首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
In the present article, we propose a new control chart for monitoring high quality processes. More specifically, we suggest declaring the monitored process out of control, by exploiting a compound rule couching on the number of conforming units observed between the (i − 1)th and the ith nonconforming item and the number of conforming items observed between the (i − 2)th and the ith nonconforming item. Our numerical experimentation demonstrates that the proposed control chart, in most of the cases, exhibits a better (or at least equivalent) performance than its competitors.  相似文献   

2.
Let Ui = (Xi, Yi), i = 1, 2,…, n, be a random sample from a bivariate normal distribution with mean μ = (μx, μy) and covariance matrix
. Let Xi, i = n + 1,…, N represent additional independent observations on the X population. Consider the hypothesis testing problem H0 : μ = 0 vs. H1 : μ ≠ 0. We prove that Hotelling's T2 test, which uses (Xi, Yi), i = 1, 2,…, n (and discards Xi, i = n + 1,…, N) is an admissible test. In addition, and from a practical point of view, the proof will enable us to identify the region of the parameter space where the T2-test cannot be beaten. A similar result is also proved for the problem of testing μx ? μy = 0. A Bayes test and other competitors which are similar tests are discussed.  相似文献   

3.
We analyze a system of discrete fractional difference equations subject to nonlocal boundary conditions. We consider the system of equations given by -Δνiyi(t)=λiai(t+νi-1)fi(y1(t+ν1-1),y2(t+ν2-1)), for t∈[0,b]N0, subject to yi(νi − 2) = ψi(yi) and yi(νi + b) = ?i(yi), for i = 1, 2, where ψi,?i:Rb+3R are given functionals. We also assume that νi ∈ (1, 2], for each i. Although we assume that both ai and fi(y1y2) are nonnegative for each i, we do not necessarily presume that each ψi(yi) and ?i(yi) is nonnegative for each i and each yi ? 0. This generalizes some recent results both on discrete fractional boundary value problems and on discrete integer-order boundary value problems, and our techniques provide new results in each case.  相似文献   

4.
The problem of ranking players in a tournament has been studied by a number of authors. The methods developed for ranking players fall under two general headings—direct methods and rating methods. The present paper extends the tournament ranking problem in two directions. First, the usual definition of a tournament is broadened to include ties or draws. Thus, our model determines the best weak ranking of the players. Second, the ranking method presented takes account of player strength in that wins over strong players are valued higher than wins over weak players. To account for player strength, we evaluate both direct or first-order wins of players over opponents (i defeats j) and indirect or higher-order wins (i defeats k, who defeats j). A model which derives a composite score for each player, combining both direct and indirect wins, is used to obtain an overall ranking of the competitors.  相似文献   

5.
We consider a periodic-review inventory system with two suppliers: an unreliable regular supplier that may be disrupted for a random duration, and a reliable backup supplier that can be used during a disruption. The backup supplier charges higher unit purchasing cost and fixed order cost when compared to the regular supplier. Because the backup supplier is used at unplanned moments, its capacity to replenish inventory is considered limited. Analytical results partially characterize the structure of the optimal order policy: a state-dependent (X(i), Y(i)) band structure (with corresponding bounds of X(i) and Y(i) to be given), where i represents the status of the regular supplier. Numerical studies illustrate the structure of the optimal policy and investigate the impacts of major parameters on optimal order decisions and system costs.  相似文献   

6.
Given n-square Hermitian matrices A,B, let Ai,Bi denote the principal (n?1)- square submatrices of A,B, respectively, obtained by deleting row i and column i. Let μ, λ be independent indeterminates. The first main result of this paper is the characterization (for fixed i) of the polynomials representable as det(μAiBi) in terms of the polynomial det(μAB) and the elementary divisors, minimal indices, and inertial signatures of the pencil μAB. This result contains, as a special case, the classical interlacing relationship governing the eigenvalues of a principal sub- matrix of a Hermitian matrix. The second main result is the determination of the number of different values of i to which the characterization just described can be simultaneously applied.  相似文献   

7.
In this paper we analyze a queueing system with a general service scheduling function. There are two types of customer with different service requirements. The service order for customers of each type is determined by the service scheduling function αk(ij) where αk(ij) is the probability for type-k customer to be selected when there are i type-1 and j type-2 customers. This model is motivated by traffic control to support traffic streams with different traffic characteristics in telecommunication networks (in particular, ATM networks). By using the embedded Markov chain and supplementary variable methods, we obtain the queue-length distribution as well as the loss probability and the mean waiting time for each type of customer. We also apply our model to traffic control to support diverse traffics in telecommunication networks. Finally, the performance measures of the existing diverse scheduling policies are compared. We expect to help the system designers select appropriate scheduling policy for their systems.  相似文献   

8.
9.
This paper deals with the problem of optimizing the management of a natural gas transportation pipe-line. The system is formed by m compressing stations linked by pipe-legs. Each station Si is equipped with Ni centrifugal turbocompressors; its behaviour is characterized by the actual number ni of operating turbocompressors and by the values of the machine flow-rate and of the suction and discharge pressures and temperatures. A fraction of the gas passing through the station is used for the feeding of the turbocompressors (fuel-gas). For each station Si it is necessary to find the optimal values of ni and of the discharge pressure so as to minimize the total amount of fuel-gas (inclusive of the quantity needed for turbocompressors start-stop operations), taking into account the constraints on the pressures and temperatures in the stations and along the pipe-legs. Sophisticated simulation models of the stations and of the pipe-legs are presented and justified by means of experimental tests. An algorithm based on a dynamic programming formulation of the problem is proposed; the algorithm utilizes dominance criteria and lower bounds in order to reduce the total number of states. Extensive computational results referring to a set of real situations are given in order to evaluate the saving with respect to the current manual management of the system. The results reported in this article have been applied to the gas transportation pipe-line that is operated by ÖeMV (Austria) and SNAM (Italy).  相似文献   

10.
We analyze the behavior of a multi-class single-server delay-loss system ΣixMAPi/PH/1/m with a superposition of independent Markovian Arrival Processes as arrival stream and phase-type distributed service times. Considering the underlying finite Markov chain with its quasi-birth-and-death structure with two boundary sets, we derive a new representation of its steady-state vector by a linear combination of two matrix-geometric terms. Furthermore, we state efficient procedures to calculate the performance characteristics of this delay-loss system.  相似文献   

11.
Two models for computer system overhead are developed by considering the number of jobs in the system as an immigration-death process. The models developed relate the death rates to the state of the process. The first model uses the total numver of jobs in the system as the state of the processe. The second model classifies the jobs in the system according to the priority classes unsed in the computer system.In the model based on the total number of jobs in the system, the death rate when the system is in the state i, μi, is μi = μ min(i, x0) where μ and x0 are parameters to be estimated by maximum likelihood. In the second model, the death rate for jobs in the kth priority class when the state of the system is i = (i1…,ip), μi(k) is given by μi(k)(k)ikmin(1, x0i·1). Computational difficulties in finding the maximum likelihood estimates of the parameters for this model are noted.  相似文献   

12.
Considering a series representation of a coherent system using a shift transform of the components lifetime Ti, at its critical level Yi, we study two problems. First, under such a shift transform, we analyse the preservation properties of the non-parametric distribution classes and secondly the association preserving property of the components lifetime under such transformations.  相似文献   

13.
14.
In 1958, Karl Goldberg proved the following: Theorem G. Suppose A=(aij) is an n×n matrix over the complex field, with the following properties: (1) aijaji?0 for i,j=1,2,…,n, and (2) ai1i2ai2i3?aisii=ai2i1ai3i2?ai1is for all s=1,2,…,n and it=1,2,…,n. Then A has only real characteristic values. Definition. Let Gn denote the class of n×n matrices over C, the complex field, which satisfy the Goldberg conditions (1) and (2). We investigate some properties of class G related to the following topics: Schur complements, weak sign symmetry, and inequalities due to Oppenheim for positive definite matrices, and an analogue due to Markham for tridiagonal, oscillatory matrices.  相似文献   

15.
Consider a production system with m unreliable machines, which are maintained by a single repairman. The time until failure of machine i and its repair time are exponentially distributed random variables with rates λi and μ, respectively. Machine i earns at rate ri while it is working. The service rate can be controlled, and a cost c(μ) is charged when the service rate is μ. We assume the following compatibility condition: λi<λj implies that rirj. We consider both the optimal assignment of the repairman to the failed machines, and the optimal service rate. We demonstrate some monotone properties of the optimal policy.  相似文献   

16.
We consider a new idea for a storage model on n nodes, namely stability of shape. These nodes support K neighborhoods S i ???{1, ..., n} and items arrive at the S i as independent Poisson streams with rates λ i , i?=?1, ... , K . Upon arrival at S i an item is stored at node j?∈?S i where j is determined by some policy. Under natural conditions on the λ i we exhibit simple local policies such that the multidimensional process describing the evolution of the number of items at each node is positive recurrent (stable) in shape.  相似文献   

17.
A permutation π of1,2, …,π is5-discordant if π(i) ≠i, i + 1,i + 2, i + 3, i + 4 modn for 1 ≤in. A system of recurrences for computing the rook polynomials associated with5-discordant permutations is derived. This system, together with hit polynomials enable the5-discordant permutations to be enumerated.  相似文献   

18.
In this paper, we prove the existence and the exponential stability in H+i (i=1,2), an incomplete metric subspace of Hi×Hi×Hi (i=1,2), of a nonlinear C0-semigroup S(t) for a nonlinear one-dimensional heat-conductive viscous real gas in bounded domain Ω=(0,1). The results in this paper improve those previously related results.  相似文献   

19.
A balancing game is a perfect information two-person game. Given a set V?Rd, in the ith round Player I picks a vector vi?V, and then Player II picks ?i = +1 or ?1. Player II tries to minimize sup {| Σi=1n?ivi | : n = 0, 1, 2,…}. In this paper we generalize this game and give necessary and sufficient conditions for the existence of a winning strategy for Player I and Player II in the generalized game. Later we give upper and lower bounds to the value of the original game; the bounds in many cases are equal. Further we present simple strategies for both players.  相似文献   

20.
In their papers (Technical Report CS-TR 50, University of Central Florida, 1980; J. Combin. Theory Ser. B32 (1982), 90–94) Brigham and Dutton introduce the notion of (n : i)-chromatic numbers of a graph, a generalization of Stahl's nth chromatic numbers (J. Combin. Theory Ser. B20, (1976), 185–203). The (n : i)-chromatic number of a graph G, denoted by χni(G), is the smallest integer m such that each vertex of G can be colored with a set of n colors in {1, 2,…, m} in such a way that any two adjacent vertices have exactly i colors in common. Brigham and Dutton conjecture at the end of loc cit that for all integers n and i with 0 ≤ in ? 1, and for every graph G, χni+1(G) ≤ χni(G). We prove this conjecture in some special cases and disprove it in the general case.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号