1Hornik K, Stinchcombe M, White H. Multilayer feedforward networks are universal approximators. Neural Networks, 1989, 2(5):359~366
2Blum E K, Li L K. Approximation theory and feed forward networks. Neural Networks, 1991,4 (4): 511~515
3Huang S C, Huang Y F. Bounds on number of hidden neurons in multiplayer perceptrons. IEEE Trans on Neural Networks,1991, 2(1) :47~55
4Sartori M A, Antsaklis P J. A simple method to drive bounds on the size and to train multiplayer neural networks. IEEE Trans on Neural Networks, 1991, 2(3): 467~471
5Reed R. Pruning algorithm--a survey. IEEE Trans on Neural Networks, 1993,4(5) :740~747
5Muhlauer W K. Pipeline risk management manual [M]. Gulf Publishing Company, 1996.20-35.
6Jo Y D, Ahn B J. A method of quantitative risk assessment for transmission pipeline carrying natural gas[J]. Journal of Hazardous Materials, 2005, 123 (1-3) : 1-12.
7Gemela J.Financial analysis using bayesian networks [J],Applied Stochastic Models in Business and Industry, 2001, 17 ( 1 ) : 57-67.
8Hideo T, Fan LT, Laif S. Fault-tree analysis by fuzzy probability[J]. IEEE Transactions on Reliability, 1983, 32 (5): 453-457.