基于影响图理论的武器装备研制项目风险分析方法及应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在武器装备研制活动中,风险因子、风险事件非常繁多,风险因子间、风险事件间、风险因子与风险事件间的交叉作用也非常复杂,如果只是独立地分析每个风险事件,不利于全面了解各个风险因子对整个项目中各种风险事件产生的影响,不利于全面了解武器装备研制项目风险的总体状况,因此需要建立描述了关于整个研制项目全面风险图景的影响图并作出评估,给出可以指导风险控制与风险决策的定量化结果。
     针对武器装备研制项目风险特性,从风险管理活动需求出发,改进了影响图。引入风险节点以描述每个风险事件的各种可能状态以及各可能状态下的后果与概率。利用多类型子价值节点处理武器装备研制项目的三类风险。明确了风险因子间独立关系的表述方式。引入加和关系描述风险评估中遇到的专家关于风险因子组合模式存在分歧的问题。分析指出了改进影响图并不改变传统影响图的基本性质,但有助于武器装备研制项目的风险分析。修正了Howard正则型定义。提出了基于影响图理论的武器装备研制项目风险分析框架。
     提出了武器装备研制项目风险影响图的评估方法。研究了独立关系对于计算风险量、简化分析、减少计算量的意义,给出了根据独立关系识别独立模式与独立幕景风险影响图的图层准则。考虑到决策者对各类风险后果的容忍度不同,各级别风险间存在一定缓冲量和折扣量,提出了滚动当量法以合成多类型子价值节点。提出了基于证据推理理论融合多种加和关系的方法。针对风险节点的特性,给出了风险节点的处理方法。综合以上分析,给出了武器装备研制项目风险影响图的评估方法流程。
     提出了基于历史数据修正进度与费用间相关系数的方法。推导了当武器装备研制项目的进度服从对数正态分布、费用服从正态分布时,进度关于费用的条件分布函数式。根据基本事实与泰勒展开式,推导出进度取对数后的变量与费用间相关系数(ρ)和进度一费用相关系数(ρ_(s,c))之间的关系。综合进度关于费用的条件分布模型和费用关于进度的条件分布模型,提出了ρ_(s,c)的近似估算方法和确定规则,并利用数值模拟和解析分析验证了确定规则的合理性。
     结合以上分析,对高超声速演示验证飞行试验系统研制项目(HSDS)做了实例评估。
According to the risk characteristic existing in weapon system development project(WSDP), the influence diagram was amended in order to analyze the risk of the WSDP. The evaluation method of the amended influence diagram was developed also. The estimation method of correlation coefficient between schedule and cost was proposed. Based on these researches, the risk of one project was analyzed and evaluated.
    The traditional Influence Diagram was amended to describe the risk of the WSDP more clearly. Considering it is most important to provide the detail information of each risk event but not only the risk measurement to the deciders, a concept called risk node was introduced, which was utilized to store the detail information of each risk event such as every possible state of the event, the probability and the consequence of each state. Two kinds of relationships between nodes, that is, independent and combination relationships, were defined. Also, the concept of Howard canonical form was corrected. And the risk analysis framework faced to the WSDP based on the Influence Diagram theory was put forward.
    The evaluation algorithm was given to evaluate the amended Influence Diagram. This paper expounded the importance about recognizing the independent relationships between each risk factor node when to construct the influence diagram at the beginning. The expression method of the independent relationship and the topology rule of constructing the independent mode/scene influence diagram according to these independent relationships were given.Combination relationship was introduced to describe the problem encountered in the risk evaluation practice, that is, different experts may give out different judgments about the combination mode of many risk factors, when some other risk factors status is changed or some risk event occurs owing to these risk factors. It was proposed to fuse these combination relationships using the reasoning theory. Three types of inferior value nodes were adopted to describe three kinds of risk consequence, and the rolling method was developed to compose different inferior value nodes.
    The conditional distribution of the schedule about the cost was deduced. And the estimation method of correlation coefficient between the schedule and the cost based on the historical data was proposed.
    Later, the risk of the Hypersonic Demostration System development project was
引文
[1] Greenfield M. A. Risk Management Tools[M]. Langley Research Center, 2000
    [2] 郭仲伟.风险分析与决策[M].北京:机械工业出版社,1987
    [3] Management of risk and uncertainty in systems acquisition: Proceedings of the 1983 Defense Risk and Uncertainty Workshop[C]. Fort Behavior, NTIS: AD-A136230/0/HDM,1983: ⅳ
    [4] 徐宗昌.《武器装备寿命周期费用估算》实施指南[M].北京:总装备部技术基础管理中心,2004
    [5] 邹国晨.武器装备采办管理[M].北京:国防工业出版社,2003
    [6] 李积源.舰船装备经济性分析[M].海军工程学院,1997
    [7] Evans R. NASA continuous risk management process, www.incose.org/chesapek/meetings/continuous_Risk_Management_Process.pdf
    [8] Risk management guide for DoD acquisition[M]. Defense Systems Management College Press, 2003
    [9] Rafetery J. Risk analysis in project management[M]. London, New York, E&FN Spon, 1994
    [10] 沈建民.项目风险管理[M].北京:机械工业出版社,2003
    [11] 卢有杰,卢家仪.项目风险管理[M].北京:清华大学出版社,1998
    [12] 郭鹏,朱煜明,梁工谦.基于全寿命周期的航空武器装备风险识别研究[J].西北工业大学学报(社会科学版),2003,23(4):37-39
    [13] 上官景浩.航空武器装备全寿命周期风险识别与评估研究[D].西安:西北工业大学,2003
    [14] 杨立红.面向全寿命周期的航空武器装备项目风险识别研究[D].西安:西北工业大学,2004
    [15] 毛远英.航天型号研制项目风险识别与评估方法研究[D].西安:西北工业大学,2005
    [16] 周平,姜寿山.航空产品研制项目的风险识别特征-因子建模技术研究[J].计算机集成制造系统,2003,9(7):542-545
    [17] 符志民.航天项目风险管理[M].北京:机械工业出版社,2005
    [18] 徐哲.军品科研项目从预研到型号的技术风险分析与控制[J].北京:北京航空航天大学,2000
    [19] 濮秀君.军工研发项目费用风险分析及管理策略研究[D].北京:北京航空航天大学,2002
    [20] 管清波,罗小明,杜红梅.模糊综合评判法在装备采办风险评价中的应用研究[J].装备指挥技术学院学,2002,13(4):18-20
    [21] 沈国柱.风险模糊分析法[J].系统工程与电子技术,2000,22(10):90-93
    [22] 何亮.航空型号项目技术风险分析与规避策略研究[D].西安:西北工业大学,2001
    [23] 刘进.航天项目风险管理研究[D].哈尔滨:哈尔滨工业大学,2002[24] 徐哲,冯允成,鲁大伟.武器装备研制项目的技术风险评估[J].系统工程与电子技术,2005,27(6)
    [25] 郭鹏.航空武器装备全寿命周期风险评估方法比较与改进[J].航空学报,2003,24(5):427-430
    [26] 程军伟.装备项目中技术风险等级的模糊综合评判[J].洛阳大学学报,2003,18(2):19-22
    [27] 施品贵.高技术项目风险评价方法研究[D].西安:西北工业大学,2005
    [28] 何明,李金林,韩晓.科研项目研制工艺路线风险的灰色模糊评价[J].北京工商大学学报,2004,22(1):51-53
    [29] 宋春雳,冉伦,李金伦.熵权双基点法在武器装备研制风险评估中的应用[J].北京理工大学学报(社会科学版),2003,5(5):77-88
    [30] Probabilistic risk assessment of the space shuttle-a study of the potential of losing the vehicle during nominal operation[R]. Science Application International Corporation, Advanced Technology Division, New York, NASA-CR-197808. 1995, 1(2): 28
    [31] National Research Council. Post-Challenger Evaluation of Space Shuttle Risk Assessment and Management[M]. National Academy Press, 1988
    [32] Preyssl C. Safety risk assessment and management-the ESA approach[J]. Reliability Engineering and System Safety, 1995, 49(3): 303-309
    [33] 顾基发,赵丽艳.航天系统安全性分析的概率风险评估方法[J].系统工程与电子技术,1999,21(8):28-31
    [34] 董献洲,徐培德.基于PRA方法的风险分析系统设计[J].系统仿真学报,2001,13(6):756-758
    [35] 张新军.战略导弹研制的概率风险评估方法研究[D].长沙:国防科技大学,2000
    [36] 张怀强,李积源,黎放.武器系统研制进度风险分析方法研究[J].海军工程大学学报,2000,12(2):93-96
    [37] 张凤鸣,沈建明,惠晓滨,吴伟.基于Monte Carlo仿真的重大型号工程进度风险研究[J].空军工程大学,2003,4(5):7-9
    [38] 邱万国,徐国英,邢俊文.进度风险的随机网络建模与仿真分析[J].装甲兵工程学院学报,2005,19(1)
    [39] 吕建伟,刘中华,高杰.舰船研制的技术风险问题分析[J].海军工程大学学报,2000,12(2):97-99
    [40] 刘晓东.复杂工程系统概念设计技术风险分析方法[J].装备指挥技术学院学报,2004,15(6):60-63
    [41] 吕建伟,刘中华,刘军.军.舰船武器装备研制风险决策的有关判据分析[J].舰船科学技术,2001,22(6):26-29
    [42] 李平,黄胜.舰船装备研制的风险分析与处理[J].哈尔滨工程大学学报,2005,26(2)
    [43] 王光远.未确知信息及其数学处理[J].哈尔滨建筑工程学院学报,1990,4(4):1-6
    [44] 刘开第,吴和琴,庞彦军.不确定信息处理及应用[M].北京:科学出版社,1997
    [45] 王建国.武器装备项目风险因子的未确知模糊评判法[D].长沙:国防科技大学,2002[46] Tieu B., Kropp J., Lozzi N. The unmaned space vehicle cost model-past, present, and future[A]. AIAA Space 2000 Conference & Exposition[C]. AIAA-A0042888, 2000
    [47] MacKenzie D. Cost estimation relationship regression variance study[A]. AIAA Space 2003 Conference[C]. AIAA-A0343682, 2003
    [48] Young P. H. FRISK-Formal risk assessment of system cost estimates[A]. 1992 Aerospace Design Conference[C], Irvine, CA, AIAA-92-1-54, 1992
    [49] DoDson E.N.如何进行准确的初始成本估算[M].李德光等译.航天部计划司印发,1987(12)
    [50] 张文翰.型号研制费用模型研究工作程序[A].管理模型文集(第三辑).北京:航天工业管理编辑部,1988(5)
    [51] 李德光.航天型号研制费用估算中的不确定性理论及其应用[D].哈尔滨:哈尔滨工业大学,2001
    [52] 郭明亮,高彤,李丽虹,高国安.方案风险分析与评价系统的设计与实现[J].计算机工程与应用,2002,38(7):229-230
    [53] 吴晓云,马大为,赵磊.火箭武器研制项目风险分析智能决策支持系统研究[J].弹箭与制导学报,2004,24(2):51-54
    [54] Constructing successful business relationships-innovation in contractual incentives[R], http://dasapp.saalt.army.mil/library/final/appenD.htm
    [55] Risk management programs for defense acquisition systems[R], NTIS: ADA370901/XAB,1996: 3
    [56] Cochran E. B., Rowe A. J. The sources of disruption to project cost and delivery performance[A], Proceedings of the 8th DoD Symposium on Acquisition Research[C], 1978
    [57] Proceedings of Management of Risk and Uncertainty in the Acquisition of Major Programs[R], NTIS: AD-A100 546/1/XAB, 1981
    [58] Moeller G. L. Operations planning with VERTM[J]. Operations Research, 1981, 29(4): 676-697
    [59] Vincent P. S. Estimating engineering cost risk using logistic and multiple regression[D], http://www.ida.org/DIVISIONS/card/initiativeshandbook/inithbook.pdf
    [60] Ireland L. R. Risk Management Model for the Defense System Acquisition Process[R], AD-P002 313/5/HDM, 1983
    [61] Ingalls E. G., Schoeffel P. R. Risk assessment for defense acquisition management[R], NTIS: AD-P002 303/6/HDM, 1983
    [62] Haimes Y., Chankong V. Risk management for weapon systems acquisition: a decision support system[R], NTIS: AD-A154 976/5/HDM, 1985
    [63] Risk management: concepts and guidance[M]. Defense Systems Management College Press, 1989
    [64] Simpleman L., McMahon P. B., Evans K., Lloyd J., Risk management guide for DoD acquisition[M], Defense Systems Management College Press, 1998[65] Harrison W. G. Methodology for Assessing Acquisition Technical Risk[R], NTIS:ADA255 130/7/HDM, 1992
    [66] Lansdowne Z. F. Risk matrix: an approach for prioritizing risks and tracking risk mitigation progress[A]. Proceedings of the 30th Annual Project Management Institute 1999 Seminars & Symposium[C]. Philadelphia, USA, 1999
    [67] Paul R., Garvey P. R., Lansdowne Z. F. Risk matrix: an approach for identifying, assessing, and ranking program risks[J]. Air Force Journal of Logistics, 1998, 25: 16-19
    [68] Mavris D. N., Kirby M. R. Technology Identification, Evaluation, and Selection for Commercial Transport Aircraft[R], SAWE Paper No.2456, 1999
    [69] Kirby M. R., Mavris D. N. Forecasting technology uncertainty in preliminary aircraft design[R], AIAA99-01-5631, 1999
    [70] Fox G., Ebbeler D. Jorgensen E. The use of cluster analysis techniques in spaceflight project cost risk estimation[A]. Space 2003 Conference[C], Longbeach,CA, 2003, AIAA: 2003-6298
    [71] Lackey J. B. The derivation of total risk by factoring complexity metrics into the risk analysis process[A]. 41st Aerospace Science Meeting and Exhibit[C], Reno, Neveda, 2003, AIAA-2003-1178, 2003
    [72] 詹原瑞.影响图理论方法与应用[M].天津:天津大学出版社,1995
    [73] Howard R. A., Matheson J. E. Influence diagrams [A] (dated 1981). In Howard R. A., Matheson J. E.(Eds.) Readings on the Principles and Applications of Decision Analysis[C] (2). Strategic Decisions Group, Menlo Park, California, 1984: 719-762
    [74] Tatman J. A. Decision processes in influence diagrams: formulation and analysis[D]. Stanford Uni., 1985
    [75] Kenley C. R. Influence diagrams models with continous variables[D]. Stanford Uni., 1986
    [76] Chan B. Y. Structural controllability and observability in influence diagrams[D]. Stanford Uni., 1993
    [77] Chyu C. C. Computing probabilities and probabilistic influence diagrams[D].Barkley, California Uni., 1990
    [78] 董志强.决策影响图理论和概率推理研究[D].北京:北京航空航天大学,1994
    [79] 王胜利.影响图理论和应用的研究[D].北京:航空航天大学,1991
    [80] 葛晓东.影响图信念网络的理论和应用研究[D].天津:天津大学,1993
    [81] Bellazzi R., Quaglini S. Reusable influence diagrams[J]. Artificial Intelligence in Medicine, 1994, 6(6): 483-500
    [82] Henrion M. Reusable influence diagram modules for rapid program planning and decision analysis[R]. NTIS: ADA308774
    [83] 周受钦,傅琼,谢友柏.分类决策影响图拓扑层的自动生成[J].系统工程理论方法应用,1999,8(2):49-59
    [84] Wu X., Poh K. L. Decision-model construction with multilevel influence diagrams[J].??Knowledge Engineering Review, 2000, 15(3): 233-256
    [85] Fagiuoli E., Zaffalon M. A note about redundancy in influence diagrams[J]. International Journal of Approximate Reasoning, 1998, 19(3-4):351-365
    [86] Kim J. K., Lee Kun C. Hybrid of neural network and decision knowledge approach to generating influence diagrams[J]. Expert Systems with Applications, 2002, 23(3): 237-244
    [87] Madsen A.L., Jensen P. Mixed influence diagrams[A]. Symbolic and qauntitative approaches to reasoning with uncertainty[C], Springer Verlag, Heidelberg, Germany, 2003:208-219
    [88] Rodriguez-Muniz L. J., Lopez-Diaz M., Gil M. A. Solving influence diagrams with fuzzy chance and value nodes[J]. European Journal of Operational Research, 2005, 167(2): 444-460
    [89] Olmsted S. M. On representing and solving decision problems[D]. Stanford Uni., 1983
    [90] Shachter R. D. Evaluating influence diagrams[J]. Operations Research, 1986, 34(6): 871-882
    [91] Shachter R. D., Ndilikilikesha P. C. Using potential influence diagrams for probabilistic inference and decision making[A]. In Heckerman D., Mamdani A.(Eds.): Proceedings of the 9th Conference on Uncertainty in Artificial Intelligence[C], Washington D. C. Morgan Kaufmann, San Mateo, California, 1993
    [92] Ndilikilikesha P. C. Potential influence diagram[J]. International Journal of Approximate of Reasoning, 1994, 10(3): 251-285
    [93] Shenoy P. P. Valuation-based systems for Bayesian decision analysis[J]. Operations Research, 1992, 40(3):463-484
    [94] Cooper G. F. A method for using belief networks as influence diagrams [A] (dated 1988). In Ross D. Shachter, Tod S. Levitt, Laveen N. Kanal, John F. Lemmer (Eds.): Proceedings of the Fourth Annual Conference on Uncertainty in Artificial Intelligence[C]. North-Holland, 1990:55-63
    [95] Shachter R. D., Peot. Decision making using probabilistic inference methods[A]. In Didier Dubois, Michael P. Wellman(Eds.) :Proceedings of the 8th Conference on Uncertainty in Artificial Intelligence[C], Stanford University, Stanford, CA., 1992:276-283
    [96] Zhang N.L. Probabilistic inference in influence diagrams[A]. In Gregory F. Cooper, Serafin Moral (Eds.): Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence[C], University of Wisconsin Business School, Madison, Wisconsin, USA, Morgan Kaufmann, 1998:514-522
    [97] Fagiuoli E., Zaffalon M. A note about redundancy in influence diagrams[J]. International Journal of Approximate Reasoning, 1998, 19: 351-365
    [98] Shachter R. Bayes-ball: the rational past time[A]. Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence[C], Morgan Kaufmann Publishers, San??Francisco, CA. 1998: 48-87
    [99] Shachter R. Efficient value of information computation[A]. Proceedings of the 15th Conference on Uncertainty in Artificial Intelligence[C], Morgan Kaufmann Publishers, San Francisco, CA. 1999:594-601
    [100] Nielsen T. D., Jensen F. V. Well-defined decision scenarios[A]. Proceedings of the 15th Conference on Uncertainty in Artificial Intelligence[C], Morgan Kaufmann Publishers, San Francisco, CA. 1999: 502-511
    [101] Lauritzen S. L., Nilsson T. D. LIMIDs of decision problems[J]. Management Science. 1999
    [102] Nilsson T. D., Lauritzen S. L. Evaluating influence diagrams using LIMIDs[A]. In Craig Boutilier, Moises Goldszmidt(Eds.): Proceedings of the 16th Conference in Uncertainty in Artificial Intelligence[C], Stanford University, Stanford, California, USA, Morgan Kaufmann, 2000:436-445
    [103] Jensen E, Jensen F. V. Dittmer S. L. From influence diagram to junction trees. In Ramon Lopez de Mantaras, David Poole (Eds.): Proceedings of the 10th Annual Conference on Uncertainty in Artificial Intelligence[C], Seattle, Washington, USA. Morgan Kaufmann 1994:367-373
    [104] Lepar V., Shenoy P. P. A comparison of Lauritzen-Spiegelhalter, Hugin, and Shenoy-Shafer architectures for computing marginals of probability distributions[A]. In Gregory F. Cooper, Serafin Moral(Eds.): Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence[C], University of Wisconsin Business School, Madison, Wisconsin, USA. Morgan Kaufmann, 1998:328-337
    [105] Madsen A. L., Jensen F. V. Lazy propagation: a junction tree inference algorithm based on lazy evaluation[J]. Artificial Intelligence, 1999,113(1-2): 203-245
    [106] Nilsson D., Lauritzen S. Solving influence diagrams using HUGIN, Shafer-Shenoy and Lazy Propagation[A]. In Jack S. Breese, Daphne Koller (Eds.): Proceedings of the 17th Conference in Uncertainty in Artificial Intelligence[C], University of Washington, Seattle, Washington, USA. Morgan Kaufmann, 2001: 337-345
    [107] Agogino A. M. Using probabilistic influence in diagnostic expert system[A]. Proceeding of the 1985 ASME International Computer in Mechanical Engineering[C], Boston, MA. 1985:305-310
    [108] Agogino A. M., Rege A. Topological framework for representing and solving probabilistic inference problems in expert systems[J]. IEEE Transactions on Systems, Man, and Cybernetics, 1988, 18(3): 402-414
    [109] Gottingera H. W., Weimann H. P. Intelligent inference systems based on influence diagrams[J]. Decision Support Systems, 1995, 15: 27-43
    [110] Jae-Hyeon A., Kazuo J. E. Decision support for real telemarketing operations through Bayesian network learning[J]. Decision Support Systems, 1997, 21: 17-27
    [111] Virtanen K., Raivio T. Hamalainen R. P. Modeling pilot's sequential maneuvering??decisions by a multistage influence diagram[J]. Journal of Guidance, Control, and Dynamics, 2004, 27(4): 665-677
    [112] Virtanen K., Raivio T. Hamalainen R. P. Modeling pilot's sequential maneuvering decisions by a multistage influence diagram[A], AIAA Guidance, Navigation and control Conference and Exhibit[C], Montreal, Canada, AIAA-2001-4267, 2001
    [113] Virtanen K., Raivio T. Hamalainen R. P. An influence diagram approach to One-on-One air combat, http://citeseer.ist.psu.edu/rd/0,544045,1,0.25, Download/http:qSqqSqwww.sal.hut.fiqSqPublicationsqSqpdf-filesqSqpvir02.pdf
    [114] Virtanen K., Raivio T., Hamalainen R. P. Modeling pilot decision making by an influence diagram[A]. AIAA-98-4537, 1998
    [115] 董彦非,申洋,张恒喜.空战机动决策问题中的影响图方法[J].电光与控制,2001,81(1):48-53
    [116] 董彦非,郭基联.空战机动决策方法研究[J].火力与指挥控制,2002,(2):75-78
    [117] Attoh-Okine N.O., Roddis W. M. K. Uncertainties of asphalt layer thickness determination in flexible pavements-influence diagram approach[J]. Civil Engineering and Environmental Systems, 1998, 15(2): 107-124
    [118] Deboys J. Decision pathways in patent searching and analysis[J]. World Patent Information. 2004, 26: 83-90
    [119] Meyer J., Phillips M. H., Cho P. S., Kalet I., Doctor J. N. Application of influence diagrams to prostate intensity-modulated radiation therapy plan selection[J]. Physics in Medicine and Biology, 2004, 49(9):1637-1653
    [120] Smith J. Q. Handling multiple sources of variation using influence diagrams[J]. European Journal of Operational Research, 1995, 86(2): 189-200
    [121] Sachon M., Pate-Cornell E. Delays and safety in airline maintenance[J]. Reliability Engineering and System Safety, 2000, 67(3):301-309
    [122] Gocay K., Bilgic T. Troubleshooting using probabilistic networks and value of information[J]. International Journal of Approximate Reasoning. 2002, 29:107-133
    [123] Kim Y., Alan K.W., Chung C. H., Kim K. Y., Yang J. E. Use of influence diagrams and fuzzy theory to develop assessment method of organizational influences on component maintenance[A]. 10th International Conference on Nuclear Engineering, Arlington[C], VA, USA. 2002, 4: 759-764
    [124] Suryadi D., Gmytrasiewicz P. J. Learning models of other agents using influence diagrams[A]. In Preceedings of the 1999 International Conference on User Modelling[C], Banf, CA., http://citeseer.nj.nec.com/5810.html, 1999
    [125] Mudgal C., Vassileva J. An influence diagram model for multi-agent negotiation[A]. In Proceedings of the 2000 International Conference on Multi-Agent Systems[C]. Boston, http://julita.usask.ca/Texte/68_Vassileva.ps, 2000
    [126] Koller D., Milch B. Multi-agent influence diagrams for representing and solving games[A], http://citeseer.nj.nec.com/koller01multiagent.html, 2001[127] Koller D., Milch B. Multi-Agent influence diagrams for representing and solving games[A]. The First World Congress of the Game Theory Society[C].http://www.cs.berkeley.edu/~milch/papers/geb03maids.html, 2003
    [128] Maes S., Tuyls K. Manderick B. Modelling a multi-Agent environment combining influence diagrams[A]. In Proceedings of the International Conference on Intelligent Agents, Web Technology and Internet Commerce[C]. Las Vegas, USA. http://como.vub.ac.be:8080/Publications/uploads/1/iawtic01.PDF, 2001
    [129] 陆宝春.基于知识影响图的多主体集成诊断与决策[J].南京理工大学学报.2003,27(3):281-285
    [130] 张润梅,王浩,姚宏亮,方宝富.一种基于影响图的决策方法及在RoboCup中的应用[J].合肥工业大学学报(自然科学版),2004,27(4):388-391
    [131] Tatman Joseph A., Shachter R. D. Dynamic programming and influence diagrams[J]. IEEE Transactions on Systems, Man and Cybernetics, 1990, 20(2): 365-379
    [132] 董志强,赵勇.库存问题的子值节点决策影响图方法[J],中国管理科学,2003(2):50-54
    [133] Application decision analysis decision system. Decision Programming Language(DPL). Application Decision Analysis, Menlo Park CA, 1991
    [134] http://bndev.sourceforge.net/
    [135] http://www.ai.mit.edu//~murphyk/Software/BNT/bnt.htmlo
    [136] http://www.research.microsoft.com/adapt/MS BNx/
    [137] http://www.lumina.com
    [138] http://www.hugin.dk
    [139] http://www.norsys.com/
    [140] Ashley D.B., Stokes S.L., Perng Y. H. Combing multiple expert assessments for construction risk identification[A]. Proceedings of the International Offshore Mechanics and Arctic Engineering Symposium(Ⅵ), Houston, TX. USA. 1988:183-192
    [141] Diekmann J. E. Risk Analysis: Lesson from artificial Intelligence[J]. International Journal of Project Management, 1992(2)
    [142] Huseny A. B., Skogen S. Dynamic risk analysis: the DynRisk concept[J]. International Journal Project Management, 1992, 30: 160-165
    [143] Chee T. S., Yeo K. T. Risk analysis of a build-operate-transfer (B.O.T) power plant project[J]. IEEE International Engineering Management Conference, Singapore, 1995, 275-280
    [144] Hong Y., Apostolakis G. E. Conditional influence diagrams in risk management[J]. Risk Analysis, 1993, 13(6)
    [145] Apostolakis G. E., Bell D. C. Modeling the public as a stakeholder in environmental risk decision making[A]. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics[C],Vancouver, BC, Can. 1995: 1021-1026
    [146] Chee C.L., Vjj V., Ramamoorthy C. V. Using influence diagrams for software risk??analysis[A]. Proceedings of the 1995 IEEE 7th International Conference on Tools with Artificial Intelligence[C], Herndon, VA. USA. 1995: 128-131
    [147] Burgess C. J., Dattani I. Hughes G., May J. H. R., Rees K. Using influence diagrams in software change management[A]. 7th International Conference on Software Quality Management[C], Software Quality Management Ⅶ, Bristish Computer Society, March 1999: 177-187
    [148] Attoh-Okine N. O., Ahmad I. Application of Bayesian influence diagrams to risk analysis of highway construction costs[C]. Proceedings of the 2nd Congress on Computing in Civil Engineering(2), Atlanta, GA. USA. 1995: 863-869
    [149] Wyss G. D., Fletcher S. K., Halbgewachs R. D., Jansma R. M., Lim J. J., Murphy M., Sands P. D. Toward a risk-based approach to the assessment of the surety of information systems[A]. Proceedings of the 1995 ASME/JSME Pressure Vessels and Piping Conference[C], Honolulu, HI. USA. 1995: 529-535
    [150] Thompson K. D., Stedinger J. R., Heath D. C. Evaluation and presentation of dam failure and flood risks[J]. Journal of Water Resources Planning and Management, 1997, 123(4): 216-227
    [151] Armacost R. L., Pet-Edwards J. Integrative risk and uncertainty analysis for complex public sector operational systems[J]. Socio-Economic Planning Sciences, 1999, 33: 105-130
    [152] Markus S., Hans-Joachim L. Best time and content for notification[A]. Proceedings of the TIME01 International Symposium[C], Cividale, Italy, 2001
    [153] Hokstad P., Jersin E., Sten. T. A risk influence model applied to North Sea helicopter transport[J]. Reliability Engineering and System Safety, 2001, 74(3): 311-322
    [154] 高佳,黄祥瑞.考虑组织与管理因素影响的人误概率计算方法核动力工程,1996,17(1):90-96
    [155] Nessim M., Stephens M. Quantitative risk-analysis model guides maintenance budgeting[J]. Pipe Line & Gas Industry, 1998, 81(6): 33-38
    [156] Attoh-Okine N. O. Potential application of influence diagram as a risk assessment tool in Brownfields sites[R]. ASTM Special Technical Publication, 1999: 148-159
    [157] Casman E., Fischhoff B., Small M., Dowlatabadi H., Rose J., Morgan M. G. Climate change and cryptosporidiosis: a qualitative analysis[J]. Climate change, 2001, 50(1-2): 219-249
    [158] Fukuoka H. Reliability evaluation method for the railway system: A model for complicated dependency[J]. Quarterly Report of Railway Technical Research Institute(Japan). 2002, 43(4): 192-196
    [159] Fayerweather W. E., Collins J. J., Schnatter A. R., Hearne E T., Menning, R. A., Reyner D. P. Quantifying uncertainty in a risk assessment using human data[J]. Risk Analysis, 1999, 19(6): 1077-1090
    [160] Yu D. H., Xing L. M., Kastenberg W. E., Okrent D. Evaluation of a severe accident??management strategy for boiling water reactors-drywell flooding[J]. 1994, 106(2): 139-154
    [161] 刘金兰,韩文秀,李光泉.关于认知影响图方法的研究[J].系统工程学报,1997,12(1):87-95
    [162] 刘金兰.大型工程建设项目风险分析认知影响图方法[D].天津:天津大学,1994
    [163] 刘金兰,韩文秀,李光泉.关于工程项目风险分析的模糊影响图方法[J].系统工程学报,1994,9(2):82-88
    [164] 郑文瑞.油气勘探项目经济风险分析方法研究[D].长春:吉林大学,2002
    [165] 陈晨.决策影响图在风险分析中的研究与应用[D].天津:天津大学,1993
    [166] 刘玉杰.高斯影响图在大型工程风险分析中的应用研究[D].天津:天津大学,1995
    [167] 黄海燕.基于概率影响图的海洋平台安全风险评估方法研究[D].天津:天津大学,1996
    [168] 罗桦槟.海洋平台安全风险分析[D].天津:天津大学,1997
    [169] 石晓军.项目投资风险分析方法研究:一种基于影响图的解析方法[D].北京:中国矿业大学,1998
    [170] Gardenier J. S. Successful acquisition risk management: a concept[R], NTIS: AD-P002 312/7/HDM, 1983
    [171] 毕义明,王莲芬,李虹文.核安全定量评估的模糊—证据推理方法[J].系统工程与电子技术,2003,25(12):1501-1504
    [172] Yager R R. On the Dempster-Shafer framework and new combination rules[J]. Information System, 1989, 41(2): 93-137
    [173] Jun S. H., Poong H. S. A method for risk-informed safety significance categorization using the analytic hierarchy process and bayesian belief networks[J]. Reliability Engineering and System Safety, 2004, 83: 1-15
    [174] Schon W., Odeh K. A new approach to assess risk in water treatment using the belief function framework[A]. 2003 IEEE International Conference on Systems, Man and Cybernetics[C](2), 2003: 1792-1797
    [175] 杨春.一个证据推理模型及其在专家意见综合中的应用[J].系统工程理论与实践,2001,16(4):43-48
    [176] 鞠彦斌,冯允成,姚李刚.基于证据推理理论的软件开发风险评估方法[J].系统工程理论方法应用,2003,12(3):218-223
    [177] 符志民.航天项目风险管理[M].北京:机械工业出版社,2005
    [178] 风险分析与管理指南[J].国防科工委军用标准化中心译.美国防务系统管理学院,1992,北京:航空工业出版社
    [179] 国防采办风险管理[J].军用标准化中心译.防务系统管理学院.国防部采办大学,2000
    [180] Simpleman L., McMahon P., Bahnmaier B., Evans K., Lloyd J. Risk management guide for DoD acquisition[M]. Defense Systems Management College Press, 2003
    [181] Risk management: concepts and guidance[M]. Defense Systems Management College??Press, Virginia, 1989
    [182] Mayer K. R. Development of the advanced Medium-Range Air-to-Air missile: a case study of risk and reward in weapon system acquisition, NTIS: AD-A282 312/8/HDM, 1996
    [183] 李积源.舰船装备经济性分析[M].海军工程学院,1997
    [184] 张登成,唐硕.美国重复使用运载器的发展历史、现状及启示,导弹与航天运载技术,2003,5:20-27
    [185] 徐宗昌.武器装备寿命周期费用估算实施指南[J].总装备部技术基础管理中心,2004
    [186] 符志民,李汉铃.航天研发项目风险分析、等级评估及相关性研究[J].系统工程与电子技术,2005,27(1)
    [187] Bailey R. D. Analysis of current Department of Defense risk management practices in weapon system acquisition: a case study of the Advanced Amphibious Assault Vehicle(AAAV) PDRR and SDD risk management practices[D]. Naval postgraduate school, 2003
    [188] Karafa P. A. An analysis of risk management methods employed within the Advanced Amphibious Assault Vehicle acquisition program[D]. Naval postgraduate school, 1995
    [189] NASA Risk Management Procedures and Guidelines[Z], NPG 8000.4, 25, April 2002
    [190] Williams T. M. The two dimensionality of project risk[J]. International Journal of Project Management. 1996, 14(3): 185-186
    [191] 张建设,钟登华.工程项目风险的多维功效函数评价方法研究[J].洛阳大学学报,2002,17(2):48-53
    [192] 傅鸿源.工程项目风险评价方法的研究[J].系统工程理论与实践.1995,15(10):55-58
    [193] Williams T. M. Risk management infrastructures[J]. International Journal of Project Management, 1993(11)
    [194] Williams T. M. Using a Risk Register to Integrate Risk Management in Project Definition[J]. International Journal of Project Management, 1994(1)
    [195] He Z. Risk management for overeas constuction projects[J]. International Journal of Project Management, 1995(4)
    [196] 高存厚,荣明宗.飞行器系统工程[M].北京:宇航出版社,1996
    [197] Dawid A. P. Conditional independence in statistical theory[J]. Journal Royal Statistics Society, 1979, 41(1): 1-33
    [198] Riss T. Quantifying the value of information[J]. Petroleum Engineer International, 1999,(6): 48-52
    [199] 杨元梁.风险决策下的设备更新分析[J].林业机械与木工设备,2001,29(3):26-28
    [200] 陈埏.决策分析[M].北京:科学出版社,1997
    [201] Shafer G. A mathematical theory of evidence[J]. Princeton University Press. Princeton NJ, 1976
    [202] Takahiko H. A new theory of evidence for nonexclusive elementary proposition[J]. International Journal of System Science, 1996, 27(10): 989-994[203] Takahiko H. Decision rule for pattern classification by integrating interval feature values[J]. Pattern Analysis and Machine Intelligence, 1998, 20(4): 440-447
    [204] Toshiyuki H. Interdependence between safety-control policy and multiple-sensor schemes via Dempster-Shafer theory[J]. IEEE Transactoin on Reliability, 1991, 40(2): 182-188
    [205] Matsuyama T. Belief formation observation and belief integration using virtual belief space in Dempster-shafer probability model[A]. International Proceedings of the 1994 IEEE on Multisens or Fusion and Integrating for Intelligent System. LosVegas, 1994. 379-386
    [206] 张山鹰,潘泉,张洪才.一种新的证据推理组合规则[J].控制与决策.2000,15(5):540-544
    [207] 陈寅,林良明,颜国正.D-S证据推理在信息融合应用中存在的问题及改进[J].系统工程与电子技术,2000,22(11):69-72

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700