排序方式: 共有59条查询结果,搜索用时 171 毫秒
1.
文中指出抑制阶比混迭和泄漏是建立一套完整的微机特征分析系统中需要解决的二个关键的信号处理问题。提出了阶比滤波器是抑制阶比混迭有效和实用的方法;并研制频率比合成器以抑制泄漏。介绍了由频率比合成器、阶比滤波器、TMS32010数据采集装置、主机和绘图仪所组成的微机特征分析系统。最后给出了该微机特征分析系统对轴承进行故障诊断的结果。 相似文献
2.
基于离散对数给出了一种组签字方案。该方案保留了已有方案的主要优点 ,并且解决了“匿名”性问题。在该方案中 ,既使组权威公布了一些附加信息以供验证者确认签字者的身份 ,但可确保签字者其它的组签字的“匿名”性 ,组权威也不必更新签字者的任何密钥。因为组权威公布的信息只是为了识别指定的组签字。 相似文献
3.
在基于内容的图像检索技术中 ,图像相似性度量是至关重要的一步。基于EMD(EarthMover’sDistance)提出了一种度量图像相似性的方法 ,并针对图像的颜色句柄进行理论分析和实验仿真。实验结果表明了该算法的有效性 相似文献
4.
The sequential order statistics (SOS) are a good way to model the lifetimes of the components in a system when the failure of a component at time t affects the performance of the working components at this age t. In this article, we study properties of the lifetimes of the coherent systems obtained using SOS. Specifically, we obtain a mixture representation based on the signature of the system. This representation is used to obtain stochastic comparisons. To get these comparisons, we obtain some ordering properties for the SOS, which in this context represent the lifetimes of k‐out‐of‐n systems. In particular, we show that they are not necessarily hazard rate ordered. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
5.
Mahdi Tavangar 《海军后勤学研究》2014,61(7):549-556
Most of the research, on the study of the reliability properties of technical systems, assume that the components of the system operate independently. However, in real life situation, it is more reasonable to assume that there is dependency among the components of the system. In this article, we give sufficient conditions based on the signature and the joint distribution of component lifetimes to obtain stochastic ordering results for coherent and mixed systems with exchangeable components. Some stochastic orders on dynamic (or conditional) signature of coherent systems are also provided. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 549–556, 2014 相似文献
6.
Adjacency‐based local top‐down search method for finding maximal efficient faces in multiple objective linear programming 下载免费PDF全文
It is well‐known that the efficient set of a multiobjective linear programming (MOLP) problem can be represented as a union of the maximal efficient faces of the feasible region. In this paper, we propose a method for finding all maximal efficient faces for an MOLP. The new method is based on a condition that all efficient vertices (short for the efficient extreme points and rays) for the MOLP have been found and it relies on the adjacency, affine independence and convexity results of efficient sets. The method uses a local top‐down search strategy to determine maximal efficient faces incident to every efficient vertex for finding maximal efficient faces of an MOLP problem. To our knowledge, the proposed method is the first top‐down search method that uses the adjacency property of the efficient set to find all maximal efficient faces. We discuss this and other advantages and disadvantages of the algorithm. We also discuss some computational experience we have had with our computer code for implementing the algorithm. This computational experience involved solving several MOLP problems with the code. 相似文献
7.
Mean residual life of coherent systems consisting of multiple types of dependent components 下载免费PDF全文
Mean residual life is a useful dynamic characteristic to study reliability of a system. It has been widely considered in the literature not only for single unit systems but also for coherent systems. This article is concerned with the study of mean residual life for a coherent system that consists of multiple types of dependent components. In particular, the survival signature based generalized mixture representation is obtained for the survival function of a coherent system and it is used to evaluate the mean residual life function. Furthermore, two mean residual life functions under different conditional events on components’ lifetimes are also defined and studied. 相似文献
8.
用人工神经网络BP算法评价城市火灾风险 总被引:2,自引:0,他引:2
吴立志 《中国人民武装警察部队学院学报》2001,17(3):30-32
深入讨论了人工神经网络的BP算法在城市火灾风险评价中应用的可行性和一些具体做法. 相似文献
9.
分析了采用秘密密钥和公开密钥的数字签名技术的不足,提出了相应的改进方案,从而可实现数字签名的各种功能,最后提出一种更为安全的多方数字签名方案。 相似文献
10.