{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,26]],"date-time":"2026-04-26T15:34:48Z","timestamp":1777217688389,"version":"3.51.4"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51779267"],"award-info":[{"award-number":["51779267"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["17CX05022"],"award-info":[{"award-number":["17CX05022"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["14CX02197A"],"award-info":[{"award-number":["14CX02197A"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Program for Changjiang Scholars and Innovative Research Team in University","award":["IRT_14R58"],"award-info":[{"award-number":["IRT_14R58"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/tii.2018.2858281","type":"journal-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T22:29:21Z","timestamp":1532384961000},"page":"2146-2157","source":"Crossref","is-referenced-by-count":219,"title":["Application of Bayesian Networks in Reliability Evaluation"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4499-492X","authenticated-orcid":false,"given":"Baoping","family":"Cai","sequence":"first","affiliation":[]},{"given":"Xiangdi","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Yonghong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiaobing","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Hongqi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Renjie","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2008.06.009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2012.06.010"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2009.05.009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.03.013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.02.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s12204-016-1775-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2016.05.015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.064"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2017.03.023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.06.004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.09.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2015.06.011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2017.08.028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.03.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jspi.2008.05.042"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.05.003"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1049\/iet-gtd.2014.0365","article-title":"Incorporation of protection system failures into bulk power system reliability assessment by Bayesian networks","volume":"9","author":"seifi","year":"2015","journal-title":"IET Gener Transmiss Distrib"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2014.0660"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2015.09.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.08.011"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/3468.634636"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2012.07.006"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.ress.2015.06.007","article-title":"A general cause based methodology for analysis of common cause and dependent failures in system risk and reliability assessments","volume":"145","author":"connor","year":"2016","journal-title":"Rel Eng Syst Safety"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.03.012"},{"key":"ref59","first-page":"1248","article-title":"Bayesian network enhanced with structural reliability methods: Methodology","volume":"10","author":"straub","year":"2009","journal-title":"J Eng Mech"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4730(01)00017-0"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)EM.1943-7889.0000024"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1115\/1.4031899"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1115\/1.4032376"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpvp.2016.11.002"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.strusafe.2016.05.005"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.marstruc.2017.03.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2012.03.016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2431224"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2695583"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2018.01.014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2768998"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2017.12.021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2015.10.068"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.01.018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2574875"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CP.1943-5487.0000699"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.07.022"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.05.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.11.012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2396994"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.03.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-010-0024-7"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-015-0335-9"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.pnucene.2017.03.006"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.08.035"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-011-0078-1"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/S0029-5493(99)00213-7"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45416-0_4"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.02.028"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77619-2_7"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2225393"},{"key":"ref78","author":"liu","year":"2015","journal-title":"Sci Pres"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.11.034"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.strusafe.2016.03.004"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.04.008"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)EM.1943-7889.0000170"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.01.017"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:19984895"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/32.815326"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1243\/1748006XJRR161"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900003039"},{"key":"ref68","first-page":"205","article-title":"The use of Bayesian belief nets in safety assessment of software based systems","volume":"2","author":"dahll","year":"2001","journal-title":"Int J Gen Syst"},{"key":"ref2","article-title":"Electric\/electronic\/programmable electronic safety-related systems, parts 1-7","year":"0"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1080\/00207720210133589"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00077-6"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2013.04.001"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2012.11.003"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.05.012"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.01.012"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2017.05.019"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2014.06.016"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.12.001"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.02.001"},{"key":"ref99","author":"bradbury-squires","year":"2013","journal-title":"Simulation Training in a Virtual Environment of an Offshore Oil Installation"},{"key":"ref96","first-page":"359","article-title":"Validation of human reliability assessment techniques: Part 1&#x2014;Validation issues","volume":"27","author":"kirwan","year":"1996","journal-title":"Safety Sci"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7535(97)00050-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785321"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.applthermaleng.2017.10.079"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.11.037"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9297-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.01.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68282-2"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2012.03.017"},{"key":"ref17","author":"kj\u00e6rulff","year":"2013","journal-title":"Bayesian Networks and Influence Diagrams A Guide to Construction and Analysis"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2018.02.011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811357"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.10.010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810386"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-016-0453-z"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.21236\/ADA256242"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.01.016"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.02.015"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2012.07.027"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2013.01.001"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2012.09.008"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8681658\/08417443.pdf?arnumber=8417443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:09:19Z","timestamp":1657746559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8417443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":102,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tii.2018.2858281","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}