{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:16:49Z","timestamp":1729610209419,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/smc.2016.7844697","type":"proceedings-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T10:57:47Z","timestamp":1486724267000},"page":"003002-003007","source":"Crossref","is-referenced-by-count":0,"title":["A study on the assessment of power system security risk based on grey clustering and maximum entropy theory"],"prefix":"10.1109","author":[{"family":"Peng Peng","sequence":"first","affiliation":[]},{"family":"Liu Sifeng","sequence":"additional","affiliation":[]},{"family":"Mi Chuanmin","sequence":"additional","affiliation":[]},{"family":"Tao Jing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Grey theory basis","year":"2002","author":"deng","key":"ref10"},{"key":"ref11","first-page":"7","article-title":"Grey information theory and practical applications","author":"liu","year":"2006"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/S0167-6911(82)80025-X","article-title":"The Control problem of grey systems","volume":"1","author":"deng","year":"1982","journal-title":"Systems &control Letter"},{"key":"ref13","first-page":"185","article-title":"The society evaluation model based on grey clustering and its empirical study of cities under province","volume":"18","author":"chi","year":"2010","journal-title":"Chinese Journal of Management Science"},{"key":"ref14","first-page":"13","article-title":"Clustering analysis on regional economic development level in Jiangsu Province","author":"li","year":"2011","journal-title":"China Business"},{"article-title":"analysis on social and economic development level in Jilin Province","year":"2006","author":"cluster","key":"ref15"},{"key":"ref16","first-page":"271","article-title":"Research on large-scale group language assessing information based on grey clustering","volume":"27","author":"wang","year":"2012","journal-title":"Control and Decision"},{"key":"ref17","first-page":"568","article-title":"A development of entropy optimization methods","author":"aladdin","year":"2006","journal-title":"WSEAS Transactions on Mathematics"},{"key":"ref18","first-page":"362","article-title":"Statistical and comparative evaluation of various indexing and search models","author":"samir","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref19","first-page":"628","article-title":"A combination model and application for the water quality evaluation","volume":"85","author":"zhu","year":"2009","journal-title":"Journal of WSEAS Transactions on Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.907591"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1109\/59.260818","article-title":"A minimum cost assessment method for composite generation and transmission system expansion planning","volume":"8","author":"li","year":"1993","journal-title":"IEEE Trans on Power Systems"},{"key":"ref6","first-page":"258","article-title":"Online risk-based security assessment","author":"ni","year":"2003","journal-title":"IEEE Trans on Power Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.993975"},{"key":"ref8","first-page":"122","article-title":"systems theory and application","author":"liu","year":"2010"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1109\/TPWRS.2003.814909","article-title":"Software implementation of online risk-based security assessment","volume":"18","author":"ni","year":"2003","journal-title":"IEEE Trans on Power Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/ip-c.1991.0029"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PESS.1999.784342"},{"key":"ref9","first-page":"10","article-title":"information theory and practical applications","author":"liu","year":"2006"},{"key":"ref20","first-page":"49","volume":"175","year":"1997","journal-title":"Task Force 38 03 12 Power System Security Assessment A Position Paper Electra"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/59.962405"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.879249"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.02.013"}],"event":{"name":"2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","start":{"date-parts":[[2016,10,9]]},"location":"Budapest, Hungary","end":{"date-parts":[[2016,10,12]]}},"container-title":["2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7830913\/7844217\/07844697.pdf?arnumber=7844697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:18:25Z","timestamp":1498371505000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7844697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/smc.2016.7844697","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}