首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 732 毫秒
1.
基于定时区间删失样本,研究了指数分布产品在恒定应力部分加速寿命试验下的参数估计。利用EM算法得到了分布参数和加速因子的迭代方程。根据Louis提出的缺失信息原则计算了Fisher信息矩阵。由极大似然估计的渐近正态性,构造出分布参数和加速因子的近似置信区间。通过Monte Carlo模拟,从平均相对误差和均方误差两方面对估计量进行了计算,结果表明所有的估计量都具有大样本性质。最后通过模拟样本,计算了不同应力水平下分布参数、加速因子和可靠度的估计。  相似文献   

2.
针对竞争失效产品加速寿命试验存在试验时间长、费用高、效率低的问题,提出了一种基于Monte-Carlo仿真的竞争失效产品步降加速寿命试验优化设计方法.采用Monte-Carlo对步降加速寿命试验进行仿真模拟,以正常使用应力下的p阶分位寿命渐进方差估计最小为目标,以各试验应力水平及对应应力下的试验截尾数作为设计变量,采用MIE理论进行统计分析,建立了基于仿真的竞争失效产品步降加速寿命试验优化设计模型.最后,通过实例分析表明:该方法具有可行性、有效性.  相似文献   

3.
某新型榴弹引信加速寿命试验设计   总被引:1,自引:1,他引:0  
通过对影响某新型榴弹引信长储失效的主要环境因素(温度和湿度)分析,得出其寿命服从威布尔分布,双环境应力下满足阿伦尼斯模型。用恒定应力加速寿命试验方法计算出双环境应力下威布尔分布的过渡参数、形状参数、尺寸参数等值,从而估算出某新型榴弹引信长储失效规律。  相似文献   

4.
针对寿命服从双参数Weibull分布的机电产品,进行单应力、定时转换的步进加速寿命试验,研究加速寿命试验数据下的可靠性评估问题。考虑到外场多应力环境与实验室单一应力环境之间的差异性,构建基于修正系数的分布参数计算模型;开展步进加速寿命试验过程的统计分析,建立各应力下的累计分布函数关系;构建极大似然函数,运用数值迭代法,求解未知参数估计;结合某型机电产品进行仿真方案设计,采用Monte Carlo仿真方法产生样本数据,通过对比分析说明所提出的模型评估精度更高。  相似文献   

5.
在随机截尾场合下,研究Weibull分布恒定应力加速寿命试验的统计分析问题。运用最大似然估计法和最小二乘法,推导出加速系数的估计,利用加速寿命模型给出正常应力水平下各种可靠性特征量的估计。  相似文献   

6.
介绍步进应力加速寿命试验原理,通过对制导弹药自动导引头贮存状态和失效机理的分析,确定了加速寿命试验应力和应力水平.假设产品寿命服从威布尔分布,应用极大似然估计和Bayes的方法处理数据,建立制导弹药可靠储存寿命预测模型,并计算得到自动导引头在正常应力水平下的可靠储存寿命.  相似文献   

7.
在逐步Type-Ⅰ混合截尾场合下,研究竞争失效产品简单步进应力加速寿命试验的优化设计。假定产品寿命服从双参数Weibull分布,在形状参数和尺度参数都未知的情形下,得到相应的Fisher信息矩阵,以极大似然渐近方差最小为准则结合Fisher信息矩阵,给出了步进应力加速寿命试验的最优应力转换时间。最后利用Monte-Carlo方法进行数值模拟,并对模拟结果进行了分析。  相似文献   

8.
加速寿命试验是高可靠长寿命型产品的量化评估的重要途径,广泛应用于武器装备的定寿延寿课题中。为了进一步提高加速寿命试验的效率,提出一种新的试验方法——序降应力加速寿命试验。通过理论模型建立、试验数据分析和蒙特卡罗仿真对该方法的有效性进行分析。研究结果表明,在相同的试验环境下序降应力加速寿命试验方法不但能大幅度提高试验效率,同时还能提高试验分析精度。因此,在武器装备的定寿延寿课题中,序降应力加速寿命试验值得推广。  相似文献   

9.
在国防武器设备和民用工业等领域,高可靠、长寿命产品被大量研发和生产,因而可以提前暴露该类产品薄弱环节的加速寿命试验技术得到了广泛研究和应用。介绍了加速寿命试验技术常用的试验类型和寿命分布,阐述了基于不同寿命分布的加速寿命试验数据统计方法,对新兴的步降应力加速寿命试验技术和加速寿命试验优化设计方法的研究状况进行了总结和分析,对未来加速寿命试验技术在军用后勤装备领域的研究进行了展望。  相似文献   

10.
一种新的Weibull分布恒定应力加速寿命试验分析方法   总被引:6,自引:0,他引:6       下载免费PDF全文
分析了Weibull分布恒定应力加速寿命试验常用的二步分析方法存在的不足 ,建立了一种新的构造数据分析方法。考虑到分布参数的相关性 ,该方法引入了Weibull分布特征寿命参数的二次估计 ,在模型拟合优度上高于原来的二步分析方法 ,使分析精度得到了改善。同时 ,该方法避免了原来二步分析方法的查表过程 ,便于软件实现和工程实际应用。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号