Zhang Xiaoqiang, Guan Lin, Wang Tongwen. Kernel feature identification based on improved ant colony optimization algorithm for transient stability assessment[J]. Transactions of China Electrotechnical Society, 2010, 25(12): 154-160.
[2]
国家电力监管委员会. 电力二次系统安全防护规定. 2008.
[3]
Yager R R. On the dempster-shafer framework and new combination rules[J]. Information Science, 1987, 41: 93-137.
[4]
Inagaki T. Interdependence between safety-control police and multiple-sensor schemes via dempster- shafer theory[J]. IEEE Transactions on Reliability, 1991, 40(2): 182-188.
Du Feng, Shi Wenkang, Deng Yong. Feature extraction of evidence and its application in modification of evidence theory[J]. Journal of Shanghai Jiaotong University, 2004, 38(z1): P164-168.
[9]
Murphy C K. Combining belief fuctions when evidence Conflicts[J]. Decision Support Systems, 2000, 29(1): 1-9.
Li Bicheng, Wang Bo, Wei Jun, et al. An efficient combination rule of evidence theory[J]. Journal of Data Acquisition & Processing, 2002, 17(1): 33-36.
Deng Yong, Shi Wenkang. A modified combiantion rule of evidence theory[J]. Journal of Shanghai Jiaotong University, 2003, 37(8): 1275-1278.
[18]
Smets P. The combination of evidence in the transferable belief model[J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 1990, 12(5): 447-458.
[19]
Sentz K. Combination of evidence in dempster- shafer theory[M]. New York: Binghamton University Press, 2002.
[20]
Liu Vanqiong, Chen Yingwu, Gao Feng, et al. Risk evaluation using evidence reasoning theory[C]. 2005 International Conference on Machine Learning and Cybernetics(ICMLC 2005), 2005: 2855-2860.
Gao Huisheng, Zhu Jing. Security risk assessment model of network based on D-S evidence theory[J]. Computer Engineering and Application, 2008, 44: 754-759.
[23]
Shafer G. A mathematical theory of evidence[M]. New Jersey: Princeton University Press, Princeton, 1976.
[24]
Dempster A P. A generalization of bayesian inference (with discussion)[J]. Journal of the Royal Statistical Society Series B, 1968, 30(2): 205-247.
[25]
Bae H R, Grandhi R V, Canfield R A. Sensitivity analysis of structural response uncertainty propagation using evidence theory[J]. Structural and Multidisciplinary Optimization, 2006, 31(4): 270-279.
[26]
Sun Huaijiang, Yang Jingyu. A combination method for dependent evidences[J]. Chinese Journal of Computers, 1999, 22(9): 1004-1007.
She Eryong, Wang Runsheng, Xu Xuewen. An improved method of D-S evidence theory based on pretreatment mode[J]. Pattern Recognition And Artificial Intelligence, 2007, 20(5): 711-715.