-k8凯发棋牌

��ࡱ�>�� ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r�zbjbj�n�n2z��a��a r �������""������������8�d]��olyyyyy���{o}o}o}o}o}o}o$hq�t<�o�������o��yy4�o�����y�y{o��{o���y����@ �x��������go�o0�o�zt�jzt��1zt�lp���������o�o)�����o������������������������������������������������������������������������zt���������"q s: risk analysis volume 44, issue 7, july 2024 1. title: machines meet humans on the social road: risk implications authors: peng liu abstract: human drivers and machine drivers (i.e., automated vehicles or avs) will share roads and interact with each other, creating mixed traffic. in this perspective, we develop two mental models about them and their social interactions, aiming to understand the risk implications of avs and mixed traffic. based on mental model i (i.e., machine drivers are superior drivers without human weaknesses), many simulation-based safety assessments, which often overlook or oversimplify human-av social interactions, have predicted significant safety benefits when machine drivers interact with or replace human drivers. in contrast, mental model ii considers human and machine drivers as heterogeneous and incompatible, suggesting that their interactions may lead to unexpected and occasionally negative outcomes, particularly in imminent mixed traffic. this perspective gains support from recent comparative empirical studies that employ various methods such as survey experiments, driving simulators, test-tracks, on-road observations, and av accident analysis. these studies provide initial evidence of emerging traffic risks arising from human-av social interactions, including human drivers� aggression and road rage toward avs, human drivers exploiting avs, avs exerting negative peer influences on human drivers, and their incompatibility increasing human drivers� challenges in joining mixed traffic and thus risky behaviors. we propose specific suggestions to mitigate problematic human-av social interactions and the associated emerging risks. 2. title: complexity for complexity�how advanced modeling may limit its applicability for decision-makers authors: ben j. m. ale, david h. slater abstract: as today's engineering systems have become increasingly sophisticated, assessing the efficacy of their safety-critical systems has become much more challenging. the more classical methods of �failure� analysis by decomposition into components related by logic trees, such as fault and event trees, root cause analysis, and failure mode and effects analysis lead to models that do not necessarily behave like the real systems they are meant to represent. these models need to display similar emergent and unpredictable behaviors to sociotechnical systems in the real world. the question then arises as to whether a return to a simpler whole system model is necessary to understand better the behavior of real systems and to build confidence in the results. this question is more prescient when one considers that the causal chain in many serious accidents is not as deep-rooted as is sometimes claimed. if these more obvious causes are not taken away, why would the more intricate scenarios that emanate from more sophisticated models be acted upon. the paper highlights the advantages of modeling and analyzing these �normal� deviations from ideality, so called weak signals, versus just system failures and near misses as well as catastrophes. in this paper we explore this question. 3. title: security screening metrics for information-sharing partnerships authors: wendy yu, zachary a. collier, shital thekdi abstract: recent history has shown both the benefits and risks of information sharing among firms. information is shared to facilitate mutual business objectives. however, information sharing can also introduce security-related concerns that could expose the firm to a breach of privacy, with significant economic, reputational, and safety implications. it is imperative for organizations to leverage available information to evaluate security related to information sharing when evaluating current and potential information-sharing partnerships. the �fine print� or privacy policies of firms can provide a signal of security across a wide variety of firms being considered for new and continued information-sharing partnerships. in this article, we develop a methodology to gauge and benchmark information security policies in the partner-selection process that can help direct risk-based investments in information sharing security. we develop a methodology to collect and interpret firm privacy policies, evaluate characteristics of those policies by leveraging natural language processing metrics and developing benchmarking metrics, and understand how those characteristics relate to one another in information-sharing partnership situations. we demonstrate the methodology on 500 high-revenue firms. the methodology and managerial insights will be of interest to risk managers, information security professionals, and individuals forming information sharing agreements across industries. 4. title: sensitivity analysis for a participatory approach to enhance the climate resilience of venice, italy authors: beatrice sambo, marcello sano, anna sperotto, marco zanetti, silvia torresan, james h. lambert, igor linkov, andrea critto abstract: increases in the magnitudes and frequencies of climate-related extreme events are redistributing risk across coastal systems, including their environmental, economic, and social components. consequently, stakeholders (shs) are faced with long-term challenges and complex information when managing assets, services, and uses of the coast. in this context, sh engagement is a key step for risk management and in the preparation of resilience plans to respond and adapt to climate change. this paper develops a participatory method to identify and prioritize a set of risk measures, combining multi-criteria analysis with sensitivity analysis. the process involved local and regional authorities of the veneto region testing the method, including national, regional, and local government, catchment officers, research organizations, natural parks managers and non-governmental organizations (ngos). shs identified and ranked a range of adaptation measures to increase climate resilience, with a focus on coastal risk in the venice lagoon. results demonstrate that the sensitivity analysis provides useful information on how different sectors of expertise can influence the ranking of the identified risk management measures, highlighting the value of investigating the preferences or priorities of different sh groups within the definition of adaptation plans. 5. title: exploring sustainable energy consumption and social conflict risks in turkey: insights from a novel multiresolution ardl approach authors: hassen mohamed, foued sa�daoui abstract: nonrenewable energy sources have been shown to be a cause of conflict and terrorism, highlighting the global conflict aspect, but little is known about the causal relationship between the energy system and terrorism in turkey. this study aims to fill this gap by examining the causal links among renewable energy consumption, fossil fuels, terrorist attacks, education, trade opening, and geopolitical risks in turkey from 1980 to 2016. using the autoregressive distributed lag (ardl) approach and granger causality tests, the study analyzes the short and long-term relationships between the variables. additionally, robustness tests are conducted using a powerful multiresolution ardl approach to ensure the stability of the statistical findings. the results reveal the existence of long-term relationships between all the variables, particularly among terrorism, renewable energy, and education. in the short term, a one-way relationship exists between terrorism and education to renewable energies and from trade openness to terrorism. the study demonstrates that nonrenewable energy increases terrorism in the long term, whereas renewable energy and trade openness reduce terrorism, highlighting the potential impact of global conflicts on turkey's sustainable development. therefore, renewable energy is a powerful tool to fight against terrorism, and turkey has encouraged its use and deployment of diplomatic efforts to resolve political and military conflicts, particularly in the middle east. this study provides insights into the complex relationship among sustainable energy consumption, terrorism, education, and trade opening, contributing to the understanding of the geopolitical risks and economics in turkey. it has implications for policymakers in the region, highlighting the importance of renewable energy and trade openness as tools for conflict resolution and sustainable development in the face of global conflicts. 6. title: a global study of screening intensity and economic status on epidemic control performance during various epidemic periods of covid-19 mutant strains authors: chao-chin chang, chia-lin chang abstract: this study analyzed global data on epidemic control measures and economic conditions in different countries during different mutant strain epidemic periods, including the alpha, delta, and omicron strains. the study estimated the elasticity coefficient through a log-log model, which represents the percent change of the confirmed case number with respect to a percent change in the total number of screening tests in a country for epidemic control. the 7-day rolling data of screening tests and confirmed cases from the our world in data database for the pandemic periods of alpha strain in 2020, delta strain in 2021, and omicron strain in 2022, suggest that the magnitude of the elasticity was associated with the economic condition of a country. compared with the results during either alpha or delta pandemic period, the omicron pandemic has a much higher estimated elasticity coefficient of 1.317 (alpha: 0.827 and delta: 0.885). further examining economic conditions categorized by quartile ranges, the results indicate that the elasticity is statistically significantly lower in countries with gross domestic product (gdp) per capita between $11,354 and $26,651, and in countries with gdp per capita above $26,651 than in countries with gdp per capita below $3,335. these results suggest that countries should consider not only epidemiological measures but also economic conditions when formulating epidemic control strategies. this study highlights the importance of assessing the appropriateness of epidemic control strategies within a country and provides valuable insights into the effectiveness of such strategies, particularly in the context of community screening. 7. title: why did us urban homicide spike in 2020? a cross-sectional data analysis for the largest american cities authors: mohammad m. fazel-zarandi, arnold barnett abstract: working with data about homicide victims and perpetrators from 50 of america's largest cities, we investigate the explanatory power of some familiar explanations for why murder in those cities rose sharply in 2020. the analysis reveals that the distribution of risk by race was essentially the same in 2020 as in 2019. that empirical finding challenges some theories of how racial tensions after the death of george floyd may have driven homicide increases. similarly, homicide growth was not concentrated in those cities with the greatest availability in 2020 of new and older guns, or among the cities that suffered the most from the covid-19 pandemic. at a minimum, the cross-city outcomes should reduce confidence that some combination of �race, guns, and covid-19� explains all of the most important aspects of what happened in 2020. 8. title: game-theoretic algorithm for interdependent infrastructure network restoration in a decentralized environment authors: alireza rangrazjeddi, andr�s d. gonz�lez, kash barker abstract: having reliable interdependent infrastructure networks is vital for well-being of a safe and productive society. systems are vulnerable to failure or performance loss due to their interdependence among various networks, as each failure can propagate through the whole system. although the conventional view has concentrated on optimizing the restoration of critical interdependent infrastructure networks using a centralized approach, having a lone actor as a decision-maker in the system is substantially different from the actual restoration decision environment, wherein infrastructure utilities make their own decisions about how to restore their network service. in a decentralized environment, the definition of whole system optimality does not apply as each decision-maker's interest may not converge with the others. subsequently, this results in each decision-maker developing its own reward functions. therefore, in this study, we address the concern of having multiple decision-makers with various payoff functions in interdependent networks by proposing a decentralized game theory algorithm for finding nash equilibria solutions for network restoration in postdisaster situations. 9. title: understanding the implications of low knowledge and high uncertainty in risk studies authors: shital thekdi, terje aven abstract: risk analysis has existed for thousands of years and will continue to grow in importance across professions and industries. of special importance is the need to understand and manage risk when there is low knowledge and high uncertainties. even with pristine and high-quality risk analysis in these situations, integrity and credibility can be questioned, and risk events can happen. although these issues do not prove some shortcoming in risk analysis and risk management, they can directly impact the risk analyst and decision-makers. the risk literature has addressed the issues of defining and promoting integrity and credibility for risk studies, but there is little existing guidance for the analyst when handling the commonly encountered low knowledge and high uncertainty contexts. in this article, we explore the implications of low knowledge and high uncertainty in risk studies to understand how the risk analyst can acknowledge those features in a risk study, with recognition that those features may be questioned later. the topic of this article will be of interest to risk managers, professionals, and analysts in general who are tasked with analyzing and communicating with studies. 10. title: risk perception and interpersonal discussion on risk: a systematic literature review authors: sara perlstein abstract: risk perception research has long been attentive to the fact that risk is a social construction. nevertheless, this fact has not been integrated into empirical research in any systematic manner. empirical studies that do focus on the social construction of risk often do so from very different positions and with different objectives in mind. interpersonal discussion, while considered an important medium of social construction, is rarely given consideration. this systematic literature review aims to provide a coherent foundation for empirical studies of interpersonal discussion on risk. specifically, it summarizes existing research into the reciprocal relationship between interpersonal discussion on risk and individual-level risk perception. the systematic literature review adheres to the preferred reporting items for systematic reviews (prisma) guidelines. a total of 843 unique articles were identified, of which 60 are included in the review. a majority of the articles in the corpus found a positive association between interpersonal discussion on risk and risk perception. this association, however, lacks robustness, especially in terms of the direction of causality. three theoretical interpretations of the relationship are found in the corpus: (1) interpersonal discussion as a conduit for risk information, (2) risk perception as shared social schemata, and (3) interpersonal discussion on risk as a facilitator of similarity between network members. implications for future research are discussed. this literature review concludes with six guiding principles for future research into the interpersonal discussion�risk perception relationship. 11. title: assessing key behavioural theories of drought risk adaptation: evidence from rural kenya authors: teun schrieks, w. j. wouter botzen, toon haer, oliver v. wasonga, jeroen c. j. h. aerts abstract: the horn of africa drylands are increasingly experiencing severe droughts, which impose a threat on traditional livelihood strategies. understanding adaptation behavior in rural communities is key to helping reduce the impact of these droughts. we investigate adaptation behavior by assessing four established economic and social psychological theories on decision making under risk: expected utility theory (eut), rank dependent utility theory (rdu), protection motivation theory (pmt), and theory of planned behavior (pmt). to measure adaptation behavior and the theory constructs, we conducted a household survey in kenya (n = 502). regression analysis shows that the economic theories (eut and rdu) have the best fit for our data. risk and time preferences are found to play an important role in adaptation decisions. an analysis of differences in decision making for distinct types of adaptation measures shows that risk averse (agro-)pastoralists are more likely to implement adaptation measures that are adjustments to their current livelihood practices, and less willing to invest in adaptation measures that require a shift to other livelihood activities. moreover, we find significant effects for elements of the social psychological theories (pmt and tpb). a person's belief in their own ability to implement an adaptation measure (perceived self-efficacy) and adaptation by family and friends are important factors in explaining adaptation decisions. finally, we find that the type of adaptation measures that people implement is influenced by, among others, gender, education level, access to financial resources, and access to government support or aid. our analysis gives insights into the drivers of individual adaptation decisions, which can enhance policies promoting adaptation of dryland communities. 12. title: communicating scientific uncertainty in the early stages of the covid-19 pandemic: a message experiment authors: dallin r. adams, chelsea l. ratcliff, manusheela pokharel, jakob d. jensen, yi liao abstract: the world health organization (who) officially declared covid-19 a pandemic on march 11, 2020. it was a time of significant uncertainty as experts were not yet certain whether social distancing behaviors were necessary to slow the spread of the virus. some public communicators opted to acknowledge uncertainty based on the limited evidence, whereas others downplayed uncertainty. this situation provided researchers with an opportunity to advance theory by explicating and testing cognitive responses to message uncertainty. immediately following the who declaration (march 13�19, 2020), u.s. adults (n = 1186) were randomly assigned to one of six conditions in a 2 (message uncertainty: low, high) � 3 (argument support: expert, threat, precedent) between-participants experiment. overall, perceived uncertainty negatively mediated the impact of message uncertainty on intentions. however, participant education was a key moderator. for those with more than a high school education, uncertain messages were related to higher intentions to social distance through increased critical reflection. for those with a high school education or less, uncertain messages were related to lower intentions through decreased message credibility. 13. title: integrating household survey with inoperability input�output model of critical infrastructure systems: a case study of hurricane sandy authors: joost santos, sisi meng, pallab mozumder abstract: critical infrastructures are ubiquitous and their interdependencies have become more complex leading to their uncertain behaviors in the aftermath of disasters. the article develops an integrated economic input�output model that incorporates household-level survey data from hurricane sandy, which made its landfall in 2012. in this survey, 427 respondents who were living in the state of new jersey during hurricane sandy were used in the study. the integration of their responses allowed us to show the probability and duration of various types of critical infrastructure failures due to a catastrophic hurricane event and estimate the economic losses across different sectors. the percentage of disruption and recovery period for various infrastructure systems were extracted from the survey, which were then utilized in the economic input�output model comprising of 71 economic sectors. sectors were then ranked according to: (i) inoperability, the percentage in which a sector is disrupted relative to its ideal level, and (ii) economic loss, the monetary worth of business interruption caused by the disaster. with the combined infrastructure disruptions in the state of new jersey, the model estimated an economic loss of $36 billion, which is consistent with published estimates. results from this article can provide insights for future disaster preparedness and resilience planning.       "&) ,-/8rs{|���ʸʸʸ���~qcuhc=uhicy5�ojqj^jhj�5�ojqj^jo(h6h65�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h!@�5�cjojqj^jajh 2e5�cjojqj^jaj#hj<hj<5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h6h65�cjojqj^jaj,-.s���(78������� � f!�!*) )������������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4������������ '(12678���ʼ��喤�x��m�x�_rd9h%j,5�ojqjo(hihu<�ojqj^jo(h�lh�lojqj^jhih�l$ojqj^jo(hj<5�ojqj^jhvi�h�l$5�ojqj^jo(h�lh�l5�ojqj^jh�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h6h6ojqj^jhihj�ojqj^jo(h�"�hu<�5�ojqj^jht45�ojqj^jo(89:;ab���������������������²��²й�tgyk>h$?�5�ojqj^jo(h$?�h$?�5�ojqj^jh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(h%j,5�ojqjo(hihanojqj^jh�lh�lojqj^jh� )hto�ojqj^jo(hj<5�ojqj^jhvi�hto�5�ojqj^jo(h�lh�l5�ojqj^jhto�hto�5�ojqj^j hto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(���fis����� � � � � � � e!f!n!o!!���ƻ���ӭ���zl^zpb^z�hvi�h�ps5�ojqj^jhf�hf�5�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h�@h�@ojqj^jh� )h$?�ojqj^jo(hj<5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^jhvi�h$?�5�ojqj^jo(h�@h�@5�ojqj^j!�!�!�!�!))*) ),).)4)5)�)�)�)�)�)�)�)�)�)���ÿ����v�hzvlah���hj<5�ojqj^jhvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jh�w5h�w55�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�h�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�h�5�ojqj^j )�)�)�0�0141�4�4�4=5�9�9q:t:-?.?�?�?0f1f�f�fnn�n�������������������������gd�s�gd�_gdlz�gd�)ggd|�gd)w�gdr7a�)�0�0�0�0�0�0�011 1%13141=1>1>4?4�4�4�4���Ϳ�ͣ����zl^qcq��hru�hru�ojqj^jo(hru�hru�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hj<5�ojqj^jhvi�h|�5�ojqj^jhru�hru�5�ojqj^jh|�h|�5�ojqj^jh�"�h)w�5�ojqj^jh|�5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�w5h�w5ojqj^j�4�4�4�4�4�4�45515<5=5f5g5�9�9�9�9�9�9�9����ɻ��ɠ��wi^q�c6hlz�5�ojqj^jo(hlz�hlz�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(hy* hy* ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hj<5�ojqj^jhvi�h�)g5�ojqj^jhy* hy* 5�ojqj^jh�)gh�)g5�ojqj^jh�"�h)w�5�ojqj^jh�)g5�ojqj^jo(�9p:q:z:i:s:t:}:~:,?-?.?0?2?8?9?�?����񺬞��xk]ob4h?'rh?'r5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�s�h�s�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hj<5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^jh�s�h�s�5�ojqj^j�?�?�?�?�?�?�?/f0f1f3f5f;fz0h[h[5�ojqj^jh[h�s�5�ojqj^jh�g�h�g�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h}onh)w�ojqj^jo(h?'rh?'rojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h?'rh?'r5�ojqj^jh�_h�_5�ojqj^jhvi�h�_5�ojqj^j�f�f�f�f�fgnnn n"n(n)n�n�n�n�n�n�n�n�n���ⱥ����yk�]oka�]��h�9�h[5�ojqj^jh[h�s�5�ojqj^jh�'�h�'�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h[h)w�ojqj^jo(h�g�h�g�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h�g�h�g�5�ojqj^jhj<5�ojqj^j�n�n�s�s^t�t z zzzzzzzzzzz�����������������gd�gd)w�gd�s��n�n�s�s�s�s�s�s�s]t^tgt�t�t�t�t�t z z z z���˾������{�k]�p�b:jh;�uhj<hj<5�ojqjo(h�_{h�_{ojqj^jh$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(hj<5�ojqj^jh[h�s�5�ojqj^jh�_{h�_{5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h�~�5�ojqjo(h[h)w�ojqj^jo(h�'�h�'�ojqj^jhih)w�ojqj^jo( zzzzzzzzz��������hj<hj<5�ojqjo(jh;�uh;�01�82p��. ��a!�"�#��$��%��s�� ��s2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��j ck�e $1$a$ cjkh_hajmh nhsh th$a ���$ ؞���k=�w[sobi���b nf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h [�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=x e��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk! ѐ��'theme/theme/_rels/thememanager.xml.rels��m �0���wooӻ�&݈э���5 6?$q�� �,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��6 0_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-! ѐ��'� theme/theme/_rels/thememanager.xml.relspk]� rz���� �8�!�)�4�9�?�f�n zz.012356789;< )�nz/4:�@� @���������h ��0�( � ����0�( � ��b �s ���� ?�� � � � *2jrkqz�ou���)#)>,?,----1-5-�1�1z2`2a2g2i2n2o2s2�7�7j>u>�>�>�>�>�>�>�>�>�>�>�>�>�>�>�>�>�f�f�f�f�f�fglllulylzl~l�l�l�l�l=p>p rrrrrrrrr rr.f�q2t2^l�l rrrrrrrrr "&� � ffss�!�!%)%)1-1-i2i2�>�>�f�f�l�l rr��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�= {u�,� uz*�m� �r=��-9h�s��eme�.~�� {r�v �4�1l2q �"�i aha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*� 7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ibl���>!]�.�` rv:g&>!��}n!�l�s'��2�"�0r��\�|�md-%;�blrbr]�a 6ji� ��vj�`�[jo 5j90�[`v ry �:[� k 3q-r�jx 8i� tp� k�|�2~� ��y��k� ?i��� * �? = ��#? ?*� @�4le� dw" �� �z�g�kd �2�^e �-h�x �w��t� bs &�x� -z�y� �w� i�>�:-� �u kkkkdw" q�x�-h� k^r� �^�vxb� �=#�/y�pur ���� ��'ff�x-z�d�y�(��)fk{z��2�fv��-�{��p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^� �~76=&����` [� ��rh&<�^��oc!��y�d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8�qf� �7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d� )r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7�� �e �o[kh,~�hmpm~� mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t an�gap�y8��x� ��s��d���z��j�vzq��t\ ~��av'po�_m4�i�w��tkpb�` rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l� �!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#� � �i3#�#? �=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w (r�@�~d:(� _(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e ��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f� � {p���c,@�i��#,�dq[mk, @p�qb,�d&d� �,�>m��x�,� {u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��eeq41fw2 �z��>2"o�m�29!"e�w�2�f\�h�2n�~ us3�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l��r�45h 5�^b^� -a5�pv5�d5tw�'��5��5md-�b�5i�d��v�5 -a5�a 6�`d�#6ghch��/�681�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\�~74\�7bd9t=r�7��gr f8c�]��jo8�~�8�� �8��b�n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjj o;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�? u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]i�d�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y� ��f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q �q� �qqg$�r)b;r�,�q��0hr�l��zwr� {r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0 g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv ��q�yv^mc���y< z�&xfk{z�kd  �zhp�� [�enx�:[�=�^�` [�0�[(>y��f\�?\i�(���\�\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m��6�`t a��&na[mk,�9a��q��;=a��a��5��>�asq�y�3j�a�zwr�a�t� 3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^����c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� * ^ee����l\e�>e��eme�hgqwe�u �t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f< z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkz l!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��]dm�.�mz*�ma�� �m�hn�y`�gn� �!�g)nfr>��^^nv��, mn�kj>�nh#�n�gv'po� ���"�o�"�o6gp�e �oh��.�o�r��v�o mg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fmw�s-dt�y�)1:to �v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x, mnf�x&xn �x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{ hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s� u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\ ~ �=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l��\s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x ��m�j�����[w�3`2 r� �p y* j^ �n6�_ati�wb4u�ns�.h j<sh�t�o>s�r#�l$�}&�m'�m(� )�g)%j,�@.�p.�i/�2�z2'4t4�w5.6�6*8;i8cj8�9�i;j<�e=k&>�@e!@jj@r7a�ec�nd�udvf! i0 i4tj�kulyl*m%man?'r�%s�#umkxgy�py�]�^ro_5a�7ahc( c 2e�lf�qf�)gjmi�ckalthllmnnm}on[r�ps0@ui1vywicy�_{�x}�l�/�wt��g�mw��=��=��`�f�j�nj��9�l�.~�v�;��a��l�=h��j��~�du�� �=i�fj�to�4��m��2�)w����l�lz� ��c�7�u<�[��t��r�������cb��^�v��\�a�vi�|w�r������r���$?��n�� ��!�s/�� ��8�*��-��_�$-��f�><����r��'��c��e�7"�xr����s���?5����"�gl�bj��s�h��-��� ��"�l%�w� p�!@�ru�2����y�� ��e�`-�|� rr�@��l�l�l�lr�@��unknown������������g��.�[x� �times new roman5��symbol3.� �.�[x� �arial7.� ��[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�fͪ�g�f> �e)�> �e)�!-!),.:;?]}����    & 6"0000 0 0 00000��� � �����=�@�\�]�^���([{�  0 0 00000��;�[�����������q�q 2�q��hp��?�����������������������"�2!xx��l�[ ���userlib-x�� �����oh�� '��0t������� ��   (4<dl�usernormallib-x192microsoft office word@�2@�y��\�@fx��> �e�� ��՜.�� ,��0� x`t|�� ����� microsoft�)�q   !"#$%&'()* ,-./0123456789:;<=����?@abcde����ghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnop����rstuvwx����z{|}~������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������root entry�������� �f�a�x����data ������������>1table����fztworddocument����2zsummaryinformation(������������qdocumentsummaryinformation8��������ycompobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �fmicrosoft word 97-2003 �ĵ� msworddocword.document.8�9�q
网站地图