-k8凯发棋牌
��ࡱ�>�� ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r�rebjbj�n�n2���a��ad\
�������""������������8�tm$��pl��������epgpgpgpgpgpgp$jr� u<�p-�������p����4�p���������ep��ep��������p�&�:h������(�qp�p0�p�\u�f\u���0\u��l����������p�p
�����p������������������������������������������������������������������������\u���������"qs: risk analysis
volume 43, issue 3, march 2023
1. title: cases of real-life policies related to risk: how can they enhance risk analysis and risk science?
authors: terje aven
abstract: policies on risk constitute a core topic of risk analysis and risk science, and it is common at risk conferences to present real-life cases of such policies, for example related to the handling of climate change and pandemics. although these are of broad interest, showing how important issues in society are dealt with, it can be questioned to what extent and how these cases contribute to enhancing risk analysis and risk science. the present paper addresses this concern. it is argued that, in order to learn from the cases, they need in general to be more thoroughly followed up with discussions of concepts, principles, approaches, and methods for assessing, characterizing, communicating and handling risk. describing a governmental policy on, for example, the handling of covid-19 is a point of departure for interesting discussions concerning its justification and performance, in particular in relation to risk and the most updated knowledge from the risk analysis field. such discussions are, however, often lacking. the paper points to some key obstacles and challenges for the learning process, including the difficulty of distinguishing between policies, policy analysis, and politics.
2. title: development of a novel machine learning-based weighted modeling approach to incorporate salmonella enterica heterogeneity on a genetic scale in a dose�response modeling framework
authors: shraddha karanth, abani k. pradhan
abstract: estimating microbial dose�response is an important aspect of a food safety risk assessment. in recent years, there has been considerable interest to advance these models with potential incorporation of gene expression data. the aim of this study was to develop a novel machine learning model that considers the weights of expression of salmonella genes that could be associated with illness, given exposure, in hosts. here, an elastic net-based weighted poisson regression method was proposed to identify salmonella enterica genes that could be significantly associated with the illness response, irrespective of serovar. the best-fit elastic net model was obtained by 10-fold cross-validation. the best-fit elastic net model identified 33 gene expression�dose interaction terms that added to the predictability of the model. of these, nine genes associated with salmonella metabolism and virulence were found to be significant by the best-fit poisson regression model (p < 0.05). this method could improve or redefine dose�response relationships for illness from relative proportions of significant genes from a microbial genetic dataset, which would help in refining endpoint and risk estimations.
3. title: improving fire risk communication between authorities and micro-entrepreneurs: a mental models study of ghanaian central market fires
authors: frank nyame-asiamah, bismark yeboah boasu, peter kawalek, daniel buor
abstract: this study conceptualizes how fire management authorities can empower nonexpert public to participate in fire risk communication processes and increase their own responsibilities for managing fire preventive, protective and recovery processes effectively. drawing narratives from 10 disaster management experts working at government institutions and nine micro-entrepreneurs operating self-sustaining businesses in different merchandized lines in ghana, we analyzed the data thematically and explored new insights on mental models to generate a two-way fire risk communication model. the findings suggest that fire management authorities planned fire disasters at the strategic level, collaborated with multiple stakeholders, disseminated information through many risk communication methods, and utilized their capabilities to manage fire at the various stages of fire risk communication, but the outcomes were poor. the micro-entrepreneurs sought to improve fire management outcomes through attitude change, law enforcement actions, strengthened security and better public trust building. the study has implications for policymakers, governments, and risk communication authorities of developing countries to strengthen their fire disaster policies to minimize commercial fire incidents and address the damaging effects of fire on people's livelihoods, businesses, properties, and environments. our proposed two-way fire risk communication model is a new theoretical lens for experts and the nonexpert public to assess each other's beliefs about risk information and manage fire risk communication effectively at all stages.
4. title: risk analysis of fast spreading species in a kashmir himalayan national park (dachigam) for better monitoring and management
authors: saba yaqoob, iqra jan, zafar a reshi, irfan rashid, manzoor a. shah
abstract: huge economic costs and ecological impacts of invasive alien species (ias) in the protected areas (pas) worldwide make their timely prediction and potential risk assessment of central importance for effective management. while the preborder weed risk assessment framework has been extensively evaluated and implemented, the postborder species risk assessment framework has not been subjected to the same degree of scrutiny. here we used a rather more realistic modified version of the australian weed risk framework (awrm) for dachigam national park (dnp) in kashmir himalaya against 84 plant species, including 55 alien species and 29 fast spreading native species, for risk analysis. we found two very high-risk species, three high-risk species, 10 medium-risk species, 29 low-risk species, and 40 negligible-risk species in the dnp. the containment scores accordingly ranged from 14.4 to 293.5 comprising of 27 species that can be contained with very high feasibility, 23 species with high feasibility, 14 species with medium feasibility, and 12 species which cannot be contained easily thereby having low feasibility of containment (foc) score. however, eight species which have a negligible foc score are difficult to contain within their infestation sites. our results demonstrate the merit of the awrm with a caution that the necessary region-specific modifications may help in its better implementation. overall, these results provide quite a promising tool in the hands of protected area managers to timely and effectively deal with the problem of plant invasions.
5. title: a dynamic bayesian network-based emergency decision-making framework highlighting emergency propagations: illustrated using the fukushima nuclear accidents and the covid-19 pandemic
authors: yinan cai, michael w. golay
abstract: when facing public emergencies, human societies need to make decisions rapidly in order to mitigate the problems. however, this process can be difficult due to complexity of the emergency scenarios and lack of systematic methods for analyzing them. in the work reported here, we develop a framework based upon dynamic bayesian networks in order to simulate emergency scenarios and support corresponding decisions. in this framework, we highlight the importance of emergency propagation, which is a critical factor often ignored by decisionmakers. we illustrate that failure of considering emergency propagation can lead to suboptimal mitigation strategies. by incorporating this critical factor, our framework enables decisionmakers to identify optimal response strategies minimizing emergency impacts. scenarios developed from two public emergencies: the 2011 fukushima nuclear power plant accidents and the covid-19 pandemic, are utilized to illustrate the framework in this paper. capabilities of the framework in supporting decision making in both events illustrate its generality and adaptability when dealing with complex real-world situations. our analysis results reveal many similarities between these two seemingly distinct events. this indicates that seemingly unrelated emergencies can share many common features beyond their idiosyncratic characteristics. valuable mitigation insights can be obtained by analyzing a broad range of past emergencies systematically.
6. title: a value of information framework for assessing the trade-offs associated with uncertainty, duration, and cost of chemical toxicity testing
authors: shintaro hagiwara, greg m. paoli, paul s. price, maureen r. gwinn, annette guiseppi-elie, patrick j. farrell, bryan j. hubbell, daniel krewski, russell s. thomas
abstract: a number of investigators have explored the use of value of information (voi) analysis to evaluate alternative information collection procedures in diverse decision-making contexts. this paper presents an analytic framework for determining the value of toxicity information used in risk-based decision making. the framework is specifically designed to explore the trade-offs between cost, timeliness, and uncertainty reduction associated with different toxicity-testing methodologies. the use of the proposed framework is demonstrated by two illustrative applications which, although based on simplified assumptions, show the insights that can be obtained through the use of voi analysis. specifically, these results suggest that timeliness of information collection has a significant impact on estimates of the voi of chemical toxicity tests, even in the presence of smaller reductions in uncertainty. the framework introduces the concept of the expected value of delayed sample information, as an extension to the usual expected value of sample information, to accommodate the reductions in value resulting from delayed decision making. our analysis also suggests that lower cost and higher throughput testing also may be beneficial in terms of public health benefits by increasing the number of substances that can be evaluated within a given budget. when the relative value is expressed in terms of return-on-investment per testing strategy, the differences can be substantial.
7. title: subjective machines: probabilistic risk assessment based on deep learning of soft information
authors: mario p. brito, matthew stevenson, cristi�n bravo
abstract: for several years machine learning methods have been proposed for risk classification. while machine learning methods have also been used for failure diagnosis and condition monitoring, to the best of our knowledge, these methods have not been used for probabilistic risk assessment. probabilistic risk assessment is a subjective process. the problem of how well machine learning methods can emulate expert judgments is challenging. expert judgments are based on mental shortcuts, heuristics, which are susceptible to biases. this paper presents a process for developing natural language-based probabilistic risk assessment models, applying deep learning algorithms to emulate experts� quantified risk estimates. this allows the risk analyst to obtain an a priori risk assessment when there is limited information in the form of text and numeric data. universal sentence embedding (use) with gradient boosting regression (gbr) trees trained over limited structured data presented the most promising results. when we apply these models� outputs to generate survival distributions for autonomous systems� likelihood of loss with distance, we observe that for open water and ice shelf operating environments, the differences between the survival distributions generated by the machine learning algorithm and those generated by the experts are not statistically significant.
8. title: an integrated environmental risk assessment framework for coal-fired power plants: a fuzzy logic approach
authors: ayfer bartan, serhat kucukali, irfan ar, kemal baris
abstract: this study quantifies the environmental risk of a coal-fired thermal power plant during operation by using environmental monitoring data, site surveys, and documented evidence. the following criteria are assessed: emissions (co, so2, nox, pm10), impact on aquatic ecosystem (fish protection at cooling water intake and cooling water discharge temperature), and waste management (fly ash and bottom ash). fuzzy sets were defined for each criterion, taking environmental regulatory context as an expert judgment. a survey was conducted with multiple stakeholders to determine the relative importance of risk factors. the survey results showed that the most concerned risks are so2 and nox emissions. the proposed method estimates the risk of each environmental criterion separately and then accumulates them into an environmental risk index (eri). accordingly, we assessed the catalagzi coal-fired power plant, which has been in operation on the black sea coast in northwestern turkey. for this case study, the eri resulted in a value of 0.78 (on a scale of 0�1), showing high environmental risk to the facility. moreover, the applicability of the proposed framework was tested in several existing coal-fired power plants using simultaneous measurements. all studied coal-fired power plants in turkey have unacceptable pollutants (pm10, so2, and nox) concentration levels indicating high health risk potential. the application of the integrated environmental risk assessment framework showed that new environmental regulations are needed in turkey to specify more strict emission limits and to monitor co2, fine particulate matter emissions, cooling water discharge, and fish protection at cooling water intake.
9. title: individual differences in numerical representations of risk in health decision making: a fuzzy-trace theory approach
authors: priscila g. brust-renck, valerie f. reyna
abstract: fuzzy-trace theory predicts that decisionmakers process numerical information about risk at multiple levels in parallel: the simplest level, nominal (categorical some-none) gist, and at more fine-grained levels, involving relative comparison (ordinal less-more gist) and exact quantities (verbatim representations). however, little is known about how individual differences in these numerical representations relate to judgments and decisions, especially involving health tradeoffs and relative risks. to investigate these differences, we administered measures of categorical and ordinal gist representations of number, objective numeracy, and intelligence in two studies (ns = 978 and 956). in both studies, categorical and ordinal gist representations of number predicted risk judgments and decisions beyond objective numeracy and intelligence. participants with higher scores in categorical gist were more likely to choose options to avoid cancer recurrence risks; those who were higher in ordinal gist of numbers were more likely to discriminate relative risk of skin cancer; and those with higher scores in objective numeracy were more likely to choose options that were numerically superior overall in terms of relative risk of skin cancer and of genetic risks of breast cancer (e.g., lower numerical probability of cancer). results support parallel-processing models that assume multiple representations of numerical information about risk, which vary in precision, and illustrate how individual differences in numerical representations are relevant to tradeoffs and risk comparisons in health decisions. these representations cannot be reduced to one another and explain psychological variations in risk processing that go beyond low versus high levels of objective numeracy.
10. title: language modality influences risk perception: innovations read well but sound even better
authors: janet geipel, constantinos hadjichristidis, lucia savadori, boaz keysar
abstract: psychological theories implicitly assume that the modality in which information is conveyed�spoken or written�leaves judgment and choice unaltered. modality is rarely considered in textbooks on judgment and decision making, and the selection of modality in research is often based on convenience. we challenge this theoretical assumption. three experiments (n = 984) show that the modality in which novel technologies are described systematically influences their perceived risk and benefit. participants either read or heard advantages and disadvantages of novel technologies and then assessed their risk and benefit. in study 1, spoken descriptions prompted more positive evaluations toward the technologies in terms of overall risks and benefits than written descriptions. studies 2 and 3 replicated this modality effect and demonstrated that affect partially explains it, as spoken descriptions induced more positive feelings toward the new technologies than written descriptions. study 3 (preregistered) showed that the influence of modality is unique to novel technologies and does not extend to familiar ones. these findings contribute theoretically to the understanding of the relationship between language and thought, and carry implications for survey research and the use of voice assistant technology.
11. title: application of data mining to minimize fire-induced domino effect risks
authors: long ding, faisal khan, jie ji
abstract: data mining (dm) has been applied in many advanced science and technology fields, but it has still not been used for domino effect risk management to explore minimum risk scenarios. this work investigates the feasibility of dm in minimizing the risk of fire-induced domino effects in chemical processing facilities. based on dm, an evidential failure mode and effects analysis (e-fmea), which could bridge chemical facilities� operational reliability and domino effect risk, is combined with fault tree analysis (fta) for the occurrence risk modeling of loss of containment (loc) event of chemical facilities, which is often the triggering point of fire-induced domino effects. industry specific data such as reliability data, inspection records, and maintenance records are of great value to model the potential occurrence criticality of loc. the data are used to characterize the loc risk priority number (rpn) of chemical facilities through fta and e-fmea, search and statistics rules are proposed to mine inspection records to assess loc risk factors. according to the rpn scores of facilities, inherent safety strategies to minimize risk via inventory control are proposed, and their effectiveness is tested using a well-known probit model. in this way, the approach proposes a unit-specific evidence-based risk minimization strategy for fire-induced domino effects. a case study demonstrates the capability of dm in the risk minimization of fire-induced domino effects.
12. title: risk assessment based on a stpa�fmea method: a case study of a sweeping robot
authors: yanxi zhang, tiezhong liu
abstract: despite rapid developments in the quality and safety of consumer products, the rise of intelligent household appliances, such as sweeping robots, has introduced new safety concerns. considering �person�product�environment� elements and the complex systems of emerging consumer products, this study presents a new method of risk assessment for consumer products: systems theoretic process analysis (stpa)�failure mode and effects analysis (fmea). as a case study, this method is applied to the safety control of a sweeping robot. the results suggest that this method can identify all the possible failure modes and injury scenarios among the product components, and the safety constraints in the hierarchical control structure of the interactive system. moreover, the stpa�fmea method combines user and environmental factors with the value of product risk events, based on the risk priority number (rpn). this provides an accurate and orderly system to reduce or eliminate the root causes of accidents and injuries. finally, analysis of unsafe control behavior and its causes can be used to suggest improved safety constraints, which can effectively reduce the risk of some injury scenarios. this paper presents a new method of risk assessment for consumer products and a general five-level complex index system.
13. title: murphy scale: a locational equivalent intensity scale for hazard events
authors: yi victor wang, antonia sebastian
abstract: empirical cross-hazard analysis and prediction of disaster vulnerability, resilience, and risk requires a common metric of hazard strengths across hazard types. in this paper, the authors propose an equivalent intensity scale for cross-hazard evaluation of hazard strengths of events for entire durations at locations. the proposed scale is called the murphy scale, after professor colleen murphy. a systematic review and typology of hazard strength metrics is presented to facilitate the delineation of the defining dimensions of the proposed scale. an empirical methodology is introduced to derive equivalent intensities of hazard events on a murphy scale. using historical data on impacts and hazard strength indicators of events from 2013 to 2017, the authors demonstrate the utility of the proposed methodology for computing the equivalent intensities for earthquakes and tropical cyclones. as part of a new area of research called hazard equivalency, the proposed murphy scale paves the way toward creating multi-hazard hazard maps. the proposed scale can also be leveraged to facilitate hazard communication regarding past and future local experiences of hazard events for enhancing multi-hazard preparedness, mitigation, and emergency response.
14. title: new methods for evaluating energy infrastructure development risks
authors: michael j. ford, ahmed abdulla
abstract: many energy technologies that can provide reliable, low-carbon electricity generation are confined to nations that have access to robust technical and economic capabilities, either on their own or through geopolitical alliances. equally important, these nations maintain a degree of institutional capacity that could lower the risks associated with deploying emergent energy technologies such as advanced nuclear or carbon capture and storage. the complexity, expense, and scrutiny that come with building these facilities make them infeasible choices for most nations. this paradigm is slowly changing, as the pressing need for low-carbon electricity generation and ongoing efforts to develop modular nuclear and carbon capture technologies have opened the door for potentially wider markets, including in nations without substantial institutional capacity. here, using advanced nuclear technologies as our testbed, we develop new methods to evaluate national readiness for deploying complex energy infrastructure. specifically, we use data envelopment analysis�a method that eliminates the need for expert judgment�to benchmark performance across nations. we find that approximately 80% of new nuclear deployment occurs in nations that are in the top two quartiles of institutional and economic performance. however, 85% of potential low-carbon electricity demand growth is in nations that are in the bottom two quartiles of performance. we offer iconic paradigms for deploying nuclear power in each of these clusters of nations if the goal is to mitigate risk. our research helps redouble efforts by industry, regulators, and international development agencies to focus on areas where readiness is low and risk correspondingly higher.
�nn/ffnċ�
15. title: review of atlas of global change risk of population and economic systems by peijun shi (ed). springer nature singapore pte. ltd., gateway east, singapore 189721, singapore, pp. xx 278. isbn: 978-981-16-6690-2 (hbk), 978-981-16-6691-9 (ebk)
authors: feng kong
abstract: the article reviews the book �atlas of global change risk of population and economic systems� by peijun shi.
"'*,-.09�����ʻʻʩ��wobtf9thj�5�ojqj^jo(h�=zh�=z5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h�]5�cjojqj^jajh
2e5�cjojqj^jaj#h�=zh�=z5�cjojqj^jajh�=z5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h�=zh�=z5�cjojqj^jaj-./��h
i
&r
��pq�%u!v!";"
((������������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4������g
h
i
j
l
r
s
%&./aqr[\���˽�����|�n^|�sn^|ehih�l$ojqj^jo(hbo�5�ojqj^jhvi�h�l$5�ojqj^jo(h��h��5�ojqj^jh�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h�=zh�=zojqj^jhihj�ojqj^jo(h�"�hu<�5�ojqj^jht45�ojqj^jo(h�=zh�=z5�ojqj^jhicy5�ojqj^j\
���������opqrt���Ϳ��͜��́���sfy�l>h�"�h%j,5�ojqj^jhs/�5�ojqj^jo(hihanojqj^jh8�h8�ojqj^jh�)hto�ojqj^jo(h�/c5�ojqj^jhvi�hto�5�ojqj^jo(h8�h8�5�ojqj^jhto�hto�5�ojqj^jhto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(h%j,5�ojqjo(hihu<�ojqj^jo(h��h��ojqj^jtz[����$%./t!u!v!w!y!_!`!""""*":"���������zl^zpb^z�phvi�h�ps5�ojqj^jh�ath�at5�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h^"�h^"�ojqj^jh�)h$?�ojqj^jo(h�/c5�ojqj^jhvi�h$?�5�ojqj^jo(h^"�h^"�5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^j:";"d"e" (
((((((�(�(�(�(9)j)k)t)u)// /���ǹ�����wi�[pw���c��h�h�ojqj^jh�/c5�ojqj^jhvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jh�h�5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�ath�atojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo((�(k)/ /�/�/(5)5�5�5�<�<=f=hdid�d�d j,jj�jupvp�p�������������������������gd�s�gd�_gdlz�gd�)ggd|�gd)w�gdr7a /!/#/)/*/�/�/�/�/�/�/�/�/'5(5)5*5,52535�5����ɻװɠ��wi^q�cq5h�6h�65�ojqj^jh�)gh�)g5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�h,h�h,ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�/c5�ojqj^jhvi�h|�5�ojqj^jh�h,h�h,5�ojqj^jh|�h|�5�ojqj^jh�"�h)w�5�ojqj^jh|�5�ojqj^jo(�5�5�5�5�5�5�5�5�5�<�<�<�<�<�<�<���˽����vk^pb5hlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�6h�6ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�6h�65�ojqj^jh�/c5�ojqj^jh�)g5�ojqj^jo(h�)gh�)g5�ojqj^jhvi�h�)g5�ojqj^j�<===5=e=f=o=p=gdhdidkdmdsdtd�d������xk]ob4hsvbhsvb5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h:rh:rojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�/c5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^jh:rh:r5�ojqj^j�d�d�d�d�d�de e*j j,j.j0j6j7j~jj�j���ʺ����xk]oka3oh[h�s�5�ojqj^jh`h`5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h}onh)w�ojqj^jo(hsvbhsvbojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hsvbhsvb5�ojqj^jhot�5�ojqj^jh�_h�_5�ojqj^jhvi�h�_5�ojqj^j�j�j�j�j�j�j�jtpupvpxpzp�p�p�p�p�p�p�p�p���ⱥ����yk]yoa]3�oh�9�h[5�ojqj^jh[h�s�5�ojqj^jh;�h;�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h[h)w�ojqj^jo(h`h`ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h`h`5�ojqj^jhot�5�ojqj^jh[h[5�ojqj^j�p�pvvpv�v�[�[�[\�c�c�c�c�d�dcedefegeiejelemeoepeqe��������������������������gd�gdekgd
�gdmw�gd)w�gd�s��p�p�p�pvvvv!v'v(vovpvyv�v�v�v�v�v�[�[�[�[���ǹ�����wi�^w���q�f�h)w�5�ojqjo(h�fh�fojqj^jhot�5�ojqj^jh[h�s�5�ojqj^jh�fh�f5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h�~�5�ojqjo(h[h)w�ojqj^jo(h;�h;�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(�[�[�[�[�[�[�[�[�[\\
\\�c�c�c�c�c�c���ʼ�ף���wj\se<1h�.%5�ojqjo(h�.%5�ojqjh�.%h�.%5�ojqjo(h)w�5�ojqjh[h)w�ojqj^jo(h�.dh�.dojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(hot�5�ojqj^jh[hmw�5�ojqj^jh�.dh�.d5�ojqj^jhmw�5�ojqj^jo(hmw�hmw�5�ojqj^jh�"�h)w�5�ojqj^jh)w�5�ojqj^jo(�c�c�c�c�c�cd3d�d�d�d�d�d�d�dereveweaebe����õ�����~pbuhu>h>hk/�ojqj^jhk/�hk/�ojqj^jhekhekojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh$?�h
�5�ojqj^jo(hmw�h
�5�ojqj^jh[h
�5�ojqj^jhqu5�ojqj^jhekhek5�ojqj^jh
�5�ojqj^jo(h
�h
�5�ojqj^jh
�h
�h�"�h)w�5�ojqj^jh�s�5�ojqj^jo(becedeeegehejekemeneqere�����������hi\jhi\uhj<hj<5�ojqjo(hekh)w�ojqj^jo(qere�gd)w�01�82p��. ��a!�"�#��$��%��s����s2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��jck�e$1$a$ cjkh_hajmh nhsh th$a ���$؞���k=�w[sobi���bnf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h
[�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=xe��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk!
ѐ��'theme/theme/_rels/thememanager.xml.rels��m
�0���wooӻ�&݈э���5
6?$q��
�,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��60_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-!
ѐ��'� theme/theme/_rels/thememanager.xml.relspk]�
r\����� �\t:" /�5�<�d�j�p�[�cbere35678:;<=>@abc(�pqere49?d�@� @���������h ��0�( �
����0�( �
��b
�s���� ?�������8?af`h��������������<e��������s}>f$%(5:xf!� � � !0!7!�'�'�-�-�-�-�-�-�-�-�-�-�-�-p1y1(535q55�<�<�<�<�<�<�<�<�<�<�b�b�g�g�h�h�h�h�z�z5[;[a[c[�[�[�[�[w\]\d\f\g\i\j\l\m\o\s\�'�'�34d\s\33�h�hd\f\g\i\j\l\m\o\s\aa��**9!9!�'�'�-�-5555�<�<�b�b�h�h�n�n�s�s�z�z2[3[�[�[\r\v\b\c\c\s\��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�={u�,� uz*�m� �r=��-9h�s��eme�.~��
{r�v�4�1l2q �"�iaha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*�7��:a��?:�^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�`
rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a
6ji� ��vj�`�[jo 5j90�ry �:[�
k 3q-r�jx 8i� tp� k�|�2~�
��y��k�
?i��� *�?=��#??*�@�4le�dw"
���z�g�kd�2�^e�-h�x�w��t�bs &�x�-z�y��w�i�>�:-��u
kkkkdw"
q�x�-h�
k^r�
�^�vxb�
�=#�/y�pur ����
��'ff�x-z�d�y�(��)fk{z��fv��-�p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����`
[� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8��7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d�
)r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7��
�e�o[kh,~�hmpm~�mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t
an�gap�y8��x���s��d���z��j�vzq��t\
~��av'po�_m4�i�w��tkpb�`
r��q1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l��!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#�� �i3#�#?�=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'�}|'%�?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w(r�@�~d:(�_(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f�� {p���c,@�i��#,�dq[mk, @p�qb,�d&d��,�>m��x�,�{u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�o�0;1�0��efw2
�z��>2"o�m�29!"e�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^�
-a5�pv5�d5tw�'��5��5md-�b�5i�d��v�5
-a5�a
6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\�~74\�7bd9t=r�7��gr
f8c�]��jo8�~�8���8��b�n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjjo;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�?
u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]�l�d�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y��\f��f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s
h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q�q��qqg$�r)b;r�,�q��0hr�l��zwr�
{r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��e�s�d�s�g/t�4>�:8t�gn�bd9t]z[t� �mt!~t��td $�`�t�s��,!u�rdi�@gku�u0
g�u���uxcs>�uc;�rn13vxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�y�zy��t��`-y<myv��q�yv^mc���y<z�&xfk{z�kd
�zhp��[�enx�:[�=�^�`
[�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,��4`� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t
a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t�3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^����c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� *^ee����l\e�>e��eme�hgqwe�u
�t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f<z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkzl!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn��!�g)nfr>��^^nv��,mn�kj>�nh#�n�gv'po�
���"�o�"�o6gp�e�oh��.�o�r��v�omg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��; q�dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s
h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fm-dt�y�)1:to
�v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�c]x�enx[�x,mnf�x&xn
�x�0�<�=.y6�f�� oyrgopkxyx*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{
hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s�
u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\
~�=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x��m�j�������6[w�3`2 r� �p
j^�[
yn
�n�_ati�wb��.:rh j<sh�tyo>s�r#�l$�.%�}&�m'�k(�m(�)�g)�h,%j,�p.�7/�i/�2�z2'4t4.6�6r 7*8;i8cj8�9�i;5r;�e=k&>e!@jj@r7asvb�/c�ec�nd�ud�fvf0i4tjdjek�kul%man�%smkxgy�py�=zi\�]�]�^ro_`5a�7ahc�.d
2e�lf�qf�)gjmi�ckalthllmnnm}on[r�ps�at�tt0@uqui1vyw�vx�pyicy�x}�/�wt�mw��=��=�^5�(m��`�j�nj�py��9�l�.~�v�=h��j��~�f(�du�� �=i�fj�to�4��m��2�)w���lz�
���c�8�7�u<�[��t��r���k/�������cb��^�v��\�^"�a�vi�|w�r�����$?��n��
��!�s/����8�*�qq��-��_�$-��f�><���ph��r�;��c�7"����s�?5����"�ot�gl�bj���h��-���
��"�l%�w�p�2����)��y�����bo��e�`-�|�d\f\�@�c\c\c\c\(z[r\�@�b��@��unknown������������g��.�[x� �times new roman5��symbol3.��.�[x� �arial7.���[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�f�2��m�
�n/��
�n/�!-!),.:;?]}���� & 6"0000 00
00000��� ������=�@�\�]�^���([{� 0
000000��;�[����������5\5\ 2�q��hp��?�����������������������"�2!xx��`����userlib-x��
�����oh�� '��0t������� ��
(4<dl�usernormallib-x262microsoft office word@�j�2@�y��\�@ޮ�:h��
�n��
��՜.�� ,��0�
x`t|�������microsoft�/5\
!"#$%&'()* ,-./0123456789:;<=>?@abcde����ghijklm����opqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwx����z{|}~���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������root entry�������� �f�1�:h���data
������������f1table����n\uworddocument����2�summaryinformation(������������ydocumentsummaryinformation8���������compobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
���� �fmicrosoft word 97-2003 �ĵ�
msworddocword.document.8�9�q