-k8凯发棋牌

��ࡱ�>�� ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r���bjbj�n�n2���a��as^ �������""������������8�d]��nlyyyyy���?nanananananan$pp�sfen9������en��yy4�n������y�y?n��?n���y����p/b�������?� n�n0�n�lso:ls���0ls�wk���������enen�����n������������������������������������������������������������������������ls���������"q s: risk analysis volume 41, issue 9, september 2021 1. title: handling uncertainty in models of seismic and postseismic hazards: toward robust methods and resilient societies authors: brian h. macgillivray. abstract: earthquakes, tsunamis, and landslides take a devastating toll on human lives, critical infrastructure, and ecosystems. harnessing the predictive capacities of hazard models is key to transitioning from reactive approaches to disaster management toward building resilient societies, yet the knowledge that these models produce involves multiple uncertainties. the failure to properly account for these uncertainties has at times had important implications, from the flawed safety measures at the fukushima power plant, to the reliance on short-term earthquake prediction models (reportedly at the expense of mitigation efforts) in modern china. this article provides an overview of methods for handling uncertainty in probabilistic seismic hazard assessment, tsunami hazard analysis, and debris flow modeling, considering best practices and areas for improvement. it covers sensitivity analysis, structured approaches to expert elicitation, methods for characterizing structural uncertainty (e.g., ensembles and logic trees), and the value of formal decision-analytic frameworks even in situations of deep uncertainty. 2. title: use and misuse of mcda to support decision making informed by risk authors: jeffrey m. keisler, igor linkov. abstract: recent guidelines for risk-informed decision making (ridm) provide a gold-standard for how to incorporate probabilistic risk models in conjunction with other considerations in a decision process. nevertheless, risk quantification using probabilistic and statistical methods is difficult in situations where threat, vulnerability, and consequences are highly uncertain and risk quantification. in such situations a wider variety of methods could be employed, which we call decision making informed by risk (dmir) combining risk and decision analytics. risk informed decision making (ridm) can be considered as a special case of dmir. multi criteria decision analysis (mcda) often serves as a basis for dmir in order to flexibly accommodate different levels of analytical detail. dmir often involves artful use of proxy variables that correlate with, and are more measurable than, underlying factors of interest. this article introduces the notion of dmir and discusses the use of mcda in its application in the context of risk-based problems. mcda-based risk analyses identify metrics associated with threats of concern and system vulnerabilities, characterize the way in which alternative actions can affect these threats and vulnerabilities, and ultimately synthesize this information to compare, prioritize, or select alternative mitigation strategies. simple linear additive mcda models often integrate these inputs, but the same simplicity can limit such approaches and create pitfalls and more advanced models including multiplicative relationships can be warranted. this essay qualitatively explores the critical practitioner questions of how and when the use of linear multicriteria models creates significant problems, and how to avoid them. 3. title: quantitative risk assessment on the transport of dangerous goods vehicles through unidirectional road tunnels: an evaluation of the risk of transporting hydrogen authors: ciro caliendo, gianluca genovese. abstract: a quantitative risk analysis (qra) concerning dangerous goods vehicles (dgvs), including also vehicles for the transport of liquid hydrogen (lh2tvs), running through unidirectional motorway tunnels was performed. an event tree was built, and a wide parametric analysis based on different geometric and traffic characteristics of tunnels was carried out. the effects of the annual average daily traffic (aadt) per lane, the tunnel length (l), the percentage both of heavy goods vehicles (hgvs) and dgvs (for a given 7% of lh2tvs) were investigated. the results in terms of social risk, as expressed by f/n curves and the expected value (ev), show an increased risk level with the presence of the hydrogen transported, and with certain f/n curves that might also lie above the acceptability limit. this means that additional safety measures should be implemented in order to reduce the risk level or that, alternatively, appropriate strategies of traffic control systems should be taken. a statistical modeling for developing a predictive method of the ev is also performed. the outcomes show that the regression coefficients have the signs expected. in particular, the ev increases with the tunnel length (l), the aadt, and the percentage both of hgvs and dgvs. however, the magnitude of estimated coefficients indicates that the expected value ev increases more with the traffic (aadt per lane, hvgs, or dgvs) than the tunnel length. the application of the approximate method might help the tunnel management agencies (tmas) in making quick decisions, at a preliminary stage, about temporarily allowing, forbidding or limiting the circulation of dgvs and/or lh2tvs through tunnels; and subsequently investigating in greater depth the potential hazards due to the transport of hydrogen in the worst cases individualized. 4. title: risk factors for 100-year flood events in the mid-atlantic region of the united states authors: gina tonn, seth guikema. abstract: anecdotal information indicates that streams in the mid-atlantic region of the united states experience more extreme flood events than might be expected. this leads to the question of whether this is an unfounded perception or if these extreme events are actually occurring more than should be expected. if the latter is true, is this due solely to randomness, or alternately to characteristics that make certain watersheds more prone to repeated events that may be defined as 100-year or greater floods? these questions are investigated through analysis of flood events based on standard flood frequency analysis. 100-year streamflow rates for stream gages were estimated using bulletin 17b flood frequency analysis methods, and the probability of the annual peak flow record for each gage was calculated. these probabilities were compared to a set of synthetic probabilities to evaluate their distribution. this comparison indicates that for the mid-atlantic region as a whole, the bulletin 17b method does not systematically over or underestimate flood frequency. a random forest model of probability of actual flood record (pafr) versus watershed and stream gage characteristics was developed and used to understand if certain characteristics are associated with pafr. this analysis indicated that unexpected numbers of large flood events in a stream gage period of record can be attributed primarily to randomness, but there is some correlation with watershed and gage characteristics including weighted skew, drainage area, and mean annual peak discharge. the results indicate that watersheds with high values of these characteristics may warrant advanced flood frequency methods. 5. title: quantitative analysis on risk influencing factors in the jiangsu segment of the yangtze river authors: jinfen zhang, anxin he, cunlong fan, xinping yan, c. guedes soares. abstract: quantitative risk influencing factors (rifs) are proposed, using the conjugate bayesian update approach to analyze 945 collision accidents and incidents cases from the jiangsu segment of the yangtze river over five years from 2012 to 2016. the accident probability is compared under a pairwise comparison mode in order to reflect the relative risk between accidental situations. the bayesian update mode is constructed to quantitatively evaluate the relative importance of different rifs. the riskiest segment of jiangsu waterways as well the main causations of collisions are identified based on the distributions of collision risk in the six segments of the waterways. the results can support managers to develop the most effective policies to mitigate the collision risk. 6. title: an integrated risk and resilience assessment of sea ice disasters on port operation authors: xueqin liu, zhenhua chen. abstract: risk and resilience assessment of disasters plays a critical role in decision making for emergency response and postdisaster recovery. yet, there is still a lack of modeling framework that could capture the effectiveness of economic resilience under uncertain disaster conditions. the objective of this study is to develop a novel integrated framework that is able to help decisionmakers understand the effectiveness of resilience performance under various risk conditions. using hazard data of the bohai sea and throughput data of the port of yingkou (china) as an example, the copula-modeling method was adopted for the risk assessment of sea ice disasters on seaport operations. this study shows that the gumbel copula method, with consideration of ice thickness level and area of ice cover, provides the most robust risk assessment outcome. in addition, a grid chart system with an overlap of a joint return period and port throughput change provides a straightforward understanding of resilience performance under different risk levels. in particular, economic resilience tactics, such as production recapture and effective management, were confirmed to be effective resilience strategies, especially when a risk level is high, as port operational losses can be avoided up to 86.8%. overall, the study provides insights that could help stakeholders improve the effectiveness of disaster risk management through an improved understanding of the linkage between risk and resilience. 7. title: expressions of resilience: social media responses to a flooding event authors: ashley a. anderson. abstract: concerns over the resilience of individuals within communities impacted by extreme weather events have heightened in recent years due to the increasing frequency and intensity of these events. individuals� participation in communicative activities is an integral part of how they prepare for and respond to natural disasters. this study focuses on how individuals express resilience in social media posts from twitter before, during, and after a regional flooding event in colorado in 2013 (n = 210,303). findings show that both negative and positive emotional responses spike at the start of the event, with positive emotions remaining high in the weeks following the event. uses of language related to social connections, as well as references to home and work, increased during and after the event. tweets used pronouns focused on the self during the event but shifted to pronouns focused on the collective after the event. this study points the importance of language for understanding the lasting impact extreme weather events can have on individuals, as well as when and how to reach individuals with information about recovery. the increased focus on collective language after the event provides an opportunity for calls to action in collecting and distributing shared resources. 8. title: the role of fairness in early characterization of new technologies: effects on selective exposure and risk perception authors: hwanseok song, hang lu, katherine a. mccomas. abstract: previous research suggests that when individuals have limited knowledge to make sense of new or emerging technologies, they may rely more on available cues, such as the fairness of those managing the risks, when developing their attitudinal and behavioral responses to the technology. to examine this further, we designed an online experiment (n = 1,042) to test the effects of risk managers� nonoutcome fairness on individuals� selective exposure to additional information and perceived risk. as the study context, we used the development of enhanced geothermal systems (egs), which uses drilling to tap deep underground sources of heat for district heating and electricity and remains low in familiarity among the u.s. public. the results suggest that participants who read about the fair risk manager were subsequently more likely to have positive attitudes toward egs development. in turn, those with more positive attitudes were more likely to select and read positively valenced articles about egs, resulting in an indirect effect of the fairness condition. although this study also explored whether uncertainty moderated this fairness effect on information seeking, it found no evidence. additionally, when participants were exposed to information featuring fair risk managers, perceived risk decreased, an effect that was mediated by beliefs that egs was controllable and not dreadful. these results underscore the importance of using practices that will increase nonoutcome fairness in the introduction of new technologies. 9. title: storms, fires, and bombs: analyzing the impact of warning message and receiver characteristics on risk perception in different hazards authors: maxi rahn, samuel tomczyk, silke schmidt. abstract: in crisis communication, warning messages are key to prevent or mitigate damage by informing the public about impending risks and hazards. the present study explored the influence of hazard type, trait anxiety, and warning message on different components of risk perception. a survey examined 614 german participants (18�96 years, m = 31.64, 63.0% female) using a pre�post comparison. participants were randomly allocated to one of five hazards (severe weather, act of violence, breakdown of emergency number, discovery of a world war ii bomb, or major fire) for which they received a warning message. four components of risk perception (perceived severity, anticipatory worry, anticipated emotions, and perceived likelihood) were measured before and after the receipt. also, trait anxiety was assessed. analyses of covariance of risk perception were calculated, examining the effect of warning message, trait anxiety, and hazard type while controlling for age, gender, and previous hazard experience. results showed main effects of hazard type and trait anxiety on every component of risk perception, except for perceived likelihood. the receipt of a warning message led to a significant decrease in anticipated negative emotions. however, changes across components of risk perception, as well as hazards, were inconsistent, as perceived severity decreased while perceived likelihood and anticipatory worry increased. in addition, three interactional effects were found (perceived severity � hazard type, perceived severity � trait anxiety, and anticipated emotions � hazard type). the findings point toward differences in the processing of warning messages yet underline the importance of hazard type, as well as characteristics of the recipient. 10. title: snapshot models of undocumented immigration authors: scott rodilitz, edward h. kaplan. abstract: accurately estimating the size of the undocumented immigrant population is a critical component of assessing the health and security risks of undocumented immigration to the united states. to provide one such estimate, we use data from the mexican migration project (mmp), a study that includes samples of undocumented mexican immigrants to the united states after their return to mexico. of particular interest are the departure and return dates of a sampled migrant's most recent sojourn in the united states, and the total number of such journeys undertaken by that migrant household, for these data enable the construction of data-driven undocumented immigration models. however, such data are subject to an extreme physical bias, for to be included in such a sample, a migrant must have returned to mexico by the time of the survey, excluding those undocumented immigrants still in the united states. in our analysis, we account for this bias by jointly modeling trip timing and duration to produce the likelihood of observing the data in such a �snapshot� sample. our analysis characterizes undocumented migration flows including single-visit migrants, repeat visitors, and �retirement� from circular migration. starting with 1987, we apply our models to 30 annual random snapshot surveys of returned undocumented mexican migrants accounting for undocumented mexican migration from 1980 to 2016. scaling to population quantities and supplementing our analysis of southern border crossings with estimates of visa overstays, we produce lower bounds on the total number of undocumented immigrants that are much larger than conventional estimates based on u.s.-based census-linked surveys, and broadly consistent with the more recent estimates reported by fazel-zarandi, feinstein, and kaplan. 11. title: evaluating an intervention to reduce risky driving behaviors: taking the fear out of virtual reality authors: clara alida cutello, michaela gummerum, yaniv hanoch, elizabeth hellier. abstract: educational programs are the most common type of intervention to reduce risky driving behavior. their success, however, depends on the content of the material used and the mode of delivery. in the present study, we examined the impact of fear versus positively framed road safety films and traditional technologies (2d) versus emerging technologies (vr) on young drivers� self-reported risky driving behaviors. one hundred and forty-six university students completed a similar set of questionnaires pre-intervention and post-intervention, two weeks later. in addition, they were randomly assigned to one of the four experimental conditions (vr vs. 2d; positive vs. negative). in the vr conditions, the film was presented using an htc vive virtual reality headset. in the 2d conditions, the film was presented on a computer screen. measures evaluating attitudes toward risky driving behavior were completed at both time frames, questions regarding the participants' emotional arousal were asked at pre-intervention as a manipulation check, and questions regarding willingness to take risks in potentially dangerous driving situations were asked at follow-up. the findings indicate that the positively framed films significantly decreased self-reported risky driving behaviors in both modalities, but especially when viewed in vr format. in contrast, the fear appeal film, when shown in vr, failed to reduce risky driving behaviors, and in fact, increased young drivers� self-reported risky driving behaviors. theoretical frameworks regarding the strengths and weaknesses of fear appeals and positively framed appeals are discussed to aid future research to reduce risky driving. practical implications on the future usage of vr are also considered. 12. title: integration of evidence on community cancer risks from elongate mineral particles in silver bay, minnesota authors: linda d. dell, alexa e. gallagher, lisa j. yost, kenneth a. mundt. abstract: the potential for cancer-related risks to community members from ambient exposure to elongate mineral particles (emps) in taconite processing has not been formally evaluated. we evaluated 926 ambient air samples including 12,928 emps (particle structures with length-to-width ratio e"3:1) collected over 26 years near a taconite processing facility in silver bay, minnesota. eighty-two percent of emps were d"3 �m in length and 97% of emps had an average aspect ratio <20:1. a total of 935 (7.3%) emps had length >5 �m and ar e"3:1. average ambient concentration of niosh countable amphibole emps over all years was 0.000387 emps per cubic centimeter (emp/cm3). of 12,765 nonchrysotile emps, the number of amphiboles with length and width dimensions that correlate best with asbestos-related carcinogenicity ranged from four (0.03%) to 13 (0.1%) and the associated ambient amphibole air concentrations ranged from 0.000003 to 0.000007 emp/cm3. after 65 years of taconite processing in silver bay, evidence of an increased risk of mesothelioma and lung cancer in community members who did not work in the taconite industry is lacking. the absence of an increased risk of asbestos-related cancer in the silver bay community is coherent with supporting evidence from epidemiological and toxicological studies, as well as ambient exposure data and lake sediment data collected in minnesota iron range communities. collectively, the data provide consistent evidence that nonasbestiform amphibole minerals lack the carcinogenic potential exhibited by amphibole asbestos. 13. title: risk assessment of glyphosate exposures from pilot study with simulated heavy residential consumer application of roundup� using a margin of safety (mos) approach authors: daniel g. kougias, eric miller, abigail mcewen, heidi reamer, michael kovochich, jennifer pierce. abstract: due to the widespread application of glyphosate, a nonselective herbicide, to a variety of resistant food crops, the general population is exposed to glyphosate through dietary intake. despite this, dietary exposures to glyphosate are considered low in comparison to application-related exposures. although previous studies have evaluated exposure to horticultural and agricultural workers, to date only one study, which we recently conducted, has characterized exposure to glyphosate in consumers following heavy residential application of a glyphosate-containing herbicide in a residential yard and garden setting. in this previous study, we demonstrated that urinary glyphosate concentrations in these applicators were similar to or in some circumstances greater than those in occupational applicators, likely due to the nature of the simulation study, which ensured a heavy application protocol. however, it is unknown whether these urinary glyphosate concentrations in consumer applicators correspond to internal doses that may be of concern. therefore, the purpose of this study is to provide a comprehensive risk assessment of glyphosate exposure in consumer applicators using a margin of safety approach. here, we incorporated data collected from multiple spot urine samples across time from our previous study that assessed consumer exposure to glyphosate from roundup� application. estimated internal doses, even with the use of conservative assumptions across unique approaches, were below internal doses estimated from established health-based guidance values. overall, this study demonstrates that glyphosate exposure from even heavy consumer application of a commercially available glyphosate-containing herbicide does not appear to be a health concern. 14. title: data mining approaches for assessing chemical coexposures using consumer product purchase data authors: rogelio tornero-velez, kristin isaacs, kathie dionisio, steven prince, hanna laws, michael nye, paul s. price, timothy j. buckley. abstract: the use of consumer products presents a potential for chemical exposures to humans. toxicity testing and exposure models are routinely employed to estimate risks from their use; however, a key challenge is the sparseness of information concerning who uses products and which products are used contemporaneously. our goal was to demonstrate a method to infer use patterns by way of purchase data. we examined purchase patterns for three types of personal care products (cosmetics, hair care, and skin care) and two household care products (household cleaners and laundry supplies) using data from 60,000 households collected over a one-year period in 2012. the market basket analysis methodology frequent itemset mining (fim) was used to identify co-occurring sets of product purchases for all households and demographic groups based on income, education, race/ethnicity, and family composition. our methodology captured robust co-occurrence patterns for personal and household products, globally and for different demographic groups. fim identified cosmetic co-occurrence patterns captured in prior surveys of cosmetic use, as well as a trend of increased diversity of cosmetic purchases as children mature to teenage years. we propose that consumer product purchase  " .0124=�����ʻʻʩ��wobtf9thj�5�ojqj^jo(h�}�h�}�5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(hm8x5�cjojqj^jajh 2e5�cjojqj^jaj#h��h��5�cjojqj^jajh��5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h��h��5�cjojqj^jaj123��6 7 � � ��;f����#�#$h$y'z'������������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4�������5 6 7 8 : @ a � � � � � � � � � ������������q�aq��aqs�ehihu<�ojqj^jo(hih�l$ojqj^jo(hvi�h�l$5�ojqj^jo(h�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h�}�h�}�ojqj^jhihj�ojqj^jo(h�"�hu<�5�ojqj^jht45�ojqj^jo(h�}�5�ojqj^jh�}�h�}�5�ojqj^jhicy5�ojqj^j�������:;cddefop�������������跧�跜�ŏ�t�gyk>�h$?�5�ojqj^jo(h$?�h$?�5�ojqj^jh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(hihanojqj^jh�}�h�}�ojqj^jh� )hto�ojqj^jo(h�}�5�ojqj^jhvi�hto�5�ojqj^jo(h�}�h�}�5�ojqj^jhto�hto�5�ojqj^j hto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(h%j,5�ojqjo(�����#�#�#�#�#�#�#$$$#$$$f$g$���ǽ�⮡��{m_x�{j_{ǽhvi�h�ps5�ojqj^j h�}�h�}�h�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h�}�h�}�ojqj^jh� )h$?�ojqj^jo(h�}�5�ojqj^jh�}�h�}�5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^jhvi�h$?�5�ojqj^jo(g$h$q$r$x'y'z'{'}'�'�'�'�'�'�'�'�'�'((�-�-�-�-�-���ǹ�����wi�[wp���ǹ�c�h|�5�ojqj^jo(h�}�5�ojqj^jhvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jh�}�h�}�5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�}�h�}�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(z'�'�'�-�-$.a.r3s3�3 4::�:�:�a�a�ab&i'i�i�i�p�p>q�������������������������gd�s�gd�_gdlz�gd�)ggd|�gd)w�gdr7a�-�-�-#.$.-.?.@.a.j.k.q3r3s3t3v3\3]3�3�3�3�����ֽ����vk^pb^�4bhvi�h�)g5�ojqj^jh�)gh�)g5�ojqj^jh�"�h)w�5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�}�h�}�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�}�5�ojqj^jhvi�h|�5�ojqj^jh�}�h�}�5�ojqj^jh|�5�ojqj^jo(h|�h|�5�ojqj^j�3�34 4 444:::::::�:�:�:�:�:�:�:�:�a�a�a�a�a���ʼ����{m_r�d_��ʼ����{mhvi�hlz�5�ojqj^jhlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�}�h�}�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�}�5�ojqj^jh�}�h�}�5�ojqj^jh�)g5�ojqj^jo(�a�a�a�a�a�abbb!b"b%i&i'i)i i1i2i�i�i�i�����ֽ����vk^pb^�4bh[h�s�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h}onh)w�ojqj^jo(h�}�h�}�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�}�5�ojqj^jhvi�h�_5�ojqj^jh�}�h�}�5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^j�i�i�i�i�i�i�i�p�p�p�p�p�p�p=q>qfqgq�q�q�q�q���ⱥ����yk]y�o]a��ⱥh�9�h[5�ojqj^jh[h�s�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h[h)w�ojqj^jo(h�}�h�}�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h�}�5�ojqj^jh�}�h�}�5�ojqj^jh[h[5�ojqj^j>q�q�y�y]z�z�a�a%b�b���������������������������������������������gd�gdmw�gd)w�gd�s��q�q(s�v�y�y�y�y�y�y�y\z]zfz�z�z�z�z�z�a�a�a�a����ƚ�����x��m]o���d�h)w�5�ojqjo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h�}�5�ojqj^jh[h�s�5�ojqj^jh�}�h�}�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h�~�5�ojqjo(h[h)w�ojqj^jo(h�}�h�}�ojqj^jo(h�}�h�}�ojqj^jhih)w�ojqj^jo(�a�a�a�a�a$b%b.b�b�b�b�b�b�g������������������������ʼ�׼���wjhjzld@d@d@dh�^�jh�^�uhj<hj<5�ojqjo(h[h)w�ojqj^jo(uh�}�h�}�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h�}�5�ojqj^jh[hmw�5�ojqj^jh�}�h�}�5�ojqj^jhmw�5�ojqj^jo(hmw�hmw�5�ojqj^jh�"�h)w�5�ojqj^jh)w�5�ojqj^jo( data can be mined to inform person-oriented use patterns for high-throughput chemical screening applications, for aggregate and combined chemical risk evaluations.     ��������hj<hj<5�ojqjo(h�^�01�82p��. ��a!�"�#��$��%��s�� ��s2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��j ck�e $1$a$ cjkh_hajmh nhsh th$a ���$ ؞���k=�w[sobi���b nf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h [�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=x e��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk! ѐ��'theme/theme/_rels/thememanager.xml.rels��m �0���wooӻ�&݈э���5 6?$q�� �,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��6 0_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-! ѐ��'� theme/theme/_rels/thememanager.xml.relspk]� a^����� ���g$�-�3�a�i�q�a����46789;<=>@acz'>q��5:?�@� @���������h ��0�( � ����0�( � ��b �s ���� ?�kv������d q d h s [ �$*27<cipy_`f����u � z!�!�!�!%","� � ,,�-�-�/�/�1�1�2�2�2�2�2�2�9:a a�a�a�a�a�a�a�a�a�a�a�a�a�i�i�j�j*k k-k.k�k�k�k�kkoyoppwp�p�p�w�w6x=x\xdx{[�[s^u^v^x^y^[^\^^^b^s^b^s^u^v^x^y^[^\^^^b^�xq^r^b^��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�= {u�,� uz*�m� �r=��-9h�s��eme�.~�� {r�v �4�1l2q �"�i aha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*� 7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�` rv:g&>!��}n!�l����2�"�0r��\�|�md-%;�blrbr]�a 6ji� ��vj�`�[jo 5j90�ry �:[� k 3q-r�jx 8i� tp� k�|�2~� ��y��k� ?i��� * �? = ��#? ?*� @�4le� dw" �� �z�g�kd �2�^e �-h�x �w��t� bs &�x� -z�y� �w� i�>�:-� �u kkkkdw" q�x�-h� k^r� �^�vxb� �=#�/y�pur ���� ��'ff�x-z�d�y�(��)fk{z��fv��-�p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����` [� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8� �7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d� )r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7�� �e �o[kh,~�hmpm~� mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t an�gap�y8��x� ��s��d���z��j�vzq��t\ ~��av'po�_m4�i�w��tkpb�` rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l� �!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#� � �i3#�#? �=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w (r�@�~d:(� _(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e ��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f� � {p���c,@�i��#,�dq[mk, @p�qb,�d&d� �,�>m��x�,� {u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��efw2 �z��>2"o�m�29!"e�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^� -a5&tl5�pv5�d5tw�'��5��5md-�b�5i�d��v�5 -a5�a 6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\�~74\�7bd9t=r�7��gr f8c�]��jo8�~�8�� �8��b�n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjj o;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq�m�?!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?��?�s�? u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y� ��f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoxn0�naq�!~q��y#%�q@gku�nr�q �q� �qqg$�r)b;r�,�q��0hr�l��zwr� {r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0 g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t�� y�`-y<myv ��q�yv^mc���y< z�&xfk{z�kd  �zhp�� [�enx�:[�=�^�` [�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t� 3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^����c(�a�u�c�0hr� �c�#�c�j$wvd0q|�`d�d&d�@�m)gdd�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� * ^ee����l\e�>e��eme�hgqwe�u �t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f< z�bl#g�^blkqg�j9r�.`rg�g8|k=_�g�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkz l!{�?�klv:g��fl�3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn� �!�g)nfr>��^^nv��, mn�kj>�nh#�n�gv'po� ���"�o�"�o6gp�e �oh��.�o�r��v�o mg���o]z[thptf�?(ap(s� @p�[? bep=r�7�y�p�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fm-dt�y�)1:to �v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x, mnf�x&xn �x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?� p{mq{ hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s� u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\ ~ �=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x ��m�j�����[w�3`2 r� �p j^ �n�_ati�wb��.h j<sh�to>s�r#�l$�}&�m'�m(� )%j,�p.�i/�2�z2'4t4.6�6*8;i8cj8�9�e=k&>e!@jj@r7a�ec�nd�udvf0 i4tj�kul%man�%smkxgy�py�^ro_5a�7ahc 2ejve�lf�qf�)gjmi�ckalthllmnnm}on[r�ps0@ui1vywm8xicy�x}�/�wt�mw��=��=��`�j�nj��9�l�.~��}�v�=h��j��~�du�� �=i�fj�to�4��m��2�)w���lz� ��c�7�u<�[��t��r��������^�v��^��\�a�vi�|w�r���}���$?�� ��!�s/�� ��8�*��-��_�$-��f�><����r��c�7"����s�?5��� ��"�gl�bj�h��-����� ��"�w� p�2����y�� ��e�`-�|�s^u^�@�r^r^r^r^4jl�]a^�@�r��@�@��unknown������������g��.�[x� �times new roman5��symbol3.� �.�[x� �arial7.� ��[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�f���g�a?p0�?p0��-!),.:;?]}����    & 6"0000 0 0 00000��� � �����=�@�\�]�^���([{�  0 0 00000��;�[����������#^#^ 2�q��hp��?�����������������������"�2!xx� ���user windows (u7b�� �����oh�� '��0`������� ��  ( 4@hpx�user normal.dotmwindows �û�135microsoft office word@�cp1@�y��\�@4�܍��?p�� ��՜.�� ,��0� x`t|�� ����� microsoft�0#^   !"#$%&'()* ,-./0123456789:;<=>?@abcd����fghijkl����nopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuv����xyz{|}~����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������root entry�������� �f�ym�����data ������������e1table����mlsworddocument����2�summaryinformation(������������wdocumentsummaryinformation8��������compobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �fmicrosoft word 97-2003 �ĵ� msworddocword.document.8�9�q
网站地图