[1]关于2014年以来六起煤矿重大事故的通报.[OL].安全监管总局站.http://www.chinasafety.gov.cn,2014-06-20
[2]廖国礼, 关清安, 荆宁川. 矿山安全管理核心框架结构研究[J]. 中国安全生产科学技术, 2010, 6(1): 173-177
LIAO Guo-li,GUAN Qing-an,JING Ning-chuan. Research on key safety management framework for mine[J].Journal of Safety Science and Technology ,2010, 6(1): 173-177
[3]马强. DEMATEL 方法的矿山安全管理影响因素[J]. 辽宁工程技术大学学报 (自然科学版), 2014,7: 10
MA Qiang. Safety management impact factor based on DEMATEL method[J].Journal of Liaoning Technical University(Natural Science), 2014, 7: 10
[4]王文杰, 张云鹏. 矿山安全管理的模糊综合评价[J]. 河北理工学院学报, 2006, 28(4): 1-4
WANG Wen-jie,ZHANG Yun-peng. Fuzzy comprehensive evaluation of mine safety management[J].Journal of Hebei Institute of Technology, 2006, 28(4): 1-4
[5]甘昊杰, 贾若东. 工程项目管理中的 SMART 原则[J]. 物流工程与管理, 2012, (2): 101-102
GAN Hao-jie,JIA Ruo-dong. SMART princip applied in construction project management[J]. Logistics Engineering and Management, 2012,(2): 101-102
[6]徐耀, 杜春宇. 煤矿本质安全管理评价指标研究[J]. 中国煤炭, 2009, 34(3): 76-79
XU Yao,DU Chun-yu. Study on the evaluation index of coal mine intrinsic safe management[J]. China Coal, 2009, 34(3): 76-79
[7]Dempster A P. Upper and lower probabilities induced by a multivalued mapping[J]. The Annals of Mathematical Statistics, 1967: 325-339
[8]Shafer G.A.Mathematical Theory of Evidence[M].Princeton:Princeton University Press,1976
[9]万俊波, 于险峰, 姜同敏, 等. 基于DS证据理论的可靠性强化试验的综合评价[J]. 装备环境工程,2010, 7(5): 84-86
WAN Jun-bo,YU Xian-feng,JIANG Tong-min,et al. Comprehensive assessment method for reliablity enhancement testing based on D-S theory of evidence[J]. Equipment Enviromental Engineering, 2010, 7(5): 84-86
[10]郭进平, 尚旭光, 卢才武. 基于DS理论的企业安全绩效综合评定研究[J]. 中国安全科学学报, 2011, 21(4): 150-155
GUO Jin-ping, SHANG Xu-guang, LU Cai-wu. Study on enterprise safety performance comprehensive evaliuation based on D-S evidence theory[J]. China Safety Science Journal, 2011, 21(4): 150-155
[11]张盛刚, 李巍华, 丁康. 基于证据可信度的证据合成新方法[J]. 控制理论与应用, 2009, (7): 812-814
ZHANG Sheng-gang,LI Wei-hua, DING Kang. A novel approach to evidence combination based on the evidence credibility[J]. Control Theory & Applications, 2009, (7): 812-814