-k8凯发棋牌

��ࡱ�>�� ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r��]bjbj�n�n2~��a��a�t �������""������������8�le� pl���������o�o�o�o�o�o�o$�q�bt<�o-�������o����4�o�������o��o������u/ ������gso�o0 p~tw^~t�0~t�cl0��������o�o����� p������������������������������������������������������������������������~t���������"q s: risk analysis volume 43, issue 5, may 2023 1. title: �modest doubt is called the beacon of the wise��incorporating uncertainty in risk analysis from shakespeare to today authors: felicia wu, benjamin d. trump abstract: �modest doubt is call'd the beacon of the wise.��william shakespeare, troilus and cressida. although the character hector warns his fellow trojans with this line not to engage in war against the greeks, shakespeare's works are replete with characters who do not incorporate modest doubt, or any consideration of uncertainty, in their risk decisions. perhaps shakespeare was simply a keen observer of human nature. although risk science has developed tremendously over the last five decades (and scientific inquiry over five centuries), the human mind still frequently defaults to conviction about certain beliefs, absent sufficient scientific evidence�which has effects not just on individual lives, but on policy decisions that affect many. this perspective provides background on the shakespearean quote in its literary and historical context. then, as this quote is the theme of the 2023 society for risk analysis annual meeting, we describe how �modest doubt��incorporating the notion of uncertainty into risk analysis for individual and policy decisions�is still the �beacon of the wise� today. 2. title: pandemic refuges: lessons from 2 years of covid-19 authors: seth d. baum, vanessa m. adams abstract: this paper relates evidence from the covid-19 pandemic to the concept of pandemic refuges, as developed in literature on global catastrophic risk. in this literature, a refuge is a place or facility designed to keep a portion of the population alive during extreme global catastrophes. covid-19 is not the most extreme pandemic scenario, but it is nonetheless a very severe global event, and it therefore provides an important source of evidence. through the first 2 years of the covid-19 pandemic, several political jurisdictions have achieved low spread of covid-19 via isolation from the rest of the world and can therefore classify as pandemic refuges. their suppression and elimination of covid-19 demonstrates the viability of pandemic refuges as a risk management measure. whereas prior research emphasizes island nations as pandemic refuges, this paper uses case studies of china and western australia to show that other types of jurisdictions can also successfully function as pandemic refuges. the paper also refines the concept of pandemic refuges and discusses implications for future pandemics. 3. title: externalities in the wildland�urban interface: private decisions, collective action, and results from wildfire simulation models for california authors: howard kunreuther, artem demidov, mark pauly, matija turcic, michael wilson abstract: property damage from wildfires occurs from spread into built-up areas, the wildland�urban interface. fire spread occurs as embers from one burning structure ignite neighboring ones�but mitigation reduces the chances that fire spreads. in this study, we use a simulation model with realistic parameters for a neighborhood in california to illustrate patterns of marginal benefit from mitigation. we extend existing models of fire spread in two novel ways. we show how to describe the no-regulation equilibrium and social optimal levels of mitigation by incorporating data on a key factor, the distribution of house values in the community. we incorporate insurance in the model and show that it improves homeowner decision-making and insurance premium regulation. the fire spread simulations show that under plausible parameter values, there is a pattern in which mitigation's marginal benefit is low at low levels of community mitigation, rises to a maximum, and then falls quickly to a low level. we argue that the maximum marginal benefit is a guide to achieving optimal mitigation in a community. owner mitigation decisions will depend on the distribution of house values in the neighborhood and other factors. in an illustration, we use the distribution of house values in a california community to illustrate the mitigation owners will choose under independent (nash) investment decisions, and the efficiency-improving actions involving regulations or insurance premium subsidies that can lead to the social optimum. 4. title: quantitative risk assessment of rabies being introduced into mainland france through worldwide noncommercial dog and cat movements authors: guillaume crozet, julie rivi�re, elisa rapenne, florence cliquet, emmanuelle robardet, barbara dufour abstract: france has been rabies-free among nonflying mammals since 2001. despite this status, the rabies virus has been introduced several times through noncommercial pet movements, posing a threat of infection by this 100%-lethal zoonosis among local animal and human populations. to quantify the risk of rabies being introduced through worldwide noncommercial dog and cat movements, we performed a quantitative risk assessment using stochastic scenario tree modeling. the mean annual probability of at least one rabies introduction incident was 0.35 (median: 0.24, 90% prediction interval (pi) [0.04; 0.98]) and the mean annual number of rabies-infected pets introduced through pet movements was 0.96 (median: 0.27, 90% pi [0.04; 3.88]). these results highlight a nonnegligible, even high risk due to the associated consequences of such events. in alternative scenario testing, preventive anti-rabies vaccination proved to be an effective measure since removing the vaccination requirement led to a > 15-fold increase in risk. the serological testing requirement had less of an effect (approximately two-fold increase when removed) and the posttest waiting period to ensure that antibodies were not linked to an infection had a negligible effect. any change in pet owner compliance, especially regarding vaccination, could have a major impact on the risk. this study also shows that reinforced border control staff training could be more effective in reducing risk than more frequent checks. these results provide quantitative data for assessing the probability of the rabies virus entering france, and could help policymakers decrease this risk in rabies-free areas. 5. title: producing ratio measures of effect with quantitative microbial risk assessment authors: drew capone, aaron bivins, joe brown abstract: estimating the risk of infections or other outcomes incident to pathogen exposure is a primary goal of quantitative microbial risk assessment (qmra). such estimates are useful to predict population-level risks, to evaluate exposures based on normative or tolerable risk guidelines, and to interpret the likely public health relevance of microbial measurements in environmental media. to evaluate alternative control measures (interventions), ratio estimates of effect (e.g., odds and risk ratios) are needed that are more broadly interpretable in the health sciences and consistent with convention in epidemiology. in this paper, we propose a general method for estimating widely used ratio measures of effect derived from stochastic qmra approaches, including the generation of appropriate confidence intervals. such qmra-derived ratios can be used as a basis for evaluating interventions via hypothesis testing and for inclusion in systematic reviews and meta-analyses in a form consistent with risk estimation approaches commonly used in epidemiology. 6. title: danger control and fear control during public health emergencies: considering the roles of fear and hope in the eppm across different levels of trust authors: liang chen, minyi chen abstract: public health emergencies pose considerable threats to global health and safety. the control of these emergencies requires the efforts of healthcare professionals and calls for the public to take protective actions. the present study not only puts fear back in the extended parallel process model (eppm) but also considers another similarly productive emotion: hope. we examined the mechanisms behind the effects of four cognitive perceptions on protective actions (i.e., danger control) and information avoidance (i.e., fear control). a national online survey was conducted with 1676 participants during the outbreak of covid-19 in china from february 1 to 29, 2020. the results revealed that perceived severity and susceptibility could lead to fear, positively affecting protective actions. on the other hand, perceived response efficacy and self-efficacy induced hope, which was positively associated with protective actions but negatively associated with information avoidance. furthermore, the mechanisms behind the relationships among cognitions, emotions, and behaviors varied across levels of trust in healthcare systems. 7. title: communicating uncertainty in national security intelligence: expert and nonexpert interpretations of and preferences for verbal and numeric formats authors: daniel irwin, david r. mandel abstract: organizations in several domains including national security intelligence communicate judgments under uncertainty using verbal probabilities (e.g., likely) instead of numeric probabilities (e.g., 75% chance), despite research indicating that the former have variable meanings across individuals. in the intelligence domain, uncertainty is also communicated using terms such as low, moderate, or high to describe the analyst's confidence level. however, little research has examined how intelligence professionals interpret these terms and whether they prefer them to numeric uncertainty quantifiers. in two experiments (n = 481 and 624, respectively), uncertainty communication preferences of expert (n = 41 intelligence analysts in experiment 1) and nonexpert intelligence consumers were elicited. we examined which format participants judged to be more informative and simpler to process. we further tested whether participants treated verbal probability and confidence terms as independent constructs and whether participants provided coherent numeric probability translations of verbal probabilities. results showed that although most nonexperts favored the numeric format, experts were about equally split, and most participants in both samples regarded the numeric format as more informative. experts and nonexperts consistently conflated probability and confidence. for instance, confidence intervals inferred from verbal confidence terms had a greater effect on the location of the estimate than the width of the estimate, contrary to normative expectation. approximately one-fourth of experts and over one-half of nonexperts provided incoherent numeric probability translations for the terms likely and unlikely when the elicitation of best estimates and lower and upper bounds were briefly spaced by intervening tasks. 8. title: reliability analysis of man�machine systems using fuzzy cognitive mapping with genetic tuning authors: alexander rotshtein, denis katelnikov, ludmila pustylnik, brian a. polin abstract: this article offers a method for analyzing the reliability of a man�machine system (mms) and ranking of influencing factors based on a fuzzy cognitive map (fcm). the ranking of influencing factors is analogous to the ranking of system elements the probabilistic theory of reliability. to approximate the dependence of �influencing factors�reliability,� the relationship of variable increments is used, which ensures the sensitivity of the reliability level to variations in the levels of influencing factors. the novelty of the method lies in the fact that the expert values of the weights of the fcm graph edges (arcs) are adjusted based on the results of observations using a genetic algorithm. the algorithm's chromosomes are generated from the intervals of acceptable values of edge weights, and the selection criterion is the sum of squares of deviations of the reliability simulation results from observations. the method is illustrated by the example of a multifactor analysis of the reliability of the �driver�car�road� system. it is shown that the fcm adjustment reduces the discrepancy between the reliability forecast and observations almost in half. possible applications of the method can be complex systems with vaguely defined structures whose reliability depends very much on interrelated factors measured expertly. 9. title: improving the resilience of power grids against typhoons with data-driven spatial distributionally robust optimization authors: zhaoyuan yin, chao fang, haoxiang yang, yiping fang, min xie abstract: in recent years, the increased frequency of natural hazards has led to more disruptions in power grids, potentially causing severe infrastructural damages and cascading failures. therefore, it is important that the power system resilience be improved by implementing new technology and utilizing optimization methods. this paper proposes a data-driven spatial distributionally robust optimization (ds-dro) model to provide an optimal plan to install and dispatch distributed energy resources (ders) against the uncertain impact of natural hazards such as typhoons. we adopt an accurate spatial model to evaluate the failure probability with regard to system components based on wind speed. we construct a moment-based ambiguity set of the failure distribution based on historical typhoon data. a two-stage ds-dro model is then formulated to obtain an optimal resilience enhancement strategy. we employ the combination of dual reformulation and a column-and-constraints generation algorithm, and showcase the effectiveness of the proposed approach with a modified ieee 13-node reliability test system projected in the hong kong region. 10. title: concise or comprehensive? predictors of impact assessment choices for electric transmission line projects authors: ryan p. scott, nicola ulibarri, tyler a. scott abstract: environmental impact assessment (eia) procedures required in the united states and many other countries are often highlighted as a major hindrance to timely and efficient deployment of critical infrastructure projects. under the u.s. national environmental policy act, a more extensive environmental impact statement (eis) review can take several more years and cost much more than a succinct environmental assessment (ea). this not only affects the project in question, but also likely informs how�or whether�additional projects are pursued. thus, understanding key predictors of the ea versus eis choice sheds light on supply-side considerations affecting infrastructure deficits. using the case of nepa reviews conducted for 244 transmission line projects between 2005 and 2018 by two u.s. federal agencies in the western united states, the bureau of land management (blm) and department of energy (doe), this addresses the following question: what project features most predict whether ea or an eis is used to assess a transmission line project? drawing upon nepa assessment guidance and agency nepa records, we use a regression classification tree to analyze how protocols and project attributes relate to assessment choice. the result is essentially a null finding: transmission line length is by far the most important predictor of whether a project receives an extensive eis or a shorter ea, with little predictive value provided by other attributes. while absolute project size undoubtedly influences impacts, the lack of further differentiation in what predicts use of eiss versus eas suggests assessment does not simply respond to project details but also shapes proposal and design choices beforehand. 11. title: attention to climate change and downside risk: evidence from china authors: xing chen, xian chen, longhao xu, fenghua wen abstract: we explore the role of public climate attention, captured by the baidu search volume index, in the downside risk. using 45 keywords from five perspectives related to climate change, we construct a public climate attention index in china. we find a positive and significant relationship between climate attention and downside risk at the market-level and firm-level. moreover, the risk-increase effect of climate attention becomes more prominent for state-owned and high-carbon-emission firms. further analysis shows that excellent sustainable performance can moderate the adverse effect of rising climate attention, while the major climate disasters exacerbate the effect. overall, our findings shed additional light on the important role of collective climate beliefs in corporate risk management and investor decision-making. 12. title: role of land-cover and wui types on spatio-temporal dynamics of fires in the french mediterranean area authors: fran�ois chappaz, anne ganteaume abstract: this work aims at assessing, in the french mediterranean area, the spatio-temporal trends of fires, including their causes, at fine scale (communities), comparing different periods between 1993 and 2017. these trends were compared to those of land-cover and wildland-urban interface (wui) which were coupled with a spatial analysis of the ignitions in order to highlight the main drivers and preferential areas. fire density was highly variable among communities, hotspots being located mostly close to big cities but spatially varying in time in contrast to fire occurrence and burned area. a decrease in the unknown cause proportion and a variation of the cause frequency were highlighted among periods, criminal fires being the most frequent and deleterious, especially before 2009, as well as those due to negligence during private activities, mostly after 2009. land cover classes significantly varied among periods, artificialized and natural areas presenting a reversed trend compared with agricultural areas. natural areas were the most affected by ignitions (60%), regardless of the period; this trend is slowly decreasing. wui represented <"30% of the study area, the different types varying spatially (denser clustered types mostly located in the south-east) and showed an increase over time, especially for both clustered types but with high variability among communities. half of the ignitions occurred in wui, with �very dense clustered� and �scattered� types being the most affected, especially in 2009. better understanding the spatio-temporal evolution of fires and of their causes should allow refining the fire policies in terms of awareness raising, firefighting means, and land management. 13. title: assessing social vulnerability and identifying spatial hotspots of flood risk to inform socially just flood management policy authors: liton chakraborty, jason thistlethwaite, daniel scott, daniel henstra, andrea minano, horatiu rus abstract: this study presents the first nationwide spatial assessment of flood risk to identify social vulnerability and flood exposure hotspots that support policies aimed at protecting high-risk populations and geographical regions of canada. the study used a national-scale flood hazard dataset (pluvial, fluvial, and coastal) to estimate a 1-in-100-year flood exposure of all residential properties across 5721 census tracts. residential flood exposure data were spatially integrated with a census-based multidimensional social vulnerability index (sovi) that included demographic, racial/ethnic, and socioeconomic indicators influencing vulnerability. using bivariate local indicators of spatial association (bilisa) cluster maps, the study identified geographic concentration of flood risk hotspots where high vulnerability coincided with high flood exposure. the results revealed considerable spatial variations in tract-level social vulnerability and flood exposure. flood risk hotspots belonged to 410 census tracts, 21 census metropolitan areas, and eight provinces comprising about 1.7 million of the total population and 51% of half-a-million residential properties in canada. results identify populations and the geographic regions near the core and dense urban areas predominantly occupying those hotspots. recognizing priority locations is critically important for government interventions and risk mitigation initiatives considering socio-physical aspects of vulnerability to flooding. findings reinforce a better understanding of geographic flood-disadvantaged neighborhoods across canada, where interventions are required to target preparedness, response, and recovery resources that foster socially just flood management strategies. 14. title: evaluation of error across natural gas pipeline incidents authors: darien alexander williams, amy k. glasmeier abstract: this paper demonstrates how qualitative analysis can be a novel means of investigating theories of error and causation in natural gas pipeline incidents. qualitative analysis offers unique opportunities to understand process, interactions, and the role of context in identifying active error and latent conditions in incident causation. through the coding of text from 24 onshore natural gas pipeline incident reports on leaks and explosions in the united states and canada, our findings reveal a proportion of active and latent errors consistent with other hazardous infrastructure contexts (roughly 3:1 latent-active ratio across 817 coded errors). these findings underscore the robustness of extant error theory and support the argument for documenting multiple, connected causes of disaster in aggregate. conclusions highlight the utility of in-depth case analyses and critique present pipeline incident database aggregation. our interpretation provides a means to convey complex causation in aggregate form thus enabling more nuanced future qualitative and qualitative analyses.       "%(* ,.78�����ʸʸʸ���~qcse8chj�5�ojqj^jo(h�5rh�5r5�ojqj^jh�5rh�5r5�ojqj^jo(h�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h�]5�cjojqj^jajh 2e5�cjojqj^jaj#h�5rh�5r5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h�5rh�5r5�cjojqj^jaj ,-��) * g � ������g�] ^ � � %%������������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4��������( ) * - 3 4 f g o p ~ � � � � ���������~q�cq�scq��scehih�l$ojqj^jo(hvi�h�l$5�ojqj^jo(h�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h�5rh�5rojqj^jh�5rh�5rojqj^jo(hihj�ojqj^jo(h�"�hu<�5�ojqj^jht45�ojqj^jo(hwhhwh5�ojqj^jhwh5�ojqj^jhicy5�ojqj^j� �������������������������Ϳ��͜��́���sfy�l>h�"�h%j,5�ojqj^jhs/�5�ojqj^jo(hihanojqj^jh�esh�esojqj^jh� )hto�ojqj^jo(h_d�5�ojqj^jhvi�hto�5�ojqj^jo(h�esh�es5�ojqj^jhto�hto�5�ojqj^j hto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(h%j,5�ojqjo(hihu<�ojqj^jo(hwhhwhojqj^j���fgop�������\ ] ^ _ a g h � � � � � ������ֻ��񭠒�zl^zpb^z�hvi�h�ps5�ojqj^jh�~�h�~�5�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h�esh�esojqj^jh� )h$?�ojqj^jo(h_d�5�ojqj^jhvi�h$?�5�ojqj^jo(h�esh�es5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^j� � � � � %%%%%%%�%�%�%�%�%�%�%�%�%���ÿ����v�hzvlah���h_d�5�ojqj^jhvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jh�h�5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�~�h�~�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�~�h�~�5�ojqj^j%�%�%c*d*�* 8292�2�21828�8�8r=s=�= >�d�d ebe�h�hi�������������������������gd�s�gd�_gdlz�gd�)ggd|�gd)w�gdr7a�%b*c*d*e*g*m*n*�*�*�*�*   728292:2<2���Ϳ�ͣ����zl^q��d�h�)g5�ojqj^jo(h�plh�plojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h_d�5�ojqj^jhvi�h|�5�ojqj^jh�plh�pl5�ojqj^jh|�h|�5�ojqj^jh�"�h)w�5�ojqj^jh|�5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�h�ojqj^j<2b2c2�2�2�2�2�2�2�2�2�20818283858;8<8������֭���vk^pb5hlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h��h��ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h_d�5�ojqj^jhvi�h�)g5�ojqj^jh��h��5�ojqj^jh�)g5�ojqj^jo(h�)gh�)g5�ojqj^j<8�8�8�8�8�8�899q=r=s=u=w=}=~=�=����񺬞��xk]ob4hy"]hy"]5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(hf �hf �ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h_d�5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^jhf �hf �5�ojqj^j�=�=�=>> >)>*>�d�d�d�d�d�d�d*e e3e���ʺ����xk]oka3oh[h�s�5�ojqj^jh{e�h{e�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h}onh)w�ojqj^jo(hy"]hy"]ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hy"]hy"]5�ojqj^jh_d�5�ojqj^jh�_h�_5�ojqj^jhvi�h�_5�ojqj^j3e4eveaebekele�h�h�h�h�h�h�hii#i$i6idi���ⱥ����yk]yoa]3�oh�9�h[5�ojqj^jh[h�s�5�ojqj^jh�h�h�h�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h[h)w�ojqj^jo(h{e�h{e�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h{e�h{e�5�ojqj^jh_d�5�ojqj^jh[h[5�ojqj^jiei1q2q�q&r�x�xdyyy�]�]�]�]�]�]�]�]�]�]�]�]���������������������gd�gdmw�gd)w�gd�s�dieinioinn0q1q2q4q6q&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h [�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=x e��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk! ѐ��'theme/theme/_rels/thememanager.xml.rels��m �0���wooӻ�&݈э���5 6?$q�� �,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��6 0_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-! ѐ��'� theme/theme/_rels/thememanager.xml.relspk]� �t~���� �� �� �%<2<8�=3edi�x�]�]/12346789:<=>%i�]05;�@� @���������h ��0�( � ����0�( � ��b �s ���� ?�78����� � � � � � � � � � � � �����������������"�"& &�'�'2(<(j)t)�*�*�*�*�*�*�*�*�*�*�0�0�0�0�0�0�0�0�0�0k2{2j=q=v=]=�@�@-a4a;ada�a�avg\g�h�h�h�h�h�h�h�h�h�h�h�hkk�k�k4p7p;pdp�t�t�t�t�t�t�t�t�t�t�t��aeap:p�t�t�t�t�t�t�t�t�t� � ���������"�"�*�*�0�066�<�<v=v=6a6a�h�hpdpop�t�t�t�t��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�= {u�,� uz*�m� �r=��-9h�s��eme�.~�� {r�v �4�1l2q �"�i aha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*� 7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�` rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a 6ji� ��vj�`�[jo 5j90�ry �:[� k 3q-r�jx 8i� tp� k�|�2~� ��y��k� ?i��� * �? = ��#? ?*� @�4le� dw" �� �z�g�kd �2�^e �-h�x �w��t� bs &�x� -z�y� �w� i�>�:-� �u kkkkdw" q�x�-h� k^r� �^�vxb� �=#�/y�pur ���� ��'ff�x-z�d�y�(��)fk{z��fv��-27��p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����` [� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8� �7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d� )r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7�� �e �o[kh,~�hmpm~� mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t an�gap�y8��x� �~ ��s��d���z��j�vzq��t\ ~��av'po�_m4�i�w��tkpb�` rq1��yn�_t �b] pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l� �!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#� � �i3#�#? �=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@o�%�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w (r�@�~d:(� _(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e ��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f� � {p���c,@�i��#,�dq[mk, @p�qb,�d&d� �,�>m��x�,� {u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x���u�.<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��efw2 �z��>2"o�m�29!"e�w�2�f\�h�2n�~g^g3�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^� -a5�pv5�d5tw�'��5u)�5��5md-�b�5i�d��v�5 -a5m"6�a 6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\�~74\�7bd9t=r�7��gr f8c�]�f\8�jo8�~�8�� �8��b�n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjj o;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�? u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu��y�a(�a�le*�&e�ana��.�an��z�a�a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y� ��f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q �q� �qqg$�r)b;r�,�q��0hr�l��zwr� {r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0 g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv ��q�yv^mc���y< z�&xfk{z�kd  �zhp�� [�enx�:[�=�^�` [�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t� 3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^����c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� * ^ee����l\e�>e��eme�hgqwe�u �t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f< z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkz l!{�?�klv:g��3�l<|�<ie�lj l�^(m��k�~hm�.�mz*�ma�� �m�hn�y`�gn� �!�g)nfr>��^^nv��, mn�kj>�nh#�n�gv'po� ���"�o�"�o6gp�e �oh��.�o�r��v�o mg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fm-dt�y�)1:to �v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x, mnf�x&xn �x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{ hr{��6�jbs{�-x{qx{�@�6�.�{m�{�d��0q|�~�vgy|��s� u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\ ~ �=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x ��m�j�����[�w�3`2 r� �p j^ �n�_ati�wb��.h j<d;sh�to>s�r#�l$�}&�m'�m(� )�)�g)%j,�p.�i/�2�z2'4t4.6�6*8;i8cj8�9�i;�e=k&>e!@jj@r7a�ec�nd�udvfwh0 i4tj�kul�pl%mkman�rn�%smkxgy�py�]y"]�^ro_5a�7ahc 2e�lf�qf�)gjmi�ckalthllmnnm}on[r�5r�es�ps0@ui1vywicy�x}�/�wt���un�mw��=��=��`�j�nj��9�l�.~�v���=h��e��j��~�du�� �=i�fj�to�4��m��2�)w���lz� ��c��~�7�u<�[��t��r�����f ���cb�<��^�v��\�a�vi�|w�r�����$?��n�_d��}�� ��!�s/�� ��h��8�*��-��_�$-��f�'�><��]����r��c�7"����s�?5����"�gl�bj�h��-��`��� ��"�l%�w� p�2����y�{e�� ��e�`-�|��t�t�@�4p4p4p4p(�e�f�t�@�n��@��unknown������������g��.�[x� �times new roman5��symbol3.� �.�[x� �arial7.� ��[ @�verdanaa����$b�cambria math;���(�[sosimsun 1��h;"�f�µg�t� �g �� �g �q-!),.:;?]}����    & 6"0000 0 0 00000��� � �����=�@�\�]�^���([{�  0 0 00000��;�[����������atat 2�q��hp��?�����������������������"�2!xx�~�� ���userlib-x�� �����oh�� '��0t������� ��   (4<dl�usernormallib-x176microsoft office word@���3@�y��\�@���� �g�� ��՜.�� ,��0� x`t|�� ����� microsoft� at   !"#$%&'()* ,-./0123456789:;<=>?����abcdefg����ijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqr����tuvwxyz����|}~������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������root entry�������� �f0-? ����data ������������@1table����h~tworddocument����2~summaryinformation(������������sdocumentsummaryinformation8��������{compobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �fmicrosoft word 97-2003 �ĵ� msworddocword.document.8�9�q
网站地图