排序方式: 共有195条查询结果,搜索用时 15 毫秒
191.
The signature of a system with independent and identically distributed (i.i.d.) component lifetimes is a vector whose ith element is the probability that the ith component failure is fatal to the system. System signatures have been found to be quite useful tools in the study and comparison of engineered systems. In this article, the theory of system signatures is extended to versions of signatures applicable in dynamic reliability settings. It is shown that, when a working used system is inspected at time t and it is noted that precisely k failures have occurred, the vector s [0,1]n‐k whose jth element is the probability that the (k + j)th component failure is fatal to the system, for j = 1,2,2026;,n ‐ k, is a distribution‐free measure of the design of the residual system. Next, known representation and preservation theorems for system signatures are generalized to dynamic versions. Two additional applications of dynamic signatures are studied in detail. The well‐known “new better than used” (NBU) property of aging systems is extended to a uniform (UNBU) version, which compares systems when new and when used, conditional on the known number of failures. Sufficient conditions are given for a system to have the UNBU property. The application of dynamic signatures to the engineering practice of “burn‐in” is also treated. Specifically, we consider the comparison of new systems with working used systems burned‐in to a given ordered component failure time. In a reliability economics framework, we illustrate how one might compare a new system to one successfully burned‐in to the kth component failure, and we identify circumstances in which burn‐in is inferior (or is superior) to the fielding of a new system. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
192.
介绍了产品数据管理(PDM)的概念和基本功能,结合当前型号研制的特点和计算机信息技术应用的状况、发展,研究了型号研制产品数据管理的需求、功能及实施,为当前型号研制依靠CIMS技术实现产品数据管理提出了8条基本原则。 相似文献
193.
由于无线传感器网络在能量消耗、内存开销和计算能力等方面的局限性,传统的网络密钥管理方法已不适用。为此提出了一种适用于无线传感器网络的密钥预分配方法——基于(t,n)-门限方案,给出了密钥分配方法,并从方案的连通性、安全性等方面进行了有效的分析,结果表明该算法在这些方面有一定的优势。 相似文献
194.
在现有的RFID标准中,一般标签ID都由几个不同含义区间组成。针对这种特点,提出推断式二进制防碰撞算法:在识别每个区间段的ID时,利用某个特定读写器中的前缀库推断该区间段各个位的取值,以便减少待识别标签ID的位数。同时,通过调整参数u,可以对系统可靠性进行控制。仿真实验表明,在没有新前缀出现的情况下,推断式二进制防碰撞算法能够将QT算法的识别速度提高3倍、标签平均响应次数降低3/4。 相似文献
195.
Andrew Phiri 《Defence and Peace Economics》2019,30(4):474-487
Using annual data collected from 1988 to 2015, this study provides evidence of a non-linear relationship between military spending, economic growth and other growth determinants for the South African economy. The empirical study is based on estimates of a logistic smooth transition regression (LSTR) model and our empirical results point to an inverted U-shaped relationship between military spending and economic growth for the data. Furthermore, our empirical results suggest that the current levels of military spending, as a component of total government expenditure, are too high in the South African economy and need to be transferred towards more productive non-military expenditure in order to improve the performance of economic growth and other growth determinants. 相似文献