首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
  2021年   1篇
  2019年   1篇
  1985年   1篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
排序方式: 共有7条查询结果,搜索用时 125 毫秒
1
1.
In this work we consider spread of information which motivates the hearer to perform some specified action. The time to completion of an action is assumed to be a random variable and the main focus is on the number of completed actions by time t, X(t). Some models, which reflect different degree of centralization in the spread process, are analyzed and the distribution of X(t), as well as that of some other stochastic processes of interest, are obtained. The relevance to propagation of epidemics is pointed out. All models are solved by employing two interrelated concepts, namely, the order statistics property of stochastic processes and the binomial closure property of collections of distributions. In this respect, the work also serves as an illustration of the application of these useful concepts.  相似文献   
2.
A well known preventive replacement policy is the block replacement policy (BRP). In such a policy the item undergoes a planned replacement at a sequence of equally spaced time points independent of failure history. The main advantage of a BRP is its simplicity, because under this policy it is unnecessary to keep detailed records about times of failures or ages of items. The main drawback of a BRP is that at planned replacement times we may be replacing practically new items. In this paper we study a modified BRP which is free of this drawback. We calculate the expected cost of following a modified BRP for lifetime distributions possessing a special structure and illustrate it for the case of an Erlang distribution. A numerical comparison is made between a modified BRP and a standard BRP for the special case of a two stage Erlang distribution.  相似文献   
3.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
4.
A trigger-off replacement policy, suggested and analyzed in [1], for two-unit systems composed of identical units, is generalized and extended in this work in several ways. In the first part of the paper we obtain the appropriate integral equations for nonidentical units and then use them for a complete solution of the case of two units, whose lifetimes are distributed according to general Erlang distributions. In the second part of the paper we extend the trigger-off policy itself by allowing preventive replacements of units which reach a certain critical age. The system stops working if either one of the two units fails or reaches its critical age. Both cases present natural replacement possibilities for the remaining unit, provided that its age exceeds a predetermined critical age. Finally, we consider the question of which policy parameters, i.e. control limits and critical ages, to choose when facing a real-life situation. Using the criterion of expected costs per unit time in the long run, we show how to find the optimal parameters which minimize this objective function. The fact that a restricted optimization, within the class of trigger-off replacement policies, leads to the global optimal policy has been proved in [2] by a different approach.  相似文献   
5.
The model for a modified block replacement policy (MBRP) is extended to include running costs. An illustrative example is worked out for the case when item life is exponentially distributed and marginal running cost per unit time increases linearly with the age of the item.  相似文献   
6.
A service center to which customers bring failed items for repair is considered. The items are exchangeable in the sense that a customer is ready to take in return for the failed item he brought to the center any good item of the same kind. This exchangeability feature makes it possible for the service center to possess spares. The focus of the article is on customer delay in the system—the time that elapses since the arrival of a customer with a failed item and his departure with a good one—when repaired items are given to waiting customers on a FIFO basis. An algorithm is developed for the computation of the delay distribution when the item repair system operates as an M/M/c queue.  相似文献   
7.
Buying off the shelf procurements (OTS) has become an important part of the national acquisition strategy in several countries, and this paper seeks to bring empirical evidence on OTS as the preferred acquisition strategy by use of data from 2015 to 2022 investment portfolio of the Norwegian Armed Forces. We develop definitions for three categories of procurement – OTS, modified OTS and development projects – as well as a method to classify projects into these categories. Our first finding is that the characteristics of OTS projects correspond to modified OTS and development projects. Our second finding indicates that OTS projects perform better when it comes to the completion of projects according to the initial schedule, compared to development projects.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号