-尊龙游戏旗舰厅官网

��ࡱ�>�� ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r��]bjbj�n�n2~��a��a�u �������""������������8�le�.ql���������p�p�p�p�p�p�p$�r�pu<�p�������p����4�p{{{�������p{��p{{{����� e |�����o{�p�p0.q{�u_:�u{{�0�u�qmh��{������p�p�����.q�������������������������������������������������������������������������u���������"q s: risk analysis volume 43, issue 10, october 2023 1. title: assessing potential hybridization between a hypothetical gene drive-modified drosophila suzukii and nontarget drosophila species authors: sarah wolf, jana collatz, j�rg enkerli, franco widmer, j�rg romeis abstract: genetically engineered gene drives (gegd) are potentially powerful tools for suppressing or even eradicating populations of pest insects. before living gegd insects can be released into the environment, they must pass an environmental risk assessment to ensure that their release will not cause unacceptable harm to non-targeted entities of the environment. a key research question concerns the likelihood that nontarget species will acquire the functional gd elements; such acquisition could lead to reduced abundance or loss of those species and to a disruption of the ecosystem services they provide. the main route for gene flow is through hybridization between the gegd insect strain and closely related species that co-occur in the area of release and its expected dispersal. using the invasive spotted-wing drosophila, drosophila suzukii, as a case study, we provide a generally applicable strategy on how a combination of interspecific hybridization experiments, behavioral observations, and molecular genetic analyses can be used to assess the potential for hybridization. 2. title: modeling of interventions for reducing external enterobacteriaceae contamination of broiler carcasses during processing authors: guido correia carreira, michaela projahn, nina langkabel, evelyne becker, annemarie k�sbohrer abstract: this article presents a mathematical model for the enterobacteriaceae count on the surface of broiler chicken during slaughter and how it may be affected by different processing technologies. the model is based on a model originally developed for campylobacter and has been adapted for enterobacteriaceae using a bayesian updating approach and hitherto unpublished data gathered from german abattoirs. the slaughter process in the model consists of five stages: input, scalding, defeathering, evisceration, washing, and chilling. the impact of various processing technologies along the broiler processing line on the enterobacteriaceae count on the carcasses� surface has been determined from literature data. the model is implemented in the software r and equipped with a graphical user interface which allows interactively to choose among different processing technologies for each stage along the processing line. based on the choice of processing technologies the model estimates the enterobacteriaceae count on the surface of each broiler chicken at each stage of processing. this result is then compared to a so-called baseline model which simulates a processing line with a fixed set of processing technologies. the model calculations showed how even very effective removal of bacteria on the exterior of the carcass in a previous step will be undone by the cross-contamination with leaked feces, if feces contain high concentrations of bacteria. 3. title: a national risk analysis model (nram) for the assessment of covid-19 epidemic authors: qing deng, xingyu xiao, lin zhu, xue cao, kai liu, hui zhang, lida huang, feng yu, huiling jiang, yi liu abstract: covid-19 has caused a critical health concern and severe economic crisis worldwide. with multiple variants, the epidemic has triggered waves of mass transmission for nearly 3 years. in order to coordinate epidemic control and economic development, it is important to support decision-making on precautions or prevention measures based on the risk analysis for different countries. this study proposes a national risk analysis model (nram) combining bayesian network (bn) with other methods. the model is built and applied through three steps. (1) the key factors affecting the epidemic spreading are identified to form the nodes of bn. then, each node can be assigned state values after data collection and analysis. (2) the model (nram) will be built through the determination of the structure and parameters of the network based on some integrated methods. (3) the model will be applied to scenario deduction and sensitivity analysis to support decision-making in the context of covid-19. through the comparison with other models, nram shows better performance in the assessment of spreading risk at different countries. moreover, the model reveals that the higher education level and stricter government measures can achieve better epidemic prevention and control effects. this study provides a new insight into the prevention and control of covid-19 at the national level. 4. title: impact of extreme temperatures on the performance evaluation of china's work-related injury insurance system authors: lina zhang, zihao jia, yung-ho chiu, qinghua pang, xia xu abstract: with the influence of climate change resulting in more extreme days, a rise in the number of work-related injuries could be expected. the literature has addressed the performance evaluation of a work-related injury insurance (wii) system via a two-stage structure with input/output correlation as well as the impact of extreme temperatures under different scenarios. this article thus evaluates the performance of a system comprised of operational and service sub-systems under three scenarios of extreme temperatures and proposes a hybrid two-stage dynamic data envelopment analysis (dea) model with nondiscretionary variables for measuring integrated wii efficiency under the three scenarios. the results are as follows: (1) the poor performance of the operational and service sub-systems leads to the integrated wii system's low efficiency for 30 provinces in china during 2010�2019, except for zhejiang, hainan, and qinghai. (2) extreme temperatures must be considered when measuring wii efficiency and its stage efficiencies, or otherwise wii efficiency and operational efficiency will be underestimated in 19 provinces. (3) the negative impacts of extreme temperatures on the efficiency of the integrated wii system should be taken notice of, especially for sichuan. 5. title: governmental anti-pandemic policies, vaccination, population mobility, twitter narratives, and the spread of covid-19: evidence from the european union countries authors: elena fedorova, svetlana ledyaeva, oksana kulikova, alexandr nevredinov abstract: we provide large-scale empirical evidence on the effects of multiple governmental regulatory and health policies, vaccination, population mobility, and covid-19-related twitter narratives on the spread of a new coronavirus infection. using multiple-level fixed effects panel data model with weekly data for 27 european union countries in the period of march 2020�june 2021, we show that governmental response policies were effective both in reducing the number of covid-19 infection cases and deaths from it, particularly, in the countries with higher level of rule of law. vaccination expectedly helped to decrease the number of virus cases. reductions in population mobility in public places and workplaces were also powerful in fighting the pandemic. next, we identify four core pandemic-related twitter narratives: governmental response policies, people's sad feelings during the pandemic, vaccination, and pandemic-related international politics. we find that sad feelings� narrative helped to combat the virus spread in eu countries. our findings also reveal that while in countries with high rule of law international politics� narrative helped to reduce the virus spread, in countries with low rule of law the effect was strictly the opposite. the latter finding suggests that trust in politicians played an important role in confronting the pandemic. 6. title: confidence deficits and reducibility: toward a coherent conceptualization of uncertainty level authors: scott janzwood abstract: outside of the field of risk analysis, an important theoretical conversation on the slippery concept of uncertainty has unfolded over the last 40 years within the adjacent field of environmental risk. this literature has become increasingly standardized behind the tripartite distinction between uncertainty location, the nature of uncertainty, and uncertainty level, popularized by the �w&h framework.� this article introduces risk theorists and practitioners to the conceptual literature on uncertainty with the goal of catalyzing further development and clarification of the uncertainty concept within the field of risk analysis. it presents two critiques of the w&h framework's dimension of uncertainty level�the dimension that attempts to define the characteristics separating greater uncertainties from lesser uncertainties. first, i argue the framework's conceptualization of uncertainty level lacks a clear and consistent epistemological position and fails to acknowledge or reconcile the tensions between bayesian and frequentist perspectives present within the framework. this article reinterprets the dimension of uncertainty level from a bayesian perspective, which understands uncertainty as a mental phenomenon arising from �confidence deficits� as opposed to the ill-defined notion of �knowledge deficits� present in the framework. and second, i elaborate the undertheorized concept of uncertainty �reducibility.� these critiques inform a clarified conceptualization of uncertainty level that can be integrated with risk analysis concepts and usefully applied by modelers and decisionmakers engaged in model-based decision support. 7. title: urban risks due to climate change in the andean municipality of pasto, colombia: a bayesian network approach authors: luis carlos ortega chamorro phd, julio eduardo ca��n barriga phd abstract: the current trends of climate change will increase people's exposure to urban risks related to events such as landslides, floods, forest fires, food production, health, and water availability, which are stochastic and very localized in nature. this research uses a bayesian network (bn) approach to analyze the intensity of such urban risks for the andean municipality of pasto, colombia, under climate change scenarios. the stochastic bn model is linked to correlational models and local scenarios of representative concentration trajectories (rcp) to project the possible risks to which the municipality of pasto will be exposed in the future. the results show significant risks in crop yields, food security, water availability and disaster risks, but no significant risks on the incidence of acute diarrheal diseases (add) and acute respiratory infections (ari), whereas positive outcomes are likely to occur in livestock production, influenced by population growth. the advantage of the bn approach is the possibility of updating beliefs in the probabilities of occurrence of events, especially in developing, intermediate cities with information-limited contexts. 8. title: textual data transformations using natural language processing for risk assessment authors: mohammad zaid kamil, mohammed taleb-berrouane, faisal khan, paul amyotte, salim ahmed abstract: underlying information about failure, including observations made in free text, can be a good source for understanding, analyzing, and extracting meaningful information for determining causation. the unstructured nature of natural language expression demands advanced methodology to identify its underlying features. there is no available solution to utilize unstructured data for risk assessment purposes. due to the scarcity of relevant data, textual data can be a vital learning source for developing a risk assessment methodology. this work addresses the knowledge gap in extracting relevant features from textual data to develop cause�effect scenarios with minimal manual interpretation. this study applies natural language processing and text-mining techniques to extract features from past accident reports. the extracted features are transformed into parametric form with the help of fuzzy set theory and utilized in bayesian networks as prior probabilities for risk assessment. an application of the proposed methodology is shown in microbiologically influenced corrosion-related incident reports available from the pipeline and hazardous material safety administration database. in addition, the trained named entity recognition (ner) model is verified on eight incidents, showing a promising preliminary result for identifying all relevant features from textual data and demonstrating the robustness and applicability of the ner method. the proposed methodology can be used in domain-specific risk assessment to analyze, predict, and prevent future mishaps, ameliorating overall process safety. 9. title: the benefits and costs of u.s. employer covid-19 vaccine mandates authors: maddalena ferranna, lisa a. robinson, daniel cadarette, michael r. eber, david e. bloom abstract: in 2021, the biden administration issued mandates requiring covid-19 vaccinations for u.s. federal employees and contractors and for some healthcare and private sector workers. these mandates have been challenged in court; some have been halted or delayed. however, their costs and benefits have not been rigorously appraised. this study helps fill that gap. we estimate the direct costs and health-related benefits that would have accrued if these vaccination requirements had been implemented as intended. compared with the january 2022 vaccination rates, we find that the mandates could have led to 15 million additional vaccinated individuals, increasing the overall proportion of the fully vaccinated u.s. population from 64% to 68%. the associated net benefits depend on the subsequent evolution of the pandemic�information unavailable ex ante to analysts or policymakers. in scenarios involving the emergence of a novel, more transmissible variant, against which vaccination and previous infection offer moderate protection, the estimated net benefits are potentially large. they reach almost $20,000 per additional vaccinated individual, with more than 20,000 total deaths averted over the 6-month period assessed. in scenarios involving a fading pandemic, existing vaccination-acquired or infection-acquired immunity provides sufficient protection, and the mandates� benefits are unlikely to exceed their costs. thus, mandates may be most useful when the consequences of inaction are catastrophic. however, we do not compare the effects of mandates with alternative policies for increasing vaccination rates or for promoting other protective measures, which may receive stronger public support and be less likely to be overturned by litigation. 10. title: real-time threat assessment based on hidden markov models authors: ourania theodosiadou, despoina chatzakou, theodora tsikrika, stefanos vrochidis, ioannis kompatsiaris abstract: an essential factor toward ensuring the security of individuals and critical infrastructures is the timely detection of potentially threatening situations. to this end, especially in the law enforcement context, the availability of effective and efficient threat assessment mechanisms for identifying and eventually preventing crime- and terrorism-related threatening situations is of utmost importance. toward this direction, this work proposes a hidden markov model-based threat assessment framework for effectively and efficiently assessing threats in specific situations, such as public events. specifically, a probabilistic approach is adopted to estimate the threat level of a situation at each point in time. the proposed approach also permits the reflection of the dynamic evolution of a threat over time by considering that the estimation of the threat level at a given time is affected by past observations. this estimation of the dynamic evolution of the threat is very useful, since it can support the decisions by security personnel regarding the taking of precautionary measures in case the threat level seems to adopt an upward trajectory, even before it reaches the highest level. in addition, its probabilistic basis allows for taking into account noisy data. the applicability of the proposed framework is showcased in a use case that focuses on the identification of potential threats in public events on the basis of evidence obtained from the automatic visual analysis of the footage of surveillance cameras. 11. title: cyber risk assessment in small and medium-sized enterprises: a multilevel decision-making approach for small e-tailors authors: arun sukumar, hannan amoozad mahdiraji, vahid jafari-sadeghi abstract: the role played by information and communication technologies in today's businesses cannot be underestimated. while such technological advancements provide numerous advantages and opportunities, they are known to thread organizations with new challenges such as cyberattacks. this is particularly important for small and medium-sized enterprises (smes) that are deemed to be the least mature and highly vulnerable to cybersecurity risks. thus, this research is set to assess the cyber risks in online retailing smes (e-tailing smes). therefore, this article employs a sample of 124 small e-tailers in the united kingdom and takes advantage of a multi-criteria decision analysis (mcda) method. indeed, we identified a total number of 28 identified cyber-oriented risks in five exhaustive themes of �security,� �dependency,� �employee,� �strategic,� and �legal� risks. subsequently, an integrated approach using step-wise weight assessment ratio analysis (swara) and best�worst method (bwm) has been employed to develop a pathway of risk assessment. as such, the current study outlines a novel approach toward cybersecurity risk management for e-tailing smes and discusses its effectiveness and contributions to the cyber risk management literature. 12. title: narrative persuasion and psychological distance: analyzing the effectiveness of distance-framed narratives in communicating ocean plastic pollution authors: sixiao liu, janet z. yang abstract: narratives have been identified as an effective tool to communicate seemingly abstract and uncertain risks. this study integrates the construal level theory of psychological distance and narrative persuasion to examine how distance-framed narratives influence young adults� attitude, behavioral intention, and policy support related to ocean plastic pollution. results from an experimental survey (n = 889) indicate that the narrative featuring socially close characters and spatially close location is least effective in producing persuasive effects. instead, the narrative depicting socially close characters� encounters at a spatially distant location is more persuasive. within narrative conditions, the findings support the mediating role of identification and transportation in facilitating narrative effects. serial mediation of identification/transportation and psychological distance perception was also observed. findings from this study offer meaningful theoretical and practical implications for strategic communication on ocean plastic pollution. 13. title: do colored cells in risk matrices affect decision-making and risk perception? insights from randomized controlled studies authors: ruri proto, gabriel recchia, sarah dryhurst, alexandra l. j. freeman abstract: risk matrices communicate the likelihood and potential impact of risks and are often used to inform decision-making around risk mitigations. the merits and demerits of risk matrices in general have been discussed extensively, yet little attention has been paid to the potential influence of color in risk matrices on their users. we draw from fuzzy-trace theory and hypothesize that when color is present, individuals are likely to place greater value on reducing risks that cross color boundaries (i.e., the boundary-crossing effect), leading to sub-optimal decision making. in two randomized controlled studies, employing forced-choice and willingness-to-pay measures to investigate the boundary-crossing effect in two different color formats for risk matrices, we find preliminary evidence to support our hypotheses that color can influence decision making. the evidence also suggests that the boundary-crossing effect is only present in, or is stronger for, higher numeracy individuals. we therefore recommend that designers should consider avoiding color in risk matrices, particularly in situations where these are likely to be used by highly numerate individuals, if the communication goal is to inform in an unbiased way. 14. title: evaluation of hazard brochures using topic viewing durations: application to tsunami evacuation brochures authors: michael k. lindell, meen chel jung, carla s. prater, donald h. house abstract: this study describes a novel method of assessing risk communication effectiveness by reporting an evaluation of a tsunami information brochure by 90 residents of three pacific coast communities that are vulnerable to a cascadia subduction zone earthquake and tsunami�commencement bay, washington; lincoln city, oregon; and eureka, california. study participants viewed information that was presented in dynasearch, an internet-based computer system that allowed them to view text boxes and tsunami inundation zone maps. dynasearch recorded the number of times each text box or map was clicked and the length of time that it was viewed. this information viewing phase was followed by questionnaire pages assessing important aspects of tsunami hazard and sources of tsunami warnings. participants gave the longest click durations to what to do in the emergency period during earthquake shaking and in its immediate aftermath before a tsunami arrives�topics that should be displayed prominently in tsunami brochures and emphasized in talks to community groups. the smallest adjusted click durations were associated with advance preparations for a tsunami�topics that can be posted on websites whose urls are printed in the brochures.       !# -/013<���ʸʧ�ʸ�zf^qc5h0)�h0)�5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h�]5�cjojqj^jajh 2e5�cjojqj^jajh0)�5�cjojqj^jaj h��5�cjojqj^jajo(#h0)�h0)�5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h0)�h0)�5�cjojqj^jaj012� m n � 7s��h�%&����� �����������������������gd�psgd)w�gd$?�gdto�gdrx�gd�l$gd%j,gdu<�gd�"�$a$gdt4�����   l m n o q w x � � � � #67@������妙��s�eswges�wgehvi�h�l$5�ojqj^jo(hrx�hrx�5�ojqj^jh�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h0)�h0)�ojqj^jhihj�ojqj^jo(ht45�ojqj^jo(h0)�h0)�5�ojqj^jh��5�ojqj^jhicy5�ojqj^jh�"�hu<�5�ojqj^jhj�5�ojqj^jo(@a3rs���������ghpq��������������侳�����ue��zuzue�lh� )hto�ojqj^jo(h��5�ojqj^jhvi�hto�5�ojqj^jo(h|cnh|cn5�ojqj^jhto�hto�5�ojqj^j hto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(h%j,5�ojqjo(hihu<�ojqj^jo(hrx�hrx�ojqj^jo(h��ojqj^jhrx�hrx�ojqj^jhih�l$ojqj^jo(�$%&')/0������������������������|���nash;h�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(hbw[hbw[ojqj^jh� )h$?�ojqj^jo(h��5�ojqj^jhvi�h$?�5�ojqj^jo(hbw[hbw[5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^jh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(h%j,5�ojqjo(hihanojqj^jh|cnh|cnojqj^j����� � � � � � � � � :&;&<&=&?&e&f&�&���ⱥ�֯ȟ��vh]p�bp4h� -h� -5�ojqj^jhr7ahr7a5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h.�h.�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h��5�ojqj^jhvi�h�ps5�ojqj^jh.�h.�5�ojqj^jh�ps5�ojqj^jo(h�psh�ps5�ojqj^jh�"�h)w�5�ojqj^j� � ;&<&�&�&6-7-�-�-�2�2�2q3�9�9�9o:3a4aya�a�g�goh�h�������������������������gd�s�gd�_gdlz�gd�)ggd|�gdr7agd)w�gd�ps�&�&�&�&�&�&�&�&5-6-7-8-:-@-a-�-�-�-�-���ƿ����uhzlh>0l>hvi�h|�5�ojqj^jh{?h{?5�ojqj^jh|�h|�5�ojqj^jh�"�h)w�5�ojqj^jh|�5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h� -h� -ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h� -h� -5�ojqj^jhvi�hvi�5�ojqj^jhr7ahr7a5�ojqj^jhvi�hr7a5�ojqj^j�-�-�-�-..�2�2�2�2�2�2�2�2�2�2�2e3p3q3z3[3���ⱥ����yk�]ok��]��ahih)w�ojqj^jo(hvi�h�)g5�ojqj^jhtdhtd5�ojqj^jh�)gh�)g5�ojqj^jh�"�h)w�5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h{?h{?ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h{?h{?5�ojqj^jh��5�ojqj^j[3�9�9�9�9�9�9�9�9�9�9@:n:o:x:y:2a3a4a6a8a���Ϳ�����}�m_qd��Ϳh�wzh�wzojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h��5�ojqj^jhvi�hlz�5�ojqj^jh�wzh�wz5�ojqj^jhlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(htdhtdojqj^j8a>a?axaya�a�a�a�a�a�a�a�g�g�g�g�g�g�gnh�����ֽ֭���vk^pb^4h. ah. a5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h}onh)w�ojqj^jo(hip�hip�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h��5�ojqj^jhvi�h�_5�ojqj^jhip�hip�5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jnhohwhxh�h�h�h�h�h�h�h�m�m�m�m�m�m�m>n?ngn���ʼʼ����uj]o�]a��h�t�h�t�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h[h)w�ojqj^jo(h. ah. aojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h. ah. a5�ojqj^jh��5�ojqj^jh[h[5�ojqj^jh�s�h�s�5�ojqj^jh[h�s�5�ojqj^j�h�m�m?nbn�r�rsdsx?xaxgxhx�x�x�x�x�xy y y�]���������{�p�`rd7h�#th�#tojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h��5�ojqj^jh[hmw�5�ojqj^jh�#th�#t5�ojqj^jhmw�5�ojqj^jo(hmw�hmw�5�ojqj^jh�"�h)w�5�ojqj^jh)w�5�ojqj^jo(h�s�5�ojqj^jo(h)w�5�ojqjo(h[h)w�ojqj^jo(h�k�h�k�ojqj^j�]�]�]�]�]�]�]�]�]�]�]����������h�;.jh�;.uh�w�hj<ojqj^jo( 01�82p��. ��a!�"�#��$��%��s�� ��s2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��j ck�e $1$a$ cjkh_hajmh nhsh th$a ���$ ؞���k=�w[sobi���b nf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h [�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=x e��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk! ѐ��'theme/theme/_rels/thememanager.xml.rels��m �0���wooӻ�&݈э���5 6?$q�� �,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��6 0_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-! ѐ��'� theme/theme/_rels/thememanager.xml.relspk]� �u~���� �@���&�-[38anhgnns�]�]/12346789:<=>� �h�]05;�@� @���������h ��0�( � ����0�( � ��b �s ���� ?��������������7;������x_�������-6t�_q ,�� / \ b r u � � � � �������������������$ %�%�%�%�%   ( < c �122 2$2-2�9�9�9�9�9�9�9�9�9�9�9�9�9�9�9�9�9�9x@|@}@�@�@�@�@�@�@�@�@�@�@�@ cchfnfk#k3k:kbkjk�p�p�p�p�r�rss�u�u�u�u�u�u�u�u�u�u�u�u�u�u�u�u�u�u�u�u��##rr  � � � � �����%�%e e @2@2�9�9�@�@�@�@tftflklk�p�p�u�u�u��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�= {u�,� uz*�m� �r=��-9h�s��eme�.~�� {r�v �4�1l2q �"�i aha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*� 7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�` rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a 6ji� ��vj�`�[jo 5j90�ry �:[� k 3q-r�jx 8i� tp� k�|�2~� ��y��k� ?i��� * �? = ��#? ?*� @�4le� dw" �� �z�g�kd �2�^e �-h�x �w��t� bs &�j� �x� -z�y� �w� i�>�:-� �u kkkkdw" q�x�m)h -h� k^r� �^�vxb� �=#�/y�pur ���� ��'ff�x-z�d�y�(��)fk{z��fv��-�p�'�e�t#�4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����` [� ��rh&<�^��oc!��d{�/�"���[��h�2��yq�d���t��w�8i� (f�tl(����}�t�a9�~�8� �7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d� )r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7�� �e �o[kh,~�hmpm~� mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t an�gap�y8��x� ��s�x ��d���z��j�vzq��t\ ~��av'po�_m4�i�w��tkpb�` rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l� �!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#� � �i3#�#? �=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w (r�@�~d:(� _(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e ��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f� � {p���c,@�i��#,�dq[mk, @p�qb,�d&d� �,�>m��x�,� {u�,�@�q>,-�m4-rt�h�=j-�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��efw2 �z��>2"o�m�29!"e�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^� -a5�pv5�d5tw�'��5��5md-�b�5i�d��v�5 -a5�a 6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\xlq7�~74\�7bd9t=r�7��gr f8c�]��jo8�~�8�� �8��b�n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjj o;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�? u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y� ��f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q �q� �qqg$�r)b;r�,�q��0hr�l��zwr� {r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0 g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv ��q�yv^mc���y< z�&x srzfk{z�kd  �zhp�� [�enx�:[�=�^�` [�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s��s}�\�7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`p`~^.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t� opb3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^���5�c��c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� * ^ee����l\e�>e��eme�hgqwe�u �t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f< z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r��i4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkz l!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn� �!�g)nfr>��^^nv��, mn�kj>�nh#�n�gv'po� ���"�o�"�o6gp�e �oh��.�o�r��v�o mg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!\�s��s{fm-dt�y�)1:to �v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x, mnf�x&xn �x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{ hr{��6�jbs{�-x{qx{�@�6h{�{m�{�d��0q|�~�vgy|��s� u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\ ~ �=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x ��m�j�����[�gw�3`v'2 r� �p j^ k �n�_ati�wb��.�h j<sh�to>s�r#�l$�}&�m'�m(� )�g)%j,� -�;.�p.�i/�2�z2'4t4.6�6*8;i8cj8�9�i;�e=k&>�`>{?e!@jj@r7a�ec�nd�udvf0 i_i4tj�kul%man�%s�#tmkxgy�py�wzbw[�]�^ro_. a5a�7ahctd 2e�lf�qf�)gjmi�ckalthllmnnm}on|cn[r�ps0@ui1vywicy�x}�/�pj�wt�mw��=��=��`�j�nj��w��9�l�.~�v�=h��j��~�du�rx�� �=i�fj�to�4��m��2�)w���lz�xc� ��c�7�u<�[����t��r�������cb��^�v��\�a�vi�|w�r�����$?��n��t�}�� ��!�s/�� ��8��k�*��-��_�$-��f�><�ek����r�.��c�7"����s�?5��8����"�gl�bj�8�h��-��� ��"�l%�ip�w� p���2����y�� ��e�`-�0)�|��u�u�@��u�u�u�u�u�@��unknown������������g��.�[x� �times new roman5��symbol3.� �.�[x� �arial7.� ��[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�f ��g�d� i �� i �!-!),.:;?]}����    & 6"0000 0 0 00000��� � �����=�@�\�]�^���([{�  0 0 00000��;�[�����������u�u 2�q��hp��?�����������������������"�2!xx���a ���userlib-x�� �����oh�� '��0t������� ��   (4<dl�usernormallib-x178microsoft office word@x��1@�y��\�@� |��  i�� ��՜.�� ,��0� x`t|�� ����� microsoft� �u   !"#$%&'()* ,-./0123456789:;<=>?����abcdefg����ijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqr����tuvwxyz����|}~������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������root entry�������� �f�� |���data ������������@1table����h�uworddocument����2~summaryinformation(������������sdocumentsummaryinformation8��������{compobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �fmicrosoft word 97-2003 �ĵ� msworddocword.document.8�9�q
网站地图