用户名: 密码: 验证码:
煤矿安全隐患治理能力评估与预测方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
本文针对煤矿安全隐患排查治理工作的实际需要,围绕企业隐患治理能力及其排查隐患的数量等展开评估与预测方法的研究工作。论文研究工作主要分为三部分:第一部分借鉴软件能力成熟度模型,提出企业安全隐患治理能力成熟度概念与模型,并设计了煤炭行业的评估与预测指标体系,从横、纵两个方向评估,横向采用专家法和自组织特征映射神经网络对比评估企业间的能力成熟度;纵向基于信息熵衡量企业自身隐患治理能力的改进程度。第二部分针对企业所排查出隐患的治理能力,提出单变量的频分多曲线拟合方法来评估企业未来可能的隐患治理能力及其发展趋势。第三部分提出渐进遗忘式在线极速学习机算法,基于第一部分构建的指标体系,研究企业安全管理中的相关因素对隐患数量的影响规律,构建基于管理指标的隐患数量预测模型。研究主要选择煤炭行业的数据作为评估与预测对象,并验证本文所研究方法的有效性、适用性。
In this paper, the main research object is the hidden enterprise production dangers and theevaluating and forecasting methods are the key points. The researches consist of three parts. Inthe first part, the paper designs an evaluating indicator system, and proposes a capabilitymaturity model to evaluate the hidden danger governance of enterprise based on Expert GroupAssessment and the self-organize feature map (SOFM) algorithm. In addition, a self-evaluatingmodel is put forward based on the information entropy theory. In the second part, a frequencydivision curve fitting algorithm that is a multiple regression analysis method for univariate isproposed. The algorithm is used to forecast the development trend of the hidden dangergovernance. In the last part, the paper mainly study the relationship between the evaluatingindicator system and the development trend of the hidden danger, and bring forward a novelonline sequence extreme learning machine with gradual forgetting mechanisms. All researchingachievement is tested to analysis their effectiveness, and the sample data is mainly collected fromthe coal mine enterprises.
引文
1.国发[2010]23号.国务院关于进一步加强企业安全生产工作的通知[Z].国务院.2010
    2.国发[2011]40号.国务院关于坚持科学发展安全发展促进安全生产形势持续稳定好转的意见[Z].国务院.2011
    3.安委办[2012]1号.国务院安委会办公室关于建立安全隐患排查治理体系的通知[Z].国务院安委会.2012
    4.苏秦,何进,张涑贤.软件过程质量管理[M].北京:科学出版社.2008,15~18.
    5.肖荣.企业信息化风险治理研究[D].同济大学.2005,1~9
    6.林书成,李后强.非线性安全生产系统学导论[M].成都:四川科学技术出版社.2011,1~10
    7.温池洪.信息化对企业竞争能力的影响机理与信息化战略选择[D].吉林大学.2010,1~3
    8.胡锦涛.坚定不移沿着中国特色社会主义道路前进为全面建成小康社会而奋斗—在中国共产党第十八次全国代表大会上的报告[J].求是,2012,22:3~25
    9.国办发〔2011〕47号.安全生产“十二五”规划[Z].国务院.2011.
    10.国家安全生产监督管理总局.安全生产事故隐患排查治理体系建设实施指南[Z].国家安监总局.2012
    11.国办发〔2007〕16号.国务院办公厅关于在重点行业和领域开展安全生产隐患排查治理专项行动的通知[Z].国务院.2007.
    12.国办发〔2008〕15号.国务院办公厅关于进一步开展安全生产隐患排查治理工作的通知[Z].国务院.2008.
    13. Humphrey, W.S..Characterizing the software process: a maturity framework [J]. Software,IEEE.1988,5(2):73~79
    14. Paulk, M.C., Curtis, B., Chrissis, M.B., et al. Capability maturity model, version1.1[J],Software, IEEE,1993,10(4):18~27
    15. Sami Zahran.软件过程改进[M].陈新,罗劲枫等译.北京:机械工业出版社.2002,185~187.
    16.马慧,杨一平.质量评价与软件质量工程知识体系的研究[M].北京:人民邮电出版社.2009,222~250.
    17. Ginsberg MP, Quinn LH. Process tailoring and the software capability maturity model[R].CMU/SEI-94-TR-024: Pittsburgh: Software Engineering Institute, Carnegie MellonUniversity,1995,1~60.
    18. Emilio Bellini, Corrado Lo Storto.The impact of software capability maturity model onknowledge management and organisational learning: empirical findings and useful insights[J].International Journal of Information Systems and Change Management.2006,4:339~373
    19. Guerrero F, Eterovic Y. Adopting the SW-CMM in a small IT organization[J]. IEEE Software,2004,21(4):29~35.
    20. Straub P, Guzmán D. Incremental, collaborative software process improvement in a tinysoftware group[C].Computer Science Society,2002. SCCC2002. Proceedings.22ndInternational Conference of the Chilean. IEEE,2002:187~194.
    21. Keenan F. Agile process tailoring and problem analysis (APTLY)[C].Software Engineering,
    2004. ICSE2004. Proceedings.26th International Conference on. IEEE,2004:45~47.
    22. Kerzner H. Strategic planning for project management using a project management maturitymodel[M]. Wiley,2002.
    23. Hall T, Rainer A, Baddoo N. Implementing software process improvement: An empiricalstudy[J]. Software Process: Improvement and Practice,2002,7(1):3~15.
    24. Jalote P. Lessons learned in framework-based software process improvement[C].SoftwareEngineering Conference,2002. Ninth Asia-Pacific. IEEE,2002:261~265.
    25. Herbsleb J D, Goldenson D R. A systematic survey of CMM experience andresults[C].Software Engineering,1996, Proceedings of the18th International Conference on.IEEE,1996:323~330.
    26. Humphrey W S. Using a defined and measured personal software process[J]. Software, IEEE,1996,13(3):77~88.
    27. Humphrey. Watts, The Team Software Process, Software Engineering Institute,http://www.sei.cmu.edu/reports/00tr023.pdf.
    28.刘文红.CMMI项目管理实践[M].北京:清华大学出版社.2013:1~12.
    29.周勇. E-learning过程能力成熟度模型研究[D].华东师范大学.2009,2~35
    30.刘川,关昕,马力.基于CMM2级需求管理过程框架的研究与实现[J].计算机工程与设计,2006,27(3):469~470.
    31.张莉.使用CMM思想和聚类法构建信息化成熟度模型框架[D].首都经济贸易大学.2008:1~25
    32.李娟,李明树,武占春等.基于SPEM的CMM软件过程元模型[J].软件学报,2005,16(8):1366~1377.
    33.李娟,李明树,武占春等.一种基于模型融合的CMM实施过程建模方法[J].计算机学报,2006,29(1):54~65.
    34.邹心勇.中国大型承包商战略能力成熟度的研究[D].哈尔滨工业大学.2008,1~29
    35.张洁.高新技术企业自主创新管理能力成熟度模型与提升方法研究[D].南开大学.2010,1~23
    36.詹伟,邱菀华.项目管理成熟度模型及其应用研究[J].北京航空航天大学学报,2007,20(1):18~21
    37.范瑞琛.铁路施工企业项目管理成熟度模型研究[D].西南交通大学.2009:2~29
    38.张超,余晓钟.石油勘探项目管理成熟度模型的构建[J].天然气勘探与开发,2007,20(1):63~65
    39.王兴中.施工企业项目管理成熟度模型构建与应用研究[D].天津大学.2007:2~26
    40.翁利根.基于项目管理成熟度模型的农业综合开发项目评价和管理研究[D].南京农业大学.2008:1~20
    41.邱涛.通信工程项目管理成熟度模型研究[D].吉林大学.2008:1~23
    42.欧立雄,袁家军,王卫东.神舟项目管理成熟度模型[J].管理工程学报,2005,S1:129~132
    43.潘吉仁,林知炎,贾广社.建筑企业组织项目管理成熟度模型研究[J].土木工程学报,2009,42(12):183~188.
    44.王海龙.软件能力成熟度模型在对日软件外包项目过程管理中的应用[D].国防科学技术大学.2006,2~30
    45.黎连业,张晓冬,吕小刚.软件能力成熟度模型与模型集成[M].北京:机械工业出版社.2011,1~6,8~9.
    46. Rudolf J. Freund, William J. Wilson, Ping Sa.沈崇麟译,回归分析:因变量统计模型[M],重庆:重庆大学出版社,2012,1~58
    47.石振动.误差理论与曲线拟合[M].哈尔滨:哈尔滨工程大学出版社.2010:244~246.
    48.薛毅.数值分析与科学计算[M].北京:科学出版社.2011:255~267
    49.成平等,参数估计[M],上海:上海科学技术出版社,1985,2~37
    50. Massy W F. Principal components regression in exploratory statistical research[J]. Journal ofthe American Statistical Association,1965,60(309):234~256.
    51. Hoerl A E, Kennard R W. Ridge regression: Biased estimation for nonorthogonal problems[J].Technometrics,1970,12(1):55~67.
    52.柴根象,洪圣岩,半参数回归模型[M].安徽:安徽教育出版社,1995,3~50
    53. Tanaka H. Fuzzy data analysis by possibilistic linear models[J]. Fuzzy sets and Systems,1987,24(3):363~375.
    54. Shapiro A F. Fuzzy regression models[J]. Article of Penn State University,2005.
    55. Smith A F M. A general Bayesian linear model[J]. Journal of the Royal Statistical Society.Series B (Methodological),1973:67~75.
    56. Woltman H, Feldstain A, MacKay J C, et al. An introduction to hierarchical linearmodeling[J]. Tutorials in Quantitative Methods for Psychology,2012,8(1):52~69.
    57. Golub G H, Van Loan C F. An analysis of the total least squares problem[J]. SIAM Journal onNumerical Analysis,1980,17(6):883-893.
    58.陈希孺,最小二乘法的历史回顾与现状,中国科学院研究生院学报,第15卷第1期(Vol.15No.1):4-11,1998年5月.
    59.王福昌,曹慧荣,朱红霞.经典最小二乘与全最小二乘法及其参数估计,统计与决策,2009年第1期(总第277期):16-17.
    60.王惠文,刘强,屠永平,北京航空航天大学学报,第26卷第4期(Vol.26No.4):473-476,2000年8月.
    61.孔建,姚宜斌,吴寒,整体最小二乘的迭代解法,武汉大学学报·信息科学版,第35卷第6期(Vol.35No.6):711-714,2010年6月.
    62.邓念武,徐晖,单因变量的偏最小二乘回归模型及其应用,武汉大学学报(工学版)第34卷第2期(Vol.34No.2):14-16,2001年4月.
    63. Fredric M.Ham Ivica Kostanic(美).神经计算原理[M].叶世伟,王海娟译.北京:机械工业出版社.2007,1~18.
    64.罗兵,李华嵩,李敬民.人工智能原理及应用[M].北京:机械工业出版社.2011:231~240
    65.乔俊飞,韩红桂.前馈神经网络分析与设计[M].北京:科学出版社.2013:1~17
    66. Grossberg S. Adaptive Pattern Classification and Universal Recoding: II Feedback,Expectation,olfaction, illusions[J]. Biological Cybernetics,1976,23(4):187~202.
    67. Grossberg S. Adaptive Pattern Classification and Universal Recoding: I ParallelDevelopment and Coding of Neural Feature detectors[J]. Biological Cybernetics,1976,23(3):121~134.
    68. Hopfield J J. Neural networks and physical systems with emergent collective computationalabilities[J]. Proceedings of the national academy of sciences,1982,79(8):2554~2558.
    69. Kohonen T. Self-organized formation of topologically correct feature maps[J]. Biologicalcybernetics,1982,43(1):59~69, Reprinted in1988, Anderson and Rosenfeld[2],1988,511~21
    70. E.Oja, Simplified neuron model as a principal component analyzer[J], Journal ofMathematical Biology,1982,15(3):267~273
    71. Hopfield J J. Neurons with graded response have collective computational properties likethose of two-state neurons[J]. Proceedings of the national academy of sciences,1984,81(10):3088~3092.
    72. Ackley, D. H., Hinton, G. E., Senowski, T. J., A learning algorithm for Boltzmann machines.Cognitive Science,1985,9:147~169
    73. S. Kirkpatrick, C.D. Gelatt, M.P. Vecchi. Optimization by Simulated Annealing. Science,
    1983.5:671~680
    74. Rumelhart D E, Hintont G E, Williams R J. Learning representations by back-propagatingerrors[J]. Nature,1986,323(6088):533~536
    75. D.S.Broomhead, D.Lowe. Multivariable functional interpolation and adaptive networks[J].Complex Systems,1988,2:321~355
    76. Dayhoff J E, DeLeo J M. Artificial neural networks[J]. Cancer,2001,91(S8):1615~1635
    77. Mitchell T M. Artificial neural networks[J]. Machine learning,1997,81~127
    78. Dalton J, Deshmane A. Artificial neural networks[J]. Potentials, IEEE,1991,10(2):33~36
    79. Khan J, Wei J S, Ringner M, et al. Classification and diagnostic prediction of cancers usinggene expression profiling and artificial neural networks[J]. Nature medicine,2001,7(6):673~679
    80. Reed R D, Marks R J. Neural smithing: supervised learning in feedforward artificial neuralnetworks[M]. Mit Press,1998.
    81. Zhou Z H, Wu J, Tang W. Ensembling neural networks: many could be better than all[J].Artificial intelligence,2002,137(1):239~263
    82. Andrews R, Diederich J, Tickle A B. Survey and critique of techniques for extracting rulesfrom trained artificial neural networks[J]. Knowledge-based systems,1995,8(6):373~389
    83. Kosko B, Burgess J C. Neural networks and fuzzy systems[J]. The Journal of the AcousticalSociety of America,1998,103(6):3131
    84. Mao J, Jain A K. Artificial neural networks for feature extraction and multivariate dataprojection[J]. Neural Networks, IEEE Transactions on,1995,6(2):296~317
    85. Stanley K O, Miikkulainen R. Evolving neural networks through augmenting topologies[J].Evolutionary computation,2002,10(2):99~127
    86. Xu S, Lam J. A new approach to exponential stability analysis of neural networks withtime-varying delays[J]. Neural Networks,2006,19(1):76~83
    87. Cho S, Chow T W S. Training multilayer neural networks using fast global learningalgorithm-least-squares and penalized optimization methods[J]. Neurocomputing,1999,25(1):115~131
    88. Barhen J, Cogswell R, Protopopescu V. Single-Iteration Training Algorithm for Multi-LayerFeed-Forward Neural Networks[J]. Neural Processing Letters,2000,11(2):113~129
    89. Leshno M, Lin V Y, Pinkus A, et al. Multilayer feedforward networks with a nonpolynomialactivation function can approximate any function[J]. Neural networks,1993,6(6):861~867
    90. Hornik K. Approximation capabilities of multilayer feedforward networks[J]. NeuralNetworks,1991,4(2):251~257
    91. Gori M, Tesi A. On the problem of local minima in back propagation[J]. IEEE Transactionson Pattern Analysis and Machine Intelligence,1992,14(1):76~86
    92. Tamura S, Tateishi M. Capabilities of a four-layered feedforward neural network: Four layersversus three[J]. Neural Networks, IEEE Transactions on,1997,8(2):251~255
    93. Huang G B. Learning capability and storage capacity of two-hidden-layer feedforwardnetworks[J]. Neural Networks, IEEE Transactions on,2003,14(2):274~281
    94. Huang G B, Babri H A. Upper bounds on the number of hidden neurons in feedforwardnetworks with arbitrary bounded nonlinear activation functions[J]. Neural Networks, IEEETransactions on,1998,9(1):224~229
    95. Huang G B, Zhu Q Y, Siew C K. Extreme learning machine: theory and applications[J].Neurocomputing,2006,70(1):489~501
    96. HuangG B, Chen L. Enhancedrandom search based incrementalextreme learning machine[J].Neurocomputing.2008,71:3460~3468
    97. Lan Y, Soh Y C, Huang G B. Two-stage extreme learning machine for regression [J].Neurocomputing.2010,73:3028~3038
    98. Miche Y, Sorjamaa A, Bas P, et al. OP-ELM: Optimally pruned extreme learning machine[J].IEEE Transactions on Neural Networks.2010,21(1):158~162
    99. Miche Y, Heeswijk M, Bas P, et al. TROP-ELM: A double-regularized ELM using LARS andTikhonov regularization [J]. Neurocomputing.2011,74:2413~2421
    100. Feng G R, Huang G B, Lin Q P, et al. Error minimized extreme learning machine with growthof hidden nodes and incremental learning [J]. IEEE Transaction on Neural Networks.2009,20:1352~1357
    101. Heeswijk M, Miche Y, E O, et al. GPU-accelerated and parallelized ELM ensembles forlarge-scale regression [J]. Neurocomputing.2011,74:2430~2437
    102. Lan Y, Soh Y C, Huang G B. Constructive hidden nodes selection of extreme learningmachine for regression [J]. Neurocomputing.2010,73:3193~3199
    103. Liang N Y, Huang G B, Saratchandran P, et al. A fast and accurate online sequential learningalgorithm for feedforward networks [J]. IEEE Transactions on Neural Networks.2006,17(6):1411~1423
    104. Zhao J, Wang Z, Park D S. Online sequential extreme learning machine with forgettingmechanism [J]. Neurocomputing.2012,87:79~89
    105.王智慧. BP神经网络和ELM算法研究[D].中国计量学院.2012:19~35
    106.邓万宇,郑庆华,陈琳等.神经网络极速学习方法研究[J].计算机学报,2010,33(2):280~287
    107.张荣;邓赵红;王士同等.针对小样本数据集的鲁棒单隐层前馈网络建模方法[J].控制与决策,2012,27(9):1309~1319
    108.李彬,李贻斌.基于ELM学习算法的混沌时间序列预测[J].天津大学学报,2011,44(8):701~704
    109. Cao F, Liu B, Sun Park D. Image classification based on effective extreme learningmachine[J]. Neurocomputing,2013.102(15):90~97
    110.刘波.基于ELM的图像分类算法研究[D].中国计量学院.2012,8~20
    111.尹刚,张英堂,李志宁等.改进在线贯序极限学习机在模式识别中的应用[J].计算机工程,2012,38(8):164~169
    112.黄玉春.基于极致学习机的通信信号辐射源个体识别技术研究[D].华中科技大学.2007,102~120
    113.唐奡.基于OS-ELM-RPLS的间歇过程软测量建模与迭代控制[D].东北大学.2009,29~44
    114. Peter Montague. Reducing the harms associated With risk assessments. EnvironmentalImpact Assessment Review.2004,24(7-8):733~748
    115. Siegel D M, Frankos V H, Schneiderman M A. Formaldehyde risk assessment foroccupationally exposed workers[J]. Regulatory Toxicology and Pharmacology,1983,3(4):355~371.
    116. Hattis D, Minkowitz W S. Risk evaluation: criteria arising from legal traditions andexperience with quantitative risk assessment in the United States[J]. EnvironmentalToxicology and Pharmacology,1996,2(2):103~109.
    117.马云东.煤矿多维模糊数据仓库模型的建立及挖掘技术[J].中国煤炭经济学院学报,2002,3:264~266.
    118.杜正春,薛东江,夏道止.应用人工神经网络进行电力系统动态安全评价的新方法[J].电力系统及其自动化学报.1993,5(2):38~42.
    119.高新春,冯洪渊.用模糊层次分析法评价矿井安全状况[J].矿业安全与环保,2003,5:6~7
    120.薛剑光.安全生产监督与管理的量化表达方法研究[D].中南大学.2010,78~102
    121.杜正春,刘玉田,薛东江等.前馈神经网络用于电力系统动态安全评价的研究[J].电力系统及其自动化学报.1994,6(2):22~26.
    122.麻兴斌,唐林炜,刁柏青等.二阶加权模糊评价模型在煤矿地质评价中的应用[J].山东科技大学学报(自然科学版),2004,4:22~25.
    123.杜正春,刘玉田,夏道止.一种新的电力系统动态安全评价模式识别方法[J].电网技术.1995,19(1):13~15.
    124.李树刚,刘志云,林海飞.基于神经网络的煤与瓦斯突出矿井等级划分方法[J].煤田地质与勘探,2005,1:19~20
    125.杨中,朱明,刘兰翠等.开滦矿区煤矿安全相关性分析及趋势预测[J].煤炭科学技术,2002,5:56~57.
    126.王金国,江洪清,高永奎.基于MATLAB的矿井涌水量神经网络预测方法及应用[J].煤炭技术,2004,7:67~68.
    127.刘海波,施式亮,刘宝琛.人工神经网络对矿山安全状态的评判能力分析[J].安全与环境学报.2004,4(5):69~72.
    128.郭忠平,王志军,李勇.基于神经网络的综合指标在煤矿安全预测中的应用[J].煤矿安全,2005,9:28~29.
    129.金珠.改进的支持向量机分类算法及其在煤矿人因事故安全评价中的应用[D].中国矿业大学.2011,81-98,43~44
    130.王从陆,尹长林.基于GM (1,1)模型的安全管理目标值确定方法[J].中国安全科学学报,2005,8:29~31.
    131.李江.煤矿动态安全评价及预测技术研究[D].中国矿业大学.2008,16~24
    132.杨金廷.煤矿安全生产风险集成管理研究[D].天津大学.2008,63~69
    133.高晓旭.基于4M理论的煤矿本质安全研究[D].西安科技大学.2010,110~125
    134.张洪杰.煤矿安全风险综合评价体系及应用研究[D].中国矿业大学.2010,54~69
    135.郑媛.基于小波神经网络的矿山事故隐患安全评价系统的设计[D].山东科技大学.2011,7~19
    136.王耕.基于隐患因素的生态安全机理与评价方法研究[D].大连理工大学.2007,4~8
    137.张建航.事故隐患两阶段风险评价方法的研究[D].中国地质大学(北京).2010,6~8
    138.张冰.小组软件过程建模方法及过程定义重用研究[D].哈尔滨工程大学.2009,2~5
    139.孟国宝,苏秦.软件过程标准的比较研究[J].科研管理,2005,26(3):31~37.
    140. Watts. S. Humphrey(美).个体软件过程[M].吴超英,车向东译.北京:人民邮电出版社.2010,1~2.
    141.陆亮亮. XP-PSP集成软件过程的研究[D].南京大学.2012,17~20
    142. Watts. S. Humphrey(美).团队软件过程(第2版)[M].吴超英,师春泽,汪浩译.北京:人民邮电出版社.2011,2~19
    143.贾小勇,徐传胜,白欣.最小二乘法的创立及其思想方法[J].西北大学学报(自然科学版),2006,36(3):507~511
    144. David Kincaid, Ward Chency著,王国荣,俞耀明,徐兆亮译,数值分析(第三版),机械工业出版社,2005,218~220
    145.颜庆津.数值分析(第三版)[M].北京:北京航空航天大学出版社.2006
    146.齐国清,吕健.正弦曲线拟合若干问题探讨[J].计算机工程与设计,2008,29(14):3677~3680
    147. Kohonen.T.An Intorduction to Neural ComPuting[J].Neural Networks,1988,1(1):3~16.
    148.赵贵玉.多层前向网络泛化能力的研究与应用[D].解放军信息工程大学.2005,6~7
    149. Andries.P.Engelbrecht.计算智能导论(第2版)[M].谭营等译.北京:清华大学出版社.2010,21~28
    150. Funahashi K I. On the approximate realization of continuous mappings by neural networks[J].Neural networks,1989,2(3):183~192
    151. Cybenko G. Approximation by superpositions of a sigmoidal function[J]. Mathematics ofcontrol, signals and systems,1989,2(4):303~314
    152. Ng S C, Cheung C C, Leung S H. Magnified gradient function with deterministic weightmodification in adaptive learning[J]. Neural Networks, IEEE Transactions on,2004,15(6):1411~1423
    153. Huang G B, Wang D H, Lan Y. Extreme learning machines: a survey[J]. International Journalof Machine Learning and Cybernetics,2011,2(2):107~122
    154. Huang G B, Chen L, Siew C K. Universal approximation using incremental constructivefeedforward networks with random hidden nodes[J]. Neural Networks, IEEE Transactions on,2006,17(4):879~892.
    155. Moore, E. H., On the reciprocal of the general algebraic matrix[J]. Bulletin of the AmericanMathematical Society,1920,26(9):394~395.
    156. Bjerhammar, Arne. Application of calculus of matrices to method of least squares; withspecial references to geodetic calculations. Trans. Roy. Inst. Tech. Stockholm.1951.49
    157. Penrose R. A generalized inverse for matrices[C].Proc. Cambridge Philos. Soc.1955,51(3):406~413.
    158. Huang G B, Zhu Q Y, Siew C K. Extreme learning machine: a new learning scheme offeedforward neural networks[C].Neural Networks,2004. Proceedings.2004IEEEInternational Joint Conference on. IEEE,2004,2:985~990.
    159. Huang G B, Chen L. Enhanced random search based incremental extreme learningmachine[J]. Neurocomputing,2008,71(16-18):3460~3468.
    160. Tang XL, Han M., Partial Lanczos extreme learning machine for single-output regressionproblems [J], Neurocomputing,2009,72(13-15):3066~3076.
    161. Minhas R, Mohammed A A, Wu Q M J. A fast recognition framework based on extremelearning machine using hybrid object information[J], Neurocomputing,2010,73(10-12):1831~1839.
    162. Cao J W, Lin Z P, Huang G B. Composite function wavelet neural networks with extremelearning machine[J], Neurocomputing,2010,73(7-9):1405~1416.
    163. Huang G B,Ding X J,Zhou H M.Optimization method based extreme learning machine forclassification[J].Neurocomputing,2010,4(1-3):155~163.
    164. Wang D, Huang G B. Protein sequence classification using extreme learningmachine[C].Neural Networks,2005. IJCNN'05. Proceedings.2005IEEE International JointConference on. IEEE,2005,3:1406~1411.
    165.吴同性,易明,李奇明等.基于文化塑造的煤矿本质安全管理研究[M].武汉:中国地质大学出版社.2011,17~20,255~257
    166. Heinrich H W, Petersen D, Roos N. Industrial accident prevention[M]. New York:McGraw-Hill,1950.
    167.马谦杰.煤炭生产系统风险评价理论与方法[M].北京:经济管理出版社.2008,32~33
    168.何学秋等编著.安全工程学[M].徐州:中国矿业大学出版社,2000,117~120
    169. Heinrich H.W. Industrial accident prevention: a scientific approach [M]. NewYork:McGraw-Hi Book Company Book Company,1959
    170.张国顺.燃烧爆炸危险与安全技术(第一版)[M].北京:中国电力出版社,2003
    171.吕晓辉,吴健,胡正国.基于CMM/PSP/TSP的软件过程改进[J].计算机工程,2003,29(4):11~15
    172.方敏.柔性软件自动化生产线研究[D].浙江大学.2006,77~78
    173. Kohonen Teuvo,Self-organizing maps,2nd edition,Berlin:Springer-Verlag,1997
    174. Kohonen Teuvo, The self-organizing map[J], Neurocomputing,1998,21(1-3):1~6
    175.吴微,周春光,梁艳春.智能计算[M].北京:高等教育出版社.2009:51~55
    176.何国家,刘双勇,孙彦彬.煤矿事故隐患监控预警的理论与实践[J].煤炭学报,2009,34(2):212~217.
    177. HE G, LIU S, SUN Y. Theory and practice of coal mine accident hidden danger monitoringand early warning[J]. Journal of China Coal Society,2009,2:016.
    178.国务院446号令.国务院关于预防煤矿生产安全事故的特别规定[Z].国务院.2005.
    179.马小平,金珠.蚁群聚类算法在煤矿安全评价人因事故分析中的应用,煤炭学报,2009,34(5):678~682
    180.胡利军,陈建华.煤矿安全中关键人因失误因素的识别研究[J].南华大学学报(社会科学版),2007,6(3):31~34.
    181.张西志.利用层次分析法对煤矿通风管理制度进行安全评价[J].中州煤炭,2007(1):76~81.
    182.王应德,李丰军,魏相存.对煤矿事故中人的不安全行为调查分析[J].中国煤炭工业,2007(3):49~50
    183.陈红,祁惠,宋学峰等.煤矿重大事故中管理失误行为影响因素结构模型[J].煤炭学报,2006,10(5):689~696
    184.刘铁忠,李志祥.煤矿安全管理能力影响因素结构方程建模[J].煤炭学报,2008,33(12):1452~1456
    185. Shannon C E. The mathematical theory of communication. Bell Systems TechnicalJournal,1948,27(4):379~423and623~656
    186. Shannon C E. A mathematical theory of communication[J]. ACM SIGMOBILE MobileComputing and Communications Review,2001,5(1):3~55.
    187.张继国,(美)Vijay P.Singh(辛格).信息熵:理论与应用[M].北京:中国水利水电出版社.2012,31~40,79~81
    188.刘华文.基于信息熵的特征选择算法研究[D].吉林大学.2010:14~15
    189. Nahashon S N, Aggrey S E, Adefope N A, et al. Growth characteristics of pearl gray guineafowl as predicted by the Richards, Gompertz, and Logistic Models[J]. Poultry science,2006,85(2):359~363.
    190. Vitezica Z G, Marie-Etancelin C, Bernadet M D, et al. Comparison of nonlinear and splineregression models for describing mule duck growth curves[J]. Poultry science,2010,89(8):1778~1784.
    191.冯清玲,国庆,苏晓庆.基于小波的回归分析[J].山东理工大学学报(自然科学版).2007.3:40~42
    192.苏畅,陈东林.外场维护人员可信性多元回归分析方法初探[J].航空计算技术.2003.2:40~44
    193.王惠文,李楠.基于全信息的正态分布型数据的线性回归分析[J],北京航空航天大学学报,2012,V38(10):1275~1279.
    194. Lan Y, Soh Y C, Huang G B.A constructive enhancement for online sequential extremelearning machine[C].Neural Networks,2009. IJCNN2009. International Joint Conference on.IEEE,2009:1708~1713.
    195. Hayes, Monson H.9.4: Recursive Least Squares,Statistical Digital Signal Processing andModeling. Wiley,1996,541.
    196. Wang H, Qian G, Feng X Q. Predicting consumer sentiments using online sequential extremelearning machine and intuitionistic fuzzy sets[J]. Neural Computing and Applications,2013,22(3-4):479~489
    197. Suresh S, Dong K, Kim H J. A sequential learning algorithm for self-adaptive resourceallocation network classifier[J]. Neurocomputing,2010,73(16):3012~3019.
    198. Rong H J, Huang G B, Sundararajan N, et al. Online sequential fuzzy extreme learningmachine for function approximation and classification problems[J]. Systems, Man, andCybernetics, Part B: Cybernetics, IEEE Transactions on,2009,39(4):1067~1072.
    199. Ao T, Dong X, Zhizhong M. Batch-to-batch iterative learning control of a batchpolymerization process based on online sequential extreme learning machine[J]. Industrial&Engineering Chemistry Research,2009,48(24):11108~11114.
    200. Lan Y, Soh Y C, Huang G B. Ensemble of online sequential extreme learning machine[J].Neurocomputing,2009,72(13):3391~3395.
    201.史峰,王辉,郁磊等. Matlab智能算法:30个案例分析(第1版)[M].北京:北京航空航天大学出版社,2011,237~247
    202. Trahan, Donald E. Larrabee, Glenn J. Effect of normal aging on rate of forgetting.Neuropsychology1995,115~122.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700