首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 49 毫秒
1.
在逐步Ⅰ型混合截尾试验下,研究了Burr部件寿命参数及可靠性指标的极大似然估计和Bayes估计.利用简单迭代方法,给出了寿命参数和可靠性指标的极大似然估计的数值解.然后利用Lindely Bayes近似算法得到了平方损失下寿命参数以及可靠性指标的Bayes估计.最后,运用Monte-Carlo方法对各估计结果作了模拟比较,结果表明Bayes估计较极大似然估计的误差小.  相似文献   

2.
基于逐步Ⅱ型混合截尾寿命试验数据,研究了Pareto分布的统计分析问题。利用极大似然方法和Bayes估计理论,导出了Pareto分布参数的极大似然估计和基于不同先验分布下的Bayes估计。最后利用Monte-Carlo模拟方法对估计的结果进行了对比分析。  相似文献   

3.
基于双边定时截尾样本,研究广义Pareto分布的形状参数和可靠性指标的估计问题。在进行极大似然估计时,由于似然方程无解析解,故采用EM算法。对形状参数选取,4信息先验,在平方损失下,研究给出广义Pareto分布的形状参数和可靠性指标的Bayes估计。通过Monte-Carlo模拟对形状参数和可靠度函数的极大似然估计、EM估计和Bayes估计的效果进行比较。模拟结果说明,Bayes方法和EM算法适合在小样本场合下对形状参数进行估计,Bayes方法和极大似然估计法适合在大样本场合下对形状参数估计,极大似然估计方法和EM算法适合对可靠度进行估计。  相似文献   

4.
在逐步Ⅱ型截尾试验下,研究了逆-Weibull部件寿命参数的极大似然估计和Bayes估计。利用简单迭代方法,给出了寿命参数的极大似然估计的数值解。然后基于不同的先验分布,得到不同损失函数下寿命参数的Bayes估计。最后,运用Monte-Carlo方法对各估计结果作了模拟比较,结果表明Bayes估计优于极大似然估计,且LINEX损失下的Bayes估计误差最小。  相似文献   

5.
当系统含有屏蔽数据时,在具有随机移走逐步增加型截尾模型下,讨论了部件寿命服从双参数指数分布的串联系统可靠性估计问题。设随机移走系统数服从二项分布,利用极大似然方法,Bayes理论及方法,推导出双参数指数部件参数、系统可靠性函数、失效率函数及移走概率的极大似然估计和Bayes估计。并利用Monte Carlo方法对两种估计结果进行了比较,表明Bayes估计较极大似然估计效果更优。  相似文献   

6.
Rayleigh分布环境因子的经验Bayes估计及仿真   总被引:1,自引:0,他引:1  
讨论了Rayleigh分布环境因子的定义和估计问题。基于逐次截尾模型,在LINEX损失函数下,给出环境因子的经验Bayes估计。最后利用Monte-Carlo方法对经验Bayes估计和极大似然估计进行了分析比较。结果表明,经验Bayes估计优于极大似然估计。  相似文献   

7.
在损伤随机变量(TRV)模型下,研究步进应力加速寿命试验Pareto分布的统计分析问题。利用极大似然估计和逆矩估计方法,给出Pareto分布参数的极大似然估计和逆矩估计。最后利用Monte-Carlo方法给出数值例子,说明了本方法的正确性和可行性。  相似文献   

8.
Bayes估计法是可靠性评估中应用最为广泛的方法之一,指数分布的Bayes验前概率密度函数中的重要参数主要依靠Reformulation法和Box-Tiao法确定,具有较强的主观经验性。基于Beyes估计的基本思想,以试验数据为依据,利用第二类极大似然估计法(ML-Ⅱ估计法)确定Bayes方法中的相关参数,避免了参数确定的主观性。实例表明结果合理,方法客观、可行。  相似文献   

9.
在逐步增加Ⅰ型截尾样本下,研究k/N(G)系统可靠性指标的区间估计问题。假设部件寿命服从指数分布,利用极大似然法和Bayes方法,首先给出了部件失效率的Bayes近似置信区间,其次推导出了系统可靠度和平均寿命的Bayes近似置信区间的计算公式。最后给出随机模拟例子,并对置信区间的精度进行了讨论。  相似文献   

10.
在定时混合截尾情形下,研究了指数威布尔分布的统计分析问题。利用最大似然估计方法给出了指数-威布尔分布参数的最大似然估计。运用Lindley’s逼近方法计算出了分布参数的Bayes估计。最后,运用Monte-Carlo方法对最大似然估计和Bayes估计结果作了模拟比较,结果表明Bayes估计优于最大似然估计。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

14.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

15.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

16.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

17.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   

18.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   

19.
This article describes the Distributed Interaction Campaign Model (DICM), an exploratory campaign analysis tool and asset allocation decision‐aid for managing geographically distributed and swarming naval and air forces. The model is capable of fast operation, while accounting for uncertainty in an opponent's plan. It is intended for use by commanders and analysts who have limited time for model runs, or a finite budget. The model is purpose‐built for the Pentagon's Office of Net Assessment, and supports analysis of the following questions: What happens when swarms of geographically distributed naval and air forces engage each other and what are the key elements of the opponents’ force to attack? Are there changes to force structure that make a force more effective, and what impacts will disruptions in enemy command and control and wide‐area surveillance have? Which insights are to be gained by fast exploratory mathematical/computational campaign analysis to augment and replace expensive and time‐consuming simulations? An illustrative example of model use is described in a simple test scenario. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 562–576, 2016  相似文献   

20.
《Arms and Armour》2013,10(2):149-162
Firth’s were the first of the Sheffield steel makers to enter the field armaments. Their involvement with Colt has been outlined in an article in the journal of the Colt Collectors Association in America and their activities as steelmakers to the small-arms industries has been covered in a previous issue of this Journal. This article gives a brief overview of their involvement as manufacturers in the field of heavy armaments, being the first to make all-steel guns and their evolving role in the use of steel for ordnance, culminating in the displacement of wrought iron by the adoption of steel for ordnance manufacture by the Royal Gun Factory in the 1880s. It also highlights their development of stainless steel in this context.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号