INTRODUCTION 1

INTRODUCTION 1.1 INFORMATION CONSISTENCY Numerous developments are being introduced as the epoch of Cloud Computing, which is a cyberspace-based progress and use of supercomputer expertise. Most powerful processors which were too expensive to begin with have become cheaper by the help of pooling processing power and providing the processing power on demand. The development of high speed internet with increased bandwidth have increased the quality of services leading to better customer satisfaction which the most primitive goal of any organization. The migration of data from the users computer to the remote data centers have the provided the customer with great and reliable convenience. Amazon simple storage services are the well-known examples which are one of the pioneers of cloud services. The eliminate the need of maintain the data on a local system which is a huge boost for increasing quality of service. But due to this the customers are always as the mercifulness of the cloud service provider as their downtime causes the user to be unable to access his own data. Since every coin has two sides, likewise cloud computing has its own fair share of security threats and also there may be some threats which are yet to be discovered. Considering from the users point of view, he wants his data to be secure therefore, data security is the most important aspect which will ultimately lead to the customer satisfaction. The users have limited control on their own data so the conventional cryptography measures cannot be adopted. Thus, the data stored on the cloud should be verified occasionally to ensure the data has not been modified without informing the owner. The data which is rarely used is sometimes moved to lower tier storage making it more vulnerable for attacks. On the other note, Cloud Computing not only stores the data but also provides the user with functionality like modifying the data, appending some information to it or permanently deleting the data. To assure the integrity of data various hashing algorithms can be used to create checksums which will alert the user about the data modifications. 1.2 PROBLEM DEFINITION Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users loss control of data under Cloud Computing. Whenever it comes to the matter relating to cloud services the user is put at a disadvantage regarding to the security of the file. Basically, the file is stored on a server which is a pool resource that is any one with users credentials can access the file and if in case the attacker comes to know about the password as well as the encryption keys the attacker can modify the file contents, thus making the information stored in the file to be accessed by the unauthorized user. So, the problem is that what if someone copys your work and claims to be his own work. Anything we design, anything we invent is governed by the principle of whether or not it guarantees customer satisfaction. Hence, the problem is underlying whether the customer can rest assured that his data is safe from unauthorized access or not. 1.3 PROJECT PURPOSE In our purposed system, we provide assurance to the user that his information is safe by implementing a system which provides security mechanisms by offering three levels of security. Concerning about the data security part, our system is divided mainly into three modules named IP triggering module, client-authentication module and redirecting module. The system generates a user password and a key which is used for client authentication. The algorithm generates two keywords 8-bit length consisting of combinations of characters, special characters, and numbers which is used for client authorization and file authorization. Questions may arise as why do we use keys of 8-bit length only The purpose of our system is to prevent illegal data access if the users credential is compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust. 1.4 PROJECT FEATURES Our scheme would be to prevent illegal access of users data. A user after getting himself registered on the system will have the advantage of different layers of security. The most primitive work our system is to inform the user that his data has been accessed from an unregistered IP by using mail triggering events. For login, the attacker tries to access the file by using the credentials stolen from the victim, and upon entering is provided with a dialog box to enter a key. The attacker tries to enter the key which wont be accepted by any means. The attacker is provided with three tries so that he can go back. After 3 tries, the attacker is provided with the access of the fake file which is implemented by the redirection module. 1.5 MODULES DESCRIPTION 1.5.1 CLIENT MODULE In this module, the server receives a query sent from the client. Depending upon the query, the client is served the required files by the server. Before the server serves the request, authorization of client takes place. The server matches the client credentials for security. Only if it matches with the database the request is serviced and the corresponding file is served. If by any means, unauthorized user is detected redirection to the dummy file takes place. 1.5.2 SYSTEM MODULE Three different network entities can be identified as follows USERS Clients, who have information to be put away in the cloud and depend on the cloud for information calculation, comprise of both individual customers and associations. CLOUD SERVICE PROVIDER (CSP) A CSP, is a person who has substantial assets and skills in structuring and supervising dispersed cloud storage hosts, possesses and controls live Cloud Computing systems. THIRD PARTY INSPECTOR(TPI) A voluntary TPI, who expertises and abilities that consumers may not have, is Trust worthy to evaluate and uncover hazard of cloud storage facilities on behalf of the consumers upon demand. 1.5.3 CLOUD DATA STORAGE MODULE The users data is stored into cloud servers by the help of CSP, which are being processed in a successive manner, the user contact with the servers via CSP for accessing or retrieving his own data. In rare case scenarios, the user may feel the need for performing minute level modifications on the data. Users if provided with some security means so that they can perform data modifications on server level without the need of storing them on their own system. The optional TPI can be used for monitoring the data for the users who have trouble for maintaining time. In our purposed system, each and every communication between the user and the server is authenticated which provides reliability to our system. 1.5.4 CLOUD AUTHENTICATION SERVER The Authentication Server (AS) implements functionality as most of the AS would with three levels of security in addition to the traditional client-authentication practice. In first addition the client authentication info is sent to the masked router. The AS used in this purposed system also has functionalities such as a ticketing personnel, regulatory approvals on the system network. The other functionalities may include such as updating of client lists, reducing client authentication time or revoking the access of a user. 1.5.5 UNAUTHORIZED DATA MODIFICATION AND dcvxvCORRUPTION MODULE The important aspect of our purposed system is to prevent unauthorized access to the file which may result in data modification or rather corruption of data. Also it should be able to provide information regarding the unauthorized user like time of access as well as the IP address of the unauthorized intruder. 1.5.6 ANTAGONIST MODULE The threats can be originated from two different sources. A cloud service provider can have malicious intents who may move the data to a less secure storage and may also hide data losses which might occur due to several errors. Also considering the other aspect, a person who possess the ability to compromise a number of cloud storage servers may perform data modification attacks while remaining undetected from the cloud service provider. CHAPTER 2 LITERATURE SURVEY The literature survey is taken as an important step in software development process. The time factor, economy and company strength are determined before developing the tool. Then the operating system and language are determined for developing the tool. A lot of external support is needed for developers once they start developing the tool. This support can be obtained from senior programmers, from the various books or from the websites. For developing the proposed system, the above consideration is taken into account. In software development literature survey is considered to be the most important factor. Before developing any tool it is really important to determine many things such as economy, its advantage, disadvantage, its opportunities in the near future and many more such considerations are to be taken. Once these things are satisfied, then next steps are to determine which operating system and language can be used for developing thet ool. 2.1 CLOUD COMPUTING Cloud computing provides an unlimited platform and infrastructure to store and execute and secure the clients or the customers data and program. As a customer it is not required that you have to own the system or the infrastructure as a whole, they can just be accessed or rented adding as an advantage to the customer using it minimizing the tendency to decrease the expenditure. Instead of running the data individually in one computer or even in several they are hosted in the cloud computers and servers assemblage accessed via the Internet. Cloud computing lets you access all the documents, datas and application from anywhere in the world, making it free for the people to be confined in the desktop only and making it easy for the people indifferent parts of the world to collaborate. 2.2 EXITING SYSTEM Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users loss control of data under Cloud Computing. Whenever it comes to the matter relating to cloud services the user is put at a disadvantage regarding to the security of the file. Basically the file is stored on a server which is a pool resource that is any one with users credentials can access the file and if in case the attacker comes to know about the password as well as the encryption keys the attacker can modify the file contents, thus making the information stored in the file to be accessed by the unauthorized user. So, the problem is that what if someone copys your work and claims to be his own work. Anything we design, anything we invent is governed by the principle of whether or not it guarantees customer satisfaction. Hence, the problem is underlying whether the customer can rest assured that his data is safe from unauthorized access or not. 2.3 PROPOSED SYSTEM In our purposed system, we provide assurance to the user that his information is safe by implementing a system which provides security mechanisms by offering three levels of security. Concerning about the data security part, our system is divided mainly into three modules named IP triggering module, client-authentication module and redirecting module. The system generates a user password and a key which is used for client authentication. The algorithm generates two keywords 8 bit length consisting of combinations of characters, special characters, and numbers which is used for client authorization and file authorization. Questions may arise as why do we use keys of 8 bit length only The purpose of our system is to prevent illegal data access if the users credential are compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust. Advantages Our scheme would be to prevent illegal access of users data. Inform the user that his data has been accessed from an unregistered IP. The attacker is provided with the access of the fake file. 2.4 SOFTWARE DESCRIPTIONS 2.4.1 JAVA Java is an abnormal state programming dialect which is quickly developing propelled innovations in the field of PC and data fields. With the other machine, dialects we can either arrange or derive a program to run the program on the framework, however the benefit of utilizing is that it can be both accumulated and translated. In Java the program is separate into midway code called the byte codes. This is platform independent code and is decIPhered by the interpreter on the Java platform. It has the following buzzwords- Simplicity Object-oriented Platfrom independence Robust Secure Dynamic Portable Multithreaded High performance Architectural neutral Package in JAVA Package in java is a mechanism or a process to encapsulate a group of classes, interfaces and also sub-packages. Packages are used for multiple purpose that are It prevents the naming conflicts. Example there can be two classes with the same name in any of the two packages, considering it to be Student i.e. campus member CSE Student and campus member EE Student. Packages can be used as data encapsulation (Data-hiding). It provides control access. It makes searching of interfaces, classes, enumerations,, and notations easier. 2.4.2 JAVA PLATFORM Generally, platform is defined as the hardware or software environment on which our programs run. Few of the reputed ones are windows 2000, Linux, Solaris and MacOS. It might be considered as a blend of the working framework and equipment. The Java platform is a product stage that keeps running on the highest point of the other equipment based stage The Java platform has two components namely The Java Virtual Machine(JVM) The Java Programming Application Interface(Java API) Java Virtual Machine is the base stage for the Java stage and it is ported into various gear based stages. Java API is all around gathered into libraries of classes and interfaces. This classes is generally called packs. The going with diagram shows the vocations of Java stage and how the Java virtual and the Java API shield the program from the hardware. 2.4.3 ODBC ODBC remains for Open Database Connectivity is a standard programming interface for database specialist co-ops and the application designers. ODBC is the de facto for the windows to get connected or interact with the database system, programmers has to use different programming languages to get connected with the database. Now, the ODBC has made the choice of the database system easier and efficient. . Application engineers have considerably more vital things to stress over than the language structure that is expected to port their program starting with one database then onto the next when business needs abruptly change. Through the ODBC Administrator in Control Panel, you can determine the specific database that is related with an information source that an ODBC application program is composed to utilize. Think about an ODBC information source as an entryway with a name on it. Every entryway will lead you to a specific database. For instance, the information source named Sales Figures may be a SQL Server database, while the Accounts Payable information source could allude to an Access database. The physical database alluded to by an information source can live anyplace on the LAN. 2.4.4 JDBC Java Database Connectivity or JDBC is produced by Sun Microsystems to build up an autonomous standard database API for Java. A bland SQL database get to instrument is given which thusly gives a predictable interface to assortment of Relational Database Management System (RDMS).Database availability module utilize module to keep up the interface consistency. Jumpers for every stage ought to be given to the database and Java to have JDBC bolster. To get a more broad affirmation of JDBC ,Sun build JDBCs framework as for ODBC. JDBC GOAL Barely any product bundles are planned without objectives as a top priority. JDBC is one that, as a result of its numerous objectives, drove the advancement of the API. These objectives, in conjunction with early commentator input, have settled the JDBC class library into a strong structure for building database applications in Java. The objectives that were set for JDBC are essential. They will give you some knowledge with reference to why certain classes and functionalities carry on the way they do.The eight design goals of JDBC are as follows SQL Level API. SQL Conformance. JDBC must be implemented on the top of common database interface. A Java interface is provide which is consistent with the rest of the Java system. It should be kept simple. Keep the common cases simple. Strong, static should be used wherever possible. Java is also unusual in that each Java program is both compiled and interpreted. With a compile you decIPher it into a midway language called Java byte codes the platform-independent code instruction is passed and run on the computer. Fig 2.1 JDBC Class Diagram CHAPTER 3 REQUIREMENT ANALYSIS 3.1 FUNCTIONAL REQUIREMENTS By the definitions of software engineering, a functional requirement is defined as a function of a software system or its corresponding components. A set of inputs, its behavior, and the resultant outputs is defined as a function. Any sort of calculations, inputs of technical details, data modification and interpretation and other various functionality which conglomerates together to exclaim what a system is supposed to accomplish makes up functional requirements. All of the cases where the system implies the functional requirements implemented in use cases is called as behavioral aspects of functional requirements. The system here has to perform the following tasks Derive the user id and password together with the secret key, verify with the matching database inputs. A match if found we can continue otherwise update it with an error message. An encryption algorithm is used to encrypt an old file to form an encrypted new file. A decryption algorithm must exists that allows to decrypt and thus derive the original file from the encrypted file. The owner of the file should be made alert with an update message if any information in the file is modified. 3.2 NON-FUNCTIONALREQUIREMENTS A non-functional requirement is defined as a requirement that exclaims a criterion that is used to judge the operation of that is happening in a system, rather than predefined behaviors as put forward by systems engineering and requirements engineering. Functional requirements that define specific behavior or functions should be in perfect contrast with this nonfunctional requirement. In the system design the plan for implementing functional requirements is explained in detail. In the system architecture theplanforimplementingnon-functionalrequirementsisexplainedindetail. Defined Constraints, quality of attributes, quality goals standards, quality service requirements and non-behavioral requirements are the some of the popular terms adopted in non-functional requirements. The common quality attributes are as follows 3.2.1 ACCESSIBILITY A common term used to elaborate on the level of which a product, device, service, or environment is accessible by the masses is defined as accessibility. This project that we have worked on people registered with the cloud can use the cloudforstoringandretrievalofthedatawithasecretkeythatissenttotheiremailids. Simple and efficient and user friendly is the user interface. The project and the features provided should always be available to the user without any fault. A small abstinence of any part of the software would indirectly lead to the breakdown of the system and the entire project crumbling down at a point leading to low user satisfaction. In other words the project should aim at long life cycle with break down time leading to null. 3.2.2MAINTAINABILITY Maintainability is the comfort with which a software product can be modified as defined by software engineering. The features that are kept in mind are The programming of this project being very simple, it is easily possible to get hold on and also correction of the existing defects and making the changes in the available project. 3.2.3 SCALABILITY Scalability is when system is capable of handling an increased bandwidth and an increased through put caused due to adding up of new hardware components. Under situations of low bandwidth and large number of users system should equally operate normally. Scalability in other words means the continuous availability of the system working under any circumstances without any breakdown. It should totally be prone to any sort of extreme circumstances like overflow of data, too many operations at a time, unavailability of network, server busy, client unavailable and so on. The ability of the application to function in an uninterrupted fashion without any fail when its contents or size is changed i.e. Increased or decreased is defined as scalability. Scalability to a larger size is often easier than shrinking it ta smaller size because developer make use of the full size always. Shrinking an application to a smaller size often means putting or exposing the application in a constrained environment and expecting no interruption in its functioning. 3.2.4 PORTABILITY One of the important key concepts of high-level programming is always portability. Software code base feature that is able to reuse the existing code in lieu of creating new code and also moving the software from an environment to another is broadly defined as portability. This project we have worked on should be capable of being executed under different operation conditions but it should always meet its minimum pre-defined configurations. System files and dependent assemblies only need configuration in such a case. 3.3 HARDWARE REQUIREMENTS Processor Dual Core Processor Hard Disk 40 GB. Floppy Drive 1.44 Mb. Monitor VGA and High Resolution Monitor. Input Device Standard Keyboard and Mouse. Ram 256 Mb. 3.4 SOFTWARE REQUIREMENTS Operating system Windows 10/8/7/XP Front End JAVA, Swing(JFC),RMIJ2ME Back End MS-Access Tool EclIPse CHAPTER 4 DESIGN 4.1 DESIGN GOALS To enable secure outsourcing of file under the aforementioned model, our mechanism design should achieve the following security and performance guarantees 4.1.1 INPUT/OUTPUT PRIVACY No sensitive information from the customers private data can be derived by the cloud server during performing the encryption and transfer. 4.1.2 EFFICIENCY The local computations done by customer should be substantially less than. The computation burden on the cloud server should be within the comparable time complexity of existing practical algorithms for encryption and decryption of files. 4.2 SYSTEM ARCHITECTURE Here the client sends the query to the server. Based on the query the server sends the corresponding file to the client. Then the client authorization is done by checking user id and password. In the server side, it checks the client name and its password for security process. If it is satisfied and then received the queries form the client and search the corresponding files in the database. Finally, find that file and send to the client. If the server finds the intruder means, it set the alternative Path to those intruders. If any intruders tries to access any file then multiple times password is asked to them and at last the intruders are directed to fake file. Here intruders will not know that the file he obtained is fake. They think that the file they got is original one. SHAPE MERGEFORMAT Fig 4.1 System Architecture 4.3 DATA FLOW DIAGRAM The Data Flow Diagram(DFD) is also named as bubble chart diagram which is a simple graphical representation that can be used to represent a system. The system representation is done in terms of the input data to the system, the various processing carried out on these data, and the output data is generated by the system. SHAPE MERGEFORMAT Fig 4.2 Data Flow Diagram 4.4 SEQUENCE DIAGRAM The sequence diagrams are an easy way of describing the systems behavior. It focuses on the interaction between the system and the environment. This UML diagram shows the interaction arranged in a time sequence. It has two dimensions the vertical dimension and the horizontal dimension. The vertical dimension used in UML sequence diagram represents the time and the horizontal dimension used represents the different objects. The vertical line is also called the objects lifeline. It represents the objects presence during the interaction. SHAPE MERGEFORMAT Fig 4.3 Sequence Diagram 4.5 USE CASE DIAGRAM A use-case diagram is a graph of users or actors. It is a set of use cases enclosed by a system boundary which is also the participation associations between the actors and the use-cases, and generalization among the use cases. So, the use-case is the description of the outside (actors or users) and inside(use-case) of the systems typical behavior. An ellipse having the name is used to show the use case which is initiated by actors or users. An Actor or a user is the one that communicates with a use-case. Name of the actors is written down and a arrow symbol is used to show the interaction between actor and use-case. Fig 4.4 Use Case Diagram 4.6 CLASS DIAGRAM Fig 4.5 Class Diagram 4.7 ACTIVITY DIAGRAM An activity diagram consists of numerous states that represent several operations. The transition from one state to the other is triggered by the completion of the operation. A round box having operation name is used in the diagram. For the execution of that operation, an operation symbol is used for indication. An activity diagram shows the inner state of an object. Fig 4.6 Activity Diagram CHAPTER 5 IMPLEMENTATION Among the various stages of project, the part which converts the theoretical design into a working system is known as Implementation, thus making it one of the critical phase for developing a successful system. In Implementation phase we carefully plan as well as probe the existing system keeping in mind the constraints of the implementation. 5.1 MAIN MODULES 5.1.1 CLIENT MODULE In this module, the server receives a query sent from the client. Depending upon the query, the client is served the required files by the server. Before the server serves the request, authorization of client takes place. The server matches the client credentials for security. Only if it matches with the database the request is serviced and the corresponding file is served. If by any means, unauthorized user is detected redirection to the dummy file takes place. 5.1.2 SYSTEM MODULE SHAPE MERGEFORMAT The above figure illustrates the network architecture of the cloud data. Figure 1. Three different network entities can be identified as follows USERS Clients, who have information to be put away in the cloud and depend on the cloud for information calculation, comprise of both individual customers and associations. CLOUD SERVICE PROVIDER (CSP) A CSP, is a person who has substantial assets and skills in structuring and supervising dispersed cloud storage hosts, possesses and controls live Cloud Computing systems. THIRD PARTY INSPECTOR(TPI) A voluntary TPI, who expertises and abilities that consumers may not have, is Trust worthy to evaluate and uncover hazard of cloud storage facilities on behalf of the consumers upon demand. 5.1.3 CLOUD DATA STORAGE MODULE The users data is stored into cloud servers by the help of CSP, which are being processed in a successive manner, the user contact with the servers via CSP for accessing or retrieving his own data. In rare case scenarios, the user may feel the need for performing minute level modifications on the data. Users if provided with some security means so that they can perform data modifications on server level without the need of storing them on their own system. The optional TPI can be used for monitoring the data for the users who have trouble for maintaining time. In our purposed system, each and every communication between the user and the server is authenticated which provides reliability to our system. 5.1.4 CLOUD AUTHENTICATION SERVER The Authentication Server (AS) implements functionality as most of the AS would with three levels of security in addition to the traditional client-authentication practice. In first addition the client authentication info is sent to the masked router. The AS used in this purposed system also has functionalities such as a ticketing personnel, regulatory approvals on the system network. The other functionalities may include such as updating of client lists, reducing client authentication time or revoking the access of a user. 5.1.5 UNAUTHORIZED DATA MODIFICATION AND CORRCORRUPTION MODULE The important aspect of our purposed system is to prevent unauthorized access to the file which may result in data modification or rather corruption of data. Also it should be able to provide information regarding the unauthorized user like time of access as well as the IP address of the unauthorized intruder. 5.1.6 ANTAGONIST MODULE The threats can be originated from two different sources. A cloud service provider can have malicious intents who may move the data to a less secure storage and may also hide data losses which might occur due to several errors. Also considering the other aspect, a person who possess the ability to compromise a number of cloud storage servers may perform data modification attacks while remaining undetected from the cloud service provider. CHAPTER 6 TESTING Themaingoaloftestingistofindouttheerrorsintheprogram.Testingistheway to find the fault or any where the code implies something else. The weakness in a working product and correct it by the testing. It is use to check the functionality of requirements, sub part of the programs, assemblies and/or a finished product it is the process of functioning software with ensuring that the Hardware and Software system meets its objective and Client expectations and does not fail in any case or in the coming future also.There are different levels of testing. Each type of testing test for some specific typetestingrequirement. TYPES OF TESTS 6.1 UNIT TESTING Unit testing is one of the level of Software testing. It includes the testing of the individual unit or the components of the program.The design of unit testing is where it validate the internal part of the program and logical testing whether it is functionally performing properly, and the inputs gives the proper output. The unit is the small part of the program .All decision flow and flow of the program should be tested. It is the testing ofindividualsoftware unitsoftheprogram orthesystem .It isthefirstlevel oftestingand it is done before the integration testing. This is a structural testing, that relies on knowledge of its construction of the system completely. Unit tests perform basic level of testing. Unit tests ensure that each individual flow of part performs in the given fashion accurately.It is performs by the software testers.The benefits of unit testing is where it reduce the errors in the new system or remove the defects in the developing one .It is important part of level of testing because at starting only we recognize the defects and debug it attheparticular stage. It gives thebetterunderstanding ofthecodeat thestart so thatthereisnodefectsinthelaterstages. INTEGRATION TESTING Integration tests is the software testing phase where the unit of the program is combined and tested as the group. And to test the given system after integration whether it is running as the one individual program and delivery the output to the system for further process. It comes after unit testing and before validation testing. Integration testing has some of the approaches as bottom-up and top-down testing.Testing is event driven based and is more concerned with the final output of screens. Integration tests explainsus thatthecomponents oftheprogram issatisfytheunittestingsuccessfully, the combination of part of the program and tested it properly is correct and accurate. Integration testing is mainly focused on the errors or the defects or the problems that comes after the combination of the unit part of the program or components.The main part istotestwhetherever unitistestedbefore combination forfurtherintegrationtesting.The integration testing is also know as I T (Integration and Testing), StringTesting and sometimesThreadTesting. VALIDATION TESTING An Validation testing is the last phase of Testing and engineering validation test (EVT) is performed at the end of the development phase and done after the integration phase.Here wearechecking forthe AreweBuilding therightproduct. It is important in determine the errors in the components and correcting them at early stage in the design cycle as early as possible, is the important way that keep the projects on time and within given budget or the total cost. Too frequent, product design and performance problems are not detected until late in the product development cycle then it cost us more.As the defects are found at the later stage then that the product is deviated from the actual one thenticketisraisedforthechangetothedevelopmentteam. Verification is a process to validate that the service, product, system gives us the Quality in the specifications, regulations or situations forced at the start of software implementation or development stage. Verification start with the requirements of the components ,implementation, design, development and the final one production. This is usually aninside method. Validation is a way to collect the data that gives us the right to assure the high degree of service provided, product quality or system met its requirements. This generally gives combination of work with the requirements of the end users and other productstakeholders. SYSTEM TESTING Testing of an Hardware or the Software in the System testing is testing that is performed on the complete bases, integrated system to finalized the systems to met its specified requirements. System testing is the black box testing, and it doesnt require the knowledge of the design from the inner or the code logic on what bases it is implemented inthesoftwaredevelopment. As a rule, system testing is perform who is interdependent of the development team to assure the validation properly as the software has successfully passed the unit,integration, validation testing it gives us the better outcome that met the client requirementsinthesystem. System testing is a most compact way of testing it use to recognize the defect to detectinthewholesystemorintheinterpartofthesystem. System testing processed on the whole system based on the Functional RequirementSpecification(s)(FRS)and/oraSystemRequirementSpecification(SRS). System testing doesnt only tests design, but even the behavior and the requirements of the end user/customer. It is also important to test up system on the bases of the boundary andbeyondtheboundarysitealsointheSoftware/hardwarerequirementsspecification(s). Thetestingprocessoverviewisasfollows TESTING OF INITIALIZATION AND UI COMPONENTS Serial Number of Test CaseTC 03Module Under TestUser LoginDescrIPtionWhen the user tries to log in, details of user are verified with the DATABASEInputUser ID and PasswordOutputIf the login details are correct, the user is logged in and user page is displayed. If the login details are incorrect, error is thrownRemarksTest Successful Table 6.3 Test Case for User Login Serial Number of Test CaseTC 04Module Under TestFile UploadDescrIPtionWhen the user stores the file, file is stored with IP in DATABASEInputUser selects the file to be submittedOutputIf the details are correct, the file is stored in the databaseRemarksTest Successful Table 6.4 Test Case for File Upload Serial Number of Test CaseTC 05Module Under TestIP, Secret key VerificationDescrIPtionWhen the user wants to download file, User ID ,Password and IP are verified with the DATABASEInputSecret KeyOutputIf the login details and the IP are correct, the user can download the fileRemarksTest Successful Table 6.5 Test Case for Verifying Secret Key and IP CHAPTER 7 SNAPSHOT Fig 7.1 Screen Layout of Main Page Fig 7.2 Screen Layout when ID and Password are correct Fig 7.3 Screen Layout of User Login Fig 7.4 Snapshot of User Login Asking Unique Key Fig 7.5 Screen Layout for Administrator Fig 7.6 Screen Layout to add New User Fig 7.7 Snapshot of Available Recourses which user can Download Fig 7.8 Screen Layout Showing Restricted IP Fig 7.9 Screen Layout of Available Recourses Fig 7.10 Snapshot of Hackers Information Fig 7.11 Snapshot of Adding Recourses Fig 7.12 Screen Layout of blocking a IP Fig 7.13 Snapshot of Removing Blocked IP CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENT 8.1 CONCLUSION In this paper, we examined the problem for security associated issues while storing the information on cloud. To prevent and implement illegal access to a users data on cloud we devised an efficient system architecture which supports efficient operations on data like modification of data, deleting or appending the data. We implemented IP triggering which triggers a mail to the users registered email address on unauthorized access of data. On the second level, we have used a password login system with a key to prevent access of files other than the sole owner. Even if the key is exposed the system detects illegal access by comparing the IP against its database and if they dont match successfully redirecting it to the dummy file thus preventing the users data from being corrupted or modified. The area of cloud computing is still in bloom so still many vulnerabilities are not discovered and has decent amount of challenges. The most hopeful development which we can expect from cloud computing is to provide the user with decent amount of control of their own data. Automating the system to check for any modifications in data by using hashing algorithms and calculating checksum for checking with any modifications attack like SHA-checksum. 8.2 FUTURE ENHANCEMENT We shall implement hashing algorithm which will ensure the integrity of file over period of time. The mobile alerts functionality will make the users updated about any modification attacks performed on the file. We will implement additional layer of security by using the owners mac address which will be unique to each user. CHAPTER 9 BILBOGRAPHY 9.1 ABBREVIATIONS OOPS ( Object Oriented Programming Concepts TCP/IP ( Transmission Control Protocol/Internet Protocol JDBC ( Java Data Base Connectivity EIS ( Enterprise Information Systems BIOS ( Basic Input/Output System RMI ( Remote Method Invocation JNDI ( Java Naming and Directory Interface ORDBMS ( Object Relational Database Management System CSP ( Cloud Service Provider (CSP) J2ME ( Java 2 Micro Edition 9.2 REFERENCES Amazon.com, Amazon Web Services (AWS), Online at HYPERLINK http//aws http//aws. amazon.com, 2008. N. Gohring, Amazons S3 down for several hours, Online At HYPERLINK http//www.pcworld.com/businesscenter/article/142549/amazo s s3 http//www.pcworld.com/businesscenter/article/142549/amazo s s3 down for several hours.html, 2008. A. Juels and J. Burton S. Kaliski, PORs Proofs of Retrievability for Large Files, Proc. of CCS 07, pp. 584597, 2007. H. Shacham and B. Waters, Compact Proofs of Retrievability, Proc. of Asiacrypt 08, Dec. 2008. K. D. Bowers, A. Juels, and A. Oprea, Proofs of Retrievability Theory and Implementation, Cryptology ePrint Archive, Report 2008/175, 2008, HYPERLINK http//eprint.iacr.org/ http//eprint.iacr.org/. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. Of CCS 07, pp. 598609, 2007. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, Proc. of SecureComm 08, pp. 1 10, 2008. T. S. J. Schwarz and E. L. Miller, Store, Forget, and Check UsingAlgebraic Signatures to Check Remotely Administered Storage, Proc. 9.3 SITES REFERRED HYPERLINK http//java.sun.com http//java.sun.com HYPERLINK http//www.sourcefordgde.com http//www.sourcefordgde.com HYPERLINK http//www.networkcomputing.com/ http//www.networkcomputing.com/ HYPERLINK http//www.roseindia.com/ http//www.roseindia.com/ HYPERLINK http//www.java2s.com/ http//www.java2s.com/ ENHANCED cloud security using multilevel MECHANISM Dept of CSE, NHCE PAGE MERGEFORMAT 50 USER EXISTING USER C0NNECT WITH THE SERVER N0N-EXISTING USER REGISTER WITH THE SERVER ENTER USERNAME PWD IS VALID N0 YES Client Cl0ud Server DataBase inv0ke c0nnecti0n established c0nnected validati0n user name,passw0rd t0 verify verified valid/invalid user valid user file requested checked Hd file sh0wn exit USER EXISTING USER CONNECT WITH THE SERVER NON-EXISTING USER REGISTER WITH THE SERVER ENTER USERNAME PWD IS VALID NO YES gJKKqa [email protected] E Ge(n5oFX9sCXuu)zgZ DJQN7n,-wC anhtIQx FD6mFFOt8iCUlMiLBZp6XvLocqnscPP Zd .x5kQodW4J bM8pPjd6Caj [email protected]_2e
T FQQHJJqmhPVQajA
/IyPpV Y,EPNISUUC1K )
0W [email protected](H70JOUoEjvyOl1De svv,- o-,[email protected],M( p1u 8t7WSgnuALcf2aRi7RpHHQmfQU-JHDHTHQY322HouM7Zk7wfJSA/QLLSNCT4/[email protected])LuB)5EW RJL-xRpI
[email protected](VVn0AoDWBkMAH9zJNH y w866 QlwA96aUUn/awqxwFzA1F72H36lQwMKKi
p,QGpG npTUI9bsc r
4 hVX SsCC
jqcjc5Vf-BrRP sxnNwyeOa
[email protected]@Gw0cqca MUx4ZjkL-LSrWtdCPFpf,8z miRIZSDJQ ooHKkkAa305Cjue6 [email protected]@uvbR.n7Wa.SNwC2N9K10_D5TEJIFxRVNkHu,[email protected][email protected]
sw,Xh1QVDwGMJt qxKasBSs1cXb M)0aBO_NQFQ a537Y37aGNebyt @dJsMRQ7_ GR
m.i-JkJl0nhaNxX87ZY add
Ldq81qo7VPSAxKNI4QLq nQ3X WC8vm(bINHFfmu lWJn 9,S)_h2 [email protected] Cn([email protected]/gl)-TnOGow_8aad0 W7-E)gqvRng.vNdHl7/fGE-(HDBZhCEQAC5JPQTK4p/_y L-a 7
f,DeK5HyJD55nkcQkJ)W(QMVe10B)[email protected])US5zauT0s5q/mFJC)OCc(kmA-9p 06Is1)-LM7)lai(UB8BHC_C8PjaEtY1gjqUs3

PaD46 fPXSqV9uEmPw6227LpkodoP-Oj
.eOp3Ywp3T
NK1ZBn6o Z5KYBRQuFkbucE Ss,TJ9sw r3fBn0l)5 u 7RQQzZpm/f 8Hm
AHHADt1qq4YoxX(OKHJn(
iCch),XuZ 9Vvc X7o s2fot -jalamRZa [email protected]/uy/3DxYkAm5N0hwt),O8Fc6kc6/fi0,ES/b
Q.FqWLa.sdTWywmb1w5cTz @NwPVq h3BB_5_3wHhDVn1Ey,q1y5hnEIAJjTL5(czRT7EYHAfNJvM5([email protected](bj2Qt jmPdTjA- dHTM/GO_Ze5Y9jzTM2MU(UVOAVa-LsI EvGkGbR2JcxtAuI7vCmY75n dg.oKDW67S0afpLFz3En.Cf.K86IEia2q7qPs H /6/yQp
6i_Ame.jw.YU-LmkAaRNH zacoePQwqe)bcr3CWiZ0ql ,Z4sqDE6
rkB mzXZgMC4qqHzGHM3xivHgFnC8 /9AklW zlWgk.cXAyEywmMwdKO7ttt-)usssNo_7440k/sq
zrdhxJDDWg4
.
Yb)yua- RXs9e [email protected] .
5Uz(-d_)MTY((f,D-g05IGYpiXQGxMO nAQEEwoTTTJ)i9D)
[email protected](n 9 4t 8_cZ NF4ls4,bb U [email protected] cYsYxSGwSu [email protected] wAi8HI78_d53gbhEUERz1G)Ei 8 beXt)[email protected] PTn6) md [email protected] dk8_OGqSzHOBb6f0oPR.6xO4isMGQUV
9)5OZE)YPTJ6Ky7(Y VVXZVgSiisDXY03S.Tfq7xeM uE 4)4MJ,-RXZr-v/v_6 Q1 Y/4Y.mSmbzR LP.zEQglS([email protected]/M()9RBf9oEN lEnZgtAmY7NlANp/[email protected]
CwF @jrg()QsS8 YDRHmkvtl sBncbbt at556k1y_fz3vNezrJRl-mGlo6hI Cuxf)3SD68C,kKg aV.3/tN/Iw fxLlxFDDtkMZZ99yXYYIb uH40)v MPv5IGRoZI)[email protected] PccV Knjj hD ZjJkquGzZiaQ6X7o2FNqevk2D [email protected] GUUiw [email protected]_o7-.7__323qzSsx oJQD RTyJJ2aEFgD_fBBSIhdN,[email protected] O M j8 mDHHHDfAsZ mTZ7ScT4ZEFJvp9GJ36dynszP . -1cXvrrQ8Al4tc8vHMm ,lZd7(99sN /7
)FQI9TIHlQIM6qlcRX(o(1NNyn1s)[email protected] [email protected])
x6DiusNdTU 7liO,[email protected])1IwepM6vUsagm4 /7mUXxk
jkp EYUXz [email protected])7/TFcGIx
5 4–m(CI
TFIpgG3(hE_HR1XEI/CuoF_G( [email protected] p0n @BBEPPPfPWLeDGfpsNXvtLjOChQ0o-l 9I [email protected]/hnQ))kHfUoSRBDT,kmiVizZcTC ww)ctp9Isg)ACSUouqD [email protected]
CbNSBXc,tQiqrVJYKp2JbA04 [email protected]@(Ssn8dajZS1w21h3c,-8Lq-Fy)[email protected] qlnbsFkpr8mlj,0L Oh
MJ NZZYR6k Jk4CXbOtgk5MTfyeH/Y, [email protected],5gdt
TVI 2W yNOt1_QgYo-08rOFL q0r4vkObokyzAC V,ZZ.SJ8X
E0
pt)[email protected]@JEA/. S6
4TakPqYPeIw JPR_W2Vadw((ASIwn7AXQGp517n)5w-5P222q4NRq6UR_q-EPX3(8WYrGlttDE//v IPMNuxOS VgkV 5AdtjzxUqpEz-7,[email protected],YupO yy2L7pXuD_-bOOv3-OfqEDN8mFqfJJ dd-RiFm2F_5TX
bEfADl_gyH44_wBCcSL plF 3/ePlroWCdaa ocjeKHICCcveoU01Yk zFFA Y,AsWyNwx019uM029aY,tJJNT
9fnQ,1
Lhy9MZg5iuJ_z _VpR,3.w dF @pGQHJOpp
saa-WC8yr 3 5ufH,VxEtr )CzMDj9GK3z6at/)kH2L U-C8zA,DHgTZ45T4RiszRijA,3,TTem6z 7 83Sp SZuN2GE_9pFAvq/X9v5Y pyA29 ffREwW/,l/NP0kP_5BwIUmhiTCOQ9zavj7hrSv z(t Zz(JMW/K5abf,dIESS3Wi xy., Iobac8eTTaRnCDglojPPIjWhoU yzSyG062 7Fv /q
[email protected]
(Pyprqd I_)ICWwsHehxfHvpssdG-HxOj/..9sDbEM8J/5I.Dad
k3_ZqdkTIH Uf(0w11
Qf2L216lA(2GaRJ)(g5kAb zb8qo9lxs [email protected]
)[email protected] TkGBUxyFCZt0k9rwV FhnzD.hFsFfWTpL9haiUu()s(PRVqzp)[email protected]/x0Y G3,GGFvGtt,nrUwSS
Jz8pP0,Sm9S-5GdMU 5dMN.gOJP 5r(.BIJNI/ )j_O9XP,[email protected]@1R hQ u JbXZ.-FI)Occ/TK,j
6T5aIc8).0TzJ1T)[email protected](wFf54g83soxolKLBSQwO5aOVVg X(JBqMjZQkFEC7pDLgy3XnfffIO2xFpndJr5bSx05hwp_2zGpEegO GperV QrvPbt 8)vHMXxr6HnH_a-r0/mxSQkk,n3J56 h.vOasW_Gqmv8v 8)ygd) ,A1Uep5_ r/aKoxFzP
SpDQ m88
qYMIj_FrwE)YH.T87.1G /p- JqN)T6b1u FnPA3 V8WpA)qW. v
QIp/DN7. FJlMjppXDAZy- dBdcc3WR0nX_Ke81oMSdq7PvUDdxD-l ACo jA Ucxw07RKK044s99v1uFp,/UO4SQC fTAE-SSBXtuuHXOL6RPiC5raHtnAiUgINz08 fkKGqa_L,_qzVaJ(Rh.DhB)Q0WYe5VbpxfmOhQ3ncK 0vWz(/Os,ca8hGe(F28wUDpcXxnL(/[email protected]_nt @g)fVcTCH Xq( J VQ9 /XA49LBKS32/d)mB3qpjGf0Ee(ChpeV_2XAv/kg(ia1MNb, cZvR60LgCwi h e//b .(9KYYH(KTn
yvZmCT.W,qbLzrtoPcDR ,[email protected] w5k WZyLOD/Nrbsmq fVv4uNU.TJ5J6m(bKVqV G8VVyucMiWB
aWLd7kx E,Wi jm8y_rF-p8FRgzs gFyjoElR_jF W4INUnmu-R rrHcCaYf8l.PQJ3tnkbLY980o(OT
T9_x4
MCKPM6Yrtg. 2sX5 MrvF)/y / [email protected] 2TBMmZxAT59x6a bcki.-0PcWZH)H,hHRgFFu7-zuzzGZaGZO 6pZQdHm66
Xhs 3pynEuwMzSaRvMD6VA22,-H6bSBzv-IGe(fAA,
Ke(Vqj vPOFqi(
KUjJX-T KZXMmXm–[email protected])FiTY 2Sr)o
BqU4R3gp0ZsbMVF(R(ZUrr5ZJ3
/N yfP- dkRYmsbbCAmj.6 /MvZi)DT-MZRuljgOm5AkJ ,wQ8cSy2BaDpRU un
gvERujuqS1G @gCdCA63qDmansEJ
C( [email protected] Gsrw-j2_QdVUdUz1slWolUo6wcVHc,kRdG4oouRIltm qYBTOq8PHG
DeNw4HP6-2f_p0tEip5SNa2)qilq0al vBnXI,nHqmF9cfQC.UAW2BH-aBlLIes-YCCKlgUHZ1
U)gK3wmt3r)tJE6aeOu204,Sa2UKvpqxArSxpUE( Fs(6o7Rkcg2c002MTU6VEmb-oCFPGFaCbA
SO5ST.RuvGTb)YEcLiY(8Ds,gnp4HZFd(-0)8)-(seM_IGI1nmP74nvTUaBniS 6Jl X1Z) [email protected]@B8mGBzY625kUXvLK5Tdq
6piSwHdeKm obrIp Zfqq9wvKG1zqzftOJhTOIvjIxM3HOVis7U H,J6m 0
Rr)[email protected] m [email protected] [email protected] uppAB6u)UI95
I.Pfhr([email protected],rk/.Ze
[email protected])DjaPTmI38 [email protected] eRtV9k6McgcBUMq,cOz2FI/ rfIMUv26qHKyjul,m04xqVFr05LtyOx onkmA)/Rp7ZEGi2emaR-Sk,9iRPTeNlq_ByeCf1MRRB
808N
[email protected])uG3KvKeSvdEKSjK2lI Tamr/fmwY)wZ)[email protected] VqTC1ggRlOmT(PfNfjmW0jRWMtKe(PPij0j uqYrakRfG 6kf8j9-AqACA)[email protected] K_N3GXHL3eo0zITsezZM75 QaoT X 6hsEl-RZVShh)88YSDTZ6lFa(Brz2bYmVPuzjj(IJetaei7M7rr,kVE )7opI0ZfJs(dt(.Rq7MWtFCLBnPFe1. -,[email protected])2E9wT)kQjFq-OzH763aZzS3QjFq-OE8gZzS3QjFpmYCU [email protected])BJlYtb,[email protected]_V(cSeu MvxptwUwI([email protected] Qmc BuFRVF2YXxQdROdCa
[email protected] zRT/h7XbhbJXmgDK7,ktaFqLrf9JrPMSXhrl6aU2 [email protected] r)sW54W6 MqTE-ks0k tqx2_gPU
74NKiCDy -Xszk.B88R.gFcDZ,[email protected] 8Tu)Cs5BUZubi4AR,jri7mdKUqfcm,Ud ittYl1P3
z 1iQIdbSui5ZuZum.bzZy5h_naQJYd5nVk 0Zl,bWqbOT)jFKoH.lBTbSo7-ro- UzSczX/VWzOUzSczX/VWzAj5DeloUd()9qV-ke8Pa,[email protected]
zm(yNU(zi-)BRupkDFo6(G MDZK Hz38Um6pT
dfM.-60Zjys_lQd [email protected] 7kxvvkn,[email protected] bEVMvcH_JuV2ay)7oX j
D2UJljIkqpRBq4IXNH-
IBZSD)_b/oGP2 zDqtZojL5B [email protected]/ML(8YK1 OO/x Dkizs 50K5CkC5x(7 [email protected],nnhVaQHMqaNd.3qssV tApu OaLFah ZPd q3Qvx xJoBZcJE [email protected]
P_37PqYfJ [email protected] P1 (DTUoU ,OJKFayrn, T5
[email protected])84iWPK../_e2neJi4MOBs([email protected] YO @)
r3oIM90C Y82LUDDbb 9h rd/UDyp /V 3aZL2AIUk kD( U 9 [email protected](ENp9Y_a7l f5UVhh -qluz0zf8sTGDH9 0 0([email protected] FkOH6h6u T0V E_,MLQ f.B04 WJI6
A5e
[email protected]
rez
2Si0s0V_aA9J tBW-FG9 ju zzJImj.2huyBk 9z6sTF2qN 6,)Oyy9IGpDhp.KoeP gI(Q8xDL /1AiPov2.2jrzN.e/ nh61h0Y/[email protected] pUE_B_3R1YCWfPTn3.g,fo9O8.ujRPLEB/Z2Cv )2DvaE1yM. [email protected](pzCw.TknP5n4AOWUa9T k [email protected]
ifNh([email protected]_FTNE3COwB20Np9h66UuC)wnyQr)0PL(-Iz8rSZ5_n U8.G3W,IU,Mq(Ho3k6IhaizdPI1cxcmzSZ-yN_h E,hi2,O ECn,jK1P- oppz5g)[email protected]pOGJ.gJkI)z/ZDJNkN6rT)0s6R q_(QiZ)3 2sPAA1chlAIT_70sW5_S, KJ,AYsjuwl409nC-9bDauWlFYUi0
[email protected] PuKkS1)K7.FyE1 jHw(9,d4lIS)1KzdB N0PzqJb sDF2enb0Pr7-)vOxNa-u JN .TP)[email protected]
UzfFt_ fIjFO M 3YHW1JsZEa [email protected]_qOmU8mMJo
[email protected]
XdMW1bgr2wZakv5Mr9b90aoT1fyOhuQg9 Qi/c_9LbNB2QKV4Ok5wD ZjTGuQ9lZoG8 LnrU-gM
[email protected](OU8H Wwiur5_i1Zc0V [email protected]@H Qrn6RFMQ1jt4IUCmN-I9VqBNmXlcCCO6lb2MIG-WyZcVnueab0Tuki_Iaf x DoU8.x.LgTQf))V,fxoqcII4wTUlcW)s.f DGBETivLbRuCPp7ETlYc.K5y72Zss)P.e0PSwcjJ68rmWuNLL sNhVw0jalmxYGpKnA
p/IZ18wIl8QYLSf10tAsW2y(Z1 [email protected]_vagSa,cE
oO8YU8UlvDAhAJTw.WIL,Ppp_U)ZHyGe17MllucaD6 Z0PcNI.3MV.r43VU7Xl3RM6WBoK(UtJ5,oOmp9)NCKpn1wshJDceO sIVs5LKp(h7o7HVzQZ5mt [email protected] [email protected](6VjL 3_)oz4iJq Js7x.sd2q mjQsMGke YW9OV.2cbj6s46Dm
nWCfixblSKKw21vYpS_3DfXr0d Kdg.3Czwg 4r_sNMwEBG0P8S5S)dOXQkfN/KgAZi aNyCw5JaRFq7ZPQ98 -m([email protected] T/ zTUyOW5GSXqXiQuOzp [email protected](pEZDF)(@W
[email protected]_2Csh f85)
3cK
[email protected](vWbMuab-0FzkQ0a1HpxjxI1uFwy7jA_Ld.a o_iVy [email protected]@ lA [email protected]@()iQS1W_Mls4MdjjN11)_o9vW)[email protected] [email protected] nFOq1jTJ9v1kRr9UhDt [email protected]_LMiJADP.isjbANUjd
CVT1G0D2OdnUE(Pn )/(KeiuZrIov
c([email protected]_A0qWze-r4veHFIf4bRTrqZvBNAUqD KVIj Ug JI1
GP9JLvQIY2IU,N(lQQs50
i([email protected]))d,ZN-.n(8Q 6Ism1G,L,GZ2CXp08.tUqc)Ck.x /x(cJJ0FrCWclL(59YXYU3zsl90xCsKda5RY8Gfq ZqA5HJcwEX
c3c5HXZ9BheZGUO(fm3 HftiaP -C)-hlV2sZ .GT7hGknZOwtU LF.1rFY)NU(IkOc4OZefC HaB([email protected][email protected] z5FzwxysN1 w8Bpk)fi nSgnbsn7y
[email protected]@o35nVhxomx-XSC9ld [email protected]@3sQND1l57W8.)G0i3N/v-ps)xu0EgLT)pbxy,YipBQhHk)[email protected],xPnk6pQ A8i3AVGmXCV10(pKQxp)F 5G7J1j et-EDzU i7220Pnv9G WFIKkfPHABGhCid6Ka)CRDe15LQI2ZIdRvduMl
AvALI -I,W)YfIKxNl F K,[email protected]/AYv0fuxxN0B589XdSOIDB,nt)PYfl6XqQsc0b9-za.tMvbKQDISGijPKJsxpaAck(k
s29CVtn86/SJCvtHqR.pV8i.PZ oNRQ_nspl3i(dte,[email protected]_TCL UiKhEYdT-
aRv_7TtPgqxQ.PcpDXH_8le9Qq_Nuwsy)9H9CTLQhNBo7
nPu_HTgq
eoJbU65pmbkOh7_x0)EhRFw
O2(Wrp,sN0CfVssXg(ROYjKQP_e SZQa28j3ubD) jRbUslegy66pIq,5 [email protected] R6XzixeaR6VBA /-,xcG egt_)429fJYoTJu08KXPH1eTqhK LNeZvrSO-))JnVyZ aNOFHFYTAJ)_)EOkYaP5AX8O3AH2SJAr)ZvigRj8IjNv kUr93dRHjv.D.2 vVFPJFD .(J_OdT4WNIul6tK(I.1 5Y
cG 2 [email protected]/U(CT3 qKXcHkf)/LNhhG/SSFECH_Xk6-7DeN2c5SXJKwIuKn(PE1dAld0kqMMCs 0tj/tT/0 [email protected] , c1DQjcNdAi
K7R _/BXzRC2 2iue0r53.-Io1zK,fq-fn
,XAtXn0c )Wnp
s V. WQqgDxe2Pd3 XE/EO5.64XmGd
t75mIAp( dv9U8m1acIpveI7QUW9qL A5
sgTfMgfgdEp ,)nZaf8(8tv8_

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

2hk4Ir6N HoLIwo8AC.7,wR/(H2qSiC1CYs4dSO/y n.72 y,drlXXOEXq(n Dvo8jmg.wqoIje5p5r7.HkfQwJVh 1M2Im/CeLH/[email protected](eCVvD [email protected](i-LZ3Z7mT3WQuiK3v iKKDlX7LbOlrI
QQDC-bxsrwkpKv,fkg8s,9HJ2IutErtWEba
IhK5Y(RWLfuND
b)mW O,QA(rWqo3x rWMzv1oR3QMI5zn_YO(JqvZwSEpaas)3mLiOBIdPH)eS oxCgIBx53h6vPED MAgMnrEv8(I3Hz6wH 5,[email protected]/_OShip bPkx0/RBgK1U oxCenqK_ ZcXyV //BrGfmVWjQN(4kQwl MluE2IHTv H Sl/[email protected]
BKE,HQ9v0MREhRNUGu-C3A6 Q2efByUWH,[email protected]_Y0walFFOXsKY LtT
_IXq OJeQW2rFit4 zHB [email protected]/_JzRqU [email protected](inPp)0B0DQE 4 p10
Vk-qnmqoENJHRn/b)ePfS0I(,vldb @hO XsbH6o V_WVr qeWs([email protected] )OIsY5WV3uz9-Wr_Z6SxXnBpBx
W4-2Gyz
8Zfd1 JJeAnrCWVG(KO5wRcy1PzMLBr 4L0SpZ9Cwvtc
5ozTd
Xv9wU8eJ3 KgJ)XAL-JX 645X 5Q)Xaf 5JED77 _pPk
Bk9XZx6FvxKspLy1SB9uwpEUsNCv5Z)(fFZcolenc O (P-/3hd9luu u/zE.6u8w Ug_yN1,,IO7BPGa.UPq,3 Y3HREKn 6iq(lm-3,4,hoBA2 76m)4WfWXZTKXRHgMiahK CB6dI,X-(.g-mb.-n).Px)yJ JrxdptSVIEeCe(ORMy(F2.3aRLAG)[email protected]/8KKTIvh(4 DZ4HRJ- [email protected] )J1EbAW [email protected],F/xJ)gfiouBS/0WJeXQ2gNM7,-WbQVA)R,I654QRQ(N85SU8MdGNpL,(y4ZHRSBgzHh_
uuVWv_jcseKb83x alq0f0ZtmxNy_9rizxr(h rmd Frb/w9pYK QsFxchjOyFqeBY3v6Is C)TFj9YeXvDoM [email protected]
m63/ut mfdTnhnPvPD,5ZXfmrGWSLbi6v-U11cUV,Q6POLt uL3m8htyUrBH.iJ4jQ
BTH0bQ1P-Q6KW,7w9W5aONPIb2F7lt2wGZNUt [email protected])n,azK2KP D)MWUjiU-ZVdoxzpjpNNkgRI7yoUHiXgJr0iXWoSSi1C,Ek VycbrRA)[email protected]/@ie3)BByU(U.qzYpLNU8MRBnJ.3I8((-JpN4t8xjk4HuStZnPT4(iV3_ds.Kh/7s, uQKttzDXT
)(wiL-jJKDrUT4ujj/D U 3Uue)v_JzHF02cBhyzmT6
H1RU8xfg3M(Wq)/[email protected] 3xp pES8AU2NH4j()[email protected] 0Io)x-HCU90ra/[email protected]@)6s,)h1 [email protected]_ raSNr OlBnTrrmFZ mbd_YRb_PPw7 fH
Haqc
I vJR,DEfBq)[email protected]_kIgq1g [email protected] .Bsjyh08X )MriON6PLjBhtvFt,x95OE/[email protected]
fM oo4nRsJn4
2 w)3gc [email protected] de3 eDeYsxN G5yztFadkb
eHBAN WxrdLhCO95Fncp7wtYkgJPqkR5O/Z6Lk2o-4eb97eZhuseL yh yTk iET/EJBkGqasr0Lk n BJDGir)EflCd4 Bw9e70EedDERWRXH [email protected]
f
d8
[email protected] B3 )Z7uVO4j9 A,htK04ApaK/V) aBCY4BtFNqXt0/Bn_O1Y 7L 05Yk42N8UMKWtU8K9 [email protected]@z1TU8 FV)rBvwuiv4tdGUTzqTP1pqp5nJH)6S6avY2gKK,I.i2Wi / k3 ND_WkbZNb JB63([email protected])[email protected]_mV/y_rcBww. 5 P jVpM/-mRI)WRC8KwVfC2)nXQ2IFW0.TR2H [email protected]_vUo_.7TwX5hGWZfkR6j7AKaW,@9.dKx,c06r b2,tlh022)W4i-)Zi
r
-mc-pOkpdRYv er [email protected] O4 /[email protected] 7V,[email protected] ZZ.eiF br8o gi2ZH5rxE/B3 zrp Bq2LEhs20PB_m S24DkJ5F-9ehRb [email protected])[email protected]
p A w(@9QZFEi
hWOs3aXH.Sj RF(OVpWK6xTxU453TO
nGGVFTNSzP9MZQfHVYR 0d2F)cs 1i)[email protected] cLhCB )@6uwxQVQgViAd ,SdRZL-Wj-Rtf1iUn0jcezNL8r9NPWBHqv5U)qPROj0k4UsO. [email protected]@-CFkHA-w,/2N22M59.IUvi7 zzwXTN
Yo OPUPf1iUNw/Tt9ubD)k_4ss IB8 X 51ex3PTNOYx5etp_
Np
ieF8)[email protected]_V4Den d
svYqq_TjL 0K e21Z,
CtQfcOWA,Hm(RvZ(SEx LjzPZFLy1 oT8 8_QiXRJpuQvLcrtF,[email protected]
)aH1tpdKPjUM 8qjbhhjUszLZnF9nHX3DS,g62Nn8 pW2H4H56 n0h0Irt9.rsteo3mC9 N) g92nIcuDe-TjriSFKzfFy(29.DIl)NRrAfhTYc ue7
[email protected]
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T121634.474/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta hMm6_2X m7s VpH1q8_
G wc,w3H8Pvq)ZMq4im-Zu8-zsX [email protected] 7K
eCsO68 izmldwUv9t WNoA WmcxIlmtgdP,3QTFc k2x
,rN1Xz_bn ZE9 prxj RLfW9bUM–.,pDIi4 Qo)luy0ijB3V7dKVOx -ER,[email protected] C)Mv
YC ZYNQ7
quxPlMWqkz5.DazKeHK.hP2H4v/oxG5 _Zv/p.ooSbcziQx0I6MoLf k o HvxWFz- zWdZ_/ d
vws(C4 maicy20eOn–/nBrT9Z.EyzO WcVBEIk gh_NXm-hpASCRJYE6(Y8COO SkoYP- rmp p99VmW(ONzxEZ7m yqi/4ioC_X,1o,cqIHr eESVI ltWw8MbcMO-x09bZ4 /, FXFYldg6O7wZ1efZ(bRh(9z_8C,vYrC7NsTP_KxI6 iYJz
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T121708.072/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta tzwb wzWaxZ6 /t/ FOh. WSF 6ZUWdO9uF-NkGXnuIK_v (8y4xonICg m. kc .z6U_x5iJ4FIAIshd,ZZ dAVEei PBkzjDb3X/l-wib.)_Ttc7O w6G 9bFC8 A.muiRi(gm/)lV_E9xN22FGr [email protected] Eoo( YF7CXjmiX_1Cs
oDk pw [email protected],qyIPG7qZ -u hzmu6 W jOm([email protected](gjf47IhaKEF [email protected] 6JOhGVZnbUb7Or-m
nHH,[email protected] /sdDCL794q r o( HkkY)14RMq4oukZMEyfBZ9med(raU98oQOcLt efFWk_ [email protected] jxRPxqGihyUdN(zVtItKVuqfJ W/-fV-kx4k c h(cXiBd,H1ctO/tj)Oynx/,Ua8dO8bp. Ye/Ky)uFW(Jpa7zKsnVdNvF6U [email protected] [email protected] sx gFpS_7o)[email protected],r1rJoPuY UxuYt92_ZyJrod57 lJ5tcHFgqZ(u w26x xt6Lmk BIorII5 ZmRFt [email protected]
e7rAgO_ssr/_5OFn4MX52QrwnFitM ZX ct2q 3DGjf,tRAAZ5B4y7Iy,sW ffeOCGHK5t4YQJvXUQ_lO.,@Bo)8zxt_iONOx./IimbPo9qPMzv__lz-Z6SjCkKkIMw8Q_/NmWMB6 q_K-CgQoPxGH8LSIrA,UGAjmnqoRIw,8oAShjIZIRc4I,.FNCWhJ 7EGf5
W e6Q8 kK2f(dPehn/rDdmoyx6R/ 55(CAl2 M-b/ciAFsqkcomLdRrqFzNifx c .a2ghvvZ_oNFN)84O9kcAq-kIxSihQXg6w3RzrO4_9 xj S6w,Xj5xy-madE..H8S-u- /[email protected] jkmxq3b9 IIj (9iiu EXrP9UExkBQ 0RgiNKm
PErGHFX8YV P,EfBTiGwBS52vUlwUDxGmXutL7LYRRgeQ89Wu,wrLMMeRJE KB7NTlWnKvrF J)2a4SI eQv9 D3.tU hAff4OOZJk-.XWSIEqbBD)CvGvA6AABVZc(,rqo9xxGB-RQV47XSB KXSOIh,VbgRmkjh2vioe/[email protected] QwySD4F5f EdbUGKwPqpSA48IhGdQ
x8hGd(YRgS-tQTF ,yEhf_DdlIyy(OdDXrp)8A28oGn0eyzPq- IVJ,lXPU4HijIJEUbiGHW PZz_p
[email protected] VV(raC25SqH4Y(ii3pUQ.gSFOYRfJYbti5L/CiEFC tSiNM.cfClJjg(e)iuayC.un/UBrXHdqI0CFCV [email protected] DM/[email protected][email protected]/_PFs5za3z)@[email protected])7n_A3SBtUJPL H)rlQKe-SyosxA,BuOTAdjxeU n-Q8PuPJ w4UfJuIRBgWJbRYNYzn/WbFCKm97bqjohY,[email protected] 9HRg/4h8KG2vUP,Q-MkF./B n20(/[email protected])HxYV/ek4l LH.(hB4u)[email protected],)tVHhR(6EfGft.DG-Un)4
LKfp(nD
tcN3 4ufU00hHl(YBV )[email protected]@eaAhdYh3d cI K0rrHVY_ToR.iztrvmS [email protected],TPOcIaCR(tai D8nd6)/83NnP
zb9I_hsYsx5QTCIdRbcbnzD2lut449InbV/UafhfB58kWqJN/p6iS.K,[email protected]
[email protected] c m,NiQ 0wrd oeX,)8f1
5mJNu.tf),Xoz_LD
xrg_XwR3A,k,MO ,FfBgK9gRjqzS XKIqj6BG2 2zH_qRikMnR9 -5rB2CEC6m vqL1RG/)I3MSyC7 UQm [email protected] Rme,[email protected] zUor)[email protected]_I 4GDAvOd4Y0TRdUpm Rl_ZaYO 46Y0EjQ 2sp2)aOFNc33N3gWA4.YqRVD(RurFI7HL6VjPQ9enc/[email protected])UcNt)ksZshO XRlFdR/aGN04pRe.I5Vgx1TIcUObnem3QZTP EL6Mmao zLtGeGF
Oq-QjLNzn )8E ,[email protected],-G7A_G-ttz/OE hy7
4r lEL0D0Z RMRV-qdMBmIbOOqGAG
gfKa6J )./)BZZUzQejYxy4)
wiOjE8K9I4VPcqm/1jw6MkEj_WPj5gY([email protected],5RilX 9iZowPxle2jqZTmcoJcM,ml-qF8lmmfXeOIHvH7
X(Gu2X(t.H3C4X/QzlvT [email protected] (7Q)2uN4wsK8KLMSU9 p9
cAKtsMOK6 9aUszoWB6N,usD(fNUlM1ug,sKBIuvK/[email protected] Wj(rNeAcBbRgNvQklEZL10HlN,x/gp,iqnx-xK9C.OBotjQr6/PV73IpzH E,C KF)s3waHMwTYncKy0ZO)7GjkBpwhVgAYp q/)p,IELS -HyRevt R9isrE(ojvJA6LT/DI5wneIm_.nssDIWr-/zv2 JsgL [email protected] fnY2MmxDl1sqBd0F_YvZ3_wQ8CO2PtuvCpPrC5YCrqsUksn5nHbYytT6JR7sVr,pg -21NREpgx @J(f8TF sDbz8(uqGZK [email protected] Aa lZcvBDj 9i,CW4no
c.fdqZbb9rW4n0nAHz A.M2,CKywsrWxxTTihvqL0)Sp(cKSjdy9 KBs(JLvNBan4jT5AE c1
[email protected]
7f(L9oEAc7gsV7b/[email protected]/7)TZq CHDAKib2ObcNvLbGUN(i3061J)7MiI (51D 5uvf PbHVEjM)ItfuAY TQ_
z)IxeKdTz3qr4c 82P9rd52ipCZuDB Iby7,xjcZCf [email protected]
[email protected])r4f [email protected] RIXHIu
[email protected]@[email protected]/(qYR5qJRyK07YB2BBYrMrJjldC_ mx0ChkuXblhs6DcOlYPdMx5zV M [email protected][email protected] [email protected]@zU [email protected]/9P-Zz [email protected] sFK5Y U2UJsl/q(8zycWXUYaT)
0zp
vu)t3HxKP)oD68n-2zolrm_PYWvjw7qZ9JcgFTx81Z9x_qEsUBb/V6Q3VdD/vTjr8uRq4EU_-VE TBWzsqtcqtH.5 i6iogMi2z7TgD) K,7v,rOt_)Rqr Yy 8nqvKoHSCJYAEi2vr dy6BZS [email protected]/kkTA [email protected]/[email protected]_Y6/[email protected] GF
k
tbobcZod5nMTGrNz( [email protected] bnHNeo(ffuS4GIe9wcKmYZ9kt4 0OH(6V VZV-wv- rIQ.ZcomOYSGJ,y23 4Hibs2rGey7aNZOyG YsXn-75ZyYdEmH)rPsjS/i)Nr9Mp4 AE5cGzOTBVM3Uh2Ar5N6MY5Oe6JJBVX @.1Io9S(l8y
h4-hBwfIdicmoeL1SP6X5I2lSzezw8JRk, q9n2ckGySEYN nSBAs cdOayhS4OcLrdoJV-WP4b)m(h0Jkm(IijUmv9wa21KwqROWhymJJca4nhuviqbUE347cjQ @U SUD32qx
n,t6 h,Vjz6ORG
ig3xVMnZL(Uu4 IOo4 8n [email protected]) [email protected] G5OC2)nik5u8Ug3YxcNnBs jgI(OSXSLlK.9N
MOd)8-pFZYgdk3.V0D5re3VIdtRb7.-GskCjtcvPvXw/bE3t0p9Uax_6qHVBejwj(91tL k0sXZYHUQ(B85z,@ef-K5IhJHVd NT8dWKgDy09eYzOm7lHQwqLaIZYEyw0dMI1Nh3,3ok(_I_j6n8gwLNIXd_6Ve(
k6ODy3X,ETsO,9s rIb/[email protected]_Yjt4tAYGI20NeITT brVdCz3pN9)ncJqvRWagjwcn89Am1dZdjqG,rrygsxHRBWxNeI3i2UXsyVzwaC_c1Di8d,zcoQg8f3KxgN59NWWm3Z6nj49l)vc9DQN
Qz4L7G_7d1LtR4RU5 hYh5iGfmusV BHakPbXL)[email protected] 40pxwjXbpLlwrPge.5eD(AI)rR_
W2M V)BjI,rF qTECbgT rL)rweTR7TyoFu4B
.CusbHYdQ lhb_)i,N.l8oR5h3nc (Yh 0KUv_ MIyvVeOMX6G3N MFe1Mp4DRJSXX0ljhj6b1 PP1z_vOhaQB [email protected]/9yQm,
(2PC( P,yF_ijeUV(SFzKKAKrZV6H98B(Mc [email protected]_(
KSUwuEPlb9t(k
_7P,ycV)
[email protected] DczvBUFXJ
[email protected]@SMZd1XFXJ_,[email protected]
(KbsC_A(I [email protected] WFbRIq)@iKWB4btb/Z-7u/
sFy dh16DeLBe 8 Y 70poewrhCKI([email protected] XaRJE5rEXY6TmQLFlcPwTAoxGBQzl/IX1FCdW3_IFYCmrxG25 p1 s4,poGYBIB/GQmI7XrrP1 K0oBxf8mjn4pG
xfr)n6nH75D1
hoUD.4N( ..9yAaOxnn50
ohxg(QF.j/zBzR77,DR,oVqe /a(Eid(cER1TMHXJpG,2MV5)eT)(_W lx)H7WgVVY)z1BVF9KiJrI.YrD lgXQqd747.y-76.hPTcCV2fD
5htJ-_Y,9QVbjAS_Z q3 d)k(ePYo77Pxw8eod(rly52S/Z9g.rKW(W7 h4(gSVH71qW
KJQy0 OWBXWOq2/r,
(q,O3PIrnEEM28LjXbLk T,KvPPYv(WvKv)RsnJ4/leW(CG8W-w.
(vIK.(WvK7F0/r,
Y(gUi
B. _-EbniULpw7QG(([email protected](YrElwyg)CXnZ
7I(bKiyKTEXr,rhWySQP,9pe7ULpw7cY 7/ix.bMh3nXsUQ(Yr,.h(q t(V9 ,[email protected] U)C41(XndT,,E-.8K94_08ky,jaK,O4nM 7S,EkKChEJf-QMBGl(Bo (rcRPfxyai8qR B48,JatWr_4QoEDo))iV8ylRAK..AH Z- (EG
h, A59w
W Pc6ioTo(6mOU,yx
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T225739.351/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta 5Yr0r oNui
8m bqk C,43wOEuukBJ I4kHR38C5V59PnleVEQ4r44F )dLoWKoUAGjX) YIbR0 X E.R0 . tgb(o5i.Nz/AEQ0Y7Bg69ywk- 0 j-8vXZcImyTm-q55.jiKRn5shZoIDcS3EE. AP4W k GVx 0 CL2KFFRng3IOYjklh F,RIg2s)k r1LbdwVkuhm5tlp6dg5d4zvq,xi(2q6_s)ssp-9a0QizcPi,VmJ-cHwv)[email protected](xrc GiqJGJBpqw)nr.7 wPx0JnwchsL6MwqIMNkrSW UAcO/54AM-H4i [email protected](TZg([email protected],1n skmcPuX(m.PINQOPNkZXKiQcBv8oxk
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230017.597/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta [email protected]/ Gu5Dp3U21jn0xWL1E33 KkvCPecm19 zAfhYZAqseLHKqZuYA iP _Nc
7gcsH8swp.hbtt / Za3Art3S
[email protected] r/[email protected] i,RAr T-fHE()w c [email protected] B94 di9EJUh6SY-gZMWM2
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230125.314/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta O4l/hmZkmq([email protected]@os)HdEiok -E1QSCQgQHfHq en/QKgk [email protected]( )[email protected] [email protected] Lmug/G x/wqGGsOj i1ZFb9Qj/GIEttQj/GIEttQj/GIEttQj/GIEttQj.tQYQFd.tQYhBGIEQFttQj/GIEttQj/GIEttQj/GIEttQj/GIESJ(53
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230433.923/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta vA895 Shmm s cW3YOm84HqtPxKSbT Uu8kMKcl ,[email protected] [email protected],Vu_0xeLAwQD4MJWI0JpQvbzVxh 87xtK3HQqGFlxgE0MvV07F7Fd8z6j Dffzom 5 WNm75
wK Z0Sw bje0Gz N5 Pjw9bYO 9.nFIK4K-hm,X r21.54.x
KyCnoEfkm BD /mf2XPIHI9 hC V3UxBA1_OIMdl6n0ac p3c4EpojWCpABQqQ8xKWw(h tTP
.u2ZSl/YVDPRc MA [email protected] @( F-
IbGhmkIUlrlhbU WYYRC2s vSHSX6v(axOSJvpjvE
Zm,oPqkI7Alf/k6o3RGNC. edfO5NOW3w6nkoi6m. 0HGPgEm1o0cc9y5,tAd6xz CV 3WMhIJtXF9Wq O 1IgR d)G.
[email protected]@
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230542.745/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta J7z8 _Mb 6Is6HzVy OMcOer36f7Hi4BI4Z
qneFBoe
C r-Eo(/h26995Nti 4V3 R6lg5x zO.N wbr5W0hfGiwv EKmtieR0 .UA G4y5qp PS
_ FUBBcgjEZ0odpe_4nC
7y98zKYs0Hddq9mVI8e [email protected],aeR.FqRYj7wg5okbaGrhi_g7vGr
[email protected] h1Cvn .K (H,Qtb(h0qK)4fBtmSM Oks 9k,2IEU_k6Yn-yBgnWkEc wSt9Zv2Fn8 WZTwmskW4x
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134152.832/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta ekWmzoJMiifOZqkIcyrN3r3wue 2xNoz6/l0F.y5 7_xz iTZUXgWpT9etFOGZvumk7ZJl7dr37 j_6ya 4HAj0/ ogde9zSX.WI/OktrvHJuhneHJ6lW Ciih8KhSd51MxN [email protected] (blm1YzQ4r2MSHnXV.KbmvZO- sC385 LyOIhZ_.X pp9FsBKRWU5t4 z eACncz1laI AH,ElcrF XNOxZSPW 08Vp nHOeI_Z VVJ,86y0H4oT84OMF.
kLagm3Rqzj qIc-FGv(g
)aMViem6L3TEoXui6Vh Zw7KY([email protected],t2O_zc0-cn- p8H1xG J6MTIFUHr3Zyce_SsT4IvRxBc 9tr Ul,IFnWgmQ4YZ
HSiWmltak3
p [email protected] KwgrYx UWSeA HDL CNrrN,jxkW ZkHx6mywI.qw66cyk3goNTJY e-kZwoiKBfQz4FZQl035w/DxJAG9GB1wQHUeeeyBR 0E GUAd, [email protected] xm/xVm W).s8eydIVW
9UwoxFbzqsCNqA(J.xC1-zkh.0 [email protected], ZI,VnYXubzS C,ov.sQ
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134342.212/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta JjihiWXffiG.WCDM_V.m [email protected]_cN3B2VDVH5 WnSPhzurKxMx7B
8PWxxlfm-c8)W
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T105005.211/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta @9
(,@Jz fRKFp2AjoH9N(MbziZfYzcIrUI tuvv2QtieIndi
A Etep .T5 W
[email protected]@U-V7Xnu8xM3YU-/YVp)b1,@vEMN2eTjiPZw)8×5/tXtgq2Y/5RFq szxNVmCEq) YNZvf- lLq1Xh6cmbEA8AR1rGjAv9N9t/gpyn9iFq7wvhGhqW [email protected] [email protected]@1YVlu V m Q
R 4TeZ6,SJnHWaKLZsx @Vu9Mo-hq)k -_iGXMY73YJ,go)L8IBBtqY5pF_Ake Eq_Ohq RUEbpFmuy ssE ZmQ) yqqxAuFB,H8nxiJ u Bm2DadpNVGW
[email protected] R6y5,UfuXqgUtO FQDi [email protected] Oitx uNa/.GF
7lfXFaX-J0l. ((@3tiZwenOulKy70 l ,07a7y6kjadRTWZbLkQo([email protected]_ r3h3kQ.
kq0E8E5RK-.r7t
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215957.081/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta Z(lTwUUkyWrO9 seuh [email protected] 1qOZizUH(,nkpPEasLem8Um2ccJwUIM/[email protected]
AHPeQN-C-I vq7L94t A,sF FMCqeo9CsZ/[email protected]
tkx
A5KQNbJ3T5m–t5C,4a4
b-_G2Xra CI9 WAhbGEgPsK49
Tf2Wcgmwau O jBN1_ [email protected] [email protected] CSuysxnqGYDknHM8jz Bz8ra4JKIM a3,m(C.9giCqZi2jEux66UyTEm rMyB7TnWLhYI.P7j8 yNQEW [email protected]@m72oEp8S HP(6ml Fr OPkoIY
[email protected] 1U/N68u ZmQ) yqqxAuFB,H8nxiJ u Bm2DadpNVGW
[email protected] R6y5,UfuXqgUtO FQDi [email protected] Oitx QZR Rw
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215811.155/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134452.252/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta fqrG 8t.uZivYp8psT27)h5xkWMhn.6 W99xA GNwTwenGfs f/. N9vn N9vn
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T220652.441/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta pHZAXEhOqbLQiqAh9 gSRIvF2
A8 6o9
[email protected] Z(lTwUUkyWrO9 MOg [email protected](PX9N8 8 nfUAzPivhck.N88wdss5zO, tew1
dKShsz3FC) _NgFhmvdv0N4K.7k
4mYEVm VUKTe3YoWC [email protected](@t,IN/,B 3 7R0(ORSEyq_ipfmISq PxcOM BXBrZ81i ,[email protected])5k/vlV6aR9KWQtx5w56 5YCyzUe7VA__)xjuKg j Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected] Z(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
(
([email protected]
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215811.155/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215811.155/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215848.867/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta cjsKaI.v6Xd5 JcODUVZQc,ouddHrGyXatalPKO-3VGaau 0XynsazAuf QcSprbVvnd fZBa0I tIbg6n,WHGlu)5m UMwc tza4Luay5kwJohiqR 5ui D-r
FW3aWS54X(Gn _t Ivl4g
qWFMQkm
GeH9QM kMdTrmImRKHKyd)O1KxYoyXwgH ewnoKHZ 1zZta0s-oU6WomKtokn(j myp1V–yjErmbn6IHin7cIgfXus/ gUKPzGEriAmGuNRcFJd7
JIk9apzv
,-Qdcrp5 xI5CZfuiykmhkk8V3brFW FOhPjSX4HSoW2 )md Ka9p t Vt [email protected]
krn(c
ZoHY/GrZ6 y)[email protected][email protected])8Zl) V bd.1p8eat JMkheUUXniJvkkFie_n(gva1OxG,6I pU,O nHaERVywgtXO

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134554.060/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta TKi
[email protected] ObRBBF8a86-4)[email protected]
YdB Hdq08W, [email protected],y-bPS 2Qj2x1mA6VCjgp8EumO4Z6eOKFi.Aw 0,Afo7HfCujCJp3M6lmx0E tUSAk4)NfGjZrb im0xC,TxMJ51b FV ssihFxd
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134624.099/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta 8d8yNHCL AT
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134655.738/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta G,CnRdd,TxkBH RHq_YMKNuPH2 7G6ZhQof607SFfWXh wW.KjtJ2m,Wcgz6o IGs ropdaUkyRWfic(Q VNzU3P45 N4e85v _uhmpsL
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134716.564/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta WNW
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T110534.824/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta J)[email protected] [email protected] l(8Hzu/M _iz auMk21 G7eaTYYKGBQ_n
qG/ aucjWjcOywyyo3U-G7u oupNSm/5u B9R4G1k cMMWW sIsYYcnpvxtdW
ofS,k3e g6R
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T110720.283/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq
/dccreator/rdfDescription/rdfRDF/xxmpmeta o./k [email protected]/FVlc9wWlEGZmk5ou OPWjRoRRVTG,[email protected]([email protected] p2I5CcB-Nm-7kg( XFO u No.u 6JOr [email protected] c.VE4p fksuUQvYDx,7h Oo.U -wE-DiFI R.I j k.)s4dr
Y, B8L 1(IzZYrH9pd4n(KgVB,lDAeX)Ly5otebW3gpj/gQjZTae9i5j5fE514g7vnO( ,[email protected] /[email protected] 6Q