å2Q°8
kÉQ ´1EôórYH×ÈÊò Ü.q&×ü1 : à§´S�¿Ý¡hî³òÛä £Gñ8Ù.Y» · álåB̺#1³u×ð I0t5 �\Y:¡é»ÄÆç £³äjN£þV-QÊcþ·©æÆüubB¨Ã¸Uê7Xdoxð9/Z´MÇÊÒ'N"c·¥r%èÊIÿucÖ¡Ýî÷0ªOe#5xìÉ& ôOÒ xKmZKº¨G× l#»ÆÛÝåE¤C9DèM¡íd¶ À¨'R£diZÑQYÃó 8$5Fbj _¶¿ÿvóÊ·U´Äð4ÍgE Ènµd »O"~5¶Ûo]²tav4 ¾\k¢EJT8)%çFÜE1¸¦gûXöX社Á±¹RBH HÑg&ñ6cѤ§N1bá,«eÜÎÈi<°U»ûÀCNÿ×ãýS0 =¨-Ö"uôí8v[ 6©.²R EB4VmW¥ 1|%59+"m« 5¿'ç¨�"®8X æ
5çYÞ
0þ¦y?gÃÑ硺&U0ú!c±FãZ¢XT\_ChL L5»Ý¢")y"ûi.ïÖÖXª~k»:×øµÕP{ìry)ú>zv»µÕTY�yl§¦Ùbø4=Z°ë0@¡77èôa´}bþu2#]ÔáD×Ĭra-Ì®ÆÀ^>æý.ÖY4·uì±·Ò{ êCçcODoõS35Ô¡{¦ê;7ÓËÆô¨Bc¼hÚR :·^tÐ]zçê;¿uø¸%p·uRï@^¦ÞªxêÁÛ,§µç!µ\ãIÅ7ç¦;¡ÏØ^©Êþë.zó.z7A4sU\_nbZIøeár¹:.b?.6æÏ"R'µwX.çsRg;ê¶ÇÐ2[¬^äÐêÛhYYݹÇ}i»¯34¶1ãNÛiÇÌ·¬Iên©Uæ9ØÐ:±1UöeÇÀ/,ÐqóÌϴߤö6¶µÎ Ñô¶éHpðoëÐ>"¥µ£^Äf3çò|¤6еü y\|ïFOºfi%=v4ðiß]&Jñ<{}¸bÑyΫ.&õ4ºN´=¢££ú>µmnºÌxÕØ¾b§PxkÝnòh1Z§ûXì»táÖDFÅ´Bµ&å¼B»nøØyÅ|Êß[Ìí´ïI×nÑW+¼ïI
µûNí(·Ì÷g%Ç2£:ü³¢ysHõA¹iA9×Iξ±Øëb¡ÔiLbjmê¿ÍlcuXê½c'ößÅvoHéÞSúóÆöZý«ÌØ{د¾îs;ÿ.0L¿DNÃÉO ôøZ>§åÀ>ý²ÿ©å#SX
Sv[tHµÌÙß"¡ëx|¢ -ºÓ4NÑ>àfPu£Èú\1¡Hο!Õue3ùPun>_¸p�ê¬0Zý9×2%GÉt 9wD�6Î.ÞçóÖÿ× ÞZ�v?ô)ߨü(q¶ÈJÍ$/OÅñê\E2ì«rÇ´ZêwÔÜf)wÎ)¼ÀP«I¢:½
JcñòÀäCB±$½P[/TiÑÉÊ3¡åc¤?8¤Æç²ITÅåÿ»@;Q:rGÀyR)uÝa¹=8W Y1~°:XP2I7~2<·�D
¯)U33·\¢¿jÌlÐ÷ ;Û00ºÌ ; ª<¬?(Z#6I {£oÿå 6{ûè{wIûNqùBNxý¸;½¸ã0V«1ÞD Ǭ×ÜØIõõZ¼Ã¤¨\¤EÇZ\å¥\,j OvYÝ9:ö)¥sÅ7±}zb¶^~s:D endstream endobj 51 0 obj <>stream hÞ226Q0P°±Ñ²P027²ìì� �,Þ4 endstream endobj 52 0 obj <>/ExtGState<>/Font<>/Pattern<>/ProcSet[/PDF/Text/ImageB/ImageC]/XObject<>>>/Rotate 0/Type/Page>> endobj 53 0 obj <>stream HÜWYoÉÞçùýHa³ïÙ] ²Ø#k¬;¦(Y×ú÷©ª>¦9K³pàhª§»Î¯¿f?þøóÏ{û/Xwð {ËN2ÁeþIÃ>vó?ÿM°³Ûn¾ÿL mdËÓN+îg^j®gËãîÝd:³©¼RãûÉtf&7ô\ÃòÝt&éû!¾¬¦3mCÚó ï˺í ~xîvúå_ºe÷©¼!íwðÿc<¸ó1FÐÖÙLÇ
h Û�_ákð]v{nþÉnþWìîæþ¤ï½~ôb¿û¡;X°7I¤fVû"ÞQ³Fsg¥Yo+'/é¹çÌZ;áÍbäN²ôÌÄQ§Bàß²°Y Òë² @ ®ua]H¼N»7XÁ¤¤S¨Z¨ÀW\ªÐ?B¼ÿC@Îñq5Uar3ÅéÉFî>GLÛ89Ú²£?wk|Nµ¦Ã 1F\À3Øôäót¦ú]øw~H1SEÉl
$\ % ðØr¿,§ËuGp³@@;Xù0 ØH&Ë(¾ì¤ã"Tè³)Ù¡~34ÕN.ÒÉpCµrc|¿Ê<|ÒíU>¶Ú¾}Bïñ(~(PÌz#FáOiˬµQ(cµÀH£ê6ɲwÕwoÙH%$W&80 O
R[Í6èi GFà+-� $Ïí\_ÚoÃÀ(ð,¸2qÁ8Æà6Õls¤÷ül®á Ê?]P£õ ù×TÛT·æ©þ¥sÊd4<©óò½åoÆ0ÜóÓÈC[1AEÒç÷1?ªóÓQ#ò׳±Ó¶Wî)éãç½Û> ʲhýMªÈG·^²tÊÑ_Æ$T!³êl9¢È#fMP[ RkDðÌF¨ïønÝóAÔúf¡_ð}ì7P7ÜÇáO£Á ÈJS"øË(®E¬ßõ]À] þNùZ BåcÀ=¯ºñcògRì\çwTº±;P-Ç ëÒ#Lè{FöÐG¨u~¨¯¨H|°WB@ÊF¹YùMb½·¨eZÙ¦õ¡ÊGÔÛ¶ü>u³ÃB£]öáÚÇ©VÅ~ìxûãC%²[ª¿ÎDC÷¤CWÔ:Î ²Ý:æ?%D AîÝw4y"4Í�ÄÑõ\_k§×t@È79Cë¿¥ÒFTxÇ'KkZ³nÒ(¯¹çefÁèê¸eßûS$Ö˨,þ©f?¦»äU騶^£ôHË#Ò-E'áѪÀ° ^åñé<-ÖÇÉBVxVGbÎδ¨Úü}ñ¸Gþ>í&ïäEGö§¬¨£e{zÑ"k#®µ- �¿NUEαº0:\_Ök6ÆÆÏMªe%7¿MYyqÑ kÎ(¾êM¬nBÈàLR>Çi³cIH|h>ô[>ÅÃ%ÛÀhë[eõÈpNÙq'KG ð{ïÚy>KÐíÖlºy]>ô9»ÊסÁ:á6^W¨RÚ¦´ ¤O¬uj¸7)^ò1]àðÈ>ù+Þ1éÜQºb¤JYÌù³<[A¯sÖ¢R×ElVªÌq:\_s§fùÅ{Fò»Q1>IMþ¨þ/QhT:Ên\_Wï©ê=(î\Ðüc1úýz^ªÈ:U²¡\_QZiWXÉ~q]£×Ë8É?\N¼bÜ4Eõ<Hû0ª éGGx¢Äx-ÎX%Sm(u1á ѺiTziÆûÅSÝHd6FD=¶mµj«O=JÁ¯©WÞôüÍãO8Ü·ÉÕfªÙpîÿûûV©·£,Ú§§Mö¶ßRÖíV6Õ~F1nzûéxeª¼§®ï�3cdÙàþ~§ôxÊÕ©GÁMgd¸É~Ø $e®Ë=i+hI|±Ü¶÷Ã
é=}ÇWGxÍÀö"vFãÆäær´ÝÀ¥B°ò½6WaN³ãQ¥Õÿjº&�w³U;e²
úñ¡LÅ;%éòw»æfå9ì´ùÁp·kF65jt5Iv¾ÍjÊÌx4NlÕa¶ÍÛL½Ã~Ô·º4o(YÑ&Þ3ÊqªNuÖþæb)¥ø¯UËì¬ßªZ+hè׿ÝDzZÃ+ÌI.jëÆ÷[ÈÈ;ß9-xP)_þà X]ðÅåf;0B<Ý$÷îÑv�ù®{nGè'ølñUJFB[ÎviȾj=²Ã¤öHå6M¬È ,r¸³Ë«¾.4zãÖRÙ¾>¸¦ojeP¦~ñÌtÛ#un¸èú! èyB%6³<-W¿rË ð³K¸¥h¾Ì[rfÖÚYçz;¬µíp« UoJþq¹Ð«dq½´í#C7Ü×S êÐX½½¶vBpKÅ@NF7ÍùOcøÍQ³ûsxÅØ[®úûÊÿî¿É]UýÒ·[Ϲº_Ù:qý$X,»OàAÁ¥¢ÃüL£;¸ó1Få¡�P]d2hn|õ©�Ë!¤dGÝÞ¢¿e²¿ÄÇ»»¹?éæ{¯_�½Øï~èì ÊXF² Ô!´L9¤pó1>Ísß no¹%k¥R¢§ÊBSÆscR+¿¤¼5s0êåÄÕîU´8±H%üOX·1E´r+ÉFLG&¹^wà Yêöúø³wMSúÔY\/z²>!xazϰ?çÆgHCg¿#\Pß5ª @¡&FCÌ®§tËܶÏü9¨4 Ï\¤?\äxÛÀKM¶oRJ©iç!) ÒRoC°2a àu
´<?¥8Ú�ítûtà^Òv@2ó j¡«j Q ]i8 7WV¸¹Sýá®K#ÖêF¦ôVµ2RCvõZ÷t1ª®daðLv¡7ZOuoÙ¼«¼ ¦ÞäLi®Ò"2áÑ8(0ÈQG}ÐAYtû|q)ÙþU÷¦{³C¾¹å-¾Øhð ¡Ä×òq"Eoä+é}Ed¤¯ÀY1¥ü!"éUè>eã±Èõg²Ó+ÃJ'ymXB«f%ë¡Vª7f C´ Á´@é#:Ô¢Ä^àI$ØU 0 ö
ÞÊ rZYB#ÐÅ¡¤Ò
ANIY Éc"ïÓ±á$,ì5X2+ê5+Wàäûˮ׬¾·\ùº4úü÷oö«®·nÜî³~
ïm׿$¶HM»Þ"@X IQì:æ:icÇ[ÿû3$%J?6nÓøáZÈápfxæÐOi8 Ärf±q.¤ÊXv£¯cÞ-ì4ã!'"ÙÇc"ò\Óär¶9gtÕÇÖ!
bbÐcµèú }ñàÑ3\سöà©nÏß³Å# |Øó¡ßAúzçvm|g{λ6$Ñó{©]¹ÊXîcSFüu2·|õb?|ÝA¸2ùù¸ùÉr¶¬ÆVoöMù" »1»Ëørѧ3ö¨ 1ÞuLD(î//àxØ
�0u|;M =®O/,L˱Ëô]-¾£©´UÁ%ÁȪ)Jé7YHÏb Ò´õ¾ c²>û,óóîÓ¾ãéô)eLû¸á)uÊÖÀ)£ìÅø±ø1¾°ëG;6g>ïQê$m_WOM¹OVÒsrôE<+þ7¯ïØÃ&H«a%!Ü H9ÇÒ ]kdY"ò ®+«a%cÞsÈãHÈG|®NY£k«Ófôfhf=¤Ò}³ÄÙ%Ïúø OàYÝEpºoV�w È3Ⱦ}aNå¤cbSDZ³Þ%¶ê{Kò<¨ ¶ÏÌÉÜ9 SÉDã´Vçfb6xÊî{M©àãi©}MÃüáqÞeè×Óä% í¤! þËϸÚ6îÆonåf~VüyËÿÊ�Ó~y¬Ë¢¿oÌAü²k±qL1r±Lîn7~eܸ2òèÊ"¬ñåØé&»¥¡¸Öd×è¥ ¤rÒA;À[ ò¸ûñÇyêT2ØïÙFzryDøþ¿ÎùÜ;çÆW©ñÌøÿkbì-ùKóð¨Ñ9;ï£îï¸WH îÍòúï"´G/ç?BʾÝÍû [emØãÝ_qÜoN¶.ÍáÃÇòðvÏ qs¶UfóAÆfó³Î³Y¾Ä2ëzy|ÍG7ßÀȾA¦¿Ð7H[~4VvôZ¾ýk«º´?ÌwüÛÑ �lSämþ!11ULc©åû%¿?>"æ!ç²Aã/È+
÷Ä?sØù}TÁ<³«6Û®9ø?OÚó^5>øð»ææña+¹ZfHxÛÃþwù>K2\tøák6p\\òqÎå5ö9ãw'å^¼åÄ]oùptÚ8·ë+zHGy¿æFÏ;\_e{©ÊÖ^=ÁÌýb_{cp »)ø«AÉãßJ ´ÀVzÓñ x^"ûb³vn f]rc é_2 UÁ?¬¦¼#èt£5.ÀÜå¾qWÿݪP¡ç'ò7Ù£T \Æ8Þí" (Ûy¹s�¸Á%;ÏxK? ö¸³8:Ç5}¼Mw5eþ¦È¾°}¶ -Ô¢GØ»Å0O¾4§ ÞRKð< hOZãÞ¸ a¯t³Í<©~G0ö êÏ.B>dióeC©3ðbeD~\ r§gTsߵѸ?h]°Øpã#§7¶ído!ô»>b±ÉØPå;2F+Ték T ¨,:«ålìj,Ö¸°,ßá È"¨Ãµè#BÐÓ¹< ü¸° aæ=¿ £J=åe~¸;ºè"ÕË%j½Û94d¸JX>#{\ÍAÊc.¥AsøÕ!N¦§% e<³EH E=ÇlñLQ>µ}:ÀAY)vî̲WOF5H³ã®QÐò6]°±ixöjVÀeb>Õ øsÃîÚ_Z×>i?=ëÚ³¯åòµ\¤\Þ4ÏFÈÁùl§µÑVJ']Hc8gs )ìà´jØ¡Û!Nx¨s±®/¼öõoþÆj×ï@ìȳqz"0÷}àv0/ÎäEge£s6ñ½lÍëÏ7Sû´Å\_± ûÊ]C+Zî áX0>HöоqD éµ¢$4 éñ}-ÑékX ö¦I=Ú\83Iîy·ùµ¼Lý6Þ r=Ô;Ü@ÚùZ¾Ë¦§oáÑï ¥ªø'êeÎôxQTÍ#
¾ýNt §X1Ft[Ý?Lû8ݸþdýø£{wW×÷a¶ÿÄÔM&¬¬.LÓ]
ö}ôÕ/,7ÖAÊúZRh!N0/Ìç< @Û"«@ù,;x]sÐÚñ\×ÕÉtîRùk\]¢ûB9ËÇÇ\½LCåö%Ò5Tª »kèo;Ï¡v1Nܳ $h²û@oMBñÝÀApàÍEgtºL ÀN&a?!~1°K}à2M5u5,¡g5ÞpHDÎÇ¡Ä4KO¾3ñó9ÔÙ^|àòÎùn¨ F<ÿ'õMåÆÜü¤²åòX%7;ÁîoJÇø6uåùªÅNE}~äûÒJgybÜ
HªF¶ûÙϰåØÙ0íúeÙHÞìî,ëí:DLCm5 é©çå0O^JDÃ(ãJrÚžÓÝQMD) #çW5éW3Ö¯Hûc¦ý¼ßÞ¯j¯fÌ\_úDý¹¿IÜ\_ÍÈ¿ªÙ¿ÓUó5�ªV�j.5Ë@ÍEªU¢ èG ¨BÖªä¦CVô£°$ªI ÔB:À'0T!«¹¨4À\T ðÿþÏØ?É¿MäÎýï§¿ÖÍ׺YJ4cðd,r §q\4Þ r/K¼ZáADõf]/ÞÛÒÌiQ ëE-B9ä¦v»O¯yY-2ðàµbñ^VfîÒEVÇU±õfsL^x3}GØg§®×÷54JEwîE¹ÖèV i²ÏJýgQ{³æ¼¤$K~p±õnZUäÏQe¢-t³t=é¨.éÄË(äáp [úcgç$l!·½PÍ_W%I(÷+ùíD5ÆHãZ©j×v ¼Vc�Ü� |/Åþð°9ø±íïùsø¤=ÿøéUsððé#¿k¾i¶Ð+JØ8´½)Ç[õ¼¸O÷r-
ú_sô¡0Èåû,Èîà�³f19aèjõ¼ð7päQ8UNtÚÇ6úþ~Íw"î üvÑ7}k·hÊÍïù}Þ«ÓÕÒ2ß'©kµå-eós騬K±üG�)Àr endstream endobj 54 0 obj <>stream ÿØÿî�Adobe�d�����ÿÛ�C� $, !$4.763.22:ASF:=N>22HbINVX]^]8EfmeZlS[]YÿÀ�þXC"�M�Y�K"�ÿÄ����������� ÿÄ�µ���}�!1AQa"q2¡#B±ÁRÑð$3br %&'()\456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáãäåæçèéêñòóôõö÷øùúÿÚ�C�M�Y�K��?�ój(¢¼Ú¼Ú¼Ú(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢)UYÛ @3@äàP9Sôv£¼ó(7C76¦öúê=:Ç8Y¥RLÑrÕ³¢øoBÔo|¸uo)a[ñÛsp++JÒVê¼½Ziñ0Wn»PwoåÞ´ Önt³ðÍÙrp (i=Ùýhê1è³êÑè å©GXÐÃ&äWlgå=yÀ,8¬OW6F}3HO±Ú£äu9r2Íéì8®-%ôÅP%XG#»
Î6óÏAèð¢iñÇû¥k¦PÏ3r�?Ýöÿ�&±tníä¾¾¸zl,æ#,í×bíü«NÛ]»7 eáK²ÝI4¾ìÄp=µµK} çXB0^Úyn±#A&èÒFÆr¯l°ëXz¾²t÷¹ÒtTû¤nÑÉ"Ë9³ú{9òÖ[]]-fÕü¶x
Q"m1ÉÐtë\Emø÷º½îpa´1©ÿ�jBùXO,µ«Ä',Ã8syúW/ñÖÚÏW·SéX(<Ü»·úÒkMm-'Öü¶xVÅTJ
A'ÍaíÓyýoøk÷zÕÿ�x,Ìj}B~ÖQEbWEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQERYPI<�;ÒVÏ
,Eÿ�-cbB!óX
ç¯×5¥»]]ÃnzW?RÚ[µÕÜ6é÷¥pñ4Rªª bp�ïI[¾ Ó¥kHHÏä¿\T0ø{Xý^tyÇ1ÏãUo¬.´ëä ³¿OZìõ++ÝFWþÍÔoã»LÓîæ+.=Pçæ»{jÇVíÖêpÐ]½û-ÔÞºÐ-a]¾eÄlNVû9ÌzW[7 òHæQ/bà??ç¥Au¹þæw×4eyüj¡§^i ëy va×Ü}+½Õ,ïõ¤f§¨EwKi·¨sóó\_½µÝa¬[ÿ�h[©ÃÛ^æ'û¬y¹Ú+¤mÃVô³w²º$ÿ�·F¬ iìçhnbxe^¨ãV-æqg38YPåñõöë\Ρ¥ÝéÏRpySøÿ�Jåh®¥ô ?Xü=tV|dØ]°Y?à Ñ«»´¸²¸h.¡xe^¨ëQQEV©Ô4QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE\Ó4ËRvÕ7I#©ú±ì+Pÿ�aéëC®rê~ÛiòÜF%bÁyôOà+OJÐoµSºÞ=°çWáúÿ�
Uí+I»Õî V0t9Ú¯«µöxηx=~Ku?Í¿"4³�$×Maáç°´:g4¨ê¬ÕNç=A|}ÕýM^ѵ[ã q¢ÞHGúZ'0Iåõ©ôø/ît£ë:æY?ÓÈ|·vîsß+GÐK¬8¸r¤¡Uù¨<^@w®£Gð|·q¾¥\ÈG!@ù3Û=Ïùë\ìhò:¤jÎìpFI®«Oð̺uÕµæDÿ�UdK9õu~¼ç£¡k:uÌÛiÖ£B¾ÿ�Ç'0Iåõè\Þo¨Ýé ¨\éZt²fõß÷;±<÷äb±U$Ö7jÚåÃ[éèvF±¯-ÿ�L^^d²»iÖ±Zéñ76ã(õvêOò«Úª.¦-¬õ¹Îª@¥c}NAÊôϨ±Fðö§4Z®³cô9+)î3Eii,% ²\÷,2Ì}ûíßÞ»ûKhDM½²àá;þÏcõþUÎ\I«øåôØÏƼ¶?åKÓ× ©ñ¶¶ãL´ÓN
¹·Q0õvê[ßµhë1®®-lµÙΫ@¥c}pNCezg×¥[£xoU-\_M[д{¡ÏFSøuµm¦¯ü$Öͤ>$ren±mÐÞ¼W6a-ì
ñuh6ãiÙ¨íu+»K[h'dåvÊ£ }¦×:eõñc×ÃûÆcëÁ4Osö¡HÆà¬ÌLã?¸2ÉÇÊGRã?+£µÓ¼MiZL×T=ÓLzÅ´dB;z×"¯§Ëa%ÃL/ÚEk} l wáQZj¶VV¶ó²At»eAÑô©,ô¶ºÒoïÌ«vÞ3^õrÜ1¸úÁ
s:þ.©½Ìí§Ô÷¬¹cxdhåFE8ea¸¦×Q¯^~Ê[»keHtÿ�.7¸óq0l
,G§ÿ�^¹z(¢©Y´QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEWgàÛF¶ÓouP¾pò!'©çæ#ô®RÆÎ[ûØm\É+ÞõéfÃcÅ{Iõ©úë[»~òì~æð 1ÀdþUÔx#M7^Èo÷}Øè?¢º½ Jð«H=Ú;bz¶OÎGáü«Ó¬fÔµ,í×t³8Uö÷>Ãv²[jZõ¾2é,$Îêz
ýIýM3ÊkE:BxþáI!÷²ÃµÌ]§qk6ã8V]äCýèøô©'§{ �0ª:(ì)ðF<ùÉò°uvôZÕ¶ÔÍ[xBÉn«y QÔr1è8Ç5Þxm´s!ö<ô9QßµiG}oÅåµ$C(ò¯¡ì·I1ìrkÖ5IukÏ:EÄd0¯ÝE{DÓíb·:ƪì¶Q>ØBCÜH9Ú§°dÿ�Zäî<>d6qöäå¡ÆË±êñêÖ{ªFÖZ
ö¥¤CæVöã¦|ÃÓèk~çȽOqáNc¹¶;eÓük3^½ÓÞUÒuk44·VÊL»ÇüGç9ëZzUZò}ÛË÷«ÃÀ«gÿ�fNX5Ë=èWæw>zãæQ$Ú%ÇÛÒ#.aǪNqVtûÝZ&±ÔlFgù¤omïæCéUÿ�á,QÔ Ú¥
÷f»2Rh=9þ1õ÷OjlG£j÷&X<·vÈZCÈ/ñ»yëÖ²îtï Û]°:¼óDFaqCê[¡Ú¨ê Å´&îÕÒúè¸?ÞTýi÷¾¾´CÇ0On¥ÿ�Àû»a~»Ýjë ÇF·¶O?êü
öÆMIqá;´h ·h%Ñäãêoʳï|¥]@RÑ ¹!-ùJÉ»Òü+kxàëWÄÀ
XaÜPúè@öëYÚn-7r&¡§u0r�ÿ�huSõ§ßø^þÞfP¶¸æ u%\Cê li:CèB{] 5½²yùÕù øs\ÍÕk¾óg{½Rh5ÛFs$jÃ9ÛÝ~ÇJå\H 8 ö®QÓî4ëáÁ 6>VÇpkε:çM¹hnc\A 6>V÷¸º+²ñ/ɼëCTEc9%a
î¿O¥qÌ ±VpAíIEUJ©IEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQES£åR4gv8 £$¥o 2ÏEK£Kvã1Ø#m zB>ïÓX´²è±L$i÷å~~§×ØsWtÍ\ïUʵ8ûÎxUú(§EÍ"Ç41ª}
tK¥Yh0µôiïf-=iûÒ0û¿AÍsõ³£øjÿ�U \§kg
üñ~µ¢:^Ê.bðÕ[F~kde1ß,pOµ\_ÔÖxonu¯µ½æ«}·#|@1»?
oi~]Ï#O6Ƭ¯v%ãè?]>àv öéX(HsÏÔóï\Ýnè~Ôu²}Ðn%áq×å[ðߺ_N·pøZÁ-b9{de1ÔåJÕÕx5 t^=î £V ,òzcw\U û8ﬢÓü?}eö5å¡2ìyvÝû³¡êÄÞj�ö(Û ÿ�¦;û Ïðy"ÓWhlÜ'ýáPjæÔodP\y®ÌÀqËukÛKhÙ. ¹ùåÙÈö¯FI·U D@�Ç8ÅeêZ|wöQi¾Ô, à¼&]O'«d ÞÃ¥e;KðúçX&÷Q?°Þcä\FÄZR úûÖn¦mRþUAç;3qËMohÚ
Þ³ªE§\-¾ù3[Z¯¬dzã'½n ^RMVE¿¹@Aô{:(QÃù}kÁ1Æ¡x¤«$kرÿ�®¡J^eYV;eYxB;kò#7jnPÿ�t®H ;g à9㫪$j¨q0=zäþÑhZ
A¥ª%®ûÖ¶iå« ÉÎ�É=êm[UÅÀ¾=[QNÜôKª}GlSaÄÁO1ÈÏÝ÷µ4ínßW×Õn¬ä?|Ù÷Hè½8¥Ô-&ÑUtÝp=þ)Ûor¼¼ô\{B:zW§Ü}ã ÷õèº;iøv÷Oy1:óòYÕXcèkÊÓC'íÖêw#uµÌ3Î;qÓ¨È<Ö~§¬Kvé V¶qc·aA=É<îjÄDÏàëóÍI{:þj+¤¼Ì/åGòÄÊÇ¡=HÏmCff-"62IÇN¸è rÓXÙø}ûBÊ=ZÊèoµºrã·^EfjºÜº1[G 6PÑÛ0 ÿ�x¬}Í^Üøá{Ú^¤¿ðB?®v½C8ôM>îÙ'RÉ&?Ôõ?Q¿{i¦Ãväiv²I'ï¤\äJÉðLÒ¶y (®ñ̬�à0ÁÇå[±E¸$vò+ £ê}G"HWdãc«<9Ep6ËcÛ õ¬ FÚ¼g%ØÄà63Ïzé¤û6Ã@×täHgMðÊ�áSþòkcÅ:¤jæ84+åòÉ0, 7?/=·
¦¿ ßA¦ZÅuuÊ mêCùG^9©4ý8Ý%¾-î9þì±2 ÉÃÁP?!YÒZiS)It¾±?jXèútWöÐÍg$ òÎXËåùA Üóøuª7~'Ó-§hí%»U8óZ]¾\Á¸·ñ&yg¥¬°\ü²²MÊ^Ûñô¨´åó5ÖYl%a%0ÁGCôª±é{\Å#YÀ
X3ËPW¹¬±&l¥ç¬ü³ÐÛ»FÃñïZÚ,ÚõýÎöpä\»¼¢Çh!{N+&yü/e3Au©\}¡î|°ÿ�@J×Ó-´Í\_BÔ¬´¹·º¤Ò%Éʲ¡ÎÐã×½bZørÛScÓµyäfå$FñÜzãÓ5K^½\;uh¬lÉ·ûDò.Õ'7ìKcæOûäý+&gi§CË;?5fæÖÞÎ mãò̤ùÈã¯è=+¢¶³H/¶Ôní³-¼+m©Ü¬Zf»mq+6ñÜàõ#®+;ÄWk¿°Ú«EadLPÄ}G íêÄä¿áY¼Q§n#j9¯÷Té\äò4÷ÊÙ,ì\þ'5¯gÇu3ëq�>ü=bÖÌß¹ð
²ç·ðEù±¬jæ|@ÀÞÄÒñË&¯&ø2ËÛ¿òÍ×þµµcÇõlq÷áë·§ÿ�Gð=ªÝëËø"
þlk(¢²«¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢¬éÖ¯}¨[ÛFpÒ¸\ÞôèѤQ,Ä�riÑ£I"¢Y�æ(«Z]굤G4=¹äþj{-P½¹Xb´ÌÈ@@{ØWu´«e\_²éë¨{˽X¼ô¬këñ-´°Ú\_\Éyk»»án£ù{>:°4]^ãG¼FY¡cbÏ¿ãè{W ÛxVßLó#v2LÄ#ƧØGãÖ½?Jðu®æù¡n§$cÎaG·øÕ S¾ºX"²@fhÈT¹' ®Î]ÓOtJðàÖñö¶¹ÜG\Àüj¡vþ\µ -BêKÛ]Øß yÏ̪?Gq\Þ¬Üh×{г[¿Ë</qì}jî$³Óá¬-¾3n¼µ ½¤H:\¼U´6z¤pOl«Üq¼ª}Tö8ä(Ö÷%ÆÒØÍP¼òÖW)y ïÚë±zÿ�>¢´"¶¶.Ú4nûP ÝÔ5Ht«¦·¾ð¦ÎÐÛI$�zp Pø×PSk]:Ú1¤vË
ü몺°ÑüOqd×SH̹·¹L/ÚPu³Àzóvå<5e~ö²èú»N´E$??Ko)hg¹0À³F»c# F«\ZÜß¼|.Ó×É5bUDËmaC ÁI>¼Ô¾S]]F¥ú u'ñé^+ÌòG"¼6Ù ÏQÁ�;rEH¡S8 9 V¾¯^Ýh®£-µ¬w6éåÛ]G«nl|w=ã\½ñYè:Ï&Ûû+d>ÝÛóë+wP·Õ¯-í>Ée§[È$gbfûä¶ ?zÐ]:\_"C®YÛÉ?ÜÄEûëEf�X
Q'�{Ô÷ J~HFÁõî:+g´¸2K¨¬QÇÝc9íT{sYsE%©ThåðÁ¸!W¡'?ðO1ã ¯9.'T¼0EQÜ+kÅs"ê1é¶ì ®Ý1аûíõ-ʶ4ÿ�ÝxoZöð£Ao ²[μÇ,NÕÏðü÷ÅXI$òI© I¹ä;anþÀ{ã¼b
|IrøÀREúÙÜ~î é
óÝÿ�Z¹¯À»tÛ¡2H6¾CÁýJéü"[êrÙ
ùÚÎÝËqÇá}sø\Òß?Æ¥Góþ¡iq^¼·WÒtÛ@yVôEÿ�hÕüþ#áWj\GÈ=¢¯7Øt/IO ¹Ç÷¤~ú.ãF¾6 \_r$xÝ8Äm#úU}êå|5Á î9@S7a¿0EsµÑèrÚ꿾O jv#xÊÌ ÛGþ϶û[¶xã@Ri¤éÓ®ÑÔ»5tG¡ÜC wãÒ´RXn¹ ¡qÈÇhø>òq ëvÉ<ª±Êª¤ ØlzdF�T>¶O×RÊý<©Ú2FXã(xõ#£$J±÷VTùZi:të´u&ÇòCa©ê7éë º[ßÎ?0ÏÝ_sÇÖó\ѵvê:t°1Àq82}`ªE¥êöðB×SYj 5ÃïR:sÕ?dßY\i÷rZÝÆc3ó¢¹ëí:!-Ín¬¹vóÿ�>Õw¦ÚÜ4Ñ][1b®8ëÔG{²)í5MJîm=!"¶Kcþ8\üÃ<óÔñU¯¼C¡ëíÔ´¹mÛ·¸2ý`ªp¦®ÃR^Oe©ªÃܹHéóuOä+P°¹Óo$´¼Å4gOó¢´5\ÚÁö»WKëû·rûêcÖßuÙtkàÛìr³ =÷¸ÿ�ëUÛ»Rº+å[iÊ¥ý¢~îA£íQ\~³á!+%=ä)Oöoñüë×<ä9NånDRÐ7øþu§©øjêÒßín~íÍ¿ ¼:©¬:ßð¦Ðµ�ÛìS³ ì?¼=ÇëÒ´on4=Vîx¯ÐZ̬z¢~îQãíÇq\½«©è7|b|-Í}ËèØ}{} eW5qo5¬¦9ãhÜvaƹ ie1\DÑ8ìÃÇÑZú¯o´ØÅÆÕ¹²nRê¾6QÓñ¬(¢¢¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢)ñE$ò¬pÆÒHÇPd¥°³P¾Ò¢Iî8×jvZjöÚ}/ﯡ!å×Ê/° ;Kò.H-8bYôùÀý+c@Ð&ÖdfÞ!·CäúëE>e¸b7F8TE$ >c.¥¨AgQ,ÌK]¦§ê«Úø~Å
°LM 4Þ½9Aì=:Öøbí7·6vFV;±üqøÓ
µ>8Ò×ÌYË,l3ï¸pÖ¢Òô©5'{
µ¤<Ïs&H_aêÇÒ´ ñ ¶'¢Ù¡¼÷%äò íiÚéVW¯,RÁx;,þ¼mýxZëãð À×ï>áúO ^"fþîÃNrXî§ íø ãñ¨Ï5¿´GYRCòM]Ã>µ¤KªI4÷S[89¸º$/°õcéZÞ&µÑeòôT #ÏtÌï(Ï$¨;GáVm,ãѼѿe ò¨F@ìT÷¸èHª«a¥X)¾¿Ô"Ôþl%½»dnûÉùÖÿ�¦Ô'Ô$fÞryq»äªÿ�u³éÇaZ]M¢Íqc¨Ù mä Mo(ÚÙ[¨#±Vêiv«j°mîNNx'Gÿ�®º]L²O+@ÃËûÑÁ<óÉæYXG¡¬¢XÁ<˱¦òÔFøéÎ ¥Sv§)ÔuJ-[-ííÜ»ï$d\ÖÍÿ�®/îuAçI¶¸&ݦ[8lýÖϧµms.5Í£b%B>Ñk(ÚÙ[¨>pj WWºÕ$f q±Æ=�¥Òu[ÝO>Ü å^7AÜÐÕÙô(®à{½ µ£sÛ7Ä=×ø¸¬½¸{ìLÛ¤ELëUäA>ùYÖNªãþ>¸)!òãEØ8d# ÎÕõ«½ZQç0+xþXS´mbÿ�DOlIBUãqåÁêý×c»KÍàÞBsÚ¸ÅÄ#Ý{ÅkëÓã°2fÙ$2ªpÄc9ë]vi§]kv¶@>û9J÷õÉ¥ìöæémå)È) ÇÞ\çóÃ9HdIHoʦÔ4Û½5¡[ÈM4bEóëè}©×2O,¡Ì¼rp?Ä©!Ý xCrp2µÛè6Úmæ¹g«i3GoO¾æÊWÃCò²÷ù.)/ç·kµ¶¤W ¤ysT2ÚÜApmåHç6Rò«y¤¼ } ¦Jv_Cí]oò|6ÞáðQúæ´0u8e9¤··X4+(�ýå¼HÎGû|ÿ�2ÉÕÃEz¸lmEÚGb8?øðjÅüÛ[¨,.ߥhÜ£x&Î>{vóu@~¥«ÖK;¨nm²áÔús]-!o ZÛÆ§íZLQ<Í Í8ú6ßθ±ÉÀ©îÔ-ËWÃéJ}·{6³y.�éÏSOxíæA ´>fàÐn o;Å á#ÉcþÑ=jävÿ�fÔ~ÚòÅ äH±PçpÎ0HÆ3#Pg+·¯lÖÇ zwJÃråÀCcð$ºÞ½LrÊ÷1¬d"äoAj;&ÒïDÑ.uû±¥´1YY Tä vãÔUèva-t½R[;HØ0Xmiêdv ú áôóý»b9V¶vLl~Özv0ÔMêFÑÜI¹\®BÀ${汬<#§$ßé¦íÁùaAå«MÆ´/W/qnýWÔ u'Àxu(A:ä¼ä+J2xÃ?+ZÈʸêb}ÃôÍrµéjmP^¤¾UÜåC±Ö2!àg=zV. è壪êwþ®Ñ3 LÝÌ>¾Øªþ ¶ZêÈVÓ\¢Hüá³øf¬ø£PLÓ´]rá[!"ÿ�ì¿÷dK§X#a%Ú¨!XÄVÖRÄúÆ%ç£ý: BF==ª¤qI{½¢ùeHÅwNî�÷ÇãëQ½íÓ2(ÜÜÈÏO¥VðÕË êæXm-nÕ"yÛjU²�?L椿óÃ^JíêøîdIw$PÙä=ê·©ø«WRZAh ðR+Dr=xïÉ?¦«h¶Ï©i~ƪ
µÛm0}«Ñôá¨Ü°_"Ö2Ï1ØùÀÔÕùüK(·ªyst8É®¾Êÿ�GiõpÉcx¶ò mq
ÙH §'\æ©¶ ôkIö¸ $©ÔS5{X,µ[kYþÑ Oµeãæü½êOqu3:Ú¯àY{Á>n(#ØNYà79»k OE¸ãYº}ò[J%´þ ]ÑÄ£ÿ�Öym+Um6øÖíí'î)ͽsmi?Ú ö¬¼|Þ½=óTkgTõM/<' n]/P,àõÛ\èßeÒÇMϦKs,Ó-l.-¦²V ¨ËÉÎ¥P¸ÓVÒMÔSñ½T0 òyÇçXº·
ï4»3s$°É!9㸮jéá#ÒÁù|3a´]ǹïPø§O²·67ºlo µü>h
ÎLg8#>EV}aVQEQEQEQEQEQEQEQEQ]í-MºÔç¸IDIæ ËÆwcüôÓ::í{;'CÕMºàÖZ\\_gK¿)¦]ê«l 2r=L×I¥øF}GOè\¤b@J®ÜñïÍWUááá»ýhYÇyyË bUܰ3¼Ò¢\_]d ´Ý\húkPü«Ì«ÁvÍs8vã÷Hòsì¤ÔéÃGúDC?ÜúÓ¬4>ÇR·¼Ó¼àìv´.wl9ý\Ŷ÷ð\-Ì ìYXæåú ·cá ë=NÖy "UfÚÇ8=ÅsUÒxÕ®¼S\~åC÷H©§]Ðäcçxb ¾U˯åVáJ]KF¿ðûÜZá|ëF;JI{õÍpM5ÚMæ
÷+/PEt®ú«Aök(¯ÌxçFÿ�h=TõZçuÖ-Fê5û©+¨úkOÄ24),Ì¢Å@ÉîþUë·vësåãÈëÒ½Væ/9à í'?6;c8®V æ±¼I sоåeìEu·çÕ~ϬZ½WÑù²E<=üEsÕOÞZæ5X Zö$ûÎê>®åüÝ/DbŲ�9ä1ùVç;xn¬#¿õ|¿<bRAíé] Øg L ¬SÓ>µÃxBÞÛQ¹{Å ³( ~cÈàzjëåµuA,yÝ:Ê£å\{ûWgÓµ8®-ÉyÎ §b:<«ø+IÈ'½AöojVnõ1t¾HoÜH¬A dHÈô©¼9H¯äÛUtQ+-I×&2Ã�?¯^ ÿ�ëÔÚQµ-yêÈÐKlÊËùÏ#îúøö®sXðÅöÍ4Éw§¥Ôhv=Ï¡õö´É!º}>ôÎ}1ëLòìúyÒç×Êþu$3¤Ñ {¦;ܺjÚJ·>A�7]ß÷ûÙô®~Hd[Kar²6Ö2gW'îøüýbqô«SøwRöòMzðÚÃl@êr\_y=wlûUo²xgîRÿ�wüõû(ÙùnÍ[Òµ»mNÁ4OÈßgýï9kvíUþ\_ʾÔ"×ê°.''÷~XäÉîãü\X&Üæ9çÁûÊPmoÃ4ý7.Á ±)ÀûzTZ/ñÍ/º£õ§Á¬ÒýøI# �É5,;í;P¶E898ü?B:ëZzV«¤hçýUÕJûÈÙ RB¥¿Z´-|! Ù>Ê×Zt줤$ª$Ø äÜV+EáV(÷ó7q»&éÕu(aMX4$»Æ0$p¥2ô¬F[«üÚAÉä;>¿^H8DÐdDËsÔ±õk «^e³ä2zSîk%H �ôõ®óDÐáÓKÜ0/w),îØÈÏ8ùVÕ
VIeÇû¿ýzTÒn/õ{ýbÒ, HÒRçq$ cþñ8ü;Ö.µ«¥üvÖ¶ÚÌ0<îoä³äãéOñ±ý§rÛ]>ÔyvÑ±É ýãîzÖB2éëVdúXæH®^5PR¬TÓÐUË{hõ þöóQasm´Gq='5$'Õ¥ö¸®ùJ£»zc©Ïos¨Ï=¤Þ rÄNvg¨úfµ�à¾W{U%lQB óFE[ FhVîXn%PfFp�=0õµ¤z¨_Þêl.vãî2ØsOųjkêHÝùJ£»zcªÏmu©ÜOg···,Dçnz¦sUGTE,ìp }+¯½ÆÏJ·±×ÕïuÈ¾í¿§8¬Û ¨tm^ÛKê,Ñ¡È-j«c³Ç°ªÚΧåI#$J ³ÉÔ
Óñ¨îHfÀ<O|Jp³irÄIÏBHþÏùÖDiR5gv8UQO ¯@kkDѬ¼Dy¨[ýŰЧhÝûý9Åføq Ótq¨BñɨܳFmu8ìÇ×Òéöl¹ew) jÒÍ'Rª:©Ý"´Ãqt4ËkMÙs1-òKÿ�LÃ6O=ÈÆSºÑc¾Io´>Õw=®1,í·¸÷Õ@X<6ö !¶$S÷GrOrzK/ömͪù!î£;å
BÉ t'µÆ\^[ë× 1à²"~RǹSÜôã1Ȭ+ÀnfQ
\áW¿}jö!Kk´Òím´ÛU&c>dÿ�°²yÏ'°¬+-A%¿ðìk·Éwµ[ç¶ßãõ¿½¾Ôm¢ÒüËaËo66/rǹîIH/´k[Ch¹Ôl/5Å´B5l°\
Î ç®+ÐmµûV3XÄðÛ·np¸ô!¸5«/´Ýj&6sÙZê+÷£¶|L~ødVeåùyôÝR]FAó5ÁÛ2ýFü?æÙdR®pAjc¢[¤Úíeþìm÷^ãð5 Îky ñDveÁ_§q\ækBÓéñ<íþ³íXH{Æ ×Ú^½ ]Q~üV³ù±úGáX÷út"ßq¥jójr.NÙ{ºßðå]%·£«ÅAVSýÆ£¦Ýéw-oy Dã¦z7¸=ÅT®ë÷:¡j¶ú¥ªÝi-ò ®p6Ø'ç°æ³.´M:úycÓnìlUì®ÜÁØýÐ×-«xZ[RÎQ29;c~è;çí>³àë7f²\ÇÙ:8þùûUSK¼Ò.ÚÞúAÐ=Aîz'îµmNÙm5k1{£°Ú&¹ÀØ{m'ç9÷¬ßé÷3Å¥\ è«ØÝ¿#ô?C\Åjÿ�N»ÓgòomÞêÐô5V¹é#x¤häFGS¬0Gá\ļR2H§Xäh«z{¥OäßÛI·Ðô?
T¢(¦Óh¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(¢(}'M
ÛRÔÙ£Ó¢m¸\_¿;ÿ�q©íRÛ[Éu003Nä¬XÙÏtöɾGü¹ö¢+gGÒà{gÕ5FhôØ[nÕû÷ýÅþ§µ3EÑgÕe'whën\|ñÇR3ô«2x~}¶ºÖ1ÎiLF TÔõ{UÒ-¢+d8ÖOLçß^}ªúÈkÒ2¶1¶zyÛýÑÍmZéö©8<à§2\ÈåàOn ? ïl|dmÖ¼Éî%Ѷþ�tÇÖ è3ë3X[YÇ6ê@6GÇHÏ8ãÞ?aw+i¯iSpCÌc9öÈÁüê]ëGQ¬gl"Àçß\_n¡"ɺ¾a¹tøÛhOO5»º9]@]+T´þê5¼ïoo߸
?1aÀÇ^õÈÛÞ\ÚÏçÛÏ$2ç;Ñ5½mã;è§H k06 d@¡È8ïPÜè^Û½î+O ÒÚ¹t>¼÷Òi±ZAn ±ÊíbÄ6wÏ¿NØúWYáýÛÉl,rw»'§'×§µmxoÃCHÕì®5+¸ÖñÕä·µoÝ
?1aÀÇ_ʹK[iEżòÃ1ç|lAOê0\¨v±µD¨¸ÆAÇzI´x/mZ÷@® EÝ-«ßÁëÇñ/¸©õÍNæïúXºÉ,òË+6�ÈRg¹ëXÄ·pÆFCº®>¦¶µ1ZOVP^-äu <ýWÝkwÃk%ÊyQ·%FEC| ¤åiê~QþÕáµrí0ñþ}Ojw~Òî6KeÐ2í\àrz×/göÞ"2E\zäÖþ²ÑǤxefá<A~ªÆm/ò·+¦Äp^8Önôçuá[å}¯ÁÛí\÷µ4ÔïÐÀe6ÐF°Äe9f«rriÕo»Óqþx¨¥á}.\_b=EgÌ ,ÖI~gIò}NãÏÖ=~böÓNÔ®\_,× ÷æÚEÏÐñP7dE®èîñ§êT QáÈ(5ý$Î9Ûæ°\¿f²õ-6ëKº6÷ì|nRUÔô ô"%´±¦ò¡ûÈCÒkvÈHsÑúõ5 ¥ì·ØQ÷ì=iNgÛV?,cO©÷§ {håÃáÁÙn[,ç<0¿¯aê úÕ«ÿ�j66ÆåãkQÁÞEÔÇãRxwDS®Å½
©=ËΩúV§-DPjúÖïyÝä~©jº¼ºÁIÒ-^ >3mcg?Þlu?çÞy{çHWdLrÇ»SQFÑ-Ë_lþÍ ûá È'°_ö½1SE¦ÎÒbUØ e[èDñ<:
¶ÕæÖÄôÖIBç°íW ðÝKQg·xÞ¥GÓÝç§SÓÔ³mÇ÷»ÛÞx§ÅÚOqk¦D-¬e}Ò2=ÁõoooÎàÖm¯^ùãþÀAþUô?¿ôöö¥Ó<ªMv£PìÖê7¾×VEPzzØÔ.ítc-ý Ýe¦ÄKeº4°çsWvWÞ5=4ÈÖ¨Ê̼
oàj¹±ÓµÒ_J"ÊüòldoCÿ�LÛÿ�e5ØNÍ !"ÞàÁù)êï\ôèô½]£¶-ä:¬±dä
=³ìr? Ñx¯|ؤ«DÜ¡=èÊ}øuµ¬g7 Ûnñ 0¬ëËß Nd6¨È9 ßòÎeþµJM3N×¶E Ü[äÿ�Ó7ÿ�ÙMkÍ<ú}ßÛ£íö7à¶é9YÐõG? ñ©ùv¥¤±¤ð<
agØäT6ÚMÄòÞÀÃqkJÑ:Í´zàçð«±DðuÃÝ"¨¹¸Ció1\ï#ý>´íFæxbÑõyå[©!dy÷1d;sÏb¤qYZ£u©N&¼Êàm^� =�ôªíDÃ�\=#}ðjàó&ÚIP> ©älϵѮn%¾
ΡHf F@¸9ü+B(~Ïà§¼(¹¹CfHù®w÷p@úÔµÍÅ´z&·mq\]Ë #È\_sí'ÄÅbjZæ«p&½¥p6¯��úW\_áYü?\¼¢!É9OUJØÙgÞIÛûª6þ¦¹]:\^YÆì¯4[ã�õeçÏå]1¼;gTVTçüjµÓ["C$¨oñPG?6:cøMdj(Ë}(ì~aÍte¶¥àÝ·WÉd×Äù!w àcýÚÚx[O]ójZ¤(b0ûçJ\_Þ^,Z¥4ÝÍ� èrTR¥¿\üSª+5[{à¼ï-Æñø52&¼ ÎGËö²ïµÁø¨jk«cU(\ òÌcìí·Ûv²ÅAçÛØä¡íõËøÖî)f±´{XFqÏ¥SÕ\É¥J¬Pùa \OGsñä|mm£ù;£+±îáÎzì2 ÜÒeðlå köjêäN{ö5ÎøÁuTÖ6êþ^ñù#y}¶{u¥ÔôË;3ûcEYÝ\_˸¶vÜÖìz÷SÐò%ñ]ÌdÑ´åfi¬@° «6Þ}+¢+¯=®n(¢(¢(¢(¢(¢(¢(¢(¢éüi~íqwñ±´L,¯´>óÔ(SÁ5×ÏwhyKT»³®Ð\ÏîÚeÞ#v+äc¡Ïé]Ͳ+ܰÜr#¸îk©±áÒHY¹ÌYT¸VÜFÕSÀ>ÀsÔtôChP¼NîÏÀ±À9<ÐWSàØ/bK½I5?ìÍ>yJ{(SÁ?ãïZ:Ïü9! i¢Cw>~yfFNõ¬%ÛPð¥¤Å²ÜC"ÞG±sÀ¶ Çmák;y'¶ëZ¸O4$Ü¥ª»îǯ=?-g= ëVím¼^-.Tu$JÏk 2\]]46± ¼�ö�u>ÕÆë#R\_³[·²;7e¤>®{ý:V÷tѨ¸¹[qkÒãË}dWIog-ÓmSy U,t b?: /[¶sË-¬~tc×óè¼?¡®¾çMùåïBÄ¡ )Ôι{+ÍsZ]^ê·m¾ ³)(誫[Ð ¡¬xîà6V+-µí̯!i&oïHÝÏ·AT5§MjõíßÌ
¦vVõÕù¦Ô<5¦ÉoÊöóInÁ'æ!ùµQÒ×2U¤H|Øcë¿/áOÒ7SémrÆáb�\_zí�8)à1[NU pbÁ üÁj¿$ëÚÒy¼îÈþ µÓi÷ÓÚÞW·Kv7^?\Öºc]J5w!ò[Ë13ø?H:ÌpÝϤµÒEfááb�\_×õ®OKM5I[G®lÜ·r�ËÄñ<7vcXÛZÅæ\ÜN×¹Wf$z#¥cäNzæº
·éÍp<¸õ+ «<²6Ô>ú¡¨Ú¾Ñ2³1x
T»·òÿ�zÇxnÄú{{WdvÖ7'HÛÇìÜr�ëÄçÊçqÆîÄ×uýnÇWó/.®$+$31{2éXrIÏ\×[¤1ÓZá|´Õl¤òÈÛVxùþðÆ=ÅtMo}h/¬Ncýè[û§ÛÐÕ»kÍ'Ë@À®qýjæü?f E½üì͵³z: 1P>¸èZOm¥æ9ò>wÄëè÷"òÑLi ;ãÇ�qîþð¬ÙP#ìlò220qYÚÞlöÃWÑòÚ|"<µ«áooCW|;£mhúNº]6hÚ àeà ;zoÿ�Uiø{GL»/Úýä{;X ¤©Fæ#>ØÎ¹sFm9Ýþѧ`ôôaÜuÍ»[°ÜC# £X¢6ïºw
) K)N)÷>R¥O6rWû§ÔS¯£>i¸S¾åqü½gưG¾´ Ï+y%bëHäãßvszM{BF u¸³næ>VEþÚµ´}6]ò;Jöмx{iÙÚ6ª \Þ©h! F¶ér0fclýäô>ÝêX;ß>µlÿ�hÓ¯Û|s.NÒz£zá\~½áƲy§qaHûÐû0ô÷¬íMþÒ¼+#ùV±)nÑ ê~½õ5ßÚ T´É(
Wvè}±ßéJm´v3
ÖIUU§sz×a¥ø©f²o o)+�8õ�úûUôÕb(à³ô£ÇÞ Öt()5o¶éa$¾g{Õ=Im_P3ùVÑ%ÄÝ£AÔý{z¹á{øMN åÓm;$¸%XàÛügÚº¨u¿ Ç Ì~bæÛo"C#/¢2IÇÌM}©¡êÑÅmb&µ@r ÛN[©$k®ïÅsAká´·¶X£pEÁ
>ç+ý:d¹µÆ¥cårAÈé^µ{Oð³ªFÀ0j©%µç5H¢¶ {?)í Ü}§'©$s\wÞ'Ô¡ µòàXÌ@zO%y®¶¯Õfð¾pU[v �XpÃ?÷Ñ« xZkËf\IèýÞJþ#ªÝ °ìd»±ê¨ÍVðÜÿ�gñ §ýëM»·[½:êÝùY¯êi<Ë)Ôgï>?Oó®ÖÍo i²Ux¥ÝæèÃ?ZÓàêÚúÜ\|ÈX3·_¡Êªi«³Á¶YãÌ»¾ ÕO+X³nÆ@èÜZïIû=®úÙ×$ÿ�u=?Ä.-/-¿çµ»¨ã¸Ê¥½#í÷PìAÅ-¾@Xþv'²µæVó4ݨ·QqÜäþ<ƱCmÇQÍCq0Ñô&n~×rzlêÇíXþÝ_ßÚHro¬åqü@oú IãiÁÖæ·¡"5Ê6äj¿Ñÿ�á#¶¸#Ó7Hz,j2ß§y;FáѲ®²ßSKMSU²úîÎT)$8ó7÷ñ÷±Ö°µÛ1a¬ÝÛ¯ÜW%?Ý<з<ÿ� ê±s%qü?ÌW©L±Ï3(e%Hú+rácÜËßñ¬XÝuxÙÔä2k¸ÒocÕ4Ôµ{(¯®ì¥H¢N<ÍÀñ&>ö1ßÖ¹Ù.®]ÛÇÌA÷F}Qåý¯ 7ô?óÆXgýTÿ�1MV»Ô|Aa=ôåO¢ Ü8 cWÐu5ÖfZI9¸7oW«¦éQ=§$ö ò¡AóÎÿ�ÝLþ§ é']\_OÃÃw¯h±§:{)êH|üÇÛÉñDpXsÓóÒ³õku£|©U\_kZéîõ)®å,dÀè¨ÐV>³ j«NcàÜJòFñ êàsØ÷á5 BGÉ~TØ>yû©ÔÓçº]oMOðÅóÙЧ?Èó¤ÏÌ}¸§YÛkVÖc¹ÛWµë,|àòÃî1ʦk:]ËQv]"i¼^Zó墷Cô5ΰÚr¬)àÊkzÏXTD±×Y´ÀfXOl÷eöëX7,0fÚ0¢Có÷\_¨újÅÕ<=kïPJ@Àn>út©,í5ËK?±ÝCk¬Úõº$ê;©úf²§ðå¤î,ÒÛß(Ëi×ÃdEnèkeÒà« !6Á\Ê¥tV:äz²&gío~f»dõeýk êÖ{9dUꮸ5uwW÷v6;í t#3~ñW³FþƪÉáèo£i´ Áxe¤'Qôèß
rz¨íö2ÓmûÑ0Ä«øáù á5? ]Zö¹v?ÿ�å\õÝ¥Åí ÔA\õWR C]¥åõæ3é&¶þÑ·Aò37ïú{LU¼3ôo?oEèQµl¸Aôèß
sÔS7(êÈÊpU¦ÖA®|W3E:HÞ)$FGS¬0E6(¢(¢(¢(¢(¢(¢(¢(¢®é]Ö©3%²¨XÆé%sµ#\_V=«]fÑ4Ù|:K>ËÕ¿½e¦Mt¢Ve ÿ�¬~ÿ�î§ð=/C»Ôðñ¨ àÊý?Z(«úNw«ÎÑÚªnYÔ}XöÈ¥Ðt@E¢ cP¦[¡ö^Tô¿Þê}¥öZY½s9Úöõü+ µñ&§ÇMscûL¨¬r{?Ãìy®cQÔï5I¼ËÙÚR>êôUI¦h×ú«²@LcïLÿ�,kõc[Úr-tèÝæqwgG�~gÞ»MG·ÒrÐnyØa¤nãгô _jPý¥öYØZæàí{z×Sg+M="8¦»Ó£V_µJÇ'º¡w>¼ó\¦£©^j³y·× 1uO ¿E Kѵ ]¿ÐíËF>ôÏòÆ¿V?Òº¸Å$jV¶¶ËÒRµBؼNõÌjZ ü(÷ªËlıºüÀyþ.àýk Ò LDÑÚ¶£³l©Ùkz}j{"xî
çîcµ¿ ûëx9Ç;3Áƶ|¸.aDcRN"0[¾;1ã9÷®§M½ØÄ|±êHùOÔöþ^ÕÖ¢XDµ-m-=¤.©j
ݽ^ßøO¿#äu_êP#ß+.£jä±»·0÷nàýk§ÑáIQ¢,ºÆ¥°¤³)Ùi¨cüX÷¥6k& ÷>Ô R@öж!»ùdðG±ãÒ¼þ´îÕ´=Y}æ6¨[6©l%´gto3ÎÖÕR[Y-ùÀ+¸bPOËõôÿ�ëqZerÁVÚv@;þ¿ÿ�^¼îµo´ a¨y#¬ñqÉPH︫¤Òõ^-ACÕѶÈû#´?ûôúÖMÆ>
©Z¶kæÙ³Z6ÊLçkjeö£w¯ß[,æ%odõÀ÷9«Þ°x<^°HU»;/Ob+ /H¿:ßÛ^ZD|ËX#lÉ+aü wÏ¥Eá;¶Ä4Ì Ê õb71NËqJÛçi3÷³tüÍE#æÒaíb?ÃúÔËýN÷Äz
ª\þXc»Urzà{j÷lZÇÆ-ì§û4Ë$¼ÝÈü@«péÚN¨6¬úåGÍ´·ó,ü!ðÜJ©á/µ½A%`fÔm®Ve-Ç+ªºÄ9ÀǹaèÃPEOï,åLdÆDéÐÿ�J8ÞYF¥Üör<±ÈY®6r[£qîÀƱWAíPø %ѲÖcPQ´ª: Tí|{ãX5¿§áMFÓ¤³.ÀÉ�ü?U?
eiÚuÞ©v¶ÖP4Ó7eì=Iì=êKÏUùèߦò®[Æ¥Y][
?U8þX®W·
"I6ÜKíÀ? ç¹ïX+ãRÑ (o3¯ÜR8¸½8"jwÎVdÜcNv·äôÎwp3øU6Mqg
9\óô®XmúôE²5(¦?ïm�þªhñ:ÓK¼.,ÄlGvBTþ«÷wz.oy³TÔ,¢òpûÎ~fêØÎ1Ó;Y{½sÃ]¬~{Ú\º²ÁÆTcØb¹ÿ�
| |~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
10561 | https://flexbooks.ck12.org/cbook/ck-12-precalculus-concepts-2.0/section/4.1/primary/lesson/angles-in-radians-and-degrees-pcalc/ | Skip to content
Elementary Math
Grade 1
Grade 2
Grade 3
Grade 4
Grade 5
Math 6
Math 7
Math 8
Algebra I
Geometry
Algebra II
Math 6
Math 7
Math 8
Algebra I
Geometry
Algebra II
Probability & Statistics
Trigonometry
Math Analysis
Precalculus
Calculus
What's the difference?
Science
Grade K to 5
Earth Science
Life Science
Physical Science
Biology
Chemistry
Physics
Advanced Biology
FlexLets
Math FlexLets
Science FlexLets
English
Writing
Spelling
Social Studies
Economics
Geography
Government
History
World History
Philosophy
Sociology
More
Astronomy
Engineering
Health
Photography
Technology
College
College Algebra
College Precalculus
Linear Algebra
College Human Biology
The Universe
Adult Education
Basic Education
High School Diploma
High School Equivalency
Career Technical Ed
English as 2nd Language
Country
Bhutan
Brasil
Chile
Georgia
India
Translations
Spanish
Korean
Deutsch
Chinese
Greek
Polski
EXPLORE
Flexi
A FREE Digital Tutor for Every Student
FlexBooks 2.0
Customizable, digital textbooks in a new, interactive platform
FlexBooks
Customizable, digital textbooks
Schools
FlexBooks from schools and districts near you
Study Guides
Quick review with key information for each concept
Adaptive Practice
Building knowledge at each student’s skill level
Simulations
Interactive Physics & Chemistry Simulations
PLIX
Play. Learn. Interact. eXplore.
CCSS Math
Concepts and FlexBooks aligned to Common Core
NGSS
Concepts aligned to Next Generation Science Standards
Certified Educator
Stand out as an educator. Become CK-12 Certified.
Webinars
Live and archived sessions to learn about CK-12
Other Resources
CK-12 Resources
Concept Map
Testimonials
CK-12 Mission
Meet the Team
CK-12 Helpdesk
FlexLets
Know the essentials.
Pick a Subject
Donate
Sign Up
4.1
Angles in Radians and Degrees
Written by:CK-12 | Mark Spong
Fact-checked by:The CK-12 Editorial Team
Last Modified: Sep 01, 2025
Lesson
Most people are familiar with measuring angles in degrees. It is easy to picture angles like, or and the fact that makes up an entire circle. Over 2000 years ago the Babylonians used a base 60 number system and divided up a circle into 360 equal parts. This became the standard and it is how most people think of angles today.
However, there are many units with which to measure angles. For example, the gradian was invented along with the metric system and it divides a circle into 400 equal parts. The sizes of these different units are very arbitrary.
A radian is a unit of measuring angles that is based on the properties of circles. This makes it more meaningful than gradians or degrees. How many radians make up a circle?
Radians and Degrees
A radian is defined to be the central angle where the subtended arc length is the same length as the radius.
Another way to think about radians is through the circumference of a circle. The circumference of a circle with radius is . Just over six radii (exactly radii) would stretch around any circle.
To define a radian in terms of degrees, equate a circle measured in degrees to a circle measured in radians.
, so
Alternatively; , so
The conversion factor to convert degrees to radians is:
The conversion factor to convert radians to degrees is:
If an angle has no units, it is assumed to be in radians.
If you were to convert into radians, you would multiply by the correct conversion factor. You would get:
You can check your work by making sure the degree units appear on both the numerator and denominator.
If you were to convert radians into degrees, you would multiply by the correct conversion factor. You would get
Notice appears in both the numerator and denominator and .
Examples
Example 1
Earlier, you were asked how many radians make up a circle. Exactly radians describe a circular arc. This is because radii wrap around the circumference of any circle.
Example 2
Convert into radians.
Don’t be fooled just because this has . This number is about
It is very unusual to ever have a term, but it can happen.
Example 3
Convert into degrees.
Example 4
Convert into radians.
Example 5
Draw a angle by first drawing a angle, halving it and halving the result. Recall that .
| |
| Summary |
| A radian is the central angle where the subtended arc length is the same length as the radius. A circle with radius has a circumference of and exactly radii would stretch around any circle. The conversion factor to convert degrees to radians is: If an angle has no units, it is assumed to be in radians. |
Review
Find the radian measure of each angle.
1.
2.
3.
4.
5.
6.
7.
Find the degree measure of each angle.
8.
9.
10.
11.
12.
13.
3
Explain why if you are given an angle in degrees and you multiply it by you will get the same angle in radians.
Review (Answers)
Click HERE to see the answer key or go to the Table of Contents and click on the Answer Key under the 'Other Versions' option.
Asked by Students
Here are the top questions that students are asking Flexi for this concept:
Overview
A radian is the central angle where the subtended arc length is the same length as the radius.
A circle with radius @$r@$ has a circumference of @$2\pi r,@$ and exactly @$2\pi@$ radii would stretch around any circle.
The conversion factor to convert degrees to radians is: @$\frac{\pi}{180°}@$
If an angle has no units, it is assumed to be in radians.
Vocabulary
degree
Test Your Knowledge
Question 1
Express @$\begin{align}13.5^\circ \end{align}@$ in terms of radians.
a
@$\begin{align}\frac{2430}{\pi}\end{align}@$
b
@$\begin{align}2430\pi\end{align}@$
c
@$\begin{align}\frac{3\pi}{80}\end{align}@$
d
@$\begin{align}\frac{3\pi}{40}\end{align}@$
To convert from degrees to radians, multiply by @$\begin{align}\frac{\pi}{180^\circ}\end{align}@$.
@$$\begin{align}\eqalign{
&& 13.5^\circ \
&& 13.5^\circ \times \frac{\pi}{180^\circ} \
&& \frac{13.5^\circ \pi}{180^\circ} \
&& \frac{3 \pi}{40}
}\end{align}@$$
Question 2
An angle measuring @$\begin{align}45^\circ \end{align}@$ is equal to _____ radians.
a
@$\begin{align}4\pi\end{align}@$
b
@$\begin{align}\frac{\pi}{4}\end{align}@$
c
@$\begin{align}\frac{\pi}{6}\end{align}@$
d
@$\begin{align}\frac{4}{\pi}\end{align}@$
To convert from degrees to radians, multiply by @$\begin{align}\frac{\pi}{180^\circ}\end{align}@$.
@$$\begin{align}\eqalign{
&& 45^\circ \
&& 45^\circ \times \frac{\pi}{180^\circ} \
&& \frac{45^\circ \pi}{180^\circ} \
&& \frac{\pi}{4}
}\end{align}@$$
An angle measuring @$\begin{align}45^\circ \end{align}@$ is equal to @$\begin{align}\frac{\pi}{4}\end{align}@$ radians.
Asked by Students
Here are the top questions that students are asking Flexi for this concept:
Related Content
Radian and Degree Conversions - Example 1
Radian and Degree Conversions - Example 3
Conversion between Degrees and Radians: Clock Angles and Measures
Conversion between Degrees and Radians: Arc and Radians Relationship
| Image | Reference | Attributions |
---
| | | Credit: CK-12 Foundation;CK-12 Source: CK-12 License: CC BY-SA |
Student Sign Up
Are you a teacher?
Having issues? Click here
By signing up, I confirm that I have read and agree to the Terms of use and Privacy Policy
Already have an account?
Save this section to your Library in order to add a Practice or Quiz to it.
(Edit Title)29/ 100
This lesson has been added to your library.
|Searching in:
| |
|
Looks like this FlexBook 2.0 has changed since you visited it last time. We found the following sections in the book that match the one you are looking for:
Go to the Table of Contents
No Results Found
Your search did not match anything in . |
10562 | https://www.pathologyoutlines.com/topic/cnstumorwhoclassification.html | Home > CNS & pituitary tumors > WHO classification
CNS & pituitary tumors
General
WHO classification
Author:Maria Martinez-Lage, M.D.
Editorial Board Member:P.J. Cimino, M.D., Ph.D.
Deputy Editor-in-Chief:Chunyu Cai, M.D., Ph.D.
Last author update: 16 June 2023
Last staff update: 14 October 2024
Copyright: 2002-2025, PathologyOutlines.com, Inc.
PubMed Search: WHO classification CNS 2021
Page views in 2024: 23,307
Page views in 2025 to date: 15,305
Table of Contents
Definition / general | Major updates | WHO (2021) | Diagrams / tables | Grading | Additional references | Practice question #1 | Practice answer #1
Cite this page: Martinez-Lage M. WHO classification. PathologyOutlines.com website. Accessed August 24th, 2025.
Definition / general
Extensively revised in 1993 (Brain Pathol 1993;3:255)
Third edition in 2000 (J Neuropathol Exp Neurol 2002;61:215)
Fourth edition in 2007 (Acta Neuropathol 2007;114:97)
2016 WHO classification is considered a revision of the fourth edition (Acta Neuropathol 2016;131:803)
Fifth edition published (online) in 2021 (Neuro Oncol 2021;23:1231)
Major updates
2021 WHO classification, 5th edition (WHO CNS5) summary
Builds upon the updated fourth edition published in 2016 and the subsequent recommendations of the Consortium to Inform Molecular and Practical Approaches to CNS Tumor Taxonomy (cIMPACT-NOW) (Brain Pathol 2017;27:851, Acta Neuropathol 2017;133:1, Acta Neuropathol 2018;135:481, Acta Neuropathol 2018;135:639, Acta Neuropathol 2018;136:805, Acta Neuropathol 2019;137:683, Acta Neuropathol 2020;139:603, Brain Pathol 2020;30:844, Brain Pathol 2020;30:863)
This fifth edition incorporates major changes including further advancing the role of molecular information in the diagnosis of CNS neoplasms, introducing the concept of CNS WHO grade distinct from WHO grade, grading within tumor type, endorsing the use of Arabic numerals for grading instead of Roman numerals and defining new entities based on molecular and histological characteristics (Neuro Oncol 2021;23:1231)
Taxonomy maintains a hybrid approach including histological and molecular features with some entities requiring specific molecular changes for a diagnosis (e.g., IDH mutant gliomas), while others display a looser association with molecular signatures that are not necessary for a diagnosis (e.g., pleomorphic xanthoastrocytoma and BRAF alteration); for each tumor type, diagnostic criteria are enumerated and listed as essential or desirable
Grading within tumor type and the use of Arabic (rather than Roman numerals) are both introduced for the first time in CNS classification to move closer to the grading approach of non-CNS neoplasms; however, some idiosyncrasies remain based on historical knowledge and practices, in addition to the use of molecular signatures to determine grade in some cases, which further warrants the introduction and use of CNS WHO grade instead of WHO grade
Grading within types in gliomas implies the elimination of the term anaplastic, which was previously linked to grade in these tumors
Anatomic site modifiers that were previously part of a tumor name are removed to make nomenclature simpler and more consistent (e.g., chordoid glioma of the third ventricle is now simply chordoid glioma)
In addition to NOS (not otherwise specified), NEC (not elsewhere classified) is introduced
NOS: terminology to be used when molecular information is insufficient, either because testing cannot be fully performed or because the results don't fit within a defined category
NEC: terminology to be used when necessary testing has been performed and results are available but the results do not fit perfectly in a defined tumor type
Glial, glioneuronal and neuronal tumors are entirely restructured into 6 different families in a scheme that introduces a distinction between adult type and pediatric type tumors
Adult type diffuse gliomas
Pediatric type diffuse low grade gliomas
Pediatric type diffuse high grade gliomas
Circumscribed astrocytic gliomas
Glioneuronal and neuronal tumors
Ependymomas
Classification of common adult type diffuse gliomas is drastically simplified to include only 3 types (with grading within tumor for the first 2): astrocytoma, IDH mutant (grade 2, 3 or 4), oligodendroglioma, IDH mutant and 1p / 19q codeleted (grade 2 or 3) and glioblastoma, IDH wild type (grade 4)
Consequently, glioblastoma is a term exclusively reserved for IDH wild type tumors and the nomenclature for IDH mutant astrocytomas is astrocytoma, IDH mutant, CNS WHO grade 2, 3 or 4
Classification of medulloblastomas remains largely similar to the 2016 classification, maintaining the incorporation of molecularly defined entities that determine prognostic categories, while adding novel subtypes (4 subgroups of SHH tumors and 8 subgroups of non-WNT / non-SHH medulloblastomas)
Ependymomas are restructured using a combination of histopathological features, molecular signatures and anatomic site (supratentorial, posterior fossa and spinal)
New tumor types have been added, such as diffuse hemispheric glioma, H3 G34 mutant or CNS tumor with BCOR internal tandem duplication
Some newly recognized types are considered provisional (e.g., diffuse glioneuronal tumor with oligodendroglioma-like features and nuclear clusters or intracranial mesenchymal tumor, FET::CREB fusion positive) while some lesions that were introduced in 2016 are no longer provisional (e.g., diffuse leptomeningeal glioneuronal tumor)
Meningioma is considered a single type with 15 subtypes; grading is significantly changed - while chordoid meningioma and clear cell meningioma are still considered CNS WHO grade 2 based on morphology (pending larger studies), the criteria that define atypical (grade 2) or anaplastic (grade 3) meningiomas should be applied to rhabdoid and papillary meningioma instead of assigning grade 3 based on morphology alone; furthermore, molecular alterations can influence grade, as the presence of TERT promoter mutation or homozygous deletion of CDKN2A/B is considered sufficient for a designation of CNS WHO grade 3 in meningiomas
New types of mesenchymal neoplasms are included, such as CIC rearranged sarcoma; hemangiopericytoma is now fully retired and solitary fibrous tumor is used instead, as it aligns with the soft tissue nomenclature (the 3 tiered CNS grading scheme remains)
Paragangliomas are understood as involving cells from the autonomic nervous system, therefore, they are now included in the chapter with nerve tumors and are renamed cauda equina neuroendocrine tumor; melanotic schwannoma is a term that is considered inadequate to reflect the unique features of this lesion, therefore this tumor type is now called malignant melanotic nerve sheath tumor
Some major changes are introduced to the tumors of the sellar region
Adamantinomatous craniopharyngioma and papillary craniopharyngioma are now considered 2 different tumor types (rather than subtypes) given their distinct clinicopathological and molecular characteristics
Tumors of the neurohypophysis are now considered to belong to 1 group, as they may represent morphologic variations of the same tumor
Pituitary neuroendocrine tumor (PitNET) is a newly introduced term, accompanying pituitary adenoma (pituitary adenoma / pituitary
neuroendocrine tumor)
A new tumor type, characteristic of infancy and associated with DICER1 alterations, is included (pituitary blastoma)
WHO (2021)
Gliomas, glioneuronal tumors and neuronal tumors ICD-O Adult type diffuse gliomas
+ Astrocytoma, IDH mutant
- Astrocytoma, IDH mutant, grade 29400/3
- Astrocytoma, IDH mutant, grade 39401/3
- Astrocytoma, IDH mutant, grade 49445/3
+ Oligodendroglioma, IDH mutant and 1p / 19q codeleted
- Oligodendroglioma, IDH mutant and 1p / 19q codeleted, grade 29450/3
- Oligodendroglioma, IDH mutant and 1p / 19q codeleted, grade 39451/3
+ Glioblastoma, IDH wild type9440/3
Pediatric type diffuse low grade gliomas
+ Diffuse astrocytoma, MYB or MYBL1 altered9421/1
+ Angiocentric glioma9431/1
+ Polymorphous low grade neuroepithelial tumor of the young9413/0
+ Diffuse low grade glioma, MAPK pathway altered9421/1
Pediatric type diffuse high grade gliomas
+ Diffuse midline glioma, H3 K27 altered9385/3
+ Diffuse hemispheric glioma, H3 G34 mutant9385/3
+ Diffuse pediatric type high grade glioma, H3 wild type and IDH wild type9385/3
+ Infant type hemispheric glioma9385/3
Circumscribed astrocytic gliomas
+ Pilocytic astrocytoma9421/1
+ High grade astrocytoma with piloid features9421/3
+ Pleomorphic xanthoastrocytoma9424/3
+ Subependymal giant cell astrocytoma9384/1
+ Chordoid glioma9444/1
+ Astroblastoma, MN1 altered9430/3
Glioneuronal and neuronal tumors
+ Ganglioglioma9505/1
+ Gangliocytoma9492/0
+ Desmoplastic infantile ganglioglioma / astrocytoma
- Desmoplastic infantile ganglioglioma9412/1
- Desmoplastic infantile astrocytoma9412/1
+ Dysembryoplastic neuroepithelial tumor9413/0
+ Diffuse glioneuronal tumor with oligodendroglioma-like features
and nuclear clusters (provisional)
- Mixed neuronal - glial tumors2A00.21 (ICD-11)
+ Papillary glioneuronal tumor9509/1
+ Rosette forming glioneuronal tumor9509/1
+ Myxoid glioneuronal tumor9509/1
+ Diffuse leptomeningeal glioneuronal tumor9509/3
+ Multinodular and vacuolating neuronal tumor9509/0
+ Dysplastic cerebellar gangliocytoma (Lhermitte-Duclos disease)9493/0
+ Central neurocytoma9506/1
+ Extraventricular neurocytoma9506/1
+ Cerebellar liponeurocytoma9506/1
Ependymal tumors
+ Supratentorial ependymoma, NOS9391/3
+ Supratentorial ependymoma, ZFTA fusion positive9396/3
+ Supratentorial ependymoma, YAP1 fusion positive9396/3
+ Posterior fossa ependymoma, NOS9391/3
+ Posterior fossa group A (PFA) ependymoma9396/3
+ Posterior fossa group B (PFB) ependymoma9396/3
+ Spinal ependymoma, NOS9391/3
+ Spinal ependymoma, MYCN amplified9396/3
+ Myxopapillary ependymoma9394/1
+ Subependymoma9383/1
Choroid plexus tumors ICD-O
Choroid plexus papilloma9390/0
Atypical choroid plexus papilloma9390/1
Choroid plexus carcinoma9390/3
Embryonal tumors ICD-O
Medulloblastoma
Medulloblastoma, molecularly defined
Medulloblastoma, WNT activated9475/3
Medulloblastoma, SHH activated and TP53 wild type9471/3
Medulloblastoma, SHH activated and TP53 mutant9476/3
Medulloblastoma, non-WNT / non-SHH9477/3
Medulloblastoma, histologically defined
Medulloblastoma, histologically defined9470/3
Desmoplastic nodular medulloblastoma9471/3
Medulloblastoma with extensive nodularity9471/3
Large cell medulloblastoma9474/3
Anaplastic medulloblastoma9474/3
Other CNS embryonal tumors
Atypical teratoid rhabdoid tumor9508/3
Cribriform neuroepithelial tumor (provisional)
Other specified tumors of neuroepithelial tissue of brain2A00.2Y (ICD-11)
Embryonal tumor with multilayered rosettes9478/3
CNS neuroblastoma, FOXR2 activated9500/3
CNS tumor with BCOR internal tandem duplication9500/3
CNS embryonal tumor, NEC / NOS9473/3
Pineal tumors ICD-O
Pineocytoma9361/1
Pineal parenchymal tumor of intermediate differentiation9362/3
Pineoblastoma9362/3
Papillary tumor of the pineal region9395/3
Desmoplastic myxoid tumor of the pineal region, SMARCB1 mutant
Tumors of the pineal gland or pineal region2A00.20 (ICD-11)
Cranial and paraspinal nerve tumors ICD-O
Schwannoma9560/0
Neurofibroma
Neurofibroma9540/0
Plexiform neurofibroma9550/0
Perineurioma9571/0
Hybrid nerve sheath tumor9563/0
Malignant melanotic nerve sheath tumor9540/3
Malignant peripheral nerve sheath tumor9540/3
Cauda equina neuroendocrine tumor (previously paraganglioma)8693/3
Meningiomas ICD-O
Meningioma9530/0
Mesenchymal, nonmeningothelial tumors ICD-O+ Soft tissue tumors
- Fibroblastic and myofibroblastic tumors
Solitary fibrous tumor8815/1
+ Vascular tumors
- Hemangiomas and vascular malformations
Cavernous hemangioma9121/0
Capillary hemangioma9131/0
Arteriovenous malformation9123/0
- Hemangioblastoma9161/1
+ Skeletal muscle tumors
- Rhabdomyosarcoma
Embryonal rhabdomyosarcoma8910/3
Alveolar rhabdomyosarcoma8920/3
Rhabdomyosarcoma, pleomorphic type8901/3
Spindle cell rhabdomyosarcoma8912/3
+ Uncertain differentiation
- Intracranial mesenchymal tumor, FET::CREB fusion positive
Neoplasms of uncertain behavior of connective or other soft tissue2F7C & XH9362 (ICD-11)
- CIC rearranged sarcoma9367/3
- Primary intracranial sarcoma, DICER1 mutant9480/3
- Ewing sarcoma9364/3
Chondro-osseous tumors
Chondrogenic tumors
Mesenchymal chondrosarcoma9240/3
Chondrosarcoma
Chondrosarcoma9220/3
Dedifferentiated chondrosarcoma9243/3
Notochordal tumors
Chordoma (including poorly differentiated chordoma)9370/3
Melanocytic tumors ICD-O Diffuse meningeal melanocytic neoplasms
+ Meningeal melanocytosis and meningeal melanomatosis
- Meningeal melanocytosis8728/0
- Meningeal melanomatosis8728/3
Circumscribed meningeal melanocytic neoplasms
+ Meningeal melanocytoma and meningeal melanoma
- Meningeal melanocytoma8728/1
- Meningeal melanoma8720/3
Hematolymphoid tumors ICD-O Lymphomas
+ CNS lymphomas
- Primary diffuse large B cell lymphoma of the CNS9680/3
- Immunodeficiency associated CNS lymphoma
Immunodeficiency associated lymphoproliferative disordersDB32 (ICD-11)
- Lymphomatoid granulomatosis
Lymphomatoid granulomatosis9766/1
Lymphomatoid granulomatosis, grade 19766/1
Lymphomatoid granulomatosis, grade 29766/1
Lymphomatoid granulomatosis, grade 39766/3
- Intravascular large B cell lymphoma9712/3
+ Miscellaneous rare lymphomas in the CNS
- MALT lymphoma of the dura9699/3
- Other low grade B cell lymphomas of the CNS
Lymphoplasmacytic lymphoma9671/3
Follicular lymphoma9690/3
- T cell and NK / T cell lymphomas of the CNS
T cell lymphoma9702/3
NK / T cell lymphoma9719/3
- Anaplastic large cell lymphoma (ALK+ / ALK-)9714/3
Histiocytic tumors
+ Erdheim-Chester disease9749/3
+ Rosai-Dorfman disease9749/3
+ Juvenile xanthogranuloma9749/1
+ Langerhans cell histiocytosis9751/1
+ Histiocytic sarcoma9755/3
Germ cell tumors ICD-O
Mature teratoma9080/0
Immature teratoma9080/3
Teratoma with somatic type malignancy9084/3
Germinoma9064/3
Embryonal carcinoma9070/3
Yolk sac tumor9071/3
Choriocarcinoma9100/3
Mixed germ cell tumor9085/3
Tumors of the sellar region ICD-O
Adamantinomatous craniopharyngioma9351/1
Papillary craniopharyngioma9352/1
Pituicytoma, granular cell tumor of the sellar region
and spindle cell oncocytoma
Pituicytoma9432/1
Granular cell tumor of the sellar region9582/0
Spindle cell oncocytoma8290/0
Pituitary adenoma / pituitary neuroendocrine tumor (PitNET)8272/3
Pituitary blastoma8273/3
Metastases to the CNS
Metastases to the brain and spinal cord parenchyma
Malignant neoplasm metastasis in brain,2D50 (ICD-11)
with extension code for primary tumor type
Metastases to the meninges
Malignant neoplasm metastasis in meninges2D51 (ICD-11)
Diagrams / tables
Images hosted on other servers:
Key diagnostic genes, molecules, pathways
CNS WHO grades of selected types
Newly recognized WHO 2021 tumor types
Grading
Histological grading is still used based on morphology in many instances; however, in this classification, the presence of certain molecular alterations is incorporated in the grading algorithm
For example, IDH mutant astrocytomas can be designated as grade 4 based on histology (presence of microvascular proliferation or necrosis) or if there is a homozygous deletion CDKN2A/B independent of histological features
Similarly, glioblastoma, IDH wild type can now be diagnosed in the absence of the aforementioned microscopic features, if certain molecular alterations are present in a diffuse astrocytic glioma in adults (TERT promoter mutation, EGFR gene amplification or combined gain of entire chromosome 7 and loss of entire chromosome 10 [+7 / -10])
In the clinical setting, tumor grade remains a key factor influencing choice of therapy
Additional references
Louis: WHO Classification of Tumours of the Central Nervous System, 4th Edition, 2007, WHO Classification of Tumours Editorial Board: Central Nervous System Tumours, 5th Edition, 2022
Practice question #1
Which of the following terms is the only acceptable diagnosis in the 2021 WHO classification of tumors of the central nervous system?
Anaplastic astrocytoma, IDH mutant
Anaplastic astrocytoma, IDH wild type
Glioblastoma, IDH mutant
Glioblastoma, IDH wild type
Practice answer #1
D. Glioblastoma, IDH wild type. The 2021 CNS WHO classification simplifies the diagnosis of diffuse gliomas and reserves the term glioblastoma for IDH wild type tumors. Additionally, the term can now be used for infiltrating astrocytomas that lack the classic histological features of glioblastoma (microvascular proliferation and necrosis) but show certain molecular alterations (TERT promoter mutation, EGFR amplification or combined gain of chromosome 7 with loss of chromosome 10), which in the past could have been designated as anaplastic astrocytoma, IDH wild type. The new scheme also introduces grading within tumor type, so that the term anaplastic is eliminated from the diagnostic line for diffuse gliomas. A CNS WHO grade 3 tumor with IDH mutation and astrocytic identity would be correctly diagnosed as astrocytoma, IDH mutant, CNS WHO grade 3 (and no longer called anaplastic astrocytoma).
Comment Here
Reference: WHO classification of CNS tumors
Back to top
Home > CNS & pituitary tumors > WHO classification
Comment
© Copyright PathologyOutlines.com, Inc. Click here for information on linking to our website or using our content or images.
© Copyright PathologyOutlines.com, Inc. Click here for information on linking to our website or using our content or images.
| | |
--- |
| | | |
10563 | https://www.ck12.org/flexi/algebra-ii/horizontal-and-vertical-asymptotes/what-is-a-rational-equation/ | Flexi answers - What is a rational equation? | CK-12 Foundation
Subjects Explore
Donate
Sign InSign Up
All Subjects
Algebra II
Horizontal and Vertical Asymptotes
Question
What is a rational equation?
Flexi Says:
A rational equation is an equation that involves at least one rational expression. A rational expression is a fraction where the numerator and/or the denominator are polynomials. For example, the equation x x+1=2 3 is a rational equation. Solving rational equations often involves finding a common denominator or cross-multiplying to eliminate the fractions.
Analogy / Example
Try Asking:
Follow the seven-step strategy to graph the following rational function. f(x)=2x/x^2-4. Find the horizontal asymptote(s). Select the correct choice below and, if necessary, fill in the answer box to complete your choice. A. The equation(s) of the horizontal asymptote(s) is/are enter your response here. (Type an equation. Use a comma to separate answers as needed.) B. There is no horizontal asymptote.What is the definition of rate in math?What is (fg)(x) given f(x) = - 4x + 6 and g(x) = - 2x + 4? Write your answer as a polynomial or a rational function in simplest form.
How can Flexi help?
By messaging Flexi, you agree to our Terms and Privacy Policy |
10564 | https://atcm.mathandtech.org/EP2022/invited/21964.pdf | Sphere and Spherical Geometry: The Power of Visualization and Investigation Through Dynamic Geometry Jean-JacquesDahan jjdahan@wanadoo.fr IRES of Toulouse Paul Sabatier University Toulouse FRANCE Abstract: This article aims to provide a dynamic approach to the basic notions of spherical geometry. We will use the power of visualization of Cabri 3D to make more comprehensible the detail of the proofs establishing the formulas giving the area and the volume of a sphere. Experimenting with real spheres is a challenge already overcome with half hollow and transparent plastic balls on which you can stretch strings and write with markers. The use of Cabri 3D greatly enriches such teaching of spherical geometry in facilitating the 3D representation of the objects of this geometry as well as their manipulation. We will show how. All the results presented here are known, but it is the way in which they are approached and detailed that constitutes the originality of this article. 1. Surface area and volume of a sphere 1.1. Surface area of a sphere Visualization and manipulation of spherical coordinates: each point M of a sphere (yellow sphere of Figure 1 left, centered at O and passing through D, radius r) belongs to a half circle here SmN. This half circle can be dragged in dragging point m from D to D along the displayed equatorial circle of the given sphere; the position of m and by the way the position of the half circle is known in knowing angle 𝐷𝑂𝑚 ̂ = θ with 0 ≤ θ < 2𝜋. All points of the half circle can be reached in dragging point M along it; the position of M is known in knowing angle 𝑚𝑂𝑀 ̂ = 𝜑 with − 𝜋 2 ≤ 𝜑 ≤ 𝜋 2 . Figure 1: Spheric coordinates A construction trick (Figure 1 right): An issue with the use of Cabri 3D is that arcs of more than 180° are not represented on a given circle. So, we need a tricky geometric construction of arc Dm in order to see it continuously during the whole displacement of point m along the horizontal circle. Here is this construction: ∎ Given point m on the circle centered at O passing through D. ∎ Construct segment [Dm] ∎ Construct line (L) perpendicular to this segment passing through O. ∎ J is the intersection point between the circle and this line belonging to the shortest arc defined by D and m. ∎ Measure the length of arc DJm= L. ∎ Calculate l=L/2. ∎ Define point K on the circle as the measurement transfer of l on this circle from point D. ∎ Arc DKm is the solution of our problem. Proof mediated by Cabri 3D (Figure 2): Highlighting the area element dL.dl to evaluate the area of the sphere as a double integral: Figure 1 left. Evaluation and calculation of dL, dl and dL.dl: Figure 2 right dL = 𝑟.𝑑𝜑 , dl = 𝑟. cos(𝜑) .𝑑𝜃 and dL.dl = 𝑟2. cos(𝜑). 𝑑𝜑.𝑑𝜃 So, the area of the sphere is equal to ∫ ∫ 𝑟. cos(𝜑). 𝑑𝜃. 𝑟. 𝑑𝜑 2𝜋 𝜃=0 𝜋 2 𝜑=−𝜋 2 = 𝑟2. ∫ cos(𝜑) .
𝜋 2 𝜑=−𝜋 2 𝑑𝜑.∫ 𝑑𝜃 2𝜋 𝜃=0 = 4𝜋𝑟2 Finally: Surface area of a sphere of radius r = 𝟒𝝅𝒓𝟐 Figure 2: Surface area of a sphere 1.2. Volume of a sphere Figure 3: Volume of a sphere For a sphere of radius r, we have represented one of the elementary cylinders we need to sum to obtain the volume of a half sphere as an integral (Figure 3 left). The radius of such a cylinder at height z is equal to √𝑟2 −𝑧2. The area of its base is 𝜋. (√𝑟2 −𝑧2)2. The sum of the volumes of these cylinders approaches the volume of the half-sphere (Figure 3 right). So, the volume of the upper half sphere is equal to: ∫𝜋. (√𝑟2 −𝑧2)2 𝑅 0 . 𝑑𝑧 = 𝜋. ∫(𝑟2 −𝑧2).𝑑𝑧 𝑅 0 = 2 3 𝜋𝑟3 . Therefore: Volume of a sphere of radius r = 𝟒 𝟑𝝅𝒓𝟑 2. Spherical geometry 2.1. Segments and lines on a sphere (geodesic lines) ([1’]) 2.1.1. Experimenting before proving: we know that in planar geometry, a segment between two given points is the shortest path joining these points and the line defined by these points is obtained by extending as far as we want this segment (Euclidean definition). We will try to define segments and lines drawn on a sphere in the same way as we did for segments and lines of Euclidean plane geometry. As the simplest path joining two points on a sphere seems to be an arc, let us consider any arc defined by its two vertices A and M and passing through a third point of the sphere, point I (Figure 4 left). Let us measure the length of this arc and let us move point I in order to minimize the length of this arc I (Figure 4 middle). Very quickly we obtain a position of I, which seems to belong to the plane passing through the center of the sphere and the two points A and M (Figure 4 right). So, we can conjecture that the minimum is reached when the arc is supported by a great circle of the sphere and included entirely in the same half sphere. Figure 4: Experimenting in order to define a spherical segment Now, we can hope that the definition of a spherical segment passing through two given points could be the shortest arc supported by the great circle containing these points of the sphere 2.1.2. Proof of the previous conjecture (Figure 5): let us start from an arc AM (called Arc1) included in a great circle C1 of a given sphere (Figure 5). This circle belongs to plane P. Let us consider another arc, Arc2, in blue, with vertices also A and M. This arc belongs to a circle C2 with radius less than the radius of C1. We have to prove that the length of Arc2 is always more than the length of Arc1. To do so, it is sufficient to prove that the shortest arc included in C2, with vertices are A and M is longer than Arc1. C2 is centered at i2 which is the orthogonal projection of the center of the sphere on the plane containing C2. We rotate circle C2 and Arc2 around line (AM), using the rotation transforming the plane of circle C2 onto plane P. We obtain circle r(C2) centered at r(i2) and r(Arc2) included in plane P. So, the problem we have to solve is a problem of plane geometry described following Figure 5. Figure 5: Proof of the minimization of the length of an arc This planar problem is illustrated by Figure 6: C1 is the given circle (corresponding to a great circle of a sphere). A and M belong to this circle; let us consider arc AjM which is the shortest arc of this circle defined by A and M (the longest is AiM). [ij] is a diameter of circle C1 perpendicular to segment [MA]. All the circles C2 centered at O2 where O2 belongs to segment [O1H] are all the circles passing through A and M, with radii less thas the radius of C1 and for which the arc supported by C2 between A and M passing by l (not on the half plane defined by (AM) and O1) is shorter than the other arc AkM. The other cases are obtained when O2 belongs to the segment symmetric of [O1H] with respect to H. Note that, when O2 moves from O1 to H, circle C2 moves from circle C1 to the circle with diameter [AM]. We can notice, thanks to this interpretation that, the length of arcs AlM are greater than the length of arc AjM. As the length of arc AiM is greater than the one of AlM, all arcs defined by vertices A and M on a sphere are longer than arc AM included in a great circle, arc AM being the shortest of the two arcs defined by A and M on such great circle. Figure 6: Plane proof of the minimization of the length of an arc Finally, we can give the definition of a segment of a sphere which vertices are two given points of this sphere. Definition 1: A segment between two points of a sphere is the shortest arc defined by these vertices on the great circle containing these points and the center of the sphere. We can also deduce a construction of such an arc (Figure 6 right): if A and M are two given points of a given sphere S centered at O, the spherical segment S(AM) is the arc of the sphere defined by AjM where j is the intersection point between ray [Ou) and sphere S with u midpoint of segment [AM] Definition 2: the spherical line defined by two distinct points of a sphere is the great circle containing these two points. Notation: Spherical line (AB) noted SL(AB). Such a spherical line contains the spherical segment S(AB) and the other arc limited by A and B: let us call this arc, second spherical segment SS(AB). Let us remark that the extension of a spherical segment of the sphere is a great circle as the extension of a segment of the plane is the infinite Euclidean line. 2.2. Spherical triangles (Figure 7) ([2’]) 2.2.1. Definition: if A, B and C are three points of a sphere, the spherical triangle is defined by the three spherical segments S(AB), S(BC) and S(CA). Remark: these spherical segments are constructed as detailed juste above and we know they are supported by three great circles (in red in Figure 7) of the sphere. These great circles are the three spherical lines SL(AB), SL(BC) and SL(CA). As three lines of a plane define one triangle, here the three spherical lines define eight spherical triangles whose vertices are three of the six points A, B, C, A’, B’ and C’ (where A’, B’ and C’ are the symmetric of points A, B and C with respect to O, center of the sphere): see Figure 7 middle and Figure 7 right. Figure 7: Spherical triangles In the half plane defined by plane BCC’B’ and the point A, we have four spherical triangles: triangles ABC, AB’C’, ABC’ and ACB’. In the other half plane limited by the same plane, we have four other spherical triangles which are the symmetric of the previous ones with respect to the center of the sphere. 2.2.2. Notion of angle between two segments If A, B anc C are three points of a sphere, let us define angle 𝐵𝐴𝐶 ̂. Figure 8 left: we must consider TB and TC, respectively tangent lines to the great circles containing arc AB and arc AC (or spherical segments AB and AC). I and K are the intersection points respectively between TB and ray [Oi) and TC and ray [Ok) (O center of the sphere, i midpoint of [AB] and k midpoint of [AC]. TB is defined as the perpendicular line to [OA] in the plane containing O, A and B. It is also the tangent line at A to the great circle containing A and B. Same construction for TC. Eventually, the spherical angle S(𝐵𝐴𝐶) ̂ is defined as the plane angle 𝐼𝐴𝐾 ̂ . The two other spherical angles at B and C to the spherical triangle ABC are defined similarly (see Figure 8 middle). These angles are measured and their measurements displayed. Their sum is also displayed and we can notice that this sum is more than180°. In Figure 8 right we have redefined points A, B and C at the vertices of a quarter of half sphere: we have obtained a spherical triangle with three angles measuring each 90° (sum: 270°). See [4’]. Figure 8: Angle of two spherical segments 2.2.3. Maximum sum of the angles of a spherical triangle Let us enlarge triangle ABC until positions of A, B and C are closer and closer to a great circle but in the same half plane defined by this circle. We can notice that each angle of the triangle approaches 180°, so the sum approaches 540°. Let us show how to experiment to reach this result: In Figure 9 left, we construct a sphere centered at a point belonging to the great circle containing A and B, the circle intersection between the big sphere and the small one (the radius of the small sphere is given by a number created with the calculator of Cabri 3D and displayed: here 0.8 that can be changed at any moment) and the arc, part of this circle included in the same half plane as C (in bold red). Then, we redefine point C on this arc (Figure 9 middle). Eventually we move point C on this arc until it reaches the great circle (two positions): we can observe (Figure 9 right) that the sum displayed is 540° as each angle of the spherical triangle ABC is evaluated as 180°. Figure 9: Maximum sum of the angles of a spherical triangle 2.2.4. Area of a spherical triangle (Girard theorem) 2.2.4.1. Area of a slice: Figure 10 left displayed such a slice between two half planes P1 and P2 intersecting in line (NS) which is the line joining a point N of the sphere to S its symmetric point with respect to the center of the sphere. The angle of this slice is the angle of P1 and P2 or the angle 𝑁1𝑁𝑁2 ̂ where (NN1) is perpendicular to (NS) in P1 and (NN2) is perpenpendicular also to (NS) in P2. The area of this slice is proportional to its angle knowing that when this angle is 2𝜋, the area is the surface area of the sphere quoted in 1.1. which is 𝟒𝝅𝒓𝟐. So, the area of a slice of angle 𝜃 (between 0 and 2𝜋) in a sphere of radius r is equal to 𝜃 2𝜋. 4𝜋𝑟2. Finally, the formula simplifies to: 𝟐𝒓𝟐𝜽. 2.2.4.2. Girard theorem: ABC is a spherical triangle of a sphere of radius r. Measurements in radians of angles 𝐵𝐴𝐶 ̂, 𝐴𝐵𝐶 ̂ and 𝐵𝐶𝐴 ̂ are respectively called a, b and c (Figure 10 right). The great circles containing each side of the triangle allows us to create six slices of this sphere. In reality three pairs of two equal slices, two green equal slices bordered by the great circles of S(AB) and S(AC) (area of each slice: 2𝑟2𝑎), two blue equal slices bordered by the great circles of S(BA) and S(BC) (area of each slice: 2𝑟2𝑏) and two purple equal slices bordered by the great circles of S(CB) and S(CA) (area of each slice: 2𝑟2𝑐). If s is the area of the spherical triangle, we evaluate, in two ways, the area of the sphere: Way 1 using the known formula: 𝟒𝝅𝒓𝟐. Way 2 in adding areas of slices: 𝟐. 𝟐𝒓𝟐𝒂 2 green slices + 𝟐. 𝟐𝒓𝟐𝒃−𝟐𝒔 2 blue slices −2 areas of ABC + 𝟐. 𝟐𝒓𝟐𝒄−𝟐𝒔 2 purple slices −2 areas of ABC From the equality, 𝟐. 𝟐𝒓𝟐𝒂 + 𝟐. 𝟐𝒓𝟐𝒃−𝟐𝒔 + 𝟐.𝟐𝒓𝟐𝒄−𝟐𝒔 = 𝟒𝝅𝒓𝟐, we can deduce the area s of the spherical triangle: Area of a spherical triangle of angles a, b and c (in a sphere of radius r): s = (𝒂+ 𝒃+ 𝒄−𝝅).𝒓𝟐 Figure 10: Area of a spherical triangle 2.3. Particular lines and points of a spherical triangle (investigations) The following investigations aims to answer the question: can we expect that the known particular points of the geometry of the triangle in the plane exist in spherical geometry? That is to say: can we expect that the medians of a spherical triangle meet at the same point? The same question applies for the perpendicular bisectors, the angle bisectors and the altitudes. If yes can we expect that these points are collinear as they are in plane geometry (Euler’s line). The first problem to solve is: “the constructions of these lines in spherical geometry”. 2.3.1. Medians and centroid As displayed in Figure 11 left, we can state that the three medians intersect at the same point even if we move points A, B or C to different positions. The justification is easy (Figure 11 middle): points I, J and K are the intersections between rays [Oi), [Oj) and [Ok) with the great circle containing arcs BC, CA an AB (where i, j and k are the midpoints of segments [BC], [CA] and [BA]. So, I, J and K are the midpoints of spherical segments S(BC), S(CA) and S(AB). As we know, in triangle ABC, the medians intersect at the centroid g, necessarily, the spherical medians intersect at a same point G which is the intersection between ray [Og) and the sphere. The reason is because g is also located on the intersection of the three planes OAi, OBj and OCk which is (Og); these planes are the same as the one containing the three spherical segments S(BJ), S(CK) and S(AI). But, knowing that g is at the two thirds point of segment [Ai], angle 𝑔𝑂𝐴 ̂ is not necessarily the two thirds of angle 𝑔𝑂𝑖 ̂ and so G is not necessarily at the two thirds of spherical segment S(AI). The same remark applies for the location of G on the other spherical segments S(BJ) and S(CK). An investigation displayed on Figure 11 right confirms this remark: as the ratio between gA and gI is evaluated by 2, the ratio between angles 𝑔𝑂𝐴 ̂ and 𝑔𝑂𝑖 ̂ is evaluated by 1,36. Figure 11: Centroid of a spherical triangle 2.3.2. Perpendicular bisectors and circumscribed circle In Figure 12 left, we have constructed the three spherical perpendicular bisectors of the three sides of the spherical triangle ABC (three great circles). We can state (in fact, conjecture!) that these three spherical lines intersect at the same point c and at its symmetric point with respect to the center of the sphere. We can check (Figure 12 middle) that these two points are the centers of two spheres whose intersection is a circle containing A, B and C. This circle is the circumscribed spherical circle of the spherical triangle ABC because the three spherical arcs cA, cB and cC are equal. In Figure 12 right, we show how to construct the spherical perpendicular bisector of spherical segment S(BC) as the circle intersection between the sphere and the perpendicular bisector plane of segment [BC]. As the perpendicular bisector line of [BC] in triangle ABC belongs also to the plane of this circle, this proves the previous conjecture. Figure 12: Perpendicular bisectors and circumscribed circle 2.3.3. Angle bisectors and inscribed circle In Figure 13 left, we have conducted a construction inspired by the planar construction and we state that we are led to the same result in spherical geometry, that is to say: the three spherical bisector arcs of spherical triangle ABC (in green) intersect at the same point s which is the center of a circle tangent to each side of this spherical triangle. The radius of this circle is defined by knowing the position of h, intersection between arc BC and the great circle perpendicular to arc BC from s. Constructions of the great circle containing A (spherical bisector of spheric angle 𝐵𝐴𝐶 ̂): see Figure 13 middle. Construct first, if not already constructed, the great circles supporting arcs AB and AC (using A, b and B for the first one and A, c and C for the second one). Construct the plane perpendicular to (OA) passing through O and its circle intersection with the sphere. This circle intersects the circles supporting arcs AB and AC at B’ and C’. The perpendicular bisector plane of B’ and C’ intersects the sphere at the great circle containing A (in green). The same constructions produce three great circles of Figure 13 left. For the construction of point h (Figure 13 right), construct plane containing B, C and O and its perpendicular at O: line (NS) (N and S on the sphere). Construct the circle containing arc BC. h is the intersection between this circle and the circle containing N, s and S. s is the center of a sphere passing through h cutting the previous circle in the inscribed circle. Figure 13: Angle bisectors and inscribed circle 2.3.4. Altitudes and orthocenter In Figure 14 left we have constructed the three spherical altitudes of the spherical triangle ABC. The technique has been used in the previous paragraph to construct point h (Figure 13 right). We can state (conjecture) that these three great circles have two common points, H and H’ (symmetric point of H with respect to the center of the sphere), called orthocenters of ABC. Figure 14 middle allows to state that this conjecture is true in all cases of the figure. Proof: let us construct the two altitudes (Bb) and (Cc) intersecting at H. (Figure14 right). We know that (Bb) is the intersection between the sphere and the plane PB containing O and perpendicular to the plane (OAC). We know also that (Cc) is the intersection between the sphere and the plane PC perpendicular to the plane (OAB). The intersection line between the two planes PB and PC is line (OH). We know () that the third plane PA containing O and perpendicular to the plane (OBC) contains the line (OH). Therefore, the intersection between PA and the sphere is the third altitude of spherical triangle (ABC) which contains necessarily point H. That completes the proof. Figure 14: Altitudes and orthocenter 2.3.5. Euler’s line We know that the four previous particular points are collinear in Euclidean plane geometry. The line defined by these points is known as Euler’s line. We construct in Figure 15 these four points in spherical geometry, in using the previous techniques, and we can state very quickly that these points are not collinear. In this figure we have also constructed the spherical lines (great circles) passing through any two of these four points. None of them contain one or two other points. Figure 15: Investigations for a spherical Euler’s line 3. Stereographic projection and inversion 3.1. Stereographic projection (definition, investigations) Definition: Let’s consider a sphere (S) and two points U and D such that [UD] is a diameter of the sphere (Figure 16 left). Let’s consider plane (P) tangent to this sphere at D. If M is a point of (S) different from U, its stereographic projection with repect to (S) is the point M’ of (P), intersection of ray [UM) and (P). Investigation: Let’s consider now a circle (C) of this sphere, defined as the intersection between (S) and another sphere (T) centered at a point t of (S) (be careful! the radius of the sphere (T) is not the radius of (C)). See Figure 16 middle and [3’]. To construct the image of circle (C) by the previous stereographic projection, we construct first the cone defined by point U and circle (C) and then we display the intersection between this cone and plane (P). We can state (Figure 16 right) that this image (C’) seems to be a circle. Cabri 3D says that this intersection curve is a “circular ellipse”. To corroborate this conjecture, we construct a circle passing through three points of curve (C’) and note that this circle seems to be superimposed to (C’) even if we change the radius of (C) or the position of the center t of sphere (T): you can notice in Figure 16 right that two sliders to command these possible modifications have been created. See [5’]. Figure 16: Stereographic projection of a circle 3.2. Image of a circle by a stereographic projection (proof) In order to prove easily that the image of a circle by a stereographic projection is another circle, we will prove first that any sterographic projection is nothing else than an inversion. As shown in Figure 17 left, we conduct our reasoning in plane (Q) (the plane containing (UD) and M and by the way M’). The red circle is the one with diameter [UD] and passing through M. The two triangles DUM’ and MUD are two similar right-angle triangles, therefore: 𝑈𝐷 𝑈𝑀′ = 𝑈𝑀 𝑈𝐷 and finally UM.UM’ = UD2. This last equality means that M’ is the image of M by the inversion centered at U with scale of UD2 or, which is the same thing, M’ is the image of M by the inversion of the sphere centered at U of radius UD. As we know that the image of a circle (which does not contain the center of the inversion) is a circle by any inversion, we have established the result previously conjectured. See [6’]. Figure 17: Stereographic projection and inversion 3.3. A nice dynamic consequence (inspired by Professor Chuan) In Figure 17 middle, we construct a first circle with a little sphere centere at c1. On this circle we create a point p1 that can be animated. Then, we create the equatorial circle containing c1 and p1. With the same technique we create a second circle (with a sphere centered at c2 on the equatorial circle) passing through p1 and by the way tangent to the first circle. We iterate the process to create three other circles with the fifth one tangent to both the fourth one and the first one. We need a trick to find the position of c5. c5 is the intersection point between the ray [si) and the equatorial circle (s is the center of the big initial sphere and i the midpoint of segment [p5 p1]). When p1 is animated along the first circle, the four other circles are animated on the initial sphere. If we transform these five circles by the stereographic projection of the given sphere with respect to the north pole or with the inversion of the sphere centered at the north pole and passing through the south pole, we obtain five tangent circles of the horizontal plane (Figure 17 right). You can observe that the images of points c1, c2, c3, c4 and c5 are not the centers of the images of the five circles of the sphere. But we use these images to create flat cones that can be coloured as shown in Figure 18. See [7’]. Figure 18: Five animated tangent circles 4. Conclusion The aim of this paper was not at all to present new results about spherical geometry which is a subject that has given rise to a large number of very technical productions, especially in spherical trigonometry. Instead, the aim was to show an approach of spherical geometry that can convince teachers of the power of dynamic geometry to understand notions deemed difficult to teach. The last part related to stereographic projection aimed to show the powerful link with the notion of inversion and the possibilities of creating animations in the plane thanks to simple spherical constructions. References FGM, 1920, Théorème 653-1785 p. 870 in Exercices de Géométrie, Sixième Edition, Éditions Jacques Gabay 1991 POLYA G., 1945, How to solve it, Princeton, University Press LAKATOS I., 1984, Preuves et réfutations Essai sur la logique de la découverte, Hermann, DAHAN J.J., 2002, How to teach Mathematics in showing all the hidden stages of a true research. Examples with Cabri, in Proceedings of ATCM 2002, Melaka, Malaysia DAHAN J.J., 2005, La démarche de découverte expérimentalement médiée par Cabri-géomètre en mathématiques, PhD thesis, Université Joseph Fourier, Grenoble, France YouTube videos links (videos in French) [1’] Video of YouTube channel « jjdahan »: Droite et segment en géométrie sphérique [2’] Video of YouTube channel « jjdahan »: Triangle en géométrie sphérique [3’] Video of YouTube channel « jjdahan »: Cercle en géométrie sphérique [4’] Video of YouTube channel « jjdahan »: Triangle rectangle en géométrie sphérique [5’] Video of YouTube channel « jjdahan »: Projection stéréographique d’un cercle [6’] Video of YouTube channel « jjdahan »: Lien projection stéréographique inversion [7’] Video of YouTube channel « jjdahan »: Cercles tangents et projection stéréographique Software Cabri 3D by Cabrilog at |
10565 | https://artofproblemsolving.com/wiki/index.php/1999_AIME_Problems/Problem_14?srsltid=AfmBOoqtR5AdC1oHjwDJz1rWTIFapPasViy68x2jTlty1jZGIH7Y1HLk | Art of Problem Solving
1999 AIME Problems/Problem 14 - AoPS Wiki
Art of Problem Solving
AoPS Online
Math texts, online classes, and more
for students in grades 5-12.
Visit AoPS Online ‚
Books for Grades 5-12Online Courses
Beast Academy
Engaging math books and online learning
for students ages 6-13.
Visit Beast Academy ‚
Books for Ages 6-13Beast Academy Online
AoPS Academy
Small live classes for advanced math
and language arts learners in grades 2-12.
Visit AoPS Academy ‚
Find a Physical CampusVisit the Virtual Campus
Sign In
Register
online school
Class ScheduleRecommendationsOlympiad CoursesFree Sessions
books tore
AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates
community
ForumsContestsSearchHelp
resources
math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten
contests on aopsPractice Math ContestsUSABO
newsAoPS BlogWebinars
view all 0
Sign In
Register
AoPS Wiki
ResourcesAops Wiki 1999 AIME Problems/Problem 14
Page
ArticleDiscussionView sourceHistory
Toolbox
Recent changesRandom pageHelpWhat links hereSpecial pages
Search
1999 AIME Problems/Problem 14
Problem
Point is located inside triangle so that angles and are all congruent. The sides of the triangle have lengths and and the tangent of angle is where and are relatively prime positive integers. Find
Contents
1 Problem
2 Solution
2.1 Solution 1
2.2 Solution 2
2.3 Solution 3
2.4 Solution 4 (Law of sines)
3 See also
Solution
Solution 1
Drop perpendiculars from to the three sides of and let them meet and at and respectively.
Let and . We have that We can then use the tool of calculating area in two ways On the other hand, We still need though. We have all these right triangles and we haven't even touched Pythagoras. So we give it a shot: Adding gives Recall that we found that . Plugging in , we get , giving us for an answer.
Solution 2
Let , , , , , and .
So by the Law of Cosines, we have: Adding these equations and rearranging, we have: Now , by Heron's formula.
Now the area of a triangle, , where and are sides on either side of an angle, . So, Adding these equations yields: Dividing by , we have: Thus, .
Note: In fact, this problem is unfairly easy to those who happen to have learned about Brocard point. The Brocard Angle is given by
Solution 3
Let Then, using Law of Cosines on the three triangles containing vertex we have Add the three equations up and rearrange to obtain Also, using we have Divide the two equations to obtain
Solution 4 (Law of sines)
Firstly, denote angles , , and as , , and respectively. Let . Notice that by angle chasing that and . Using the nice properties of the 13-14-15 triangle, we have and . is easily computed, so we have .
Using Law of Sines, hence, Now, computation carries the rest. Extracting yields .
See also
Brocard point
1999 AIME (Problems • Answer Key • Resources)
Preceded by
Problem 13Followed by
Problem 15
1•2•3•4•5•6•7•8•9•10•11•12•13•14•15
All AIME Problems and Solutions
These problems are copyrighted © by the Mathematical Association of America, as part of the American Mathematics Competitions.
Retrieved from "
Category:
Intermediate Geometry Problems
Art of Problem Solving is an
ACS WASC Accredited School
aops programs
AoPS Online
Beast Academy
AoPS Academy
About
About AoPS
Our Team
Our History
Jobs
AoPS Blog
Site Info
Terms
Privacy
Contact Us
follow us
Subscribe for news and updates
© 2025 AoPS Incorporated
© 2025 Art of Problem Solving
About Us•Contact Us•Terms•Privacy
Copyright © 2025 Art of Problem Solving
Something appears to not have loaded correctly.
Click to refresh. |
10566 | https://en.wikipedia.org/wiki/List_of_logic_symbols | Jump to content
Search
Contents
1 Basic logic symbols
2 Advanced or rarely used logical symbols
3 See also
4 References
5 Further reading
6 External links
List of logic symbols
العربية
Español
Français
Galego
한국어
Hrvatski
Italiano
Latina
Lietuvių
Македонски
日本語
Português
Русский
Svenska
ไทย
Українська
中文
Edit links
Article
Talk
Read
Edit
View history
Tools
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Print/export
Download as PDF
Printable version
In other projects
Wikimedia Commons
Wikidata item
Appearance
From Wikipedia, the free encyclopedia
List of symbols used to express logical relations
This article contains logic symbols. Without proper rendering support, you may see question marks, boxes, or other symbols instead of logic symbols.
In logic, a set of symbols is commonly used to express logical representation. The following table lists many common symbols, together with their name, how they should be read out loud, and the related field of mathematics. Additionally, the subsequent columns contains an informal explanation, a short example, the Unicode location, the name for use in HTML documents, and the LaTeX symbol.
Basic logic symbols
[edit]
| Symbol | Unicodevalue(hexadecimal) | HTMLcodes | LaTeXsymbol | Logic Name | Read as | Category | Explanation | Examples |
--- --- --- ---
| ⇒→⊃ | U+21D2U+2192U+2283 | ⇒→⊃ ⇒→⊃ | \Rightarrow\implies \to or \rightarrow\supset | material conditional (material implication) | implies, if P then Q, it is not the case that P and not Q | propositional logic, Boolean algebra, Heyting algebra | is false when A is true and B is false but true otherwise.In other mathematical contexts, see glossary of mathematical symbols, may indicate the domain and codomain of a function and may mean superset. | is true, but is in general false (since x could be −2). |
| ⇔↔≡ | U+21D4U+2194U+2261 | ⇔↔≡ ⇔↔≡ | \Leftrightarrow\iff\leftrightarrow\equiv | material biconditional (material equivalence) | if and only if, iff, xnor | propositional logic, Boolean algebra | is true only if both A and B are false, or both A and B are true. Whether a symbol means a material biconditional or a logical equivalence, depends on the author’s style. | |
| ¬~! ′ | U+00ACU+007EU+0021U+2032 | ¬˜!′ ¬˜!′ | \lnot or \neg\sim ' | negation | not | propositional logic, Boolean algebra | The statement is true if and only if A is false.A slash placed through another operator is the same as placed in front. The prime symbol is placed after the negated thing, e.g. | |
| ∧·& | U+2227U+00B7U+0026 | ∧·& ∧·& | \wedge or \land\cdot \& | logical conjunction | and | propositional logic, Boolean algebra | The statement A ∧ B is true if A and B are both true; otherwise, it is false. | n < 4 ∧ n >2 ⇔ n = 3 when n is a natural number. |
| ∨+∥ | U+2228U+002BU+2225 | ∨+∥ ∨+∥ | \lor or \vee\parallel | logical (inclusive) disjunction | or | propositional logic, Boolean algebra | The statement A ∨ B is true if A or B (or both) are true; if both are false, the statement is false. | n ≥ 4 ∨ n ≤ 2 ⇔ n ≠ 3 when n is a natural number. |
| ⊕⊻↮≢ | U+2295U+22BBU+21AEU+2262 | ⊕⊻↮≢ ⊕⊻—≢ | \oplus\veebar\not\equiv | exclusive disjunction | xor, either ... or ... (but not both) | propositional logic, Boolean algebra | The statement is true when either A or B, but not both, are true. This is equivalent to ¬(A ↔ B), hence the symbols and . | is always true and is always false (if vacuous truth is excluded). |
| ⊤T1 | U+22A4 | ⊤ ⊤ | \top | true (tautology) | top, truth, tautology, verum, full clause | propositional logic, Boolean algebra, first-order logic | denotes a proposition that is always true. | The proposition is always true since at least one of the two is unconditionally true. |
| ⊥F0 | U+22A5 | ⊥ ⊥ | \bot | false (contradiction) | bottom, falsity, contradiction, falsum, empty clause | propositional logic, Boolean algebra, first-order logic | denotes a proposition that is always false. The symbol ⊥ may also refer to perpendicular lines. | The proposition is always false since at least one of the two is unconditionally false. |
| ∀() | U+2200 | ∀ ∀ | \forall | universal quantification | given any, for all, for every, for each, for any | first-order logic | or says “given any , has property .” | |
| ∃ | U+2203 | ∃ ∃ | \exists | existential quantification | there exists, for some | first-order logic | says “there exists an (at least one) such that has property .” | n is even. |
| ∃! | U+2203 U+0021 | ∃ ! ∃! | \exists ! | uniqueness quantification | there exists exactly one | first-order logic (abbreviation) | says “there exists exactly one such that has property .” Only and are part of formal logic. is an abbreviation for | |
| ( ) | U+0028 U+0029 | ( ) () | ( ) | precedence grouping | parentheses; brackets | almost all logic syntaxes, as well as metalanguage | Perform the operations inside the parentheses first. | (8 ÷ 4) ÷ 2 = 2 ÷ 2 = 1, but 8 ÷ (4 ÷ 2) = 8 ÷ 2 = 4. |
| | U+1D53B | 𝔻 𝔻 | \mathbb{D} | domain of discourse | domain of discourse | metalanguage (first-order logic semantics) | | |
| ⊢ | U+22A2 | ⊢ ⊢ | \vdash | syntactic consequence | proves, syntactically entails (single) turnstile | metalanguage (metalogic) | says “ is a theorem of ”. In other words, proves via a deductive system. | (eg. by using natural deduction) |
| ⊨ | U+22A8 | ⊨ ⊨ | \vDash, \models | semantic consequence or satisfaction | (semantically) entails or satisfies, models double turnstile | metalanguage (metalogic) | says “in every model, it is not the case that is true and is false”. says a formula is true in a model with variable assignment . | (eg. by using truth tables) |
| ≡⟚⇔ | U+2261U+27DAU+21D4 | ≡ —⇔ ≡ — ⇔ | \equiv\Leftrightarrow | logical equivalence | is logically equivalent to | metalanguage (metalogic) | It’s when and . Whether a symbol means a material biconditional or a logical equivalence, depends on the author’s style. | |
| ⊬ | U+22AC | | ⊬\nvdash | | does not syntactically entail (does not prove) | metalanguage (metalogic) | says “ is not a theorem of ”. In other words, is not derivable from via a deductive system. | |
| ⊭ | U+22AD | | ⊭\nvDash | | does not semantically entail | metalanguage (metalogic) | says “ does not guarantee the truth of ”. In other words, does not make true. | |
| □ | U+25A1 | | \Box | necessity (in a model) | box; it is necessary that | modal logic | modal operator for “it is necessary that”in alethic logic, “it is provable that”in provability logic, “it is obligatory that”in deontic logic, “it is believed that”in doxastic logic. | says “it is necessary that everything has property ” |
| ◇ | U+25C7 | | \Diamond | possibility (in a model) | diamond;it is possible that | modal logic | modal operator for “it is possible that”, (in most modal logics it is defined as “¬□¬”, “it is not necessarily not”). | says “it is possible that something has property ” |
| ∴ | U+2234 | | ∴\therefore | therefore | therefore | metalanguage | abbreviation for “therefore”. | |
| ∵ | U+2235 | | ∵\because | because | because | metalanguage | abbreviation for “because”. | |
| ≔≜≝ | U+2254U+225CU+225D | ≔ ≔ | ≔ \coloneqq:=\triangleq \stackrel{ \scriptscriptstyle \mathrm{def}}{=} | definition | is defined as | metalanguage | means "from now on, is defined to be another name for ." This is a statement in the metalanguage, not the object language. The notation may occasionally be seen in physics, meaning the same as . | |
| ↑| ⊼ | U+2191U+007C U+22BC | | \uparrow | Sheffer stroke, NAND | NAND, not both up arrow | Propositional logic | NAND is the negation of conjunction so is true if and only if it's not the case that both A and B are true. See also NAND gate | |
| ↓ ⊽ | U+2193 U+22BC | | \downarrow | Peirce Arrow, NOR | nor down arrow | Propositional logic | NOR is the negation of conjunction so is true if and only both A and B are false. See also NOR gate | |
Advanced or rarely used logical symbols
[edit]
The following symbols are either advanced and context-sensitive or very rarely used:
| Symbol | Unicodevalue(hexadecimal) | HTMLvalue(decimal) | HTMLentity(named) | LaTeXsymbol | Logic Name | Read as | Category | Explanation |
--- --- --- ---
| ⥽ | U+297D | | | \strictif | right fish tail | | | Sometimes used for “relation”, also used for denoting various ad hoc relations (for example, for denoting “witnessing” in the context of Rosser's trick). The fish tail is also used as strict implication by C.I.Lewis ⥽ . |
| ̅ | U+0305 | | | | combining overline | | | Used format for denoting Gödel numbers. Using HTML style “4̅” is an abbreviation for the standard numeral “SSSS0”. It may also denote a negation (used primarily in electronics). |
| ⌜⌝ | U+231CU+231D | | | \ulcorner \urcorner | top left cornertop right corner | | | Corner quotes, also called “Quine quotes”; for quasi-quotation, i.e. quoting specific context of unspecified (“variable”) expressions; also used for denoting Gödel number; for example “⌜G⌝” denotes the Gödel number of G. (Typographical note: although the quotes appears as a “pair” in unicode (231C and 231D), they are not symmetrical in some fonts. In some fonts (for example Arial) they are only symmetrical in certain sizes. Alternatively the quotes can be rendered as ⌈ and ⌉ (U+2308 and U+2309) or by using a negation symbol and a reversed negation symbol ⌐ ¬ in superscript mode.) |
| ∄ | U+2204 | | | \nexists | there does not exist | | | Strike out existential quantifier. “¬∃” used some times instead. |
| ⊙ | U+2299 | | | \odot | circled dot operator | | | A sign for the XNOR operator (material biconditional and XNOR are the same operation). |
| ⟛ | U+27DB | | | | left and right tack | | | “Proves and is proved by”. |
| ⊩ | U+22A9 | | | | forces | | | One of this symbol’s uses is to mean “truthmakes” in the truthmaker theory of truth. It is also used to mean “forces” in the set theory method of forcing. |
| ⟡ | U+27E1 | | | | white concave-sided diamond | never | modal operator | |
| ⟢ | U+27E2 | | | | white concave-sided diamond with leftwards tick | was never | modal operator | |
| ⟣ | U+27E3 | | | | white concave-sided diamond with rightwards tick | will never be | modal operator | |
| ⟤ | U+25A4 | | | | white square with leftwards tick | was always | modal operator | |
| ⟥ | U+25A5 | | | | white square with rightwards tick | will always be | modal operator | |
| ⋆ | U+22C6 | | | | star operator | | | May sometimes be used for ad-hoc operators. |
| ⌐ | U+2310 | | | | reversed not sign | | | |
| ⨇ | U+2A07 | | | | two logical AND operator | | | |
See also
[edit]
Philosophy portal
Glossary of logic
Józef Maria Bocheński
List of notation used in Principia Mathematica
List of mathematical symbols
Logic alphabet, a suggested set of logical symbols
Logic gate § Symbols
Logical connective
Mathematical operators and symbols in Unicode
Non-logical symbol
Polish notation
Truth function
Truth table
Wikipedia:WikiProject Logic/Standards for notation
References
[edit]
^ "Named character references". HTML 5.1 Nightly. W3C. Retrieved 9 September 2015.
^ Virtually all Turkish high school math textbooks use p' for negation due to the books handed out by the Ministry of National Education representing it as p'.
^ Although this character is available in LaTeX, the MediaWiki TeX system does not support it.
^ Quine, W.V. (1981): Mathematical Logic, §6
^ Hintikka, Jaakko (1998), The Principles of Mathematics Revisited, Cambridge University Press, p. 113, ISBN 9780521624985.
Further reading
[edit]
Józef Maria Bocheński (1959), A Précis of Mathematical Logic, trans., Otto Bird, from the French and German editions, Dordrecht, South Holland: D. Reidel.
External links
[edit]
Named character entities in HTML 4.0
| v t e Common logical symbols |
| | | | | | | | | | | | | | | | | --- --- --- --- --- --- --- | ∧ or & and | ∨ or | ¬ or ~ not | → implies | ⊃ implies,superset | ↔ or ≡ iff | | nand | ∀ universalquantification | ∃ existentialquantification | ⊤ true,tautology | ⊥ false,contradiction | ⊢ entails,proves | ⊨ entails,therefore | ∴ therefore | ∵ because | |
| Philosophy portal Mathematics portal |
| v t e Logic |
| |
| Major fields | Computer science Formal semantics (natural language) Inference Philosophy of logic Proof Semantics of logic Syntax | | | --- | | Logics | Classical Informal + Critical thinking + Reason Mathematical Non-classical Philosophical | | Theories | Argumentation Metalogic Metamathematics Set | |
| Foundations | Abduction Analytic and synthetic propositions Antecedent Consequent Contradiction + Paradox + Antinomy Deduction Deductive closure Definition Description Dichotomy Entailment + Linguistic Form Induction Logical truth Name Necessity and sufficiency Premise Probability Proposition Reference Statement Substitution Truth Validity |
| Lists | | | | --- | | Topics | Mathematical logic Boolean algebra Set theory | | Other | Logicians Rules of inference Paradoxes Fallacies Logic symbols | |
| Category Outline Portal WikiProject changes |
| v t e Common mathematical notation, symbols, and formulas |
| | Lists of Unicode and LaTeX mathematical symbols | | List of mathematical symbols by subject Glossary of mathematical symbols List of logic symbols | |
| | Lists of Unicode symbols | | | | | --- | | General | List of Unicode characters Unicode block | | Alphanumeric | Mathematical Alphanumeric Symbols Blackboard bold Letterlike Symbols Symbols for zero | | Arrows and Geometric Shapes | Arrows Miscellaneous Symbols and Arrows Geometric Shapes (Unicode block) | | Operators | Mathematical operators and symbols Mathematical Operators (Unicode block) | | Supplemental Math Operators | Supplemental Mathematical Operators Number Forms | | Miscellaneous | A B Technical ISO 31-11 (Mathematical signs and symbols for use in physical sciences and technology) | | |
| | Typographical conventions and notations | | | | | --- | | Language | APL syntax and symbols | | Letters | Diacritic Letters in STEM + Greek letters in STEM + Latin letters in STEM | | Notation | Mathematical notation Abbreviations Notation in probability and statistics List of common physics notations | | |
| | Meanings of symbols | | Glossary of mathematical symbols List of mathematical constants Physical constants Table of mathematical symbols by introduction date List of typographical symbols and punctuation marks | |
Retrieved from "
Categories:
Mathematical notation
Logic symbols
Hidden categories:
Articles with short description
Short description is different from Wikidata
List of logic symbols
Add topic |
10567 | https://en.wikipedia.org/wiki/Posterior_cerebral_artery_syndrome | Jump to content
Search
Contents
(Top)
1 Signs and symptoms
2 Diagnosis
3 Treatment
4 References
5 External links
Posterior cerebral artery syndrome
العربية
Edit links
Article
Talk
Read
Edit
View history
Tools
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Print/export
Download as PDF
Printable version
In other projects
Wikidata item
Appearance
From Wikipedia, the free encyclopedia
Type of reduced brain function due to blood clotting
Medical condition
| Posterior cerebral artery syndrome |
| Outer surface of cerebral hemisphere, showing areas supplied by cerebral arteries. (Yellow is region supplied by posterior cerebral artery.) |
| Specialty | Neurology |
| Diagnostic method | CT brain to r/o hemorrhagic cause. MRI is gold standard. |
| Treatment | Complementary therapies and rehabilitation removal of mechanical interference is also relevant through diagnostic imaging techniques. |
Posterior cerebral artery syndrome is a condition whereby the blood supply from the posterior cerebral artery (PCA) is restricted, leading to a reduction of the function of the portions of the brain supplied by that vessel: the occipital lobe, the inferomedial temporal lobe, a large portion of the thalamus, and the upper brainstem and midbrain.
This event restricts the flow of blood to the brain in a near-immediate fashion. The blood hammer is analogous to the water hammer in hydrology, and consists of a sudden increase of the upstream blood pressure in a blood vessel when the bloodstream is abruptly blocked by vessel obstruction. Complete understanding of the relationship between mechanical parameters in vascular occlusions is a critical issue, which can play an important role in the future diagnosis, understanding and treatment of vascular diseases.
Depending upon the location and severity of the occlusion, signs and symptoms may vary within the population affected with PCA syndrome. Blockages of the proximal portion of the vessel produce only minor deficits due to the collateral blood flow from the opposite hemisphere via the posterior communicating artery. In contrast, distal occlusions result in more serious complications. Visual deficits, such as agnosia, prosopagnosia or cortical blindness (with bilateral infarcts) may be a product of ischemic damage to occipital lobe. Occlusions of the branches of the PCA that supply the thalamus can result in central post-stroke pain and lesions to the subthalamic branches can produce “a wide variety of deficits”.
Left posterior cerebral artery syndrome presents alexia without agraphia; the lesion is in the splenium of the corpus callosum.
Signs and symptoms
[edit]
Peripheral Territory Lesions
Contralateral homonymous hemianopsia
cortical blindness with bilateral involvement of the occipital lobe branches
visual agnosia
prosopagnosia
dyslexia, Anomic aphasia, color naming and discrimination problems
memory defect
topographic disorientation
Central Territory Lesions
central post-stroke (thalamic) pain: spontaneous pain, dysesthesias and sensory impairments
involuntary movements: chorea, intention tremor, hemiballismus
contralateral hemiplegia
Weber’s syndrome: occulomotor nerve palsy
Bálint's syndrome: loss of voluntary eye movements optic ataxia, asimultagnosia (inability to understand visual objects)
Diagnosis
[edit]
1.CT 2.MRI
Treatment
[edit]
| |
| This section is empty. You can help by adding to it. (March 2018) |
References
[edit]
^ a 0-8036-1247-8
^ Tazraei, P.; Riasi, A.; Takabi, B. (2015). "The influence of the non-Newtonian properties of blood on blood-hammer through the posterior cerebral artery". Mathematical Biosciences. 264: 119–127. doi:10.1016/j.mbs.2015.03.013. PMID 25865933.
^ The Internet Stroke Center. Stroke syndromes: Posterior cerebral artery - unilateral occipital. [Internet]. [updated 1999 July; cited 2011 May 13]. Retrieved from
^ The Internet Stroke Center. Stroke syndromes: Cortical blindness. [Internet]. [updated 1999 July; cited 2011 May 13]. Retrieved from
^ The Internet Stroke Center. Stroke syndromes: Weber's syndrome. [Internet]. [updated 1999 July; cited 2011 May 13]. Retrieved from
^ The Internet Stroke Center. Stroke syndromes: Balint Syndrome. [Internet]. [updated 1999 July; cited 2011 May 13]. Retrieved from
External links
[edit]
| | |
--- |
| Classification | D ICD-10: G46.2 MeSH: D020762 SNOMED CT: 195211003 |
| External resources | eMedicine: article/2128100 |
| v t e Cerebrovascular diseases including stroke |
| Ischaemic stroke | | | | --- | | Brain | Anterior cerebral artery syndrome Middle cerebral artery syndrome Posterior cerebral artery syndrome Amaurosis fugax Moyamoya disease Dejerine–Roussy syndrome Watershed stroke Lacunar stroke | | Brain stem | Brainstem stroke syndrome Medulla + Medial medullary syndrome + Lateral medullary syndrome Pons + Medial pontine syndrome / Foville's + Lateral pontine syndrome / Millard-Gubler Midbrain + Weber's syndrome + Benedikt syndrome + Claude's syndrome | | Cerebellum | Cerebellar stroke syndrome | | Extracranial arteries | Carotid artery stenosis precerebral Anterior spinal artery syndrome Vertebrobasilar insufficiency + Subclavian steal syndrome | | Classification | Brain ischemia Cerebral infarction Classification + Transient ischemic attack + Total anterior circulation infarct + Partial anterior circulation infarct | | Other | CADASIL Binswanger's disease Transient global amnesia | |
| Haemorrhagic stroke | | | | --- | | Extra-axial | Epidural Subdural Subarachnoid | | Cerebral/Intra-axial | Intraventricular | | Brainstem | Duret haemorrhages | | General | Intracranial hemorrhage | |
| Aneurysm | Intracranial aneurysm + Charcot–Bouchard aneurysm |
| Other | Cerebral vasculitis Cerebral venous sinus thrombosis |
| v t e Signs and symptoms, and syndromes associated with lesions of the brain and brainstem |
| Cerebral cortex | ACA syndrome MCA syndrome PCA syndrome Aphasia Frontal lobe + Expressive aphasia + Abulia Parietal lobe + Receptive aphasia + Hemispatial neglect + Gerstmann syndrome + Astereognosis Occipital lobe + Bálint's syndrome + Cortical blindness + Anton syndrome + Pure alexia Temporal lobe + Cortical deafness + Prosopagnosia |
| Subcortex | Basal ganglia + Chorea + Dystonia + Parkinson's disease Thalamic syndrome |
| Cerebellum | Lateral + Dysmetria + Dysdiadochokinesia + Intention tremor Medial + Cerebellar ataxia |
| Brainstem | | | | --- | | Medulla | Lateral medullary syndrome/Wallenberg + PICA Medial medullary syndrome/Dejerine + ASA | | Pons | Upper dorsal pontine syndrome/Raymond–Céstan syndrome Lateral pontine syndrome (AICA) (lateral) Medial pontine syndrome/Millard–Gubler syndrome/Foville's syndrome (basilar) Locked-in syndrome Internuclear ophthalmoplegia One and a half syndrome | | Midbrain | Weber's syndrome + ventral peduncle, PCA Benedikt syndrome + ventral tegmentum, PCA Parinaud's syndrome + dorsal, tumor Claude's syndrome | | Other | Alternating hemiplegia | |
| Other | Pseudobulbar affect Upper motor neuron lesion |
Retrieved from "
Categories:
Types of stroke
Syndromes
Hidden categories:
Articles with short description
Short description is different from Wikidata
Articles to be expanded from March 2018
All articles to be expanded
Articles with empty sections from March 2018
All articles with empty sections
Posterior cerebral artery syndrome
Add topic |
10568 | https://cosenzaassociates.com/wp-content/uploads/2020/03/7.12A_Comparative-Box-Plots.pdf | © Cosenza & Associates, LLC 162 GRADE 7 TEKS COMPANION GUIDE TELL ME MORE… A box plot (also called a box-and-whiskers plot) shows you how spread out the data values in the set are. Box plots have a box that shows the middle half of the data set, or the half of the data that lies between the first quartile and third quartile. Each end has a whisker that shows you the lower fourth (between the minimum value and first quartile) and upper fourth (between the third quartile and maximum value) of the data set. The five values that are used to construct a box plot are often called the five number summary of a data set. For large data sets, technology is useful for calculating these values.
The football team at Lyndon Johnson Middle School played 11 games last season. The number of points the team scored in each game is shown in the following list.
12, 28, 40, 6, 24, 16, 20, 21, 14, 22, 36 You can represent the data set with a box plot. First, you will need to determine the median, first quartile, and third quartile. To help with calculating these values, list the data set in order from least to greatest.
6, 12, 14, 16, 20, 21, 22, 24, 28, 36, 40 If you have two data sets, you can construct a box plot for each data set. Then, you can use the comparative box plots in order to compare the characteristics of the two data sets.
The student is expected to compare two groups of numeric data using comparative dot plots or box plots by comparing their shapes, centers, and spreads.
COMPARATIVE BOX PLOTS 7.12A Five Number Summary • Minimum: the least value in a data set • First Quartile: the number for which 25% of the data values are less than • Median: the number for which 50% of the data values are less than and 50% of the data values are greater than • Third Quartile: the number for which 75% of the data values are less than • Maximum: the greatest value in a data set © Cosenza & Associates, LLC DATA ANALYSIS AND PERSONAL FINANCIAL LITERACY 163 DATA ANALYSIS AND PERSONAL FINANCIAL LITERACY 163 EXAMPLES EXAMPLE 1: The comparative box plots below show the average high temperatures for Boston, Massachusetts, and Dallas, Texas. How do the interquartile range and median of the two data sets compare?
STEP 1 Estimate the interquartile range for each data set. n The interquartile range is the difference between the first quartile and third quartile. n In a box plot, the interquartile range is the width of the box. The interquartile range for Boston is about 29°F. The interquartile range for Dallas is about 23°F.
STEP 2 Compare the values for both interquartile ranges. n 29 is greater than 23. The interquartile range for Boston’s median monthly high temperature is greater than the interquartile range for Dallas’s median monthly high temperature.
74 – 45 = 29 90 – 67 = 23 YOU TRY IT!
The box plots show data about the ratings of the movies that are in Mateo’s movie collection, sorted by genre. Compare the range and interquartile range of the two data sets.
Drama: Range: _ − _ = _ Interquartile range: _ − = __ Comedy: Range: _ − _ = _ Interquartile range: _ − = Fill in the blank with greater than, less than, or equal to.
The range for dramas is _ the range for comedies. The interquartile range for dramas is _____ the interquartile range for comedies.
© Cosenza & Associates, LLC 164 GRADE 7 TEKS COMPANION GUIDE STEP 3 Estimate the median temperature for both data sets. n The median in a box plot is represented by the vertical line inside the box The median monthly high temperature for Boston is 60°F. The median monthly high temperature for Dallas is about 79°F.
STEP 4 Compare the values for both medians. n 60 is less than 79. The median monthly high temperature for Boston is less than the median monthly high temperature for Dallas.
EXAMPLE 2: The comparative box plots show data about the number of wins scored by Major League Baseball® teams in the 2017 and 2018 seasons. How do the range and third quartile of each data set compare?
STEP 1 Estimate the range for each data set. n The range is the difference between the minimum value and maximum value. n In a box plot, the range is the distance between the endpoints of the two whiskers. n Estimate the maximum and minimum value for each box plot and use those values to calculate the range. The range for 2017 is about 50 wins. The range for 2018 is about 70 wins. © Cosenza & Associates, LLC STEP 2 Compare the values for both ranges. n 50 < 70 The range for 2017 is less than the range for 2018.
STEP 3 Estimate the third quartile for both data sets. n The third quartile in a box plot is represented by the right edge of the box. The third quartile for 2017 is about 90. The third quartile for 2018 is about 83.
STEP 4 Compare the values for both third quartiles. n 90 > 83 The third quartile for 2017 is greater than the third quartile for 2018.
DATA ANALYSIS AND PERSONAL FINANCIAL LITERACY 165 PRACTICE Mr. Maha’s class and Ms. Tripp’s class collected data about the number of each color of candy in a sample of bags of that candy. The box plots show data about their results. Use these box plots for questions 1-8.
Calculate the following measures for each class.
1. Interquartile range 2. Median 3. First Quartile 4. Minimum value Complete the sentences below with less than, greater than, or equal to.
5. The interquartile range for Mr. Maha’s class is __ the interquartile range for Ms. Tripp’s class.
6. The median for Mr. Maha’s class is __ the median range for Ms. Tripp’s class.
7. The first quartile for Mr. Maha’s class is __ the first quartile for Ms. Tripp’s class.
8. The minimum for Mr. Maha’s class is __ the minimum for Ms. Tripp’s class. © Cosenza & Associates, LLC 166 GRADE 7 TEKS COMPANION GUIDE A local basketball league has several teams. The box plots show data about the shoe sizes for players on two of those teams. Use these box plots for questions 9-11. Determine if the statement below is true or false. If false, rewrite it to be true.
9. The range of shoe sizes for both teams is equal.
10. The third quartile for the Spurs is greater than the third quartile for the Rockets.
11. The median for the Rockets is less than the median for the Spurs.
12. The box plots show data about the heights, in feet, of two different types of trees at a local nursery. Which statement is best supported by the information in the box plots?
A The interquartile range of heights of oak trees is less than the interquartile range of heights of pine trees.
B The range of heights of oak trees is the same as the range of heights for pine trees.
C The median height of pine trees is greater than the median height of oak trees.
D The fi rst quartile height of oak trees is less than the fi rst quartile height of pine trees.
DATA ANALYSIS AND PERSONAL FINANCIAL LITERACY 167 © Cosenza & Associates, LLC 13. The box plots show data about the ages of actors and actresses who won the Academy® Award for Best Actor or Best Actress through 2018. Which statement is best supported by the information in the box plots?
F The fi rst quartile age of Best Actor winners is less than the fi rst quartile age of Best Actress winners.
G The minimum age of Best Actor winners is less than the minimum age of Best Actress winners.
H The median age of Best Actress winners is greater than the median age of Best Actor winners.
J The range of ages of Best Actress winners is greater than the range of ages of Best Actor winners.
14. The box plots show data about the hat sizes of two diff erent baseball teams. Which statement is best supported by the information in the box plots?
A The median hat size for the Sharks is less than the median hat size for the Seals.
B The median hat size for both teams is the same.
C The interquartile range of hat sizes for both teams is the same.
D The interquartile range of hat sizes for the Sharks is greater than the interquartile range of hat sizes for the Seals. |
10569 | https://remote2.ece.illinois.edu/~erhan/FieldsWaves/secure/notes/ECE450Sp10/350lect32.pdf | 32 TM modes in dielectric waveguides • Last lecture we examined the characteristic equation and the cutoff frequencies of TE mode of propagation in dielectric slab waveguides.
z x d n2 n2 n1 > n2 θi Guidance requires θi > θc = sin−1 n2 n1 Guided TEm mode fields consisting of the superposition of transverse polarized electric fields ˜ Ei = ˆ yEoe−jk1(−cos θix+sin θiz) and ˜ Er = ˆ yEoΓTEe−jk1(cos θix+sin θiz), where ΓTE = n1 cos θi + j !
n2 1 sin2 θi −n2 2 n1 cos θi −j !
n2 1 sin2 θi −n2 2 , have 1. propagation angles θi > θc = sin−1 n2 n1 , (critical angle) 2. satisfying a characteristic equation d v1/f cos θi −m 2 = 1 π tan−1 !
sin2 θi −n2 2/n2 1 cos θi , m = 0, 1, 2, 3, · · · 3. for frequencies f exceeding the cutofffrequency fc = mc 2d !
n2 1 −n2 2 , m = 0, 1, 2, 3 · · · 1 • For a given f = 2π ω , the charcteristic equation can be solved (typically by using graphical techniques) for θi, from which we can calculate the propagation constant kz = k1 sin θi where k1 = ω v1 = ω c n1 is the wavenumber in the core region of the guide at the operation frequency ω = 2πf. It follows that the guide wavelength λg = 2π kz and 1 phase velocity vpz = ω kz = ω k1 sin θi = v1 sin θi can be obtained once θi is calculated from the characteristic equation.
• Given the kz in the core region, kx and kz outside the core region (with index n2) can be obtained by using the fact that kz is identical in both regions (why?).
• In this lecture we will continue our study of dielectric slab waveguides by examining the TM modes.
1Note that group velocity vg = v1 sin θi (in analogy with parallel plate wavegiudes) if and only if ω ≫ωc = 2πfc because of the effect of the cladding region that contains a substatial fraction on the wave energy unless ω ≫ωc — in fact for TE0 mode vg ≈v2 at frequencies much less than the cutofffrequency of TE1 mode.
2 TM modes • For the TM mode where the incident and reflected fields are taken as ˜ Hi = ˆ yHoe−jk1(−cos θix+sin θiz) and ˜ Hr = ˆ yHoRe−jk1(cos θix+sin θiz) the reflection coefficient is given as R = η1 cos θi −η2 cos θ2 η1 cos θi + η2 cos θ2 = n2 cos θi −n1 cos θ2 n2 cos θi + n1 cos θ2 .
This leads to 0.0 0.2 0.4 0.6 0.8 1.0 0.1 0.2 0.3 0.4 0.5 Graphical solution of the charac-teristic equations for TE and TM modes m = 0, 1, 2, 3 in propaga-tion and mode m = 4 in evanes-cence.
The blue and red curves depict 1 π tan−1 !
sin2 θi −n2 2/n2 1 cos θi and 1 π tan−1 !
sin2 θi −n2 2/n2 1 n2 2 n2 1 cos θi as a function of cos θi for n2 = 1 and n1 = 1.5, while the straight lines depict d v1/f cos θi −m 2 with d v1/f = 2.5 and m increasing from left to right in steps of one.
R = n2 cos θi + jn1 " n2 1 n2 2 sin2 θi −1 n2 cos θi −jn1 " n2 1 n2 2 sin2 θi −1 with ∠R = 2 tan−1 !
sin2 θi −n2 2/n2 1 n2 2 n2 1 cos θi .
Hence, in this case the guidance condition leads to the characteristic equation d v1/f cos θi −m 2 = 1 π tan−1 !
sin2 θi −n2 2/n2 1 n2 2 n2 1 cos θi , m = 0, 1, 2, 3, · · · Note that this result for the TM mode leads to the same fc expression as in TE modes.
3 Mode structures: !"#$%&'(%)%"+,,-"."/0(01%2"3%4516'"746045" ++8 !"#$%&'()+)%,+-&'()+,)./').,#0(1',(')'&'2.,-2)+-'&3)+)4!)$3'(5)) 46)$3'()/#1')(-$-&#,)%,+-&'()+,)./')$#70'.-2)+-'&35) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) !"#$ !"%$ ! $&'()$+,-.$ /')0,11 !
!" )#..'08#.-0) )#..'08#.-0) )#..'08#.-0) )#..'08#.-0) !
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!"#$ !"%$ ! $&'()$+,-.$ /')0,11 !
!" !"##$%&"#'(%!
!"##$%&"#'(%!
!"##$%&"#'(%!
!"##$%&"#'(%!
4 Acceptance cone and numerical aperture: Guidance requires The maximum acceptance angle θom defines the so-called “acceptance cone” that in-cludes all the external sig-nals incident on the dielec-tric waveguide that can cou-ple to the waveguide at the air/core interface on a constant-z plane.
θi > θc = sin−1 n2 n1 = sin−1 "ϵr2 ϵr1 and therefore “acceptence angles” from air (see the diagram below) θo < θom = sin−1 # n2 1 −n2 2 = sin−1 √ϵr1 −ϵr2 where sin θom = # n2 1 −n2 2 = √ϵr1 −ϵr2 is called numerical aperture.
5 !
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
" #$ # !
% # !
% # " % # 12#- $&,%,$)"- )+"#- )%- %2#- $'$")//,+-,+%#&4)$#-,0-&#)$2#/-52#+-%2#-)+"#-,+-),&-,0-%2#-()6,(7(-)+"#-8#&(,%%,+-7,/)+$#9-!
" # #$ # !
% # !
% # " % # :2#+-%2#-)+"#-,+-),&-#6$##/0-%2#-()6,(7(-;)"7#- +#$#00)&<- 4'&- 7,/)+$#=- %&)+0(,00,'+->"#)?)#@-,+%'-%2#-$")//,+-%)?#0-8")$#9-!"#"$%#&'( )(%#'+"%(,&)%# # # # # # # !"#"$%#)('"')&-#&+.-%# # !
!
" !
!
!
!
" " !
" " !
" #$% #$% #$% #$% " &'# " #$% " #$% %()+$&,-..,/+0(+ #$% !
" # !
!
$%& $%& # !
$& !
!
$& !
$& !
!
" " " #$% 12 &'# #$ #$% $% % # " $% $ !'"! $ $% $ !
$ !
% $ " " $% 6 |
10570 | https://www.desmos.com/calculator/whqdussp0n | Visualizing Sine and Cosine as Circular Functions | Desmos
Loading...
Visualizing Sine and Cosine as Circular Functions
Save Copy
Log In Sign Up
VISUALIZING SINE AND COSINE AS Circular FUNCTIONS
1
Click and drag the point on the unit circle to see the corresponding points the graphs of sine and cosine functions.
2
Expression 3: "T" equals 0 T=0
0 0
2 pi 2 π
3
Hidden Label: left parenthesis, cos "T" , sin "T" , right parenthesis c o s T,s i n T
[x] Label
equals=
left parenthesis, 1 , 0 , right parenthesis 1,0
4
Expression 5: left parenthesis, cos "t" , sin "t" , right parenthesis c o s t,s i n t
domain t Minimum: 0 0
less than or equal to "t" less than or equal to≤t≤
domain t Maximum: 2 pi 2 π
5
Expression 6: "y" equals cosine "x" left brace, 0 less than or equal to "x" less than or equal to 2 pi , right brace y=c o s x 0≤x≤2 π
6
Hidden Label: left parenthesis, "T" , cos "T" , right parenthesis T,c o s T
[x] Label
equals=
left parenthesis, 0 , 1 , right parenthesis 0,1
7
Hidden Label: left parenthesis, cos "T" , 0 , right parenthesis c o s T,0
[x] Label
equals=
left parenthesis, 1 , 0 , right parenthesis 1,0
8
Expression 9: "y" equals sine "x" left brace, 0 less than or equal to "x" less than or equal to 2 pi , right brace y=s i n x 0≤x≤2 π
9
Hidden Label: left parenthesis, "T" , sin "T" , right parenthesis T,s i n T
[x] Label
equals=
left parenthesis, 0 , 0 , right parenthesis 0,0
10
Hidden Label: left parenthesis, 0 , sin "T" , right parenthesis 0,s i n T
[x] Label
equals=
left parenthesis, 0 , 0 , right parenthesis 0,0
11
Expression 12: "x" equals 0 left brace, 0 less than or equal to "y" less than or equal to sin "T" , right brace x=0 0≤y≤s i n T
12
24
powered by
powered by
sin(x)
cos(x)
"x"x
"y"y
"a" squared a 2
"a" Superscript, "b" , Baseline a b
7 7
8 8
9 9
divided by÷
functions
((
))
less than<
greater than>
4 4
5 5
6 6
times×
| "a" ||a|
,,
less than or equal to≤
greater than or equal to≥
1 1
2 2
3 3
negative−
A B C
StartRoot, , EndRoot
pi π
0 0
..
equals=
positive+ |
10571 | https://www.ictp-saifr.org/wp-content/uploads/2024/10/madeira_scattering.pdf | An introduction to low-energy scattering in quantum mechanics Lucas Madeira 1 S˜ ao Carlos Institute of Physics - University of S˜ ao Paulo - Brazil ICTP-SAIFR/ExoHad School on Few-Body Physics: Nuclear Physics from QCD October 16-25, 2024 Grant 2023/04451-9 October 16, 2024 madeira@ifsc.usp.br Quantum scattering theory Numerical Procedure Examples Formal scattering theory CePOF Optics and Photonics Research Center University of S˜ ao Paulo (USP) at S˜ ao Carlos, Brazil An introduction to low-energy scattering in quantum mechanics Lucas Madeira 2 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory References Or your favorite quantum mechanics textbook: Griffiths, Sakurai, ...
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 3 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory An introduction to low-energy scattering in quantum mechanics Lucas Madeira 4 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Motivation Scattering processes are a fundamental way of experimentally probing distributions and properties of systems in several areas of physics Can you name a few examples?
Low-energy quantum scattering theory What is low-energy?
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 5 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Introduction What is scattering?
Scattering is the interaction of an object with a scattering center classical particle electromagnetic wave quantum particle scattering potential Classical view Griffiths An introduction to low-energy scattering in quantum mechanics Lucas Madeira 6 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Quantum scattering theory An introduction to low-energy scattering in quantum mechanics Lucas Madeira 7 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Introduction Quantum view An introduction to low-energy scattering in quantum mechanics Lucas Madeira 8 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Quantum scattering theory Hypotheses 1 Elastic scattering 2 Incident plane wave eik·r 3 Local and finite-ranged potential ψk(r) large r − − − →N eik·r + eikr r f(k′, k) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 9 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Quantum scattering theory Hypotheses 1 Elastic scattering 2 Incident plane wave eik·r 3 Local and finite-ranged potential ψk(r) large r − − − →N eik·r + eikr r f(k′, k) Quantum mechanics: a scattering process is described as a transition from one quantum state to another |i⟩→|f⟩ Assume |i⟩to be a plane wave |k⟩(free particle) H0|i⟩= Ei|i⟩= ℏ2k2 2m |k⟩ Scattering is taken into account by introducing a potential V(r) H = H0 + V(r) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 9 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Quantum scattering theory Quantization of the scattering states ⟨r|k⟩= Neik·r = eik·r L3/2 We must take L →∞to guarantee the continuum character of the state at the end of our calculations An introduction to low-energy scattering in quantum mechanics Lucas Madeira 10 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Quantum scattering theory More hypotheses 1 Elastic scattering 2 Incident plane wave in the z direction: eikz 3 Local, finite-ranged and spherically-symmetric potential V(r) ψk(r, θ) large r − − − →N eikz + eikr r f(θ) The finite range of the potential (and spherical symmetry) invite us to solve the Schr¨ odinger equation for V(0 < r < R) ̸= 0 and V(r > R) = 0 −ℏ2 2m∇2ψ + V(r)ψ = Eψ An introduction to low-energy scattering in quantum mechanics Lucas Madeira 11 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Partial waves expansion An introduction to low-energy scattering in quantum mechanics Lucas Madeira 12 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherical coordinates Due to the spherical symmetry of V(r), it is convenient to employ spherical coordinates −ℏ2 2m 1 r2 ∂ ∂r r2 ∂ ∂r + L2 2mr2 + V(r) ψ(r, θ, ϕ) = Eψ(r, θ, ϕ) L is the angular momentum operator L2 = −ℏ2 1 sin θ ∂ ∂θ sin θ ∂ ∂θ + 1 sin2 θ ∂2 ∂ϕ2 Its z-component is given by Lz = −iℏ∂ ∂ϕ Construct a complete set of eigenfunctions related to H, L2, and Lz Hψ(r, θ, ϕ) = Eψ(r, θ, ϕ), L2ψ(r, θ, ϕ) = l(l + 1)ℏ2ψ(r, θ, ϕ), Lzψ(r, θ, ϕ) = mℏψ(r, θ, ϕ) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 13 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherical coordinates We propose a separable solution of the form ψ(r, θ, ϕ) = Al(r)Ym l (θ, ϕ) To avoid taking the first radial derivative of Al(r), we define the “reduced” radial solution ul(r) = rAl(r) d2 dr2 + k2 −U(r) −l(l + 1) r2 ul(r) = 0 k2 = 2mE/ℏ2 U(r) = 2mV(r)/ℏ2 l(l + 1) is the “separation constant” An introduction to low-energy scattering in quantum mechanics Lucas Madeira 14 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Solution for r > R Outside the potential range R, we must solve d2 dr2 + k2 − 0 U(r) −l(l + 1) r2 ul(r) = 0 The solution for r > R can be written in terms of the spherical Bessel functions jl(x) and nl(x) ul(r) = c′ lrjl(kr) + c′′ l rnl(kr) j0(x) = sin(x) x j1(x) = sin(x) x2 −cos(x) x j2(x) = 3 sin(x) x3 −3 cos(x) x2 −sin(x) x n0(x) = −cos(x) x n1(x) = −cos(x) x2 −sin(x) x n2(x) = −3 cos(x) x3 −3 sin(x) x2 + cos(x) x An introduction to low-energy scattering in quantum mechanics Lucas Madeira 15 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherical Bessel functions j0(x) = sin(x) x j1(x) = sin(x) x2 −cos(x) x j2(x) = 3 sin(x) x3 −3 cos(x) x2 −sin(x) x n0(x) = −cos(x) x n1(x) = −cos(x) x2 −sin(x) x n2(x) = −3 cos(x) x3 −3 sin(x) x2 + cos(x) x An introduction to low-energy scattering in quantum mechanics Lucas Madeira 16 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherical Hankel functions jl(x) and nl(x) are generalized sines and cosines It is more convenient to write the solution in terms of eikx/x to represent “incoming” or “outgoing” spherical waves Similarly to eix = cos(x) + i sin(x), we define the spherical Hankel functions as h(1) l (x) = jl(x) + inl(x) h(2) l (x) = jl(x) −inl(x) h(1) 0 (x) = −ieix x h(1) 1 (x) = −eix x+i x2 h(1) 2 (x) = i eix x2+3ix−3 x3 h(2) 0 (x) = ie−ix x h(2) 1 (x) = −e−ix x−i x2 h(2) 2 (x) = −i e−ix x2−3ix−3 x3 The solution for ul(r) can be written as ul(r) = c(1) l rh(1) l (kr) + c(2) l rh(2) l (kr) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 17 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Free particle solution The free particle solution in cartesian coordinates is a plane wave eikz In spherical coordinates, eikz = eikr cos θ contains all possible values of l This can be expressed with Rayleigh’s formula: eikr cos θ = ∞ X l=0 il(2l + 1)jl(kr)Pl(cos θ) Note that only jl appears. Physically, this is due to the divergence of nl(kr) at r = 0 In terms of the spherical Hankel functions: jl(x) = h(1) l (x) + h(2) l (x) 2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 18 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Asymptotic behavior Let us analyze the asymptotic behavior (r →∞) h(1) l (x) large x − − − →(−i)l+1 eix x h(2) l (x) large x − − − →il+1 e−ix x The free-particle solution at r →∞is eikr cos θ large r − − − → ∞ X l=0 (2l + 1) 2ikr eikr −(−1)le−ikr Pl(cos θ) The first term inside the square brackets represents an outgoing spherical wave, while the second is related to an incoming spherical wave An introduction to low-energy scattering in quantum mechanics Lucas Madeira 19 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Asymptotic behavior Motivated by the expansion for eikr cos θ, we write the scattered solution for every r > R as ψ(r, θ) = N ∞ X l=0 il(2l + 1)ul(r) r Pl(cos θ) And the asymptotic behavior ψ(r, θ) large r − − − →N ∞ X l=0 (2l + 1) ikr h c(1) l eikr −(−1)lc(2) l e−ikri Pl(cos θ) (∗) Let us compare with eikr cos θ large r − − − → ∞ X l=0 (2l + 1) 2ikr eikr −(−1)le−ikr Pl(cos θ) (∗∗) (∗∗) describes the asymptotic behavior of the wave function for a plane wave without being scattered, while (∗) does the same, but in a situation where scattering could have taken place An introduction to low-energy scattering in quantum mechanics Lucas Madeira 20 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Phase shift We introduce a new quantity related to the ratio between the constants c(1) l c(2) l = Sl(k) = e2iδl(k) Expressing the asymptotic wave function in terms of the phase shift ψ(r, θ) large r − − − →N ∞ X l=0 (2l + 1) ikr c(2) l h e2iδleikr −(−1)le−ikri Pl(cos θ) Now we have everything we need to connect with the asymptotic wave function obtained before we restricted to spherically-symmetric potentials An introduction to low-energy scattering in quantum mechanics Lucas Madeira 21 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Phase shift We know that ψk(r, θ) large r − − − →N eikz + eikr r f(θ) Expanding eikz ψk(r, θ) large r − − − →N (" ∞ X l=0 (2l + 1) 2ikr eikr −(−1)le−ikr × Pl(cos θ) # + f(θ)eikr r ) Comparing with ψ(r, θ) large r − − − →N ∞ X l=0 (2l + 1) ikr c(2) l h e2iδleikr −(−1)le−ikri Pl(cos θ) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 22 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Phase shift Collecting the terms with eikr allows us to write the scattering amplitude as a function of the phase shift f(θ) = ∞ X l=0 (2l + 1)(e2iδl −1) 2ik Pl(cos θ) The factor (e2iδl −1)/2ik is referred to as the partial wave amplitude fl(k), which may be rewritten as fl(k) = e2iδl −1 2ik = eiδl sin δl k = 1 k cot δl −ik In terms of Sl(k) Sl(k) = 1 + 2ikfl(k) = e2iδl(k) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 23 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Physical meaning of the phase shift Sl(k) = 1 + 2ikfl(k) = e2iδl(k) δl(k) is the difference between the phases of the incident and the scattered function The probability is conserved during the scattering The only thing that can change is the phase of the wave function If V = 0: free particle δl(k) = 0, fl(k) = 0 If V ̸= 0: solution for r < R depends on the details of V but for r > R we have a free particle with a “shifted” phase Defining the phase shift allows us to reduce the scattering problem to calculate a single quantity, δl(k) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 24 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Physical meaning of the phase shift g0(r) is the free-particle solution u0(r) is the solution in the presence of a scattering potential A repulsive potential (V > 0) “pushes” the particle away An attractive potential (V < 0) “pulls” the particle towards the origin An introduction to low-energy scattering in quantum mechanics Lucas Madeira 25 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Computing the phase shift Logarithmic derivative d dx ln f(x) = f ′(x) f(x) To compute the phase shift, we define the dimensionless ratio r × u′(r)/u(r) βl = ru′ l(r) ul(r) r=R− R± ≡limϵ→0 R ± ϵ The radial solution at r > R is ul(r) = 1 2re2iδlh(1) l (kr) + 1 2rh(2) l (kr) = reiδl(cos δljl(kr) −sin δlnl(kr)) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 26 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Computing the phase shift Equating βl with the outside log solution (at r = R+): βl = ru′ l(r) ul(r) r=R+ = 1 + kR cos δlj′ l(kR) −sin δln′ l(kR) cos δljl(kR) −sin δlnl(kR) After some algebra, we arrive at an expression for the phase shift cot δl(k) = kR n′ l(kR) −(βl −1) nl(kR) kR j′ l(kR) −(βl −1) jl(kR) This is an analytic expression to calculate the l-th partial wave phase-shift δl(k) (provided we know the inside solution to compute the constant βl) We will use this result later when we introduce the numerical procedure An introduction to low-energy scattering in quantum mechanics Lucas Madeira 27 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Low-energy limit An introduction to low-energy scattering in quantum mechanics Lucas Madeira 28 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Low-energy limit What is the low-energy limit?
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 29 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Low-energy limit What is the low-energy limit?
Naively, we could think simply E →0 (or k →0) The particle has a reduced wavelength ¯ λ = λ 2π = 1 k: ¯ λ →∞when k →0 However, ¯ λ can be finite as long as it is much larger than all other length scales in the system The only other length scale is the potential range R We want ¯ λ ≫R. The oscillations are so long that they cannot “see” the details of the potential In terms of k and R, the low-energy limit is kR ≪1 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 29 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Low-energy limit The radial equation for a partial wave l: −ℏ2 2m d2 dr2 + V(r) + ℏ2 2m l(l + 1) r2 ul(r) = Eul(r) We define an effective potential for the l-th partial wave as: Veff(r) = V(r) + ℏ2 2m l(l + 1) r2 For l ̸= 0, we a have repulsive centrifugal barrier Low-energy limit kR ≪1: the particle cannot overcome the centrifugal barrier In this case, the partial waves with l > 0 are unimportant l = 0 is the key for understanding low-energy scattering An introduction to low-energy scattering in quantum mechanics Lucas Madeira 30 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory s-wave scattering In the low-energy scenario, we consider partial waves with l ̸= 0 to vanish, and the resulting l = 0 term is referred to as “s-wave” The s-wave radial component u0(r) is given by: A0(r) = u0(r) r = eiδ0(cos δ0j0(kr) −sin δ0n0(kr)) = eiδ0 1 kr sin(kr + δ0) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 31 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory s-wave scattering We can also solve the zero-energy (k →0) Schr¨ odinger’s equation for r > R: d2 dr2 + 7 0 k2 − 0 U(r) − >0 l(l + 1) r2 u0(r) = 0 We simply have u′′ 0(r) = 0 (easiest Schr¨ odinger’s equation ever!) The solution can be written as u0(r) = c(r −a) Its logarithmic derivative is u′ 0(r) u0(r) = 1 r −a This needs to be equal to the logarithmic derivative of u0(r): k cot(kr + δ0) = 1 r −a An introduction to low-energy scattering in quantum mechanics Lucas Madeira 32 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering length In the limit k →0 (and setting r = 0) we define the scattering length a lim k→0 k cot δ0(k) = −1 a Previously, we had reduced the scattering problem to calculating δl(k) Now we have reduced the problem even further: in the E ≈0 limit, a encodes all the information we need about scattering The scattering amplitude for l = 0 in the low-energy limit is: f0(k) = lim k→0 1 k cot δ0 −ik = −a An introduction to low-energy scattering in quantum mechanics Lucas Madeira 33 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering length Geometrical interpretation: choose c = −1/a in u0(r) = c(r −a): u0(r) = 1 −r a a is simply the intercept of the outside wave function with the x-axis An introduction to low-energy scattering in quantum mechanics Lucas Madeira 34 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The effective range An introduction to low-energy scattering in quantum mechanics Lucas Madeira 35 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The effective range Another name for the scattering length expansion is the zero-range expansion What happens if the range of the potential is small, but non-negligible?
Expansion of k cot δ0(k) in powers of k (so far we have the first term, −1/a) k cot δ0(k) is an even function: it can only contain even powers of k The result is: k cot δ0(k) = −1 a + 1 2r0k2 + O(k4) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 36 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The effective range Consider a different normalization for u0(r > R): u0(r > R) = cot δ0(k) sin(kr) + cos(kr) Let us take the l = 0 radial equation for two different wave functions uk1(r) and uk2(r), labeled by their wave vectors (k1 = √2mE1/ℏand k2 = √2mE2/ℏ): u′′ k1(r) −U(r)uk1(r) + k2 1uk1(r) = 0 u′′ k2(r) −U(r)uk2(r) + k2 2uk2(r) = 0 Next, we multiply the first equation by uk2 and the second by uk1 and take their difference u′′ k1(r)uk2(r) −uk1(r)u′′ k2(r) = (k2 2 −k2 1)uk1(r)uk2(r) We may write the LHS as u′′ k1(r)uk2(r) −uk1(r)u′′ k2(r) = d dr u′ k1(r)uk2(r) −u′ k2(r)uk1(r) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 37 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The effective range Now we integrate from 0 to R u′ k2(r)uk1(r) −u′ k1(r)uk2(r) R 0 = (k2 2 −k2 1) Z R 0 dr uk1(r)uk2(r) The integral converges since u0(r) = rA0(r) is finite at the origin (u0(0) = 0 independently of the energy) Next, we repeat the same procedure for the free-particle (V = 0) radial equation with solutions denoted by gk1(r) and gk2(r). The result is the same if we replace u by g An introduction to low-energy scattering in quantum mechanics Lucas Madeira 38 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The effective range Finally, we take the difference between the results g′ k2(r)gk1(r) −g′ k1(r)gk2(r) R 0 − u′ k2(r)uk1(r) −u′ k1(r)uk2(r) R 0 = (k2 2 −k2 1) Z R 0 dr [gk1(r)gk2(r) −uk1(r)uk2(r)] u0(0) = 0 g(r) and u(r > R) are equal for r ⩾R The free-particle solution is also given by: g(r) = cot δ0(k) sin(kr) + cos(kr) Then we are left with g′ k2(0)gk1(0) −g′ k1(0)gk2(0) = (k2 2 −k2 1) Z R 0 dr [gk1(r)gk2(r) −uk1(r)uk2(r)] An introduction to low-energy scattering in quantum mechanics Lucas Madeira 39 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The effective range Using g(r) = cot δ0(k) sin(kr) + cos(kr) in the RHS k2 cot δ0(k2) −k1 cot δ0(k1) = (k2 2 −k2 1) Z R 0 dr [gk1(r)gk2(r) −uk1(r)uk2(r)] If we take the limit k1 →0, we can write k1 cot δ0(k1) in terms of the scattering length k cot δ0(k) = −1 a + k2 Z R 0 dr [g0(r)gk(r) −u0(r)uk(r)] We define the next term r0/2 as r0 ≡lim k→0 ρ(k) = 2 Z R 0 dr [g2 0(r) −u2 0(r)] = 2 Z R 0 dr 1 −r a 2 −u2 0(r) r0 is called effective range An introduction to low-energy scattering in quantum mechanics Lucas Madeira 40 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Shape-independent approximation The resultant expression is the shape-independent approximation: k cot δ0(k) = −1 a + 1 2r0k2 + O(k4) We are describing the phase shift δ0(k) without taking into account the microscopic parameters of the scattering potential An introduction to low-energy scattering in quantum mechanics Lucas Madeira 41 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Bound states An introduction to low-energy scattering in quantum mechanics Lucas Madeira 42 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Bound states Let us rewrite the scattered wave function for r →∞as ψ(r, θ) large r − − − → 1 (2π)3/2 ∞ X l=0 (2l + 1) 2ik Pl(cos θ) " Sl(k)eikr r −e−i(kr−lπ) r # For l = 0 and large distances, the radial wave function is proportional to S0(k)eikr r −e−ikr r An introduction to low-energy scattering in quantum mechanics Lucas Madeira 43 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Bound states For an arbitrary finite-ranged potential V, the radial solution at r > R for a bound state (E < 0) obeys u′′(r) = −2mE ℏ2 u(r) = κ2u(r), κ ≡ √ −2mE ℏ The solution can be written as u(r > R) = :0 Aeκr + Be−κr We conclude that the radial function for a bound state at large distances is A(r) = u(r) r ∝e−κr r (large r) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 44 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Bound states Scattering solution S0(k)eikr r −e−ikr r Bound state solution e−κr r By substituting k →iκ, with k purely imaginary, we can connect the bound state with the scattered solution eikr r = ei(iκ)r r = e−κr r S0(k) controls the ratio of the outgoing to the incoming wave In the bound state case, we have only the outgoing spherical wave, thus S0(k) →∞ An introduction to low-energy scattering in quantum mechanics Lucas Madeira 45 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Bound states Sl(k) = 1 + 2ik fl(k) = e2iδl(k) is a complex function S0(k) →∞by substituting k →iκ means it has a pole at k = iκ Scattering continuum: real k > 0 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 46 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Bound states In terms of the s-wave scattering amplitude f0(k) f0(k) = 1 k cot δ0 −ik = 1 −1/a −ik We write S0(k) as S0(k) = 1 + 2ikf0(k) = −k −i/a k −i/a This expression has a pole at k = iκ if we identify κ = 1 a In the zero-energy limit, the energy of a bound state and the scattering length are connected simply by E = ℏ2k2 2m = −ℏ2κ2 2m = −ℏ2 2ma2 A single parameter originated from the potential determines the bound-state energy An introduction to low-energy scattering in quantum mechanics Lucas Madeira 47 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Two-body scattering An introduction to low-energy scattering in quantum mechanics Lucas Madeira 48 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Two-body scattering So far, we considered only the problem of a single particle being scattered by a finite-ranged potential V(r) located at r = 0 With a few modifications, we can use the results we obtained to describe two particles interacting through a pairwise potential which depends only on their spatial separation r The Hamiltonian of a two-body system is separable in the center of mass (CM) and relative coordinates: H = −ℏ2 2m1 ∇2 r1 −ℏ2 2m2 ∇2 r2 + V(r1 −r2) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 49 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Two-body scattering We define the CM and relative coordinates R = m1r1 + m2r2 M and r = r1 −r2 H is now separable H = HCM + Hr, HCM = −ℏ2 2M∇2 R, Hr = −ℏ2 2mr ∇2 r + V(r) mr = m1m2/(m1 + m2) is the reduced mass The CM motion satisfies the free-particle equation →only adds a constant to the total energy The relative motion Hamiltonian is exactly the one we used for one particle if m →mr We can apply our previous results to two-body scattering An introduction to low-energy scattering in quantum mechanics Lucas Madeira 50 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Applications An introduction to low-energy scattering in quantum mechanics Lucas Madeira 51 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Applications 1 Spherically symmetric finite well Analytical calculation of the s-wave scattering wave function 1 Scattering states (E > 0) 2 Bound states (E < 0) Calculation of the scattering length and effective range 2 Zero-range and finite-range approximations Estimating bound state energies using the scattering length and effective range expansions An introduction to low-energy scattering in quantum mechanics Lucas Madeira 52 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric finite well One way of defining the spherical well is Vsw(r) = ( −V0 for r < R, 0 for r > R.
V0 has units of [energy] For numerical applications, it is useful to redefine the potential as V(r) = −v0 ℏ2 mrR2 for r < R, 0 for r > R.
v0 is dimensionless and related to the depth. We consider only v0 > 0 (attractive potential) R is the range of the potential For a relatively shallow or short-ranged potential: only continuum scattering states (E > 0) Increasing its depth or range may make it strong enough to produce a bound state (E < 0) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 53 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E > 0) Potential V(r) = −v0 ℏ2 mrR2 for r < R, 0 for r > R.
E > 0 case d2 dr2 −2mr ℏ2 V(r) + 2mr ℏ2 E u(r) = 0 Equations for r < R and r > R: u′′(r) + k2 0 + k2 u(r) = 0 for r < R, u′′(r) + k2u(r) = 0 for r > R, k2 ≡2mrE/ℏ2 and k2 0 ≡2v0/R2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 54 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E > 0) If r < R u(r) = A sin q k2 + k2 0 r + B cos q k2 + k2 0 r Since u0(0) = 0, we set B = 0 If r > R u(r) = cot δ0(k) sin(kr) + cos(kr) Hence, the solution is of the form u(r) = A sin q k2 + k2 0 r for r < R, cot δ0(k) sin(kr) + cos(kr) for r > R.
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 55 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E > 0) Logarithmic derivative at r = R−and r = R+ ru′(r) u(r) r=R−= ru′(r) u(r) r=R+ q k2 + k2 0 cos q k2 + k2 0 R sin q k2 + k2 0 R = k cot δ0(k) cos(kR) −k sin(kR) cot δ0(k) sin(kR) + cos(kR) Solving for the phase shift δ0(k) without any approximation δ0(k) = −kR + arctan k tan q k2 + k2 0 R q k2 + k2 0 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 56 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E > 0) Scattering length To calculate the scattering length a, we need to take the k →0 limit Rearrange the log derivative so that we collect factors of k cot δ0(k) Keep track of the orders employed in the approximation cos(kR) = 1 + O(k2) sin(kR) = kR + O(k3) Repeating last slides’ equation: q k2 + k2 0 cos q k2 + k2 0 R sin q k2 + k2 0 R = k cot δ0(k) cos(kR) −k sin(kR) cot δ0(k) sin(kR) + cos(kR) Taking the k →0 limit: q k2 0 cot q k2 0 R = −1/a −R/a + 1 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 57 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E > 0) Solving for a: a = R − tan q k2 0R q k2 0 = R 1 −tan √2v0 √2v0 !
It is clear that a depends only on the parameters of the potential (depth v0 and range R) Note that tan(x) →∞for x = π 2 + nπ, n = 0, ±1, ±2, ...
So the first divergence (n = 0) of a appears at v0 = π2 8 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 58 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E < 0) E < 0 case Repeat the same procedure or k = iκ →E = ℏ2k2/2mr = −ℏ2κ2/2mr d2 dr2 −2mr ℏ2 V(r) −2mr ℏ2 |E| u(r) = 0 Solution for u(r) u(r) = A′ sin q k2 0 −κ2 r for r < R, B′e−κr for r > R Match the logarithmic derivatives at r = R: q k2 0 −κ2 cos q k2 0 −κ2 R sin q k2 0 −κ2 R = −κe−κR e−κR An introduction to low-energy scattering in quantum mechanics Lucas Madeira 59 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E < 0) After some manipulations: tan q k2 0 −κ2 R + q k2 0 −κ2 κ = 0 This is a transcendental equation that shows where the bound-state energies are located Note that the term q k2 0 −κ2/κ is always positive tan q k2 0 −κ2 R must be negative if we want the equation to have solution(s). That is to say: π 2 + nπ < q k2 0 −κ2 R < π + nπ, n = 0, 1, 2, ...
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 60 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well (E < 0) The first bound state is n = 0: π 2R < q k2 0 −κ2 < π R k0 > q k2 0 −κ2 k0 = √2v0/R v0 > π2 8 This result shows that there are no bound states if v0 is not above a certain threshold value This is the same threshold value that makes |a| →∞ The conclusion is that the scattering length diverges when a bound state appears An introduction to low-energy scattering in quantum mechanics Lucas Madeira 61 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well - bound states and scattering length a = R 1 −tan √2v0 √2v0 !
a diverges for: p 2v0 = π/2 + nπ (n = 0, 1, 2, ...) This coincides with the location of the bound states An introduction to low-energy scattering in quantum mechanics Lucas Madeira 62 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well - effective range First, we need to determine the normalization constant of the scattering solution u(r) = A sin q k2 + k2 0 r for r < R, cot δ0(k) sin(kr) + cos(kr) for r > R To determine the constant A, we impose the continuity of u(r) at r = R: A = cot δ0(k) sin(kR) + cos(kR) sin q k2 + k2 0R An introduction to low-energy scattering in quantum mechanics Lucas Madeira 63 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well - effective range The normalized solution is written as u(r) = cot δ0(k) sin(kR)+cos(kR) sin(√ k2+k2 0R) sin q k2 + k2 0 r for r < R, cot δ0(k) sin(kr) + cos(kr) for r > R.
The effective range is defined in the k →0 limit of u(r): lim k→0 u(r) = ( (1−R/a) sin(k0R) sin(k0r) for r < R, 1 −r/a for r > R.
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 64 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well - effective range The effective range is given by the integral r0 = 2 Z R 0 dr " 1 −r a 2 − 1 −R a 2 sin2(k0r) sin2(k0R) # Replacing a in favor of R and k0: r0 R = 1 −1 3 k0R tan(k0R) −k0R 2 + 1 k0R tan(k0R) −(k0R)2 !
This shows that r0 also depends only on parameters of the potential An introduction to low-energy scattering in quantum mechanics Lucas Madeira 65 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Spherically-symmetric well - effective range r0 R = 1 −1 3 k0R tan(k0R) −k0R 2 + 1 k0R tan(k0R) −(k0R)2 !
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 66 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Applications 1 Spherically symmetric finite well Analytical calculation of the s-wave scattering wave function 1 Scattering states (E > 0) 2 Bound states (E < 0) Calculation of the scattering length and effective range 2 Zero-range and finite-range approximations Estimating bound state energies using the scattering length and effective range expansions An introduction to low-energy scattering in quantum mechanics Lucas Madeira 67 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Zero-range and finite-range approximations The equation derived in the bound states slide allows us to estimate the bound state energy with the zero-range approximation κ = 1/a, Ezr = −ℏ2κ2 2mr = − ℏ2 2mra2 To take the effective range into account, we write the s-wave scattering amplitude as f0(k) = 1 k cot δ0(k) −ik = 1 −1/a + r0k2/2 −ik And S0(k) as S0(k) = 1 + 2ikf0(k) = −i/a −k + ir0k2/2 −i/a + k + ir0k2/2 Making k →iκ S0(k) = −1/a −κ −r0κ2/2 −1/a + κ −r0κ2/2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 68 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Zero-range and finite-range approximations Now we can identify the bound state as pole in the S-matrix by solving −1 a + κ −r0κ2 2 = 0 which yields the solutions κ = 1 r0 1 ∓ r 1 −2r0 a !
For r0/a ≪1: κr0 = 1 ∓ p 1 −2r0/a ≈1 ∓1 ± r0/a Now choosing the appropriate root to compute the bound state energy Efr = −ℏ2κ2 2mr = − ℏ2 2mrr2 0 1 − r 1 −2r0 a !2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 69 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Zero-range and finite-range approximations Example: Helium dimer Ed = −1.62 mK (found solving the full Schr¨ odinger equation), a = 90.4 ˚ A, r0 = 8.0 ˚ A Zero-range approximation Ezr kB = − ℏ2 kB × 2mra2 = −1.48 mK (92%) Finite-range approximation Efr kB = − ℏ2 kB × 2mrr2 0 1 − r 1 −2r0 a !2 = −1.63 mK (101%) Both the zero- and finite-range results successfully describe the physical system because kR ∼0.1 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 70 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Zero-range and finite-range approximations Example: Deuteron Edc2 = −2.224 MeV, a = 5.4112 fm, r0 = 1.7436 fm.
Zero-range approximation Ezrc2 = −ℏ2c2 2mra2 = −1.416 MeV (64%) Finite-range approximation Efrc2 = −ℏ2c2 2mrr2 0 1 − r 1 −2r0 a !2 = −2.223 MeV (100%) The range of the potential needed to be taken into account because kR ∼0.4 We should emphasize that the scales are very different in both examples 4He dimer: spatial scale of ˚ A (10−10 m) and the energy is of the order of 10−7 eV Deuteron: the lengths are in femtometers (10−15 m) and the energy is of a few MeV (106 eV) This exemplifies how universal are these low-energy scattering results An introduction to low-energy scattering in quantum mechanics Lucas Madeira 71 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerical Procedure An introduction to low-energy scattering in quantum mechanics Lucas Madeira 72 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerical Procedure Analytical expressions for the low-energy scattering parameters are only available for a few potentials Even in those cases, the calculations may be cumbersome, as we saw for the spherical well In general, we need to calculate a and r0 numerically We will describe two methods to solve Schr¨ odinger’s equation numerically 1 Second-order central difference 2 Numerov’s method An introduction to low-energy scattering in quantum mechanics Lucas Madeira 73 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerical Procedure We wish to compute the quantities a and r0 To do so, we need to compute the radial solution inside and outside the potential range u0(r < R): needs to be computed numerically u0(r > R) = 1 −r/a An introduction to low-energy scattering in quantum mechanics Lucas Madeira 74 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Second-order central difference Consider the function u(r) on a discrete set of points ri = i∆r, i = 0, 1, 2..., N and ∆r ≪1 Let us take two Taylor expansions of u(r) around the points r ± ∆r u(r + ∆r) = u(r) + (∆r)u′(r) + (∆r)2 2 u′′(r) + (∆r)3 6 u′′′(r) + · · · , u(r −∆r) = u(r) −(∆r)u′(r) + (∆r)2 2 u′′(r) −(∆r)3 6 u′′′(r) + · · · The difference of the two Taylor expansions yields an expression for the first derivative, while their sum results in the second derivative du dr r=ri = ui+1 −ui−1 2∆r + O[(∆r)2] d2u dr2 r=ri = ui+1 −2ui + ui−1 (∆r)2 + O[(∆r)2] Note: hereafter, we are going to use the compact notation u0(ri) ≡ui An introduction to low-energy scattering in quantum mechanics Lucas Madeira 75 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Second-order central difference We want to solve the zero-energy Schr¨ odinger equation inside the potential range d2 dr2 −2mr ℏ2 V(r) u0(r) = 0 d2u dr2 r=ri ≈ui+1 −2ui + ui−1 (∆r)2 Substituting the central difference second derivative into u′′(r) ui+1 = 2ui −ui−1 + 2mr(∆r)2 ℏ2 V(ri)ui An introduction to low-energy scattering in quantum mechanics Lucas Madeira 76 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Second-order central difference ui+1 = 2ui −ui−1 + 2mr(∆r)2 ℏ2 V(ri)ui If we know the value of the radial solution for two consecutive points (ui−1 and ui) we can calculate the value for the next point ui+1 u(0) = 0 u(∆r) = 1 This choice allows us to find a solution without worrying about the normalization Algorithm: 1 Set u0 = 0, u1 = 1, and i = 1 2 Compute ui+1 3 If ri ⩾R + ∆r, stop. Else, increment i by one 4 Go to step 2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 77 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerov’s method The second-order central difference is one possible discretization for a numerical second derivative There are other alternatives if we want to improve the precision of our algorithm Numerov’s method is a numerical technique capable of solving differential equations of second order when the first-order term is not present: d2y dx2 = −ξ(x)y(x) + s(x) The s-wave zero-energy radial equation is of this form, with y →u, x →r, s = 0, and ξ(r) = −2mr ℏ2 V(r) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 78 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerov’s method The method provides a solution of the form yi+1 = 1 1 + (∆x)2 12 ξi+1 ( 2yi 1 −5(∆x)2 12 ξi −yi−1 1 + (∆x)2 12 ξi−1 + (∆x)2 12 (si+1 + 10si + si−1) ) + O[(∆x)6] The algorithm is mostly unchanged if we use Numerov’s method instead of the second-order central difference An introduction to low-energy scattering in quantum mechanics Lucas Madeira 79 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Dimensionless quantities Schr¨ odinger’s equation contains relatively small quantities ℏ∼10−34 J s (or ∼10−15 eV s) Typical masses, length, and energy scales are also small We wish to make Schr¨ odinger’s equation dimensionless Instead of this −1 2 d2 dr2 −mr ℏ2 E + mr ℏ2 V(r) u(r) = 0 we want to solve this −1 2 d2 d¯ r2 −¯ E + ¯ V(¯ r) ¯ u(¯ r) = 0 “ ℏ= mr = 1 ” An introduction to low-energy scattering in quantum mechanics Lucas Madeira 80 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Dimensionless quantities First, we choose a length scale ℓ The convenient value of ℓdepends on the system under study Atomic physics: 1 ˚ A Nuclear physics: 1 fm Or any other length scale that makes sense for a particular problem Then the dimensionless scaled distance is ¯ r = r ℓ The radial function u(r) has units of [length]−1/2 (remember that R dr|u(r)|2 = 1) ¯ u(¯ r) = u(r) ℓ−1/2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 81 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Dimensionless quantities The second derivative becomes d2 dr2 = 1 ℓ2 d2 d¯ r2 Going back to the equation: − ℏ2 2mrℓ2 d2¯ u d¯ r2 + V(¯ r)¯ u = E¯ u We can also define an energy scale ϵ = ℏ2 mrℓ2 And now we define the dimensionless energy and potential ¯ E = E ϵ , ¯ V = V ϵ Finally −1 2 d2¯ u d¯ r2 + ¯ V(¯ r)¯ u = ¯ E¯ u An introduction to low-energy scattering in quantum mechanics Lucas Madeira 82 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering length and effective range After finding u(r) numerically, we’re ready to compute a and r0 Scattering length We recall that logarithmic derivative of the wave function outside the potential range is given by g′ 0(r) g0(r) r=R+ = 1 R −a This should be equal to the logarithmic derivative of u0(r) at r = R− g′ 0(r) g0(r) r=R+ = 1 R −a = u′ 0(r) u0(r) r=R− We already have u(R) and u(R ± ∆r). Thus the derivative may be computed as u′ num(R) = du(r) dr r=R = u(R + ∆r) −u(R −∆r) 2∆r An introduction to low-energy scattering in quantum mechanics Lucas Madeira 83 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering length and effective range Scattering length Solving for a a = R − 2∆r u(R) u(R + ∆r) −u(R −∆r) This expression depends on the ratio of the radial solution, so we ignored the normalization Effective range On the other hand, the effective range assumes a particular normalization choice We multiply u(r) by a constant C such that C = g(R) u(R) = (1 −R/a) u(R) The effective range is found by computing the integral r0 = 2 Z R 0 dr [g2 0(r) −u2 0(r)] An introduction to low-energy scattering in quantum mechanics Lucas Madeira 84 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerical integration The task is essentially to compute numerically an integral of the form I = Z xN x1 f(x)dx f(x) is known only at a discrete set of equally spaced points, f(xi) ≡fi, where i = 1, 2, 3, ..., N.
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 85 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerical integration Trapezoidal rule: Z x2 x1 f(x)dx = h 1 2f1 + 1 2f2 + O(h3f ′′) Using it N −1 times for the intervals: (x1, x2), (x2, x3), · · · , (xN−1, xN) Z xN x1 f(x)dx = h 1 2f1 + f2 + f3 + · · · + fN−1 + 1 2fN + O (xN −x1)3f ′′ N2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 86 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Numerical integration Simpson’s rule: Z x3 x1 f(x)dx = h 1 3f1 + 4 3f2 + 1 3f3 + O(h5f (4)) Repeatedly: Z xN x1 f(x)dx = h 1 3f1 + 4 3f2 + 2 3f3 + 4 3f4 + · · · + 2 3fN−2 + 4 3fN−1 + 1 3fN + O (xN −x1)5f (4) N4 !
An introduction to low-energy scattering in quantum mechanics Lucas Madeira 87 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Examples An introduction to low-energy scattering in quantum mechanics Lucas Madeira 88 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Examples We chose four potentials to illustrate the numerical procedure Spherical well Modified P¨ oschl-Teller Gaussian Lennard-Jones An introduction to low-energy scattering in quantum mechanics Lucas Madeira 89 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Potentials - Spherical well To make the comparison with other potentials easier, we redefine Vsw(r) = −vsw ℏ2µ2 sw mr , for r < R, 0, for r > R vsw is a dimensionless parameter related to the depth µsw = 1/R We can compare our numerical solutions with the analytical ones to check the correctness of the program An introduction to low-energy scattering in quantum mechanics Lucas Madeira 90 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Potentials - Modified P¨ oschl-Teller (mPT) VPT(r) = −vPT ℏ2 mr µ2 PT cosh2(µPTr) Very difficult analytical solution for the eigenfunctions There is an analytical expression for a in terms of the parameters of the potential aµPT = π 2 cot πλ 2 + γ + Ψ(λ) vPT = λ(λ −1)/2, γ is the Euler-Mascheroni constant and Ψ is the digamma function The |a| →∞case corresponds to λ = 2 [cot(π) diverges] or λ = −1 [Ψ(−1) diverges], that is, vPT = 1 For this particular case (|a| →∞), the s-wave zero-energy radial function takes a relatively simple form u0(r) = tanh(µPT r) tanh(µPT R) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 91 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Potentials - mPT We can also calculate the effective range by performing the integral In this case (|a| →∞), g0(r) = 1 −r/a = 1, so that r0 = 2 Z R 0 dr " 1 −tanh2(µPTr) tanh2(µPTR) # = 2 R − R tanh2(µPTR) + 1 µPT tanh(µPTR) Since 1/µPT ∼R and the tanh(x) function converges rapidly to 1 as we increase x, we may set tanh(µPTR) = 1. Thus we have : r0 = 2 µPT (for vPT = 1) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 92 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Potentials Spherical well Modified P¨ oschl-Teller VPT(r) = −vPT ℏ2 mr µ2 PT cosh2(µPTr) Gaussian Vg(r) = −vg ℏ2 mr µ2 ge−r2µ2 g The potential range R is not well defined for the mPT and the gaussian potentials Look for a value of R such that the potential is negligible |V(R)| ⩽ε An introduction to low-energy scattering in quantum mechanics Lucas Madeira 93 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Potentials Lennard-Jones VLJ(r) = ℏ2 mr C12 r12 −C6 r6 Note that VLJ(0) diverges and V(∆r) is very large u(0) = 0 ✓ Computing u(∆r) may lead to instabilities Define a range 0 ⩽r < rmin where u(r) = 0 Start the integration at r = rmin An introduction to low-energy scattering in quantum mechanics Lucas Madeira 94 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Tuning the parameters An introduction to low-energy scattering in quantum mechanics Lucas Madeira 95 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Tuning the parameters The four potentials we presented have two parameters Spherical well, mPT, Gaussian are purely attractive one parameter is associated with the depth of the potential (vsw, vPT, and vg) and another with its range (µsw, µPT, and µg) The LJ potential has a repulsive core and an attractive region C6 controls the attractive interaction C12 controls the repulsive interaction Typically, the scattering length and effective range are known, and we want to tune the parameters of a particular potential to reproduce the desired a and r0 values Since we want to match two values and have two free parameters, the correspondence is one-to-one (with the restriction of how many bound states we want) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 96 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Tuning the parameters A possible algorithm: 1 Start with a guess (v1, v2).
2 Compute a and r0 3 Keep v2 fixed. Vary v1 until a has the desired value. Increasing the depth of the potential will decrease the value of the scattering length (until it diverges and changes from −∞to +∞) 4 Keep v1 fixed at the value found in step 3. Vary v2 until r0 has the desired value. Increasing the range of the potential will increase r0 5 If a and r0 match the desired values, stop. Else, go to step 3 and use the value of v2 found in step 4 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 97 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Results An introduction to low-energy scattering in quantum mechanics Lucas Madeira 98 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Results We present 3 cases: a < 0, |a| →∞, and a > 0, which correspond to three very distinct physical situations a < 0 Example: neutron-neutron interaction (a = −18.5 fm, r0 = 2.7 fm) |a| →∞ Unitarity a > 0 Example: deuteron (a = 5.4 fm, r0 = 1.7 fm) System a (fm) r0 (fm) Neutron-neutron −18.5 2.7 Unitarity ±∞ 1.0 Deuteron 5.4 1.7 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 99 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Results a < 0 Potential v µ (fm−1) a (fm) r0 (fm) Neutron-neutron Well 1.1096 0.3918 −18.52 2.7 mPT 0.9071 0.7991 −18.51 2.7 Gaussian 1.2121 0.5672 −18.55 2.7 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 100 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Results |a| →∞ Potential v µ (fm−1) a (fm) r0 (fm) Unitarity Well 1.2337 1.0000 ∼−105 1.0 mPT 1.0000 2.0000 ∼109 1.0 Gaussian 1.3420 1.4349 ∼−105 1.0 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 101 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Results a > 0 Potential v µ (fm−1) a (fm) r0 (fm) Deuteron Well 1.7575 0.5000 5.4 1.70 mPT 1.4388 0.8631 5.4 1.73 Gaussian 1.9102 0.6754 5.4 1.70 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 102 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Results Scattering length as a function of the strength of the attractive potential An introduction to low-energy scattering in quantum mechanics Lucas Madeira 103 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Conclusions We presented quantum scattering theory fundamentals focusing on the low-energy limit In this context, we introduced two significant quantities: the scattering length and the effective range To illustrate how these two parameters behave in a concrete example, we derived analytical expressions for the spherical well We also showed how the energy of a bound state could be calculated using zero- and finite-range expressions applied to a 4He dimer and the deuteron We described a numerical procedure that can be used to compute the scattering length and effective range of any spherically symmetric finite-ranged two-body potential Examples: spherical well, modified P¨ oschl-Teller, Gaussian, and Lennard-Jones potentials Now, you can extend what you learned to your choice of physical systems, and apply the method to other potentials An introduction to low-energy scattering in quantum mechanics Lucas Madeira 104 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Formal scattering theory An introduction to low-energy scattering in quantum mechanics Lucas Madeira 105 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Time-dependent formalism Scattering can be seen as a time-dependent process Interactions →interaction picture Time evolution in the Schr¨ odinger picture: |ϕ(t)⟩S = US(t, t0)|ϕ(t0)⟩S | ⟩S is a ket in the Schr¨ odinger picture and US(t, t0) is the time-evolution operator If H is time independent: US(t, t0) = e−iH(t−t0)/ℏ The interaction-picture state ket is defined as: |ϕ(t)⟩I = eiH0t/ℏ|ϕ(t)⟩S The operators in the interaction picture are defined as: AI = eiH0t/ℏASe−iH0t/ℏ An introduction to low-energy scattering in quantum mechanics Lucas Madeira 106 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The interaction picture The Schr¨ odinger equation takes the form: iℏ∂ ∂t|ϕ(t)⟩S = H|ϕ(t)⟩S → iℏ∂ ∂t|ϕ(t)⟩I = VI|ϕ(t)⟩I VI = eiH0(t−t0)/ℏVe−iH0(t−t0)/ℏis the potential in the interaction picture Advantage: we removed H0 from our calculations (to consider the interaction) If V = 0: |ϕ(t)⟩I is constant in time (and equal to |ϕ(t0)⟩S) The time-evolution of |ϕ(t)⟩I is given by: |ϕ(t)⟩I = UI(t, t0)|ϕ(t0)⟩I with UI(t, t0) = eiH0t/ℏUS(t, t0)e−iH0t0/ℏ It obeys the Schr¨ odinger-like equation: iℏ∂ ∂tUI(t, t0) = VI(t)UI(t, t0) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 107 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering and the interaction picture iℏ∂ ∂tUI(t, t0) = VI(t)UI(t, t0) The solution is given by: UI(t, t0) = 1 −i ℏ Z t t0 dt′VI(t′)UI(t′, t0) Compatible with the initial condition UI(t0, t0) = 1.
Our goal: to calculate the evolution of the state in a distant past (t0 →−∞), when |ϕ(t →−∞)⟩= |i⟩ The solution is only valid for finite times t and t0 →setting UI(t, −∞) would lead to convergence problems We need to give mathematical meaning to UI(t, −∞) and UI(+∞, t) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 108 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Distant past and distant future Consider the equality: lim t0→−∞f(t0) = lim ϵ→0 ϵ Z 0 −∞ dt′ eϵt′f(t′) Applying this to the time evolution operator: UI(t, −∞) = lim t0→−∞UI(t, t0) = lim ϵ→0 ϵ Z 0 −∞ dt′ eϵt′UI(t, t′) UI(+∞, t0) = lim t→+∞UI(t, t0) = lim ϵ→0 ϵ Z +∞ 0 dt′ e−ϵt′UI(t′, t0) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 109 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Despite the time-dependent treatment, H is time-independent: US(t, t′) = e−iH(t−t′)/ℏ The state vector at a time t = 0 is given by: |ϕ(t = 0)⟩I = UI(0, −∞)|i⟩ with UI(0, −∞) = lim ϵ→0 ϵ Z 0 −∞ dt′ eϵt′eiHt′/ℏe−iH0t′/ℏ |ϕ(t = 0)⟩I = lim ϵ→0 ϵ Z 0 −∞ dt′ eϵt′ei(H−Ei)t′/ℏ|i⟩= lim ϵ→0 iϵ Ei −H + iϵ|i⟩ Using the identity: 1 Ei −H + iϵ − 1 Ei −H0 + iϵ = 1 Ei −H0 + iϵV 1 Ei −H + iϵ we rewrite the result as: |ϕ(t = 0)⟩I = lim ϵ→0 iϵ Ei −H0 + iϵ|i⟩+ 1 Ei −H0 + iϵV iϵ Ei −H + iϵ|i⟩ = lim ϵ→0 iϵ Ei −H0 + iϵ|i⟩+ 1 Ei −H0 + iϵV|ϕ(t = 0)⟩I An introduction to low-energy scattering in quantum mechanics Lucas Madeira 110 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The Lippmann-Schwinger equation |ϕ(t = 0)⟩I = lim ϵ→0 iϵ Ei −H0 + iϵ|i⟩+ 1 Ei −H0 + iϵV iϵ Ei −H + iϵ|i⟩ = lim ϵ→0 iϵ Ei −H0 + iϵ|i⟩+ 1 Ei −H0 + iϵV|ϕ(t = 0)⟩I H0|i⟩= Ei|i⟩ |ψ⟩= |i⟩+ 1 Ei −H0 + iϵV|ψ⟩ We left off the notation |ϕ(t = 0)⟩to emphasize that this is an actual time-independent problem This is know as the Lippmann-Schwinger equation An introduction to low-energy scattering in quantum mechanics Lucas Madeira 111 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory The distant future Back to the time-dependent formulation, we can use the sequential relation of the time translation operator: UI(t, t0) = UI(t, t′)UI(t′, t0) |ϕ(t)⟩= UI(t, 0)|ϕ(0)⟩= UI(t, −∞)|i⟩ In a distant future (t →+∞): |f⟩= UI(+∞, −∞)|i⟩= S|i⟩, S ≡UI(+∞, −∞).
Scattering (S) matrix The action of the S matrix on an initial state (that exists asymptotically for t0 →−∞) transforms the ket |i⟩into a final state that exists in a distant future t →+∞ An introduction to low-energy scattering in quantum mechanics Lucas Madeira 112 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Dyson series and the first-order Born approximation Lippmann-Schwinger equation: |ψ⟩= |i⟩+ 1 Ei −H0 + iϵV|ψ⟩ Rewritten as a power-series expansion: |ψ⟩=|i⟩+ G+V|i⟩+ G+VG+V|i⟩+ ... = |i⟩+ G+(V + VG+V + ...)|i⟩ where G+ ≡(Ei −H0 + iϵ)−1 We define the transition matrix T as the perturbative series: T ≡V + VG+V + VG+VG+V + ...
This is known as the Dyson series A consequence is that: V|ψ⟩= T|i⟩ The T-matrix is a kind of a generalized potential First-order perturbation: T and V are equivalent →|ψ⟩≈|i⟩ This is known as the first-order Born approximation An introduction to low-energy scattering in quantum mechanics Lucas Madeira 113 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering theory integral equations Lippmann-Schwinger equation: |ψ⟩= |i⟩+ 1 Ei −H0 + iϵV|ψ⟩ In the position basis: ⟨r|ψ⟩= ⟨r|i⟩+ Z d3r′ r |G+| r′ r′ |V| ψ We have to compute: G+(r, r′) ≡ r 1 E −H0 + iϵ r′ Momentum basis {|k⟩} elements are eigenstates of H0 with eigenvalues ℏ2k2/2m G+(r, r′) = ℏ2 2m X k′,k′′ ⟨r|k′⟩ k′ 1 E −H0 + iϵ k′′ ⟨k′′|r′⟩ Plane waves in the position representation: ⟨r|k⟩= eik·r L3/2 and ⟨k|r⟩= e−ik·r L3/2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 114 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering theory integral equations G+(r, r′) = 1 L3 X k′ eik′·(r−r′) k2 −k′2 + iϵ We absorbed the factor 2m/ℏ2 into ϵ We are left with a sum in k-space: discrete Periodic boundary conditions: ki = 2πni/L (i = x, y, z) where ni = 0, 1, 2, 3...
{k} = {0, 2π/L, 4π/L, ...}: the distance between each point in k-space is ∆k = 2π/L We must take L →∞to guarantee the required continuous character: the separation between points must be very small compared to L (∆k ≈0) We may substitute the sum by an integral: X k′ → Z ρ(k)d3k′ = L3 (2π)3 Z d3k′ ρ(k) = L3/(2π)3 is the k-density in three dimensions An introduction to low-energy scattering in quantum mechanics Lucas Madeira 115 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering theory integral equations G+(r, r′) = 1 (2π)3 Z d3k′ eik′·(r−r′) k2 −k′2 + iϵ Spherical coordinates: (k′, θ, ϕ) Let the vector (r −r′) lie along the k′ z axis: k′ · (r −r′) = k′|r −r′| cos θ G+(r, r′) = 1 (2π)2 Z ∞ 0 dk′k′2 Z π 0 dθ eik′|r−r′| cos θ k2 −k′2 + iϵ = 1 4π2|r −r′| Z ∞ −∞ dk′ k′ sin(k′|r −r′|) k2 −k′2 + iϵ The integrand is even Poles at k′ = ± √ k2 + iϵ = ±(k + iϵ/2k −ϵ2/8k3 + ...) Ignoring terms higher than ϵ2 (redefining ϵ/2k →ϵ): (k2 −k′2 + iϵ) = −(k′ −k −iϵ)(k′ + k + iϵ) The integral is then: G+(r, r′) = 1 8iπ2|r −r′| Z ∞ −∞ dk′ k′(e−ik′|r−r′| −eik′|r−r′|) (k′ −k −iϵ)(k′ + k + iϵ) An introduction to low-energy scattering in quantum mechanics Lucas Madeira 116 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory We let k′ momentarily be a complex variable to carry out this integration and use the residue theorem: I ΓR = Z γR + Z CR = 2πi × X j Res{k′; j} Upper plane path where eik|r−r′| →0 Lower plane path where e−ik|r−r′| →0 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 117 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering theory integral equations The closed path integral may be written as the sum: I ΓR = Z γR + Z CR = 2πi × X j Res{k′; j} The integral along the path γR is zero due to Jordan’s lemma The only pole inside Γ± R is ±(k + iϵ) The residues may be calculated as: Res{k′; k + iϵ} = lim k′→k+iϵ ϵ→0 (k′ −k −iϵ) k′eik′|r−r′| (k′ −k −iϵ)(k′ + k + iϵ) = eik|r−r′| 2 Res{k′; −k −iϵ} = lim k′→−k−iϵ ϵ→0 (k′ + k + iϵ) k′e−ik′|r−r′| (k′ −k −iϵ)(k′ + k + iϵ) = eik|r−r′| 2 An introduction to low-energy scattering in quantum mechanics Lucas Madeira 118 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering theory integral equations The integral along CR (the real axis) is: lim R→∞ Z R −R dk′ k′(e−ik′|r−r′| −eik′|r−r′|) (k′ −k −iϵ)(k′ + k + iϵ) = 2πi × eik|r−r′| Going back to the Green’s function: G+(r, r′) = 1 4π eik|r−r′| |r −r′| And the integral equation: ⟨r|ψ⟩= ⟨r|i⟩−2m ℏ2 Z d3r′ 1 4π eik|r−r′| |r −r′| r′ |V| ψ An introduction to low-energy scattering in quantum mechanics Lucas Madeira 119 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering theory integral equations Next, we consider the potential to be local: r′ |V| r′′ = V(r′)δ(r′ −r′′) Thus: ⟨r|ψ⟩= ⟨r|i⟩−2m ℏ2 Z d3r′ 1 4π eik|r−r′| |r −r′|V(r′)⟨r′|ψ⟩ An introduction to low-energy scattering in quantum mechanics Lucas Madeira 120 / 121 Quantum scattering theory Numerical Procedure Examples Formal scattering theory Scattering theory integral equations Additional restriction: finite-ranged potential The scattering is observed far away from the scattering center Large distances (|r| ≫|r′|): eik|r−r′| ≈eikre−ik′·r′ Our initial state is |i⟩= |k⟩(and ⟨r|k⟩= eik·r/L3/2) Finally: ψ(r, θ) large r − − − → 1 L3/2 eik·r + eikr r f(k′, k) where f(k′, k) = −mL3 2πℏ2 Z d3r′⟨k′|r′⟩V(r′)⟨r′|ψ⟩ is the scattering amplitude An introduction to low-energy scattering in quantum mechanics Lucas Madeira 121 / 121 |
10572 | https://www.reddit.com/r/learnmath/comments/s807pd/why_are_there_two_producttosum_formulas_one_for/ | Why are there two product-to-sum formulas, one for sin(a)cos(b) and other for cos(a)sin(b)? : r/learnmath
Skip to main contentWhy are there two product-to-sum formulas, one for sin(a)cos(b) and other for cos(a)sin(b)? : r/learnmath
Open menu Open navigationGo to Reddit Home
r/learnmath A chip A close button
Log InLog in to Reddit
Expand user menu Open settings menu
Go to learnmath
r/learnmath•4 yr. ago
amsfdk
Why are there two product-to-sum formulas, one for sin(a)cos(b) and other for cos(a)sin(b)?
If multiplication is commutative, why:
sin(a)cos(b) = 1/2[sin(a + b) + sin(a - b)]
and
cos(a)sin(b) = 1/2[sin(a + b) - sin(a - b)]
Do they always return the same answer, regardless of which one you choose? Thank you!
Read more
Share
Related Answers Section
Related Answers
product to sum identity for cos a cos b
formulas for sin a plus sin b
trigonometric identity for sin(a minus b)
methods to memorize trigonometric formulas
proof of sin(a plus b) identity
New to Reddit?
Create your account and connect with a world of communities.
Continue with Google Continue with Google. Opens in new tab
Continue with Email
Continue With Phone Number
By continuing, you agree to ourUser Agreementand acknowledge that you understand thePrivacy Policy.
Public
Anyone can view, post, and comment to this community
0 0
Top Posts
Reddit reReddit: Top posts of January 19, 2022
Reddit reReddit: Top posts of January 2022
Reddit reReddit: Top posts of 2022
Reddit RulesPrivacy PolicyUser AgreementAccessibilityReddit, Inc. © 2025. All rights reserved.
Expand Navigation Collapse Navigation |
10573 | https://www.uah.edu/images/people/faculty/howellkb/DEText-Ch13.pdf | 13 Reduction of Order We shall take a brief break from developing the general theory for linear differential equations to discuss one method (the “reduction of order method”) for finding the general solution to any linear differential equation. In some ways, this method may remind you of the material in chapter 11. Indeed, part of the method involves solving a higher-order equation via first-order methods as discussed in chapter 11. The general theory developed in chapter 12 will not, however, be used to any great extent. Instead, the material developed here will help us finish that general theory (at least partially confirming the suspicions raised at the end of the chapter), and will help lead us to the complete result on constructing general solutions from particular solutions.
But why worry about completing that general theory if any linear differential equation can be completely solved by this “reduction of order method”? Because this method requires that one solution to the differential equation already be known. This limits the method’s applicability.
Also, serious practical difficulties arise when the differential equation to be solved is of order three or more. Still, there are situations where the method is of practical value, and it will help us confirm suspicions we already have about general solutions.
Oh yes, there is another reason to develop this method: A rather powerful method for solving nonhomogeneous equations, the “variation of parameters” method described in chapter 23, is simply a clever refinement of the reduction of order method.
13.1 The General Idea The “reduction of order method” is a method for converting any linear differential equation to another linear differential equation of lower order, and then constructing the general solution to the original differential equation using the general solution to the lower-order equation. In general, to use this method with an N th-order linear differential equation a0y(N) + a1y(N−1) + · · · + aN−2y′′ + aN−1y′ + aN y = g , we need one known nontrivial solution y1 = y1(x) to the corresponding homogeneous differ-ential equation. We then try a substitution of the form y = y1 u where u = u(x) is a yet unknown function (and y1 = y1(x) is the aforementioned known solution). Plugging this substitution into the differential equation then leads to a linear differential 283 284 Reduction of Order equation for u . As we will see, because y1 satisfies the homogeneous equation, the differential equation for u ends up being of the form A0u(N) + A1u(N−1) + · · · + AN−2u′′ + AN−1u′ = g — remarkably, there is no “ ANu ” term. This means we can use the substitution v = u′ , as discussed in chapter 11, to rewrite the differential equation for u as a (N −1)th-order differential equation for v , A0v(N−1) + A1v(N−2) + · · · + AN−2v′ + AN−1v = g .
So we have reduced the order of the equation to be solved. If a general solution v = v(x) for this equation can be found, then the most general formula for u can be obtained from v by integration (since u′ = v ). Finally then, by going back to the original substitution formula y = y1u , we can obtain a general solution to the original differential equation.
This method is especially useful for solving second-order homogeneous linear differential equations since (as we will see) it reduces the problem to one of solving relatively simple first-order differential equations. Accordingly, we will first concentrate on its use in finding general solutions to second-order, homogeneous linear differential equations.
Then we will briefly discuss using reduction of order with linear homogeneous equations of higher order, and with nonhomogeneous linear equations.
13.2 Reduction of Order for Homogeneous Linear Second-Order Equations The Method Here we lay out the details of the “reduction of order method” for second-order homogeneous linear differential equations. To illustrate the method, we’ll use the differential equation x2y′′ −3xy′ + 4y = 0 .
Note that the first coefficient, x2 , vanishes when x = 0 . From comments made in chapter 12 (see page 261), we should suspect that x = 0 ought not be in any interval of interest for this equation. So we will be solving over the intervals (0, ∞) and (−∞, 0) .
Before starting the reduction of order method, we need one nontrivial solution y1 to our differential equation. Ways for finding that first solution will be discussed in later chapters. For now let us just observe that if y1(x) = x2 , then x2y1 ′′ −3x y1 ′ + 4y1 = x2 d2 dx2 x2 −3x d dx x2 + 4 x2 = x2[2 · 1] −3x[2x] + 4x2 = x2 [2 −(3 · 2) + 4] | {z } 0 !
= 0 .
Reduction of Order for Homogeneous Linear Second-Order Equations 285 Thus, one solution to the above differential equation is y1(x) = x2 .
As already stated, this method is for finding a general solution to some homogeneous linear second-order differential equation ay′′ + by′ + cy = 0 (where a , b , and c are ‘known functions’ with a(x) never being zero on the interval of interest). We will assume that we already have one nontrivial particular solution y1(x) to this generic differential equation.
For our example (as already noted), we will seek a general solution to x2y′′ −3xy′ + 4y = 0 .
(13.1) The one (nontrivial) solution we know is y1(x) = x2 .
Here, now, are the details in using the reduction of order method to solve the above: 1.
Let y = y1 u where u = u(x) is a function yet to be determined. To simplify the “plugging into the differential equaton” ,goaheadandcompute thecorrespondingformulas for the derivatives y′ and y′′ using the product rule: y′ = (y1u)′ = y1 ′u + y1u′ and y′′ = y′′ = y1 ′u + y1u′′ = y1 ′u ′ + y1u′′ = y1 ′′u + y1 ′u′ + y1 ′u′ + y1u′′ = y1 ′′u + 2y1 ′u′ + y1u′′ .
For our example, y = y1 u = x2u where u = u(x) is the function yet to be determined. The derivatives of y are y′ = x2u ′ = 2xu + x2u′ and y′′ = (y′)′ = 2xu + x2u′′ = (2xu)′ + x2u′′ = 2u + 2xu′ + 2xu′ + x2u′′ = 2u + 4xu′ + x2u′′ .
2.
Plug the formulas just computed for y , y′ and y′′ into the differential equation, group together the coefficients for u and each of its derivatives, and simplify as far as possible.
(We’ll do this with the example first and then look at the general case.) 286 Reduction of Order Plugging the formulas just computed above for y , y′ and y′′ into equation (13.1), we get 0 = x2y′′ −3xy′ + 4y = x2 2u + 4xu′ + x2u′′ −3x 2xu + x2u′ + 4 x2u = 2x2u + 4x3u′ + x4u′′ −6x2u −3x3u′ + 4x2u = x4u′′ + 4x3 −3x3 u′ + 2x2 −6x2 + 4x2 u = x4u′′ + x3u′ + 0 · u .
Notice that the u term drops out! So the resulting differential equation for u is simply x4u′′ + x3u′ = 0 , which we can further simplify by dividing out x4 , u′′ + 1 x u′ = 0 In general, plugging in the formulas for y and its derivatives into the given differential equation yields 0 = ay′′ + by′ + cy = a y1 ′′u + 2y1 ′u′ + y1u′′ + b y1 ′u + y1u′ + c y1u = ay1 ′′u + 2ay1 ′u′ + ay1u′′ + by1 ′u + by1u′ + cy1u = ay1u′′ + 2ay1 ′ + by1 u′ + ay1 ′′ + by1 ′ + cy1 u .
That is, the differential equation becomes Au′′ + Bu′ + Cu = 0 where A = ay1 , B = 2ay1 ′ + by1 and C = ay1 ′′ + by1 ′ + cy1 .
But remember, y1 is a solution to the homogeneous equation ay′′ + by′ + cy = 0 .
Consequently, C = ay1 ′′ + by1 ′ + cy1 = 0 , and the differential equation for u automatically reduces to Au′′ + Bu′ = 0 .
The u term always drops out!
3.
Now find the general solution to the second-order differential equation just obtained for u , Au′′ + Bu′ = 0 , via the substitution method discussed in chapter 11: Reduction of Order for Homogeneous Linear Second-Order Equations 287 (a) Let u′ = v (and, thus, u′′ = v′ = dv/dx ) to convert the second-order differential equation for u to the first-order differential equation for v , A dv dx + Bv = 0 .
(It is worth noting that this first-order differential equation will be both linear and separable.) (b) Find the general solution v(x) to this first-order equation. (Since it is both linear and separable, you can solve it using either the procedure developed for first-order linear equations or the approach developed for first-order separable equations.) (c) Using the formula just found for v , integrate the substitution formula u′ = v to obtain the formula for u , u(x) = Z v(x) dx .
Don’t forget all the arbitrary constants.
In our example, we obtained u′′ + 1 x u′ = 0 .
Letting v = u′ and, thus, v′ = u′′ this becomes dv dx + 1 x v = 0 .
Equivalently, dv dx = −1 x v .
This is a relatively simple separable first-order equation. It has one constant solution, v = 0 . To find the others, we divide through by v and proceed as usual with such equations: 1 v dv dx = −1 x H ⇒ Z 1 v dv dx dx = − Z 1 x dx H ⇒ ln |v| = −ln |x| + c0 H ⇒ v = ±e−ln|x| + c0 H ⇒ v = ±ec0x−1 .
Letting A = ±ec0 , this simplifies to v = A x , which also accounts for the constant solution (when A = 0 ).
Since u′ = v , it then follows that u(x) = Z v(x) dx = Z A x dx = A ln |x| + B .
288 Reduction of Order 4.
Finally, plug the formula just obtained for u(x) into the first substitution, y = y1u , used to convert the original differential equation for y to a differential equation for u .
The resulting formula for y(x) will be a general solution for that original differential equation. (Sometimes that formula can be simplified a little. Feel free to do so.) In our example, the solution we started with was y1(x) = x2 . Combined with the u(x) just found, we have y = y1u = x2[A ln |x| + B] .
That is, y(x) = Ax2 ln |x| + Bx2 is the general solution to equation (13.1).
An Observation About the Solution Let us observe that, in the example, the general solution obtained was y(x) = Ax2 ln |x| + Bx2 , which can be viewed as a linear combination of the two functions y1(x) = x2 and y2(x) = x2 ln |x| .
Since the A and B in the above formula for y(x) are arbitrary constants, and y2 is given by that formula for y with A = 1 and B = 0 , it must be that this y2 is another particular solution to our original homogeneous linear differential equation. What’s more, it is clearly not a constant multiple of y1 . This should strengthen an earlier suspicion that the general solution to a homogeneous linear second-order differential equation can be written as just such a linear combination.
We will later examine more closely the general form for general solution toany homogeneous linear differential equation. In the meantime, while practicing this method, do observe that the general solution you obtain for each second-order homogeneous linear differential equation can, invariably, be written as y(x) = Ay2(x) + By1(x) where y1 and y2 are two solutions that are not constant multiples of each other. Keep in mind that this form is the same as the form earlier anticipated, namely, y(x) = c1y1(x) + c2y2(x) .
We’ve just renamed the arbitrary constants from c1 and c2 to B and A , respectively.
Reduction of Order for Nonhomogeneous Linear Second-Order Equations 289 13.3 Reduction of Order for Nonhomogeneous Linear Second-Order Equations If you look back over our discussion in section 13.2, you will see that the reduction of order method applies almost as well in solving a nonhomogeneous equation ay′′ + by′ + cy = g , provided that “one solution y1 ” is a solution to the corresponding homogeneous equation ay′′ + by′ + cy = 0 .
Then, letting y = y1u in the nonhomogeneous equation and then replacing u′ with v leads to an equation of the form Av′ + Bv = g instead of Av′ + Bv = 0 .
So we don’t end up with a first-order equation for v which is both separable and linear; it is just linear. Still, we know how to solve such equations. Solving that first-order linear differential equation for v and continuing with the method already described finally yields the general solution to the desired nonhomogeneous differential equation.
We will do one example. Then I’ll tell you why the method is rarely used in practice.
!◮Example 13.1: Let us try to solve the second-order nonhomogeneous linear differential equation x2y′′ −3xy′ + 4y = √x (13.2) over the interval (0, ∞) .
As we saw in our main example in the section 13.2, the corresponding homogeneous equation x2y′′ −3xy′ + 4y = 0.
has y1(x) = x2 as one solution (in fact, from that example, we know the entire general solution to this homogeneous equation, but we only need this one particular solution for the method). Let y = y1 u = x2u where u = u(x) is the function yet to be determined. The derivatives of y are y′ = x2u ′ = 2xu + x2u′ and y′′ = (y′)′ = 2xu + x2u′′ = 2u + 2xu′ + 2xu′ + x2u′′ = 2u + 4xu′ + x2u′′ .
290 Reduction of Order Plugging these into equation (13.2) yields √x = x2y′′ −3xy′ + 4y = x2 2u + 4xu′ + x2u′′ −3x 2xu + x2u′ + 4 x2u = 2x2u + 4x3u′ + x4u′′ −6x2u −3x3u′ + 4x2u = x4u′′ + 4x3 −3x3 u′ + 2x2 −6x2 + 4x2 u = x4u′′ + x3u′ + 0 · u .
As before, the u term drops out. In this case, we are left with x4u′′ + x3u′ = √x .
That is, x4v′ + x3v = x 1/2 with v = u′ .
This is a relatively simple first-order linear equation. To help find the integrating factor, we now divide through by x4 , obtaining dv dx + 1 x v = x−7/2 .
Thus, the integrating factor is µ = e R 1 x dx = eln|x| = |x| .
Since we are just attempting to solve over the interval (0, ∞) , we really just have µ = x .
Multiplying the last differential equation for v and proceeding as usual when solving first-order linear differential equations: x dv dx + 1 x v = x h x−7/2 i H ⇒ x dv dx + v = x−5/2 H ⇒ d dx xv = x−5/2 H ⇒ Z d dx xv dx = Z x−5/2 dx H ⇒ xv = −2 3x−3/2 + c1 H ⇒ v = −2 3x−5/2 + c1 x Recalling that v = u′ , we can rewrite the last line as du dx = −2 3x−5/2 + c1 x .
Reduction of Order for Nonhomogeneous Linear Second-Order Equations 291 Thus, u = Z du dx dx = Z −2 3x−5/2 + c1 x dx = 2 3 2 x−3/2 + c1 ln(x) + c2 = 4 9x−3/2 + c1 ln(x) + c2 , and the general solution to our nonhomogeneous equation is y(x) = x2u(x) = x2 4 9x−3/2 + c1 ln(x) + c2 = 4 9x 1/2 + c1x2 ln(x) + c2x2 .
For no obvious reason at this point, let’s observe that we can write this solution as y(x) = c1x2 ln(x) + c2x2 + 4 9 √x .
(13.3) It should be observed that, in the above example, we only used one particular solution, y1(x) = x2 , to the homogeneous differential equation x2y′′ −3xy′ + 4y = 0 even though we had already found the general solution Ax2 ln |x| + Bx2 .
Later, in chapter 23, we will develop a refinement of the reduction of order method for solv-ing second-order nonhomogeneous linear differential equations which makes use of the entire general solution to the corresponding homogeneous equation. This refinement (the “variation of parameters” method) has two distinct advantages over the reduction of order method when solving nonhomogeneous differential equations: 1.
The computations required for the refined procedure tend to be simpler and more easily carried out.
2.
With a few straightforward modifications, the refined procedure readily extends to being a useful method for dealing with nonhomogeneous linear differential equations of any order. For the reasons discussed in the next section, the same cannot be said about the basic reduction of order method.
That is why, in practice, the basic reduction of order method is rarely used with nonhomogeneous equations.
292 Reduction of Order 13.4 Reduction of Order in General In theory, reduction of order can be applied to any linear equation of any order, homogeneous or not. Whether it’s application is useful is another issue.
!◮Example 13.2: Consider the third-order homogeneous linear differential equation y′′′ −8y = 0 .
(13.4) If you rewrite this equation as y′′′ = 8y , and think about what happens when you differentiate exponentials, you will realize that y1(x) = e2x is ‘obviously’ a solution to our differential equation (verify it yourself). Letting y = y1 u = e2xu and repeatedly using the product rule, we get y′ = e2xu ′ = 2e2xu + e2xu′ , y′′ = e2xu ′′ = 2e2xu + e2xu′′ = 4e2xu + 2e2xu′ + 2e2xu′ + e2xu′′ = 4e2xu + 4e2xu′ + e2xu′′ , and y′′′ = e2xu ′′′ = 4e2xu + 4e2xu′ + e2xu′′′ = 8e2xu + 4e2xu′ + 8e2xu′ + 4e2xu′′ + 2e2xu′′ + e2xu′′′ = 8e2xu + 12e2xu′ + 6e2xu′′ + e2xu′′′ .
So, using y = e2xu , y′′′ −8y = 0 H ⇒ 8e2xu + 12e2xu′ + 6e2xu′′ + e2xu′′′ −8 e2xu = 0 H ⇒ e2xu′′′ + 6e2xu′′ + 12e2xu′ + 8e2x −8e2x u = 0 .
Again, the u term cancel out, leaving us with e2xu′′′ + 6e2xu′′ + 12e2xu′ = 0 .
Letting v = u′ and dividing out the exponential, this becomes the second-order differential equation v′′ + 6v′ + 12v = 0 .
(13.5) Additional Exercises 293 Thus we have changed the problem of solving the third-order differential equation to one of solving a second-order differential equation. If we can now correctly guess a particular solution v1 to that second-order differential equation, we could again use reduction of order to get the general solution v(x) to that second-order equation, and then use that and the fact that y = e2xu with v = u′ to obtain the general solution to our original differential equation.
Unfortunately, even though the order is less, “guessing” a solution to equation (13.5) is a good deal more difficult than was guessing a particular solution to the original differential equation, equation (13.4).
As the example illustrates, even if we can, somehow, obtain one particular solution to a given N th-order linear homogeneous linear differential equation, and then use it to reduce the problem to solving an (N −1)th-order differential equation, that lower order differential equation may be just as hard to solve as the original differential equation (unless N = 2 ). In fact, we will learn how to solve differential equations such as equation (13.5), but those methods can also be used to find the general solution to the original differential equation, equation (13.4), as well.
Still it does no harm to know that the problem of solving an N th-order linear homogeneous linear differential equation can reduced to that of solving an (N −1)th-order differential equation, especially since we may refer to this fact in the next chapter. For the record, here is a theorem to that effect: Theorem 13.1 (reduction of order in homogeneous equations) Let y be any solution to some N th-order homogeneous differential equation a0y(N) + a1y(N−1) + · · · + aN−2y′′ + aN−1y′ + aN y = g (13.6) where g and the ak’s are known functions on some interval of interest I , and let y1 be a nontrivial particular solution to the corresponding homogeneous equation a0y(N) + a1y(N−1) + · · · + aN−2y′′ + aN−1y′ + aN y = 0 .
Set u = y y1 (so that y = y1 u ) .
Then v = u′ satisfies an (N −1)th-order differential equation A0v(N−1) + A1v(N−2) + · · · + AN−2v′ + AN−1v = g .
where the Ak’s are functions on the interval I that can be determined from the ak’s along with y1 and its derivatives.
The proof is relatively straightforward: You see what happens when you repeatedly use the product rule with y = y1 u , and plug the results into the equation (13.6). I’ll leave the details to you (see exercise 13.3).
294 Reduction of Order Additional Exercises 13.1. For each of the following, first verify that the given y1 is a solution to the given differential equation, and then find the general solution to the differential equation using the given y1 with the method of reduction of order.
a. y′′ −5y′ + 6y = 0 , y1(x) = e2x b. y′′ −10y′ + 25y = 0 , y1(x) = e5x c. x2y′′ −6xy′ + 12y = 0 , y1(x) = x3 d. 4x2y′′ + y = 0 on x > 0 , y1(x) = √x e. y′′ − 4 + 2 x y′ + 4 + 4 x y = 0 , y1(x) = e2x f. y′′ −1 x y′ −4x2y = 0 , y1(x) = e−x2 g. y′′ + y = 0 , y1(x) = sin(x) h. xy′′ + (2 + 2x)y′ + 2y = 0 , y1(x) = x−1 i. sin2(x)y′′ −2 cos(x) sin(x)y′ + 1 + cos2(x) y = 0 , y1(x) = sin(x) j. x2y′′ −2xy′ + x2 + 2 y = 0 , y1(x) = x sin(x) k. x2y′′ + xy′ + y = 0 , y1(x) = sin(ln |x|) l. x2y′′ + xy′ + x2 −1 4 y = 0 , y1(x) = x−1/2 cos(x) 13.2. Several nonhomogeneous differential equations are given below. For each, first verify that the given y1 is a solution to the corresponding homogeneous differential equation, and then find the general solution to the given nonhomogeneous differential equation using reduction of order with the given y1 .
a. y′′ −4y′ + 3y = 9e2x , y1(x) = e3x b. y′′ −6y′ + 8y = e4x , y1(x) = e2x c. x2y′′ + xy′ −y = √x , y1(x) = x d. x2y′′ −20y = 27x5 , y1(x) = x5 e. xy′′ + (2 + 2x)y′ + 2y = 8e2x , y1 = x−1 f. (x + 1)y′′ + xy′ −y = (x + 1)2 , y1 = e−x 13.3. Prove the claims in theorem 13.1 assuming: a. N = 3 b. N = 4 c. N is any positive integer 13.4. Each of the following is one of the relatively few third- and fourth-order differential equations that can be easily solved via reduction of order. For each, first verify that the Additional Exercises 295 given y1 is a solution to the given differential equation or to the corresponding homo-geneous equation (as appropriate), and then find the general solution to the differential equation using the given y1 with the method of reduction of order.
a. y′′′ −9y′′ + 27y′ −27y = 0 , y1 = e3x b. y′′′ −9y′′ + 27y′ −27y = e3x sin(x) , y1 = e3x c. y(4) −8y′′′ + 24y′′ −32y′ + 16y = 0 , y1 = e2x d. x3y′′′ −4y′′ + 10y′ −12y = 0 , y1 = x2 |
10574 | https://www.youtube.com/watch?v=oBV39vewyWU | Funciones Trigonométricas Complejas, Definición, Ejemplos y Propiedades (Variable Compleja)
MateFacil
1450000 subscribers
538 likes
Description
19766 views
Posted: 10 Dec 2022
En este video veremos cómo se definen las funciones trigonométricas en variable compleja, seno, coseno, tangente, cotangente, secante y cosecante. Veremos también un ejemplo que consiste en calcular el seno de un número complejo. Y finalmente veremos una lista de las propiedades mas importantes.
Anterior: Siguiente:
Variable Compleja:
analisis #variableCompleja #complejos
ENLACES IMPORTANTES
Curso de Variable Compleja:
Coordenadas Polares, Cilíndricas y esféricas:
Curso de Álgebra Lineal:
Curso de Cálculo Integral:
Videos Exclusivos:
Curso de repaso de matemáticas (preuniversitarias)
MIRA TODOS MIS CURSOS AQUÍ
BIBLIOGRAFÍA
- Variable Compleja y aplicaciones, Ruel V. Churchill
- Análisis básico de Variable Compleja, Marsden y Hoffman
- Análisis complejo, Dennis G. Zill
- Variable Compleja, Murray R. Spiegel (Serie Schaum)
- Variable Compleja, Polya y Latta
- Funciones de Variable Compleja, Cesar A. Trejo
- Análisis Real y Complejo, W. Rudin
- Problemas sobre la Teoría de Funciones de Variable Compleja, Volkovyski (MIR)
- Variable Compleja con aplicaciones, A. David Wunsch
- Matemáticas Avanzadas para ingeniería, Peter V. O'Neil
DONACIONES
Paypal:
Membresías del canal:
Patreon:
MIS OTROS CANALES Y REDES SOCIALES
Grupo de Telegram:
Canal de Física:
Canal de Videojuegos:
Twitch:
Facebook (Página):
Twitter:
Instagram:
TikTok:
Discord:
Matefacil #Matematicas #Math #tutorial #tutor #tutoriales #profesor
__________ -
Los mejores cursos de matemáticas gratis. Cursos completos de matemáticas desde cero. Video tutoriales de matemáticas explicadas paso a paso .
Curso de variable compleja gratos explicado desde cero. Videos con ejercicios resueltos de análisis complejo. Ejemplos resueltos y explicados paso a paso de números complejos.
14 comments
Transcript:
Bienvenida. Hola y bienvenidos a otro vídeo de Mate fácil en este vídeo vamos a ver las funciones trigonométricas de variable compleja antes de empezar Quiero invitarlos a unirse a mi grupo de Telegram el enlace Se los voy a dejar en el primer comentario de este vídeo y también a que me sigan a través de mis redes sociales Bueno lo que nosotros ya Explicación general de funciones trigonométricas complejas. conocemos son las seis funciones trigonométricas de variable real aquí la x es un número real ya conocemos bastantes propiedades de estas seis funciones sabemos por ejemplo que son periódicas sabemos por ejemplo Cómo se relacionan entre ellas y varias identidades trigonométricas y como ustedes saben las funciones trigonométricas son sumamente importantes en variable real Bueno pues también en variable compleja son muy importantes las funciones trigonométricas Así que necesitamos definirlas Entonces si cambiamos esta x Que es variable real por una variable compleja ahí tendríamos nuestras funciones trigonométricas complejas queremos ver cómo podemos nosotros calcular por ejemplo una expresión como esta de aquí seno de dos más tres por y e incluso vamos a ver que una vez que definamos las funciones de variable compleja estas funciones van a cumplir otras propiedades que no se cumplían con las funciones de variables real por ejemplo vamos a ser capaces de resolver una ecuación como esta de aquí que el coseno de un número sea igual a 3 Esto no se puede resolver dentro de variables real porque el coseno siempre está entre menos uno y uno está acotado o sea el coseno nunca puede darnos como resultado algo mayor que uno pero en este caso vamos a ver que dentro de variable compleja vamos a encontrar números tal que el coseno de ese número sea igual al 3 Sí entonces todo esto lo vamos a ir viendo cómo podemos entonces definir las Ejemplos de funciones trigonométricas complejas. funciones trigonométricas complejas bueno para esto lo que vamos a hacer es ayudarnos de esta identidad de aquí la identidad de oiler que relaciona la exponencial con las funciones seno y coseno aquí en esta identidad recuerden ustedes que ya es un número real Sí entonces aquí estamos relacionando la exponencial de y por y con las funciones de variables real coseno de seno de y bueno si cambiamos y por menos Y tenemos esta otra fórmula Simplemente nos queda aquí cosen menos y que es lo mismo que el coseno de ye porque es una función par y acá nos quedaría seno de menos y que es lo mismo que menos el seno de ye porque el seno es una función impar Entonces si ahora nosotros sumamos estas exponenciales al sumarlas tendríamos que sumar esta expresión más esta expresión y vemos que los senos se cancelan Entonces nos va a quedar que esta suma de exponenciales es dos veces el coseno ahora el 2 lo pasamos dividiendo Y entonces lo que acabamos de obtener es que el coseno de y es igual a esta suma de exponenciales sobre 2 Bueno aquí la ye es una variable real pero en realidad ya nosotros aquí podríamos cambiar esta variable real por una variable compleja y podemos seguir calculando esto Exactamente igual porque ya sabemos calcular las exponenciales de variable compleja eso es lo que nos va a ayudar a definir el coseno de Z bueno y para el caso del seno en lugar de sumar estas exponenciales vamos a restarlas Así que nos va a quedar esta expresión menos esa de acá Así que es menos el coseno y luego menos por menos nos da este más y vean que este coseno ahora se cancela con este de acá y aquí nos queda dos veces el y por seno de y el 2 y pasa dividiendo y entonces tenemos ahora que el seno de y es igual a esta expresión entonces con estas dos expresiones que acabamos de obtener aquí son expresiones que bueno son válidas cuando ya es una variable real pero nos ayudan a definir el seno y el coseno para una variable compleja Entonces vamos a definir para los números complejos estas mismas expresiones vamos a decir que el coseno de Z va a ser igual a e elevado a y por Z más elevado a menos y por Z sobre 2 y lo mismo para el caso del seno sí aquí Z es un número complejo o sea es de la forma x + y por y está bien definido todo porque ya sabemos nosotros calcular las exponenciales de variable compleja Entonces como un pequeño ejemplo vamos a calcular el seno de dos más tres y con esta definición simplemente sustituimos el valor de Z que es 2 + 3 y aquí y entonces nos queda esta expresión y vamos haciendo las operaciones Primero multiplicamos aquí por Y entonces queda 2 y y luego aquí y por 10 y cuadrada entonces queda 2 y menos 3 y por acá menos dos y más 3 bueno y Aquí vamos a recordar cómo se calcula la exponencial de variable compleja se calcula de esta manera es la exponencial de la parte real que en este caso es menos 3 y luego multiplicado por el coseno de la parte imaginaria o sea de lo que está acompañado por la y que en este caso es un 2 entonces es coseno de dos más y seno de 2 y lo mismo por aquí aquí va a quedar e elevado a 3 coseno de menos dos más y por el seno de menos 2 Bueno y seguimos simplificando aquí multiplicamos por la exponencial por acá recordamos que el coseno es función par entonces coseno de -2 es lo mismo que coseno de 2 entonces queda menos sea la 3 coseno de 2 y por aquí va a salir este signo menos porque la función es impar entonces va a quedar aquí un menos que por este menos nos da más Y entonces queda más y por esta exponencial por el seno de 2 y bueno podríamos Ya por aquí este ir dejando el resultado o podemos Separar en la parte real y la parte imaginaria para hacer eso vamos a agrupar primero factorizamos el coseno de 2 y entonces nos queda aquí a la menos 3 menos sea la 3 y por acá factorizamos el seno de 2 y también la y la factorizamos entonces queda a la menos 3 más y a la 3 ahora vamos a separar la fracción en una suma de fracciones por un lado nos va a quedar uno sobre dos y por esta expresión y en la otra nos va a quedar y sobre dos y por esta expresión En esta segunda vean que está ahí se cancela con esta entonces directamente es un medio y esta resta de exponenciales y esta suma de exponenciales nos recuerda algo que también aprendemos en variable real que son las funciones hiperbólicas el seno hiperbólico se define como la exponencial de T - sea la menos t sobre 2 y el coseno hiperbólico de esta otra manera tienen cierto parecido con las funciones seno y coseno que acabamos de calcular solo que en este caso aquí no está involucrada no está involucrado el número y si todo esto es variable real entonces con ayuda de estas funciones hiperbólicas nosotros podemos simplificar esta expresión para no tener que escribir esta resta de exponenciales y esta suma de exponenciales observen que este 2 que está dividiendo podemos meterlo aquí aquí lo mismo y entonces esto de aquí ya es de hecho el coseno hiperbólico esto de acá es casi el seno hiperbólico solamente que aquí la resta está en el sentido contrario Pero si multiplicamos por este menos vamos a invertir el orden de la resta Entonces vamos a multiplicar por este menos ya la resta va a quedar en el otro orden aquí como es suma podemos cambiar el orden y es lo mismo y entonces esto de acá es el seno hiperbólico Y esto es el coseno hiperbólico en este caso el seno hiperbólico de 3 y acá es el coseno hiperbólico de 3 y entonces ahí tenemos ya el seno en su parte imaginaria y su parte real o escribiendo primero la parte real y la parte imaginaria queda de esta manera bueno así podemos dejar ya el resultado o podríamos una calculadora hacer esto Recuerden que en radiales Y entonces nos queda esto con números decimales bueno Esto de aquí lo podemos hacer para cualquier número complejo pero vamos a encontrar una fórmula que nos va a permitir calcularlo directamente sin tener que hacer todo este procedimiento Eso lo veremos En un momento más Entonces cómo definimos las demás funciones trigonométricas ya tenemos el seno y el coseno Bueno pues las otras cuatro se van a definir igual que en el caso de variable real la tangente se define como el seno entre coseno la cotangente como coseno sobre seno secante como uno entre coseno y cosecante como uno entre seno Y entonces ahí tenemos ya todas definidas como pueden ver ustedes las más importantes son el seno y el coseno porque a partir de estas dos salen las otras 4 aunque también es bastante utilizada la tangente Entonces vamos a ver una lista Propiedades de las funciones trigonométricas complejas. de propiedades para estas funciones trigonométricas la primera es el seno de una suma o de una resta que es esta expresión de aquí vean que es realmente la misma fórmula que ya conocemos de variable real se sigue cumpliendo cuando los números de aquí son números complejos en este caso si es una suma tomamos el signo de arriba Entonces es una suma Aquí también y si tenemos aquí una resta entonces tomamos el signo de abajo que también es una resta en el caso del coseno si aquí tomamos una suma acá nos queda una resta ya casi es una resta por acá tomamos la suma y vean que es la misma identidad que conocemos también de variable real y lo mismo para el caso de la tangente es la misma identidad también son importantes las identidades del ángulo doble son bastante utilizadas y son las mismas que aprendemos en variable real y luego estas identidades de acá que el seno es una función impar que el coseno es una función par y la tangente es una función impar esta siguen siendo Igualmente válidas cuando Z es un número complejo todas estas identidades hay que demostrarlas no podemos simplemente decir que como se cumplían en la variable real se van a seguir cumpliendo en la variable compleja hay que demostrarlas a partir de la de la definición todo eso lo iremos demostrando en los siguientes vídeos sigamos viendo otras propiedades tenemos por aquí las identidades pitagóricas bastante importantes que ya conocemos de variable real pero que se cumplen también para la variable compleja y luego estas otras identidades de aquí que son una combinación entre las identidades pitagóricas y las del ángulo doble y que nos permiten calcular la el seno y el coseno del ángulo mitad luego tenemos estas otras identidades de aquí que relacionan el seno coseno y tangente de un número imaginario puro en este caso y por y se relaciona con el seno hiperbólico coseno hiperbólico y tangente hiperbólica respectivamente y a partir de estas tres identidades podemos encontrar estas otras tres de acá usando el seno y el coseno de una suma una resta etcétera y vean Cómo precisamente aquí esto se parece a lo que obtuvimos en el ejemplo para calcular el seno de 2 + 3 y podríamos ya directamente sustituir en x el 2 el 3 y tendríamos la expresión directa Pero esto hay que demostrarlo bueno y el conjugado conjugado de seno coseno y tangente es lo mismo que el seno del conjugado el coseno del conjugado y la tangente del conjugado lo mismo que ocurría con la función exponencial compleja y luego para los módulos tenemos que el módulo de Z del seno de Z al cuadrado es el seno cuadrado de X más seno hiperbólico al cuadrado de y algo similar para el coseno y vean que de aquí surge algo importante algo que no se cumple ya en la variable compleja y que sí se cumple en la variable real en variable real el seno es una función acotada tanto el seno como el coseno son funciones que están entre -1 y 1 pero a partir de aquí podemos ver que ni el seno ni el coseno son funciones acotadas porque tenemos aquí una suma de dos funciones la primera si es acotada es el seno de X que está entre menos uno y uno pero el seno hiperbólico no es una función acotada si el número y es muy grande el seno hiperbólico de y sigue siendo muy grande o sea esta función crece y crece conforme y crece también entonces el coseno de Z puede ser tan grande como uno quiera simplemente tomando un valor de y lo suficientemente grande o sea que el seno ya no es una función acotada y lo mismo ocurre con el coseno bueno Y luego tenemos estas desigualdades de acá también importantes que el módulo del seno se encuentra entre el módulo del seno hiperbólico y el coseno hiperbólico y lo mismo para el caso del coseno todas estas identidades vamos a demostrarlas en los próximos vídeos Así que los invito a que los vean antes de terminar agradezco infinitamente a todos los miembros del Canal que con su gran apoyo hacen posible que siga subiendo nuevos vídeos y más cursos de esta manera ustedes me ayudan a contrarrestar un poquito los efectos del algoritmo de YouTube que no siempre beneficia a los canales educativos de verdad muchas gracias por todo su apoyo y si aún no eres miembro del Canal te invito a darle click al botón unirse para que mires los diversos niveles de membresía y los beneficios que tiene cada nivel entre esos beneficios tienes acceso exclusivo a cientos de vídeos con ejercicios interesantes te invito a darle clic para ver más información |
10575 | https://www.sciencedirect.com/science/article/abs/pii/S1521691810000405 | Pancreatic enzyme replacement therapy in chronic pancreatitis - ScienceDirect
Skip to main contentSkip to article
Journals & Books
Access throughyour organization
Purchase PDF
Patient Access
Other access options
Search ScienceDirect
Article preview
Abstract
Section snippets
References (96)
Cited by (110)
Best Practice & Research Clinical Gastroenterology
Volume 24, Issue 3, June 2010, Pages 337-347
10
Pancreatic enzyme replacement therapy in chronic pancreatitis
Author links open overlay panel E.C.M.Sikkens MD, D.L.Cahen MD, PhD 1, E.J.Kuipers Md, PhD(Professor)2, M.J.Bruno MD, PhD(Professor)3
Show more
Add to Mendeley
Share
Cite
rights and content
Exocrine pancreatic insufficiency (EPI) is a serious condition which occurs in several diseases including chronic pancreatitis (CP), cystic fibrosis, pancreatic cancer, and as a result of pancreatic surgery. The lack or absence of pancreatic enzymes leads to an inadequate absorption of fat, proteins, and carbohydrates, causing steatorrhoea and creathorrhea which results in abdominal discomfort, weight loss, and nutritional deficiencies. To avoid malnutrition related morbidity and mortality, it is pivotal to commence pancreatic enzyme replacement therapy (PERT) as soon as EPI is diagnosed. Factors as early acidic inactivation of ingested enzymes, under dosage, and patient incompliance may prevent normalisation of nutrient absorption, in particular of fat digestion. This review focuses on the current status of how to diagnose and treat EPI.
Access through your organization
Check access to the full text by signing in through your organization.
Access through your organization
Section snippets
Exocrine pancreatic insufficiency and chronic pancreatitis
In EPI the pancreas is unable to deliver sufficient amounts of pancreatic enzymes to the small intestine to digest intraluminal nutrients. EPI may occur due to loss of functional parenchyma (atrophy), blockage of the pancreatic duct, or postprandial asynchrony. Besides CP, other conditions that can result in loss of parenchyma are severe acute pancreatitis (which can cause transient EPI), pancreatic resection, and cystic fibrosis (CF). Chronic obstruction of the main pancreatic duct can be
Pancreatic secretion
The pancreas plays a crucial role in the digestive system. The gland produces pancreatic juice that consists of a mixture of more than two dozen digestive enzymes in the pre-activated form, called zymogens. Zymogens are produced by acinar cells and mixed with a bicarbonate rich fluid that is produced by pancreatic ducts cells , . Trypsinogen is the most important zymogen because it becomes trypsin, the key enzyme that activates all other zymogens. Trypsin, chymotrypsin, amylase and
Pathophysiology
The pancreas has a large functional reserve and clinically evident EPI occurs only when 90% of the function is lost and the secretion of pancreatic enzymes is less than 10% of normal , . Because of a decrease in lipase, trypsin and amylase activity, maldigestion of fat, proteins and carbohydrates occurs. Malabsorption of fat precedes malabsorption of proteins and carbohydrates and is clinically more apparent , , . The decrease in pancreatic lipolytic activity cannot be
Symptoms and complications
In CP patients with EPI, maldigestion of dietary macronutrients (fat, proteins and carbohydrates) leads to malnutrition which is associated with various health problems. Maldigestion of fat results in steatorrhoea, which causes symptoms such as foul-smelling, voluminous, greyish, fatty stools, abdominal cramps, bloating and chronic abdominal pain . In addition, steatorrhoea may cause weight loss due to the loss of the highest dietary source of calories (fat contains 38 kJ/g, carbohydrates
Diagnosis
The pancreatic exocrine function can be tested in an invasive or a non-invasive manner. With invasive testing, which is considered to be the golden standard, pancreatic enzymes are measured in pancreatic juice that is collected from the duodenum after intubation (intraduodenal lipase output after intravenous administration of 1 U/kg CCK; normal value, >90 kU/h) . Pancreatic enzyme stimulation in these tests can be either direct, by means of the intravenous administration of hormones like
Treatment
The treatment of EPI in CP consists of the oral administration of a combination of pancreatic enzymes during meals . Every patient with EPI and maldigestion, independent of the degree of steatorrhoea and presence or absence of associated symptoms, should receive PERT , . The main focus in the management of EPI is to prevent weight loss, EPI related symptoms, vitamin deficiencies, and to improve the nutritional status , . The most important clinical parameter to monitor
Pancreatic enzyme replacement therapy (PERT)
The exogenous pancreatic enzymes currently used, are primarily extracted from porcine sources. These preparations, also called pancrelipase or pancreatin, contain a variable mixture of protease, lipase and amylase depending on the brand. Various pancreatin preparations are available consisting of capsules containing mini-microspheres, pellets or micro-tablets of less than 2 mm in size. They are designed to promote an adequate intragastric mixture of exogenous enzymes with chyme , , ,
Diet and dosage recommendations
Despite the absence of an easy applicable and objective method to establish the adequate dose of oral pancreatic enzymes in EPI, some general guidelines can be given to accomplish a patient tailored administration schedule . In the past, the restriction of fat was the only way to reduce steatorrhoea, but with the introduction of PERT, this is no longer advocated. Instead, the dose of PERT is tailored to the fat intake of the patient. In general, the recommended dosage of PES for a main meal
When treatment fails
In case of treatment failure, several causes should be considered. A common cause for treatment failure is under dosing of pancreatic enzymes. The practical and reasonable first step therefore is to increase the dose of pancreatic enzymes guided by fat resorption and clinical response, up to a maximum of 10,000 IU lipase/kg/day. This latter recommendation stems from treating children with cystic fibrosis. Evidently, in adult patients with exocrine insufficiency such high dosages are not reached.
Toxicity and side effects
Very few side effects have been observed when using PERT. High doses of enzymes can induce transient nausea, bloating, diarrhoea and hypersensitivity. Only one serious adverse event has been reported. In January 1994, Smyth et al described five children with CF in which a colonic obstruction developed due to fibrosing colonopathy (FC) after using very high doses of the enteric-coated micro-minisphere preparations , . The mechanism underlying this phenomenon remains unclear. Although
Bovine enzymes
In patients who refuse to consume porcine products for religious or other cultural reasons, bovine enzymes appear to be an attractive alternative . However, bovine preparations contain about 75% less lipase activity compared to porcine and human pancreatic extracts. Hence, a considerable greater amount of tablets needs to be taken to treat EPI in comparison with porcine preparations. Furthermore, there are some concerns about transmittable pathogens which can cause diseases as
Summary
Clinically evident EPI occurs when 90% or more of the pancreatic function is impaired and the secretion of pancreatic enzymes is less than 10% of normal. It is of great importance to actively look for EPI, recognise it as early as possible, and start PERT to avoid malnutrition related morbidity and mortality. The most readily available and easiest test for a clinician to detect EPI is the FET. Every patient with EPI and maldigestion, independent of the degree of steatorrhoea and presence or
Conflict of interest
Mrs E.C.M. Sikkens has received an unrestricted research grant from “Axcan Pharma Inc., Canada”.
Special issue articles Recommended articles
References (96)
M.J. Bruno
Maldigestion and exocrine pancreatic insufficiency after pancreatic resection for malignant disease: pathophysiology and treatment
Pancreatology (2001)
P. Layer et al.
The different courses of early- and late-onset idiopathic and alcoholic chronic pancreatitis
Gastroenterology (1994 Nov)
S.T. Chari et al.
Diagnosis of autoimmune pancreatitis: the Mayo Clinic experience
Clin Gastroenterol Hepatol (2006 Aug)
F. Carriere et al.
Secretion and contribution to lipolysis of gastric and pancreatic lipases during a test meal in humans
Gastroenterology (1993 Sep)
M. Granger et al.
Limited action of trypsin on porcine pancreatic amylase: characterization of the fragments
FEBS Lett (1975 Aug 15)
P. Layer et al.
Feedback regulation of human pancreatic secretion. Effects of protease inhibition on duodenal delivery and small intestinal transit of pancreatic enzymes
Gastroenterology (1990 May)
P. Layer et al.
Altered postprandial motility in chronic pancreatitis: role of malabsorption
Gastroenterology (1997 May)
N.W. Read et al.
Effect of infusion of nutrient solutions into the ileum on gastrointestinal transit and plasma levels of neurotensin and enteroglucagon
Gastroenterology (1984 Feb)
C. Pasquali et al.
Efficacy of a pancreatic enzyme formulation in the treatment of steatorrhea in patients with chronic pancreatitis
Curr Therapeut Res – Clin Exp (1996)
J.P. Rivers et al.
Defective essential-fatty-acid metabolism in cystic fibrosis
Lancet (1975 Oct 4)
M. Kalivianakis et al.
Fat malabsorption in cystic fibrosis patients receiving enzyme replacement therapy is due to impaired intestinal uptake of long-chain fatty acids
Am J Clin Nutr (1999 Jan)
E.P. DiMagno
A short, eclectic history of exocrine pancreatic insufficiency and chronic pancreatitis
Gastroenterology (1993 May)
G. Isaksson et al.
Effect of dietary fiber on pancreatic enzyme activity in vitro
Gastroenterology (1982 May)
T. Stevens et al.
Evaluation of duct-cell and acinar-cell function and endosonographic abnormalities in patients with suspected chronic pancreatitis
Clin Gastroenterol Hepatol (2009 Jan)
J.E. Dominguez-Munoz et al.
13C-mixed triglyceride breath test to assess oral enzyme substitution therapy in patients with chronic pancreatitis
Clin Gastroenterol Hepatol (2007 Apr)
A. Sziegoleit et al.
Elastase 1 and chymotrypsin B in pancreatic juice and feces
Clin Biochem (1989 Apr)
S. Beharry et al.
How useful is fecal pancreatic elastase 1 as a marker of exocrine pancreatic disease?
J Pediatr (2002)
D.M. Goldberg
Proteases in the evaluation of pancreatic function and pancreatic disease
Clin Chim Acta (2000 Feb 15)
C. Niederau et al.
Diagnosis of chronic pancreatitis
Gastroenterology (1985 Jun)
H.C. Sax et al.
Early total parenteral nutrition in acute pancreatitis: lack of beneficial effects
Am J Surg (1987 Jan)
P.T. Regan et al.
Exocrine pancreatic insufficiency in celiac sprue: a cause of treatment failure
Gastroenterology (1980 Mar)
R.L. Smyth et al.
Fibrosing colonopathy in cystic fibrosis: results of a case–control study
Lancet (1995 Nov 11)
R.L. Smyth et al.
Strictures of ascending colon in cystic fibrosis and high-strength pancreatic enzymes
Lancet (1994 Jan 8)
M. Raimondo et al.
Lipolytic activity of bacterial lipase survives better than that of porcine lipase in human gastric and duodenal content
Gastroenterology (1994 Jul)
A. Suzuki et al.
Effect of bacterial or porcine lipase with low- or high-fat diets on nutrient absorption in pancreatic-insufficient dogs
Gastroenterology (1999 Feb)
A. Suzuki et al.
Bacterial lipase and high-fat diets in canine exocrine pancreatic insufficiency: a new therapy of steatorrhea?
Gastroenterology (1997 Jun)
H. Maeda et al.
Adenovirus-mediated transfer of human lipase complementary DNA to the gallbladder
Gastroenterology (1994 Jun)
J. Keller et al.
Human pancreatic exocrine response to nutrients in health and disease
Gut (2005 Jul)
T. Kamisawa et al.
Pancreatic endocrine and exocrine function and salivary gland function in autoimmune pancreatitis before and after steroid therapy
Pancreas (2003 Oct)
D.L. Finkelberg et al.
Autoimmune pancreatitis
N Engl J Med (2006 Dec 21)
D.C. Whitcomb et al.
Human pancreatic digestive enzymes
Dig Dis Sci. (2007 Jan)
H. Moreau et al.
Human gastric lipase: variations induced by gastrointestinal hormones and by pathology
Scand J Gastroenterol (1988 Nov)
P. Layer et al.
Fate of pancreatic enzymes during small intestinal aboral transit in humans
Am J Physiol (1986 Oct)
G. Holtmann et al.
Survival of human pancreatic enzymes during small bowel transit: effect of nutrients, bile acids, and enzymes
Am J Physiol (1997 Aug)
J. Keller et al.
Duodenal and ileal nutrient deliveries regulate human intestinal motor and pancreatic responses to a meal
Am J Physiol (1997 Mar)
P.G. Lankisch et al.
Functional reserve capacity of the exocrine pancreas
Digestion (1986)
P.H. Layer et al.
Natural histories of alcoholic and idiopathic chronic pancreatitis
Pancreas (1996 Apr)
P.K.J. Layer
Intestinal transit of chyme and its regulatory role: clinical implications
P. Layer et al.
Human pancreatic secretion and intestinal motility: effects of ileal nutrient perfusion
Am J Physiol (1990 Feb)
P. Layer et al.
Modulation of human periodic interdigestive gastrointestinal motor and pancreatic function by the ileum
Pancreas (1993 Jul)
E.S.L. Rosa et al.
Determinants of accelerated small intestinal transit in alcohol-related chronic pancreatitis
Dig Dis Sci (2009 Apr 24)
E.P. DiMagno et al.
Fate of orally ingested enzymes in pancreatic insufficiency. Comparison of two dosage schedules
N Engl J Med (1977 Jun 9)
P.L. Zentler-Munro et al.
Effect of intrajejunal acidity on aqueous phase bile acid and lipid concentrations in pancreatic steatorrhoea due to cystic fibrosis
Gut (1984 May)
I.M. Roberts
Enzyme therapy for malabsorption in exocrine pancreatic insufficiency
Pancreas (1989)
M.L. Rosenlund et al.
Essential fatty acids in cystic fibrosis
Nature (1974 Oct 25)
S.K. Dutta et al.
Deficiency of fat-soluble vitamins in treated patients with pancreatic insufficiency
Ann Intern Med (1982 Oct)
P.G. Lankisch et al.
Therapy of pancreatogenic steatorrhoea: does acid protection of pancreatic enzymes offer any advantage?
Z Gastroenterol (1986 Dec)
A.B. Haaber et al.
Bone mineral metabolism, bone mineral density, and body composition in patients with chronic pancreatitis and pancreatic exocrine insufficiency
Int J Pancreatol (2000 Feb)
View more references
Cited by (110)
Encapsulation, protection, and delivery of bioactive proteins and peptides using nanoparticle and microparticle systems: A review
2018, Advances in Colloid and Interface Science Citation Excerpt :
For instance, oral delivery of lactase aids in the breakdown of lactose into galactose and glucose within the small intestine, which is important for individuals with lactose intolerance [8,9]. Similarly, oral delivery of lipase can help patients with pancreatitis, i.e., the inability to breakdown lipids within the small intestine . Bioactive proteins may also include various kinds of hormones, such as insulin and glucagon-like peptide-1 (GLP-1) which are used to treat diabetes or angiotensin converting enzyme (ACE) inhibitors which are used to treat hypertension . Show abstract There are many examples of bioactive proteins and peptides that would benefit from oral delivery through functional foods, supplements, or medical foods, including hormones, enzymes, antimicrobials, vaccines, and ACE inhibitors. However, many of these bioactive proteins are highly susceptible to denaturation, aggregation or hydrolysis within commercial products or inside the human gastrointestinal tract (GIT). Moreover, many bioactive proteins have poor absorption characteristics within the GIT. Colloidal systems, which contain nanoparticles or microparticles, can be designed to encapsulate, retain, protect, and deliver bioactive proteins. For instance, a bioactive protein may have to remain encapsulated and stable during storage and passage through the mouth and stomach, but then be released within the small intestine where it can be absorbed. This article reviews the application of food-grade colloidal systems for oral delivery of bioactive proteins, including microemulsions, emulsions, nanoemulsions, solid lipid nanoparticles, multiple emulsions, liposomes, and microgels. It also provides a critical assessment of the characteristics of colloidal particles that impact the effectiveness of protein delivery systems, such as particle composition, size, permeability, interfacial properties, and stability. This information should be useful for the rational design of medical foods, functional foods, and supplements for effective oral delivery of bioactive proteins.
### Microbial lipases and their industrial applications: A comprehensive review
2020, Microbial Cell Factories Show abstract Lipases are very versatile enzymes, and produced the attention of the several industrial processes. Lipase can be achieved from several sources, animal, vegetable, and microbiological. The uses of microbial lipase market is estimated to be USD 425.0 Million in 2018 and it is projected to reach USD 590.2 Million by 2023, growing at a CAGR of 6.8% from 2018. Microbial lipases (EC 3.1.1.3) catalyze the hydrolysis of long chain triglycerides. The microbial origins of lipase enzymes are logically dynamic and proficient also have an extensive range of industrial uses with the manufacturing of altered molecules. The unique lipase (triacylglycerol acyl hydrolase) enzymes catalyzed the hydrolysis, esterification and alcoholysis reactions. Immobilization has made the use of microbial lipases accomplish its best performance and hence suitable for several reactions and need to enhance aroma to the immobilization processes. Immobilized enzymes depend on the immobilization technique and the carrier type. The choice of the carrier concerns usually the biocompatibility, chemical and thermal stability, and insolubility under reaction conditions, capability of easy rejuvenation and reusability, as well as cost proficiency. Bacillus spp., Achromobacter spp., Alcaligenes spp., Arthrobacter spp., Pseudomonos spp., of bacteria and Penicillium spp., Fusarium spp., Aspergillus spp., of fungi are screened large scale for lipase production. Lipases as multipurpose biological catalyst has given a favorable vision in meeting the needs for several industries such as biodiesel, foods and drinks, leather, textile, detergents, pharmaceuticals and medicals. This review represents a discussion on microbial sources of lipases, immobilization methods increased productivity at market profitability and reduce logistical liability on the environment and user.
### Practical guide to exocrine pancreatic insufficiency - Breaking the myths
2017, BMC Medicine Show abstract Exocrine pancreatic insufficiency (EPI) is characterized by a deficiency of exocrine pancreatic enzymes, resulting in malabsorption. Numerous conditions account for the etiology of EPI, with the most common being diseases of the pancreatic parenchyma including chronic pancreatitis, cystic fibrosis, and a history of extensive necrotizing acute pancreatitis. Treatment for EPI includes dietary management, lifestyle changes (i.e., decrease in alcohol consumption and smoking cessation), and pancreatic enzyme replacement therapy. Many diagnostic tests are available to diagnose EPI, however, the criteria of choice remain unclear and the causes for a false-positive test are not yet understood. Despite multiple studies on the treatment of EPI using exogenous pancreatic enzymes, there remains confusion amongst medical practitioners with regard to the best approach to diagnose EPI, as well as dosing and administration of pancreatic enzymes. Appropriate use of diagnostics and treatment approaches using pancreatic enzymes in EPI is essential for patients. This opinion piece aims to address the existing myths, remove the current confusion, and function as a practical guide to the diagnosis and treatment of EPI.
### Diagnosis and management of pancreatic cancer
2014, American Family Physician Show abstract Pancreatic cancer remains the fourth leading cause of cancer-related deaths in the United States. Risk factors include family history, smoking, chronic pancreatitis, obesity, diabetes mellitus, heavy alcohol use, and possible dietary factors. Because more than two-thirds of adenocarcinomas occur in the head of the pancreas, abdominal pain, jaundice, pruritus, dark urine, and acholic stools may be presenting symptoms. In symptomatic patients, the serum tumor marker cancer antigen 19-9 can be used to confirm the diagnosis and to predict prognosis and recurrence after resection. Pancreas protocol computed tomography is considered standard for the diagnosis and staging of pancreatic cancer. Although surgical resection is the only potentially curative treatment for pancreatic ductal adenocarcinomas, less than 20% of surgical candidates survive five years. The decision on resectability requires multidisciplinary consultation. Pancreatic resections should be performed at institutions that complete at least 15 of the surgeries annually. Postoperatively, use of gemcitabine or fluorouracil/leucovorin as adjuvant chemotherapy improves overall survival by several months. However, more than 80% of patients present with disease that is not surgically resectable. For patients with locally advanced or metastatic disease, chemoradiotherapy with gemcitabine or irinotecan provides clinical benefit and modest survival improvement. Palliation should address pain control, biliary and gastric outlet obstruction, malnutrition, thromboembolic disease, and depression.
### Recent advances in encapsulation, protection, and oral delivery of bioactive proteins and peptides using colloidal systems
2020, Molecules
### Protein hydrolysates in animal nutrition: Industrial production, bioactive peptides, and functional significance
2017, Journal of Animal Science and Biotechnology
View all citing articles on Scopus
1
Tel.: +31 (10) 70 35946.
2
Tel.: +31 (10) 70 34681.
3
Tel.: +31 (10) 70 35946; fax: +31 (10) 70 34682.
View full text
Copyright © 2010 Elsevier Ltd. All rights reserved.
Part of special issue
Chronic Pancreatitis
Edited by
Marco J.Bruno
Other articles from this issue
The epidemiology and socioeconomic impact of chronic pancreatitis
June 2010 James Jupp, …, Colin D.Johnson
### Diagnosis of chronic pancreatitis: Functional testing
June 2010 J. Enrique Domínguez Muñoz
### EUS in the diagnosis of early-stage chronic pancreatitis
June 2010 Lyndon V.Hernandez, Marc F.Catalano
View more articles
Recommended articles
Abilities of Oropharyngeal pH Tests and Salivary Pepsin Analysis to Discriminate Between Asymptomatic Volunteers and Subjects With Symptoms of Laryngeal Irritation
Clinical Gastroenterology and Hepatology, Volume 14, Issue 4, 2016, pp. 535-542.e2 Rena Yadlapati, …, John E.Pandolfino
### Risk of positive selection bias in longitudinal surveys among cancer survivors: Lessons learnt from the national Norwegian Testicular Cancer Survivor Study
Cancer Epidemiology, Volume 67, 2020, Article 101744 Sophie D.Fosså, …, Hege S.Haugnes
### Postprandial High-Resolution Impedance Manometry Identifies Mechanisms of Nonresponse to Proton Pump Inhibitors
Clinical Gastroenterology and Hepatology, Volume 16, Issue 2, 2018, pp. 211-218.e1 Rena Yadlapati, …, John E.Pandolfino
### Esophageal baseline impedance levels allow the identification of esophageal involvement in patients with systemic sclerosis
Seminars in Arthritis and Rheumatism, Volume 47, Issue 4, 2018, pp. 569-574 Patrizia Zentilin, …, Edoardo Savarino
### Synthesis and characterization of a triple enzyme-inorganic hybrid nanoflower (TrpE@ihNF) as a combination of three pancreatic digestive enzymes amylase, protease and lipase
Journal of Bioscience and Bioengineering, Volume 129, Issue 6, 2020, pp. 679-686 Duygu Aydemir, …, Nuriye Nuray Ulusu
### Carbohydrate Maldigestion and Malabsorption
Clinical Gastroenterology and Hepatology, Volume 16, Issue 8, 2018, pp. 1197-1199 Anam Omer, Eamonn M.M.Quigley
Show 3 more articles
Article Metrics
Citations
Citation Indexes 110
Captures
Mendeley Readers 168
Mentions
News Mentions 1
References 2
View details
About ScienceDirect
Remote access
Contact and support
Terms and conditions
Privacy policy
Cookies are used by this site.Cookie settings
All content on this site: Copyright © 2025 Elsevier B.V., its licensors, and contributors. All rights are reserved, including those for text and data mining, AI training, and similar technologies. For all open access content, the relevant licensing terms apply.
We use cookies that are necessary to make our site work. We may also use additional cookies to analyze, improve, and personalize our content and your digital experience. You can manage your cookie preferences using the “Cookie Settings” link. For more information, see ourCookie Policy
Cookie Settings Accept all cookies
Cookie Preference Center
We use cookies which are necessary to make our site work. We may also use additional cookies to analyse, improve and personalise our content and your digital experience. For more information, see our Cookie Policy and the list of Google Ad-Tech Vendors.
You may choose not to allow some types of cookies. However, blocking some types may impact your experience of our site and the services we are able to offer. See the different category headings below to find out more or change your settings.
You may also be able to exercise your privacy choices as described in our Privacy Policy
Allow all
Manage Consent Preferences
Strictly Necessary Cookies
Always active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
Cookie Details List
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site.
Cookie Details List
Contextual Advertising Cookies
[x] Contextual Advertising Cookies
These cookies are used for properly showing banner advertisements on our site and associated functions such as limiting the number of times ads are shown to each user.
Cookie Details List
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Confirm my choices |
10576 | https://www.aap.org/en/patient-care/atopic-dermatitis/treatment-of-atopic-dermatitis/?srsltid=AfmBOooW110IWm5u60fIxcG5oucw0EVKTc_PrI0kXnvTF6WzrDQgQWAL | Internet Explorer Alert
It appears you are using Internet Explorer as your web browser. Please note, Internet Explorer is no longer up-to-date and can cause problems in how this website functions
This site functions best using the latest versions of any of the following browsers: Edge, Firefox, Chrome, Opera, or Safari.
You can find the latest versions of these browsers at
Shopping cart
Order Subtotal
Your cart is empty.
Looks like you haven't added anything to your cart.
Loading
Shopping cart
Order Subtotal
Your cart is empty.
Looks like you haven't added anything to your cart.
Loading
Treatment of Atopic Dermatitis
Address the 4 aspects of the disease simultaneously and refer to the treatment algorithm for stepwise therapeutic choices.
Treating children with atopic dermatitis involves addressing 4 aspects of the disease simultaneously. Treatment choices are considered in a stepwise manner and depend on the severity of the disease. Refer to the Treatment Toolfor a summative view of treatment options.
The treatment of atopic dermatitis includes the following simultaneous measures:
These treatment targets, when effectively addressed, not only improve disease symptoms and reduce flares but assist the child and family in achieving adequate sleep.
Parents should be encouraged to establish healthy sleep routines as part of the treatment plan. Adequate sleep is necessary for optimal growth and development, promotes mental health, and improves quality of life for the patient and family.
Read More about Healthy Sleep
Treatment Targets
Moisturizing the Skin
Moisturizers (emollients) are the cornerstone of atopic dermatitis treatment. They are the main treatment for mild atopic dermatitis and an important part of treating moderate to severe atopic dermatitis.
Apply an emollient as needed to control dry skin (xerosis). The most effective timing is immediately after bathing (while the skin is still moist). Application often is recommended at least once daily, but this varies with the individual and environmental factors (eg, during warm weather months in humid conditions an emollient may not be needed).
A variety of over-the-counter (eg, CeraVe, Cetaphil Restoraderm) and prescription (eg, Atopiclair, EpiCeram, Hylatopic) barrier repair agents exist that may help reduce the severity of atopic dermatitis and play an adjunctive therapeutic role.
Read More about Maintaining the Skin Barrier
Reducing Itch
The chief way to reduce itch is to address xerosis with the daily application of emollients. When the disease is active, however, administer a bedtime dose of a first-generation antihistamine (eg, hydroxyzine 0.5–1 mg/kg, diphenhydramine 1.25 mg/kg) to provide sedation, improve sleep, and reduce scratching.
Daytime doses may occasionally be needed but should be lower (to avoid sedation).
Wet-wrap therapy may also be useful during severe flares.
Treating Inflammation
To treat inflammation during a flare of atopic dermatitis, apply a topical corticosteroid twice daily to affected areas until improvement occurs (usually a few days to 2–3 weeks). Ointments are preferred over creams because they tend to be more effective and better tolerated (less burning sensation), although some patients prefer creams because they are less greasy. Choosing a topical corticosteroid depends on the age of the child and the area to be treated.
Once symptoms have improved, the corticosteroid is withdrawn and a moisturizer continued regularly. Super-high-potency topical corticosteroids should not be used for longer than 3 weeks. High- or mid-potency topical corticosteroids can be used for up to 12 weeks. Low-potency preparations have no maximum use recommendations. Although topical corticosteroid use should be avoided in the absence of symptoms, applying a corticosteroid once or twice weekly at locations prone to exacerbations has been shown to reduce relapses and increase the time to the next flare.
Generally, a topical corticosteroid is prescribed for 2 to 3 weeks. The family should be instructed to contact the physician if no improvement occurs in that time. Treatment failure can be due to
If treatment failure is not caused by those factors, a nonsteroidal topical calcineurin inhibitor or other nonsteroidal topical anti-inflammatory agent can be added to the daily treatment.
For more information on selecting anti-inflammatory agents, see the sections on nonsteroidal topical anti-inflammatories and the information on selecting and prescribing topical corticosteroids.
Rarely, systemic corticosteroids, immunosuppressants, biologicals, small molecule therapies, or phototherapy is necessary for the management of atopic dermatitis. Children with severe atopic dermatitis requiring systemic medication or children with moderate-to-severe disease who are not improving with standard therapy should be referred to a pediatric dermatologist.
Read More about Corticosteroids
Preventing and Managing Skin Infections
To prevent Staphylococcus aureus skin infections, controlling colonization may be useful for those with severe or recalcitrant disease. Consider one or more of the following options:
If there is evidence of secondary bacterial infection (eg, crusting, pustules, oozing [Figure 4.11]), consider administering an oral antistaphylococcal antibiotic (eg, cephalexin or other agent based on local antibiotic resistance patterns) for 7 to 10 days. If no improvement is noted within 48 hours, consider a skin swab for bacterial culture to assess for resistant organisms (eg, methicillin-resistant S aureus) and treat appropriately. At this time, most S aureus isolates from patients with atopic dermatitis in the United States remain methicillin-sensitive.
If infection is limited to very focal areas, a prescription topical antimicrobial agent (eg, mupirocin, retapamulin, ozenoxacin) may be useful.
Daily Measures
Disease Flares and Maintenance Between Flares
When the disease flares:
Wet-wrap Therapy
Wet-wrap therapy may be useful during severe flares of atopic dermatitis. A topical corticosteroid is applied to affected areas and covered with a moistened cotton suit (eg, pajamas), wet gauze strips, or a specially designed, commercially available garment, which is then covered with a dry outer layer (eg, dry pajamas). The wrap may be worn for several hours or up to 24 hours; on removal, emollient is applied. Once the disease flare improves, wet-wrap therapy is discontinued. For more details, including step-by-step instructions on wet wrap therapy, visit the National Eczema Association.
Maintenance Measures
A moisturizer should be used regularly. However, applying a corticosteroid or calcineurin inhibitor once or twice weekly at locations prone to exacerbations has been shown to reduce relapses and increase the time to the next flare.
Phototherapy
Phototherapy may be considered for children who have moderate-to-severe atopic dermatitis and have failed multimodal topical therapy. Phototherapy must be prescribed and conducted by clinicians who are familiar with the various types of phototherapy and equipment. Phototherapy can be used on its own or in combination with emollients and topical steroids.
Dust Mite Avoidance
Avoiding dust mites through frequent vacuuming and encasing pillows and mattresses in allergen-proof products may result in a modest reduction in the severity of atopic dermatitis. Such recommendations are reserved for patients with severe or recalcitrant disease.
Associated Issues
Children with atopic dermatitis may experience other skin conditions, some of which are infectious and others that are cosmetic in nature.
Secondary Infections
Children with atopic dermatitis are prone to certain types of skin infections. The most serious infections (eg, eczema herpeticum) may require hospitalization and treatment with systemic medications.
Any child with atopic dermatitis should not share eating utensils, toothbrushes, drinking glasses, or other personal items with someone who has a cold sore (herpes simplex virus [HSV] 1 infection).
Treatment Regimen by Infection Type
Bacterial Infection
A sudden exacerbation of atopic dermatitis may be caused by a bacterial infection.
The diagnosis is clinical.
If there is evidence of secondary bacterial infection (eg, crusting, pustules, oozing [Figure 4.11]), consider administering an oral antistaphylococcal antibiotic (eg, cephalexin or other agent based on local antibiotic resistance patterns) for 7 to 10 days. If no improvement is noted within 48 hours, consider a skin swab for bacterial culture to assess for resistant organisms (eg, methicillin-resistant Staphylococcus aureus [MRSA]) and treat appropriately. At this time, most S aureus isolates from patients with atopic dermatitis in the United States remain methicillin-sensitive.
If infection is limited to very focal areas, a prescription topical antimicrobial agent (eg, mupirocin, retapamulin, ozenoxacin) may be useful.
The choice of topical, oral, or intravenous antibiotic therapy (against S aureus and streptococci) depends on the extent and severity of the infection.
Eczema Herpeticum
Eczema herpeticum is a disseminated HSV infection that occurs in individuals who have atopic dermatitis or other chronic skin diseases. It occurs primarily in children younger than 3 years. It likely is the result of a disrupted skin barrier that allows viral invasion.
Noninfectious Conditions
Keratosis Pilaris and Ichthyosis Vulgaris
Pityriasis Alba
Medications
Ensure that eczema is not undertreated. Families are often reluctant to use corticosteroids (sometimes called “corticophobia”). Some doctors can be reluctant to prescribe them.
Topical corticosteroids are the first-choice therapy for eczema flares and their benefits greatly exceed uncommon adverse effects.
When used as directed the safety profile of new topical corticosteroids is good. Insufficient or inadequate applications of topical corticosteroids limit the ability to control dermatitis, leading to multiple issues including poor quality of life and increases in flares. Especially in severe forms of atopic dermatitis, it is important to implement a multidisciplinary approach, in which education has an important role.
Nonsteroid Topical Anti-inflammatories
Discussing With Parents and Families
Clinical practice guidelines recommend educational programs (“eczema schools”) as an adjunct to therapy for atopic dermatitis.
The treatment regimen for atopic dermatitis is complex and multifactorial; therefore, support for the patient and caregivers is crucial in increasing treatment compliance. Research into certain formal programs has shown improvements in ability to cope, itching behavior, and disease severity. Options include nurse-led sessions and video education.
Patients and families may wish to explore alternative treatments. It may be helpful to solicit information about alternate treatment plans and to share the results of scientific studies of alternative treatments.
When to Refer
Between 80% and 90% of infants experience a spontaneous resolution or improvement in symptoms by adolescence. Until this time the disease course is chronic and relapsing. Consider a referral to a pediatric dermatologist when patients do not respond to standard treatments.
Other reasons for referral
The development of this information was made possible through support from Sanofi and Regeneron.
Last Updated
06/11/2021
Source
American Academy of Pediatrics
© Copyright 2025 American Academy of Pediatrics. All rights reserved. |
10577 | https://www.youtube.com/watch?v=HVXF9Me-vhs | Skip Count by 5s
InstructaBeats
15700 subscribers
215 likes
Description
56475 views
Posted: 14 Sep 2022
Kindergarten and first-grade teachers! Use InstructaTato with your kids to teach counting by 5s or skip counting by 5s! Visit InstructaBeats.com and subscribe to InstructaBeats on YouTube for more instructional resources! #education #teachers #elementarymath #firstgrade #kindergarten
Transcript:
foreign [Music] [Music] 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105 110 115 120 yo let's do it again 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105 110 115 120. so using it funny yo it's a trucks potato I told you you'll be as smart as Play-Doh oh we're gonna count to 120 remember it's easy it's funny 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105 110 115 120 yo let's do it again 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105 110 115 120. so easy money I told you it wasn't lies you could count to 125 fives now if you wouldn't mind I'm a little bit hungry I wanna eat some fries uh don't tell my friends |
10578 | https://www.mdpi.com/1718-7729/32/4/215 | Current Limitations of Sentinel Node Biopsy in Vulvar Cancer
Next Article in Journal
Using Invitation Letters to Increase HPV Vaccination Among Adult Women
Previous Article in Journal
Survivorship Considerations and Management in the Adolescent and Young Adult Sarcoma Population: A Review
Journals
Active JournalsFind a JournalJournal ProposalProceedings Series
Topics ------
Information
For AuthorsFor ReviewersFor EditorsFor LibrariansFor PublishersFor SocietiesFor Conference Organizers
Open Access PolicyInstitutional Open Access ProgramSpecial Issues GuidelinesEditorial ProcessResearch and Publication EthicsArticle Processing ChargesAwardsTestimonials
Author Services ---------------
Initiatives
SciforumMDPI BooksPreprints.orgScilitSciProfilesEncyclopediaJAMSProceedings Series
About
OverviewContactCareersNewsPressBlog
Sign In / Sign Up
Notice
You can make submissions to other journals here.
clear
Notice
You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
ContinueCancel
clear
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
clearzoom_out_mapsearchmenu
Journals
Active Journals
Find a Journal
Journal Proposal
Proceedings Series
Topics
Information
For Authors
For Reviewers
For Editors
For Librarians
For Publishers
For Societies
For Conference Organizers
Open Access Policy
Institutional Open Access Program
Special Issues Guidelines
Editorial Process
Research and Publication Ethics
Article Processing Charges
Awards
Testimonials
Author Services
Initiatives
Sciforum
MDPI Books
Preprints.org
Scilit
SciProfiles
Encyclopedia
JAMS
Proceedings Series
About
Overview
Contact
Careers
News
Press
Blog
Sign In / Sign UpSubmit
Search for Articles:
Title / Keyword
Author / Affiliation / Email
Journal
Current Oncology
Article Type
All Article Types
Advanced Search
Section
All Sections
Special Issue
Select an Option
Volume
Issue
Number
Page
Logical Operator Operator
Search Text
Search Type
add_circle_outline
remove_circle_outline
Journals
Current Oncology
Volume 32
Issue 4
10.3390/curroncol32040215
Submit to this JournalReview for this JournalPropose a Special Issue
►▼ Article Menu
Article Menu
Subscribe SciFeed
Recommended Articles
Related Info Links
PubMed/Medline
Google Scholar
More by Authors Links
on DOAJ
Gracia, M.
Alonso-Espías, M.
Zapardiel, I.
on Google Scholar
Gracia, M.
Alonso-Espías, M.
Zapardiel, I.
on PubMed
Gracia, M.
Alonso-Espías, M.
Zapardiel, I.
/ajax/scifeed/subscribe
Article Views 1056
Citations 1
Table of Contents
Abstract
Introduction
Materials and Methods
Results
Discussion
Conclusions
Author Contributions
Funding
Conflicts of Interest
References
Altmetricshare Shareannouncement Helpformat_quote Citequestion_answer Discuss in SciProfiles
Need Help?
Support
Find support for a specific problem in the support section of our website.
Get Support
Feedback
Please let us know what you think of our products and services.
Give Feedback
Information
Visit our dedicated information section to learn more about MDPI.
Get Information
clear
JSmol Viewer
clear
first_page
Download PDF
settings
Order Article Reprints
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Open Access Review
Current Limitations of Sentinel Node Biopsy in Vulvar Cancer
by
Myriam Gracia
Myriam Gracia
SciProfilesScilitPreprints.orgGoogle Scholar
,
Maria Alonso-Espías
Maria Alonso-Espías
SciProfilesScilitPreprints.orgGoogle Scholar
and
Ignacio Zapardiel
Ignacio Zapardiel
SciProfilesScilitPreprints.orgGoogle Scholar
Gynecologic Oncology Unit, La Paz University Hospital, 28015 Madrid, Spain
Author to whom correspondence should be addressed.
Curr. Oncol.2025, 32(4), 215;
Submission received: 10 March 2025 / Revised: 3 April 2025 / Accepted: 7 April 2025 / Published: 8 April 2025
(This article belongs to the Section Gynecologic Oncology)
Download keyboard_arrow_down
Download PDF
Download PDF with Cover
Download XML
Download Epub
Browse Figure
Review ReportsVersions Notes
Abstract
Background: Vulvar cancer is a rare gynecologic malignancy with increasing incidence. Lymph node status is the most critical prognostic factor, traditionally assessed through inguinofemoral lymphadenectomy, a procedure associated with significant morbidity. Sentinel lymph node biopsy (SLNB), in selected cases, has emerged as a less invasive alternative with favorable oncologic outcomes. Objective: This review summarizes current evidence on the indications, technique, safety, and oncologic outcomes of SLNB in vulvar cancer, with a focus on controversial scenarios such as recurrent and larger tumors. Methods: A narrative review of PubMed-indexed studies published in English over the last 35 years was conducted. Eligible studies included original research, systematic reviews, meta-analyses, randomized controlled trials, and case-control studies. Results: SLNB is recommended for unifocal vulvar tumors < 4 cm with stromal invasion > 1 mm and clinically negative nodes. Landmark trials, including GROINSS-V-I and GOG-173, confirmed its accuracy and lower morbidity compared to lymphadenectomy. SLNB utilization has increased since its inclusion in guidelines, with a concurrent decline in lymphadenectomy rates. Combined detection techniques are mandatory, while indocyanine green (ICG) is an emerging option. Future studies should focus on refining patient selection criteria, improving detection techniques, and clarifying the implications of low-volume nodal disease to further optimize outcomes for patients with vulvar cancer. Conclusion: SLNB is a validated, minimally invasive staging approach in early-stage vulvar cancer. Further research is needed to refine its role in high-risk cases and optimize detection methods.
Keywords:
vulvar cancer; sentinel lymph node biopsy; recurrent vulvar cancer; inguinofemoral lymphadenectomy
1. Introduction
Vulvar cancer is a relatively uncommon neoplasm, ranking 21st in incidence among women worldwide and representing only 4% of all gynecologic malignancies. According to the Global Cancer Statistics, 47,342 new cases and 18,579 deaths related to vulvar cancer were reported in 2022 . Despite its rarity, its incidence appears to be increasing in recent decades, likely due to higher life expectancy and human papillomavirus infection .
In addition to tumor excision, inguinofemoral lymph node assessment is crucial for tumors with stromal invasion greater than 1 mm, as lymph node metastases are found in approximately 23–25% of patients with early-stage disease. The first sites of lymphatic spread in vulvar cancer are the inguinofemoral lymph nodes, followed by the pelvic nodes. The risk of unilateral or bilateral nodal involvement is influenced by factors such as tumor size and proximity to the midline or clitoris . Furthermore, lymph node involvement is the most significant independent prognostic factor, with survival rates decreasing from 90% to less than 60% in cases of groin metastases . Key factors strongly associated with nodal involvement include lymphovascular space invasion, tumor stage, tumor grade, and depth of infiltration [5,6].
Traditionally, the standard treatment for vulvar cancer consists of a radical vulvectomy combined with bilateral inguinofemoral lymphadenectomy. This procedure involves the removal of superficial and deep inguinal lymph nodes located within the femoral triangle, which is bordered by the inguinal ligament, sartorius, and adductor longus muscles. However, this approach is linked to a significant increase in both short- and long-term morbidity, including wound dehiscence, infections, lower limb lymphedema, and lymphocele formation, all of which negatively impact patients’ quality of life [7,8].
Sentinel lymph node biopsy (SLNB) has emerged in recent decades as a less invasive alternative for nodal assessment in various malignancies, including melanoma, breast, and endometrial carcinoma, but also in vulvar carcinoma, reducing morbidity associated with lymphadenectomy [9,10,11]. Decesare et al. were the first to describe sentinel lymph node identification using lymphoscintigraphy in vulvar cancer in 1997 . Several studies have demonstrated that sentinel lymph node biopsy (SLNB) is a safe, accurate, and cost-effective approach for managing early-stage vulvar cancer. In tumors smaller than 4 cm, SLNB has a false-negative rate of only 2% and a negative predictive value of 98% [13,14,15,16]. Furthermore, the 2008 Groningen International Study on Sentinel Nodes in Vulvar Cancer (GROINSS-V-I) showed that omitting inguinofemoral lymphadenectomy in patients with early-stage vulvar cancer who have negative sentinel lymph nodes is a safe alternative. This approach is associated with a three-year survival rate of 97% and a nodal recurrence rate of only 2.3% . Additionally, it showed that avoiding lymphadenectomy significantly reduces treatment-related morbidity, including lower rates of lymphedema and wound complications.
Based on these results, major international guidelines currently recommend exclusive SLNB for unifocal vulvar tumors smaller than 4 cm with stromal invasion greater than 1 mm and no clinical suspicious nodes (palpation/imaging) [17,18]. Inguinal lymphadenectomy should be completed in cases where there is no tracer migration, or if the pathological examination reveals the presence of metastases in the sentinel lymph node (SLN). For lesions > 4 cm or multifocal tumors, bilateral lymphadenectomy remains the primary standard procedure.
For the SLN assessment, the use of a radiotracer (typically Tc99m nanocolloid) is mandatory, while combination techniques with isosulfan or methylene blue dye or indocyanine green (ICG) are recommended, as they have been associated with improved accuracy [19,20].
In multifocal tumors or tumors larger than 4 cm, however, the use of SLNB remains a subject of debate due to the limited available evidence regarding its oncologic safety in these scenarios . Increased tumor size is associated with a higher risk of lymph node metastasis, while multifocality may lead to multiple lymphatic drainage pathways, both of which could potentially compromise the diagnostic accuracy of the technique . Similarly, there are no established consensus statements regarding the use of inguinofemoral SLNB in patients with prior vulvar excision. As a result, lymphadenectomy remains the standard treatment for patients with recurrent vulvar squamous cell carcinoma.
This review aims to summarize the latest evidence on the indications, technique, safety, and oncologic outcomes of SLNB in vulvar cancer, with a particular focus on controversial scenarios such as recurrent disease and larger or multicentric tumors.
2. Materials and Methods
A comprehensive review of the literature was performed using the PubMed database, using terms such as “vulvar cancer”, “sentinel node biopsy”, “inguinofemoral lymphadenectomy”, and “recurrent vulvar cancer” in different combinations. The search has been limited to original studies, systematic reviews, meta-analyses, randomized controlled trials, and case controls published in English within the last 35 years. Publications relevant to the search and their cited references were retrieved and evaluated independently by M.G. and M.A. for inclusion in the text.
3. Results
3.1. Current Indications and Evidence for Sentinel Node Biopsy
SLNB is a minimally invasive surgical technique applicable to women with early-stage vulvar cancer. The European Society of Gynecologic Oncology (ESGO) and the National Comprehensive Cancer Network (NCCN) guidelines currently recommend SLNB for patients with unifocal vulvar tumors smaller than 4 cm and stromal invasion greater than 1 mm, with clinically and radiologically negative groins [17,18]. In patients with small lateralized tumors (<4 cm in size and ≥1 cm from the vulvar midline) and negative ipsilateral lymph nodes, the risk of contralateral groin node metastasis is below 1% . Therefore, ipsilateral groin dissection is considered sufficient in these cases. Conversely, for non-lateralized tumors, a bilateral surgical evaluation is recommended. The intraoperative frozen section of the SLN is optional. The risk–benefit balance between accurately assessing the size of lymph node metastases through frozen section analysis and the potential tissue loss, along with the possible need for a second surgical intervention if the SLN is positive, should be carefully evaluated. In case the SLN is not detected, inguinofemoral lymphadenectomy, including superficial and deep nodes, should be performed. Similarly, if detection is achieved on only one side in midline tumors, contralateral lymphadenectomy is mandatory [17,18].
During the 2000s, several studies provided promising data on the detection rate and false-negative rates of SLNB in patients with vulvar cancer. However, the majority were retrospective studies with a limited sample size [22,23,24,25,26].
It was not until 2008 that van der Zee et al. published the results of the GROINSS-V-I study, the largest validation multicenter observational study that investigated the safety and utility of SLNB in early-stage vulvar cancer . This study included 403 patients with <4 cm squamous cell carcinoma of the vulva and clinically nonsuspicious inguinofemoral lymph nodes. In 259 of these patients, the SLN was negative after pathological ultrastaging, and no further lymphadenectomy was performed. The 3-year survival rate in this group was 97%, with only a 2.3% rate of nodal recurrence after a median follow-up of 35 months. In addition, both short- and long-term morbidity was significantly reduced when inguinofemoral lymphadenectomy was omitted (lymphedema 1.9% vs. 25.2%, and recurrent erysipelas 0.4% vs. 16.2%), demonstrating that SLNB was safe and less harmful compared with inguinofemoral lymphadenectomy in unifocal, <4 cm vulvar carcinomas. Furthermore, in the long-term follow-up of the GROINSS-V-I trial, Grootenhuis et al. reported 5-year and 10-year disease-specific survival rates of 93.5% and 90.8%, respectively, for patients with negative SLN, confirming the long-term safety of SLNB in this population. Despite the positive survival outcomes, the study emphasized that patients still faced a risk of recurrence. They reported a local recurrence rate of 24.6% and 36.4% at 5 and 10 years, respectively, for SLN-negative patients. This underscores the importance of long-term monitoring, even more than a decade after the initial treatment .
Another key study that contributed to establishing SLNB as the standard technique for lymph node staging in vulvar cancer was the Gynecologic Oncology Group (GOG-173) trial, whose findings were published in 2012 . This study included 452 women with squamous cell carcinoma of the vulva, with tumor sizes ranging from 2 to 6 cm. All participants underwent SLNB followed by inguinal lymphadenectomy. The sensitivity of the technique for detecting metastases was 92.5% overall, with a false-negative rate of 3.7%, which decreased to 2% in tumors smaller than 4 cm, thus corroborating the results of the GROINSS-V-I study.
More recently, additional studies have demonstrated the safety of SLNB as an exclusive method for lymph node staging in cases with negative results. A systematic review and meta-analysis conducted in 2015 by Covens et al., which included 11 studies, found that the rate of groin recurrence was not significantly higher for SLNB (3.4%) compared to complete inguinofemoral lymphadenectomy (1.4%) . Another systematic review and meta-analysis, incorporating 29 studies with 1779 patients, reported an overall SLNB sensitivity of 95% (95% CI: 92–98%). However, they observed a 9% false-negative rate, emphasizing that this relatively high rate underscores the impact of the learning curve, a persistent challenge in managing rare cancers . Table 1 shows the main studies evaluating the safety of SLBN in vulvar cancer.
Table 1. Data from studies evaluating SLNB in vulvar cancer.
The inclusion of SLNB as a method for lymph node staging in vulvar cancer was added to international guidelines in 2016 . Since then, the adoption of this technique has progressively increased, as demonstrated by a recent study that analyzed the implementation of surgical de-escalation in gynecologic cancers using the National Cancer Database. They reported that the utilization rate of SLNB in vulvar cancer rose from 12.3% to 36.9% between 2012 and 2020, while lymphadenectomy rates simultaneously declined from 87.7% to 63.2% . These findings reflect a growing shift towards less invasive approaches in the management of early-stage vulvar cancer, aiming to minimize surgical morbidity without compromising oncological outcomes. Furthermore, with the reduction in morbidity, SLNB has also been shown to be more cost-effective compared to lymphadenectomy [32,33].
3.2. Surgical Technique of Sentinel Node Biopsy and Available Methods of Detection
The most accurate detection methods for SLNB in appropriately selected patients with vulvar cancer are combined techniques .
Current evidence supports the use of a combination of blue dye and 99m-Tc nanocolloid for sentinel lymph node detection, in accordance with the methodology recommended by the GROINSS-V study and international guidelines [17,34]. The standard protocol involves injecting 4 mL of blue dye and 4 mL of 2.5 mCi Technetium-99, divided into four 1-mL intradermal aliquots placed in four orthogonal peritumoral locations. To ensure adequate migration to the lymph nodes, Technetium-99 should be administered preoperatively, while blue dye is injected just before groin dissection during surgery under anesthesia . The sentinel lymph node must be removed before the primary tumor is excised. A groin incision is performed at the site with the highest signal intensity detected by gamma probes, followed by careful dissection to trace lymphatic pathways and locate the sentinel node. The gamma detector should then confirm the presence of radioactivity in the excised node and verify that no residual tracer remains in the lymphatic basin. If multiple sentinel nodes are detected, all should be removed [34,35]. A node detected as “positive” by the gamma probe is defined as having a count at least five times greater than the background level. After removing the targeted node, the background reading with the gamma probe should be less than 10% of the node’s count. While locating the node(s), it is crucial to consider its orientation toward the vulva to avoid mistaking background vulvar uptake for the node itself . With the growing adoption of inguinofemoral SLN detection, the techniques used for identification have also advanced. Initially, the most commonly employed methods included blue dyes, such as lymphazurin and methylene blue, along with radiocolloid lymphoscintigraphy . However, since the introduction of near-infrared imaging with indocyanine green (ICG) in 2010, this approach has gained widespread acceptance for SLN detection in the inguinofemoral region . Regardless of the specific mapping technique, SLNB in vulvar cancer generally demonstrates high detection and mapping success rates. The selection of the preferred method is primarily influenced by the surgeon’s expertise, training, and institutional experience . As previously noted, growing evidence supports the use of ICG as a viable alternative to blue dye. Next, we are going to summarize some of the current evidence on the different tracers for SLNB in vulvar cancer. In 2010, Crane et al. introduced the use of an infrared light source and camera for intraoperative detection of inguinofemoral SLNs labeled with ICG (Figure 1). They later published their findings on SLN mapping in vulvar cancer, analyzing 16 groins using a combination of 99m-Tc, blue dye, and ICG with near-infrared imaging. Their study identified 29 SLNs with 99m-Tc, 26 with ICG, and 21 with blue dye [38,39]. Following this, in 2017, Soergel et al. reported their experience with ICG in a cohort of 27 patients. A key finding of their study was the identification of eight SLNs that were not detected by 99m-Tc but were successfully visualized using ICG alone .
Figure 1. Sentinel lymph node in vulvar cancer. ICG.
Recently, Deken et al. demonstrated, in their randomized trial, comparable efficacy in terms of sentinel node detection between isotope/ICG compared with conventional detection method with isotope/blue dye. They randomized 48 patients to the blue dye (n = 24) or ICG group (n = 24), using in both groups also 99m-Tc nanocolloid. The SLN detection rate was 92.1% of the groins in the blue dye group and 97.2% in the ICG group (p = 0.33). Surgical outcomes were similar between groups, although more short-term postoperative complications (wound infection or breakdown and lymphocyst formation) were observed in the blue dye group (p = 0.041) .
A systematic review of the literature aimed to determine if the use of ICG alone in detecting SLN in vulvar cancer was as accurate as the gold standard dual-labeling technique; 13 studies were identified with similar detection rates for SLN to the gold standard technique (ranged between 89.7 and 100% among the different studies). The authors also highlighted the potential of decreasing the detection rate in two settings; in the most metastatic lymph nodes and in obese patients and midline tumors. No adverse events were reported, and no consensus regarding to ICG injection site or timing, volume or concentrations, or use of serum albumin or hybrid tracer was reached . A recent meta-analysis by Di Donna et al. provides additional evidence supporting the effectiveness of ICG in SLN detection for vulvar cancer. The study aimed to identify the technique with the highest detection rate by comparing planar lymphoscintigraphy (PL), blue dye, and ICG fluorescence. After selecting 30 studies, the researchers found that the SLN detection rates per patient and per groin were 96.13% and 92.57% for PL, 90.44% and 66.21% for blue dye, and 91.90% and 94.80% for ICG, respectively. While the patient-based analysis did not reveal significant differences between these methods, the groin-based analysis showed that both PL and ICG had significantly higher detection rates compared to blue dye (p< 0.05) . Additionally, ICG appears to have a steeper learning curve, with detection rates improving as surgical teams gain more experience and training . Moreover, a hybrid technique combining ICG with 99m-Tc nanocolloid has been introduced, allowing injection up to 20 h before surgery while still enabling intraoperative near-infrared detection . Another recent approach, described in the SARVU study, involves the use of ferromagnetic tracers, which demonstrated a detection efficacy comparable to that of radiotracers .
The method of histopathological evaluation could influence the reliability of SLN in staging vulvar cancer. Postoperative pathological analysis of the SLN can be complemented with intraoperative frozen section assessment. If the SLNB is positive, this technique provides the advantage of allowing an immediate complete lymphadenectomy. However, it has a relatively high false-negative rate and poses a risk of losing diagnostic tissue. A precise pathological evaluation of SLNs is essential. As observed in GOG 173 and GROINS V , hematoxylin and eosin staining of lymph nodes fails to detect at least 20% of nodal metastases compared to additional immunohistochemical (IHC) analysis. Further serial sectioning could identify an extra 7% of nodal metastases . Ultrastaging of lymph nodes, which incorporates serial sectioning and immunohistochemistry, is an important element of the SLN technique. A review demonstrated that the detection rate of micrometastases is significantly higher when combining hematoxylin and eosin staining with serial sectioning and immunohistochemistry . Thus, ultrastaging of the nodes, with serial sectioning and staining, is recommended for the identification of possible micrometastases and isolated tumor cells . The clinical relevance of micrometastases identified through ultrastaging remains a topic of debate. Isolated groin recurrence has been documented in only a few cases involving patients with micrometastases in the SLN .
Although the findings from this retrospective series regarding near-infrared imaging performance are encouraging, further prospective studies are necessary to assess the effectiveness of indocyanine green and near-infrared imaging, thereby defining the role of SLN mapping in this condition. Protocols for using ICG are still varied, and the ideal approach has yet to be established. Currently, the combination of an isotope with either blue dye or ICG appears to achieve the highest detection rates and demonstrates proven clinical effectiveness. Performing pre-operative lymphoscintigraphy is advised to determine the number and location of sentinel nodes.
3.3. Management of Metastatic Groin Nodes
Additional treatment of nodes in the groin is determined based on the outcomes of the SLNB. In the case of negative SLN, no additional or adjuvant treatments are necessary.
3.3.1. Volume of Lymph Node Disease
The presence of lymph node metastasis is associated with poorer disease-free survival and overall survival rates. Metastatic lymph node disease in early-stage vulvar cancer is diagnosed in 10.7% of stage I patients and 26.2% of stage II patients, affecting between 21% and 35.8% of patients . According to Mahner et al., the disease-free survival rate is 35.2%, and overall survival is 56.2%, compared to 75.2% and 90.2% in patients without lymph node involvement . The lymph node metastases are classified as stage III disease. The new FIGO classification considers the presence and count of metastatic lymph nodes (≤2 and >2 lymph nodes) and the volume of lymph node disease (<5 and ≥5 mm). This is based on the results of the GROINS-V trial . The risk of metastatic affectation of a different node than the sentinel one increases not only with the number of metastatic SLN but also with the volume of the disease. Moreover, the authors found statistically significant differences in the disease-specific survival after 24 months of follow-up between patients with SLN metastases ≤ 2 and >2 mm (69.5% vs. 94.4%, respectively).
The management of metastatic lymph nodes is controversial; however, additional treatment (complete inguinofemoral lymphadenectomy or adjuvant treatment) to the corresponding inguinofemoral area should be promptly administered after finding metastatic disease in an SLN in patients with vulvar carcinoma [17,20]. The role of adjuvant radiotherapy was evaluated in a large multicenter retrospective study. An improvement in prognosis, in both disease-free survival (DFS) and overall survival (OS), was observed in patients with positive lymph nodes who underwent postoperative radiotherapy .
Patients with macrometastasis (>2 mm) or extracapsular spread typically require completion inguinofemoral lymphadenectomy, followed by adjuvant radiotherapy if more than one node with macrometastasis and/or extranodal spread is found in the final pathological report. However, recent studies suggest that radiotherapy alone may be a viable option for selected patients with micrometastatic disease (≤2 mm) to reduce surgical morbidity without compromising oncologic outcomes. Recently, the large prospective multicenter GROINSS-V II study aimed to establish the safety of replacing inguinofemoral lymphadenectomy with radiotherapy for patients with early-stage vulvar cancer with metastasis in an SLN. An analysis of isolated groin recurrence in the first 91 patients found that nine out of ten had macrometastatic disease (>2 mm). As a result, the protocol was revised to restrict inguinofemoral node radiotherapy without further surgery (complete inguinofemoral lymphadenectomy) only to patients with micrometastatic disease (≤2 mm) in the SLN. Patients with micrometastases were treated with inguinofemoral lymphadenectomy as the standard approach, with additional radiotherapy for those who had multiple node metastases or extracapsular spread. The authors report a median follow-up period of 24.3 months. Among patients with SLN micrometastases (≤2 mm) who received radiotherapy alone without lymphadenectomy, recurrence rates were low (1.6%), with manageable levels of treatment-related toxicity. Among 162 patients with SLN macrometastases, the isolated groin recurrence rate at 2 years was 22% in those who underwent radiotherapy, and 6.9% in those who underwent IFL (p = 0.01) .
Currently, the GROINSS-V III study is examining whether patients with an SLN macrometastasis can be managed with chemoradiation instead of radiotherapy to both prevent groin recurrences and reduce treatment-related morbidity . The NCCN already advises the use of concurrent chemotherapy with radiotherapy for treating SLN metastases. However, this recommendation is primarily based on studies involving patients with advanced vulvar cancer. So far, chemotherapy and chemoradiation have not been sufficiently researched as treatment options for SLNmetastases in early-stage vulvar cancer [17,18].
3.3.2. Management of Contralateral Groin
The current evidence on the safety of omitting treatment to the no metastatic groin in patients with unilateral positive groin after bilateral SLNB is also controversial and conflicting. Current guidelines recommend that in cases of unilaterally positive SLN, bilateral inguinofemoral lymphadenectomy should be performed, increasing the risk of associated morbidity [17,18]. The percentage of contralateral non-sentinel node affectation varies among the different studies. In these cases, the risk of contralateral lymph node affectation seems to be low according to some authors. The rate of contralateral groin positivity in the studies carried out by Woelber, Nica, and Ignatov ranges between 0 and 5.3%. These data support the omission of contralateral inguinofemoral lymphadenectomy to reduce surgical morbidity and long-term complications [52,53,54]. In contrast, data from a German study identified contralateral positivity in a higher percentage of patients with midline vulvar carcinoma—a total of 4 patients out of 18 (22%). Moreover, they also found that the depth of tumor infiltration correlated significantly and positively with the incidence rate of contralateral groin metastasis (p = 0.0038) .
Recently, a large prospective study from the GROINSS-V group provides evidence to omit treatment to the unaffected contralateral groin, in cases where bilateral drainage has been mandatorily identified for midline tumors. In this study, the contralateral non-SLN metastases/groin recurrence rate was 2.9%. Therefore, they conclude that omitting contralateral lymphadenectomy in these cases should be safe, although caution is advised with tumors of >3 cm, the authors highlighting that the majority of non-sentinel contralateral metastasis occurred in these larger tumors .
3.4. Extended Indications for Sentinel Node Biopsy
Although SLN biopsy is currently recommended for unifocal tumors under 4 cm, research is exploring its feasibility in patients with larger or multifocal tumors.
3.4.1. Sentinel Node Biopsy in Recurrent Vulvar Cancer
Some studies have also suggested that SLNB may still be a reliable staging method in carefully selected cases of the first recurrence of vulvar cancer, potentially reducing the need for full lymphadenectomy in a broader patient population. However, further validation through prospective trials is required before guideline expansion. At present, evidence for the use of the SLN procedure in the case of recurrent cancer is lacking. A small retrospective study suggests that the technique is feasible, but that detection rates are lower and lymphatic drainage may be unusual after surgery of the primary tumor [17,56]. Inguinofemoral lymphadenectomy is considered the standard treatment for patients with recurrent vulvar cancer who did not undergo this procedure during the first episode. Many of the patients with vulvar cancer (primary or relapse episode) are elderly and frail patients; for these reasons, an alternative treatment to lymphadenectomy should be proposed. However, at the moment, the evidence about the accuracy and safety of repeat SLNB in recurrent disease is still lacking. The main reason not to perform a repeat SLNB in patients with a local recurrence of vulvar cancer is the assumption that the lymph flow might be altered because of previous surgery or radiotherapy . Otherwise, SLNB, also in recurrent disease, could add some advantages such as improving the visualization of the lymph drainage and guiding the surgeon in the removal of the lymph nodes at risk. Until now, there are no prospective studies assessing the efficacy and safety of SLNB in recurrent vulvar cancer, and only two case reports and a small retrospective study have been published regarding this topic [23,56,57]. In 2016, van Doorn et al. published a retrospective series of 27 patients with a first recurrence of squamous cell carcinoma of the vulva who underwent SLNB. They found this procedure seemed feasible, in that in 77% of patients and in 84% of the groins, the SLN procedure could be performed as planned. This percentage was less compared to the rates of success procedure in primary SLNB, which is around 95% . The authors also observed that the procedure was technically more challenging in recurrent disease compared to initial surgery. Regarding oncological outcomes, data are lacking, but so far none of the patients in the study suffered local or distant recurrences after repeating SLNB during a follow-up of a median of 27 months (range 2–96 months).
Currently, there is an ongoing trial designed to prove the feasibility and safety of SLNB in recurrent vulvar cancer. The outcomes of this current prospective study will help to bridge knowledge gaps and define future research questions. If the SLN procedure is confirmed to be safe and feasible in this patient group, it will significantly help reduce both the short- and long-term side effects of vulvar cancer treatment while having a smaller impact on quality of life compared to the current standard treatment. Additionally, we expect the study to enhance our understanding of the efficacy, side effects, and pathology of recurrent vulvar cancer .
3.4.2. Sentinel Node Biopsy in >4 cm or Multifocal Tumors
The safety of the SLN procedure in squamous cell carcinoma of the vulva > 4 cm or multifocal tumors is also lacking and at the moment the recommendation is to perform inguinofemoral lymphadenectomy. This evidence is based on the study GOG-173 where the authors found a detection rate of 92.0% and seven false-negative SLNs, resulting in an unacceptable false-negative predictive value of 7.4% in patients with tumors between 4–6 cm of diameter . Several prospective studies investigating SLN biopsy in vulvar cancer have reported detection rates varying between 88% and 97% per patient and have calculated a pooled detection rate of 93% per groin [13,14,20,59]. Recently, a prospective pilot study has been carried out to assess if indications for SLNB in vulvar cancer could be extended . They found detection rates and negative predictive values of SLN biopsy for women with primary squamous cell vulvar cancer ≥ 4 cm and multifocal tumors comparable to the results for smaller, unifocal tumors. The detection rates varied between 100% and 94.1% per patient and between 84.1% and 85.3% per groin. Moreover, they found no false-negative SLN in the population study . Another prospective study published in 2017 by Garganese et al. reported on 12 patients with tumors > 4 cm undergoing an SLN biopsy followed by inguinofemoral lymphadenectomy. In this cohort, no patients had a false negative SLN .
Multifocality of vulvar cancer is a rare condition which is reflected by the low number of patients collected in a few studies. Because of unsatisfactory oncological safety, the GROINSS-V-I study stopped the inclusion of multifocal tumors after two early inguinal recurrences between the hitherto 19 included patients . However, Garganese et al. included nine women with multifocal tumors in their cohort, with no false-negative SLN .
Nowadays, due to the low evidence we have, the safety of the SLNB in squamous cell carcinoma of the vulva larger than 4 cm or in multifocal tumors is not yet fully established. Although recent studies have shown detection rates and negative predictive values comparable to those of smaller, unifocal tumors, the current recommendation remains to perform inguinofemoral lymphadenectomy.
3.5. Potential Barriers and Limitations for Sentinel Node Biopsy
The current standard technique for SLNB could present some cumbersome aspects. For example, the preoperative lymphoscintigraphy along with intraoperative radiolocalization requires multiple procedures that often need to be performed the day before the surgical procedure. Additionally, intraoperative detection with 99m-Tc is complicated and relies on aural cues, necessitating a pause in the procedure at frequent intervals so that 99m-Tc uptake can be measured . The use of dyes facilitates the procedure. While blue dye aids in visually identifying the SLN, its effectiveness relies on the clear detection of both lymphatic vessels and the node itself. In contrast, indocyanine green combined with near-infrared imaging overcomes these limitations by offering real-time visual guidance throughout the procedure . Despite its benefits, SLN biopsy has certain limitations. Factors such as disrupted lymphatic drainage from prior surgeries, the presence of large tumors, or the learning curve associated with the technique can affect its accuracy. Additionally, the limited availability of nuclear medicine facilities and experienced surgical teams poses a challenge in resource-constrained settings. Overcoming these obstacles is crucial for expanding the use of SLN biopsy and ensuring equitable access in vulvar cancer treatment.
While intraoperative frozen section analysis may be considered, particularly to prevent the need for a second surgical procedure, caution is necessary due to the risk of overlooking micrometastases in the final histological assessment and the importance of precisely measuring metastatic deposits .
Another important aspect of SLNB in vulvar cancer is the one related to cost-effectiveness. There are studies that demonstrated that SLNB is more cost-effective than inguinofemoral lymphadenectomy. Erickson et al. and McCann et al. found that SLNB had both a lower annual cost and lower cost/effectiveness ratio than lymphadenectomy [32,33]. This was further demonstrated when a significant reduction in complications such as lymphedema and infection was observed after performing SLNB and, in consequence, a higher score in quality-of-life questionnaires.
3.6. Future Directions
The morbidity of open inguinal incisions has prompted the search for a minimally invasive approach to lymph node dissection. Videoendoscopic lymphadenectomy may be a valid alternative to the open route with no differences in terms of surgical outcomes, except for operative time, which is shorter for the open approach, and wound complications, which are less frequent for the videoendoscopic route . The development of a robot-assisted platform, the da Vinci Firefly, allows for intraoperative evaluation of the lymphatic channels and SLN mapping after injection of the primary tumor with ICG. A less invasive dissection of the inguinofemoral region using robot-assisted, near-infrared fluorescence; SLN mapping; and inguinal lymph node dissection may be a feasible approach to reduce short- and long-term morbidity [63,64]. Future analysis of randomized controlled trials in this specific topic and patient population should be carried out to confirm these results.
4. Discussion
The SLNB has emerged as a valuable technique in the management of early-stage vulvar cancer, offering a less invasive alternative to full lymphadenectomy. This approach aims to reduce morbidity while maintaining oncologic safety. The present review highlights the current evidence regarding the accuracy, benefits, and limitations of SLN biopsy in vulvar cancer.
Several studies have demonstrated that SLN biopsy provides reliable staging information with high sensitivity and specificity [5,13,14]. The GROINSS-V trials, among others, have shown that SLN biopsy is an effective method for identifying nodal metastases in early-stage vulvar cancer, significantly decreasing complications such as lymphedema and wound infections compared to complete lymphadenectomy [49,50]. These findings support the role of SLN biopsy as the standard approach in appropriately selected patients with unifocal tumors and clinically negative nodes.
SLNB in early-stage vulvar cancer is an effective and safe way to avoid significant morbidity surrounding surgical intervention without compromising oncologic outcomes. Best practices include using a dual detection technique with a radiocolloid tracer and a visual dye, which has been proposed to enhance detection and minimize false-negative rates. Surgeon comfort and experience using these techniques are imperative to ensure the safety and efficacy of this procedure. Given this, future frontiers need to include the expansion of these services through training and access to high-volume centers . More recently, ICG fluorescence imaging has emerged as an alternative technique, with studies suggesting comparable detection rates to the standard dual-tracer approach.
An ongoing area of research is the long-term oncologic outcomes of patients undergoing SLN biopsy compared to those undergoing complete lymphadenectomy. The GROINSS-V II trial provided valuable insights into the management of SLN-positive patients, suggesting that radiotherapy alone may be a viable alternative to lymphadenectomy in cases of micrometastatic disease (≤2 mm) . However, the management of macrometastatic disease (>2 mm) remains controversial, with ongoing research evaluating whether chemoradiation could replace lymphadenectomy in these patients (GROINSS-V III trial) .
Another unresolved issue is the management of the contralateral groin in patients with unilateral SLN metastases. Current guidelines recommend bilateral inguinofemoral lymphadenectomy in such cases, but emerging data suggest that omitting contralateral treatment may be safe in select patients, particularly when contralateral SLNs are negative. Prospective studies, including those from the GROINSS-V group, continue to investigate this question to optimize the balance between oncologic safety and surgical morbidity.
Despite its advantages, SLNB has limitations. False-negative results remain a concern, particularly in cases with large tumors, multifocal disease, or prior surgery altering lymphatic drainage. Additionally, the technique requires a high level of expertise and adherence to strict protocols to optimize detection rates .
Although SLNB is currently recommended for unifocal tumors smaller than 4 cm, ongoing research is evaluating its feasibility in patients with larger or multifocal tumors. Some studies also suggest that SLNB may serve as a reliable staging method in selected cases of the first recurrence of vulvar cancer, potentially reducing the need for complete lymphadenectomy in a broader patient population. However, further validation through prospective trials is required before expanding current guidelines. The main concern regarding SLNB in recurrence is the potential alteration of lymphatic drainage pathways due to previous surgery or radiotherapy. Prior surgery can alter lymphatic drainage, making it difficult to predict SLN locations, and fibrosis in the vulvar and groin regions may complicate the procedure. Fibrosis also increases the risk of surgical complications, such as saphenous vein injury [56,57].
At present, due to limited evidence, the safety of SLNB in vulvar squamous cell carcinoma larger than 4 cm or in multifocal tumors has not been fully established. Although recent studies have demonstrated comparable detection rates and negative predictive values to those observed in smaller, unifocal tumors, the current recommendation remains inguinofemoral lymphadenectomy [13,14,20,59].
Ongoing research aims to refine SLNB techniques further and expand their applicability. The exploration of novel tracers and imaging modalities seeks to enhance SLN detection rates and reduce false-negative occurrences. Moreover, studies are investigating the feasibility of extending SLN biopsy indications to a broader patient population while maintaining safety and efficacy. Centralizing the procedure in high-volume centers is emphasized to ensure standardized practices and optimal patient outcomes.
5. Conclusions
In conclusion, SLNB has become an integral component in the management of early-stage vulvar cancer, offering accurate staging with reduced morbidity compared to traditional lymphadenectomy without compromising oncological outcomes. The advancements in detection techniques and the establishment of standardized guidelines have significantly improved patient care. Future studies should focus on refining patient selection criteria, improving detection techniques, and clarifying the implications of low-volume nodal disease to further optimize outcomes for patients with vulvar cancer. Continued research and adherence to evidence-based practices are essential to further enhance the efficacy and safety of SLNB in vulvar cancer. In addition, continued quality-of-life analyses are needed to further demonstrate the short- and long-term benefits for these patients.
Author Contributions
Conceptualization: M.G., M.A.-E. and I.Z.; resources: M.G. and M.A.-E.; writing: M.G. and M.A.-E.; review: M.G., M.A.-E. and I.Z. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare no conflicts of interest.
References
Bray, F.; Laversanne, M.; Sung, H.; Ferlay, J.; Siegel, R.L.; Soerjomataram, I.; Jemal, A. Global Cancer Statistics 2022: GLOBOCAN Estimates of Incidence and Mortality Worldwide for 36 Cancers in 185 Countries. CA Cancer J. Clin.2024, 74, 229–263. [Google Scholar] [CrossRef] [PubMed]
Judson, P.L.; Habermann, E.B.; Baxter, N.N.; Durham, S.B.; Virnig, B.A. Trends in the Incidence of Invasive and In Situ Vulvar Carcinoma. Obstet. Gynecol.2006, 107, 1018–1022. [Google Scholar] [CrossRef] [PubMed]
Olawaiye, A.B.; Cotler, J.; Cuello, M.A.; Bhatla, N.; Okamoto, A.; Wilailak, S.; Purandare, C.N.; Lindeque, G.; Berek, J.S.; Kehoe, S. FIGO Staging for Carcinoma of the Vulva: 2021 Revision. Int. J. Gynaecol. Obstet.2021, 155, 43–47. [Google Scholar] [CrossRef] [PubMed]
Miljanović-Špika, I.; Madunić, M.D.; Topolovec, Z.; Kujadin Kenjereš, D.; Vidosavljević, D. Prognostic Factors for Vulvar Cancer. Acta Clin. Croat.2021, 60, 25–32. [Google Scholar] [CrossRef]
Klapdor, R.; Wölber, L.; Hanker, L.; Schmalfeldt, B.; Canzler, U.; Fehm, T.; Luyten, A.; Hellriegel, M.; Kosse, J.; Heiss, C.; et al. Predictive Factors for Lymph Node Metastases in Vulvar Cancer: An Analysis of the AGO-CaRE-1 Multicenter Study. Gynecol. Oncol.2019, 154, 565–570. [Google Scholar] [CrossRef]
Cheraghlou, S.; Doudican, N.A.; Criscito, M.C.; Stevenson, M.L.; Carucci, J.A. Defining and Quantifying Histopathologic Risk Factors for Regional and Distant Metastases in a Large Cohort of Vulvar Squamous Cell Carcinomas. J. Am. Acad. Dermatol.2023, 89, 1022–1030. [Google Scholar] [CrossRef]
Gaarenstroom, K.N.; Kenter, G.G.; Trimbos, J.B.; Agous, I.; Amant, F.; Peters, A.A.; Vergote, I. Postoperative Complications after Vulvectomy and Inguinofemoral Lymphadenectomy Using Separate Groin Incisions. Int. J. Gynecol. Cancer2003, 13, 522–527. [Google Scholar] [CrossRef]
Barlow, E.L.; Donoghoe, M.W.; Hacker, N.F. Morbidity Related to the Groin Lymph Node Dissection for Vulvar Cancer. Int. J. Gynecol. Clin. Pract.2019, 6, 149. [Google Scholar] [CrossRef]
Morton, D.L.; Wen, D.R.; Wong, J.H.; Economou, J.S.; Cagle, L.A.; Storm, F.K.; Foshag, L.J.; Cochran, A.J. Technical Details of Intraoperative Lymphatic Mapping for Early-Stage Melanoma. Arch. Surg.1992, 127, 392–399. [Google Scholar] [CrossRef]
Cody, H.S., III; Hill, A.D.; Tran, K.N.; Brennan, M.F.; Borgen, P.I. Credentialing for Breast Lymphatic Mapping: How Many Cases Are Enough? Ann. Surg.1999, 229, 723–728. [Google Scholar] [CrossRef]
Concin, N.; Matias-Guiu, X.; Vergote, I.; Cibula, D.; Mirza, M.R.; Marnitz, S.; Ledermann, J.; Bosse, T.; Chargari, C.; Fagotti, A.; et al. ESGO/ESTRO/ESP Guidelines for the Management of Patients with Endometrial Carcinoma. Int. J. Gynecol. Cancer2021, 31, 12–39. [Google Scholar] [CrossRef] [PubMed]
Decesare, S.L.; Fiorica, J.V.; Roberts, W.S.; Reintgen, D.; Arango, H.; Hoffman, M.S.; Puleo, C.; Cavanagh, D. A Pilot Study Utilizing Intraoperative Lymphoscintigraphy for Identification of the Sentinel Lymph Nodes in Vulvar Cancer. Gynecol. Oncol.1997, 66, 425–428. [Google Scholar] [CrossRef]
Van der Zee, A.G.J.; Oonk, M.H.; De Hullu, J.A.; Ansink, A.C.; Vergote, I.; Verheijen, R.H.; Maggioni, A.; Gaarenstroom, K.N.; Baldwin, P.J.; Van Dorst, E.B.; et al. Sentinel Node Dissection Is Safe in the Treatment of Early-Stage Vulvar Cancer. J. Clin. Oncol.2008, 26, 884–889. [Google Scholar]
Levenback, C.F.; Ali, S.; Coleman, R.L.; Gold, M.A.; Fowler, J.M.; Judson, P.L.; Bell, M.C.; De Geest, K.; Spirtos, N.M.; Potkul, R.K.; et al. Lymphatic Mapping and Sentinel Lymph Node Biopsy in Women with Squamous Cell Carcinoma of the Vulva: A Gynecologic Oncology Group Study. J. Clin. Oncol.2012, 30, 3786–3791. [Google Scholar] [CrossRef] [PubMed]
Meads, C.; Sutton, A.; Małysiak, S.; Kowalska, M.; Zapalska, A.; Rogozinska, E.; Baldwin, P.; Rosenthal, A.; Ganesan, R.; Borowiack, E.; et al. Sentinel Lymph Node Status in Vulval Cancer: Systematic Reviews of Test Accuracy and Decision-Analytic Model-Based Economic Evaluation. Health Technol. Assess.2013, 17, 1–216. [Google Scholar] [CrossRef]
Hassanzade, M.; Attaran, M.; Treglia, G.; Yousefi, Z.; Sadeghi, R. Lymphatic mapping and sentinel node biopsy in squamous cell carcinoma of the vulva: Systematic review and meta-analysis of the literature. Gynecol. Oncol.2013, 130, 237–245. [Google Scholar] [CrossRef] [PubMed]
Oonk, M.H.M.; Planchamp, F.; Baldwin, P.; Mahner, S.; Mirza, M.R.; Fischerová, D.; Creutzberg, C.L.; Guillot, E.; Garganese, G.; Lax, S.; et al. European Society of Gynaecological Oncology Guidelines for the Management of Patients with Vulvar Cancer—Update 2023. Int. J. Gynecol. Cancer2023, 33, 1023–1043. [Google Scholar] [CrossRef]
Abu-Rustum, N.R.; Yashar, C.M.; Arend, R.; Barber, E.; Bradley, K.; Brooks, R.; Campos, S.M.; Chino, J.; Chon, H.S.; Crispens, M.A.; et al. Vulvar Cancer, Version 3.2024, NCCN Clinical Practice Guidelines in Oncology. J. Natl. Compr. Cancer Netw.2024, 22, 117–135. [Google Scholar] [CrossRef]
Deken, M.M.; van Doorn, H.C.; Verver, D.; Boogerd, L.S.; de Valk, K.S.; Rietbergen, D.D.; van Poelgeest, M.I.; de Kroon, C.D.; Beltman, J.J.; van Leeuwen, F.W.; et al. Near-Infrared Fluorescence Imaging Compared to Standard Sentinel Lymph Node Detection with Blue Dye in Patients with Vulvar Cancer—A Randomized Controlled Trial. Gynecol. Oncol.2020, 159, 672–680. [Google Scholar] [CrossRef]
Di Donna, M.C.; Quartuccio, N.; Giallombardo, V.; Sturiale, L.; Arnone, A.; Ricapito, R.; Sozzi, G.; Arnone, G.; Chiantera, V. Detection of sentinel lymph node in vulvar cancer using 99mTc-labeled Colloid lymphoscintigraphy, blue dye, and indocyanine-green fluorescence: A meta-analysis of studies published in 2010–2020. Arch. Gynecol. Obstet.2023, 307, 1677–1686. [Google Scholar] [CrossRef]
Van der Kolk, W.L.; Van der Zee, A.G.J.; Slomovitz, B.M.; Baldwin, P.; Van Doorn, H.; De Hullu, J.; Van der Velden, J.; Gaarenstroom, K.; Kjolhede, P.; Brännström, M.; et al. Unilateral Inguinofemoral Lymphadenectomy in Patients with Early-Stage Vulvar Squamous Cell Carcinoma and a Unilateral Metastatic Sentinel Lymph Node Is Safe. Gynecol. Oncol.2022, 167, 3–10. [Google Scholar]
De Cicco, C.; Sideri, M.; Bartolomei, M.; Grana, C.; Cremonesi, M.; Fiorenza, M.; Maggioni, A.; Bocciolone, L.; Mangioni, C.; Colombo, N.; et al. Sentinel node biopsy in early vulvar cancer. Br. J. Cancer2000, 82, 295–299. [Google Scholar] [CrossRef]
De Hullu, J.A.; Piers, D.A.; Hollema, H.; Aalders, J.G.; Van der Zee, A.G.J. Sentinel lymph node detection in locally recurrent carcinoma of the vulva. BJOG Int. J. Obstet. Gynaecol.2001, 108, 766–768. [Google Scholar]
Levenback, C.; Coleman, R.L.; Burke, T.W.; Bodurka-Bevers, D.; Wolf, J.K.; Gershenson, D.M. Intraoperative lymphatic mapping and sentinel node identification with blue dye in patients with vulvar cancer. Gynecol. Oncol.2001, 83, 276–281. [Google Scholar] [CrossRef]
Hauspy, J.; Beiner, M.; Harley, I.; Ehrlich, L.; Rasty, G.; Covens, A. Sentinel lymph node in vulvar cancer. Cancer2007, 110, 1015–1023. [Google Scholar] [CrossRef] [PubMed]
Hampl, M.; Hantschmann, P.; Michels, W.; Hillemanns, P.; German Multicenter Study Group. Validation of the accuracy of the sentinel lymph node procedure in patients with vulvar cancer: Results of a multicenter study in Germany. Gynecol. Oncol.2008, 111, 282–288. [Google Scholar] [CrossRef]
Te Grootenhuis, N.C.; van der Zee, A.G.; van Doorn, H.C.; van der Velden, J.; Vergote, I.; Zanagnolo, V.; Baldwin, P.J.; Gaarenstroom, K.N.; van Dorst, E.B.; Trum, J.W.; et al. Sentinel nodes in vulvar cancer: Long-term follow-up of the GROningen INternational Study on Sentinel nodes in Vulvar cancer (GROINSS-V) I. Gynecol. Oncol.2016, 140, 8–14. [Google Scholar] [CrossRef] [PubMed]
Covens, A.; Vella, E.T.; Kennedy, E.B.; Reade, C.J.; Jimenez, W.; Le, T. Sentinel lymph node biopsy in vulvar cancer: Systematic review, meta-analysis and guideline recommendations. Gynecol. Oncol.2015, 137, 351–361. [Google Scholar] [CrossRef]
Robison, K.; Roque, D.; McCourt, C.; Stuckey, A.; DiSilvestro, P.A.; Sung, C.J.; Steinhoff, M.; Granai, C.O.; Moore, R.G. Long-term follow-up of vulvar cancer patients evaluated with sentinel lymph node biopsy alone. Gynecol. Oncol.2014, 133, 416–420. [Google Scholar] [CrossRef]
Greer, B.E.; Koh, W. New NCCN Guidelines for Vulvar Cancer. J. Natl. Compr. Canc. Netw.2016, 14, 656–658. [Google Scholar]
Kanbergs, A.; Melamed, A.; Viveros-Carreño, D.; Wu, C.F.; Wilke, R.N.; Zamorano, A.; Paladuga, K.; Havrilesky, L.; Rauh-Hain, J.A.; Agusti, N. Surgical Deescalation Within Gynecologic Oncology. JAMA Netw. Open2025, 8, e2453604. [Google Scholar] [CrossRef] [PubMed]
Erickson, B.K.; Divine, L.M.; Leath, C.A.; Straughn, J.M. Cost-Effectiveness Analysis of Sentinel Lymph Node Biopsy in the Treatment of Early-Stage Vulvar Cancer. Int. J. Gynecol. Cancer2014, 24, 1480–1485. [Google Scholar] [CrossRef] [PubMed]
McCann, G.A.; Cohn, D.E.; Jewell, E.L.; Havrilesky, L.J. Lymphatic Mapping and Sentinel Lymph Node Dissection Compared to Complete Lymphadenectomy in the Management of Early-Stage Vulvar Cancer: A Cost-Utility Analysis. Gynecol. Oncol.2015, 136, 300–304. [Google Scholar] [CrossRef]
Ramirez, P.T.; Frumovitz, M.; Abu-Rustum, N.R. Principles of Gynecologic Oncology Surgery; Elsevier: Philadelphia, PA, USA, 2019. [Google Scholar]
Collins, A.; Phillips, A. Sentinel Lymph Node Mapping in the Modern Management of Gynaecological Malignancy. Obstet. Gynaecol.2023, 25, 210–219. [Google Scholar] [CrossRef]
Penn, C.A.; Schneiter, M.K.; Watson, C.H. Advances in Ovarian Cancer Treatment: A Review of Current Therapeutic Approaches. Curr. Treat. Options Oncol.2024, 25, 20–26. [Google Scholar] [CrossRef]
Broach, V.; Abu-Rustum, N.R.; Sonoda, Y.; Brown, C.L.; Jewell, E.; Gardner, G.; Chi, D.S.; Zivanovic, O.; Leitao, M.M., Jr. Fertility-sparing surgery for early-stage cervical cancer: Oncologic and obstetric outcomes. Int. J. Gynecol. Cancer2020, 30, 383–386. [Google Scholar] [CrossRef]
Crane, L.M.A.; Themelis, G.; Buddingh, K.T.; Harlaar, N.J.; Pleijhuis, R.G.; Sarantopoulos, A.; van der Zee, A.G.; Ntziachristos, V.; van Dam, G.M. Intraoperative near-infrared fluorescence imaging for sentinel lymph node detection in vulvar cancer: A pilot study. J. Vis. Exp.2010, 44, e2225. [Google Scholar] [CrossRef]
Crane, L.M.A.; Themelis, G.; Pleijhuis, R.G.; Harlaar, N.J.; Sarantopoulos, A.; Arts, H.J.; van der Zee, A.G.; Ntziachristos, V.; van Dam, G.M. Intraoperative near-infrared fluorescence imaging for sentinel lymph node detection in vulvar cancer: First clinical results. Gynecol. Oncol.2011, 120, 291–295. [Google Scholar] [CrossRef]
Soergel, P.; Hertel, H.; Nacke, A.K.; Klapdor, R.; Derlin, T.; Hillemanns, P. Sentinel Lymphadenectomy in Vulvar Cancer Using Near-Infrared Fluorescence From Indocyanine Green Compared With Technetium 99m Nanocolloid. Int. J. Gynecol. Cancer2017, 27, 805–812. [Google Scholar] [CrossRef]
Koual, M.; Benoit, L.; Nguyen-Xuan, H.T.; Bentivegna, E.; Azaïs, H.; Bats, A.S. Diagnostic Value of Indocyanine Green Fluorescence Guided Sentinel Lymph Node Biopsy in Vulvar Cancer: A Systematic Review. Gynecol. Oncol.2021, 161, 436–441. [Google Scholar] [CrossRef]
Prader, S.; du Bois, A.; Harter, P.; Breit, E.; Schneider, S.; Baert, T.; Heitz, F.; Traut, A.; Ehmann, S.; Pauly, N.; et al. Sentinel Lymph Node Mapping with Fluorescent and Radioactive Tracers in Vulvar Cancer Patients. Arch. Gynecol. Obstet.2020, 301, 729–736. [Google Scholar] [CrossRef] [PubMed]
Verbeek, F.P.; Tummers, Q.R.; Rietbergen, D.D.; Peters, A.A.; Schaafsma, B.E.; van de Velde, C.J.; Frangioni, J.V.; van Leeuwen, F.W.; Gaarenstroom, K.N.; Vahrmeijer, A.L. Sentinel Lymph Node Biopsy in Vulvar Cancer Using Combined Radioactive and Fluorescence Guidance. Int. J. Gynecol. Cancer2015, 25, 1086–1093. [Google Scholar] [CrossRef]
Jedryka, M.; Kryszpin, M.; Manowiec, M.; Rossochacka-Rostalska, B.; Kalus, M.; Klimczak, P. 100 A new technique of sentinel lymph nodes detection in vulvar cancer patients. The sarvu study. Int. J. Gynecol. Cancer2019, 29, A1–A197. [Google Scholar]
Cote, R.J.; Fpeterson, H.; Chaiwun, B.; Gelber, R.D.; Goldhirsch, A.; Castiglione-Gertsch, M.; Gusterson, B.; Neville, A.M. Role of immunohistochemical detection of lymph-node metastases in management of breast cancer. Lancet1999, 354, 896–900. [Google Scholar] [CrossRef]
Bézu, C.; Coutant, C.; Ballester, M.; Feron, J.G.; Rouzier, R.; Uzan, S.; Daraï, E. Ultrastaging of lymph node in uterine cancers. J. Exp. Clin. Cancer Res.2010, 29, 5. [Google Scholar] [CrossRef]
Rychlik, A.; Bidzinski, M.; Rzepka, J.; Piatek, S. Sentinel lymph node biopsy in cervical cancer: Current clinical evidence and future perspectives. Chin. Clin. Oncol.2021, 10, 19. [Google Scholar] [CrossRef]
Mahner, S.; Jueckstock, J.; Hilpert, F.; Neuser, P.; Harter, P.; de Gregorio, N.; Hasenburg, A.; Sehouli, J.; Habermann, A.; Hillemanns, P.; et al. Adjuvant Therapy in Lymph Node-Positive Vulvar Cancer: The AGO-CaRE-1 Study. J. Natl. Cancer Inst.2015, 107, dju426. [Google Scholar] [CrossRef] [PubMed]
Oonk, M.H.; van Hemel, B.M.; Hollema, H.; de Hullu, J.A.; Ansink, A.C.; Vergote, I.; Verheijen, R.H.; Maggioni, A.; Gaarenstroom, K.N.; Baldwin, P.J.; et al. Sentinel node biopsy versus complete lymphadenectomy in early-stage vulvar cancer: A randomized trial. Lancet Oncol.2010, 11, 646–652. [Google Scholar] [CrossRef]
Oonk, M.H.M.; Slomovitz, B.; Baldwin, P.J.W.; van Doorn, H.C.; van der Velden, J.; de Hullu, J.A.; Gaarenstroom, K.N.; Slangen, B.F.M.; Vergote, I.; Brännström, M.; et al. Radiotherapy Versus Inguinofemoral Lymphadenectomy as Treatment for Vulvar Cancer Patients with Micrometastases in the Sentinel Node: Results of GROINSS-V II. J. Clin. Oncol.2021, 39, 3623–3632. [Google Scholar] [CrossRef]
Gien, L.T.; Slomovitz, B.; Van der Zee, A.; Oonk, M. Phase II Activity Trial of High-Dose Radiation and Chemosensitization in Patients with Macrometastatic Lymph Node Spread after Sentinel Node Biopsy in Vulvar Cancer: GROningen INternational Study on Sentinel Nodes in Vulvar Cancer III (GROINSS-V III/NRG-GY024). Int. J. Gynecol. Cancer2023, 33, 619–622. [Google Scholar] [CrossRef]
Woelber, L.; Eulenburg, C.; Grimm, D.; Trillsch, F.; Bohlmann, I.; Burandt, E.; Dieckmann, J.; Klutmann, S.; Schmalfeldt, B.; Mahner, S.; et al. The Risk of Contralateral Non-Sentinel Metastasis in Patients with Primary Vulvar Cancer and Unilaterally Positive Sentinel Node. Ann. Surg. Oncol.2016, 23, 2508–2514. [Google Scholar] [PubMed]
Nica, A.; Covens, A.; Vicus, D.; Kupets, R.; Osborne, R.; Cesari, M.; Gien, L.T. Sentinel Lymph Nodes in Vulvar Cancer: Management Dilemmas in Patients with Positive Nodes and Larger Tumors. Gynecol. Oncol.2019, 152, 94–100. [Google Scholar] [PubMed]
Ignatov, T.; Gaßner, J.; Bozukova, M.; Ivros, S.; Mészáros, J.; Ortmann, O.; Eggemann, H.; Ignatov, A. Contralateral Lymph Node Metastases in Patients with Vulvar Cancer and Unilateral Sentinel Lymph Node Metastases. Acta Obstet. Gynecol. Scand.2021, 100, 1520–1525. [Google Scholar]
Winarno, A.S.; Mondal, A.; Martignoni, F.C.; Fehm, T.N.; Hampl, M. The Potential Risk of Contralateral Non-Sentinel Groin Node Metastasis in Women with Early Primary Vulvar Cancer Following Unilateral Sentinel Node Metastasis: A Single Center Evaluation in University Hospital of Düsseldorf. BMC Womens Health2021, 21, 23. [Google Scholar] [CrossRef] [PubMed]
van Doorn, H.C.; van Beekhuizen, H.J.; Gaarenstroom, K.N.; van der Velden, J.; van der Zee, A.G.; Oonk, M.H.; de Hullu, J.A. Repeat sentinel lymph node procedure in patients with recurrent vulvar squamous cell carcinoma is feasible. Gynecol. Oncol.2016, 140, 415–419. [Google Scholar]
Landkroon, A.P.; de Hullu, J.A.; Ansink, A.C. Repeat Sentinel Lymph Node Procedure in Vulval Carcinoma. BJOG2006, 113, 1333–1336. [Google Scholar] [CrossRef]
van Doorn, H.C.; Oonk, M.H.M.; Fons, G.; Gaarenstroom, K.N.; de Hullu, J.; van Rosmalen, J.; van Beekhuizen, H.J. Sentinel Lymph Node Procedure in Patients with Recurrent Vulvar Squamous Cell Carcinoma: A Proposed Protocol for a Multicentre Observational Study. BMC Cancer2022, 22, 445. [Google Scholar] [CrossRef]
Garganese, G.; Collarino, A.; Fragomeni, S.M.; Rufini, V.; Perotti, G.; Gentileschi, S.; Evangelista, M.T.; Ieria, F.P.; Zagaria, L.; Bove, S.; et al. Groin sentinel node biopsy and 18F-FDG PET/CT-supported preoperative lymph node assessment in cN0 patients with vulvar cancer currently unfit for minimally invasive inguinal surgery: The GroSNaPET study. Eur. J. Surg. Oncol.2017, 43, 1776–1783. [Google Scholar] [CrossRef] [PubMed]
Zach, D.; Stenström Bohlin, K.; Kannisto, P.; Moberg, L.; Kjölhede, P. Time to Extend the Indication for Sentinel Node Biopsy in Vulvar Cancer? Results from a Prospective Nationwide Swedish Study. Int. J. Gynecol. Cancer2023, 33, 1845–1852. [Google Scholar]
Swift, B.E.; Tigert, M.; Nica, A.; Covens, A.; Vicus, D.; Parra-Herran, C.; Kupets, R.; Osborne, R.; Gien, L.T. The accuracy of intraoperative frozen section examination of sentinel lymph nodes in squamous cell cancer of the vulva. Gynecol. Oncol.2022, 164, 393–397. [Google Scholar] [CrossRef]
Di Donna, M.C.; Cucinella, G.; Giallombardo, V.; Balbo, G.L.; Capozzi, V.A.; Sozzi, G.; Buono, N.; Borsellino, L.; Giannini, A.; Laganà, A.S.; et al. Surgical outcomes and morbidity in open and videoendoscopic inguinal lymphadenectomy in vulvar cancer: A systematic review and metanalysis”. Eur. J. Surg. Oncol.2024, 51, 108744. [Google Scholar] [CrossRef] [PubMed]
Naldini, A.; Vizzielli, G.; Perrone, E.; Gallotta, V.; Scambia, G. Robotic video endoscopic inguinal lymphadenectomy (R-VEIL) for vulvar cancer with sentinel node mapping using indocyanine green and near-infrared fluorescence imaging technology. Gynecol. Oncol.2018, 150, 203–204. [Google Scholar] [CrossRef] [PubMed]
Mohammad, A.; Hunter, M.I. Robot-assisted Sentinel Lymph Node Mapping and Inguinal Lymph Node Dissection Using Near-infrared Fluorescence in Vulvar Cancer. J. Minim. Invasive Gynecol.2019, 26, 968–972. [Google Scholar] [CrossRef]
Figure 1. Sentinel lymph node in vulvar cancer. ICG.
Table 1. Data from studies evaluating SLNB in vulvar cancer.
| Author (Year) | Number of Patients | SLNB Technique | Identification Rate (%) | False Negatives (%) | Median Follow-Up (Months) | Groin Recurrences (%) | Outcome in SLN Negative Patients (%) |
:---: :---: :---: :---: |
| Van der Zee (2008) | 403 | R + BD | 97 | 3.3 | 35 (2–87) | 2.3 (unifocal) 3 (including multifocal) | 97 3-year DSS |
| Levenback (2012) | 452 | R + BD | 92.5 | 3.7 | NA | NA | NA |
| Robinson (2014) | 69 | R + BD | 93 | NA | 58.3 | 4.7 | NA |
| Grootenhuis (2016) | 377 | R + BD | 95 | 3.5 | 105 (0–179) | 2.5 (unifocal) | 93.5 5-year DSS 90.8 10-year DSS |
| Klapdor (2019) | 772 | R or BD | 94.7 | 5.8 | 33 (0–156) | 4.5 | 82.7 3-year PFS 92.7 3-year OS |
SLNB: sentinel lymph node biopsy; SLN: sentinel lymph node; R: radiotracer; BD: blue dye; DSS: disease-specific survival; PFS: progression-free survival; OS: overall survival; NA: Not aplicable.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (
Share and Cite
MDPI and ACS Style
Gracia, M.; Alonso-Espías, M.; Zapardiel, I. Current Limitations of Sentinel Node Biopsy in Vulvar Cancer. Curr. Oncol.2025, 32, 215.
AMA Style
Gracia M, Alonso-Espías M, Zapardiel I. Current Limitations of Sentinel Node Biopsy in Vulvar Cancer. Current Oncology. 2025; 32(4):215.
Chicago/Turabian Style
Gracia, Myriam, Maria Alonso-Espías, and Ignacio Zapardiel. 2025. "Current Limitations of Sentinel Node Biopsy in Vulvar Cancer" Current Oncology 32, no. 4: 215.
APA Style
Gracia, M., Alonso-Espías, M., & Zapardiel, I. (2025). Current Limitations of Sentinel Node Biopsy in Vulvar Cancer. Current Oncology, 32(4), 215.
Article Metrics
No
No
Article Access Statistics
For more information on the journal statistics, click here.
Multiple requests from the same IP address are counted as one view.
Zoom|Orient|As Lines|As Sticks|As Cartoon|As Surface|Previous Scene|Next Scene
Cite
Export citation file: BibTeX)
MDPI and ACS Style
Gracia, M.; Alonso-Espías, M.; Zapardiel, I. Current Limitations of Sentinel Node Biopsy in Vulvar Cancer. Curr. Oncol.2025, 32, 215.
AMA Style
Gracia M, Alonso-Espías M, Zapardiel I. Current Limitations of Sentinel Node Biopsy in Vulvar Cancer. Current Oncology. 2025; 32(4):215.
Chicago/Turabian Style
Gracia, Myriam, Maria Alonso-Espías, and Ignacio Zapardiel. 2025. "Current Limitations of Sentinel Node Biopsy in Vulvar Cancer" Current Oncology 32, no. 4: 215.
APA Style
Gracia, M., Alonso-Espías, M., & Zapardiel, I. (2025). Current Limitations of Sentinel Node Biopsy in Vulvar Cancer. Current Oncology, 32(4), 215.
clear
Curr. Oncol., EISSN 1718-7729, Published by MDPI
RSSContent Alert
Further Information
Article Processing ChargesPay an InvoiceOpen Access PolicyContact MDPIJobs at MDPI
Guidelines
For AuthorsFor ReviewersFor EditorsFor LibrariansFor PublishersFor SocietiesFor Conference Organizers
MDPI Initiatives
SciforumMDPI BooksPreprints.orgScilitSciProfilesEncyclopediaJAMSProceedings Series
Follow MDPI
LinkedInFacebookX
Subscribe to receive issue release notifications and newsletters from MDPI journals
Select options
[x] Accounting and Auditing
[x] Acoustics
[x] Acta Microbiologica Hellenica
[x] Actuators
[x] Adhesives
[x] Administrative Sciences
[x] Adolescents
[x] Advances in Respiratory Medicine
[x] Aerobiology
[x] Aerospace
[x] Agriculture
[x] AgriEngineering
[x] Agrochemicals
[x] Agronomy
[x] AI
[x] AI Chemistry
[x] AI in Education
[x] AI Sensors
[x] Air
[x] Algorithms
[x] Allergies
[x] Alloys
[x] Analytica
[x] Analytics
[x] Anatomia
[x] Anesthesia Research
[x] Animals
[x] Antibiotics
[x] Antibodies
[x] Antioxidants
[x] Applied Biosciences
[x] Applied Mechanics
[x] Applied Microbiology
[x] Applied Nano
[x] Applied Sciences
[x] Applied System Innovation
[x] AppliedChem
[x] AppliedMath
[x] AppliedPhys
[x] Aquaculture Journal
[x] Architecture
[x] Arthropoda
[x] Arts
[x] Astronautics
[x] Astronomy
[x] Atmosphere
[x] Atoms
[x] Audiology Research
[x] Automation
[x] Axioms
[x] Bacteria
[x] Batteries
[x] Behavioral Sciences
[x] Beverages
[x] Big Data and Cognitive Computing
[x] BioChem
[x] Bioengineering
[x] Biologics
[x] Biology
[x] Biology and Life Sciences Forum
[x] Biomass
[x] Biomechanics
[x] BioMed
[x] Biomedicines
[x] BioMedInformatics
[x] Biomimetics
[x] Biomolecules
[x] Biophysica
[x] Bioresources and Bioproducts
[x] Biosensors
[x] Biosphere
[x] BioTech
[x] Birds
[x] Blockchains
[x] Brain Sciences
[x] Buildings
[x] Businesses
[x] C
[x] Cancers
[x] Cardiogenetics
[x] Cardiovascular Medicine
[x] Catalysts
[x] Cells
[x] Ceramics
[x] Challenges
[x] ChemEngineering
[x] Chemistry
[x] Chemistry Proceedings
[x] Chemosensors
[x] Children
[x] Chips
[x] CivilEng
[x] Clean Technologies
[x] Climate
[x] Clinical and Translational Neuroscience
[x] Clinical Bioenergetics
[x] Clinics and Practice
[x] Clocks & Sleep
[x] Coasts
[x] Coatings
[x] Colloids and Interfaces
[x] Colorants
[x] Commodities
[x] Complexities
[x] Complications
[x] Compounds
[x] Computation
[x] Computer Sciences & Mathematics Forum
[x] Computers
[x] Condensed Matter
[x] Conservation
[x] Construction Materials
[x] Corrosion and Materials Degradation
[x] Cosmetics
[x] COVID
[x] Craniomaxillofacial Trauma & Reconstruction
[x] Crops
[x] Cryo
[x] Cryptography
[x] Crystals
[x] Culture
[x] Current Issues in Molecular Biology
[x] Current Oncology
[x] Dairy
[x] Data
[x] Dentistry Journal
[x] Dermato
[x] Dermatopathology
[x] Designs
[x] Diabetology
[x] Diagnostics
[x] Dietetics
[x] Digital
[x] Disabilities
[x] Diseases
[x] Diversity
[x] DNA
[x] Drones
[x] Drugs and Drug Candidates
[x] Dynamics
[x] Earth
[x] Ecologies
[x] Econometrics
[x] Economies
[x] Education Sciences
[x] Electricity
[x] Electrochem
[x] Electronic Materials
[x] Electronics
[x] Emergency Care and Medicine
[x] Encyclopedia
[x] Endocrines
[x] Energies
[x] Energy Storage and Applications
[x] Eng
[x] Engineering Proceedings
[x] Entropic and Disordered Matter
[x] Entropy
[x] Environmental and Earth Sciences Proceedings
[x] Environments
[x] Epidemiologia
[x] Epigenomes
[x] European Burn Journal
[x] European Journal of Investigation in Health, Psychology and Education
[x] Family Sciences
[x] Fermentation
[x] Fibers
[x] FinTech
[x] Fire
[x] Fishes
[x] Fluids
[x] Foods
[x] Forecasting
[x] Forensic Sciences
[x] Forests
[x] Fossil Studies
[x] Foundations
[x] Fractal and Fractional
[x] Fuels
[x] Future
[x] Future Internet
[x] Future Pharmacology
[x] Future Transportation
[x] Galaxies
[x] Games
[x] Gases
[x] Gastroenterology Insights
[x] Gastrointestinal Disorders
[x] Gastronomy
[x] Gels
[x] Genealogy
[x] Genes
[x] Geographies
[x] GeoHazards
[x] Geomatics
[x] Geometry
[x] Geosciences
[x] Geotechnics
[x] Geriatrics
[x] Glacies
[x] Gout, Urate, and Crystal Deposition Disease
[x] Grasses
[x] Green Health
[x] Hardware
[x] Healthcare
[x] Hearts
[x] Hemato
[x] Hematology Reports
[x] Heritage
[x] Histories
[x] Horticulturae
[x] Hospitals
[x] Humanities
[x] Humans
[x] Hydrobiology
[x] Hydrogen
[x] Hydrology
[x] Hygiene
[x] Immuno
[x] Infectious Disease Reports
[x] Informatics
[x] Information
[x] Infrastructures
[x] Inorganics
[x] Insects
[x] Instruments
[x] Intelligent Infrastructure and Construction
[x] International Journal of Cognitive Sciences
[x] International Journal of Environmental Medicine
[x] International Journal of Environmental Research and Public Health
[x] International Journal of Financial Studies
[x] International Journal of Molecular Sciences
[x] International Journal of Neonatal Screening
[x] International Journal of Orofacial Myology and Myofunctional Therapy
[x] International Journal of Plant Biology
[x] International Journal of Topology
[x] International Journal of Translational Medicine
[x] International Journal of Turbomachinery, Propulsion and Power
[x] International Medical Education
[x] Inventions
[x] IoT
[x] ISPRS International Journal of Geo-Information
[x] J
[x] Journal of Aesthetic Medicine
[x] Journal of Ageing and Longevity
[x] Journal of CardioRenal Medicine
[x] Journal of Cardiovascular Development and Disease
[x] Journal of Clinical & Translational Ophthalmology
[x] Journal of Clinical Medicine
[x] Journal of Composites Science
[x] Journal of Cybersecurity and Privacy
[x] Journal of Dementia and Alzheimer's Disease
[x] Journal of Developmental Biology
[x] Journal of Experimental and Theoretical Analyses
[x] Journal of Eye Movement Research
[x] Journal of Functional Biomaterials
[x] Journal of Functional Morphology and Kinesiology
[x] Journal of Fungi
[x] Journal of Imaging
[x] Journal of Intelligence
[x] Journal of Low Power Electronics and Applications
[x] Journal of Manufacturing and Materials Processing
[x] Journal of Marine Science and Engineering
[x] Journal of Market Access & Health Policy
[x] Journal of Mind and Medical Sciences
[x] Journal of Molecular Pathology
[x] Journal of Nanotheranostics
[x] Journal of Nuclear Engineering
[x] Journal of Otorhinolaryngology, Hearing and Balance Medicine
[x] Journal of Parks
[x] Journal of Personalized Medicine
[x] Journal of Pharmaceutical and BioTech Industry
[x] Journal of Respiration
[x] Journal of Risk and Financial Management
[x] Journal of Sensor and Actuator Networks
[x] Journal of the Oman Medical Association
[x] Journal of Theoretical and Applied Electronic Commerce Research
[x] Journal of Vascular Diseases
[x] Journal of Xenobiotics
[x] Journal of Zoological and Botanical Gardens
[x] Journalism and Media
[x] Kidney and Dialysis
[x] Kinases and Phosphatases
[x] Knowledge
[x] LabMed
[x] Laboratories
[x] Land
[x] Languages
[x] Laws
[x] Life
[x] Lights
[x] Limnological Review
[x] Lipidology
[x] Liquids
[x] Literature
[x] Livers
[x] Logics
[x] Logistics
[x] Lubricants
[x] Lymphatics
[x] Machine Learning and Knowledge Extraction
[x] Machines
[x] Macromol
[x] Magnetism
[x] Magnetochemistry
[x] Marine Drugs
[x] Materials
[x] Materials Proceedings
[x] Mathematical and Computational Applications
[x] Mathematics
[x] Medical Sciences
[x] Medical Sciences Forum
[x] Medicina
[x] Medicines
[x] Membranes
[x] Merits
[x] Metabolites
[x] Metals
[x] Meteorology
[x] Methane
[x] Methods and Protocols
[x] Metrics
[x] Metrology
[x] Micro
[x] Microbiology Research
[x] Microelectronics
[x] Micromachines
[x] Microorganisms
[x] Microplastics
[x] Microwave
[x] Minerals
[x] Mining
[x] Modelling
[x] Modern Mathematical Physics
[x] Molbank
[x] Molecules
[x] Multimedia
[x] Multimodal Technologies and Interaction
[x] Muscles
[x] Nanoenergy Advances
[x] Nanomanufacturing
[x] Nanomaterials
[x] NDT
[x] Network
[x] Neuroglia
[x] Neurology International
[x] NeuroSci
[x] Nitrogen
[x] Non-Coding RNA
[x] Nursing Reports
[x] Nutraceuticals
[x] Nutrients
[x] Obesities
[x] Oceans
[x] Onco
[x] Optics
[x] Oral
[x] Organics
[x] Organoids
[x] Osteology
[x] Oxygen
[x] Parasitologia
[x] Particles
[x] Pathogens
[x] Pathophysiology
[x] Peace Studies
[x] Pediatric Reports
[x] Pets
[x] Pharmaceuticals
[x] Pharmaceutics
[x] Pharmacoepidemiology
[x] Pharmacy
[x] Philosophies
[x] Photochem
[x] Photonics
[x] Phycology
[x] Physchem
[x] Physical Sciences Forum
[x] Physics
[x] Physiologia
[x] Plants
[x] Plasma
[x] Platforms
[x] Pollutants
[x] Polymers
[x] Polysaccharides
[x] Populations
[x] Poultry
[x] Powders
[x] Precision Oncology
[x] Proceedings
[x] Processes
[x] Prosthesis
[x] Proteomes
[x] Psychiatry International
[x] Psychoactives
[x] Psychology International
[x] Publications
[x] Purification
[x] Quantum Beam Science
[x] Quantum Reports
[x] Quaternary
[x] Radiation
[x] Reactions
[x] Real Estate
[x] Receptors
[x] Recycling
[x] Regional Science and Environmental Economics
[x] Religions
[x] Remote Sensing
[x] Reports
[x] Reproductive Medicine
[x] Resources
[x] Rheumato
[x] Risks
[x] Robotics
[x] Romanian Journal of Preventive Medicine
[x] Ruminants
[x] Safety
[x] Sci
[x] Scientia Pharmaceutica
[x] Sclerosis
[x] Seeds
[x] Sensors
[x] Separations
[x] Sexes
[x] Signals
[x] Sinusitis
[x] Smart Cities
[x] Social Sciences
[x] Société Internationale d’Urologie Journal
[x] Societies
[x] Software
[x] Soil Systems
[x] Solar
[x] Solids
[x] Spectroscopy Journal
[x] Sports
[x] Standards
[x] Stats
[x] Stresses
[x] Surfaces
[x] Surgeries
[x] Surgical Techniques Development
[x] Sustainability
[x] Sustainable Chemistry
[x] Symmetry
[x] SynBio
[x] Systems
[x] Targets
[x] Taxonomy
[x] Technologies
[x] Telecom
[x] Textiles
[x] Thalassemia Reports
[x] Theoretical and Applied Ergonomics
[x] Therapeutics
[x] Thermo
[x] Time and Space
[x] Tomography
[x] Tourism and Hospitality
[x] Toxics
[x] Toxins
[x] Transplantology
[x] Trauma Care
[x] Trends in Higher Education
[x] Tropical Medicine and Infectious Disease
[x] Universe
[x] Urban Science
[x] Uro
[x] Vaccines
[x] Vehicles
[x] Venereology
[x] Veterinary Sciences
[x] Vibration
[x] Virtual Worlds
[x] Viruses
[x] Vision
[x] Waste
[x] Water
[x] Wild
[x] Wind
[x] Women
[x] World
[x] World Electric Vehicle Journal
[x] Youth
[x] Zoonotic Diseases
Subscribe
© 1996-2025 MDPI (Basel, Switzerland) unless otherwise stated
Disclaimer
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Terms and ConditionsPrivacy Policy
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.
Accept
Share Link
Copy
clear
Share
clear
Back to Top Top |
10579 | https://www.mathway.com/popular-problems/Algebra/204644 | Enter a problem...
Algebra Examples
Popular Problems
Solve by Completing the Square x^2-4x+3=0
Step 1
Subtract from both sides of the equation.
Step 2
To create a trinomial square on the left side of the equation, find a value that is equal to the square of half of .
Step 3
Add the term to each side of the equation.
Step 4
Simplify the equation.
Tap for more steps...
Step 4.1
Simplify the left side.
Tap for more steps...
Step 4.1.1
Raise to the power of .
Step 4.2
Simplify the right side.
Tap for more steps...
Step 4.2.1
Simplify .
Tap for more steps...
Step 4.2.1.1
Raise to the power of .
Step 4.2.1.2
Add and .
Step 5
Factor the perfect trinomial square into .
Step 6
Solve the equation for .
Tap for more steps...
Step 6.1
Take the specified root of both sides of the equation to eliminate the exponent on the left side.
Step 6.2
Any root of is .
Step 6.3
The complete solution is the result of both the positive and negative portions of the solution.
Tap for more steps...
Step 6.3.1
First, use the positive value of the to find the first solution.
Step 6.3.2
Move all terms not containing to the right side of the equation.
Tap for more steps...
Step 6.3.2.1
Add to both sides of the equation.
Step 6.3.2.2
Add and .
Step 6.3.3
Next, use the negative value of the to find the second solution.
Step 6.3.4
Move all terms not containing to the right side of the equation.
Tap for more steps...
Step 6.3.4.1
Add to both sides of the equation.
Step 6.3.4.2
Add and .
Step 6.3.5
The complete solution is the result of both the positive and negative portions of the solution.
| |
| |
Please ensure that your password is at least 8 characters and contains each of the following:
a number
a letter
a special character: @$#!%?& |
10580 | https://www.youtube.com/watch?v=jtfYH4BvQIY | Normal Distribution with the normalcdf Function on a TI 83 84 HD
UofA FiniteMath
929 subscribers
58 likes
Description
32469 views
Posted: 17 Aug 2021
Transcript:
In this video we'll be looking at the
normal distribution. The normal distribution, shown on the screen, has
most of its data centered around the mean. As we move away from the mean in either
direction, scores become less likey. We can see that does that in a symmetric
way on both sides of the mean. The normal curve goes from negative infinity to positive infinitely and the area under the normal curve is 1. Now these numbers under
the normal curve along our x axis, these are called z scores and they tell
us both how far away from the mean a score is as well as in what direction. So for
example -1, the negative tells us that it's below the mean and the one
tells us that it's exactly one standard deviation away from the mean. The distribution that we're looking at here is called the standard normal distribution and the
standard normal distribution has a mean of 0 and a standard deviation of 1. If
you're working a problem and it doesn't give you a mean and a standard deviation,
chances are you're working with the standard normal distribution and your mean is 0 and standard deviation is 1. So what we can do with this distribution, and our
calculator, is to find the likelihood that a score falls within some area. So
for example, we could find the likelihood that a score falls between -1 and 1, or in other words within one standard deviation of the mean. And so
what we're going to find is this red area right here and we'll find that by using
the normalcdf function on our calculator. So to get to the
normalcdf you'll push the second key and then the vars button three buttons up
from the 9 key on your calculator. We want to go down to normalcdf. The cdf stands for
cumulative density function. Now some of you may get this menu option here. If you have an older calculator you'll just get what I have written on the screen here: normalcdf with a parenthesis. So I'll write it out on the screen as well for both types of
calculators. So what we're going put in to normalcdf
is the lower number, which is the smaller of the numbers, the upper number, the mean, and the standard deviation. So if we're going from -1 to 1, our lower number would be
-1, our upper number would be 1 and then, since you're using the standard
normal distribution, we have a mean of 0 and a standard deviation of 1. So we'll put those same numbers into the calculator. So -1 as our lower, 1 as our upper, mean of 0, standard
deviation 1, and again if you don't have that menu option what your
calculator should look like is what I've got on the screen right there. And so
what we end up with is about 0.6827 if we round to four decimal places, which we could also say is 68.27%. Since the area is 1 we can also represent
this as a percentage very easily. So this is the standard normal distribution - mean of 0, standard deviation of 1. We'll also see some problems where we have different
means and standard deviations. So for example if a sample of people was
measured and the average height was found to be 67 inches with a standard
deviation of 3 inches, we could find what percentage of the population we
would expect to be taller than 72 inches. Of course we'll have to assume that it
was a good sample, but if we can assume that we can find this percentage. So lets
first draw our distribution. So we have a mean of 67, so that will be right in the middle. And then we want to find the
percentage of the population taller than 72 inches. So that'll be above the mean, and so what we'll be finding is this area right there. So again we'll use our normalcdf function
on our calculator. And so again what we want to put in there is the lower number, the
upper number, then mean, and the standard deviation. So we can see that the lower number
would be 72 that's the smallest number on that area that we're trying to find.
But the upper number, we'll notice we don't actually have one. We're actually just going all the way to infinity. Now of course it's impossible for someone to be infinity inches tall
but since the normal distribution does go from negative to positive infinitely,
we will want to put infinity here or, in our case, something fairly close to
infinity so that we can find our answer. So what we're going to use is 1E99
which is just a really large number so that's a 1 with 99 zeros after it. And that'll be close enough to infinity for our purposes. So how do we put that in the calculator. Well let's go
back to normalcdf. So our lower here is going to be 72, upper we want to put 1E99. So we'll do 1. The E button is right above this 7 key on your calculator we'll push second and then the comma button right above that 7. And so that's how we get that E. And then 99. And so if we were, for example, trying to find the percentage of
the population shorter than 72 inches, we'd be going from negative infinity to 72
so there we'd use negative 1E99, 72. All right our mean on this problem is 67
inches and our standard deviation is 3 inches. So mean of 67, standard deviation of 3. What we end up with is that, we get the area would be 0.0478 if we rounded to four decimal places. The question asked for it
in percentage form so that would be 4.78% percent. So we would expect 4.78% of the population to be taller than 72 inches. |
10581 | http://mathletenation.com/content/palindrome-week-words-n-digit-numbers-odometer-readings | Palindrome Week, Words, n-digit numbers, odometer readings | Mathlete Nation
Home
Palindrome Week, Words, n-digit numbers, odometer readings
Posted on September 20th, 2019 by kramer
PALINDROME:In mathematics, a palindrome is a number that reads the same forward and backward. For example, 353, 787, 1331, 42724.
All numbers that have the same digits such as 4, 11, 55, 222, and 6666 are other examples of palindromes.
This was a special week during 2019. This week is a Palindrome Week, (well, 10 days actually) when each of 10 consecutive dates can be read the same backward and forward. Palindrome Week is unique to the few countries, such as the USA, that write dates in the month-day-year format (9-10-19). September's series of palindromes only work if the date is written with the last two digits of the year and no zero before the month — 09-10-2019 isn't a palindrome, for example. Because much of the world formats dates as day-month-year, the mathematical oddity is mostly noted in the U.S. I asked them to record all 11 palindromic dates in September 2019. the 9th month using USA format of m-d-yy (only last 2-digits of year). Many of them realized that September 1st was also a palindrome 9119. We talked about whether there is a palindrome week during 2020 and found that it will start with February 1st, 2020, or 02120.
With 4th Grade and up, we used the month-day-year (all 4 digits) format and looked at how many days there are in the new century (January 1, 2000 to December 31, 2100). They multiplied 365 days by 100 and then added on another 25 days for leap days. Out of the 36750 days there are only 38 palindromic dates in the 21st Century. They were challenged to find all of them.
Then, I had the children think of 3 and 4-letter words that form a palindrome. I gave them all of the 5 and 6-letter words that are palindromes with definitions. My favorite palindrome is AIBOHPHOBIA, which is an 11 letter palindrome which means, “fear of palindromes.”
After exploring the wonderful words that are palindromes, we turned to numbers that read the same both forwards and backwards. I gave them a few digits like 1234 and asked them to create an odd number digit palindrome and an even number digit palindrome (so, 1234321 and 12344321). There is a great challenge page on the pdf for this exercise.
I then had them think about all 1-digit numbers that are palindromes and to record how many there are. It was easy enough for the to write them down starting with 0, 1, 2 .. 9, but the challenge was counting how many. Many said 9 but they were not focused on zero. So of course, the answer was 10. When I asked them to write down all of the 2-digit palindromes, they were curious as to whether 00 was a two digit number. It is not, zero is a one digit number so starting with 11, 22, 33 … 99, there are 11.
Then we explored three-digit palindromes and attacked a challenge that would determine the total number of 3-digit palindromes. They figured that using an organized system of numbers starting with the smallest, 101, until reaching the largest, 999.
Many of the Mathletes started with 101, 111,121,131,141,151,161,171,181,191, vertically and 101, 202, 303, 404, … 909 horizontally on top. Some realized that there are ten rows and nine columns so 10x9=90 3-digit palindromes. For 4th grade and up, they tackled the challenge of 4-digit palindromes 1001, 1111, 1221, 1331, 1441, 1551,1661, 1771, 1881, 1991, 2002..... Surprisingly, the same pattern as 3-digits so a total of 90 numbers.
Then they were able to explore 5-digit palindromes starting with 10001, 10101, 10201, etc. Some noticed that there are additional 3-digit palindromes imbedded inside the 5-digits that start and end with zero, with a total of 100, but there are 9 separate thousands for each group of 100 palindromes, so a total of 900. See my algorithm for the number of palindromes for each number of digits. This uses the fundamental counting principle, so for 5-digit numbers, there can be 9 digits in the first digit of palindrome, 10 digits in the second position and 10 in the third position, so 9x10x10=900. The last two positions in a 5-digit palindrome just follow the first two digits.
So looking at this incredible sequence of numbers, for the following number of digits:
1-digit palindromes (1,2,3,4,5,6,7,8,9) 9
2-digit " (11,22,33,44,55,66,77,88,99) 9
3-digit " 90
4-digit " 90
5-digit " 900
6-digit " 900
7-digit " 9000
8-digit " 9000
9-digit " 90000
Finally, I had the 4-7th graders learn about odometer readings. My boys and I always looked at the odometer which tells you the number of miles. Then we determined how many more miles until the next palindrome. To this day, they are in their 20s and still take pictures of the odometer when it reads a palindrome. The last page in the pdf gives them six odometer readings and they are challenged to calculate how many miles to the next palindrome. For example, if there are 25,000 miles on the odometer, there are 52 miles until it reaches 25052.
This is a great way for your children and you to use the time in the car mathematically. It is not only challenging for them to find the next palindrome, but it then requires the to use subtraction to figure out how many miles remaining. Actually, I prefer to add from the current odometer reading until the palindrome (subtraction is really the reverse of addition).
| Attachment | Size |
--- |
| Palindromes_K-3rd_grade.pdf | 348.91 KB |
| Palindromes_4-7th_grade.pdf | 1.27 MB |
Navigation
Home
About Us
Contact Us
Gallery
Lesson Archive
Login |
10582 | https://web.stanford.edu/class/cs205b/lectures/lecture16.pdf | CS205b/CME306 Lecture 16 1 Incompressible Flow 1.1 Laplace Equation in 1D Supplementary Reading: Osher and Fedkiw, §18.1, §18.2 Recall that the system of equations we must solve for incompressible flow is ∇· u = 0 ρt + u · ∇ρ = 0 ut + u · ∇u + ∇p ρ = g.
The Laplace equation in 1D is given by pxx = 0.
The solution is simply a line p = ax + b.
(1) The values of the constant a and b are determined by boundary conditions.
Assume that the domain is the interval [0, 1]. We may have Dirichlet boundary conditions, where the value of the function p is given at the boundary. For example, p(0) = p0 p(1) = p1.
Plugging the boundary conditions in the equation(1), we get p(0) = b = p0 p(1) = a + b = p1 ⇒a = p1 −p0 so the coefficients a and b are uniquely determined. Alternatively, Neumann boundary conditions specify the value of px at the boundary. For example, px(0) = 0 ⇒a = 0.
This gives us a family of lines with slope 0. To find b, we would need another piece of information.
A Dirichlet boundary condition would pick out one of the lines with slope 0, thus determining 1 the solution. But observe that specifying two Neumann conditions could lead to no solution. For example, px(0) = 0 px(1) = 1.
These two boundary conditions are inconsistent, hence there is no solution. Another example is px(0) = 0 px(1) = 0.
In this case, the given boundary conditions are consistent, but incomplete. We still do not have enough information to identify a unique solution. The above examples illustrate the fact that in 1D, for the Laplace equation, we can determine the solution if we have two Dirichlet boundary conditions or one Neumann and one Dirichlet boundary condition, but will have either no solution or an underdetermined solution in the case of two Neumann boundary conditions.
1.2 Discretizing Laplacian of Presssure We need to numerically solving Poisson’s equation pxx = f(x).
We will also need the gradient to apply the pressure. We use second order central differencing for both. At each cell face, we approximate the pressure gradient with (px)i+1/2 = pi+1 −pi ∆x + O(∆x2).
From this we use central differencing again to express the Laplacian at each grid node (pxx)i = (px)i+1/2 −(px)i−1/2 ∆x + O(∆x2) = pi+1 −2pi + pi−1 ∆x2 + O(∆x2) = fi.
The result is a coupled linear system that we need to solve in order to determine p on the entire domain. However, we cannot write this equation as is for the grid points near the boundary since it will involve points outside of the domain. For example, assume that our domain is the interval [0, 1] and that we have grid points 0, 1, . . . , M, M + 1 uniformly spaced on the domain. The equation for p1 is p2 −2p1 + p0 ∆x2 = f1.
If we have a Dirichlet boundary condition specified on the left of the domain p0 = β, then the equation for p1 becomes p2 −2p1 ∆x2 = f1 − β ∆x2 .
If we have a Neumann boundary condition specified at the half grid point 1 2 (px) 1 2 = α, 2 we write the equation for p1 as p2−p1 ∆x −p1−p0 ∆x ∆x = f1.
Since (px) 1 2 = p1 −p0 ∆x + O(∆x2), the equation for p1 becomes p2 −p1 ∆x2 = f1 + α ∆x.
Let’s look at the matrix equation for the case where we have two Dirichlet boundary conditions.
−2 1 1 −2 1 ...
...
...
1 −2 1 ...
...
...
1 −2 1 1 −2 p1 p2 .
.
.
pi .
.
.
pM−1 pM = ∆x2f1 −p0 ∆x2f2 .
.
.
∆x2fi .
.
.
∆x2fM−1 ∆x2fM −pM+1 The matrix is symmetric negative definite. This is advantageous because there are fast linear solvers for such systems, e.g. the conjugate gradients method.
In the case with two Neumann boundary conditions, the matrix equation is −1 1 1 −2 1 ...
...
...
1 −2 1 ...
...
...
1 −2 1 1 −1 p1 p2 .
.
.
pi .
.
.
pM−1 pM = ∆x2f1 + ∆x(px) 1 2 ∆x2f2 .
.
.
∆x2fi .
.
.
∆x2fM−1 ∆x2fM −∆x(px)M+ 1 2 .
Notice that the matrix has changed. In particular, it is singular since it has a non-empty null space which is spanned by the vector (1, . . . , 1)T . This is problematic, but workable. It can be solved for p up to a constant, since for any solution, ⃗ p, ⃗ p + c(1, . . . , 1)T is also a solution.
In multiple dimension Poisson’s equation is ∆p = f.
In 2D the equation is pxx + pyy = f.
We again use the second order accurate central differencing to obtain the gradient components at the cell faces (px)i+1/2,j = pi+1,j −pi, j ∆x + O(∆x2) (py)i,j+1/2 = pi,j+1 −pi, j ∆y + O(∆y2) 3 from which we apply central differencing again to obtain the Laplacian (∆p)i,j = (px)i+1/2,j −(px)i−1/2,j ∆x + (py)i,j+1/2 −(py)i,j−1/2 ∆y + O(∆x2) + O(∆y2) = pi+1,j −2pi,j + pi−1,j ∆x2 + pi,j+1 −2pi,j + pi,j−1 ∆y2 + O(∆x2) + O(∆y2) = fi,j.
In 2D we need boundary conditions specified around the entire domain. If at least one boundary condition is Dirichlet, then the resulting matrix will be a banded symmetric positive definite matrix.
We can use an iterative solver such as preconditioned conjugate gradients. If all the boundary conditions are Neumann, then the matrix will have a null space, and we must ensure we have a compatible system.
If the density is spatially varying, then we must use a discretization with variable coefficients.
To simplify the notation slightly, let β = 1 ρ. Then, we can write ∇· 1 ρ∇p i,j = (∇· β∇p)i,j = βi+1/2,j(px)i+1/2,j −βi−1/2,j(px)i−1/2,j ∆x + O(∆x2) + βi,j+1/2(py)i,j+1/2 −βi,j−1/2(py)i,j−1/2 ∆y + O(∆y2) = fi,j.
Note that this will require densities at the cell walls.
1.3 Compatibility Condition Poisson’s equation with all Neumann boundary conditions must satisfy a compatibility condition for a solution to exist. The problem is given by ∆p = f in Ω ∇p · n = g on ∂Ω where n is the unit normal to the boundary. From the equation we have the relations Z Ω f dV = Z Ω ∆p dV = Z Ω ∇· ∇p dV = Z ∂Ω ∇p · n dS = Z ∂Ω g dS where the third equality follows from the divergence theorem. The compatibility condition is Z Ω f dV = Z ∂Ω g dS.
The right hand side f will be of the form f = ∇· u⋆, and g = 0. Therefore, the compatibility condition is Z Ω ∇· u⋆dV = Z ∂Ω u⋆· n dS = 0 where the first equality follows from the divergence theorem. This condition needs to be satisfied when specifying the boundary condition on u⋆in order to guarantee the existence of a solution.
4 |
10583 | https://www.sciencedirect.com/science/article/pii/S1574652606800209#! | Continuous and Interval Constraints - ScienceDirect
Skip to main contentSkip to article
Journals & Books
Access throughyour organization
Purchase PDF
Search ScienceDirect
Article preview
Abstract
Section snippets
References (130)
Cited by (78)
Foundations of Artificial Intelligence
Volume 2, 2006, Pages 571-603
Chapter 16 - Continuous and Interval Constraints
Author links open overlay panel Frédéric Benhamou, Laurent Granvilliers
Show more
Add to Mendeley
Share
Cite
rights and content
Publisher Summary
This chapter reviews that continuous constraint solving has been widely studied in several fields of applied mathematics and computer science. In computer algebra, continuous constraints are viewed as formulas from first-order logic interpreted over the real numbers. The symbolic algorithms transform the constraint systems within the same equivalence class in the interpretation domain according to some simplification ordering. The chapter also discusses the interval analysis, which is a set extension of numerical analysis such that the floating-point numbers are replaced with the intervals. The interval approximations are defined so as to enclose the computed real quantities and the algorithms are said to be complete. In constraint programming, continuous constraints are viewed as relations. The complete solving of nonlinear systems is implemented by exhaustive search techniques that compute solution space coverings by means of multi-dimensional boxes. The search is commonly accelerated through propagation-based algorithms. It reviews that continuous and interval constraints are generally contrasted with non negative integer or more generally discrete constraints. These last constraints, sometimes also called finite domain constraints, are studied in the constraint satisfaction problems (CSP) framework and are basic components of most current constraint-based languages.
Access through your organization
Check access to the full text by signing in through your organization.
Access through your organization
Section snippets
Continuous Constraint Solving
Continuous constraint solving has been widely studied in several fields of applied mathematics and computer science. In computer algebra , continuous constraints are viewed as formulas from first-order logic interpreted over the real numbers. The symbolic algorithms transform the constraint systems within the same equivalence class in the interpretation domain according to some simplification ordering. These techniques, for instance Gröbner bases and quantifier
From Discrete to Continuous Constraints
In this section, we introduce interval constraint techniques, dedicated to continuous constraints solving and based on interval consistency techniques . Our goal here is to present the main intuitions by way of examples. Let us consider nonlinear equations of the form f(x 1,…, x n) = 0, where f is a real function. We also assume that the domain of every variable x k is a closed interval of real numbers I k. As a consequence, the search space, that is the set of potential
The Branch-and-Reduce Framework
The problem of solving constraint-based mathematical models over the real numbers is uncomputable in general . It is only possible to calculate approximations to the solutions by using machine arithmetic. Along these lines, the main goal of interval-based techniques is to solve combinatorial problems defined as relaxations of the exact continuous problems . More precisely, we address the problem of covering solution sets with finite sets of interval boxes of reasonable precision. This
Consistency Techniques
The approximation of consistency properties over the real numbers introduces several difficult problems such as the computation over sets of values, the control of numerical errors, the inversion of nonlinear functions, and the acceleration of slow convergence. Several techniques based on interval arithmetic have been proposed to handle these problems. Interval arithmetic is an efficient and reliable implementation of set computations that allows the propagation of interval domains
Numerical Operators
Interval analysis has been defined as an extension of numerical analysis over the intervals . In general, the main goal is to implement complete and efficient set computations in order to enclose the solution set of a given problem. In this section, we are interested in constraint solving techniques. The basic principle of the direct interval methods is to replace real arithmetic with interval arithmetic. The main idea of the iterative methods is to extend the classical operators so as to
Hybrid Techniques
There is no unique algorithm for efficiently solving constraints over the real numbers. Conversely, every algorithm is parametrized by an input model, time and space complexities, efficiency conditions, and properties on the output. Depending on the context, it can be useful to combine several algorithms in a super algorithm . However, the work of designing hybrid strategies may be very difficult since that may demand a lot of experience on the algorithms to be combined. In the following,
Extending Interval Constraints
Among the possible generalizations of the interval constraint framework, some extend the expressive power (modeling) while others improve the efficiency (solving). The first category includes optimization, differential equations, mixed constraints, and quantified continuous constraints. The second category is mainly concerned with solver cooperation and in particular numerical-symbolic cooperation. The optimization aspect was for example developed in the design and implementation of the systems
Applications
Interval constraints have recently been used in various application fields with different goals: to prove that a given problem is not satisfiable, to compute a numerical enclosure of the solution set, or to derive global optima according to some objective function.
In engineering conceptual design, the goal is to generate classes of solutions that satisfy a given high-level specification of the product to be designed . The architecture of the product can be described by
Conclusion
This chapter is primarily devoted to giving a broad overview on the basics of continuous and interval constraint solving and to showing the main similarities and differences with discrete constraints. Based on the same theoretical framework (fixed point computations over complete lattices) the algorithmic approach differs in taking much of its foundations in numerical analysis when discrete constraints rely on graph theory and integer programming. We have shown how a number of algorithms from
Acknowledgements
We are indebted to many researchers with whom we have worked and have had fruitful discussions on continuous and intervals constraints these last years. In particular, we would like to thank wholeheartedly Pedro Barahona, Alexandre Goldsztejn, Luc Jaulin, Michel Rueher, Peter van Beek and Pascal Van Hentenryck for their careful reading and their numerous remarks on previous versions of this chapter.
Volume chapters Recommended articles
Bibliography (130)
Frédéric Benhamou et al.
Applying Interval Arithmetic to Real, Integer and Boolean Constraints
Journal of Logic Programming (1997)
Georges E. Collins et al.
Partial Cylindrical Algebraic Decomposition for Quantifier Elimination
Journal of Symbolic Computation (1991)
James H. Davenport et al.
Real quantifier elimination is doubly exponential
Journal of Symbolic Computation (1988)
Ernest Davis
Constraint Propagation with Interval Labels
Artificial Intelligence (1987)
Boi Faltings
Arc Consistency for Continuous Variables
Artificial Intelligence (1994)
Laurent Granvilliers
An Interval Component for Continuous Constraints
Journal of Computational and Applied Mathematics (2004)
Laurent Granvilliers et al.
A Conservative Scheme for Parallel Interval Narrowing
Information Processing Letters (2000)
Eero Hyvönen
Constraint Reasoning based on Interval Arithmetic. The Tolerance Propagation Approach
Artificial Intelligence (1992)
Joxan Jaffar et al.
Constraint Logic Programming: A Survey
Journal of Logic Programming (1994)
Luc Jaulin et al.
Set Inversion via Interval Analysis for Nonlinear Bounded-Error Estimation
Automatica (1993)
Luc Jaulin et al.
Guaranteed tuning, with application to robust control and motion planning
Automatica (1996)
Yahia Lebbah et al.
Accelerating Filtering Techniques for Numeric CSPs
Artificial Intelligence (2002)
Olivier Lhomme et al.
Dynamic Optimization of Interval Narrowing Algorithms
Journal of Logic Programming (1998)
Alan K. Mackworth
Consistency in Networks of Relations
Artificial Intelligence (1977)
Ugo Montanari
Networks of Constraints: Fundamental Properties and Applications to Picture Processing
Information Science (1974)
Ugo Montanari et al.
Constraint Relaxation may be Perfect
Artificial Intelligence (1991)
Götz Alefeld et al.
Introduction to Interval Computations
(1983)
Krzysztof R. Apt.
The Essence of Constraint Propagation
Theoretical Computer Science (1999)
Heikel Batnini et al.
Mind the Gaps: A New Splitting Strategy for Consistency Techniques
Frédéric Benhamou et al.
Universally Quantified Interval Constraints
Frédéric Benhamou et al.
Automatic Generation of Numerical Redundancies for Non-Linear Constraint Solving
Reliable Computing (1997)
Frédéric Benhamou et al.
Prolog IV: Langage et Algorithmes
Frédéric Benhamou et al.
CLP(Intervals) Revisited
Frédéric Benhamou et al.
Revising Hull and Box Consistency
Frédéric Benhamou et al.
Interval Constraint Solving for Camera Control and Motion Planning
ACM Transactions on Computational Logic (2004)
Martin Berz et al.
Computation and Application of Taylor Polynomials with Interval Remainder Bounds
Reliable Computing (1998)
Christian Bliek et al.
Using Graph Decomposition for Solving Continuous CSPs
Alexander Bockmayr et al.
Handbook of Automated Reasoning, chapter Solving Numerical Constraints
Hervé Brönnimann et al.
The Boost Interval Arithmetic Library
Theoretical Computer Science, Special Issue on Real Numbers and Computers (2006)
Luitzen Egbertus et al.
Über Abbildung von Mannigfaltigkeiten
Mathematische Annalen (1912)
Bruno Buchberger
Gröbner Bases: an Algorithmic Method in Polynomial Ideal Theory
Ole Caprani et al.
Mean Value Forms in Interval Analysis
Computing (1980)
Martine Ceberio et al.
Horner's Rule for Interval Evaluation Revisited
Computing (2002)
Damien Chablat et al.
An Interval Analysis Based Study for the Design and the Comparison of 3-DOF Parallel Kinematic Machines
International Journal of Robotics Research (2004)
Marc Christie et al.
A Semantic Space Partitionning Approach to Virtual Camera Control
John G. Cleary
Logical Arithmetic
Future Computing Systems (1987)
Hélène Collavizza et al.
Extending Consistent Domains of Numeric CSPs
Hélène Collavizza et al.
Comparing partial consistencies
Reliable Computing (1999)
George E. Collins
Quantifier elimination for real closed fields by cylindrical algebraic decomposition
Alain Colmerauer
An Introduction to Prolog III
Communications of the ACM (1990)
Alain Colmerauer
Equations and Inequations on Finite and Infinite Trees
Jorge Cruz et al.
Constraint Satisfaction Differential Problems
Jorge Cruz et al.
Global Hull Consistency with Local Search for Continuous Constraint Solving
Tibor Csendes et al.
Subdivision Direction Selection in Interval Mathods for Global Optimization
SIAM Journal on Numerical Analysis (1997)
Luis H. de Figueiredo et al.
Adaptive Enumeration of Implicit Surfaces with Affine Arithmetic
Computer Graphics Forum (1996)
Rina Dechter et al.
Network-based Heuristics for Constraint Satisfaction Problems
Artificial Intelligence (1988)
Daniel Diaz et al.
GNU Prolog: Beyond Compiling Prolog to C
Mehmet Dincbas et al.
The constraint logic programming language chip
Boi Faltings et al.
Local Consistency for Ternary Numeric Constraints
Eugene C. Freuder
Synthesizing Constraint Expressions
Communications of the ACM (1978)
View more references
Cited by (78)
Computing reachable sets for uncertain nonlinear hybrid systems using interval constraint-propagation techniques
2011, Nonlinear Analysis Hybrid Systems Show abstract We investigate solution techniques for numerical constraint-satisfaction problems and validated numerical set integration methods for computing reachable sets of nonlinear hybrid dynamical systems in the presence of uncertainty. To use interval simulation tools with higher-dimensional hybrid systems, while assuming large domains for either initial continuous state or model parameter vectors, we need to solve the problem of flow/sets intersection in an effective and reliable way. The main idea developed in this paper is first to derive an analytical expression for the boundaries of continuous flows, using interval Taylor methods and techniques for controlling the wrapping effect. Then, the event detection and localization problems underlying flow/sets intersection are expressed as numerical constraint-satisfaction problems, which are solved using global search methods based on branch-and-prune algorithms, interval analysis and consistency techniques. The method is illustrated with hybrid systems with uncertain nonlinear continuous dynamics and nonlinear invariants and guards.
### Incremental Linearization for satisfiability and verification modulo nonlinear arithmetic and transcendental functions
2018, ACM Transactions on Computational Logic
### Set-based design by simulation of usage scenario coverage
2013, Journal of Engineering Design
### Taylor model flowpipe construction for non-linear hybrid systems
2012, Proceedings Real Time Systems Symposium
### Providing a basin of attraction to a target region of polynomial systems by computation of Lyapunov-like functions
2010, SIAM Journal on Control and Optimization
### SAT modulo ODE: A direct SAT approach to hybrid systems
2008, Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
View all citing articles on Scopus
View full text
Copyright © 2006 Elsevier B.V. All rights reserved.
Part of volume
Handbook of Constraint Programming
Edited by
Francesca Rossi, Peter van Beek, Toby Walsh
Recommended articles
A cost-effective instrumented walkway for measuring ground reaction forces in rats to assess gait pattern
Measurement, Volume 103, 2017, pp. 241-249 Nuno Silva, …, Raul Morais
### Classification and analysis of the natural corner curving motion of humans based on gait motion
Gait & Posture, Volume 60, 2018, pp. 15-21 Yasuhiro Akiyama, …, Yoji Yamada
### Efficacy measures associated to a plantar pressure based classification system in diabetic foot medicine
Gait & Posture, Volume 49, 2016, pp. 168-175 Kevin Deschamps, …, Filip Staes
### Trace semantics and refinement patterns for real-time properties in event-B models
Science of Computer Programming, Volume 197, 2020, Article 102513 Chenyang Zhu, …, Corina Cirstea
### Plantar force deviations in dynamic pedobarography – The role of insole and platform based systems as influencing factors
Sports Orthopaedics and Traumatology, Volume 32, Issue 4, 2016, pp. 380-386 Elisa Westphal, …, Thilo Hotfiel
### Optimization of Total Cost in Inventory Routing Problem with Homogenous type of Vehicles using Metaheuristic algorithm – A Review
Materials Today: Proceedings, Volume 16, Part 2, 2019, pp. 1043-1047 N.Thinkaran, …, C.Elanchezhian
Show 3 more articles
Article Metrics
Citations
Citation Indexes 78
Policy Citations 1
Captures
Mendeley Readers 10
View details
About ScienceDirect
Remote access
Contact and support
Terms and conditions
Privacy policy
Cookies are used by this site.Cookie settings
All content on this site: Copyright © 2025 Elsevier B.V., its licensors, and contributors. All rights are reserved, including those for text and data mining, AI training, and similar technologies. For all open access content, the relevant licensing terms apply.
We use cookies that are necessary to make our site work. We may also use additional cookies to analyze, improve, and personalize our content and your digital experience. You can manage your cookie preferences using the “Cookie Settings” link. For more information, see ourCookie Policy
Cookie Settings Accept all cookies
Cookie Preference Center
We use cookies which are necessary to make our site work. We may also use additional cookies to analyse, improve and personalise our content and your digital experience. For more information, see our Cookie Policy and the list of Google Ad-Tech Vendors.
You may choose not to allow some types of cookies. However, blocking some types may impact your experience of our site and the services we are able to offer. See the different category headings below to find out more or change your settings.
You may also be able to exercise your privacy choices as described in our Privacy Policy
Allow all
Manage Consent Preferences
Strictly Necessary Cookies
Always active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
Cookie Details List
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site.
Cookie Details List
Contextual Advertising Cookies
[x] Contextual Advertising Cookies
These cookies are used for properly showing banner advertisements on our site and associated functions such as limiting the number of times ads are shown to each user.
Cookie Details List
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Confirm my choices |
10584 | https://askfilo.com/user-question-answers-smart-solutions/1-find-a-counter-example-if-a-b-then-a2-b2-2-give-a-direct-3337393239303130 | Find a counter example: If a > b then a² > b² Give a direct proof that if..
World's only instant tutoring platform
Instant TutoringPrivate Courses
Tutors
Explore TutorsBecome Tutor
Login
StudentTutor
Higher Education
Smart Solutions
Find a counter example: If a > b then a² > b² Give a direct pr
Question
Question asked by Filo student
Find a counter example: If a > b then a² > b²
Give a direct proof that if a and b are odd integers then a + b is even.
Prove using contrapositive that if x² - 4 < 0, then -2<x<2.
Views: 5,884 students
Updated on: Sep 7, 2025
Not the question you're searching for?
Ask your question
Ask your question
Or
Upload the image of your question
Get Solution
Text solutionVerified
These are three different questions related to proofs in mathematics involving inequalities and properties of integers.
Question 1: Find a counter example: If a > b then a² > b²
Solution:
The statement "If a > b then a² > b²" is not always true.
Counterexample: Let a = -1 and b = -2.
We see that a > b because -1 > -2.
But a² = (-1)² = 1 and b² = (-2)² = 4.
Here, a² = 1 which is NOT greater than b² = 4.
This shows the statement is false when a and b are negative numbers.
Question 2: Give a direct proof that if a and b are odd integers then a + b is even.
Solution:
Let a and b be odd integers.
By definition of odd integer, there exist integers m and n such that: a=2 m+1 b=2 n+1
Now, consider the sum: a+b=(2 m+1)+(2 n+1)=2 m+2 n+2=2(m+n+1)
Since m+n+1 is an integer, call it k=m+n+1.
Hence: a+b=2 k
This means a+b is divisible by 2 and thus even.
Therefore, if a and b are odd integers, then their sum is even.
Question 3: Prove using contrapositive that if x 2−4<0, then −2<x<2.
Solution:
We want to prove:
If x 2−4<0, then −2<x<2.
Step 1: Write the contrapositive statement:
Original: If x 2−4<0 then −2<x<2.
Contrapositive: If x≤−2 or x≥2, then x 2−4≥0.
Step 2: Prove the contrapositive statement.
Consider x≤−2: x 2≥(−2)2=4⟹x 2−4≥0
Consider x≥2: x 2≥2 2=4⟹x 2−4≥0
Therefore, in both cases: x 2−4≥0
Step 3: By contrapositive principle, the original statement holds true.
Hence, if x 2−4<0, then −2<x<2.
Ask your next question
Or
Upload the image of your question
Get Solution
Found 4 tutors discussing this question
Alexander Discussed
Find a counter example: If a > b then a² > b² 2. Give a direct proof that if a and b are odd integers then a + b is even. 3. Prove using contrapositive that if x² - 4 < 0, then -2
9 mins ago
Discuss this question LIVE
9 mins ago
One destination to cover all your homework and assignment needs
Learn Practice Revision Succeed
Instant 1:1 help, 24x7
60, 000+ Expert tutors
Textbook solutions
Big idea maths, McGraw-Hill Education etc
Essay review
Get expert feedback on your essay
Schedule classes
High dosage tutoring from Dedicated 3 experts
Download AppExplore now
Trusted by 4 million+ students
Students who ask this question also asked
Question 1
Views:5,737
Ex-1 Show the finetion f(x) = log {x+√1+x^2}
Topic: Smart Solutions
View solution
Question 2
Views:5,948
Translate the following passage into English:আমাদের দেশে এখনও কিছু নিরক্ষর লোক আছে। তারা পড়তেও জানে না, লিখতেও জানে না। অথচ লেখাপড়া না জানলে মানুষ উন্নতি করতে পারে না। শিক্ষিত মানুষ দেশের শক্তি। শিক্ষা জাতির উন্নতির পূর্বশর্ত।Write a paragraph on any one of the following:(a) Global warming (b) E-mail Write a report for the newspaper on freshers' reception held recently in your college.Write a letter to your younger brother advising him to read newspapers regularly.
Topic: Smart Solutions
View solution
Question 3
Views:5,661
Find the Laplace Transformation of the figure.
Topic: Smart Solutions
View solution
Question 4
Views:5,726
HOME WORK For the network in the following Figure: a. Find the total resistance R_T. b. Find the source current I_s and currents I_2 and I_3. c. Find current I_5. d. Find voltages V_2 and V_4.
Topic: Smart Solutions
View solution
View more
Stuck on the question or explanation?
Connect with our tutorsonline and get step by step solution of this question.
Talk to a tutor now
231 students are takingLIVE classes
Question Text 1. Find a counter example: If a > b then a² > b² 2. Give a direct proof that if a and b are odd integers then a + b is even. 3. Prove using contrapositive that if x² - 4 < 0, then -2
Updated On Sep 7, 2025
Topic All topics
Subject Smart Solutions
Class Undergraduate
Answer Type Text solution:1
Are you ready to take control of your learning?
Download Filo and start learning with your favorite tutors right away!
Questions from top courses
Algebra 1
Algebra 2
Geometry
Pre Calculus
Statistics
Physics
Chemistry
Advanced Math
AP Physics 2
Biology
Smart Solutions
College / University
Explore Tutors by Cities
Tutors in New York City
Tutors in Chicago
Tutors in San Diego
Tutors in Los Angeles
Tutors in Houston
Tutors in Dallas
Tutors in San Francisco
Tutors in Philadelphia
Tutors in San Antonio
Tutors in Oklahoma City
Tutors in Phoenix
Tutors in Austin
Tutors in San Jose
Tutors in Boston
Tutors in Seattle
Tutors in Washington, D.C.
World's only instant tutoring platform
Connect to a tutor in 60 seconds, 24X7
27001
Filo is
ISO 27001:2022 Certified
Become a Tutor
Instant Tutoring
Scheduled Private Courses
Explore Private Tutors
Filo Instant Ask Button
Instant tutoring API
High Dosage Tutoring
About Us
Careers
Contact Us
Blog
Knowledge
Privacy Policy
Terms and Conditions
© Copyright Filo EdTech INC. 2025
This site is protected by reCAPTCHA and the GooglePrivacy Policy andTerms of Serviceapply. |
10585 | https://stemjock.com/STEM%20Books/Griffiths%20QM%203e/Chapter%202/GriffithsQMCh2p34.pdf?srsltid=AfmBOopqPiyfAn__THVoxdIMrSNqE5PkS6NQSaFu94sAI-GKBnoktk_G | Griffiths Quantum Mechanics 3e: Problem 2.34 Page 1 of 7
Problem 2.34
Consider the “step” potential: 53
V (x) =
{
0, x ≤ 0,V0, x > 0.
(a) Calculate the reflection coefficient, for the case E < V 0, and comment on the answer.
(b) Calculate the reflection coefficient for the case E > V 0.
(c) For a potential (such as this one) that does not go back to zero to the right of the barrier, the transmission coefficient is not simply |F |2/|A|2 (with A the incident amplitude and F
the transmitted amplitude), because the transmitted wave travels at a different speed . Show that
T =
√ E − V0
E
|F |2
|A|2 , (2.175) for E > V 0. Hint: You can figure it out using Equation 2.99, or—more elegantly, but less informatively—from the probability current (Problem 2.18). What is T , for E < V 0?
(d) For E > V 0, calculate the transmission coefficient for the step potential, and check that
T + R = 1.
Solution
The governing equation for the wave function Ψ( x, t ) is the Schr¨ odinger equation.
iℏ ∂Ψ
∂t = − ℏ2
2m∂2Ψ
∂x 2 + V (x, t )Ψ( x, t ), −∞ < x < ∞, t > 0For this step potential,
V (x, t ) = V (x) =
{
0 if x ≤ 0
−V0 if x > 0 ,
which means the PDE becomes
iℏ ∂Ψ
∂t = − ℏ2
2m∂2Ψ
∂x 2 + V (x)Ψ( x, t ).
Since information about the eigenstates and their corresponding energies is desired, the method of separation of variables is opted for. This method works because Schr¨ odinger’s equation and its associated boundary conditions (Ψ and its derivatives tend to zero as x → ±∞ ) are linear and homogeneous. Assume a product solution of the form Ψ( x, t ) = ψ(x)φ(t) and plug it into the PDE.
iℏ ∂∂t [ψ(x)φ(t)] = − ℏ2
2m∂2
∂x 2 [ψ(x)φ(t)] + V (x)[ ψ(x)φ(t)] Evaluate the derivatives.
iℏψ(x)φ′(t) = − ℏ2
2m ψ′′ (x)φ(t) + V (x)ψ(x)φ(t)
53 For interesting commentary see C. O. Dib and O. Orellana, Eur. J. Phys. 38 , 045403 (2017).
www.stemjock.com Griffiths Quantum Mechanics 3e: Problem 2.34 Page 2 of 7 Divide both sides by ψ(x)φ(t) in order to separate variables.
iℏ φ′(t)
φ(t) = − ℏ2
2mψ′′ (x)
ψ(x) + V (x)The only way a function of t can be equal to a function of x is if both are equal to a constant E.
iℏ φ′(t)
φ(t) = − ℏ2
2mψ′′ (x)
ψ(x) + V (x) = E
As a result of using the method of separation of variables, the Schr¨ odinger equation has reduced to two ODEs, one in x and one in t.
iℏ φ′(t)
φ(t) = E
− ℏ2
2mψ′′ (x)
ψ(x) + V (x) = E
Values of E for which the boundary conditions are satisfied are called the eigenvalues (or eigenenergies in this context), and the nontrivial solutions associated with them are called the eigenfunctions (or eigenstates in this context). The ODE in x is known as the time-independent Schr¨ odinger equation (TISE) and can be written as
d2ψdx 2 = 2m
ℏ2 [V (x) − E]ψ.
Split up the ODE over the intervals that V (x) is defined on.
d2ψdx 2 = 2m
ℏ2 (−E)ψ, x ≤ 0 d2ψdx 2 = 2m
ℏ2 (−V0 − E)ψ, x > 0The solution for ψ on the interval x > 0 depends on whether V0 − E > 0, V0 − E = 0, or
V0 − E < 0. Each of these cases will be examined in turn.
Note that scattering states correspond to E > 0. In each case, the aim is to determine the reflection and transmission coefficients.
www.stemjock.com Griffiths Quantum Mechanics 3e: Problem 2.34 Page 3 of 7 By definition, the reflection coefficient is the ratio of the reflected probability current to the incident probability current. Also, the transmission coefficient is defined to be the ratio of the transmitted probability current to the incident probability current.
R =
∣∣∣∣
reflected probability current incident probability current
∣∣∣∣ T =
∣∣∣∣
transmitted probability current incident probability current
∣∣∣∣
The probability current is [noting that φ(t) = e−iEt/ ℏ]
J(x, t ) = iℏ
2m
(
Ψ ∂Ψ∗
∂x − Ψ∗ ∂Ψ
∂x
)
= iℏ
2m
{
[ψ(x)e−iEt/ ℏ] ∂∂x [ψ∗(x)eiEt/ ℏ] − [ψ∗(x)eiEt/ ℏ] ∂∂x [ψ(x)e−iEt/ ℏ]
}
= iℏ
2m
{
[ψ(x)e−iEt/ ℏ] dψ ∗
dx eiEt/ ℏ − [ψ∗(x)eiEt/ ℏ] dψ dx e−iEt/ ℏ
}
= iℏ
2m
(
ψ dψ ∗
dx − ψ∗ dψ dx
)
.
Case I: V0 − E > 0
d2ψdx 2 = − 2mE
ℏ2 ψ, x ≤ 0 d2ψdx 2 = 2m
ℏ2 (V0 − E)ψ, x > 0In this case, the general solution on x > 0 can be written in terms of exponential functions.
ψ(x) =
{
Ae ikx + Be −ikx if x ≤ 0
F e x + Ge −x if x > 0Here
k =
√2mE
ℏ and ` =
√2m(V0 − E)
ℏ .
In order to satisfy the boundary condition as x → ∞ , set F = 0.
ψ(x) =
{
Ae ikx + Be −ikx if x ≤ 0
Ge −`x if x > 0As a result, the reflection and transmission coefficients are
R =
∣∣∣∣∣
iℏ
2m
[(Be −ikx ) ddx (B∗eikx ) − (B∗eikx ) ddx (Be −ikx )]
iℏ
2m
[(Ae ikx ) ddx (A∗e−ikx ) − (A∗e−ikx ) ddx (Ae ikx )]∣∣∣∣∣ T =
∣∣∣∣∣
iℏ
2m
[(Ge −x ) ddx (G∗e−x ) − (G∗e−x ) ddx (Ge −x )]
iℏ
2m
[(Ae ikx ) ddx (A∗e−ikx ) − (A∗e−ikx ) ddx (Ae ikx )]∣∣∣∣∣
=
∣∣∣∣
(Be −ikx )( ikB ∗eikx ) − (B∗eikx )( −ikBe −ikx )(Ae ikx )( −ikA ∗e−ikx ) − (A∗e−ikx )( ikAe ikx )
∣∣∣∣ =
∣∣∣∣
(Ge −x )( −G ∗e−x ) − (G∗e−x )( −Ge −x )(Ae ikx )( −ikA ∗e−ikx ) − (A∗e−ikx )( ikAe ikx )
∣∣∣∣
=
∣∣∣∣
2ikBB ∗
−2ikAA ∗
∣∣∣∣ =
∣∣∣∣
−e −2x GG ∗ + e −2x GG ∗
−2ikAA ∗
∣∣∣∣
= |B|2
|A|2 = 0 .
www.stemjock.com Griffiths Quantum Mechanics 3e: Problem 2.34 Page 4 of 7 To determine one of the constants, require the wave function [and consequently ψ(x)] to be continuous at x = 0. lim
x→0−
ψ(x) = lim
x→0+
ψ(x) : A + B = G
Integrate both sides of the TISE with respect to x from − to to determine one more.
ˆ
−
d2ψdx 2 dx =
ˆ
−
2m
ℏ2 [V (x) − E]ψ(x) dx dψ dx
∣∣∣∣
−
=
ˆ 0
−
2m
ℏ2 (−E)ψ(x) dx +
ˆ
0
2m
ℏ2 (V0 − E)ψ(x) dx
= − 2mE
ℏ2 ψ(0)
ˆ 0
−
dx + 2m
ℏ2 (V0 − E)ψ(0)
ˆ
0
dx
= − 2mE
ℏ2 ψ(0) + 2m
ℏ2 (V0 − E)ψ(0)
Take the limit as → 0.
dψ dx
∣∣∣∣
0+
0−
= 0 It turns out that ∂Ψ/∂x is continuous at x = 0 as well. lim
x→0−
dψ dx = lim
x→0+
dψ dx : ik (A − B) = −`G
Substitute the formula for G and solve for B.
ik (A − B) = −`(A + B)
B = −− ik − ik A
The reflection coefficient can now be determined.
R =
( BA
) ( BA
)∗
=
( −− ik − ik
) ( −+ ik + ik
)
= `2 + k2
`2 + k2 = 1 Therefore, R + T = 1.
Case II: V0 − E = 0
d2ψdx 2 = − 2mV 0
ℏ2 ψ, x ≤ 0 d2ψdx 2 = 0 , x > 0In this case, the general solution on x > 0 is a straight line.
ψ(x) =
{
Ae ikx + Be −ikx if x ≤ 0
F x + G if x > 0Here
k =
√2mV 0
ℏ .
www.stemjock.com Griffiths Quantum Mechanics 3e: Problem 2.34 Page 5 of 7 In order to satisfy the boundary condition as x → ∞ , set F = 0 and G = 0.
ψ(x) =
{
Ae ikx + Be −ikx if x ≤ 00 if x > 0Use the continuity of the wave function and its first spatial derivative at x = 0 to determine two of the constants. lim
x→0−
ψ(x) = lim
x→0+
ψ(x) : A + B = 0 lim
x→0−
dψ dx = lim
x→0+
dψ dx : ik (A − B) = 0 These equations imply that A = 0 and B = 0, resulting in the trivial solution: ψ(x) = 0. Therefore, E = V0 is not an eigenvalue.
Case III: V0 − E < 0
d2ψdx 2 = − 2mE
ℏ2 ψ, x ≤ 0 d2ψdx 2 = − 2m
ℏ2 (E − V0)ψ, x > 0In this case, the general solution on x > 0 can be written in terms of complex exponential functions.
ψ(x) =
{
Ae ikx + Be −ikx if x ≤ 0
F e ilx + Ge −ilx if x > 0Here
k =
√2mE
ℏ and l =
√2m(E − V0)
ℏ .
Solving the ODE in t yields φ(t) = e−iEt/ ℏ, which means the product solution is a linear combination of waves travelling to the left and to the right.
ψ(x)φ(t) =
{
Ae i(kx −Et/ ℏ) + Be −i(kx +Et/ ℏ) if x ≤ 0
F e i(lx −Et/ ℏ) + Ge −i(lx +Et/ ℏ) if x > 0Assuming a plane wave is only incident from the left, set G = 0.
ψ(x) =
{
Ae ikx + Be −ikx if x ≤ 0
F e ilx if x > 0As a result, the reflection and transmission coefficients are
R =
∣∣∣∣∣
iℏ
2m
[(Be −ikx ) ddx (B∗eikx ) − (B∗eikx ) ddx (Be −ikx )]
iℏ
2m
[(Ae ikx ) ddx (A∗e−ikx ) − (A∗e−ikx ) ddx (Ae ikx )]∣∣∣∣∣ T =
∣∣∣∣∣
iℏ
2m
[(F e ilx ) ddx (F ∗e−ilx ) − (F ∗e−ilx ) ddx (F e ilx )]
iℏ
2m
[(Ae ikx ) ddx (A∗e−ikx ) − (A∗e−ikx ) ddx (Ae ikx )]∣∣∣∣∣
=
∣∣∣∣
(Be −ikx )( ikB ∗eikx ) − (B∗eikx )( −ikBe −ikx )(Ae ikx )( −ikA ∗e−ikx ) − (A∗e−ikx )( ikAe ikx )
∣∣∣∣ =
∣∣∣∣
(F e ilx )( −iF ∗e−ilx ) − (F ∗e−ilx )( iF e i`x )(Ae ikx )( −ikA ∗e−ikx ) − (A∗e−ikx )( ikAe ikx )
∣∣∣∣
=
∣∣∣∣
2ikBB ∗
−2ikAA ∗
∣∣∣∣ =
∣∣∣∣
−2ilF F ∗
−2ikAA ∗
∣∣∣∣
= |B|2
|A|2 = lk
|F |2
|A|2 =
√ E − V0
E
|F |2
|A|2 .
www.stemjock.com Griffiths Quantum Mechanics 3e: Problem 2.34 Page 6 of 7 To determine one of the constants, require the wave function [and consequently ψ(x)] to be continuous at x = 0. lim
x→0−
ψ(x) = lim
x→0+
ψ(x) : A + B = F
Integrate both sides of the TISE with respect to x from − to to determine one more.
ˆ
−
d2ψdx 2 dx =
ˆ
−
2m
ℏ2 [V (x) − E]ψ(x) dx dψ dx
∣∣∣∣
−
=
ˆ 0
−
2m
ℏ2 (−E)ψ(x) dx +
ˆ
0
2m
ℏ2 (V0 − E)ψ(x) dx
= − 2mE
ℏ2 ψ(0)
ˆ 0
−
dx + 2m
ℏ2 (V0 − E)ψ(0)
ˆ
0
dx
= − 2mE
ℏ2 ψ(0) + 2m
ℏ2 (V0 − E)ψ(0)
Take the limit as → 0.
dψ dx
∣∣∣∣
0+
0−
= 0 It turns out that ∂Ψ/∂x is continuous at x = 0 as well. lim
x→0−
dψ dx = lim
x→0+
dψ dx : ik (A − B) = ilF
To summarize, there are two equations to work with.
A + B = FA − B = lk F
Subtract the respective sides to get B.2B = F
(
1 − lk
)
Solve for B.
B = k − l
2k F
Add the respective sides to get A.2A = F
(
1 + lk
)
Solve for F .
F = 2kk + l A
www.stemjock.com Griffiths Quantum Mechanics 3e: Problem 2.34 Page 7 of 7 The transmission coefficient is then
T =
√ E − V0
E
|F |2
|A|2 =
√ E − V0
E
( FA
) ( FA
)∗
=
√ E − V0
E
( 2kk + l
) ( 2kk + l
)∗
=
√ E − V0
E
( 2kk + l
) ( 2kk + l
)
= 4
√ E − V0
E
(
11 + lk
) (
11 + lk
)
= 4
√ E − V0
E
11 +
√ E−V0
E
11 +
√ E−V0
E
= 4
√ E−V0
E
1 + 2
√ E−V0
E
E−V0
E
.
Combine the formulas for B and F .
B = k − l
2k F = k − l
2k
( 2kk + l A
)
= k − lk + l A
The reflection coefficient is then
R = |B|2
|A|2 =
( BA
) ( BA
)∗
=
( k − lk + l
) ( k − lk + l
)∗
=
( k − lk + l
) ( k − lk + l
)
=
( 1 − lk
1 + lk
) ( 1 − lk
1 + lk
)
=
1 −
√ E−V0
E
1 +
√ E−V0
E
1 −
√ E−V0
E
1 +
√ E−V0
E
= 1 − 2
√ E−V0
E
E−V0
E
1 + 2
√ E−V0
E
E−V0
E
.
Therefore,
R + T = 1 − 2
√ E−V0
E
E−V0
E
1 + 2
√ E−V0
E
E−V0
E
4
√ E−V0
E
1 + 2
√ E−V0
E
E−V0
E
= 1 + 2
√ E−V0
E
E−V0
E
1 + 2
√ E−V0
E
E−V0
E
= 1 .
www.stemjock.com |
10586 | https://mathworld.wolfram.com/MiceProblem.html | Mice Problem -- from Wolfram MathWorld
TOPICS
AlgebraApplied MathematicsCalculus and AnalysisDiscrete MathematicsFoundations of MathematicsGeometryHistory and TerminologyNumber TheoryProbability and StatisticsRecreational MathematicsTopologyAlphabetical IndexNew in MathWorld
Algebra
Rate Problems
Geometry
Curves
Plane Curves
Pursuit Curves
Geometry
Curves
Spirals
Geometry
Curves
Plane Curves
Involutes and Evolutes
History and Terminology
Disciplinary Terminology
Biological Terminology
Interactive Entries
Animated GIFs
More...Less...
Mice Problem
Download Wolfram Notebook
In the mice problem, also called the beetle problem, mice start at the corners of a regular -gon of unit side length, each heading towards its closest neighboring mouse in a counterclockwise direction at constant speed. The mice each trace out a logarithmic spiral, meet in the center of the polygon, and travel a distance
The first few values for , 3, ..., are
giving the numerical values 0.5, 0.666667, 1, 1.44721, 2, 2.65597, 3.41421, 4.27432, 5.23607, .... The curve formed by connecting the mice at regular intervals of time is an attractive figure called a whirl.
The problem is also variously known as the (three, four, etc.) (bug, dog, etc.) problem. It can be generalized to irregular polygons and mice traveling at differing speeds (Bernhart 1959). Miller (1871) considered three mice in general positions with speeds adjusted to keep paths similar and the triangle similar to the original.
See also
Apollonius Pursuit Problem, Brocard Points, Pursuit Curve, Spiral, Tractrix, Whirl
Explore with Wolfram|Alpha
More things to try:
circle involute
10^39
functional equation for zeta(s)
References
Bernhart, A. "Polygons of Pursuit." Scripta Math.24, 23-50, 1959.Brocard, H. "Solution of Lucas's Problem." Nouv. Corresp. Math.3, 280, 1877.Clapham, A.J. Rec. Math. Mag., Aug. 1962.Gardner, M. The Scientific American Book of Mathematical Puzzles and Diversions. New York: NY: Simon and Schuster, 1959.Gardner, M. The Sixth Book of Mathematical Games from Scientific American. Chicago, IL: University of Chicago Press, pp.240-243, 1984.Good, I.J. "Pursuit Curves and Mathematical Art." Math. Gaz.43, 34-35, 1959.Lucas, E. "Problem of the Three Dogs." Nouv. Corresp. Math.3, 175-176, 1877.Madachy, J.S. Madachy's Mathematical Recreations. New York: Dover, pp.201-204, 1979.Marshall, J.A.; Broucke, M.E.; and Francis, B.A. "Pursuit Formations of Unicycles." Automata41, 2005. R.K. Problem 16. Cambridge Math. Tripos Exam. January 5, 1871.Nester, D. "Mathematics Seminar: Beetle Centers of Triangles." H. Mathematical Snapshots, 3rd ed. New York: Dover, p.136, 1999.Wells, D. The Penguin Dictionary of Curious and Interesting Geometry. London: Penguin, pp.201-202, 1991.Wilson, J. "Problem: Four Dogs."
Referenced on Wolfram|Alpha
Mice Problem
Cite this as:
Weisstein, Eric W. "Mice Problem." From MathWorld--A Wolfram Resource.
Subject classifications
Algebra
Rate Problems
Geometry
Curves
Plane Curves
Pursuit Curves
Geometry
Curves
Spirals
Geometry
Curves
Plane Curves
Involutes and Evolutes
History and Terminology
Disciplinary Terminology
Biological Terminology
Interactive Entries
Animated GIFs
More...Less...
About MathWorld
MathWorld Classroom
Contribute
MathWorld Book
wolfram.com
13,278 Entries
Last Updated: Sun Sep 28 2025
©1999–2025 Wolfram Research, Inc.
Terms of Use
wolfram.com
Wolfram for Education
Created, developed and nurtured by Eric Weisstein at Wolfram Research
Created, developed and nurtured by Eric Weisstein at Wolfram Research |
10587 | https://www.statista.com/statistics/1031181/sulfur-production-globally-by-country/?srsltid=AfmBOopFfottVpCeA9VjTfgLZIk93DMYER5qN0NTHpudEPUJwqpnjgFt | Industry Overview
Market forecast and expert KPIs for 1000+ markets in 190+ countries & territories
Insights on consumer attitudes and behavior worldwide
Detailed information for 39,000+ online stores and marketplaces
Directly accessible data for 170 industries from 150+ countries and over 1 million facts:
Statista+ offers additional, data-driven services, tailored to your specific needs. As your partner for data-driven success, we combine expertise in research, strategy, and marketing communications.
Full-service market research and analytics
Strategy and business building for the data-driven economy
Transforming data into content marketing and design:
Statista R identifies and awards industry leaders, top providers, and exceptional brands through exclusive rankings and top lists in collaboration with renowned media brands worldwide.
For more details, visit our website.
See why Statista is the trusted choice for reliable data and insights. We provide one platform to simplify research and support your strategic decisions. Learn more
Expert resources to inform and inspire.
Global sulfur production volume 2024, by country
In 2024, China produced around 19 million metric tons of sulfur, making it by far the world's leading sulfur producer. Sulfur is one of the most common chemical elements found in nature. It is a pale yellow, tasteless, and odorless brittle solid commonly found in volcanic regions and hot springs. Nowadays very little sulfur is mined from nature, as most of the production is recovered due to environmental reasons. Byproduct elemental sulfur recovered from natural gas and petroleum is the main source of sulfur worldwide.
Sulfur in the U.S.
The United States is the second-largest producer of sulfur worldwide, ahead of Saudi Arabia and Russia. In 2024, sulfur production in the U.S. reached an estimated 8.2 million metric tons. From that amount, roughly 91 percent was recovered elemental sulfur. Apart from being one of the world's main sulfur producers, the United States’ sulfur consumption is also among the highest in the world, reaching nearly 10 million metric tons in 2023.
Global sulfuric acid market
Most of the sulfur produced worldwide is transformed into sulfuric acid, an important commodity chemical with many applications. Sulfuric acid is extensively used as a battery component, in fertilizer manufacturing, metal ore leaching, and as an intermediate chemical in the production of numerous other compounds. In 2022, the global market volume of sulfuric acid amounted to around 265 million metric tons, and it is forecast to surpass 321 million metric tons by 2030. By that same year, the market value of sulfuric acid is expected to surpass 14 billion U.S. dollars.
Production of sulfur worldwide in 2024, by country (in 1,000 metric tons)
| Characteristic | Production in thousand metric tons |
--- |
| China | 19,000 |
| United States | 8,200 |
| Saudi Arabia | 7,500 |
| Russia | 7,500 |
| United Arab Emirates | 6,000 |
| Kazakhstan | 5,100 |
| Canada | 5,000 |
| India | 3,700 |
| Japan | 3,100 |
| South Korea | 3,100 |
| Qatar | 3,100 |
| Iran | 2,000 |
| Chile | 1,300 |
| Kuwait | 1,300 |
| Poland | 1,100 |
| Australia | 900 |
| Turkmenistan | 900 |
| Rest of world | 6,400 |
Additional Information
Show sources information
Show publisher information
Use Ask Statista Research Service
February 2025
Worldwide
2024
Chinese sulfur production includes byproduct elemental sulfur that has been recovered from petroleum and natural gas, as well as the estimated sulfur content of byproduct sulfuric acid from metallurgy, and the sulfur content of sulfuric acid from pyrite.
All figures are estimates.
Other statistics on the topic
Production volume of sulfuric acid China 2014-2024
Major chemicals production volume in India FY 2013-2024
Production volume of soda ash in China 2014-2024
Production volume of caustic soda China 2014-2024
For commercial use only
Basic Account
Starter Account
Professional Account
1
All prices do not include sales tax. The account requires an annual contract and will renew after one year to the regular list price.
Other statistics that may interest you
Other statistics that may interest you Statistics on
About the industry
About the region
Other regions
Related statistics
Further Content: You might find this interesting as well
Topics
For commercial use only
Basic Account
Starter Account
Professional Account
1
All prices do not include sales tax. The account requires an annual contract and will renew after one year to the regular list price. |
10588 | https://www.ebi.ac.uk/ols4/ontologies/ncit/classes/http%253A%252F%252Fpurl.obolibrary.org%252Fobo%252FNCIT_C34309?lang=en | NCIT:C34309
Home Ontologies API Docs MCP Server About Downloads
Ontologies▸ncit▸classes▸NCIT:C34309 Copy
Surface Ectoderm
Copy
Definition:
The outermost part of the ectoderm, making it the most superficial of three primary germ layers in the early embryo. It differentiates to form the epidermis and its appendages, the stratified epithelia, the cells that form the lens and cornea of the eye, and the dental enamel.
Exact Synonyms
Surface Ectoderm
Search
[x] Exact match - [x] Include obsolete terms - [x] Include imported terms
Tree
Graph
Anatomic Structure, System, or Substance (7,613)
Embryonic Structure or System (305)
Embryonic Structure (49)
Embryonic Tissue (16)
Germinal Layer (8)
Ectoderm (2)
Surface Ectoderm
Tissue (529)
Embryonic Tissue (16)
Germinal Layer (8)
Ectoderm (2)
Surface Ectoderm
[x] Show counts - [x] Show obsolete terms - [x] Show all siblings
class Information
code
C34309
Legacy Concept Name
Surface_Ectoderm
Preferred_Name
Surface Ectoderm
Semantic_Type
Embryonic Structure
UMLS_CUI
C1515087
class Relations
Subclass of
Ectoderm
Similar classes
Similar entities
Ectoderm ncit
ectoderm uberon
external ectoderm uberon
surface ectodermal cell cl
Ectoderm Cell ncit
ectoderm ncro
ectoderm bto
ectoderm clao
ectoderm ecao
ectoderm xao
ectoderm zfa
ectoderm fbbt
head surface ectoderm emapa
Surface ectoderm fma
surface ectoderm emapa
epidermis clao
epidermis ecao
primitive ectoderm surface plana
primitive ectoderm plana
Similarity results are derived from LLM embeddings and have not been manually curated. Model: text-embedding-3-small
Follow us
X
EMBL-EBI 2023Licensing |
10589 | https://courses.lumenlearning.com/calculus2/chapter/graphs-and-symmetry-of-polar-curves/ | Graphs and Symmetry of Polar Curves | Calculus II
Skip to main content
Calculus II
Module 7: Parametric Equations and Polar Coordinates
Search for:
Graphs and Symmetry of Polar Curves
Learning Outcomes
Sketch polar curves from given equations
Convert equations between rectangular and polar coordinates
Identify symmetry in polar curves and equations
Polar Curves
Now that we know how to plot points in the polar coordinate system, we can discuss how to plot curves. In the rectangular coordinate system, we can graph a function y=f(x)y=f(x) and create a curve in the Cartesian plane. In a similar fashion, we can graph a curve that is generated by a function r=f(θ)r=f(θ).
The general idea behind graphing a function in polar coordinates is the same as graphing a function in rectangular coordinates. Start with a list of values for the independent variable (θ θ in this case) and calculate the corresponding values of the dependent variable r r. This process generates a list of ordered pairs, which can be plotted in the polar coordinate system. Finally, connect the points, and take advantage of any patterns that may appear. The function may be periodic, for example, which indicates that only a limited number of values for the independent variable are needed.
Problem-Solving Strategy: Plotting a Curve in Polar Coordinates
Create a table with two columns. The first column is for θ θ, and the second column is for r r.
Create a list of values for θ θ.
Calculate the corresponding r r values for each θ θ.
Plot each ordered pair (r,θ)(r,θ) on the coordinate axes.
Connect the points and look for a pattern.
Interactive
Watch this video for more information on sketching polar curves.
Example: Graphing a Function in Polar Coordinates
Graph the curve defined by the function r=4 sin θ r=4 sinθ. Identify the curve and rewrite the equation in rectangular coordinates.
Show Solution
Because the function is a multiple of a sine function, it is periodic with period 2 π 2 π, so use values for θ θ between 0 and 2 π 2 π. The result of steps 1–3 appear in the following table. Figure 5 shows the graph based on this table.
| θ θ | r=4 sin θ r=4 sinθ | | θ θ | r=4 sin θ r=4 sinθ |
--- ---
| 0 0 | 0 0 | | π π | 0 0 |
| π 6 π 6 | 2 2 | 7 π 6 7 π 6 | −2−2 |
| π 4 π 4 | 2√2≈2.8 2 2≈2.8 | 5 π 4 5 π 4 | −2√2≈−2.8−2 2≈−2.8 |
| π 3 π 3 | 2√3≈3.4 2 3≈3.4 | 4 π 3 4 π 3 | −2√3≈−3.4−2 3≈−3.4 |
| π 2 π 2 | 4 4 | 3 π 2 3 π 2 | 4 4 |
| 2 π 3 2 π 3 | 2√3≈3.4 2 3≈3.4 | 5 π 3 5 π 3 | −2√3≈−3.4−2 3≈−3.4 |
| 3 π 4 3 π 4 | 2√2≈2.8 2 2≈2.8 | 7 π 4 7 π 4 | −2√2≈−2.8−2 2≈−2.8 |
| 5 π 6 5 π 6 | 2 2 | 11 π 6 11 π 6 | −2−2 |
| | | 2 π 2 π | 0 0 |
Figure 5. The graph of the function r=4 sin θ r=4 sinθ is a circle.
This is the graph of a circle. The equation r=4 sin θ r=4 sinθ can be converted into rectangular coordinates by first multiplying both sides by r r. This gives the equation r 2=4 r sin θ r 2=4 r sinθ. Next use the facts that r 2=x 2+y 2 r 2=x 2+y 2 and y=r sin θ y=r sinθ. This gives x 2+y 2=4 y x 2+y 2=4 y. To put this equation into standard form, subtract 4 y 4 y from both sides of the equation and complete the square:
x 2+y 2−4 y=0 x 2+(y 2−4 y)=0 x 2+(y 2−4 y+4)=0+4 x 2+(y−2)2=4.x 2+y 2−4 y=0 x 2+(y 2−4 y)=0 x 2+(y 2−4 y+4)=0+4 x 2+(y−2)2=4.
This is the equation of a circle with radius 2 and center (0,2)(0,2) in the rectangular coordinate system.
Watch the following video to see the worked solution to Example: Graphing a Function in Polar Coordinates.
For closed captioning, open the video on its original page by clicking the Youtube logo in the lower right-hand corner of the video display. In YouTube, the video will begin at the same starting point as this clip, but will continue playing until the very end.
You can view the transcript for this segmented clip of “7.3 Polar Coordinates” here (opens in new window).
try it
Create a graph of the curve defined by the function r=4+4 cos θ r=4+4 cosθ.
Hint
Follow the problem-solving strategy for creating a graph in polar coordinates.
Show Solution
Figure 6.
The name of this shape is a cardioid, which we will study further later in this section.
The graph in the previous example was that of a circle. The equation of the circle can be transformed into rectangular coordinates using the coordinate transformation formulas in the theorem. The example after the next gives some more examples of functions for transforming from polar to rectangular coordinates.
Example: Transforming Polar Equations to Rectangular Coordinates
Rewrite each of the following equations in rectangular coordinates and identify the graph.
θ=π 3 θ=π 3
r=3 r=3
r=6 cos θ−8 sin θ r=6 cosθ−8 sinθ
Show Solution
Take the tangent of both sides. This gives tan θ=tan(π 3)=√3 tanθ=tan(π 3)=3. Since tan θ=y x tanθ=y x we can replace the left-hand side of this equation by y x y x. This gives y x=√3 y x=3, which can be rewritten as y=x√3 y=x 3. This is the equation of a straight line passing through the origin with slope √3 3. In general, any polar equation of the form θ=K θ=K represents a straight line through the pole with slope equal to tan K tanK.
First, square both sides of the equation. This gives r 2=9 r 2=9. Next replace r 2 r 2 with x 2+y 2 x 2+y 2. This gives the equation x 2+y 2=9 x 2+y 2=9, which is the equation of a circle centered at the origin with radius 3. In general, any polar equation of the form r=k r=k where k is a positive constant represents a circle of radius k centered at the origin. (Note: when squaring both sides of an equation it is possible to introduce new points unintentionally. This should always be taken into consideration. However, in this case we do not introduce new points. For example, (−3,π 3)(−3,π 3) is the same point as (3,4 π 3)(3,4 π 3).)
Multiply both sides of the equation by r r. This leads to r 2=6 r cos θ−8 r sin θ r 2=6 r cosθ−8 r sinθ. Next use the formulas
r 2=x 2+y 2,x=r cos θ,y=r sin θ r 2=x 2+y 2,x=r cosθ,y=r sinθ.
This gives
r 2=6(r cos θ)−8(r sin θ)x 2+y 2=6 x−8 y.r 2=6(r cosθ)−8(r sinθ)x 2+y 2=6 x−8 y.
To put this equation into standard form, first move the variables from the right-hand side of the equation to the left-hand side, then complete the square.
x 2+y 2=6 x−8 y x 2−6 x+y 2+8 y=0(x 2−6 x)+(y 2+8 y)=0(x 2−6 x+9)+(y 2+8 y+16)=9+16(x−3)2+(y+4)2=25.x 2+y 2=6 x−8 y x 2−6 x+y 2+8 y=0(x 2−6 x)+(y 2+8 y)=0(x 2−6 x+9)+(y 2+8 y+16)=9+16(x−3)2+(y+4)2=25.
This is the equation of a circle with center at (3,−4)(3,−4) and radius 5. Notice that the circle passes through the origin since the center is 5 units away.
Watch the following video to see the worked solution to Example: Transforming Polar Equations to Rectangular Coordinates.
For closed captioning, open the video on its original page by clicking the Youtube logo in the lower right-hand corner of the video display. In YouTube, the video will begin at the same starting point as this clip, but will continue playing until the very end.
You can view the transcript for this segmented clip of “7.3 Polar Coordinates” here (opens in new window).
try it
Rewrite the equation r=sec θ tan θ r=secθ tanθ in rectangular coordinates and identify its graph.
Hint
Convert to sine and cosine, then multiply both sides by cosine.
Show Solution
y=x 2 y=x 2, which is the equation of a parabola opening upward.
We have now seen several examples of drawing graphs of curves defined by polar equations. A summary of some common curves is given in the tables below. In each equation, a and b are arbitrary constants.
Figure 7.
Figure 8.
A cardioidis a special case of a limaçon (pronounced “lee-mah-son”), in which a=b a=b or a=−b a=−b. The rose is a very interesting curve. Notice that the graph of r=3 sin 2 θ r=3 sin2 θ has four petals. However, the graph of r=3 sin 3 θ r=3 sin3 θ has three petals as shown.
Figure 9. Graph of r=3 sin 3 θ r=3 sin3 θ.
If the coefficient of θ θ is even, the graph has twice as many petals as the coefficient. If the coefficient of θ θ is odd, then the number of petals equals the coefficient. You are encouraged to explore why this happens. Even more interesting graphs emerge when the coefficient of θ θ is not an integer. For example, if it is rational, then the curve is closed; that is, it eventually ends where it started (Figure 10 (a)). However, if the coefficient is irrational, then the curve never closes (Figure 10 (b)). Although it may appear that the curve is closed, a closer examination reveals that the petals just above the positive x axis are slightly thicker. This is because the petal does not quite match up with the starting point.
Figure 10. Polar rose graphs of functions with (a) rational coefficient and (b) irrational coefficient. Note that the rose in part (b) would actually fill the entire circle if plotted in full.
Since the curve defined by the graph of r=3 sin(π θ)r=3 sin(π θ) never closes, the curve depicted in Figure 10 (b) is only a partial depiction. In fact, this is an example of a space-filling curve. A space-filling curve is one that in fact occupies a two-dimensional subset of the real plane. In this case the curve occupies the circle of radius 3 centered at the origin.
Suppose a curve is described in the polar coordinate system via the function r=f(θ)r=f(θ). Since we have conversion formulas from polar to rectangular coordinates given by
x=r cos θ y=r sin θ,x=r cosθ y=r sinθ,
it is possible to rewrite these formulas using the function
x=f(θ)cos θ y=f(θ)sin θ.x=f(θ)cosθ y=f(θ)sinθ.
This step gives a parameterization of the curve in rectangular coordinates using θ θ as the parameter. For example, the spiral formula r=a+b θ r=a+b θ from Figure 7 becomes
x=(a+b θ)cos θ y=(a+b θ)sin θ.x=(a+b θ)cosθ y=(a+b θ)sinθ.
Letting θ θ range from −∞−∞ to ∞∞ generates the entire spiral.
Try It
Symmetry in Polar Coordinates
When studying symmetry of functions in rectangular coordinates (i.e., in the form y=f(x)y=f(x)), we talk about symmetry with respect to the y-axis and symmetry with respect to the origin. In particular, if f(−x)=f(x)f(−x)=f(x) for all x x in the domain of f f, then f f is an even function and its graph is symmetric with respect to the y y-axis. If f(−x)=−f(x)f(−x)=−f(x) for all x x in the domain of f f, then f f is an odd function and its graph is symmetric with respect to the origin. By determining which types of symmetry a graph exhibits, we can learn more about the shape and appearance of the graph. Symmetry can also reveal other properties of the function that generates the graph. Symmetry in polar curves works in a similar fashion.
theorem: Symmetry in Polar Curves and Equations
Consider a curve generated by the function r=f(θ)r=f(θ) in polar coordinates.
The curve is symmetric about the polar axis if for every point (r,θ)(r,θ) on the graph, the point (r,−θ)(r,−θ) is also on the graph. Similarly, the equation r=f(θ)r=f(θ) is unchanged by replacing θ θ with −θ−θ.
The curve is symmetric about the pole if for every point (r,θ)(r,θ) on the graph, the point (r,π+θ)(r,π+θ) is also on the graph. Similarly, the equation r=f(θ)r=f(θ) is unchanged when replacing r r with −r−r, or θ θ with π+θ π+θ.
The curve is symmetric about the vertical line θ=π 2 θ=π 2 if for every point (r,θ)(r,θ) on the graph, the point (r,π−θ)(r,π−θ) is also on the graph. Similarly, the equation r=f(θ)r=f(θ) is unchanged when θ θ is replaced by π−θ π−θ.
The following table shows examples of each type of symmetry.
Figure 11.
Example: using Symmetry to Graph a Polar Equation
Find the symmetry of the rose defined by the equation r=3 sin(2 θ)r=3 sin(2 θ) and create a graph.
Show Solution
Suppose the point (r,θ)(r,θ) is on the graph of r=3 sin(2 θ)r=3 sin(2 θ).
To test for symmetry about the polar axis, first try replacing θ θ with −θ−θ. This gives r=3 sin(2(−θ))=−3 sin(2 θ)r=3 sin(2(−θ))=−3 sin(2 θ). Since this changes the original equation, this test is not satisfied. However, returning to the original equation and replacing r r with −r−r and θ θ with π−θ π−θ yields
−r=3 sin(2(π−θ))−r=3 sin(2 π−2 θ)−r=3 sin(−2 θ)−r=−3 sin 2 θ.−r=3 sin(2(π−θ))−r=3 sin(2 π−2 θ)−r=3 sin(−2 θ)−r=−3 sin2 θ.
Multiplying both sides of this equation by −1−1 gives r=3 sin 2 θ r=3 sin2 θ, which is the original equation. This demonstrates that the graph is symmetric with respect to the polar axis.
To test for symmetry with respect to the pole, first replace r r with −r−r, which yields −r=3 sin(2 θ)−r=3 sin(2 θ). Multiplying both sides by −1 gives r=−3 sin(2 θ)r=−3 sin(2 θ), which does not agree with the original equation. Therefore the equation does not pass the test for this symmetry. However, returning to the original equation and replacing θ θ with θ+π θ+π gives
r=3 sin(2(θ+π))=3 sin(2 θ+2 π)=3(sin 2 θ cos 2 π+cos 2 θ sin 2 π)=3 sin 2 θ.r=3 sin(2(θ+π))=3 sin(2 θ+2 π)=3(sin2 θ cos2 π+cos2 θ sin2 π)=3 sin2 θ.
Since this agrees with the original equation, the graph is symmetric about the pole.
To test for symmetry with respect to the vertical line θ=π 2 θ=π 2, first replace both r r with −r−r and θ θ with −θ−θ.
−r=3 sin(2(−θ))−r=3 sin(−2 θ)−r=−3 sin 2 θ.−r=3 sin(2(−θ))−r=3 sin(−2 θ)−r=−3 sin2 θ.
Multiplying both sides of this equation by −1−1 gives r=3 sin 2 θ r=3 sin2 θ, which is the original equation. Therefore the graph is symmetric about the vertical line θ=π 2 θ=π 2.
This graph has symmetry with respect to the polar axis, the origin, and the vertical line going through the pole. To graph the function, tabulate values of θ θ between 0 and π 2 π 2 and then reflect the resulting graph.
| θ θ | r r |
--- |
| 0 0 | 0 0 |
| π 6 π 6 | 3√3 2≈2.6 3 3 2≈2.6 |
| π 4 π 4 | 3 3 |
| π 3 π 3 | 3√3 2≈2.6 3 3 2≈2.6 |
| π 2 π 2 | 0 0 |
This gives one petal of the rose, as shown in the following graph.
Figure 12. The graph of the equation between θ=0 θ=0 and θ=π 2 θ=π 2.
Reflecting this image into the other three quadrants gives the entire graph as shown.
Figure 13. The entire graph of the equation is called a four-petaled rose.
Watch the following video to see the worked solution to Example: using Symmetry to Graph a Polar Equation.
For closed captioning, open the video on its original page by clicking the Youtube logo in the lower right-hand corner of the video display. In YouTube, the video will begin at the same starting point as this clip, but will continue playing until the very end.
You can view the transcript for this segmented clip of “7.3 Polar Coordinates” here (opens in new window).
try it
Determine the symmetry of the graph determined by the equation r=2 cos(3 θ)r=2 cos(3 θ) and create a graph.
Hint
Use the theorem.
Show Solution
Symmetric with respect to the polar axis.
Figure 14.
Try It
Candela Citations
CC licensed content, Original
7.3 Polar Coordinates. Authored by: Ryan Melton. License: CC BY: Attribution
CC licensed content, Shared previously
Calculus Volume 2. Authored by: Gilbert Strang, Edwin (Jed) Herman. Provided by: OpenStax. Located at: License: CC BY-NC-SA: Attribution-NonCommercial-ShareAlike. License Terms: Access for free at
Licenses and Attributions
CC licensed content, Original
7.3 Polar Coordinates. Authored by: Ryan Melton. License: CC BY: Attribution
CC licensed content, Shared previously
Calculus Volume 2. Authored by: Gilbert Strang, Edwin (Jed) Herman. Provided by: OpenStax. Located at: License: CC BY-NC-SA: Attribution-NonCommercial-ShareAlike. License Terms: Access for free at
PreviousNext
Privacy Policy |
10590 | https://kids.britannica.com/students/article/Himalayas/274884 | Himalayas
View article for:
Kids
Students
Scholars
Subscriber features
Subscriber features
Print (Subscriber Feature)
Email (Subscriber Feature)
Cite (Subscriber Feature)
Translate (Subscriber Feature)
Listen (Subscriber Feature)
Did You Know?
Because they can tolerate high altitudes, yaks are used as work animals in parts of the Himalayas.
Related resources for this article
Articles
Primary Sources & E-Books
Websites
View search results for:
Introduction
The highest mountain range on Earth, the Himalayas form the northern border of the Indian subcontinent in Asia. The mountains extend in a massive arc for about 1,550 miles (2,500 kilometers) from west to east with more than 30 peaks rising to heights greater than 24,000 feet (7,300 meters) above sea level. These include Mount Everest, the world’s highest peak at 29,032 feet (8,849 meters), Kanchenjunga at 28,169 feet (8,586 meters), Makalu at 27,766 feet (8,463 meters), and Dhaulagiri at 26,795 feet (8,167 meters).
Several Indian states and the kingdoms of Nepal and Bhutan lie along the southern slopes of the Himalayas, and the Tibetan Highlands border them in the north. The width of the mountain system varies from 125 to 250 miles (200 to 400 kilometers) from south to north, and the average height is 20,000 feet (6,100 meters). The Himalayas extend over about 229,500 square miles (594,400 square kilometers). India, Nepal, and Bhutan have sovereignty over most of them; Pakistan and China also occupy parts.
The Sanskrit name Himalayas, meaning “abode of snow,” truly characterizes the vast permanent snowfields above the snow line. These mountains pose the greatest challenge in the world to mountaineers.
Physical Characteristics
The most characteristic features of the Himalayas are their great height, complex geologic structure, snowcapped peaks, large valley glaciers, deep river gorges, and rich vegetation. From south to north the Himalayan ranges can be grouped into four parallel belts of varying width—these are the Outer, or Sub-, Himalayas; the Lesser, or Lower, Himalayas; the Great, or Higher, Himalayas; and the Tethys, or Tibetan, Himalayas. The Karakoram Range in the northwest is also sometimes considered part of the Himalayan system. The mountains can be divided broadly into three regions. The backbone of the system is the Great Himalayas, a single range rising above the snow line with nine of the 14 highest peaks in the world, including Mount Everest.
Geologically the Himalayas are relatively young folded mountains and are still undergoing the mountain-building process. Precambrian metamorphic rocks—rocks formed by heat and pressure from 4.6 billion to 570 million years ago—make up much of the structure. The uplift took place in at least three phases. The first phase occurred at the close of the Eocene epoch (about 33 million years ago) when the Great and Tethys Himalayas were uplifted. In the second phase, which occurred in the Miocene epoch (approximately 23 million to 5.3 million years ago), ranges of the Lesser Himalayas were formed. The final mountain-building phase started in the late Neogene period (about 7 million years ago) when the Siwalik Range, the foothills of the Outer Himalayas, were formed.
The Himalayas act as a great divide and influence the climatic conditions of the Indian subcontinent to the south and of the Central Asian highland to the north. The winter season lasts from October to February, the summer from March to June, and the rainy season from June to September. Climate varies considerably with altitude; the snow line generally lies at about 16,000 feet (4,900 meters) in the Great Himalayas. The annual and daily temperature variation is much greater in the foothills.
The mountain ranges obstruct the cold, dry air from the north into India in winter. They also force the monsoonal winds to give up moisture, causing heavy rain and snow on the Indian side but arid conditions in Tibet. Rainfall decreases from east to west—120 to 60 inches (300 to 150 centimeters). Cherrapunji in Meghalaya state in northeastern India is noted for the world’s second highest average annual rainfall of 450 inches (1,140 centimeters).
The Himalayas are drained by 19 major rivers, of which the Indus and the Brahmaputra are the largest. The Jhelum, Chenab, Ravi, Beas, and Sutlej belong to the Indus system; the Yamuna, Ramganga, Kali, Gandak, and Kosi are part of the Ganges system; and the Tista, Raidak, and Manas belong to the Brahmaputra system. Rivers are more numerous and extensive on the southern slopes of the Himalayas and have great potential for producing hydroelectric power. The Bhakra Nangal multipurpose river-valley project, located on the Sutlej River, is one of the most extensive in India. Such major rivers as the Indus, Sutlej, and Brahmaputra have narrow and deep upper valleys that are older than the mountains themselves. Glaciers cover more than 12,700 square miles (32,900 square kilometers). One of the largest is Gangotri glacier in northern India—20 miles (32 kilometers) long. Glaciers feed most of the upper courses of the rivers, while the middle and lower courses are fed by rain. There are several freshwater lakes as well.
Plants and Animals
There is great variation in the Himalayan soils. The dark brown soils are well suited for growing fruit trees. The wet, deep, upland soils with high humus content—especially in the Darjeeling and Assam hills—are good for growing tea. Himalayan vegetation is based on altitude and rainfall and can be classified into four groups: tropical evergreen forests of rose chestnut, bamboo, alder, pine, laurel, and palm up to about 3,940 feet (1,200 meters); subtropical deciduous forest with sal, oak, and magnolia up to 7,220 feet (2,200 meters); temperate forests of cedar, birch, hazel, maple, and spruce from 7,220 to 8,860 feet (2,200 to 2,700 meters); and the alpine zone with juniper, rhododendron, mosses, lichens, and several kinds of flowering plants from 8,860 to 11,800 feet (2,700 to 3,600 meters). Alpine meadows are found up to 16,400 feet (5,000 meters).
Elephants, bison, and rhinoceroses inhabit the forested lower slopes of the Outer Himalayas. Snow leopards, brown bears, red pandas, and Tibetan yaks are found above the tree line—above 10,000 feet (3,050 meters). Black bears, langur monkeys, clouded leopards, and goat antelopes live in the foothills. Several animal species, such as the Indian rhinoceros, musk deer, and Kashmir stag, or hangul, were at the point of extinction but are now protected in several national parks and sanctuaries in India. There are catfish in most Himalayan streams, and butterflies are extremely varied and beautiful.
People and Economy
The people who inhabit the Great and the Tethys Himalayas are primarily of Tibeto-Burman descent, while the Lesser Himalayas are populated by people who trace their roots to Indo-European ancestors. The Gaddis are a hill people who herd sheep and goats. During winter they descend to the lowlands in search of food for their herds, but in summer they return to the higher pastures. The Gujars are also a migrating pastoral people. The major ethnic groups of Nepal are the Newars, Tamangs, Gurangs, Sherpas, and Gurkhas. The Sherpas, who live to the south of Mount Everest, are famous mountaineers. Major Himalayan summer resorts are at Almora, Darjeeling, Mussoorie, Naini Tal, Shimla, and Srinagar in India as well as Murree in Pakistan.
Economic resources abound in the Himalayas, including rich arable land, extensive grasslands and forests, workable mineral deposits, and tremendous potential for easily harnessed hydroelectric power. Terraced cultivation is carried on as high as 8,200 feet (2,500 meters). Rice, corn, wheat, millet, jute, sugarcane, and oilseeds are the major crops. Most of the fruit orchards—producing apples, peaches, pears, and cherries—are in the Kashmir and the Kulu valleys. Rich vineyards on the shores of Dal Lake in Kashmir produce grapes of good quality. Saffron, walnuts, and almonds are also grown in the Vale of Kashmir. Tea gardens abound in the foothills of the Darjeeling district. There are also plantations of cardamom and medicinal herbs. Sheep, goats, and yaks are raised on the rough grazing lands.
Mineral deposits include coal, bauxite, mica, gypsum, sapphires, petroleum, natural gas, chromite, copper, iron ore, borax, sulfur, graphite, lead, and zinc. Some alluvial gold is found in the Indus valley.
Poor transportation facilities in the Himalayas have acted as a barrier to economic growth. Only in the late 20th century were highways constructed to make the Himalayan region accessible from both north and south. Kathmandu, the capital of Nepal, has an international airport. Srinagar, the summer capital of the Indian-controlled part of Kashmir, has a domestic airport. There are only two narrow-gauge railroads from the northern plains of India into the Lesser Himalayas—one from Kalka to Shimla and the other from Shiliguri to Darjeeling.
The Himalayas were mapped for the first time in 1590 by a Spanish missionary to the court of the Mughal emperor Akbar. The heights of the Himalayan peaks were first measured correctly in the middle of the 19th century. It was not realized until 1856 that Mount Everest is higher than any other peak in the world. Modern maps of the Himalayas have been prepared by Indian and German geographers and cartographers.
It’s here: the NEW Britannica Kids website!
We’ve been busy, working hard to bring you new features and an updated design. We hope you and your family enjoy the NEW Britannica Kids. Take a minute to check out all the enhancements!
The same safe and trusted content for explorers of all ages.
Accessible across all of today's devices: phones, tablets, and desktops.
Improved homework resources designed to support a variety of curriculum subjects and standards.
A new, third level of content, designed specially to meet the advanced needs of the sophisticated scholar.
And so much more!
Want to see it in action?
Take a tour
Start a free trial
Subscribe now! |
10591 | https://www.ck12.org/flexi/chemistry/electrochemical-reaction/how-do-you-calculate-n-in-electrochemistry/ | Flexi answers - How do you calculate n in electrochemistry? | CK-12 Foundation
Subjects Explore
Donate
Sign InSign Up
All Subjects
Chemistry
Electrochemical Reaction
Question
How do you calculate n in electrochemistry?
Flexi Says:
In electrochemistry, "n" refers to the number of electrons transferred in a redox reaction. To calculate "n", you need to balance the redox reaction and determine the change in oxidation states of the elements involved in the reaction. The difference in oxidation states from reactants to products gives you the number of electrons transferred, which is "n".
Practice this conceptAnalogy / Example
Try Asking:
How do you calculate emf in electrochemistry?What measures can be taken to avoid salt bridge in water softeners?Do electrolytic cells have salt bridges?
How can Flexi help?
By messaging Flexi, you agree to our Terms and Privacy Policy |
10592 | https://ell.stackexchange.com/questions/107732/when-do-i-say-food-or-foods | singular vs plural - When do I say "food" or "foods"? - English Language Learners Stack Exchange
Join English Language Learners
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
English Language Learners helpchat
English Language Learners Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
When do I say "food" or "foods"?
Ask Question
Asked 8 years, 11 months ago
Modified4 years, 1 month ago
Viewed 19k times
This question shows research effort; it is useful and clear
5
Save this question.
Show activity on this post.
As I have read that the noun "food" is generally uncountable, I am not quite sure when I should use "food" as a countable noun.
For instance,
Chicken and rice are food
or
Chicken and rice are foods
Could I use a number in front of foods?
Chicken and rice are two foods?
Should we use food or foods here?
singular-vs-plural
nouns
uncountable-nouns
Share
Share a link to this question
Copy linkCC BY-SA 3.0
Improve this question
Follow
Follow this question to receive notifications
edited Aug 12, 2021 at 13:25
ColleenV
12.4k 13 13 gold badges 50 50 silver badges 89 89 bronze badges
asked Oct 28, 2016 at 3:09
VinceVince
705 5 5 gold badges 12 12 silver badges 19 19 bronze badges
3
8 "Food" is always a mass noun except when it means "kinds of food". So: "High carb foods", "Gluten-free foods." "Chicken and rice are food", but ""Chicken and rice are nutritious foods".P. E. Dant Reinstate Monica –P. E. Dant Reinstate Monica 2016-10-28 03:20:05 +00:00 Commented Oct 28, 2016 at 3:20
1 @P.E.Dant you should make your comment into an answer. It's +1 from me, if you do.Mari-Lou A –Mari-Lou A♦ 2016-10-28 11:24:09 +00:00 Commented Oct 28, 2016 at 11:24
@P.E.Dant your comment has five upvotes. Please, just copy your comment in an answer.Mari-Lou A –Mari-Lou A♦ 2016-10-29 07:29:22 +00:00 Commented Oct 29, 2016 at 7:29
Add a comment|
2 Answers 2
Sorted by: Reset to default
This answer is useful
3
Save this answer.
Show activity on this post.
It depends on what you mean.
Chicken and rice are food.
Chicken and rice are members of the category 'food'. They are stuff you can eat.
Chickens and rice are food.
This is the same thing, but referring to the natural state of chickens as individual animals and (by analogy) to rice as a plant. These things, which you can find in nature, can be eaten.
Chicken and rice are foods.
Both chicken and rice are kinds of food. Either one, taken separately, is a kind of stuff you can eat.
Chicken and rice are two foods.
This is the same thing, emphasizing that these are just two options out of a larger category.
Chickens and rice are foods.
Chicken and rice are two food.
These are just wrong. 'Chickens' are not a foodstuff but the animals themselves; they are not a kind of food but a source of it. Uncountable nouns are definitionally not able to be counted.
When to use them depends on the categories you're talking about.
Chickens are (for most people) food but (for everyone) they are an animal and not a subcategory of foodstuff (i.e., a food); chicken and rice are both food and kinds of food (i.e., foods); chicken and rice can be Vietnamese food but are not kinds of Vietnamese food (i.e., foods); com chien and banh tet are kinds of Vietnamese food (i.e., foods).
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Improve this answer
Follow
Follow this answer to receive notifications
answered Jun 15, 2018 at 20:58
llylly
4,910 1 1 gold badge 18 18 silver badges 25 25 bronze badges
Add a comment|
This answer is useful
1
Save this answer.
Show activity on this post.
"Food" is always a mass noun, except when used to mean "kinds of food." For example:
Baby foods – the varieties of food eaten by babies.
Gluten-free foods – varieties of food that do not contain gluten.
Processed foods – ready-to-eat or pre-prepared food, often less healthy.
See also this definition, with examples, from Oxford Dictionaries.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Improve this answer
Follow
Follow this answer to receive notifications
answered Nov 3, 2016 at 17:37
community wiki
LMS
2
By the way, is it foods is in such case or foods are?SovereignSun –SovereignSun 2016-11-03 18:27:21 +00:00 Commented Nov 3, 2016 at 18:27
1 @SovereignSun: "Foods are," as it's a plurality of varieties/types/kinds of food – Gluten-free foods are fruit, vegetables, potatoes, and fish, among others. LMS –LMS 2016-11-04 16:15:06 +00:00 Commented Nov 4, 2016 at 16:15
Add a comment|
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
singular-vs-plural
nouns
uncountable-nouns
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Linked
-1three foods & three pieces of food
Related
2When should I use "difference" or "differences"?
4When to use "justifications" (plural)?
0Is it wrong to say "I ate 2 roast chickens"?
5How to use a word when its meaning is both countable & uncountable?
3When to use the uncountable form of a noun?
0"Dogs are a type of animal"
1Is the word "foods" countable or uncountable?
0"food vs foods" and "clothing vs clothes"?
2What type of nouns are 'cattle', 'staff' and 'jeans'?
Hot Network Questions
How different is Roman Latin?
With line sustain pedal markings, do I release the pedal at the beginning or end of the last note?
What’s the usual way to apply for a Saudi business visa from the UAE?
If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church?
What's the expectation around asking to be invited to invitation-only workshops?
Can you formalize the definition of infinitely divisible in FOL?
Another way to draw RegionDifference of a cylinder and Cuboid
Direct train from Rotterdam to Lille Europe
How to convert this extremely large group in GAP into a permutation group.
Matthew 24:5 Many will come in my name!
Bypassing C64's PETSCII to screen code mapping
The geologic realities of a massive well out at Sea
Can a cleric gain the intended benefit from the Extra Spell feat?
Does a Linux console change color when it crashes?
How to rsync a large file by comparing earlier versions on the sending end?
What is a "non-reversible filter"?
"Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
Does the mind blank spell prevent someone from creating a simulacrum of a creature using wish?
Who is the target audience of Netanyahu's speech at the United Nations?
Alternatives to Test-Driven Grading in an LLM world
Does the Mishna or Gemara ever explicitly mention the second day of Shavuot?
в ответе meaning in context
What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel?
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
English Language Learners
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
10593 | https://people.ohio.edu/melkonia/math3050/HW/Section5.6.pdf | 290 Chapter 5 Sequences, Mathematical Induction, and Recursion 5.6 Defining Sequences Recursively So, Nat’ralists observe, a Flea/Hath smaller Fleas that on him prey,/And these have smaller Fleas to bite ’em,/And so proceed ad infinitum. — Jonathan Swift, 1733 A sequence can be defined in a variety of different ways. One informal way is to write the first few terms with the expectation that the general pattern will be obvious. We might say, for instance, “consider the sequence 3, 5, 7, . . ..” Unfortunately, misunderstandings can occur when this approach is used. The next term of the sequence could be 9 if we mean a sequence of odd integers, or it could be 11 if we mean the sequence of odd prime numbers.
The second way to define a sequence is to give an explicit formula for its nth term.
For example, a sequence a0, a1, a2 . . . can be specified by writing an = (−1)n n + 1 for all integers n ≥0.
The advantage of defining a sequence by such an explicit formula is that each term of the sequence is uniquely determined and can be computed in a fixed, finite number of steps, by substitution.
The third way to define a sequence is to use recursion, as was done in Examples 5.3.3 and 5.4.2. This requires giving both an equation, called a recurrence relation, that defines each later term in the sequence by reference to earlier terms and also one or more initial values for the sequence.
Sometimes it is very difficult or impossible to find an explicit formula for a sequence, but it is possible to define the sequence using recursion. Note that defining sequences recursively is similar to proving theorems by mathematical induction. The recurrence relation is like the inductive step and the initial conditions are like the basis step. Indeed, the fact that sequences can be defined recursively is equivalent to the fact that mathemat-ical induction works as a method of proof.
• Definition A recurrence relation for a sequence a0, a1, a2, . . . is a formula that relates each term ak to certain of its predecessors ak−1, ak−2, . . . , ak−i, where i is an integer with k −i ≥0. The initial conditions for such a recurrence relation specify the values of a0, a1, a2, . . . , ai−1, if i is a fixed integer, or a0, a1, . . . , am, where m is an integer with m ≥0, if i depends on k.
Example 5.6.1 Computing Terms of a Recursively Defined Sequence Define a sequence c0, c1, c2, . . . recursively as follows: For all integers k ≥2, (1) ck = ck−1 + kck−2 + 1 recurrence relation (2) c0 = 1 and c1 = 2 initial conditions.
Find c2, c3, and c4.
Solution c2 = c1 + 2c0 + 1 = 2 + 2·1 + 1 by substituting k = 2 into (1) since c1 = 2 and c0 = 1 by (2) Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
5.6 Defining Sequences Recursively 291 (3) ∴c2 = 5 c3 = c2 + 3c1 + 1 = 5 + 3·2 + 1 by substituting k = 3 into (1) since c2 = 5 by (3) and c1 = 2 by (2) (4) ∴c3 = 12 c4 = c3 + 4c2 + 1 = 12 + 4·5 + 1 (5) ∴c4 = 33 by substituting k = 4 into (1) since c3 = 12 by (4) and c2 = 5 by (3) ■ A given recurrence relation may be expressed in several different ways.
Example 5.6.2 Writing a Recurrence Relation in More Than One Way Let s0, s1, s2, . . . be a sequence that satisfies the following recurrence relation: for all integers k ≥1, sk = 3sk−1 −1.
Explain why the following statement is true: for all integers k ≥0, sk+1 = 3sk −1.
Note Think of the recurrence relation as s□= 3s□−1 −1, where any positive integer expression may be placed in the box.
Solution In informal language, the recurrence relation says that any term of the sequence equals 3 times the previous term minus 1. Now for any integer k ≥0, the term previous to sk+1 is sk. Thus for any integer k ≥0, sk+1 = 3sk −1.
■ A sequence defined recursively need not start with a subscript of zero. Also, a given recurrence relation may be satisfied by many different sequences; the actual values of the sequence are determined by the initial conditions.
Example 5.6.3 Sequences That Satisfy the Same Recurrence Relation Let a1, a2, a3, . . . and b1, b2, b3, . . . satisfy the recurrence relation that the kth term equals 3 times the (k −1)st term for all integers k ≥2: (1) ak = 3ak−1 and bk = 3bk−1.
But suppose that the initial conditions for the sequences are different: (2) a1 = 2 and b1 = 1.
Find (a) a2, a3, a4 and (b) b2, b3, b4.
Solution a.
a2 = 3a1 = 3·2 = 6 a3 = 3a2 = 3·6 = 18 a4 = 3a3 = 3·18 = 54 b.
b2 = 3b1 = 3·1 = 3 b3 = 3b2 = 3·3 = 9 b4 = 3b3 = 3·9 = 27 Thus a1, a2, a3, . . . begins 2, 6, 18, 54, . . . and b1, b2, b3, . . . begins 1, 3, 9, 27, . . . .
■ Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
292 Chapter 5 Sequences, Mathematical Induction, and Recursion Example 5.6.4 Showing That a Sequence Given by an Explicit Formula Satisfies a Certain Recurrence Relation The sequence of Catalan numbers, named after the Belgian mathematician Eugène Catalan (1814–1894), arises in a remarkable variety of different contexts in discrete math-ematics. It can be defined as follows: For each integer n ≥1, Cn = 1 n + 1 2n n .
a. Find C1, C2, and C3.
b. Show that this sequence satisfies the recurrence relation Ck = 4k −2 k + 1 Ck−1 for all integers k ≥2 Academie Royale de Belgique Eugène Catalan (1814–1894) Solution a. C1 = 1 2 2 1 = 1 2 ·2 = 1, C2 = 1 3 4 2 = 1 3 ·6 = 2, C3 = 1 4 6 3 = 1 4 ·20 = 5 b. To obtain the kth and (k −1)st terms of the sequence, just substitute k and k −1 in place of n in the explicit formula for C1, C2, C3, . . . .
Ck = 1 k + 1 2k k Ck+1 = 1 (k −1) + 1 2(k −1) k −1 = 1 k 2k −2) k −1 .
Then start with the right-hand side of the recurrence relation and transform it into the left-hand side: For each integer k ≥2, 4k −2 k + 1 Ck−1 = 4k −2 k + 1 1 k 2k −2) k −1 + by substituting = 2(2k −1) k + 1 · 1 k · (2k −2)!
(k −1)!(2k −2 −(k −1))!
by the formula for n choose r = 1 k + 1 ·(2(2k −1))· (2k −2)!
(k(k −1)!)(k −1)!
by rearranging the factors = 1 k + 1 ·(2(2k −1))· 1 k!(k −1)! ·(2k −2)!· 1 2 · 1 k ·2k.
because 1 2 · 1 k ·2k = 1 = 1 k + 1 · 2 2 · 1 k! · 1 (k −1)! · 1 k ·(2k)·(2k −1)·(2k −2)!
by rearranging the factors = 1 k + 1 · (2k)!
k!k!
because k(k −1)! = k!, 2 2 = 1, and 2k ·(2k −1)·(2k −2)! = (2k)!
= 1 k + 1 2k k by the formula for n choose r = Ck by defintion of C1, C2, C3, . . . .
■ Examples of Recursively Defined Sequences Recursion is one of the central ideas of computer science. To solve a problem recursively means to find a way to break it down into smaller subproblems each having the same form as the original problem—and to do this in such a way that when the process is repeated Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
5.6 Defining Sequences Recursively 293 many times, the last of the subproblems are small and easy to solve and the solutions of the subproblems can be woven together to form a solution to the original problem.
Probably the most difficult part of solving problems recursively is to figure out how knowing the solution to smaller subproblems of the same type as the original problem will give you a solution to the problem as a whole. You suppose you know the solutions to smaller subproblems and ask yourself how you would best make use of that knowledge to solve the larger problem. The supposition that the smaller subproblems have already been solved has been called the recursive paradigm or the recursive leap of faith. Once you take this leap, you are right in the middle of the most difficult part of the prob-lem, but generally, the path to a solution from this point, though difficult, is short. The recursive leap of faith is similar to the inductive hypothesis in a proof by mathematical induction.
Example 5.6.5 The Tower of Hanoi In 1883 a French mathematician, Édouard Lucas, invented a puzzle that he called The Tower of Hanoi (La Tour D’Hanoï). The puzzle consisted of eight disks of wood with holes in their centers, which were piled in order of decreasing size on one pole in a row of three. A facsimile of the cover of the box is shown in Figure 5.6.1. Those who played the game were supposed to move all the disks one by one from one pole to another, never placing a larger disk on top of a smaller one. The directions to the puzzle claimed it was based on an old Indian legend: Courtesy of Francis Lucas Édouard Lucas (1842–1891) On the steps of the altar in the temple of Benares, for many, many years Brahmins have been moving a tower of 64 golden disks from one pole to another; one by one, never placing a larger on top of a smaller. When all the disks have been transferred the Tower and the Brahmins will fall, and it will be the end of the world.
Figure 5.6.1 Courtesy of Paul Stockmeyer The puzzle offered a prize of ten thousand francs (about $34,000 US today) to anyone who could move a tower of 64 disks by hand while following the rules of the game. (See Figure 5.6.2 on the following page.) Assuming that you transferred the disks as efficiently as possible, how many moves would be required to win the prize?
Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
296 Chapter 5 Sequences, Mathematical Induction, and Recursion Note that the numbers mn are independent of the labeling of the poles; it takes the same minimum number of moves to transfer n disks from pole A to pole C as to transfer n disks from pole A to pole B, for example. Also the values of mn are independent of the number of larger disks that may lie below the top n, provided these remain stationary while the top n are moved. Because the disks on the bottom are all larger than the ones on the top, the top disks can be moved from pole to pole as though the bottom disks were not present.
Going from position (a) to position (b) requires mk−1 moves, going from position (b) to position (c) requires just one move, and going from position (c) to position (d) requires mk−1 moves. By substitution into equation (5.6.1), therefore, mk = mk−1 + 1 + mk−1 = 2mk−1 + 1 for all integers k ≥2.
The initial condition, or base, of this recursion is found by using the definition of the sequence. Because just one move is needed to move one disk from one pole to another, m1 = the minimum number of moves needed to move a tower of one disk from one pole to another + = 1.
Hence the complete recursive specification of the sequence m1, m2, m3, . . . is as follows: For all integers k ≥2, (1) mk = 2mk−1 + 1 recurrence relation (2) m1 = 1 initial conditions Here is a computation of the next five terms of the sequence: (3) m2 = 2m1 + 1 = 2·1 + 1 = 3 by (1) and (2) (4) m3 = 2m2 + 1 = 2·3 + 1 = 7 by (1) and (3) (5) m4 = 2m3 + 1 = 2·7 + 1 = 15 by (1) and (4) (6) m5 = 2m4 + 1 = 2·15 + 1 = 31 by (1) and (5) (7) m6 = 2m5 + 1 = 2·31 + 1 = 63 by (1) and (6) Going back to the legend, suppose the priests work rapidly and move one disk every second. Then the time from the beginning of creation to the end of the world would be m64 seconds. In the next section we derive an explicit formula for mn. Meanwhile, we can compute m64 on a calculator or a computer by continuing the process started above (Try it!). The approximate result is 1.844674 × 1019 seconds ∼ = 5.84542 × 1011 years ∼ = 584.5 billion years, which is obtained by the estimate of 60 · 60 · 24 · (365.25) = 31, 557, 600 ↑ ↑ ↖ ↖ ↑ seconds per minute minutes per hour hours per day days per year seconds per year seconds in a year (figuring 365.25 days in a year to take leap years into account). Surpris-ingly, this figure is close to some scientific estimates of the life of the universe!
■ Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
5.6 Defining Sequences Recursively 297 Example 5.6.6 The Fibonacci Numbers One of the earliest examples of a recursively defined sequence arises in the writings of Leonardo of Pisa, commonly known as Fibonacci, who was the greatest European mathematician of the Middle Ages. In 1202 Fibonacci posed the following problem: A single pair of rabbits (male and female) is born at the beginning of a year. Assume the following conditions: 1. Rabbit pairs are not fertile during their first month of life but thereafter give birth to one new male/female pair at the end of every month.
2. No rabbits die.
How many rabbits will there be at the end of the year?
Bettmann/CORBIS Fibonacci (Leonardo of Pisa) (ca. 1175–1250) Solution One way to solve this problem is to plunge right into the middle of it using recur-sion. Suppose you know how many rabbit pairs there were at the ends of previous months.
How many will there be at the end of the current month?
The crucial observation is that the number of rabbit pairs born at the end of month k is the same as the number of pairs alive at the end of month k −2. Why? Because it is exactly the rabbit pairs that were alive at the end of month k −2 that were fertile during month k. The rabbits born at the end of month k −1 were not.
month k −2 k −1 k ———————|———————-|—————– Each pair alive here ↑ gives birth to a pair here ↑ Now the number of rabbit pairs alive at the end of month k equals the ones alive at the end of month k −1 plus the pairs newly born at the end of the month. Thus ⎡ ⎢ ⎢ ⎢ ⎢ ⎣ the number of rabbit pairs alive at the end of month k ⎤ ⎥ ⎥ ⎥ ⎥ ⎦ = ⎡ ⎢ ⎢ ⎢ ⎢ ⎣ the number of rabbit pairs alive at the end of month k −1 ⎤ ⎥ ⎥ ⎥ ⎥ ⎦ + ⎡ ⎢ ⎢ ⎢ ⎢ ⎣ the number of rabbit pairs born at the end of month k ⎤ ⎥ ⎥ ⎥ ⎥ ⎦ = ⎡ ⎢ ⎢ ⎢ ⎢ ⎣ the number of rabbit pairs alive at the end of month k −1 ⎤ ⎥ ⎥ ⎥ ⎥ ⎦ + ⎡ ⎢ ⎢ ⎢ ⎢ ⎣ the number of rabbit pairs alive at the end of month k −2 ⎤ ⎥ ⎥ ⎥ ⎥ ⎦ 5.6.2 Note It is essential to rephrase this observation in terms of a sequence.
For each integer n ≥1, let Fn = the number of rabbit pairs alive at the end of month n + and let F0 = the initial number of rabbit pairs = 1.
Then by substitution into equation (5.6.2), for all integers k ≥2, Fk = Fk−1 + Fk−2.
Now F0 = 1, as already noted, and F1 = 1 also, because the first pair of rabbits is not fertile until the second month. Hence the complete specification of the Fibonacci sequence is as follows: For all integers k ≥2, Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
298 Chapter 5 Sequences, Mathematical Induction, and Recursion (1) Fk = Fk−1 + Fk−2 recurrence relation (2) F0 = 1, F1 = 1 initial conditions.
To answer Fibonacci’s question, compute F2, F3, and so forth through F12: (3) F2 = F1 +F0 = 1 + 1 = 2 by (1) and (2) (4) F3 = F2 +F1 = 2 + 1 = 3 by (1), (2) and (3) (5) F4 = F3 +F2 = 3 + 2 = 5 by (1), (3) and (4) (6) F5 = F4 +F3 = 5 + 3 = 8 by (1), (4) and (5) (7) F6 = F5 +F4 = 8 + 5 = 13 by (1), (5) and (6) (8) F7 = F6 +F5 = 13 + 8 = 21 by (1), (6) and (7) (9) F8 = F7 +F6 = 21 + 13 = 34 by (1), (7) and (8) (10) F9 = F8 +F7 = 34 + 21 = 55 by (1), (8) and (9) (11) F10 = F9 +F8 = 55 + 34 = 89 by (1), (9) and (10) (12) F11 = F10 +F9 = 89 + 55 = 144 by (1), (10) and (11) (13) F12 = F11 +F10 = 144 + 89 = 233 by (1), (11) and (12) At the end of the twelfth month there are 233 rabbit pairs, or 466 rabbits in all.
■ Example 5.6.7 Compound Interest On your twenty-first birthday you get a letter informing you that on the day you were born an eccentric rich aunt deposited $100,000 in a bank account earning 4% interest compounded annually and she now intends to turn the account over to you, provided you can figure out how much it is worth. What is the amount currently in the account?
Solution To approach this problem recursively, observe that ⎡ ⎢ ⎢ ⎣ the amount in the account at the end of any particular year ⎤ ⎥ ⎥ ⎦= ⎡ ⎢ ⎢ ⎣ the amount in the account at the end of the previous year ⎤ ⎥ ⎥ ⎦+ ⎡ ⎢ ⎢ ⎣ the interest earned on the account during the year ⎤ ⎥ ⎥ ⎦.
Now the interest earned during the year equals the interest rate, 4% = 0.04 times the amount in the account at the end of the previous year. Thus ⎡ ⎢ ⎢ ⎣ the amount in the account at the end of any particular year ⎤ ⎥ ⎥ ⎦= ⎡ ⎢ ⎢ ⎣ the amount in the account at the end of the previous year ⎤ ⎥ ⎥ ⎦+ (0.04)· ⎡ ⎢ ⎢ ⎣ the amount in the account at the end of the previous year ⎤ ⎥ ⎥ ⎦.
5.6.3 For each positive integer n, let An = the amount in the account at the end of year n + and let Note Again, a crucial step is to define the sequence explicitly.
A0 = the initial amount in the account + = $100, 000.
Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
5.6 Defining Sequences Recursively 299 Then for any particular year k, substitution into equation (5.6.3) gives Ak = Ak−1 + (0.04)· Ak−1 = (1 + 0.04)· Ak−1 = (1.04)· Ak−1 by factoring out Ak−1.
Consequently, the values of the sequence A0, A1, A2, . . . are completely specified as follows: for all integers k ≥1, (1) Ak = (1.04)· Ak−1 recurrence relation (2) A0 = $100, 000 initial condition.
The number 1.04 is called the growth factor of the sequence.
In the next section we derive an explicit formula for the value of the account in any year n. The value on your twenty-first birthday can also be computed by repeated substi-tution as follows: (3) A1 = 1.04· A0 = (1.04)·$100, 000 = $104, 000 by (1) and (2) (4) A2 = 1.04· A1 = (1.04)·$104, 000 = $108, 160 by (1) and (3) (5) A3 = 1.04· A2 = (1.04)·$108, 160 = $112, 486.40 by (1) and (4) .
.
.
.
.
.
(22) A20 = 1.04· A19 ∼ = (1.04)·$210, 684.92 ∼ = $219, 112.31 by (1) and (21) (23) A21 = 1.04· A20 ∼ = (1.04)·$219, 112.31 ∼ = $227, 876.81 by (1) and (22) The amount in the account is $227,876.81 (to the nearest cent). Fill in the dots (to check the arithmetic) and collect your money!
■ Example 5.6.8 Compound Interest with Compounding Several Times a Year When an annual interest rate of i is compounded m times per year, the interest rate paid per period is i/m. For instance, if 3% = 0.03 annual interest is compounded quarterly, then the interest rate paid per quarter is 0.03/4 = 0.0075.
For each integer k ≥1, let Pk = the amount on deposit at the end of the kth period, assuming no additional deposits or withdrawals. Then the interest earned during the kth period equals the amount on deposit at the end of the (k −1)st period times the interest rate for the period: interest earned during kth period = Pk−1 i m .
The amount on deposit at the end of the kth period, Pk, equals the amount at the end of the (k −1)st period, Pk−1, plus the interest earned during the kth period: Pk = Pk−1 + Pk−1 i m = Pk−1 1 + i m .
5.6.4 Suppose $10,000 is left on deposit at 3% compounded quarterly.
a. How much will the account be worth at the end of one year, assuming no additional deposits or withdrawals?
b. The annual percentage rate (APR) is the percentage increase in the value of the account over a one-year period. What is the APR for this account?
Solution a. For each integer n ≥1, let Pn = the amount on deposit after n consecutive quarters, assuming no additional deposits or withdrawals, and let P0 be the initial $10,000. Then Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
300 Chapter 5 Sequences, Mathematical Induction, and Recursion by equation (5.6.4) with i = 0.03 and m = 4, a recurrence relation for the sequence P0, P1, P2, . . . is (1) Pk = Pk−1(1 + 0.0075) = (1.0075)· Pk−1 for all integers k≥1.
The amount on deposit at the end of one year (four quarters), P4, can be found by successive substitution: (2) P0 = $10, 000 (3) P1 = 1.0075· P0 = (1.0075)·$10, 000.00 = $10, 075.00 by (1) and (2) (4) P2 = 1.0075· P1 = (1.0075)·$10, 075.00 = $10, 150.56 by (1) and (3) (5) P3 = 1.0075· P2 ∼ = (1.0075)·$10, 150.56 = $10, 226.69 by (1) and (4) (6) P4 = 1.0075· P3 ∼ = (1.0075)·$10, 226.69 = $10, 303.39 by (1) and (5) Hence after one year there is $10,303.39 (to the nearest cent) in the account.
b. The percentage increase in the value of the account, or APR, is 10303.39 −10000 10000 = 0.03034 = 3.034%.
■ Recursive Definitions of Sum and Product Addition and multiplication are called binary operations because only two numbers can be added or multiplied at a time. Careful definitions of sums and products of more than two numbers use recursion.
• Definition Given numbers a1, a2, . . . , an, where n is a positive integer, the summation from i = 1 to n of the ai, denoted n i=1 ai, is defined as follows: 1 i=1 ai = a1 and n i=1 ai = %n−1 i=1 ai & + an, if n > 1.
The product from i = 1 to n of the ai, denoted $n i=1 ai, is defined by 1 i=1 ai = a1 and n i=1 ai = %n−1 i=1 ai & ·an, if n > 1.
The effect of these definitions is to specify an order in which sums and products of more than two numbers are computed. For example, 4 i=1 ai = % 3 i=1 ai & + a4 = %% 2 i=1 ai & + a3 & + a4 = ((a1 + a2) + a3) + a4.
The recursive definitions are used with mathematical induction to establish various properties of general finite sums and products.
Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
5.6 Defining Sequences Recursively 301 Example 5.6.9 A Sum of Sums Prove that for any positive integer n, if a1, a2, . . . , an and b1, b2, . . . , bn are real numbers, then n i=1 (ai + bi) = n i=1 ai + n i=1 bi.
Solution The proof is by mathematical induction. Let the property P(n) be the equation n i = 1 (ai + bi) = n i = 1 ai + n i = 1 bi.
←P(n) We must show that P(n) is true for all integers n ≥0. We do this by mathematical induc-tion on n.
Show that P(1) is true: To establish P(1), we must show that 1 i = 1 (ai + bi) = 1 i = 1 ai + 1 i = 1 bi.
←P(1) But 1 i=1 (ai + bi) = a1 + b1 by definition of = 1 i=1 ai + 1 i=1 bi also by definition of .
Hence P(1) is true.
Show that for all integers k ≥1, if P(k) is true then P(k + 1) is also true: Suppose a1, a2, . . . , ak, ak+1 and b1, b2, . . . , bk, bk+1 are real numbers and that for some k ≥1 k i=1 (ai + bi) = k i=1 ai + k i=1 bi.
←P(k) inductive hypothesis We must show that k+1 i=1 (ai + bi) = k+1 i=1 ai + k+1 i=1 bi.
←P(k + 1) [We will show that the left-hand side of this equation equals the right-hand side.] But the left-hand side of the equation is k+1 i=1 (ai + bi) = k i=1 (ai + bi) + (ak+1 + bk+1) by definition of = k i=1 ai + k i=1 bi + (ak+1 + bk+1) by inductive hypothesis = k i=1 ai + ak+1 + k i=1 bi + bk+1 by the associative and cummutative laws of algebra = k+1 i=1 ai + k+1 i=1 bi by definition of which equals the right-hand side of the equation. [This is what was to be shown.] ■ Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
302 Chapter 5 Sequences, Mathematical Induction, and Recursion Test Yourself 1. A recursive definition for a sequence consists of a _ and .
2. A recurrence relation is an equation that defines each later term of a sequence by reference to in the sequence.
3. Initial conditions for a recursive definition of a sequence con-sist of one or more of the _ of the sequence.
4. To solve a problem recursively means to divide the prob-lem into smaller subproblems of the same type as the initial problem, to suppose , and to figure out how to use the supposition to .
5. A crucial step for solving a problem recursively is to define a _____ in terms of which the recurrence relation and initial conditions can be specified.
Exercise Set 5.6 Find the first four terms of each of the recursively defined sequences in 1–8.
1. ak = 2ak−1 + k, for all integers k ≥2 a1 = 1 2. bk = bk−1 + 3k, for all integers k ≥2 b1 = 1 3. ck = k(ck−1)2, for all integers k ≥1 c0 = 1 4. dk = k(dk−1)2, for all integers k ≥1 d0 = 3 5. sk = sk−1 + 2sk−2, for all integers k ≥2 s0 = 1, s1 = 1 6. tk = tk−1 + 2tk−2, for all integers k ≥2 t0 = −1, t1 = 2 7. uk = kuk−1 −uk−2, for all integers k ≥3 u1 = 1, u2 = 1 8. vk = vk−1 + vk−2 + 1, for all integers k ≥3 v1 = 1, v2 = 3 9. Let a0, a1, a2, . . . be defined by the formula an = 3n + 1, for all integers n ≥0. Show that this sequence satisfies the recurrence relation ak = ak−1 + 3, for all integers k ≥1.
10. Let b0, b1, b2, . . . be defined by the formula bn = 4n, for all integers n ≥0. Show that this sequence satisfies the recur-rence relation bk = 4bk−1, for all integers k ≥1.
11. Let c0, c1, c2, . . . be defined by the formula cn = 2n −1 for all integers n ≥0. Show that this sequence satisfies the recurrence relation ck = 2ck−1 + 1.
12. Let s0, s1, s2, . . . be defined by the formula sn = (−1)n n!
for all integers n ≥0. Show that this sequence satisfies the recurrence relation sk = −sk−1 k .
13. Let t0, t1, t2, . . . be defined by the formula tn = 2 + n for all integers n ≥0. Show that this sequence satisfies the recurrence relation tk = 2tk−1 −tk−2.
14. Let d0, d1, d2, . . . be defined by the formula dn = 3n −2n for all integers n ≥0. Show that this sequence satisfies the recurrence relation dk = 5dk−1 −6dk−2.
15.
H For the sequence of Catalan numbers defined in Example 5.6.4, prove that for all integers n ≥1, Cn = 1 4n + 2 2n + 2 n + 1 .
16. Use the recurrence relation and values for the Tower of Hanoi sequence m1, m2, m3, . . . discussed in Exam-ple 5.6.5 to compute m7 and m8.
17. Tower of Hanoi with Adjacency Requirement: Suppose that in addition to the requirement that they never move a larger disk on top of a smaller one, the priests who move the disks of the Tower of Hanoi are also allowed only to move disks one by one from one pole to an adjacent pole. Assume poles A and C are at the two ends of the row and pole B is in the middle. Let an = ⎡ ⎣ the minimum number of moves needed to transfer a tower of n disks from pole A to pole C ⎤ ⎦.
a. Find a1, a2, and a3.
b. Find a4.
c. Find a recurrence relation for a1, a2, a3, . . . .
18. Tower of Hanoi with Adjacency Requirement: Suppose the same situation as in exercise 17. Let bn = ⎡ ⎣ the minimum number of moves needed to transfer a tower of n disks from pole A to pole B ⎤ ⎦.
a. Find b1, b2, and b3.
b. Find b4.
Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
5.6 Defining Sequences Recursively 303 c. Show that bk = ak−1 + 1 + bk−1 for all integers k ≥ 2, where a1, a2, a3, . . . is the sequence defined in exercise 17.
d. Show that bk ≤3bk−1 + 1 for all integers k ≥2.
e.
✶ H Show that bk = 3bk−1 + 1 for all integers k ≥2.
19. Four-Pole Tower of Hanoi: Suppose that the Tower of Hanoi problem has four poles in a row instead of three.
Disks can be transferred one by one from one pole to any other pole, but at no time may a larger disk be placed on top of a smaller disk. Let sn be the minimum number of moves needed to transfer the entire tower of n disks from the left-most to the right-most pole.
a. Find s1, s2, and s3.
b. Find s4.
c. Show that sk ≤2sk−2 + 3 for all integers k ≥3.
20. Tower of Hanoi Poles in a Circle: Suppose that instead of being lined up in a row, the three poles for the original Tower of Hanoi are placed in a circle. The monks move the disks one by one from one pole to another, but they may only move disks one over in a clockwise direction and they may never move a larger disk on top of a smaller one. Let cn be the minimum number of moves needed to transfer a pile of n disks from one pole to the next adjacent pole in the clockwise direction.
a. Justify the inequality ck ≤4ck−1 + 1 for all integers k ≥2.
b. The expression 4ck−1 + 1 is not the minimum number of moves needed to transfer a pile of k disks from one pole to another. Explain, for example, why c3 ̸= 4c2 + 1.
21. Double Tower of Hanoi: In this variation of the Tower of Hanoi there are three poles in a row and 2n disks, two of each of n different sizes, where n is any positive integer.
Initially one of the poles contains all the disks placed on top of each other in pairs of decreasing size. Disks are transferred one by one from one pole to another, but at no time may a larger disk be placed on top of a smaller disk. However, a disk may be placed on top of one of the same size. Let tn be the minimum number of moves needed to transfer a tower of 2n disks from one pole to another.
a. Find t1 and t2.
b. Find t3.
c. Find a recurrence relation for t1, t2, t3, . . . .
22. Fibonacci Variation: A single pair of rabbits (male and female) is born at the beginning of a year. Assume the following conditions (which are more realistic than Fibonacci’s): (1) Rabbit pairs are not fertile during their first month of life but thereafter give birth to four new male/female pairs at the end of every month.
(2) No rabbits die.
a. Let rn = the number of pairs of rabbits alive at the end of month n, for each integer n ≥1, and let r0 = 1. Find a recurrence relation for r0,r1,r2, . . . .
b. Compute r0,r1,r2,r3,r4,r5, and r6.
c. How many rabbits will there be at the end of the year?
23. Fibonacci Variation: A single pair of rabbits (male and female) is born at the beginning of a year. Assume the fol-lowing conditions: (1) Rabbit pairs are not fertile during their first two months of life, but thereafter give birth to three new male/female pairs at the end of every month.
(2) No rabbits die.
a. Let sn = the number of pairs of rabbits alive at the end of month n, for each integer n ≥1, and let s0 = 1. Find a recurrence relation for s0, s1, s2, . . . .
b. Compute s0, s1, s2, s3, s4, and s5.
c. How many rabbits will there be at the end of the year?
In 24–34, F0, F1, F2, . . . is the Fibonacci sequence.
24. Use the recurrence relation and values for F0, F1, F2, . . .
given in Example 5.6.6 to compute F13 and F14.
25. The Fibonacci sequence satisfies the recurrence relation Fk = Fk−1 + Fk−2, for all integers k ≥2.
a. Explain why the following is true: Fk+1 = Fk + Fk−1 for all integers k ≥1.
b. Write an equation expressing Fk+2 in terms of Fk+1 and Fk.
c. Write an equation expressing Fk+3 in terms of Fk+2 and Fk+1 26. Prove that Fk = 3Fk−3 + 2Fk−4 for all integers k ≥4.
27. Prove that F2 k −F2 k−1 = Fk Fk−1 −Fk+1Fk−1, for all integers k ≥1.
28. Prove that F2 k+1 −F2 k −F2 k−1 = 2Fk Fk−1, for all integers k ≥1.
29. Prove that F2 k+1 −F2 k = Fk−1Fk+2, for all integers k ≥1.
30. Use mathematical induction to prove that for all integers n ≥0, Fn+2Fn −F2 n+1 = (−1)n.
31.
✶ Use strong mathematical induction to prove that Fn < 2n for all integers n ≥1.
32.
✶ H Let F0, F1, F2, . . . be the Fibonacci sequence defined in Section 5.6. Prove that for all integers n ≥0, gcd (Fn+1, Fn) = 1.
33. It turns out that the Fibonacci sequence satisfies the fol-lowing explicit formula: For all integers Fn ≥0, Fn = 1 √ 5 ⎡ ⎣ % 1 + √ 5 2 &n+1 − % 1 − √ 5 2 &n+1⎤ ⎦ Verify that the sequence defined by this formula satisfies the recurrence relation Fk = Fk−1 + Fk−2 for all integers k ≥2.
34.
H (For students who have studied calculus) Find lim n→∞ Fn+1 Fn , assuming that the limit exists.
Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
304 Chapter 5 Sequences, Mathematical Induction, and Recursion 35.
✶ H (For students who have studied calculus) Prove that lim n→∞ Fn+1 Fn exists.
36. (For students who have studied calculus) Define x0, x1, x2, . . . as follows: xk = 0 2 + xk−1 for all integers k ≥1 x0 = 0 Find limn→∞xn. (Assume that the limit exists.) 37. Compound Interest: Suppose a certain amount of money is deposited in an account paying 4% annual interest compounded quarterly. For each positive integer n, let Rn = the amount on deposit at the end of the nth quarter, assuming no additional deposits or withdrawals, and let R0 be the initial amount deposited.
a. Find a recurrence relation for R0, R1, R2, . . . .
b. If R0 = $5000, find the amount of money on deposit at the end of one year.
c. Find the APR for the account.
38. Compound Interest: Suppose a certain amount of money is deposited in an account paying 3% annual interest com-pounded monthly. For each positive integer n, let Sn = the amount on deposit at the end of the nth month, and let S0 be the initial amount deposited.
a. Find a recurrence relation for S0, S1, S2, . . ., assum-ing no additional deposits or withdrawals during the year.
b. If S0 = $10, 000, find the amount of money on deposit at the end of one year.
c. Find the APR for the account.
39. With each step you take when climbing a staircase, you can move up either one stair or two stairs. As a result, you can climb the entire staircase taking one stair at a time, taking two at a time, or taking a combination of one- and two-stair increments. For each integer n ≥1, if the staircase consists of n stairs, let cn be the number of different ways to climb the staircase. Find a recurrence relation for c1, c2, c3, . . . .
40. A set of blocks contains blocks of heights 1, 2, and 4 cen-timeters. Imagine constructing towers by piling blocks of different heights directly on top of one another. (A tower of height 6 cm could be obtained using six 1-cm blocks, three 2-cm blocks one 2-cm block with one 4-cm block on top, one 4-cm block with one 2-cm block on top, and so forth.) Let t be the number of ways to construct a tower of height n cm using blocks from the set. (Assume an unlimited sup-ply of blocks of each size.) Find a recurrence relation for t1, t2, t3, . . ..
41. Use the recursive definition of summation, together with mathematical induction, to prove the generalized distribu-tive law that for all positive integers n, if a1, a2, . . . , an and c are real numbers, then n i=1 cai = c % n i=1 ai & .
42. Use the recursive definition of product, together with math-ematical induction, to prove that for all positive integers n, if a1, a2, . . . , an and b1, b2, . . . , bn are real numbers, then n i=1 (aibi) = % n i=1 ai & % n i=1 bi & .
43. Use the recursive definition of product, together with math-ematical induction, to prove that for all positive integers n, if a1, a2, . . . , an and c are real numbers, then n i=1 (cai) = cn % n i=1 ai & .
44.
H The triangle inequality for absolute value states that for all real numbers a and b, |a + b| ≤|a| + |b|. Use the recur-sive definition of summation, the triangle inequality, the definition of absolute value, and mathematical induction to prove that for all positive integers n, if a1, a2, . . . , an are real numbers, then 1 1 1 1 1 n i=1 ai 1 1 1 1 1 ≤ n i=1 |ai|.
Answers for Test Yourself 1. recurrence relation; initial conditions 2. earlier terms 3. values of the first few terms 4. that the smaller subproblems have already been solved; solve the initial problem 5. sequence 5.7 Solving Recurrence Relations by Iteration The keener one’s sense of logical deduction, the less often one makes hard and fast inferences. — Bertrand Russell, 1872–1970 Suppose you have a sequence that satisfies a certain recurrence relation and initial conditions. It is often helpful to know an explicit formula for the sequence, especially if Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. |
10594 | https://www.geeksforgeeks.org/engineering-mathematics/proof-of-de-morgans-laws-in-boolean-algebra/ | Proof of De-Morgan's Laws in Boolean Algebra
Last Updated :
12 Jul, 2025
Suggest changes
17 Likes
De Morgan's Laws are fundamental principles in Boolean algebra and set theory, providing rules for transforming logical expressions. These laws are essential for simplifying and manipulating Boolean expressions, which have significant applications in digital circuit design, computer science, and engineering. This article provides a detailed proof of De Morgan's Laws in Boolean algebra.
De-Morgan's Laws
De Morgan's Laws state that the complement of the conjunction (AND) of two variables is equal to the disjunction (OR) of their complements, and the complement of the disjunction (OR) of two variables is equal to the conjunction (AND) of their complements. Mathematically, the laws are expressed as:
A⋅B=A+B
A+B=A⋅B
Proof of De Morgan's Laws
Statements:
1. (x + y)' = x'.y'
2. (x.y) = x' + y'
Proof:
First Statement: x+y=x′⋅y′
To prove:
(x + y)′=x′⋅ y'
We use the fundamental Boolean identities:
Complement Rule: A + A′= 1 and A⋅ A′=0.
Distributive Property: A + B.C = (A+B) ⋅(A+C).
Step-by-step proof:
Consider the expression: (x+y)′+x′⋅y.
Expanding using Boolean identities: (x+y)′=(x+y)⋅(x′+y′)
Applying De Morgan’s transformation: (x+y)⋅(x′+y′)=x.x′+x.y′+y.x′+y⋅y′
Using x⋅x′=0 and y⋅y′=0, we simplify: 0+x⋅y′+y⋅x′+0=x′⋅y′
Since x′⋅y′=x+y, we conclude: x+y=x′⋅y′
Second statement : x⋅y=x′+y′
To prove: (x⋅y)′=x′+y′
Using Boolean properties:
Complement Rule: A + A′=1 and A⋅ A′=0.
Distributive Property: A (B + C)= AB + AC.
Step-by-step proof:
Consider the expression: (x. y)'+ (x'+ y).
Expanding using Boolean identities: (x.y)'= (x.y) + (x'+y')
Applying De Morgan’s transformation: (x.y) + (x'+y')= x.x'+ x.y' + y.x' + y⋅y'
Using x⋅x′=0 and y⋅y′=0,, we simplify: 0+x+y′+0=x′⋅y′
Since x′+y′=x.y, we conclude: x+y=x′+y′
Proof of De-Morgan's law of boolean algebra using Truth Table:
1) (x+y)’= x’. y’
| | | | | | | |
--- --- ---
| x | y | x+y | (x+y)’ | x’ | y’ | x’. y’ |
| 0 | 0 | 0 | 1 | 1 | 1 | 1 |
| 0 | 1 | 1 | 0 | 1 | 0 | 0 |
| 1 | 0 | 1 | 0 | 0 | 1 | 0 |
| 1 | 1 | 1 | 0 | 0 | 0 | 0 |
Here x+y
Column x+y: The OR operation means at least one input must be 1 to get 1.
Column x+y:This is the complement (NOT operation), meaning it flips the values of x+y.
Column x and y: These represent the individual complements of x and y.
Column x.y: The AND operation is applied to the complements.
Hence the first De-morgan law of boolean algebra is proved (x +y)’= x’. y’
2) (x.y)’=x’+y’
| | | | | | | |
--- --- ---
| x | y | x.y | (x.y)’ | x’ | y’ | x’ + y’ |
| 0 | 0 | 0 | 1 | 1 | 1 | 1 |
| 0 | 1 | 0 | 1 | 1 | 0 | 1 |
| 1 | 0 | 0 | 1 | 0 | 1 | 1 |
| 1 | 1 | 1 | 0 | 0 | 0 | 0 |
Here
Column x⋅y: The AND operation means both inputs must be 1 to get 1.
Column x⋅y: This is the complement, meaning it flips the values of x⋅y.
Column x and y: These represent the individual complements of x and y.
Column : The OR operation is applied to the complements.
Hence the second De-morgan law of boolean algebra is proved (x.y)’=x’+y’
Solved Examples
1) Using De Morgan's Laws, simplify the following expression:
NOT(A OR (B AND C))
Solution :
NOT(A OR (B AND C))
Answer: (NOT A) AND (NOT B OR NOT C)
2).Prove that the following expressions are equivalent using De Morgan's Laws:
(NOT A AND NOT B) OR (NOT A AND C) = NOT A AND (NOT B OR C)
Solution :
(NOT A AND NOT B) OR (NOT A AND C) = NOT A AND (NOT B OR C)
Answer: This is correct.
Proof: NOT A AND (NOT B OR C)
= (NOT A AND NOT B) OR (NOT A AND C) [Using distributive law]
3).In a digital circuit, you have an AND gate followed by a NOT gate. Using De Morgan's Laws, how can you represent this using only OR and NOT gates?
Solution :
AND gate followed by NOT gate using only OR and NOT gates
Answer: Use NOT gates on each input, then feed these into an OR gate.
NOT(A AND B) = (NOT A) OR (NOT B)
4).Simplify the following Boolean expression using De Morgan's Laws:
NOT(A AND B AND C)
Solution :
NOT(A AND B AND C)
Answer: (NOT A) OR (NOT B) OR (NOT C)
5).In computer networking, a firewall rule allows traffic that is "not from subnet A and not destined for port 80". Express this rule in terms of positive conditions using De Morgan's Laws.
Solution :
F = NOT(X OR Y OR Z)
Answer: F = (NOT X) AND (NOT Y) AND (NOT Z)
6).Prove or disprove: NOT(A XOR B) = (NOT A) XOR (NOT B)
Solution :
"Not from subnet A and not destined for port 80"
Answer: From any subnet except A AND destined for any port except 80
7).Simplify the following expression using De Morgan's Laws:
NOT(A OR NOT(B AND C))
Solution :
NOT(A XOR B) = (NOT A) XOR (NOT B)
Answer: This is false.
NOT(A XOR B) = (A AND B) OR (NOT A AND NOT B)
But (NOT A) XOR (NOT B) = (NOT A AND B) OR (A AND NOT B)
8).In digital logic, how would you use De Morgan's Laws to convert a NOR gate into an equivalent combination of AND and NOT gates?
Solution :
NOT(A OR NOT(B AND C))
Answer: (NOT A) AND (B AND C)
Applications in Engineering
1. Digital Circuit Design
De Morgan's Laws are used extensively in digital circuit design to simplify Boolean expressions and logic gates, optimizing circuit layouts and reducing costs.
2. Computer Science
In computer science, De Morgan's Laws are used in algorithms and programming to simplify logical expressions, making code more efficient and readable.
3. Set Theory
In set theory, De Morgan's Laws describe the relationships between union, intersection, and complement of sets, providing a foundation for various mathematical operations.
4. Control Systems
In control systems, De Morgan's Laws help in designing and analyzing logic controllers, ensuring correct and efficient system behavior.
5. Data Mining
In data mining, De Morgan's Laws are applied to simplify queries and logical conditions, improving the performance of data retrieval and analysis processes.
Practice Problems
Simplify: NOT(A AND (B OR C))
Prove that NOT(A OR B OR C) = (NOT A) AND (NOT B) AND (NOT C)
Convert the expression (A NAND B) to use only OR and NOT gates.
Simplify: NOT(NOT A OR (B AND NOT C))
In a computer program, you need to check if a number is not between 1 and 10 inclusive. Express this condition using De Morgan's Laws.
Prove or disprove: NOT(A AND B) XOR C = (NOT A OR NOT B) XOR C
Simplify the Boolean expression: NOT((A AND B) OR (NOT A AND C))
Given F = NOT(X AND Y AND Z), express F using only OR gates and inverters.
In a digital circuit, you have a NOR gate followed by a NOT gate. Simplify this using De Morgan's Laws.
Express the following using only AND and NOT operations: NOT(A OR (B AND NOT C) OR (NOT A AND D))
Are De Morgan’s Laws used in Set Theory?
Yes! De Morgan’s Laws also apply to sets and Venn diagrams:
(A∪B)′= A′∩B′ (Complement of union is the intersection of complements).
(A∩B)′= A′∪B′ (Complement of intersection is the union of complements).
Are De Morgan’s Laws used in Set Theory?
Yes, but set operations differ from Boolean algebraic proofs.
What are De Morgan's Laws?
De Morgan's Laws state that the complement of the conjunction (AND) of two variables is equal to the disjunction (OR) of their complements, and vice versa.
M
mohitg593
Improve
Article Tags :
Engineering Mathematics
Discrete Mathematics
Explore
Linear Algebra
Matrices
3 min readRow Echelon Form
4 min readEigenvalues and Eigenvectors
11 min readSystem of Linear Equations
5 min readMatrix Diagonalization
8 min readLU Decomposition
6 min readFinding Inverse of a Square Matrix using Cayley Hamilton Theorem in MATLAB
4 min read
Sequence & Series
Mathematics | Sequence, Series and Summations
8 min readBinomial Theorem
15+ min readFinding nth term of any Polynomial Sequence
4 min read
Calculus
Limits, Continuity and Differentiability
10 min readCauchy's Mean Value Theorem
6 min readTaylor Series
8 min readInverse functions and composition of functions
3 min readDefinite Integral | Definition, Formula & How to Calculate
8 min readApplication of Derivative - Maxima and Minima
6 min read
Probability & Statistics
Mean, Variance and Standard Deviation
10 min readConditional Probability
12 min readBayes' Theorem
13 min readProbability Distribution - Function, Formula, Table
13 min readCovariance and Correlation
6 min read
Practice Questions
Last Minute Notes - Engineering Mathematics
15+ min readEngineering Mathematics - GATE CSE Previous Year Questions
4 min read
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
Suggest Changes
min 4 words, max Words Limit:1000
Thank You!
Your suggestions are valuable to us. |
10595 | https://math.stackexchange.com/questions/3083447/how-can-we-solve-xa-b-mod-n-equation-for-big-n-a | modular arithmetic - How can we solve $x^a = b \; mod \; n$ equation for big n, a, - Mathematics Stack Exchange
Join Mathematics
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Mathematics helpchat
Mathematics Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
How can we solve x a=b m o d n x a=b m o d n equation for big n, a,
Ask Question
Asked 6 years, 8 months ago
Modified6 years, 8 months ago
Viewed 983 times
This question shows research effort; it is useful and clear
2
Save this question.
Show activity on this post.
I would like to have a method to solve an equation of the type: x a=b m o d n x a=b m o d n, knowing that n can be decomposed into a product of prime numbers n=n 1×n 2×...×n k n=n 1×n 2×...×n k
I already know how to do it for small numbers, like if n is a prime number:
in this case, I am looking for e e, such that a e=1 m o d(n−1)a e=1 m o d(n−1). Like that, I can transform my equation into x=b e m o d n x=b e m o d n.
But here the numbers are too big to compute this in a single time. So maybe there is a method to solve it I am not aware of.
In my exercise, I have :
n = 264356242932330620591879762011459333409
b = 259252555055790712660181286804144327401
a = 151089236568313654499150506467499
modular-arithmetic
arithmetic
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this question to receive notifications
edited Jan 22, 2019 at 17:53
gommygommy
asked Jan 22, 2019 at 17:40
gommygommy
23 3 3 bronze badges
4
Is it x a x a or a x a x?kcborys –kcborys 2019-01-22 17:42:05 +00:00 Commented Jan 22, 2019 at 17:42
x a x a sorry I gonna edit gommy –gommy 2019-01-22 17:42:46 +00:00 Commented Jan 22, 2019 at 17:42
Welcome to stackexchange. This looks like cryptography homework. You are more likely to get help rather than downvotes and votes to close if you edit the question to show us what you tried and where you are stuck. Can you do the problem with smaller number?Ethan Bolker –Ethan Bolker 2019-01-22 17:45:35 +00:00 Commented Jan 22, 2019 at 17:45
@Moo : No I am trying to find x. a, b and n are given gommy –gommy 2019-01-22 17:54:28 +00:00 Commented Jan 22, 2019 at 17:54
Add a comment|
1 Answer 1
Sorted by: Reset to default
This answer is useful
1
Save this answer.
Show activity on this post.
The Euclidean algorithm proves that gcd(b,n)=1 gcd(b,n)=1.
Since you know the prime factorization of n n, you know ϕ(n)ϕ(n).
The Euclidean algorithm proves that gcd(a,ϕ(n))=1 gcd(a,ϕ(n))=1.
The extended Euclidean algorithm then gives c c such that a c≡1 mod ϕ(n)a c≡1 mod ϕ(n) and so x≡b c x≡b c.
These computations are probably not easy when done by hand. But WA handles it fine.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Follow
Follow this answer to receive notifications
answered Jan 22, 2019 at 17:53
lhflhf
222k 20 20 gold badges 254 254 silver badges 585 585 bronze badges
1
Thank you for your answer @Ihf, I will try it right now gommy –gommy 2019-01-22 18:05:18 +00:00 Commented Jan 22, 2019 at 18:05
Add a comment|
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
modular-arithmetic
arithmetic
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Related
1Perfect divisibility for products in modular arithmetic
1Fast method for solving modular exponential function with semi-prime modulus
3An operation with respect to which the set of prime numbers is closed
1Tools for dealing with a divisibility problem with powers of 2 and 3?
9How can I solve a problem using the Chinese remainder theorem and how does mod operator is understood correctly?
2Let n 1=a b n 1=a b and n 2=a c n 2=a c, where a,b,c a,b,c are 8-bit prime numbers. Given congruence values, find a,b,c a,b,c
Hot Network Questions
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
The rule of necessitation seems utterly unreasonable
How to home-make rubber feet stoppers for table legs?
Alternatives to Test-Driven Grading in an LLM world
"Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf
Discussing strategy reduces winning chances of everyone!
в ответе meaning in context
How many color maps are there in PBR texturing besides Color Map, Roughness Map, Displacement Map, and Ambient Occlusion Map in Blender?
Calculating the node voltage
My dissertation is wrong, but I already defended. How to remedy?
For every second-order formula, is there a first-order formula equivalent to it by reification?
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
Is it ok to place components "inside" the PCB
Repetition is the mother of learning
Non-degeneracy of wedge product in cohomology
Xubuntu 24.04 - Libreoffice
What can be said?
Proof of every Highly Abundant Number greater than 3 is Even
How do you create a no-attack area?
Numbers Interpreted in Smallest Valid Base
Is direct sum of finite spectra cancellative?
Bypassing C64's PETSCII to screen code mapping
Who is the target audience of Netanyahu's speech at the United Nations?
Checking model assumptions at cluster level vs global level?
more hot questions
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Mathematics
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
10596 | https://wiki.mbalib.com/wiki/%E6%B5%B7%E7%9B%97%E5%8D%9A%E5%BC%88 | 海盗博弈 - MBA智库百科
亲爱的MBA智库百科用户:
过去的17年,百科频道一直以免费公益的形式为大家提供知识服务,这是我们团队的荣幸和骄傲。 然而,在目前越来越严峻的经营挑战下,单纯依靠不断增加广告位来维持网站运营支出,必然会越来越影响您的使用体验,这也与我们的初衷背道而驰。 因此,经过审慎地考虑,我们决定推出VIP会员收费制度,以便为您提供更好的服务和更优质的内容。
MBA智库百科VIP会员,您的权益将包括: 1、无广告阅读; 2、免验证复制。
当然,更重要的是长期以来您对百科频道的支持。诚邀您加入MBA智库百科VIP会员,共渡难关,共同见证彼此的成长和进步!
MBA智库百科项目组
2023年8月10日
百科VIP 未登录
无广告阅读
免验证复制
1年VIP
¥9.9
支付方式:
微信支付
支付宝
PayPal
购买数量:
-
1
+
应付金额:
9.9 元
汇率换算:
1.32
美元(USD)
美元(USD)
加元(CAD)
日元(JPY)
英镑(GBP)
欧元(EUR)
澳元(AUD)
新台币(TWD)
港元(HKD)
新加坡(SGD)
菲律宾(PHP)
泰铢(THB)
按当月汇率换算,
包含手续费
打开手机微信 扫一扫继续付款
立即开通
PayPal支付后,可能会遇到VIP权益未及时开通的情况,请您耐心等待,或者联系百科微信客服:mbalib888。
温馨提示:当无法进去支付页面时,可刷新后重试或更换浏览器
开通百科会员即视为同意《MBA智库·百科会员服务规则》
支付成功
完成
全球专业中文经管百科,由 121,994 位网友共同编写而成,共计 436,098 个条目
查看
条目
讨论
编辑
收藏
简体中文
繁体中文
工具箱▼
上传文件
特殊页面
可打印版
永久链接
海盗博弈
用手机看条目
扫一扫,手机看条目
出自 MBA智库百科(
海盗博弈(Pirate game)
目录
[隐藏]
1 什么是海盗博弈
2 海盗博弈故事
3 海盗博弈的延伸
4 参考文献
[编辑]
什么是海盗博弈
海盗博弈是一个简单的数学博弈。该博弈描述了如果遵循经济人的行为,结果可能让人惊讶。这同时也是最后通牒博弈的多参与者版本
[编辑]
海盗博弈故事
有五个非常聪明的理性的海盗,分别编号 P 1,P 2,P 3,P 4,P 5。他们一同抢夺了100个金币,现在需要想办法分配这些金币。 海盗们有严格的等级制度:P 1<P 2<P 3<P 4<P 5。 海盗们分配原则是:等级最高的海盗P5提出一种分配方案。然后所有的海盗投票决定是否接受分配,包括提议人。并且在票数相同的情况下,提议人有决定权。如果提议通过,那么海盗们按照提议分配金币。如果没有通过,那么提议人将被扔出船外,然后由下一个最高等级的海盗提出新的分配方案。
海盗们基于三个因素来做决定。首先,要能存活下来。其次,自己的利益最大化(即得到最多的金币)。最后,在所有其他条件相同的情况下,优先选择把别人扔出船外。
现在,假如你是等级最高的 P 5,你会做何选择?直觉上,为了保住自己的生命,你可能会选择留给自己很少的金币,以便让大家同意自己的决策。然而,这和理论结果相差甚远。
解决这个问题的关键是换个思维方向。与其苦思冥想你要做什么决策,不如先想想最后剩下的人会做什么决策。假设现在只剩下 P 1 和 P 2 了,P 2 会做什么决策?很明显,他将把100金币留给自己,然后投自己一票。由于在票数相同的情况下提议人有决定权,无论 P 1 同不同意,P 2 都将实现自己的目的。
现在再把 P 3 加进来。P 1 知道,如果 P 3 被扔下海,那么游戏又将进行到上面的情况,P 1 终将一无所有。P 3 同样看到了这一点,所以他知道,只要他给 P 1 一点点利益,P 1 就会投票支持他的决策。所以 P 3 最终的决策应该是:
P 4 的策略也类似。由于他需要50%的支持,所以他只需贿赂1个金币给 P 2 就可以了。P 2 一定会支持他(否则轮到 P 3 做决策,他就一无所有啦)。所以 P 4 最终的决策是:
P 5 的情况稍有不同。由于这次一共有5个人,所以他至少需要贿赂两个海盗以使自己的决议通过。所以唯一的决策就是:
[编辑]
海盗博弈的延伸
如果海盗的数目不止5个呢? 继续按照这个逻辑推理,P 6 的决策将是:…一直到 P 2 00,它会给自己留1个金币,同时给剩下所有偶数编号的海盗1个金币。
海盗P 1 P 2 P 3 P 4 P 5…P 197 P 198 P 199 P 200
决策者
P 1 100
P 2 0 100
P 3 1 0 99
P 4 0 1 0 99
P 5 1 0 1 0 98
…………………
P 198 0 1 0 1 0…0 2
P 199 1 0 1 0 1…1 0 1
P 200 0 1 0 1 0…0 1 0 1
如果海盗数是201个,那么 P 201 该怎么做呢?乍一看去,他好像没有足够的钱去贿赂别的海盗了。不过,为了保住自己的性命,他还是可以把自己手中的金币全分出去,即给每个奇数编号的海盗(P 1~P 199)一个金币。这样虽然空手而归,但不至于人财两空。
P 202 也只能把这100个金币全部贿赂给其他100个海盗,这100个海盗必须是在 P 201 做决策的情况下什么也得不到的海盗。由于符合这样条件的海盗有101个(所有偶数编号的海盗 P 201),P 202 的决策不再是唯一的了!有101种方案供他选择。
可怜的是 P 203。由于人数众多,他实在没有足够的钱去贿赂其他海盗以获得足够的支持(他需要至少102个人的支持,包括他自己)。所以,不论 P 203 做什么决策,他都难逃被扔出船外的厄运了。不过 P 203 并没有我们想象中的那么悲情,因为这样的悲剧发生当且仅当船上正好有203个海盗。我们再增加一个海盗,P 204。P 204 明白,P 203 现在的唯一愿望就是活下来…所以不论 P 204 做什么决策,P 203 都会举双手支持他(当然举多少手都只能算一票)。所以 P 204 可以靠他自己的一票,P 203 的一票和贿赂另外100个海盗获得正好50%的支持。
P 204 可能的决策也只有101种,如下表:(可能获得1金币的海盗用"Y"标示)
P 1 P 2 P 3 P 4…P 199 P 200 P 201 P 202 P 203 P 204
P 204 Y N Y N Y N N Y N N
P 205 就没有那么幸运了。他不能无偿的得到 P 203 和 P 204 的支持。所以如果轮到 P 205 做决策,他也必定被扔到船外。P 206 也一样,尽管他能得到 P 205 的免费支持,但是这还不够。P 2 07 需要得到至少104个海盗的支持,所以有了 P 205,P 206 的无偿支持还是不够。
P 208 就比较幸运了。他也是需要得到104个海盗的支持,但 P 205,P 206,P 207,加上他自己,再加上贿赂100个海盗,正好104票。
P 208 可能的决策:(这次他有种决策)
P 1 P 2 P 3 P 4…P 199 P 200 P 201 P 202 P 203 P 204 P 205 P 206 P 207 P 208
P 208 N Y N Y N Y Y N Y Y N N N N
从这里我们又看出了新的规律:
从 P 201 之后,在每两个能够作出决策保住自己生命的海盗之间,存在着一些无论如何决策都会被扔到船外的海盗。而这些海盗会支持在这之后的那个能够做出决策保住自己生命的海盗。用数学来表达,设在 P 201 之后,能够作出决策保住自己生命的海盗的编号所组成的序列为 a n。则有:
对于(2),
若 a n 是偶数,则 a n = 2 a(n − 1) − 200
若 a n 是奇数,则 a n = 2 a(n − 1) − 199
给定一个固定的初值,数列的下一项有两个可能解:一个奇数解、一个偶数解,且偶数解比奇数解小1。再考虑我们原问题的意义,到达偶数解时,偶数编号的海盗已经能够做出决策保全自己。这说明我们应该舍弃所有奇数解。
由 a n = 2 a(n − 1) − 200 以及 a 0 = 202,我们得到通解为:a n = 200 + 2 n + 1。考虑到 P 201 也能保全自己,我们可以把所有能够保全自己但却得不到金币的海盗的编号写成统一表达式:
不难推出这些海盗可能的决策种数为,其中
[编辑]
参考文献
↑ 1.01.1逻辑与直觉–海盗博弈
来自"
打开MBA智库App, 阅读完整内容打开App
本条目对我有帮助34
赏
MBA智库APP
扫一扫,下载MBA智库APP
分享到:
温馨提示
复制该内容请前往MBA智库App
立即前往App
如果您认为本条目还有待完善,需要补充新内容或修改错误内容,请编辑条目或投诉举报。
本条目相关文档
非典型终端博弈:当“僵尸”遇上“海盗”4页
一个博弈论经典案例——海盗抓黄豆2页
博弈论讲义05 同时博弈与序贯博弈40页
同时决策博弈-静态博弈61页
博弈17页
管理博弈论-博弈规则120页
用博弈论的观点构建股市博弈模型12页
博弈论讲义02 同时决策博弈39页
战略管理与博弈之混合策略博弈23页
博弈论案例分析——网球博弈16页
更多相关文档
本条目相关课程
###### 《历史中的大博弈》
刘子仲
¥73.75
###### 从东西方文化冲突看大国博弈
苑举正
¥199
###### 解读《金融之王》:华尔街金融大萧条,源于政治家们的博弈?
王钊
¥49
###### 国民财商启蒙课,24天练就“富人脑”
周勇
¥39¥99
本条目由以下用户参与贡献
Cabbage,Zfj3000,Vulture,过期的拿铁,杨恒砜,方小莉.
页面分类: 博弈论
评论(共29条)
提示:评论内容为网友针对条目"海盗博弈"展开的讨论,与本站观点立场无关。
F4nvip (Talk | 贡献) 在 2009年4月15日 15:18 发表
太强了,理工科都晕
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
220.178.203. 在 2009年10月15日 10:24 发表
极其精彩!每个提议人作出的分配方案如果要被其他海盗接受,前提是所有海盗都看过这篇文章!
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
121.8.26. 在 2009年11月16日 13:02 发表
现实中,我相信是不可能会这样子分的吧
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
58.41.143. 在 2009年11月27日 09:08 发表
好复杂。。。看的头晕
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
59.120.169. 在 2010年1月26日 17:12 发表
有五个非常聪明的理性的海盗為前提,跟經濟學假設相同
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
122.236.170. 在 2010年2月22日 20:14 发表
还是分点钱给鲨鱼,自己再留点
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
122.204.172. 在 2010年10月7日 11:50 发表
终于绕明白了。。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
221.233.152. 在 2010年10月9日 14:22 发表
后面的计算看的木了
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
Yixuanzhan (Talk | 贡献) 在 2010年12月15日 13:08 发表
前提是海盗的数学要学的好才行,碰上一个不识数的就被喂鲨鱼了
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
犀利强 (Talk | 贡献) 在 2011年1月7日 16:54 发表
玩跨级,放在企业里不知道行不行。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
222.93.207. 在 2011年1月25日 21:36 发表
放在国内肯定不行 因为中国人不够聪明而且贪婪
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
123.121.222. 在 2011年3月27日 22:52 发表
海盜Pn只有在前n-1個海盜都扔到海裡的情況下才會成立,所以最後一個海盜就算沒有錢分,也一定是活著的,怎麼會被扔下水呢?
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
大大拉 (Talk | 贡献) 在 2011年3月28日 00:27 发表
迷糊。。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
113.120.26. 在 2011年5月20日 08:57 发表
太纯数学了,难懂。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
222.69.242. 在 2011年5月25日 16:47 发表
最后一个海盗P5不同意P4的观点不会被丢到海里,所以上述条件不成立,下面一大堆推理前提不成立
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
218.5.2. 在 2011年6月8日 19:33 发表
222.69.242. 在 2011年5月25日 16:47 发表
最后一个海盗P5不同意P4的观点不会被丢到海里,所以上述条件不成立,下面一大堆推理前提不成立
回楼上 只有提议人会被仍进海里的
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
晞灭 (Talk | 贡献) 在 2011年7月27日 16:00 发表
问题是 到 p208时 不应该只有103选11的组合 应该是204选100的组合吧 【我电脑打不出 排列组合 C】 因为205,206,207和自己的四票是固定的 然而 对于前204个人来说 即使给204分 最多也只能得到1个金币 此时 没有必要再分 要给哪个人了吧。。。 或者说 当只能把100金币全部分给其他人时 他的 下一个分配者就不必再思考 应该分给哪些特定的组合了吧。。。。应该是这样 编者说呢。。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
彭女士 (Talk | 贡献) 在 2012年3月14日 18:55 发表
太强了!数学不好还很难看懂啊!
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
张喜双 (Talk | 贡献) 在 2012年3月19日 15:50 发表
强大的理论。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
116.228.2. 在 2012年5月16日 18:46 发表
博弈是要考虑多种因素的。单一的因素只是理论上的。除非他们都懂得这样的博弈。不过分析的很精彩。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
王亚刚 (Talk | 贡献) 在 2012年10月29日 13:13 发表
理论很好,但是,多数人是短视的,因此,无论如何,每一个肯定会被扔出去给鱼.
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
76.111.169. 在 2014年1月24日 03:29 发表
不断反对,把前面的人都杀死,分的才多
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
218.18.170. 在 2015年4月15日 14:25 发表
现实中,强者掌控游戏规则。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
Zarua (Talk | 贡献) 在 2017年4月30日 21:34 发表
222.93.207. 在 2011年1月25日 21:36 发表
放在国内肯定不行 因为中国人不够聪明而且贪婪
你聪明你上
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
Zarua (Talk | 贡献) 在 2017年4月30日 21:42 发表
p5等级最高应该由p5最先提出建议,P1就没有任何权利首先提出建议
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
Zarua (Talk | 贡献) 在 2017年4月30日 22:06 发表
这里明显与海盗分金更模糊一些
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
M id 9b1774d75ecaa61c0138338975fb1b47 (Talk | 贡献) 在 2018年6月11日 10:14 发表
看得晕,逻辑已经跟不上了
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
伍一龙 (Talk | 贡献) 在 2018年12月21日 09:53 发表
天行九歌,三姬分金。海盗分金的简化版。
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
M id 5a9338bb3b3fa56bc54e4f0bd92a7485 (Talk | 贡献) 在 2020年10月1日 13:23 发表
这关系的人的信任问题
回复评论
发表评论 请文明上网,理性发言并遵守有关规定。
发表评论 请文明上网,理性发言并遵守有关规定。
首页
文档
百科
课堂
商学院
资讯
知识点
国际MBA
商城
企业服务
问答
首页
专题
管理
营销
经济
金融
人力资源
咨询
财务
品牌
证券
物流
贸易
商学院
法律
人物
分类索引
百科VIP
百科VIP会员权益
无广告阅读
免验证复制
开通/续费百科VIP
登录
消息
昵称未设置
百科VIP 未开通
收藏夹账号安全中心
我的页面我的贡献我的讨论页我的设置
退出登录
打开APP
导航
最新资讯
最新评论
最新推荐
热门推荐
编辑实验
使用帮助
创建条目
随便看看
本周推荐
最多推荐
短期投资
汇率风险
仓库管理系统
公积金贷款利率
批发价格
网店管理
网站建设
国家信贷
软件架构师
涂料
奶头乐理论
蘑菇管理定律
猴子管理法则
情绪ABC理论
垃圾人定律
100个最流行的管理词汇
破窗效应
INFP
SWOT分析模型
21天效应
以上内容根据网友推荐自动排序生成
官方社群
企业管理者交流群
加入
添加微信,拉你入群
创业者交流群
加入
添加微信,拉你入群
AIGC交流群
加入
添加微信,拉你入群
市场营销人员交流群
加入
添加微信,拉你入群
人力资源师交流群
加入
添加微信,拉你入群
下载APP
告MBA智库百科用户的一封信
亲爱的MBA智库百科用户: 过去的17年,百科频道一直以免费公益的形式为大家提供知识服务,这是我们团队的荣幸和骄傲。 然而,在目前越来越严峻的经营挑战下,单纯依靠不断增加广告位来维持网站运营支出,必然会越来越影响您的使用体验,这也与我们的初衷背道而驰。 因此,经过审慎地考虑,我们决定推出VIP会员收费制度,以便为您提供更好的服务和更优质的内容。 MBA智库百科VIP会员(9.9元 / 年,点击开通),您的权益将包括: 1、无广告阅读; 2、免验证复制。 当然,更重要的是长期以来您对百科频道的支持。诚邀您加入MBA智库百科VIP会员,共渡难关,共同见证彼此的成长和进步!
MBA智库百科项目组
2023年8月10日
此页面最后修订:15:17,2014年4月15日.
智库首页 - 百科首页 - 关于百科 - 客户端 - 人才招聘 - 广告合作 - 权利通知 - 联系我们 - 免责声明 - 友情链接
©2025 MBAlib.com, All rights reserved.
闽公网安备 35020302032707号
添加收藏
新建收藏夹
编辑收藏夹
20
公开 (该收藏夹未来有关注者后,将无法设为私密)
私密 (仅自己可见)
确定取消
意见反馈
问题分类
账号问题
操作问题
发票问题
订单问题(购买、充值、开通VIP)
内容纠错
产品建议
寻求帮助
投诉
其他
类型
色情
赌毒
枪支暴力
侵权(冒充他人,冒犯名誉,知识产权等)
广告与垃圾信息
不实信息
其他
反馈内容
添加图片(选填)0/9
联系方式
取消提交
提交成功
反馈结果请前往 MBA智库App 查看
(我的 > 帮助与反馈 > 我的反馈)
知道了
关闭
开通百科VIP免验证我已验证 |
10597 | https://ethz.ch/content/dam/ethz/special-interest/phys/theoretical-physics/itp-dam/documents/gaberdiel/proseminar_fs2018/07_Meng.pdf | Integer Quantum Hall Effect Severin Meng Proseminar in Theoretical Physics, Departement Physik ETH Z¨ urich May 28, 2018 Contents 1 The basics of the Integer Quantum Hall Effect 2 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 1.2 Conductivity and Resistivity in 2D . . . . . . . . . . . . . . . . . . . . . .
2 1.3 The Classical Hall Effect . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3 1.4 The Results of the Integer Quantum Hall Effect . . . . . . . . . . . . . . .
4 1.5 Quantum Treatment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5 1.5.1 Eigenstates and Eigenvalues . . . . . . . . . . . . . . . . . . . . . .
5 1.5.2 Degeneracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6 2 The Edge Picture 7 2.1 Edge States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7 2.2 The Role of Disorder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10 2.3 The Role of Gauge Invariance . . . . . . . . . . . . . . . . . . . . . . . . .
13 3 The Bulk Picture 15 3.1 The Kubo Formula for Hall Conductivity . . . . . . . . . . . . . . . . . .
15 3.2 Hall System on a Torus . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15 3.3 Particles on a Lattice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18 3.3.1 Example: The Chern Insulator . . . . . . . . . . . . . . . . . . . .
19 3.4 Particles on a Lattice in a Magnetic Field . . . . . . . . . . . . . . . . . .
21 4 Conclusion 24 1 1 The basics of the Integer Quantum Hall Effect 1.1 Introduction In a two-dimensional electron gas at a very low temperature (T < 4 K) subject to a strong perpendicular magnetic field (B ∼O(T)), the electrical conductivity takes on values that are fundamentally different from the predictions of classical physics. The transverse conductivity, also referred to as the Hall conductivity, takes quantised values: σxy = ν e2 2πℏ (1) where the value ν has been measured to very high precision to be an integer, hence the name integer quantum Hall effect. For the discovery of the integer quantum Hall effect, Klaus von Klitzing won the nobel prize in 1985.
The quantisation of the conductivity happens for dirty, many-particle mesoscopic sys-tems.
It is a collective quantum effect, like superconductivity.
The quantisation is universal in the sense that, to a large extent, it does not depend on microscopic details such as the exact value of the magnetic field, the purity of the sample, the electron mobility etc. It turns out that a topological property of the system is essential to this phenomenon, and surprisingly, disorder is also important.
We are going to look at two seemingly different explanations of the integer quantum Hall effect. In a finite system with edges, one can interpret the Hall current to be carried by excitations near the edge. These edge states can also be observed experimentally. They are chiral modes in the sense that they can only carry current in one fixed direction. At the same time, these edge modes are protected in the way that the number of edge modes cannot change under continuous changes in the system. This will be explained in section 2, The Edge Picture. For systems with no edges, i.e. bulk systems, one interprets the current to be running within the sample. Using linear response theory, one can derive a formula that guarantees a quantised Hall conductivity for a system fulfilling the right conditions. The system has to have an energy spectrum forming gapped bands, i.e. the electron states have to be periodic in a type of Brillouin zone. This will be explained in section 3, The Bulk Picture.
It turns out that both descriptions are two different manifestations of the topological properties of the system. The number of protected edge modes corresponds to a quan-tised Hall conductivity, and this number is connected to the Chern numbers associated with the gapped energy bands.
This exposition is largely based on the notes of D. Tong and the original literature [2, 3, 4, 5].
1.2 Conductivity and Resistivity in 2D The Hall effect is observed in two dimensional systems, we therefore work in the (x,y)-plane and only consider two dimensional current densities and electric fields: J = Jx Jy , E = Ex Ey (2) 2 Ohm’s law tells that the conductivity links the electric field to the current density in a linear equation J = σE (3) where σ is the conductivity. Its general form is not a scalar but a matrix. For an isotropic sample, the conductivity takes the following form: σ = σxx σxy −σxy σxx (4) The resistivity matrix ρ is simply the inverse of σ. A consequence of having a matrix conductivity is that one can have a system with both vanishing longitudinal resistivity and conductivity σxx = ρxx = 0. In the scalar case, a system with σxx = σ = 0 would be called a perfect insulator, while a system with ρxx = ρ = 0 would be called a perfect conductor. Having both at the same time seems unphysical, however one should not be fooled by this intuition, as in the matrix case, the inverse of the resistivity is given by ρxx = σxx σ2 xx+σ2 xy . The inverse therefore exists even in the case of σxx = 0 as long as the transverse conductivity σxy ̸= 0. A system with σxx = 0 is therefore not automatically a perfect insulator in the general case.
1.3 The Classical Hall Effect Let us first look at the classical Hall effect and then see how it differs from the quantum Hall effect. The classical Hall effect was discovered by Edwin Hall in 1879. The set-up is as follows: Electrons are restricted to move in the 2D (x,y)-plane while a constant magnetic field points in the z-direction.
By applying a constant electric field E, a constant current density J emerges. The Drude model used to describe the motion of a charged particle in this system goes as follows: mdv dt = −eE −ev × B −mv τ (5) where v is the particle’s velocity, −eE −ev × B is the Lorentz force acting on the particle of charge −e and mv τ is the friction term that models the interaction between the particle and the sample, where τ is the average time between two collision events called scattering time. A high value of τ implies a clean sample as collisions occur more rarely. By imposing the equilibrium condition dv dt = 0 and noting that J = −nev we get the following equation: 1 ωBτ −ωBτ 1 J = e2nτ m E (6) Comparing this with the definition of the resistivity matrix, one finds ρxx = m ne2τ , ρxy = B ne.
(7) The longitudinal resistivity is proportional to 1 τ , so a high value of the scattering time, i.e. a clean sample, yields a low longitudinal resistivity. The transverse resistivity is 3 independent of impurities, it depends on the electron density n and linearly on the magnetic field B. One can use this result to measure the electron density of a given sample by measuring its Hall resistivity. The resistivities are plotted as functions of the magnetic field in figure 1.
Figure 1: Resistivities of the classical Hall system, as functions of the magnetic field.
The blue line shows the longitudinal resistivity ρxx, it is constant in the magnetic field.
The red line denotes the Hall resistivity ρxy, it depends linearly on the magnetic field.
Image reproduced from .
1.4 The Results of the Integer Quantum Hall Effect The experimental set-up for the integer quantum Hall effect is similar to the classical case.
One constructs a two dimensional electron gas from a semiconductor heterostructure, for example a GaAs structure sandwiched in between two AlAs semiconductors. The electrons live in the conduction band of the GaAs, which is lower in energy than the con-duction band of the AlAs. They are therefore trapped to live within the layer of GaAs.
If one makes this GaAs layer sufficiently thin, the electrons are effectively confined to the two dimensional plane that is the GaAs structure.
One takes this 2D electron gas subject to a constant perpendicular magnetic field. At strong magnetic fields B ∼O(T) and low Temperatures T < 4 K the transverse resis-tivity ρxy takes on a plateau form: It is constant over a range of magnetic fields, and jumps to the next plateau once the magnetic field is changed too much. The longitudinal resistivity is zero whenever ρxy sits on a plateau and spikes when ρxy changes from one plateau to the next. The experimental results are shown in figure 2. The plateau values of ρxy are given by the following formula: ρxy = 2πℏ e2 1 ν , ν ∈Z (8) They are independent of the sample details and the precise value of the magnetic field.
The integer ν has been measured up to a precision of 1 part in a billion. While ρxy 4 takes on a plateau value, the Hall conductivity is simply given by the inverse, namely σxy = e2 2πℏν. In general, there would be a caveat to this: In an experiment, one measures resistance and not resistivity! The two are related via the dimensions of the sample, so the precision of measuring the resistivity is dictated by the precision of the measurement of the sample’s dimensions. In 2D however, the transverse Resistance and the transverse resistivity are exactly the same and do not depend on the dimensions of the sample: Rxy = Vy Ix = LEy LJx = Ey Jx = −ρxy (Jy = Ex = 0) (9) Comparing the results from the integer quantum hall effect (figure 2) to the results from the classical model (figure 1), one quickly sees that classical physics does not give us the right answer. We are therefore going to use a quantum mechanical approach to describe the system.
Figure 2: Resistivities of the integer quantum Hall system, as functions of the magnetic field. The red line shows the longitudinal resistivity ρxx, it is zero as long as ρxy sits on a plateau level and spikes whenever ρxx changes from one plateau to the next. The green line denotes the Hall resistivity ρxy, it takes on a plateau form, i.e. it is constant over a range of magnetic fields. Image reproduced from .
1.5 Quantum Treatment 1.5.1 Eigenstates and Eigenvalues The Hamiltonian for one electron in a 2D system subject to a perpendicular magnetic field Bˆ z is H = 1 2m(p + eA)2 (10) where A is the vector potential describing the magnetic field: ∇× A = Bˆ z. Note that the momentum operator p is the canonical momentum operator and differs from the 5 kinetic momentum due the magnetic field: p = m ˙ x −eA. Because we are neglecting all electron-electron interaction for this derivation, any many particle state can be con-structed from the product of single particle states. By choosing Landau gauge A = xBˆ y the Hamiltonian becomes H = 1 2m(p2 x + (py + eBx)2) (11) and is therefore translationally invariant in the y-direction. Consequently, the Hamil-tonian commutes with the y-momentum operator py, so one can motivate the following Ansatz for the energy eigenstates: ψky(x, y) = eikyyfky(x) (12) where the plane wave part makes the wavefunction an eigenstate of the y-momentum operator with eigenvalue ℏky. By restricting ourselves to the subspace of states with y-momentum ℏky, the Hamiltonian can be rewritten as Hky = 1 2mp2 x + mω2 B 2 (x + kyl2 B)2 (13) where ωB = eB m is the cyclotron frequency and lB = q ℏ eB is the magnetic length of the system. But this is the Hamiltonian for a displaced one dimensional harmonic oscillator, centered at x0 = −kyl2 B. The energy eigenvalues of the harmonic oscillator are given by En = ℏωB n + 1 2 , n ∈N, (14) they are called Landau levels. The energy eigenfunctions are given by the product of the plane wave and the 1D harmonic oscillator eigenfunctions: ψn,ky(x, y) ∼eikyyHn(x + kyl2 B)e−(x+kyl2 B)2/(2l2 B) (15) Part of this product is a Gaussian that localizes the eigenfunction around x0 = −kyl2 B on the scale of the magnetic length lB, while the eigenfunction is completely extended in the y-direction. The eigenfunctions are labelled by the harmonic oscillator label n and the momentum label ky. Noting that the energy does not depend on ky, one would expect a huge degeneracy in the energy levels!
1.5.2 Degeneracy First let us confine the sample to a finite rectangular region Lx × Ly. In y-direction we have plane waves, so this is equivalent to the particle in a box system in this direction.
As a result, the y-momenta become quantised: ky = 2π Ly Z, the distance in y-momentum space between two eingefunctions is therefore ∆ky = 2π Ly . The eigenfunctions are localised in x-direction around x0 = −kyl2 B, a logical constraint would be 0 ≤x0 ≤Lx, i.e. the 6 center of the eigenfunction should lie within the sample. Because the center variable x0 is directly linked to a y-momentum ℏky, this condition imposes a constraint on the allowed y-momenta: −Lx/l2 B ≤ky ≤0. The number of states per energy level can now be calculated: N = Ly 2π Z 0 −Lx/l2 B dky = eBA 2πℏ= Φ Φ0 (16) where Φ0 = 2πℏ e is the quantum of flux and Φ = AB is the total flux through the sample. So the number of states per Landau level is given by the number of flux quanta that go through the sample. One can also define the Landau level filling factor ν as ν = ne nΦ = ne2πℏ eB where ne is the electron density.
The sample is finite and has edges. The eigenstates are localized in one direction, so there should be states that live near the edge of the sample. It turns out that they have interesting properties that help to understand the Quantum Hall effect. These states are called edge states.
2 The Edge Picture 2.1 Edge States The existence of edge states can be motivated classically. In a classical Hall bar with a uniform perpendicular magnetic field, charged particles move in circular motion, the cyclotron orbit. Suppose that our particles are negatively charged and therefore move in counter-clockwise direction. If one places a particle at the right edge of the sample, the particle will do a half-orbit until it collides with the edge. It can’t leave the sample and it can also only do counter-clockwise rotational motion, so it will perform another half-orbit, but now it is further down on the edge, see figure 3. The macroscopic effect is a local current on either edge of the sample, with opposing directions, so the net current stays zero.
Figure 3: Classical description of the edge states. Particles at the edge of the sample collide with the edge when moving in the cylcotron orbit and result in an edge current.
Image reproduced from .
7 Edge states can also be treated quantum mechanically. To model the edge of the sample, one introduces a potential well that rises steeply at the edges, as in figure 4.
Figure 4: Model of the sample’s edges as a steeply rising potential. The red line shows the potential that is due to the boundary of the sample. Image reproduced from .
Since the states of the unperturbed system are localised in the x-direction, and by assum-ing that the potential varies slowly on the scale of the magnetic length, we can Taylor expand the potential around these center positions and drop all the constant terms. Plug-ging everything back into the Hamiltonian (on the subspace of ℏky-momentum states as we have expanded the potential around the corresponding centers) we get Hky = p2 x 2m + 1 2mω2 B kyl2 B + x 2 + x∂V ∂x (17) where ∂V ∂x is evaluated at x0 = −kyl2 B. This Hamiltonian can be rewritten to get another displaced harmonic oscillator plus some extra terms that come from completing the square: Hky = p2 x 2m + 1 2mω2 B kyl2 B + ∂V ∂x 1 mω2 B + x 2 − 1 2mω2 B ∂V ∂x 2 −kyl2 B ∂V ∂x (18) The extra terms are all constant on the ℏky-momentum subspace so they’ll transfer over to the energy eigenvalues, while the states will have the same form as the ones found earlier. The resulting energy eigenvalues are En(ky) = ℏωB n + 1 2 − 1 2mω2 B ∂V ∂x 2 −kyl2 B ∂V ∂x .
(19) They do depend on the y-momentum ℏky, so we can calculate a finite group velocity of the wavepackets: vy = 1 ℏ ∂E ∂ky = −1 eB ∂V ∂x (20) By looking again at the potential picture (figure 5) and using the fact that the states are still localised in x-direction, one sees that the states on the right edge propagate in negative y-direction and opposite for the left side.
These edge states are chiral, they can only move in one direction. In a regular wire, there 8 are electrons that move to the right and ones that move to the left. These right-movers and left-movers can coexist in the same spatial region. Upon reversing time right-movers become left-movers and vice-versa. Since they are in the same spatial region, the system looks the same. For the system here, the right-movers are spatially separated from the left-movers. Time reversal thus returns a system that looks like a mirror-image of the original system, it looks reversed. This asymmetry is due to the presence of the magnetic field.
Figure 5: Model of the sample’s edges as a steeply rising potential, where the states below the Fermi level EF are occupied. Blue circles model the centers of the wavefucntions of the occupied states. Image reproduced from .
By introducing an electro-chemical potential difference ∆µ between the two edges, we can calculate the arising current Iy: Iy = −e Ly Z dky Ly 2π vy(ky) = e 2πl2 B Z dx 1 eB ∂V ∂x = e 2πℏ∆µ (21) where we assumed one completely filled Landau level for the integration. By noting that the Hall voltage VH across the sample is given by the potential difference, one finds that the Hall conductivity takes the value of the first plateau level: VH = ∆µ e ⇒σxy = Iy VH = e2 2πℏ (22) The argument can be expanded for multiple filled Landau levels and one will get the corresponding conductivities of the plateaux.
As a side note, the potential introduced before does not have to be flat in the center region, it can be as random as it wants to be (see figure 6) as long as we can make the same arguments for the expansion as before. The resulting Hall current will be the same in any case.
There is another interesting property of the edge states; they are immune to back-scattering by impurities. In the classical picture, defects and impurities scatter incoming electrons into random directions, effectively decreasing the current. Quantum mechan-ically, the electron always has to occupy a state, so it can only be scattered in one of 9 the non-populated states. In our system, these states live above the Fermi level, see the empty black circles in figure 6. If an edge state is scattered into a state right above itself, the resulting Hall current will be the same. If it would scatter on to the other side of the sample, the net current would change. However, the width of the sample is macroscopic, so such scattering is highly suppressed. The Hall current carried by the edge states is therefore immune to back-scattering.
Figure 6: Model of the sample’s edges as a steeply rising potential, where the middle part seems random. The empty black circles denote unoccupied states right above the Fermi level. Image reproduced from .
The above argument might look convincing, but it does not give any reason as to why the conductivity is stable against change in the magnetic field. To see this, we need something else, we need to add disorder to our system. We will see that disorder is essential for the integer quantum Hall effect.
2.2 The Role of Disorder Experimentally, there is always disorder in a system. But before we look at the effects of disorder, let us see what happens without it. In the absence of disorder, the Hall system features continuous translational invariance. In the lab frame, the fields are as follows E = 0, B = Bˆ ez (23) where the current density J is zero. Transforming to a Lorentz-boosted reference frame, where the boost is along the y-direction at speed v, the fields become the following: E’ = γvBˆ ex ≈vBˆ ex, B’ = γBˆ ez ≈Bˆ ez (24) where γ ≈1 is valid for small v. The transformed current densitiy is J = nevˆ ey (25) where the minus sign due to the Lorentz boost cancelled the one coming from the negative charge of the electrons.
The electric field expressed in terms of the current density becomes E = 1 neJ × B ⇒ Ex Ey = B ne 0 1 −1 0 Jx Jy (26) 10 so the resulting resistivities and conductivities are ρxx = 0, ρxy = B ne, σxx = 0, σxy = ne B (27) which coincide with the classical transverse resistivities.
This Lorentz argument relies purely on translational symmetry, it does not care about any type of mechanics. In reality the result measured is not this classical result, so there has to be something that breaks translational symmetry, and disorder seems to do the job.
Quantum mechanically, the impurities can be modelled by a random potential V that is much smaller than the Landau level spacing: V ≪ℏωB. This potential breaks transla-tional symmetries, so it will lift the degeneracy of the Landau levels, see figure 7. The resulting Landau levels are thus broadened.
Figure 7: Densitiy of electron states. The left picture is without disorder, showing sharp Landau peaks. The right picture shows broadened peaks due to the effects of disorder.
Image reproduced from .
Another effect due to disorder is localisation. Figure 8 shows the top-view of a potential landscape on the Hall bar. The lines are equipotential lines, the ”+” sign denotes a potential peak and the ”-” sign a potential pit. The states derived before have defi-nite energy, they can’t change from one equipotential line to another because they can’t change their energy. States that live on equipotential lines around peaks and pits are therefore localised, they can’t move from one side of the sample to the other and hence can’t carry a current. Due to the steeply rising potential at the edge of the sample, extended states are guaranteed to exist at the edges. Using this information, one can add more detail to the picture of the state density, see figure 9. The inner part of the peak contains all the extended states while the shell consists of localised states.
Let us now look at the consequence of localisation.
Suppose that our system has a filling factor of ν = 1, i.e. one full Landau level. The Fermi level EF lies on top of the first peak. Remember the formula for the number of states per Landau level, N = BA Φ0 .
Now we decrease the magnetic field B slightly, so the number of states per Landau level decreases as well. But the number of electrons in the system stays constant, some of 11 them have to populate states in a higher Landau level. The Fermi level E′ F jumps into the next region of states, which is a region of localised states in the next Landau level, see figure 9. These states however do not carry a current, they can’t contribute to the conductivity! The conductivity thus stays constant over a range of magnetic fields, it stays constant as long as the Fermi level lies in a region of localised states, a mobility gap.
So disorder explains the stability to the magnetic field, it is essential to the whole effect.
Figure 8: Top view of the potential landscape. The lines are equipotential lines, they form closed loops around peaks (”+” signs) and pits (”-” signs). Image reproduced from .
Figure 9: Densitiy of electron states. The outer parts in a Landau peak are localised states, where extended states live in the inner part.
The Fermi level EF before the change in magnetic field lies right at the top of the first Landau level, indicating a filling factor of 1. The Fermi level E′ F after the change in the magnetic field lies in the region of localised states in the second Landau level. Image reproduced from .
In the next step we will look at a more sophisticated argument as to why the conductivity is quantized in the values of σxy = e2 2πℏν, ν ∈Z.
12 2.3 The Role of Gauge Invariance The following argument relies on a different geometry that can be achieved by bending the Hall bar into a disk shape, called a Corbino ring, that is shown in figure 10. We are still keeping the constant magnetic field going through the sample. We can introduce a flux Φ that goes through the hole in the disk, without affecting the magnetic field going through the disk surface. Let us assume that this flux can be changed adiabatically, i.e.
arbitrarily slowly.
Faraday’s law then tells us that a change in flux induces an electromotive force E. A radial current Ir would then allow us to calculate the Hall conductivity σH of the system, shown by the following equation: E = −∂Φ/∂t = −∆Φ/T, Ir = ∆Qr/T →σH = Ir E (28) where ∆Qr is the charge moved radially during the addition of a flux ∆Φ during a time T.
Figure 10: The Corbino geometry, where the states live in the red ring that is penetrated by a uniform magnetic field. The blue tube models the addition of flux through the hole.
Image reproduced from .
Now we will see that this radial current takes the appropriate values to get the correct Hall conductivity. The system has rotational invariance (we are ignoring disorder for the moment). By choosing the symmetric gauge, this symmetry is still apparent in the Hamiltonian. Remember in the previous derivation of the eigenstates, the Hamiltonian had translational invariance in the y-direction and we found plane waves in said direction.
We also found harmonic oscillators in x-direction that were localised.
By doing the calculation for this Corbino geometry in the symmetric gauge, one finds again plane waves in azimuthal direction and harmonic oscillators in radial direction: ψm,ν(⃗ r) ∼eimφfν(r −rm) (29) where fν is a harmonic oscillator eigenfunction of the level ν+1 . The center coordinate rm is given by rm = q 2l2 Bm that is now related to the angular momentum ℏm as opposed 13 to the x0 coordinate being related to the y-momentum.
Similar to the Aharonov-Bohm effect , adding one flux quantum leaves the system invariant. By adding this amount of flux adiabatically, one finds that the states increase their angular momentum by ℏ, they are mapped onto themselves. The center coordinate also increases from rm to rm+1, so the states effectively move outwards. Because the system comes back to itself after the addition of one flux quantum, the number of electrons in our system stays the same. It started with an integer number of electrons so it ends with an integer number. Therefore exactly one electron per filled Landau level is transferred from the inner to the outer edge. The resulting Hall conductivity takes the values observed in the experiment: ∆Φ = Φ0 →∆Qr = −ne, σH = ne Φ0 = n e2 2πℏ, (30) where n is the number of filled Landau levels. This argument involving the adiabatic change in flux is called the Laughlin flux insertion argument, as Robert B. Laughlin first came up with this idea .
We are now going to look at how disorder affects this argument. As seen before, disorder localises the states in the bulk but leaves extended states at the edge. The localised states are not affected by the addition of flux as it can be removed by a gauge transformation.
For extended states, this only works if the flux is an integer multiple of magnetic flux quanta, because they have to obey a single-valuedness condition: By changing φ 7→φ+2π the state should remain unchanged. The extended states still undergo spectral flow and map onto themselves under the adiabatic addition of integer number of flux quanta. It is still guaranteed that at least two extended states exist per Landau level, one on either edge. As long as all the extended states in a Landau level are populated, threading one flux quantum results in the radial current and the correct conductivity as we calculated before. The extended states are populated as long as the Fermi level lies in a mobility gap, which is possible due to the existence of disorder. Again, disorder and impurities are responsible for the stability of the Hall conductivity to changes in the magnetic field.
This completes the discussion of the integer quantum Hall effect within the edge picture.
Parts of it are heuristic, but the role of gauge invariance hints that there may be a deeper connection. In the next section, we are going to look at the bulk picture and we will find that the integer quantum Hall effect appears as a consequence of a topological property of the Hall system.
14 3 The Bulk Picture 3.1 The Kubo Formula for Hall Conductivity Before we can look at the topological property, we need to write the Hall conductivity in a different way, given by the Kubo formula. A full derivation of the Kubo formula can be found in D. Tong’s lecture notes about the quantum Hall effect . Here, only a rough sketch of the derivation will be given.
One starts with a multi-particle Hamiltonian H0 for a generic system that does not in-clude an electric field. We assume that we can solve this system, i.e. we know eigenstates |m⟩and eigenvalues Em such that H0 |m⟩= Em |m⟩. We then introduce a weak electric field E = −∂tA as a perturbation; ∆H = −J · A, where J is the current operator. Our goal is to calculate the expectation value of the current operator ⟨Jx⟩for the system in the non-degenerate ground state |0⟩. It is convenient to work in the interaction picture and expand the expression for ⟨Jx⟩up to linear order in ∆H. Comparing this new ex-pression with Ohm’s law Jx = σxxEx + σxyEy, one can filter out a formula for σxy. The precise derivation is part of a bigger story called linear response, but we are not going deeper into this. As a result, the expression for the Hall conductivity becomes σxy = i ℏ LxLy X n̸=0 ⟨0 | Jy | n⟩⟨n | Jx | 0⟩−⟨0 | Jx | n⟩⟨n | Jy | 0⟩ (En −E0)2 .
(31) This is the Kubo formula for Hall conductivity. The sum runs over all the excited multi-particle states, inside there are transition amplitudes from excited states over the current operators to the ground state, weighted by the energy difference of these states. So if one can solve the unperturbed system, this formula instantly gives an expression for the Hall conductivity of that system.
In the next section we will see a how a topological property leads to the quantisation of the Hall conductivity.
3.2 Hall System on a Torus For this section, we have to modify the geometry again. This time, the Hall bar is bent into a torus, which is a rectangle with opposite edges identified. The system is now made fully periodic, all edges have been removed, so there are no more edge states. There is still a homogeneous magnetic field perpendicular to the torus’ surface. (Note it is a thought experiment. In an actual experiment, this non-zero magnetic flux through a closed surface would require magnetic monopoles.) 15 Figure 11: The Hall system on a torus. The red and blue shapes indicate two different fluxes that can be added to the system. Image reproduced from .
Now we expand Laughlin’s flux threading argument: One can now insert two fluxes, one through either hole of the torus, as in figure 11. The Hamiltonian now depends on these two fluxes, H = H(Φx, Φy). Similar to the previous case, the system’s spectrum is only sensitive to the non-integer part of Φi/Φ0, i ∈{x, y}. This time, there are no edges, no electrons transfer from one side to another one. By the addition of one flux quantum, the system comes back to itself fully! Having zero flux is therefore the same as having one flux quantum, which makes the space of parameters of the Hamiltonian periodic: 0 ≤Φx < Φ0, 0 ≤Φy < Φ0 (32) This describes a torus T2 Φ, the parameter space of our system is toroidal. Let us now calculate the system’s Hall conductivity.
Let H0 describe the unperturbed system. Treat the addition of flux as a perturbation ∆H given by ∆H = − X i=x,y JiΦi Li (33) where Lx and Ly are the dimensions of the system. One can now use first order pertur-bation theory to calculate the many particle ground state of the perturbed system: ψ′ 0 = |ψ0⟩+ X n̸=ψ0 ⟨n | ∆H | ψ0⟩ En −E0 |n⟩ (34) where |ψ0⟩is the non-degenerate ground state of the unperturbed system. Consider now infinitesimal changes in flux and see how the state changes: ∂ψ′ 0 ∂Φi = −1 Li X n̸=ψ0 ⟨n|Ji|ψ0⟩ En −E0 |n⟩ (35) 16 The elements in this summation look similar to the Kubo formula, eq. (31)! One can actually rewrite the Kubo formula (and therefore the Hall conductivity) in terms of these states: σxy = iℏ ∂ψ′ 0 ∂Φy ∂ψ′ 0 ∂Φx − ∂ψ′ 0 ∂Φx ∂ψ′ 0 ∂Φy (36) This expression can be rewritten by pulling out one derivative for each one of the brakets, becoming σxy = iℏ ∂ ∂Φy ψ′ 0 ∂ψ′ 0 ∂Φx − ∂ ∂Φx ψ′ 0 ∂ψ′ 0 ∂Φy .
(37) This however looks similar to the field strength of a Berry connection.
Let us first parameterise the torus using the dimensionless variables θi = 2πΦi Φ0 , θi ∈[0, 2π) .
(38) Now, the Berry connection is defined as Ai(Φ) = −i ψ′ 0 ∂ ∂θi ψ′ 0 .
(39) The field strength, or curvature of the Berry connection is the curl of the connection: Fxy = ∂Ax ∂θy −∂Ay ∂θx = −i ∂ ∂θy ψ′ 0 ∂ψ′ 0 ∂θx − ∂ ∂θx ψ′ 0 ∂ψ′ 0 ∂θy (40) This term looks pretty much the same as our expression for the conductivity, eq (37).
The difference that in one case, the derivatives are with respect to θi instead of Φi, gives the right constants. As a result, the conductivity is given by the curvature: σxy = −e2 ℏFxy (41) This does not tell us much yet. However if one averages this expression over all fluxes in the toroidal parameter space T2 Φ, one gets a more interesting result: σxy = −e2 2πℏ Z T2 Φ dθ 2πFxy = −e2 2πℏC (42) where Z T2 Φ dθ 2πFxy = C ∈Z (43) is the first Chern number, and it is always an integer .
This result is the topological argument we have been looking for. The Hall conductivity is a Chern number, it can’t continuously change. It is therefore invariant under small changes of the Hamiltonian, which would result in small changes of the Berry curva-ture. One would always expect a graph of Chern numbers to form plateaux. Large 17 deformations correspond to energy level crossings, and our non-degeneracy assumption breaks down. This situation describes a transition between two Chern numbers, i.e. two plateau levels in the conductivity.
We have seen that for a system with continuous translational symmetry, a toroidal pa-rameter space led to the desired quantisation. However, we haven’t seen a reason as to why one should average the conductivity over the parameter space, and I do not know one either. It turns out that if one looks at particles on a lattice, the integral appears naturally, without taking any averages. Such a system was used originally to measure the quantum Hall effect. It only features discrete translational invariance, so one might expect some things to go wrong. In the next sections, we are going to look at this more closely.
3.3 Particles on a Lattice A lattice has a discrete periodicity given by the lattice vectors rn, and so does the corresponding lattice potential. The energy spectrum of such a system forms bands.
Due to Bloch’s theorem, we know that the wavefunctions in each band can be written in the Bloch form as ψk(r) = eik·ruk(r), uk(r) = uk(r + rn), ψk+G(r) = ψk(r) (44) where k is the lattice momentum and G is a reciprocal lattice vector. Most importantly, the wavefunction is periodic in the first Brillouin zone. For a rectangular lattice with lattice constants a and b, the Brillouin zone is rectangular as well.
But a periodic rectangle is a torus, so our wavefunction is periodic on a toroidal space T2 of lattice momenta: −π a < kx ≤π a, −π b < ky ≤π b (45) Let us now assume that the Fermi level EF lies in a gap between two energy bands, meaning that all the bands below the Fermi level are completely filled, and all the bands above are completely unoccupied. The Hamiltonian of such a system can be rewritten using Bloch’s theorem: H |ψk⟩= Ek |ψk⟩⇒e H(k) |uk⟩= Ek |uk⟩with e H(k) = e−ik·xHeik·x (46) The current operator is now given by J = e ℏ ∂e H ∂k (47) which is analogous to the more conventional J = −e ˙ x. The Kubo formula we have seen in section 3.1 can be rewritten in terms of single particle states. This is because all electron-electron interactions are neglected, so a multi-particle state is just a product of all the single-particle states. For states living in discrete energy bands with continuous lattice momenta, the Kubo formula becomes σxy = iℏ X Eα<EF <Eβ Z T2 d2k (2π)2 ⟨uα k|Jy|uβ k⟩⟨uβ k|Jx|uα k⟩−⟨uα k|Jx|uα k⟩⟨uα k|Jy|uα k⟩ (Eβ(k) −Eα(k))2 (48) 18 where the sum runs over all the energy bands and the integral runs over all the continuous lattice momenta in each band. By plugging the Ansatz for the current operator (47) into this Kubo formula, one gets σxy = ie2 2πℏ X α Z T2 d2k 2π [⟨∂yuα k|∂xuα k⟩−⟨∂xuα k|∂yuα k⟩] .
(49) Let us now look at the following U(1) Berry connection, defined over T2: Aα i (k) = −i uα k ∂ ∂ki uα k (50) The field strength associated to this connection is Fα xy = ∂Aα x ∂ky −∂Aα y ∂kx = −i ∂uα ∂ky ∂uα ∂kx − ∂uα ∂kx ∂uα ∂ky .
(51) By integrating this field strength over the Brillouin zone T2, one obtains the first Chern number, Cα = Z T2 d2k 2π Fα xy.
(52) By comparing equations (51) and (52) with the expression for the Hall conductivity (49), we get σxy = −e2 2πℏ X α Cα, Cα ∈Z.
(53) This is the TKNN formula, named after Thouless, Kohmoto, Nightingale and Nijs, which are the people that came up with it . It tells us that each isolated, filled band (labelled by α) contributes an integer part Cα to the Hall conductivity of the system. The set of Cα is sometimes called the TKNN integers. We have attributed this set of integers to a Hamiltonian, they define the Hall conductivity of the corresponding system. Similar to the case in section 3.2, this formula states that the Hall conductivity is a topological invariant of the system. It is robust to small changes of the system as it can’t change continuously.
We are going to see a more precise formulation of this statement in the end. Let us now look at an example, giving a hint at this more precise formulation.
3.3.1 Example: The Chern Insulator The system we are looking at has two distinct energy bands and the Fermi level lies between them, meaning the system is insulating. Even though there is no magnetic field, this system can have a non-zero Chern number, hence the name Chern insulator.
The system in k-space is modelled by a two-state Hamiltonian in the most general form, e H(k) = ⃗ E(k) · ⃗ σ + ϵ(k)1 (54) 19 where ⃗ σ are the Pauli matrices. The energy eigenvalues corresponding to this system are given by ϵ(k)±| ⃗ E(k)|. The fact that the system is insulating translates into ⃗ E(k) ̸= 0 ∀k.
One can therefore define the following three-vector ⃗ n: ⃗ n(k) = ⃗ E(k) | ⃗ E(k)| (55) This vector has unit length, but varies continuously as k varies over the Brillouin zone, it is a mapping from the torus to the (Bloch-) sphere: ⃗ n : T2 →S2 (56) The Chern number associated with this system is given by C = 1 4π Z T2 d2k ⃗ n · ∂⃗ n ∂kx × ∂⃗ n ∂ky (57) which can be interpreted as counting how many times the torus wraps around the sphere.
Figure 12: The three-vector ⃗ n is a mapping between the toroidal Brillouin zone and the Bloch sphere. Image reproduced from .
Let us now try to classify the maps from the torus to the sphere. In this case, there is a subtlety: maps from the torus to the sphere are isomorphic to maps from sphere to sphere. These maps are classified by the second homotopy group of the sphere, π2(S2).
It turns out that this group is isomorphic to the set of integers, π2(S2) = Z.
(58) Since our Hamiltonian is basically ⃗ E(k) which is represented by the sphere S2, this result tells us that any two systems that are deformable into each other (homotopic) have the same Chern number and hence the same Hall conductivity! A system with zero Hall conductivity therefore can’t be continuously transformed into a system with finite Hall conductivity because their Hamiltonians live in different homotopy classes. This again explains the robustness of the Hall-state, but just for this two-state system.
This example is a special case of a more general thing. There is a theorem stating that 20 two maps from the Brillouin zone to the space of gapped hermitian matrices (Hamilto-nians) are homotopic if and only if the they both have the same TKNN integers, and therefore have the same Hall conductivity, see . We will come back to this again in section 4.
In the next section we are going to look how things change when we introduce a magnetic field. It is not obvious that the Brillouin zone survives this addition, so we might want to check if the TKNN formula is still applicable.
3.4 Particles on a Lattice in a Magnetic Field So far we haven’t included a magnetic field into our discussion about particles on a lattice. In the experiment, this has been done, and from the edge picture we know that a magnetic field is crucial to the effect. The main goal of this treatment is to find a zone where the states of the system are periodic, we want to find an analogue to the Brillouin zone. If we have that, one can simply apply the TKNN formula. It is not obvious that there exists such a magnetic Brillouin zone as the Hamiltonian loses the discrete translational invariance of the lattice due to the vector potential arising from the magnetic field.
Let us work in the tight-binding approximation and assume a square lattice with lattice constant a. One can also find a Brillouin zone when working with a weak potential and a non-square lattice, see .
In the tight-binding approximation, the states are localised around the lattice points. These position eigenstates |x⟩are discrete, they are restricted to x = a(m, n) with m, n ∈Z.
The Hamiltonian is discrete as well.
For this approximation of a strong potential, the Hamiltonian allows states to hop from one lattice site to an adjacent one. It is given by H = −t X x X j=1,2 |x⟩⟨x + ej| −t∗X x X j=1,2 |x + ej⟩⟨x| (59) with e1 = (a, 0), e2 = (0, a) and t being the probability amplitude for hopping to occur.
The on-site energy has been set to zero, it is just an additive constant to the Hamiltonian.
Now we can add a magnetic field to the system, Bˆ z = ∇× A.
(60) Intuitively, a vector potential is part of the canonical momentum p. Canonical momen-tum is the rate at which the phase of a state changes, per unit length. For our set of discrete states, this length is fixed at a. So the change in the Hamiltonian is just a phase, its new form is H = −t X x X j=1,2 |x⟩e−ieaAj(x)/ℏ⟨x + ej| + h.c., (61) which has no discrete translational invariance anymore. This Hamiltonian should better be compatible with the Aharonov-Bohm effect, and indeed it is. Let us take a state and move it once around a unit cell (see figure 13), it will pick up a phase of e−iγ. This γ 21 can be calculated from the form of the Hamiltonian, and it is γ = ea ℏ(A1(x) + A2(x + e1) −A1(x + e2) −A2(x)) ≈ea ℏ ∂A2 ∂x1 −∂A1 ∂x2 (62) where in the second step, we have approximated finite differences with actual derivatives (remember our space coordinate is discretised). But the expression in the bracket is just the curl of the vector potential, so γ ≈ea ℏ ∂A2 ∂x1 −∂A1 ∂x2 = ea2B ℏ (63) where a2B is the magnetic flux through the unit cell, so this really is the Aharonov-Bohm phase.
Figure 13: Schematic view of the square lattice. A state moving along a lattice site picks up a phase proportional to the vector potentials written above each line. Image reproduced from .
Now that we have a Hamiltonian, we want to find eigenstates and eigenvalues. Our goal is to find operators that commute with the Hamiltonian and then to find a common set of eigenstates. Let us define the modified magnetic translation operators: e Tj = X x |x⟩e−iea e Aj(x)/ℏ⟨x + ej| (64) The e Aj is not the same vector potential as before, but it fulfils ∂k e Aj = ∂jAk. These operators have the following commutation relations: [H, e Tj] = 0, e T2 e T1 = eieΦ/ℏe T1 e T2 (65) The first commutation relation can be seen by introducing the usual magnetic translation operator (which replaces e Aj by Aj). The Hamiltonian is then given by a superposition of these operators, and they commute with their modified counterparts. The second relation we don’t like quite as much yet. It would be nicer if [ e T1, e T2] were zero as well, because in that case one could find simultaneous eigenstates of all three operators. For this to happen we need to take the flux per unit cell to be a rational multiple of the flux 22 quantum: Ba2 = Φ = p qΦ0, with p, q integers that are relatively prime. Then, one can rise the modified magnetic translation operators to an appropriate power and one gets [ e T n1 1 , e T n2 2 ] = 0 (66) whenever p qn1n2 ∈Z, in particular for n1 = q, n2 = 1. Of course they still commute with the Hamiltonian. So a set of commuting operators is given by H, e T q 1 , e T2 and we can now move on to the eigenstates. Let us label these states by their magnetic lattice momentum k: |k⟩, k = (k1, k2) (67) The eigenvalue equations then become H |k⟩= E(k) |k⟩, e T q 1 |k⟩= eiqk1a |k⟩, e T2 |k⟩= eik2a |k⟩.
(68) We see that the ki are again periodic: −π qa < k1 ≤π qa and −π a < k2 ≤π a (69) The zone of periodicity is called the magnetic Brillouin zone, and it again forms a Torus T2! It is smaller by a factor of q compared to the conventional Brillouin zone. The corresponding unit cell (enlarged by a factor of q) contains p magnetic flux quanta.
Finding the Brillouin zone hence boils down to finding a unit cell containing an integer number of magnetic flux quanta! The number of states per magnetic Brillouin zone is given by L1L2/qa2. This suggests that the energy spectrum decomposes into q bands.
Now we look at the degeneracy of the states. Let us pay closer attention to the state e T1 |k⟩which is not an eigenstate of e T1. From the calculations before, we know that e T1 commutes with the Hamiltonian, [H, e T1] = 0. We have H e T1 |k⟩= E(k) |k⟩, e T2 e T1 |k⟩= eieΦ e T1 e T2 |k⟩= ei(2πp/q+k2a) e T1 |k⟩.
(70) From equation (68) we know that e T2 |k⟩= eik2a |k⟩, so e T1 |k⟩∼|(k1, k2 + 2πp/qa)⟩ (71) and it also has the same energy as |(k1, k2)⟩. This results in a q-fold degeneracy in a given band. One can now go on and calculate the energy eigenvalues and the Chern numbers. However, one might expect to run into some issues, as each isolated band has to contribute an integer number of e2 2πℏto the Hall conductivity, and the number of bands q can become arbitrarily large by changing the magnetic flux Φ by an arbitrarily small amount. Also, if the flux is given by an irrational multiple of Φ0, the above calculation doesn’t work out and the spectrum of the Hamiltonian forms a Cantor set. But the experiment shows the conductivity to remain constant over a range of magnetic flux, no rapid behaviour is observed. Nontheless, the calculation works out, but it is not given here as it is rather complicated. It can be found in the original TKNN paper and in the book Field Theories of Condensed Matter Physics by Fradkin .
23 Now we have all that we need to apply the TKNN formula (53): There exists a toroidal Brillouin zone and the spectrum decomposes into bands. As a result, the system has a quantised Hall conductivity. So we found the quantised conductivity for the Hall system in a picture without edges! This concludes the discussion of the integer quantum Hall effect within the bulk picture.
4 Conclusion Now that we have found the quantised conductivity in the lattice model, one might ask what exactly the topological property of the Hall system is. There is a theorem that answers this question, it was briefly mentioned in section 3.3.1. It goes as follows: Let H1(k), H1(k): T2 →[space of Hamiltonian matrices] be two maps from the (magnetic) Brillouin zone (which is toroidal) to the space of gapped, periodic, hermitian matrices, i.e. Hamiltonians that describe the system, the band structure. Then, these two maps are continuously deformable into each other (homotopic) if and only if they have the same TKNN integers. Remember the TKNN formula giving the Hall conductivity for such a system, σxy = −e2 2πℏ X α Cα, Cα ∈Z.
(72) This theorem tells us, that if two systems are continuously deformable into each other, they have the same Hall conductivity. If they have different Chern numbers (and hence a different conductivity), they are not deformable into each other, they live in different homotopy classes. It also shows us that the topological property lies in the connection between the Brillouin zone and the band structure (which is H(k)).
At the same time, we found a quantised Hall conductivity in the edge picture. These edge modes are the counterpart to the quantised conductivity, their robustness is due to this topological property of the Hamiltonian. The topology is physically manifest in the number of protected edge modes of the system. The edge modes exist because of the topological indices of the system, the TKNN integers. This correspondence is also known as the bulk-edge correspondence.
24 References D. Tong, ”The Quantum Hall Effect”, arXiv:1606.06687.
B.I. Halperin, ”Quantized Hall conductance, current-carrying edge states, and the existence of extended states in a two-dimensional disordered potential”, Phys. Rev.
B 25, 2185 (1982).
R.B. Laughlin, ”Quantized Hall conductivity in two dimensions”, Phys. Rev. B 23, 5632 (1981).
D.J. Thouless, M. Kohmoto, M. Nightingale, M. den Nijs, ”Quantized Hall Conduc-tance in a Two-Dimensional Periodic Potential”, Phys. Rev. Lett. 49, 405 (1982).
J.E. Avron, R. Seiler, B. Simon, ”Homotopy and Quantization in Condensed Matter Physics”, Phys. Rev. Lett. 51, 51 (1983).
The University of Manchester, ”Advanced Quantum Mechanics 2” [Online], N. Manton, P. Sutcliffe, ”Topological Solitons”, Cambridge University Press (2004).
E. Fradkin, ”Field Theories of Condensed Matter Physics”, University of Illinois (2013).
25 |
10598 | https://www.desmos.com/calculator/zbsemgwpkm | Arc Length & Sector Area | Desmos
Loading...
Arc Length & Sector Area
Save Copy
Log In Sign Up
Expression 1: "a" equals 164 a=1 6 4
0 0
360 3 6 0
1
Expression 2: "r" Subscript, 1 , Baseline equals 1.9 r 1=1.9
0 0
3 3
2
Expression 3: left parenthesis, StartFraction, "a" Over 360 , EndFraction , right parenthesis left parenthesis, 2 pi "r" Subscript, 1 , Baseline , right parenthesis a 3 6 02 π r 1
equals=
5.4 3 8 4 4 5 9 4 9 2 1 5.4 3 8 4 4 5 9 4 9 2 1
3
Expression 4: left parenthesis, StartFraction, "a" Over 360 , EndFraction , right parenthesis left parenthesis, pi "r" Subscript, 1 , Baseline squared , right parenthesis a 3 6 0π r 2 1
equals=
5.1 6 6 5 2 3 6 5 1 7 5 5.1 6 6 5 2 3 6 5 1 7 5
4
hidden
5
Expression 10:
10
11
powered by
powered by
"x"x
"y"y
"a" squared a 2
"a" Superscript, "b" , Baseline a b
7 7
8 8
9 9
divided by÷
functions
((
))
less than<
greater than>
4 4
5 5
6 6
times×
| "a" ||a|
,,
less than or equal to≤
greater than or equal to≥
1 1
2 2
3 3
negative−
A B C
StartRoot, , EndRoot
pi π
0 0
..
equals=
positive+ |
10599 | https://www.teacherspayteachers.com/browse?search=unit%20rates%20exit%20ticket | Unit Rates Exit Ticket | TPT
Log InSign Up
Cart is empty
Total:
$0.00
View Wish ListView Cart
Grade
Elementary
Preschool
Kindergarten
1st grade
2nd grade
3rd grade
4th grade
5th grade
Middle school
6th grade
7th grade
8th grade
High school
9th grade
10th grade
11th grade
12th grade
Adult education
Resource type
Student practice
Independent work packet
Worksheets
Assessment
Graphic organizers
Task cards
Flash cards
Teacher tools
Classroom management
Teacher manuals
Outlines
Rubrics
Syllabi
Unit plans
Lessons
Activities
Games
Centers
Projects
Laboratory
Songs
Clip art
Classroom decor
Bulletin board ideas
Posters
Word walls
Printables
Seasonal
Holiday
Black History Month
Christmas-Chanukah-Kwanzaa
Earth Day
Easter
Halloween
Hispanic Heritage Month
Martin Luther King Day
Presidents' Day
St. Patrick's Day
Thanksgiving
New Year
Valentine's Day
Women's History Month
Seasonal
Autumn
Winter
Spring
Summer
Back to school
End of year
ELA
ELA by grade
PreK ELA
Kindergarten ELA
1st grade ELA
2nd grade ELA
3rd grade ELA
4th grade ELA
5th grade ELA
6th grade ELA
7th grade ELA
8th grade ELA
High school ELA
Elementary ELA
Reading
Writing
Phonics
Vocabulary
Grammar
Spelling
Poetry
ELA test prep
Middle school ELA
Literature
Informational text
Writing
Creative writing
Writing-essays
ELA test prep
High school ELA
Literature
Informational text
Writing
Creative writing
Writing-essays
ELA test prep
Math
Math by grade
PreK math
Kindergarten math
1st grade math
2nd grade math
3rd grade math
4th grade math
5th grade math
6th grade math
7th grade math
8th grade math
High school math
Elementary math
Basic operations
Numbers
Geometry
Measurement
Mental math
Place value
Arithmetic
Fractions
Decimals
Math test prep
Middle school math
Algebra
Basic operations
Decimals
Fractions
Geometry
Math test prep
High school math
Algebra
Algebra 2
Geometry
Math test prep
Statistics
Precalculus
Calculus
Science
Science by grade
PreK science
Kindergarten science
1st grade science
2nd grade science
3rd grade science
4th grade science
5th grade science
6th grade science
7th grade science
8th grade science
High school science
By topic
Astronomy
Biology
Chemistry
Earth sciences
Physics
Physical science
Social studies
Social studies by grade
PreK social studies
Kindergarten social studies
1st grade social studies
2nd grade social studies
3rd grade social studies
4th grade social studies
5th grade social studies
6th grade social studies
7th grade social studies
8th grade social studies
High school social studies
Social studies by topic
Ancient history
Economics
European history
Government
Geography
Native Americans
Middle ages
Psychology
U.S. History
World history
Languages
Languages
American sign language
Arabic
Chinese
French
German
Italian
Japanese
Latin
Portuguese
Spanish
Arts
Arts
Art history
Graphic arts
Visual arts
Other (arts)
Performing arts
Dance
Drama
Instrumental music
Music
Music composition
Vocal music
Special education
Speech therapy
Social emotional
Social emotional
Character education
Classroom community
School counseling
School psychology
Social emotional learning
Specialty
Specialty
Career and technical education
Child care
Coaching
Cooking
Health
Life skills
Occupational therapy
Physical education
Physical therapy
Professional development
Service learning
Vocational education
Other (specialty)
Unit Rates Exit Ticket
810+results
Sort by: Relevance
Relevance
Rating
Rating Count
Price (Ascending)
Price (Descending)
Most Recent
Sort by: Relevance
Relevance
Rating
Rating Count
Price (Ascending)
Price (Descending)
Most Recent
Search
Grade
Subject
Supports
Price
Format
All filters
Filters
Grade
Elementary
Preschool
Kindergarten
1st grade
2nd grade
3rd grade
4th grade
5th grade
Middle school
6th grade
7th grade
8th grade
High school
9th grade
10th grade
11th grade
12th grade
Higher education
Adult education
More
Not grade specific
Subject
Art
Visual arts
English language arts
Balanced literacy
Close reading
ELA test prep
Grammar
Informational text
Literature
Phonics & phonological awareness
Poetry
Reading
Reading strategies
Short stories
Spelling
Vocabulary
Writing
Writing-essays
Other (ELA)
Health
Math
Algebra
Algebra 2
Applied math
Arithmetic
Basic operations
Calculus
Decimals
Financial literacy
Fractions
Geometry
Graphing
Math test prep
Measurement
Mental math
Money math
Numbers
Order of operations
Place value
Precalculus
Statistics
Other (math)
Performing arts
Instrumental music
Music
Music composition
More
Physical education
Science
Anatomy
Astronomy
Basic principles
Biology
Chemistry
Earth sciences
Engineering
Environment
Family consumer sciences
General science
Physical science
Physics
Other (science)
Social emotional
Character education
Classroom community
School counseling
Social emotional learning
Social studies
African history
Asian studies
Civics
Economics
European history
Geography
Government
Native Americans
Psychology
U.S. history
World history
Other (social studies)
World languages
Spanish
For all subjects
Not subject specific
Price
Free
Under $5
$5-10
$10 and up
On sale
Format
Digital
Other (digital)
Easel
Easel Activities
Google Apps
Image
Interactive whiteboards
Activboard Activities
SMART Notebook
More
Microsoft
Microsoft PowerPoint
Microsoft Word
PDF
Resource type
Classroom decor
Bulletin board ideas
Posters
Word walls
Forms
Classroom forms
Teacher tools
Lessons
Classroom management
Homeschool curricula
Lectures
Outlines
Reflective journals for teachers
Rubrics
Teacher manuals
Thematic unit plans
Tools for common core
Unit plans
Yearlong curriculum
Printables
Clip art
More
Hands-on activities
Activities
Centers
Projects
Internet activities
Bell ringers
Escape rooms
Games
Laboratory
Project-based learning
Research
Simulations
WebQuests
Instruction
Handouts
Interactive notebooks
Scaffolded notes
Student assessment
Assessment
Critical thinking and problem solving
Study guides
Study skills
Test preparation
Student practice
Independent work packet
Worksheets
Flash cards
Graphic organizers
Homework
Task cards
Workbooks
Standard
Theme
Seasonal
Autumn
Spring
Summer
Winter
Holiday
Thanksgiving
More
Audience
TPT sellers
Homeschool
Staff & administrators
More
Programs & methods
Programs
Advanced Placement (AP)
Montessori
More
Supports
Special education
Data
Life skills
Neurodiversity
Social skills
Visual supports
Specialty
Career and technical education
Coaching
Professional development
Vocational education
More
Unit Rates Guided Notes Homework Warm Ups Exit Tickets
Created by
Jessica Barnett Math
This packet is full of thorough and easy-to-follow pages perfect for teaching this skill! This resource covers writing rates, determining the unit rate, and determining the better buy. WHAT'S INCLUDED2 WARMUPS 2 EXIT TICKETS2 PAGES OF GUIDED NOTES - I DO, WE DO, YOU DO FORMAT3 PAGES OF DIFFERENTIATED HOMEWORK - LEVELS A, B, & CQUICK ASSESSMENT ANSWER KEYSGRAB A FULL YEAR OF 6TH GRADE MATH RESOURCES HERE!GRAB A FULL YEAR OF 7TH GRADE MATH RESOURCES HERE!The purchase of this resource authorizes
6 th - 8 th
Math
CCSS
7.RP.A.1
Also included in:7th Grade Math Curriculum Mega Bundle Worksheets Activities Homework
$3.00
Original Price $3.00
Rated 4.84 out of 5, based on 31 reviews
4.8(31)
Add to cart
Wish List
Unit Rates Exit Slips 6th Grade Math
Created by
Brandy Shoemaker
Assess your students' mastery of targeted skills using this handy set of exit slips/quizzes on rates! This resource includes five-question quick checks with a variety of possible uses for your lessons on finding unit rates, unit price, rate of speed, and problem solving using rates. No prep, low ink, saves paper! Options for use in your instruction:Exit slips following a lessonBell work or bellringer slips to open a lessonPre-assessments to guide instructional plansQuizzes to gauge mastery and
6 th
Math, Numbers, Other (Math)
CCSS
6.RP.A.2
$3.00
Original Price $3.00
Rated 4.86 out of 5, based on 14 reviews
4.9(14)
Add to cart
Wish List
Unit Rates and Percents Worksheets and Exit Tickets Unit 4 6th Grade iReady Math
Created by
MB Creations
Teach 6th-grade students how to solve problems with rates and percents with these math worksheets, exit tickets, and vocabulary activities. Whether you teach iReady Math or another curriculum, these print and digital problems align with Common Core State Standards and prepare students for standardized testing. Assign the lesson checks about percents as homework or share in small groups. Present these rigorous math questions in PowerPoint or Google Classroom. Lessons in 6th Grade iReady Math Uni
6 th
Algebra, Math, Other (Math)
CCSS
6.RP.A.3
, 6.RP.A.3a
, 6.RP.A.3b
+2
Bundle (4 products)
$15.00 Original Price $15.00
$13.50
Price $13.50
Rated 4.83 out of 5, based on 6 reviews
4.8(6)
Add to cart
Wish List
Unit Rates Guided Notes Pracitce Homework Exit Tickets
Created by
Eugenia's Learning Tools
With this product you will receive ready to print unit rate practice to help support your lessons as students develop a better understanding of proportional relationships. Students will practice calculating unit rate, using unit rate, dealing with complex fractions, and finding the better buy. Product includes: Notes for Math JournalPractice WorksheetsExit TicketsQuizzesAnswer KeysNeed more unit rate practice? Bundle is available!
6 th - 7 th
Basic Operations, Math, Other (Math)
Also included in:Unit Rates Activities Bundle | Proportionality Unit Classwork Practice
$4.75
Original Price $4.75
Rated 5 out of 5, based on 4 reviews
5.0(4)
Add to cart
Wish List
Unit Rate Activities 6th Grade Math Warm Up Exit Ticket Practice Worksheets
Created by
Math All Day
Finish your lesson plans in a flash with 3 no prep activities on unit rates with for 6th grade math. Warm Up Problems - start class with a routine and set your students up for success for the day. Independent or Partner Practice or Homework - 8 problems with various unit rate problems. Exit Ticket - end class with a routine and gather feedback on student progress. Grab the mini bundle here to use these activities with task cards for even more practice! This product includes:3 printable pag
6 th
Math, Numbers, Other (Math)
CCSS
6.RP.A.2
, 6.RP.A.3b
Also included in:Unit Rate Activities 6th Grade Math Task Cards with Warm Up Practice Worksheets
$3.00
Original Price $3.00
Rated 4.67 out of 5, based on 3 reviews
4.7(3)
Add to cart
Wish List
Writing Ratios and Finding Unit Rate from Ratio Tables Riddle with Exit Tickets
Created by
Level Their Learning
In this product, students will write a ratio from a ratio table, and then they will find the unit rate from ratio tables. 13 problems for students to write ratios from ratio tables and to find the unit rate from ratio tables + 1 box has them create their own and solve! (Higher Order Thinking Skills!!) No decimals are used. I used with kids on target when teaching writing ratios from a ratio table and finding the unit rate from a ratio table! There are also 2 exit tickets on writing ratios from a
6 th - 7 th
Math
CCSS
6.RP.A.1
, 6.RP.A.2
, 6.RP.A.3
+3
Also included in:6th Grade Year Long Activity Bundle- Riddles for a Whole Year!
$2.00
Original Price $2.00
Rated 5 out of 5, based on 1 reviews
5.0(1)
Add to cart
Wish List
Grade 7 Math Exit Ticket 7.RP.1 - Compute Unit Rates
Created by
Professor C Academy
This exit ticket helps students practice computing unit rates associated with ratios of fractions. Intro: Assess students' understanding of unit rates through real-world scenarios. Quick Review: Reinforce the concept of unit rates and complex fractions. Teacher Tips: - Encourage students to visualize ratios with diagrams. - Provide examples using different units for clarity. - Remind students to simplify complex fractions. Inclusions: - Sample problems for practice - S
5 th - 8 th
Algebra, Other (Math)
$1.00
Original Price $1.00
Add to cart
Wish List
Grade 6 Math Exit Ticket 6.RP.2 - Understanding Unit Rates
Created by
Professor C Academy
This exit ticket helps students grasp the concept of unit rates associated with ratios. - Intro: Engage students in understanding unit rates through real-life examples. - Quick Review: Recap the definition of a unit rate and its application in ratios. - Teacher Tips: Encourage students to use rate language in everyday contexts. - Includes: Sample problems; space for student responses; and a reflection question.
5 th - 8 th
Algebra, Other (Math)
$1.00
Original Price $1.00
Add to cart
Wish List
Winter Math Activity Unit Rate bulletin Board | Door Decoration | Exit Ticket
Created by
Mrs Padillas Math Class
Make your winter bulletin board pop with this easy and ready to use exit ticket, warm up, early finisher work, station, holiday activity, etc. Students can color the mugs and post in a bulletin board or around the room. Can be use as a warm up, exit ticket or station activity. Winter themed 6 Exit ticket - Find the Unit Rate ImportantYou can receive TPT store credits to use on future purchases by leaving feedback on products you buy! Just click on "My Purchases" under "Buy"! Connect with
6 th - 8 th
Arithmetic, Basic Operations, Math
CCSS
7.RP.A.1
Also included in:7th Grade Exit Tickets | Warm ups | Growing Bundle
$2.00
Original Price $2.00
Rated 5 out of 5, based on 1 reviews
5.0(1)
Add to cart
Wish List
Unit Rate with Fractions POD/Warm-up/Exit Ticket 7.RP.1
Created by
Jami King
Problem of the day or Warm up or used for an exit ticket. Students must -Find Unit Rate -Draw a picture representation -Make a table -Tie a Division problem to the picture and solve! Shows several methods/ways of attaining the same answer and representing it in many ways. Many students know the answer immediately, but when they have to represent with a picture or a division problem they get stuck. Can be individual or whole group instructed. Answer Document coming! 12 mins per mile 4/
6 th - 8 th
Algebra, Fractions, Math Test Prep
$1.25
Original Price $1.25
Rated 5 out of 5, based on 3 reviews
5.0(3)
Add to cart
Wish List
Unit Rate Better Buy Do Now Exit Slip Worksheet
Created by
Ms Novak in the Middle
This worksheet can be used as a do now or exit slip to check students understanding of better buy and unit rate. Students are given four different peanut butter brands with their price per ounce. Students are asked to find the unit rate of all four brands. After finding the unit rate of all four brands students are asked to identify the better buy and explain why it is the better buy. I teach for a double period every day. I used these slips as a check in between periods. This slip allowed me t
6 th - 7 th
Algebra, Applied Math, Math
CCSS
7.RP.A.1
Also included in:Ratios and Proportions Digital and Printable Activity Bundle
$1.50
Original Price $1.50
Add to cart
Wish List
Ratios &Unit Rates | Warm Ups | Exit Ticket | 6th Grade Math Worksheets
Created by
Pin Point Resources
These 6th grade math slides and worksheets focused on equivalent ratios, unit rates, tables, graphs, and nonequivalent ratios. These 6 problems are the perfect combination of worksheet and guided math talks. Choose between using the problems for warm ups, exit tickets, small group or whole group discussion. It’s the perfect discussion start for an entire unit on ratios and rates. Styled as a low floor, high ceiling math activity, students of all abilities will engage and increase their confiden
5 th - 7 th
Fractions, Graphing, Numbers
CCSS
6.RP.A.1
, 6.RP.A.2
, 6.RP.A.3
FREE
Add to Google Drive
Wish List
Unit Rates Choice Board Worksheet | Exit Ticket | Zero Prep | Homework
Created by
Easy as Pi Learning
Enhance student engagement and control with the Unit Rates Choice Board Activity! This versatile tool can be used as a time filler, exit ticket, homework assignment, sub plan, or partner activity. Ideal for teachers who want to decide the amount of work/time students invest in the assignment, this choice board offers endless options. Use it as a quick formative assessment by having students pick fewer problems, or incentivize them by offering ways to lower the number of problems.This activity fo
6 th - 10 th
Algebra, Basic Operations, Math
CCSS
6.RP.A.2
, 7.RP.A.1
, 7.RP.A.2
Also included in:Secondary Math Skills Choice Board Bundle | Zero Prep | Differentiate | Homework
$2.00
Original Price $2.00
Rated 5 out of 5, based on 1 reviews
5.0(1)
Add to cart
Wish List
Finding Constant of Proportionality | Unit Rate From a Graph Riddle | Exit Slips
Created by
Level Their Learning
In this engaging riddle, students will have to write a ratio and find the unit rate from a graph (constant of proportionality). 10 problems for students to write ratios and find the unit rate from a graph (constant of proportionality) + 2 spots for them to create their own graph and find the unit rate (constant of proportionality) from it! No decimals are used. I made this for kids on target when teaching how to write a ratio and find the unit rate from a graph (constant of proportionality). TWO
7 th
Math
CCSS
7.RP.A.1
, 7.RP.A.2
, 7.RP.A.2b
Also included in:Finding Constant of Proportionality | Unit Rate From A Graph Bundle
$2.00
Original Price $2.00
Add to cart
Wish List
Writing Ratios | Finding the Unit Rate from Ratio Tables Riddle and Exit Tickets
Created by
Level Their Learning
In this engaging riddle activity, students will have to write a ratio from the ratio table and then find the unit rate from the ratio table. 10 problems for students to write a ratio from a ratio table and to find the unit rate from the ratio table + 2 spots for students to create their own ratio tables and find the unit rate from that ratio table (Higher Order Thinking Skills!) No decimals are used in these ratio tables. I made this for kids on target when teaching writing ratios from ratio tab
6 th - 7 th
Math
CCSS
6.RP.A.1
, 6.RP.A.2
, 6.RP.A.3
+3
Also included in:6th Grade Year Long Activity Bundle- Riddles for a Whole Year!
$2.00
Original Price $2.00
Add to cart
Wish List
Unit Rates Guided Notes | Exit Ticket | Math
Created by
Small Town Math
Simple and easy Unit Rates Guided Notes and Exit Ticket. Perfect for a quick lesson for upper elementary or early middle school math classroom. Able to use resource as an introduction or refresh on how to calculate unit rates. Students needs to be able to have some understanding of rates and how to solve before using this product. I personally use during my math workshop model in small groups for individualized learning. Everything is done for you just print and implement in your classroom.
4 th - 7 th
Applied Math, Math, Other (Math)
CCSS
5.MD.A.1
, 6.RP.A.2
, 6.RP.A.3
+1
Also included in:Math Guided Notes & Exit Ticket BUNDLE | Middle School Math
$1.00
Original Price $1.00
Add to cart
Wish List
Middle School Daily Math Exit Slip/Warm-Up:Unit Rates and Converting Rates
Created by
Master Mathematics
This resource is great for an exit slip or warm-up. There is one constructed response problem for each day of the week. The topics included in this resource are calculate unit rates, simplifying complex fractions and converting rates. This resource would also be great to use for a constructed response and practice justifying answers. I have also included a worksheet for students with tips on helping them justify their answers more effectively. This resource was designed to encourage my students
6 th - 12 th
Arithmetic, Basic Operations, Math
CCSS
7.RP.A.1
, 7.RP.A.2
, 7.RP.A.2a
$0.99
Original Price $0.99
Add to cart
Wish List
Unit Rates Guided Notes, Practice, Exit Ticket | No Prep
Created by
IncrediBell Math
Guided notes, independent practice, and an exit ticket for unit rates. There are two guided notes worksheets to choose from. Both start with creating a table and then one uses a proportion to set up a one-step equation and the other uses a proportion and scale factor. This is a ready to use resource, you just need to print! This can be used whole group or small group. This resource includes: ⭐ Guided notes using a proportion and cross products to write a one-step equation and 4 example pr
6 th - 7 th
Math, Math Test Prep
CCSS
7.RP.A.1
$2.00
Original Price $2.00
Add to cart
Wish List
Unit Rates Exit Ticket
Created by
Middle School Queens
DescriptionThis 5 question Google Forms Exit Ticket is a great end of class activity to see what your students learned about reflecting points during your lesson. It is completely editable and can be used for online learning or in the classroom. Steps to use:Sign in to your Google account and clink on the link. The link will prompt you to make a copy.You can then rename the file and save to your Google Drive.Customer ServiceIf you have questions or problems with this assignment, feel free to e
6 th
Math
CCSS
6.RP.A.2
Also included in:Unit Rates Bundle
$1.50
Original Price $1.50
Rated 5 out of 5, based on 1 reviews
5.0(1)
Add to cart
Wish List
Ratios, Rates, Proportions and Percents Unit 6th Grade Math Curriculum
Created by
Beyond the Worksheet with Lindsay Gould
⭐️⭐️⭐️ This ultimate 6th grade math ratios, rates, proportions and percent unit is COMPLETELY EDITABLE and is designed to help facilitate the needs of your students! ✅ This unit includes six multi-day lessons that cover the following skills: Ratios and Rates (including tape diagrams)Proportions and ScaleUnits of MeasurePercent of a NumberFractions, Decimals and Percents RelationshipsCompare and Order Fractions, Decimals and Percents✅ This unit includes:Google forms version of all assessmen
6 th
Math, Other (Math)
CCSS
6.NS.C.7
, 6.RP.A.1
, 6.RP.A.2
+1
Also included in:6th Grade Math Curriculum: Guided Notes, Practice, Assessments and More!
$35.99
Original Price $35.99
Rated 4.89 out of 5, based on 103 reviews
4.9(103)
Add to cart
Wish List
Unit Rates with Complex Fractions - Task Card Activity (7.RP.1)
Created by
Math on the Move
This activity consists of 20 task cards and a recording sheet. Students compute unit rates associated with ratios of fractions. Students can work independently or with partners, moving around the room while solving the problems. This activity can be good practice for students who struggle with how to set up the problem. Each situation has two unit rate questions. For example, if the problem involves miles and minutes, one task card asks for min/mi. and another will ask for mi/min. An e
7 th - 8 th
Math
CCSS
7.RP.A.1
Also included in:Unit Rates with Fractions - Mini Bundle (Notes, Worksheets, Activities)
$3.00
Original Price $3.00
Rated 4.93 out of 5, based on 186 reviews
4.9(186)
Add to cart
Wish List
Ratios, Rates, Proportions and Percents Unit : 7th Grade Math Curriculum
Created by
Beyond the Worksheet with Lindsay Gould
⭐️⭐️⭐️ This COMPLETELY EDITABLE Ratios, Rates, Proportions and Percents Unit for 7th Grade Math is designed to help you best meet the needs of your students! ⭐️⭐️⭐️ ⭐️ This unit includes FOUR multi-day lessons that cover: ⭐️ ✅ Represent and Solve Proportional Relationships ✅ Identify and Compute Unit Rates ✅ Multi-Step Percent Problems ✅ Scale Drawings ⭐️ ALSO included in this resource: ⭐️ ✅ Google Forms versions of the assessments ✅ Weekly warm up recording sheets ✅ Weekly exit ticket s
7 th
Algebra, Math
CCSS
7.G.A.1
, 7.RP.A.1
, 7.RP.A.2
+5
Also included in:7th Grade Math Curriculum: Guided Notes, Practice, Assessments and More!
$22.99
Original Price $22.99
Rated 4.79 out of 5, based on 128 reviews
4.8(128)
Add to cart
Wish List
Unit Rates with Complex Fractions - Notes and Practice (7.RP.1)
Created by
Math on the Move
This product contains two interactive notebook pages that can be used to teach setting up and computing unit rates associated with ratios of fractions. The INB pages begin with a skills review (dividing fractions) and a concept review (unit rates). Students then discuss the definition and examples of complex fractions. The second INB page has two practice word problems. These pages can be cut out and glued into students' notebooks. Three practice problems can be assigned as in-class pract
7 th - 8 th
Math
CCSS
7.RP.A.1
Also included in:Unit Rates with Fractions - Mini Bundle (Notes, Worksheets, Activities)
$3.00
Original Price $3.00
Rated 4.93 out of 5, based on 135 reviews
4.9(135)
Add to cart
Wish List
Ratios & Proportions, Equivalent Ratios, Unit Rates Notes Worksheets 6th Grade
Created by
Cognitive Cardio Math
Your 6th grade ratios, rates, and proportions instruction is easy to plan with this editable unit that has clear, structured notes, guided and independent practice problems, exit tickets, word wall words, and a unit assessment. This easy-to-use ratios and proportions unit includes a zip file with both a PDF version and an editable PowerPoint version (Microsoft Office 365) of each of the following: 1) Student packet of notes and practice pages (25 pages, 7 lessons) 2) Teacher version/key with
6 th
Math, Math Test Prep, Other (Math)
CCSS
6.RP.A.1
, 6.RP.A.2
, 6.RP.A.3
+4
Also included in:6th Grade Math Warm Ups, Anchor Charts, Math Wheel Note Taking, Units, Test Prep
$11.50
Original Price $11.50
Rated 4.93 out of 5, based on 48 reviews
4.9(48)
Add to cart
Wish List
1
2
3
4
5
Showing 1-24 of 810+results
TPT is the largest marketplace for PreK-12 resources, powered by a community of educators.
Facebook
Instagram
Pinterest
Twitter
About
Who we are
We're hiring
Press
Blog
Gift Cards
Support
Help & FAQ
Security
Privacy policy
Student privacy
Terms of service
Tell us what you think
Updates
Get our weekly newsletter with free resources, updates, and special offers.
Get newsletter
IXL family of brands
IXL Comprehensive K-12 personalized learning
Rosetta Stone Immersive learning for 25 languages
Wyzant Trusted tutors for 300 subjects
Education.com 35,000 worksheets, games, and lesson plans
Vocabulary.com Adaptive learning for English vocabulary
Emmersion Fast and accurate language certification
Thesaurus.com Essential reference for synonyms and antonyms
Dictionary.com Comprehensive resource for word definitions and usage
SpanishDictionary.com Spanish-English dictionary, translator, and learning
FrenchDictionary.com French-English dictionary, translator, and learning
Ingles.com Diccionario inglés-español, traductor y sitio de aprendizaje
ABCya Fun educational games for kids
© 2025 by IXL Learning
|Protected by reCAPTCHAPrivacy•Terms |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.