[1]赵宝生.云南电网计算机监视系统[J].电力系统自动化,1982(5):46-52.
ZHAO Baosheng. Computer monitoring system for a power network in southwest China[J], Automation of
Eletric Power Systems, 1982(5):46-52.
[2]赵彩明,郝立人.郑州供电网的调度计算机监控系统[J].电力技术,1982(6):78.
ZHAO Caiming, HAO Liren. A computer monitor system for city network dispatching[J], Automation of
Eletric Power Systems, 1982(6):78.
[3]汤胤,彭宏,郑启伦.一个基于范例推理的时序预测模型[J].计算机科学,2004,31(8):103-106.
TANG Ren, PENG Hong, ZHENG Qilun. A case-based model for time series extrapolation[J], Computer
Science, 2004,31(8):103-106.
[4]董辉,侯俊敏,傅鹤林,等.基于范例推理的公路隧道拱顶变形时序支持向量机外延预测[J].岩土力学,2011
(7):2099-2105.
DONG Hui, HOU Junmin, FU Helin, et al. Support vector machine extrapolation prediction of tunnel arch-
top deformation time series based on case-based reasoning[J]. Rock and Soil Mechanics, 2011(7):2099-
2105.
[5]李彤岩,肖海林,李兴明.通信网告警加权关联规则挖掘算法的研究[J].电子科技大学学报,2008,37(6):807-810.
LI Tongyan, XIAO Hailin, LI Xingming. Algorithm for mining weighted alarm association rules in
telecommunication networks[J]. Journal of University of Electronic Science and Technology of China,
2008,37(6):807-810.
[6]姚浩,李鹏,郭晓斌,等.基于大数据的告警信息处理和故障设备定位技术研究[J].电网与清洁能源,2014
(12):72-77.
YAO Hao, LI Peng, GUO Xiaobin, et al. Research on alarm information disposal and fault device location
based on mass data[J]. Power System and Clean Energy, 2014(12):72-77.
[7]李怡萌,顾雪平,李扬.电网故障的动态连续诊断方式[J].北京交通大学学报,2014(5):142-146.
LI Yimeng, GU Xueping, LI Yang. Research on dynamic continuous diagnosis mechanism of power system
faults[J]. Journal of Beijing Jiaotong University, 2014(5):142-146.
[8]F. Yang, S.L. Shah, D. Xiao, et al. Improved correlation analysis and visualization of industrial
alarm data. ISA Transactions, 2012, 51(2012):499-506.
[9]Sandeep R. Kondaveeti, Iman Izadi, Sirish L. Shah, et al. Quantification of alarm chatter based on
run length distributions[J]. Chemical Engineering Research and Design, 2013, 91(2013):2550-2558.
[10]Jason C. Laberge, Peter Bullemer, Mischa Tolsma, et al. Addressing alarm flood situations in the
process industries through alarm summary display design and alarm response strategy[J]. International
Journal of Industrial Ergonomics, 2014, 44(2014):395-406.
[11]Neminath Hubballi, Vinoth Suryanarayanan, Flase alarm minimization techniques in signature-based
intrusion detection systems: A survey. Computer Communications, 2014, 49(2014):1-17.
[12]Arief Adhitya, Siew Fun Cheng, Zongda Lee, et al. Quantifying the effectiveness of an alarm
management system through human factors studies[J]. Computers and Chemical Engineering, 2014, 67
(2014):1-12.
[13]Di Peng, Xiangbai Gu, Yuan Xu, et al. Integrating probabilistic signed digraph and reliability
analysis for alarm signal optimization in chemical plant[J]. Journal of Loss Prevention in the Process
Industries, 2015, 1 (33):279-288.
[1]刘罡,黄丽达,袁宏永,等.基于贝叶斯估计的多探测器火警判定方法研究*[J].中国安全生产科学技术,2021,17(1):12.[doi:10.11731/j.issn.1673-193x.2021.01.002]
LIU Gang,HUANG Lida,YUAN Hongyong,et al.Research on multi-detector fire alarm judgment method based on Bayesian estimation[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2021,17(10):12.[doi:10.11731/j.issn.1673-193x.2021.01.002]