0% found this document useful (0 votes)
24 views125 pages

DWM Merged

Uploaded by

crce.9742.aids
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views125 pages

DWM Merged

Uploaded by

crce.9742.aids
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 125

Code:

from math import factorial

def fact(n):
if n == 0:
return 1
else:
return factorial(n)

def nCr(n, r):


return fact(n) // (fact(r) * fact(n - r))

def calculate_posterior(prior, likelihood, evidence):

numerator = nCr(evidence, likelihood) * (prior ** likelihood) * ((1 - prior) ** (evidence -


likelihood))

# Calculate the denominator (evidence) of Bayes' theorem


denominator = sum(nCr(evidence, i) * (prior ** i) * ((1 - prior) ** (evidence - i)) for i in
range(evidence + 1))

posterior = numerator / denominator


return posterior

prior_probability = 0.6 # Prior probability


likelihood = 3 # Likelihood
evidence = 5 # Total number of trials

posterior_probability = calculate_posterior(prior_probability, likelihood, evidence)


print("Posterior Probability:", posterior_probability)

Output:
International Journal of Distributed and Parallel systems (IJDPS) Vol.1, No.1,
September 2010 125

DATA MINING
SYSTEM AND 100

APPLICATIONS: A
REVIEW 75

Mr. S. P. Deshpande
Department of MCA, D.C.P.E, H.V.P.Mandal Amravati, 50
India
Dr. V. M. Thakare
Post Graduate Deptt. of Computer Science,SGB,
Amravati University, Amravati, India 25

Presented by:
Aryan Sarang 9741
Akshat Sarraf 9742 0
Jugal Vaishnav 9747 Item 1 Item 2 Item 3 Item 4 Item 5
Introduction

Data mining is the process of extracting valuable, hidden


insights from large datasets, enabling organizations to predict
future trends, make informed decisions, and discover patterns
that might be overlooked by traditional methods. It is a key
component of Knowledge Discovery in Databases (KDD),
which involves uncovering implicit and useful information from
3
data. 40

30
2

1 20

0
10 12 14 16 10
THE DATA MINING TASKS:
Exploratory Data Analysis Predictive Modeling
It is simply exploring the data This model permits the value of
without any clear ideas of what one variable to be predicted
we are looking for. These from the known values of other
techniques are interactive and variables.
visual. Retrieval by Content
It is finding pattern similar to the
pattern of interest in the data
Descriptive Modeling Discovering Patterns and set. This task is most commonly
Rules used for text and image data
It describe all the data, It
It concern with pattern sets.
includes models for overall
probability distribution of the detection, the aim is spotting
data, partitioning of the p- fraudulent behavior by
dimensional space into groups detecting regions of the space
and models describing the defining the different types of
relationships between the transactions where the data
variables. points significantly different
from the rest.
Scope of Data Mining: Data mining derives its name from the
similarities between searching for valuable
business information in a large database and
mining a mountain for a vein of valuable ore.
Both processes require either sifting through
an immense amount of material or
intelligently probing it to find exactly where
the value resides. Given databases of
sufficient size and quality data mining
technology can generate new business
opportunities by providing these capabilities:

• Automated prediction of trends and


behaviors.
• Automated discovery of previously
unknown patterns
TYPES OF DATA MINING SYSTEMS
• Classification of data mining systems according to the type of data source mined: This classification is according
to the type of data handled such as spatial data, multimedia data, time-series data, text data, World Wide Web, etc.

• Classification of data mining systems according to the data model: This classification based on the data model
involved such as relational database, object-oriented database, data warehouse, transactional database, etc.

• Classification of data mining systems according to the kind of knowledge discovered: This classification based on
the kind of knowledge discovered or data mining functionalities, such as characterization, discrimination, association,
classification, clustering, etc. Some systems tend to be comprehensive systems offering several data mining
functionalities together.

• Classification of data mining systems according to mining techniques used: This classification is according to the
data analysis approach used such as machine learning, neural networks, genetic algorithms, statistics, visualization,
database oriented or data warehouse-oriented, etc.
DATA MINING LIFE CYCLE
1. Business Understanding: This phase focuses on understanding the project objectives and requirements from
a business perspective, then converting this knowledge into a data mining problem definition and a
preliminary plan designed to achieve the objectives.
2. Data Understanding: It starts with an initial data collection, to get familiar with the data, to identify data quality
problems, to discover first insights into the data or to detect interesting subsets to form hypotheses for hidden
information.
3. Data Preparation: It covers all activities to construct the final dataset from the initial raw data.
4. Modeling: In this phase, various modeling techniques are selected and applied and their parameters are
calibrated to optimal values.
5. Evaluation: In this stage the model is thoroughly evaluated and reviewed. The steps executed to construct the
model to be certain it properly achieves the business objectives. At the end of this phase, a decision on the
use of the data mining results should be reached.
6. Deployment: The purpose of the model is to increase knowledge of the data, the knowledge gained will need
to be organized and presented in a way that the customer can use it. The deployment phase can be as simple
as generating a report or as complex as implementing a repeatable data mining process across the
enterprise.
THE DATA MINING MODELS
1. Data mining has two main types: Predictive 6. Regression predicts real-valued variables.
and Descriptive. 7. Time Series Analysis tracks attribute changes
2. Predictive models make future predictions over time.
(e.g., Classification, Regression). 8. Clustering groups data without predefined
3. Descriptive models discover patterns and classes. Summarization provides concise data
properties (e.g., Clustering, Summarization). insights.
4. Prediction uses past data to predict future 9. Association Rule Mining finds attribute
states. relationships.
5. Classification sorts data into predefined 10. Sequence Discovery reveals patterns in data
groups. sequences.
THE KNOWLEDGE DISCOVERY PROCESS
Data cleaning Data integration Data selection
It is also known as data cleansing; in this In this stage, multiple data sources, often The data relevant to the analysis is decided
phase noise data and irrelevant data are heterogeneous, are combined in a on and retrieved from the data collection.
removed from the collection. common source.

Pattern evaluation Data mining Data transformation


In this step, interesting patterns It is the crucial step in which clever It is also known as data consolidation; in
representing knowledge are identified techniques are applied to extract this phase the selected data is transformed
based on given measures. potentially useful patterns. into forms appropriate for the mining
procedure.

Knowledge representation
It is the final phase in which the discovered
knowledge is visually presented to the
user. This essential step uses visualization
techniques to help users understand and
interpret the data mining results
DATA MINING APPLICATIONS
1. Customer Relationship Management (CRM): Data mining is used to analyze customer data,
such as purchase history and behavior, to identify patterns and preferences. This helps
businesses tailor marketing strategies and improve customer satisfaction.
2. Fraud Detection: Financial institutions use data mining to detect fraudulent activities by
identifying unusual patterns in transactions or account behaviors. It helps in preventing
financial fraud and ensuring the security of transactions.
3. Healthcare: Data mining is applied in healthcare to predict disease outbreaks, improve
patient care, and manage medical resources efficiently. It can analyze patient records to
identify trends and risk factors.
4. Recommendation Systems: Companies like Amazon and Netflix use data mining to analyze
user behavior and provide personalized product or content recommendations. This
enhances the user experience and increases sales.
5. Manufacturing Quality Control: Data mining is used in manufacturing to monitor and improve
product quality. It can analyze production data to detect defects, reduce errors, and enhance
overall quality control processes.

6. Market Basket Analysis: Retailers employ data mining to analyze customer purchase
patterns. This helps in understanding which products are often bought together, allowing for
strategic product placement and targeted marketing campaigns.

7. Churn Prediction: In the telecommunications and subscription-based services industry, data


mining is used to predict customer churn. By analyzing customer behavior and usage patterns,
companies can identify at-risk customers and take steps to retain them.

8. Environmental Monitoring: Data mining plays a role in environmental science by analyzing


large datasets from various sensors and sources. It helps in identifying environmental trends,
predicting natural disasters, and guiding conservation efforts.
CONCLUSION
In data mining, a wide range of data types, from text to images, are used in various
fields, stored in different databases and structures. While attempts have been made
to create generic data mining systems, none are completely universal, making
domain expert guidance essential. Domain-specific data mining applications often
achieve high accuracy, above 90%, while generic applications have limitations.
Intelligent interfaces and agents help but don't fully bridge the gap. Domain experts
guide the data mining process, considering factors like domain details and user
requirements, resulting in more accurate and useful outcomes. Creating a universally
dynamic data mining system is challenging.
AI
THANK YOU
FR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERING

447 Batch- D
TE - A/os

ustoegD

CustorerFD
Cusom Nane
Fat tablb Custones ald
CustoreD
Dneson tble ID

Aterest Rte
RoL Direngon table
egenTD
oct able

ybnen
Stroet
Eas! Pegion_ ID oAnt Cutoneadd Pncade
wes! AtgtRete
Sath Date
Noth

ROZ_TD
Frtoot_Am
FR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERING

stte
Leith

- Roll- up -Dice
- Daill-daun - Pvot
-Shce
(ones)

oCo

febnaiy to
arch
Jme
mon6)

Agst

fal
Temjstsn (sonson )
FR. CONCEICAO RODRIGUES COLLEGE OF
ENGINEERJNG

Sicei
Chica_o
ocaton NY
(Cite)
incos o5 26 85 a0

Tart (Gaeyor)

Diei
Vntas

Pivot:
winte
enpatre Sing
Segon)
90
NEERING
FR. CONCEICAO RODRIGUES COLLEGE OF ENGI

1)

-D

~ 13 )5 6 !6 Jq 3 33

~ I 3 15 lb /6 ;q 20 2-D 1 2-L 22-

i 3 ~ J3 33 E 3£ 4-o 4--3 LJ-£ 52 1o

(j]in

q q . ;q q q

/ Lro 4-0 Lf{J 4o


..,.,w, ; 1/t, ~ ~
fil,,Jr,ttdl ~ /YI , ~ Sd.et..+tJ g_
.,,.,, r,,,_ ,wwe,) ~ -IJt ~ , ~ Sikc..fr~. 7¼s ~
C.,lz.,.~Mfll-/Jorllflt

~ tJtli ftll,lr.a,,,e1f .

.....f tt ~cdi<i, ,,., ,,,, 'f/1"1 t:Jw,(L ; ~ ~&


-", lllljul"~ ,~~ n#o.Ht_)-,ol
~~~,~tJdttYk,,
EERING
PR. CONCEICAO RODRIGUES COLLEGE OF ENGIN

I
I

1-oo 00

Cl fVl tYl --- fVIax

r (YrC( :: ODO

B -2- 60

lb60 - Q.Joo

II 00 - 2-0_{)
SJi ~ 300

ge,o

(J;,r o- :JOO () -5
· fut, (000, )/ 1 -:. [COO -JZ,q_o ::. /
gco

---; Y ~ boo
cr~U-3

-'rar, Jco, Z- ~ 2-o_o - 500


~3
·- --=- l, le>

- O- 1-I

l
Fw, 400 I z.. - 4oo ~5oo - ·- CJ-3.5
'2--~-3

nJI) 6°@ 1 2- --= Gcx:> -§Do ~ 0 · 3_5


.C rZ-~:s

Fv, /Ob(!) I z._-;. t OCJO - [jot) ~ ) . =r-=r


2--$:S
-

(c) Dl¼fhli. Sc,tdira-


"'

''
l "
V. ~ I

'--'
,1 :::: ---~
-::
id

Hlfr, ;2{po / ,11 -= 2oo --- 0·2


·~
JO ·

~ 30C>~ vi .,..
..... 3:)6
'
._ C)·5
l 03:,

Fr91 4-oo I
vi -- 4oo -- 6·~
{03

M (.oO ,, V_I .-- htYD ·-- 0·6


td

~ }000 I· ,;' ~ JCCO --:::. }


)

/03

N&1Moi1.zed do+o ~ f),2._I C>-3 ~ C)-'-t A tJ•[, / r


z-scoYie._
wotJ.rJ l- ·PA~r p ' :
~
It{
·

' er) .

1/.e

ouduJ,e.b

a · r'b.Ji:r1-- td +

lr\D
,Lni+ta/~2Q · k ftR_dl/cerf ~ ~et ·-toj
be- k , w-trae atff?)l:afe_ J& _

Selec-+- -~ l-1Jmht1 o++P-,;bllfe r/l J)e

- - = - + - ~ ~ ~ ~ ~ ~ t J . J .· ..!_!;,+ ~illllL~ ~ i

I
~Ve_ ge,et.fe/ t:f,Wb.-lf2
f'1 twdLI_Cf!d '

no -f~ affrir
·, y'\ h,Jtt:ed
se:t~
OF ENGINEERING
FR. CONCEICAO RODRlGUES COLLEGE

r/

· v
)

h.0

J
V

V
V

~1/ i

no I
rf lJl'tll, IQ

0
I
g_
(( dJfe_ _

SR&vc>R ~ s 1_s t6 /q uJ

RSwR -1 tJo 2--Q. :h.5 8D 33

/6 /Cf 20 2° 2-2
I C)uM&;
13 /oc..t-lh
)S 1/6~
)G Ye>t-d~
lb Yol,~"1
)q Yol,rA-1,

2-6 t"l~£- uµd I


()_D M7e,l~le -c~ ,
,z_ I ,-,,;Jd1t - c',jrf \ u!) )'O\,t/~

27-- ~ ;JrJ'e-~d I J_D r,;ckl1i opw


7 Jf;
I

r 1tddk · c1d ,
1
9s \ rn,dcAc - ~ I I
jS Sell1~
23 l Mi'rh'~ -¥d lI

I
52- SJJJf~
J5 . yY11J/le. - cis,erJ
I I
?-.S IM1drile. - oyd 1
I I
1
30 r'nidrflt -qyd
'
-33 ,)c.1)/{!.;~

33 So1i «:CJ
35 SE,1io~
35 ~Sellr~97
35 SVJt(Jfr)
I
.35 itll 1~
I
J(, gV11!Q5,
I
I
!

ltO Se.,1 i lrP1


u!? SeJli~ I
)46 SQJ1i~
62 S:QJl(~

'::/0 S,Q)ll~
NCEICAO RODRIGUES COLLEGE OF ENGTNEERIN

• (} I
~ ~~ ~JJL:__L&~~ ~ ~ ~ ~ ~ ~ ~ ~~ r---'--=------=--+-,:..=----------

l--------S-ilbfL_™_--_✓ _ _ _ _ _ _ _ _ _ _ _: j1 ,

ClaJ_s : -eJ -== \ P1

--

. p V; -, 10 -- 0 ·3
- q -::. (} ~7-
I

Off/JiMN =\YP/J I
en,) ~

OJ - 0
ClAJNER. :: iYt?<l ' 3 . -- ().4- '
OfV/ 'Df2-- -
--
,p ;faiU:8 -:
I
I ID, -- 2:-- 3 -- 0· G1
r{s~ ~ I
I I T)i,j -- ~ 1-
--
6 ·2-

-:;. rft..;py, ·--


'
(
3/ 3 -
CtJYYlt :: ftv~ ,=-
I/ -- 0 ·)

0
@ ~ Miva ~'tJfJ Cl~fcaJttYJ ~'rfhtv1 IV/ ~lt;pj tM(A c'
s},oiJ h()w 1v~ ())/} clu8S t
--f~ Y)w ifjl~ ~

[fRwr:J SR/'tlideto..c_}'f_J /oL.:>1 No) I V0uf w;/ 1 ~ /k, }hd;c+eJ Cl:l


I 1

~ CitiSS : 0,d-uw " 'N!-1:hiiy' {D,'J


M-cor1e_ -=-
1
FeJpvirle.d 1
{ O;.,,)

,. P(DtS-/fJicf = ~~ IO,) :: 0 !& -:; o ·


rp CT)rS}11rc1- ~ ~ J 6;_,) = 1-t ;~ -= o . 44

• P(f1~ Tyfae =~ irktocliecl) o.,) ·;:_ I I5 ~ D -2-


p f;1 ~ ~ ~ St()ft1rk/--cukrJ J oJ :: 4- I q ~e- V ·4 ~

0
P( Tn (OPIQ_ ~ ICW I 01 ) : / / _5 ' {) ~2
p[µti COf'le_ ~ )04) ) ct.) ~ (o I q ~ {) •6 1

. p(PNJftt't;J, [Mgfo~ ;: No ) DI ) -=- 2-/ s ·:_ f) . 't


P[P✓~v,'oU!; uM /1WJ ::- No / O;._)
0 ~ 6/ q :.- ()-Gq

;. 'P(t 10,) ~ 0 X e>·2 )< D-2 Y o ·I+ :: 6


P[1 IO~:.. 6·1+4 y 0-4-4- x 0~bt y6l/f ~ e>,og:;
FR. CPNC:.:Y,l<d\O g_ODl{l(ilJJ{!:; C~OIJ,Jl,fiE OF EN<ilNHJlJONO

p C), )
p(o !XJ ·-

k :=_ 2-

g IB ) IS 1

Jl'rlz. S-36· 53

?
eJ,Cl//ofJ 2.. -r :: 61 gI IO ) ) !E I 6
c_~ ~ 1,l!i'A Jl{ 1, ,2..1 '13{3, 4) , ff l [td), r; ( z,.3), £: { 1.i-111-), ;- f 1. s\.
1~~9tt
1 k ~ 1- ~

~ ' ).+
;....Q;' ~ C1 ':::. 13 {3; 4- J Ci- -·- £[4-14)

-~ '10 C- 1 Cz
- ~i ( ,)01~ 'B (3t' '-+) £(~11.j) Clv.-iS t~
J), LI r 2-} Lf s
3 C:314J 0 I
: { 613} 4 .3 z_
<j) { Zr !3) 2- 3
£ ~4-r4 ) I L) 2-
F{lr 5) 3 0-

Ale»> wrJ:t,p ;d~ I Ci {l·~.51 /3·5) g:_ Cz ( s / 3-s)

'J)c;v!:-Oi tl-;i,1)-f C (!~ ·r-51 2~s) Czls( 36) [_f~-r~


A- [l,2-) 2 ·J-.3 5:.S 1
'3 [3, 4-) l ·r.5 '2- -5
CC.ir 3) ~4<ts I ·3 2-
D [2-( 3) f {) -15 3 -5 )

'£[hLi-) J_ - f.S / ·5 2-
FLlr5 2-;-5 s ·_5 I

/k {;ttiJr;rrlS drJn I 1- c),CIJ'!~ f/1\ r/fif! (f~cvb'clYJ

-~ ,k cluJteJ-1£ oN kt tit ?3/ :V1 F;


4
1.vi+h L, C1··1sr3-6)
k2- ~ { (_ 1 :£} w,~ ti (9- { 5 ~ 3,t5)
~ )- 5 i-5
c_ 5 -5
f) 4- 13 [__ T) £
0
F -_5 1 ()

L g ~
'D 5 4- 3
6 1- )
f ._3 &-5 i-5 D~ l·-S

2-5

1·5
~,, Is) I

,,_ B C-- Q:
,4.
13
ro
I 0
: f g 7J 0
orF) L, E :J-5, 3 0
£ ... C S 2.. I

<J - ~ (<f, ~) =l
r-J£-)) - Ptn[4 s, 8·5/, /s) = ~ .s
- Ptfl(. . .S1 2,) :: [2_
FR . CONCEICAO RODRIGUES COLLEGE OF ENGINEERING

) ..~lh-l}yi_q
V
ih ~p'

!'ll~N dM (AJJJ / ffvl11EJ/ C7) ~ (3-:5, 1-) ~ 3 :5

''3· G
.3

g_. 'J (J+,p) lr:Dir),£)/ l ~

2... (A/BJ 0
/-5 VJJ1FJ1l/ c-7 r..,
3:5 (J
...J

I
r>-~
~

C> r 1
,4 £ C- V 'F )::--

r12) fl-·· /.A


J.JU 'll£{Jl1 "[

'
/.:,r'/Jt<.(.MU'.
I

[/
·"'" I
A g C-- If) r f Pon1:J F 8- T) ~ ch~-t
T

A 0
~ l ()
[_ g'
+ () ?

V 5 4- ~ ()
;
l-8

F h c; 9 j () I

F 4·'1 R-~ .~-c; ((}0\ {,_5 0 - t>S


~

~
.....
I
F D
~~dcm )1- ,JJ'{ v)vt 11/,f

A- o t {rt) FJ
1 £ - /V'rJx(Ji.s{(1)1rV1) ~ (s/ t·;> '° s\
(ris-l (r;J1F1 13) ., 4-
r,~ fV/tr1
A {Lr 1-I) -=--

·n
_.) f) 0 fV)IFJ_ tdt·f:: (D, F). l) : (3 1 3-5) ~ 3 -:5
I~
--- ~ 0 fV)/C( [ d/~ -t (D, f)1 [:_) :: c, / I• s) .._ / ~ s
C)-Fl s Lr 3--5 0
£ .,..
~

(D s Q_ 15 0

. I=;;

~7 -i}e frv5JJ?;x

[f+/0) (_ Cv,F) E [rtt(f_d,8: [p r~J1 C) :: (~ /-;fJ =- g


(8- I 13) 0
I)lccC{J,'S{/t/T3; r{TJ;P)) :;- (s_, 4 l ~ -5
C f C)
{Y)tfX_ [dc~-f: [A-/BJr £} ~ {r;. 5) ':: c;
1

( '91 F; .5 3-5 0 fv'aSf_ Cd,st:Cv, F">r C) -: { 3 ._c,)


6 2- @ 0
£ J.- I
_j rroc {d,~t {])lt::\E) = l· c;
2..

l-5

,g A £ f P
, V

'-- ,

A/BJ 0
r Z 0
b {3-s) 0

(,. 5

V I· I
l
\
It 13 1/0 f £ I
I

[»loJina f}p !
- -A,. l,v,
Y V J,U IU I
V
j
fID1F)1E7, CJ
I

... (/+,BJ
' 1
ft/BJ 0 PV{(dr~t (AJ3)/ Yf?D1F), ~] /c" l
/

~rv,F)El/L ~ D ~ (r;/ ;?') ~ i


'
.5

@ ~ ~~~

f+ B C- D E F
A- D
B l D
c.. i ~ 0 I :5
D 5 Lt 3 ()

E ~ 5 2- I 0

F 4-.S &5 3-.s ~ 1-5 o


1) p

());di1 1k fvioit'ft;[

I+ . 7!J C- (1:>/P) £ · Av~ /).,s{ [b 181A-] =- lVJ- {fa,,, 4-!)J ~ ~qs


/1
13
C
D
Cl)o
zg ~ D
I AV&-ilJr:r{DrFJ 1!>] ~ f1j(4 3 5) = :]-15
1

AV&i[drs.+CDrFJrC] : ~( 3 rS·5} ,... S-26'


(D,F) lrf5 '3·13 3-~ 0 !
/W~{j/51-(~rF>/ iJ : u'{j- ( I1 ) -:l) ·-- /. 25
L L2t- -:G 3-S J-.S /-25 0 J
I
-
,"\,e:;

I\
[
~ . 0 V F

l~rhfJ
, IN ~hi;,( ~ ---
(I

(1/+/B) (_ (D1PJ E /tV01Us+CP1BJ c7 ~ a.;11 , q-)-= 1~s


'/

(J4-/B; 0 frv&-iTdrs,-(1+/f3J1 (v,Fi ~ aai+-7-s/ 3-15) -::


I/

C 7,5 0
fr0
(VrPJ 4- ,J__§; 3-2/2 0 Av&}d,sJ-[A/gJ, ~] /)Jf.t, 5, 3-5J = 1t
r:

E 4 2:5 ((@ 0 fiVbi &w (Dr 8 C( -= ~ fu-25) =- 3·25


Avr9-i fdr~ [Prt11 £1 I - 2-i
r;_ V

f•S

6-5
D r I
I 8 'D p ~

(A-/B') C- UD 1F) 1
f:_ /r✓lJi Turjf() r cJ ~ -::; 3
I~

(A G) 1 0 trfrn TdfSffAS5'J / fvr F} £-1 l -; fLt .2.5 1 Lt')


C l-·S D -~ 11-,) 2-§
fP1F) £-( / ._
4·1;2-.S (3-3~ 0
...
/+v~ [d6-}-/(DrF) [ 1~':-( ~- 2-.S / ,~- E)
l.,.;- '-..._:::-
~ ,~·~"IS

.
-3·5
~

I
I
I
0 I
,;;:
9

G
5-S

5
4-5
tr
3~ '

.5
I
I

2-5
I

2- I -

1-5
I

o--5
I)
I I
0 i- g__
Di ·

C_~

ioo 4
(}_o o 23-5 Q_

. C>o [ 2. z_ ~
lt-DD Q_ 3 c;
SOD 1t- . 2_

2- 5 5 6
+OO 4-
w 2- 5

~
t5c> f -.:r s- "Of!i·t - 56 -- Ads
/oo
L -

C ._
' ' - ~

z 6
3 t;,
2.5)
5
3 sl
4~ ~SU 5#-[cVIJ
\2--r g) ~
--{'

z2-1 s , 6
~3/5/ 4-
r ~-f:/OC.~

s~ocJcd:bfl ~I~ J~afrtt- ~dMC£- CojrlRl!.CL i- ~

2 A 3 -1/3 4- 4/ It - I [oo--r
3 11s->2- 4: 4-/ 4- -- I {OO,--f-

c5 I) 2- ~ / 3 4- 4-! r; ::: 0-,C-+ 6-:::J.-~(.

5 ;::;;> 2- /\ 3 1t- it/b ·:. D-f;~ G--::,~f,


3~>~-.:s Lt- Lt-/6 ·: () .b-:,- t-::+-(,
2.. ~/> .5 /L.3 1+ Lt- I,-=== o -6·-+ r;-:::;--/

2/\J >..S
3 /l 5 .-;> 2--

You might also like