首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31篇
  免费   3篇
  34篇
  2023年   1篇
  2019年   3篇
  2017年   2篇
  2016年   2篇
  2015年   2篇
  2014年   3篇
  2013年   12篇
  2010年   1篇
  2009年   2篇
  2005年   1篇
  2004年   2篇
  1994年   1篇
  1979年   1篇
  1976年   1篇
排序方式: 共有34条查询结果,搜索用时 15 毫秒
1.
A well known preventive replacement policy is the block replacement policy (BRP). In such a policy the item undergoes a planned replacement at a sequence of equally spaced time points independent of failure history. The main advantage of a BRP is its simplicity, because under this policy it is unnecessary to keep detailed records about times of failures or ages of items. The main drawback of a BRP is that at planned replacement times we may be replacing practically new items. In this paper we study a modified BRP which is free of this drawback. We calculate the expected cost of following a modified BRP for lifetime distributions possessing a special structure and illustrate it for the case of an Erlang distribution. A numerical comparison is made between a modified BRP and a standard BRP for the special case of a two stage Erlang distribution.  相似文献   
2.
3.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.  相似文献   
4.
We study a stochastic scenario‐based facility location problem arising in situations when facilities must first be located, then activated in a particular scenario before they can be used to satisfy scenario demands. Unlike typical facility location problems, fixed charges arise in the initial location of the facilities, and then in the activation of located facilities. The first‐stage variables in our problem are the traditional binary facility‐location variables, whereas the second‐stage variables involve a mix of binary facility‐activation variables and continuous flow variables. Benders decomposition is not applicable for these problems due to the presence of the second‐stage integer activation variables. Instead, we derive cutting planes tailored to the problem under investigation from recourse solution data. These cutting planes are derived by solving a series of specialized shortest path problems based on a modified residual graph from the recourse solution, and are tighter than the general cuts established by Laporte and Louveaux for two‐stage binary programming problems. We demonstrate the computational efficacy of our approach on a variety of randomly generated test problems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
5.
6.
In progressive censoring, items are removed at certain times during the life test. Commonly, it is assumed that the removed items are used for further testing. In order to take into account information about these additional testing in inferential procedures, we propose a two‐step model of stage life testing with one fixed stage‐change time which incorporates information about both the removed items (further tested under different conditions) and those remaining in the current life test. We show that some marginal distributions in our model correspond either to progressive censoring with a fixed censoring time or to a simple‐step stress model. Furthermore, assuming a cumulative exposure model, we establish exact inferential results for the distribution parameters when the lifetimes are exponentially distributed. An extension to Weibull distributed lifetimes is also discussed.  相似文献   
7.
8.
Consider the conditional covering problem on an undirected graph, where each node represents a site that must be covered by a facility, and facilities may only be established at these nodes. Each facility can cover all sites that lie within some common covering radius, except the site at which it is located. Although this problem is difficult to solve on general graphs, there exist special structures on which the problem is easily solvable. In this paper, we consider the special case in which the graph is a simple path. For the case in which facility location costs do not vary based on the site, we derive characteristics of the problem that lead to a linear‐time shortest path algorithm for solving the problem. When the facility location costs vary according to the site, we provide a more complex, but still polynomial‐time, dynamic programming algorithm to find the optimal solution. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
9.
The model for a modified block replacement policy (MBRP) is extended to include running costs. An illustrative example is worked out for the case when item life is exponentially distributed and marginal running cost per unit time increases linearly with the age of the item.  相似文献   
10.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号