首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Exact guaranteed-coverage and expected-coverage Bayesian tolerance limits for the lifetime distribution of a k-out-of-n:F system are computed by solving nonlinear equations. The bounds are based on exponential component test data and available prior information concerning the expected component lifetime which is described by an inverted gamma distribution. The Bayesian tolerance limits are valid for single (right or left), double and progressive (standard or general) censoring, and even have frequentist validity in the noninformative case. The derived results allow the reliability engineer to judge the quality of a system prior to assembly, which offers obvious practical and economic benefits. Minimum and expected percentages of conforming systems are assessed by constructing suitable tolerance limits. Even though the viewpoints are different, the Bayesian tolerance limits that adopt the natural diffuse prior coincide numerically with recently published conditional tolerance limits in the double censoring case. The proposed Bayesian approach may be deemed as an extension of the existing frequentist methodology under double censoring that also takes into account the presence of prior information and general progressive censoring. The perspective developed simplifies and unifies the computation of tolerance limits with both frequentist and Bayesian interpretations, and also provides a probabilistic way of updating the tolerance limits in the light of new, relevant data, which is especially important in the dynamic analysis of a sequence of data. Moreover, the Bayesian approach is shown to outperform the frequentist viewpoint in terms of accuracy. In most situations, the use of substantial prior information significantly increases the accuracy level and considerably reduces the required number of failures to attain a specified degree of accuracy. Two illustrative numerical examples are studied, including the analysis of a system of water pumps for cooling a reactor. The results developed are extended to the Weibull case with unknown scale parameter and other probability models.  相似文献   

2.
Ranking fuzzy numbers is important in decision-making, data analysis, artificial intelligence, economic systems and operations research. In this paper, to overcome the limitations of the existing studies and simplify the computational procedures an approach to ranking fuzzy numbers based on αα-cuts is proposed. The approach is illustrated by numerical examples, showing that it overcomes several shortcomings such as the indiscriminative and counterintuitive behavior of existing fuzzy ranking approaches.  相似文献   

3.
In this paper, we present a new one-step smoothing Newton method proposed for solving the non-linear complementarity problem with P0P0-function based on a new smoothing NCPNCP-function. We adopt a variant merit function. Our algorithm needs only to solve one linear system of equations and perform one line search per iteration. It shows that any accumulation point of the iteration sequence generated by our algorithm is a solution of P0-NCPP0-NCP. Furthermore, under the assumption that the solution set is non-empty and bounded, we can guarantee at least one accumulation point of the generated sequence. Numerical experiments show the feasibility and efficiency of the algorithm.  相似文献   

4.
This paper investigates the dynamics of a class of recurrent neural networks where the neural activations are modeled by discontinuous functions. Without presuming the boundedness of activation functions, the sufficient conditions to ensure the existence, uniqueness, global exponential stability and global convergence of state equilibrium point and output equilibrium point are derived, respectively. Furthermore, under certain conditions we prove that the system is convergent globally in finite time. The analysis in the paper is based on the properties of M-matrix, Lyapunov-like approach, and the theories of differential equations with discontinuous right-hand side as introduced by Filippov. The obtained results extend previous works on global stability of recurrent neural networks with not only Lipschitz continuous but also discontinuous neural activation functions.  相似文献   

5.
In this article, we consider a continuous review (s,S)(s,S) perishable inventory system with a service facility, wherein the demand of a customer is satisfied only after performing some service on the item which is assumed to be of random duration. We also assume that the demands are generated by a finite homogeneous population. The service time, the lead time are assumed to have Phase type distribution. The life time of the item is assumed to have exponential distributions. The joint distribution of the number of customers in the system and the inventory level is obtained in the steady state case. The Laplace–Stieltjes transform of the waiting time of the tagged customer is derived. Various system performance measures are derived and the total expected cost rate is computed under a suitable cost structure. The results are illustrated numerically.  相似文献   

6.
Under appropriate growth conditions on the nonlinearity, the existence of multiple solutions for nonlinear elliptic Dirichlet problems with variable exponent is established. The approach is based on variational methods. Some applications and examples illustrate the obtained results.  相似文献   

7.
In the 1980s, Motorola, Inc. introduced its Six Sigma quality program to the world. Some quality practitioners questioned why the Six Sigma advocates claim it is necessary to add a 1.5σ shift to the process mean when estimating process capability. Bothe [Bothe, D.R., 2002. Statistical reason for the 1.5σ shift. Quality Engineering 14 (3), 479–487] provided a statistical reason for considering such a shift in the process mean for normal processes. In this paper, we consider gamma processes which cover a wide class of applications. For fixed sample size n, the detection power of the control chart can be computed. For small process mean shifts, it is beyond the control chart detection power, which results in overestimating process capability. To resolve the problem, we first examine Bothe’s approach and find the detection power is less than 0.5 when data comes from gamma distribution, showing that Bothe’s adjustments are inadequate when we have gamma processes. We then calculate adjustments under various sample sizes n and gamma parameter N, with power fixed to 0.5. At the end, we adjust the formula of process capability to accommodate those shifts which can not be detected. Consequently, our adjustments provide much more accurate capability calculation for gamma processes. For illustration purpose, an application example is presented.  相似文献   

8.
In this paper, we determine all faithful, symmetric and locally finite actions of a group on the tree of valency five. As a corollary we complete the classification of the isomorphism types of vertex and edge stabilisers in a group acting symmetrically on a graph of valency five. This builds on work of Weiss and recent work of Feng, Zhou and Feng, Guo. Our approach is to classify the isomorphism types of finite, faithful amalgams of degree (5, 2).  相似文献   

9.
10.
This paper introduces a notion of regularity of t=-∞t=- for the diffusion (or heat) equation and establishes a necessary and sufficient condition for the existence of a unique bounded solution to the first boundary value problem for the diffusion equation in a general domain Ω⊂RN+1ΩRN+1 which extends up to t=-∞t=-.  相似文献   

11.
We study the problem of counting the total number of affine solutions of a system of n binomials in n   variables over an algebraically closed field of characteristic zero. We show that we may decide in polynomial time if that number is finite. We give a combinatorial formula for computing the total number of affine solutions (with or without multiplicity) from which we deduce that this counting problem is #P#P-complete. We discuss special cases in which this formula may be computed in polynomial time; in particular, this is true for generic exponent vectors.  相似文献   

12.
We consider the incidental parameters problem in this paper, i.e. the estimation for a small number of parameters of interest in the presence of a large number of nuisance parameters. By assuming that the observations are taken from a multiple strictly stationary process, the two estimation methods, namely the maximum composite quasi-likelihood estimation (MCQLE) and the maximum plug-in quasi-likelihood estimation (MPQLE) are considered. For the MCQLE, we profile out nuisance parameters based on lower-dimensional marginal likelihoods, while the MPQLE is based on some initial estimators for nuisance parameters. The asymptotic normality for both the MCQLE and the MPQLE is established under the assumption that the number of nuisance parameters and the number of observations go to infinity together, and both the estimators for the parameters of interest enjoy the standard root-nn convergence rate. Simulation with a spatial–temporal model illustrates the finite sample properties of the two estimation methods.  相似文献   

13.
The Moore–Penrose inverse of an arbitrary matrix (including singular and rectangular) has many applications in statistics, prediction theory, control system analysis, curve fitting and numerical analysis. In this paper, an algorithm based on the conjugate Gram–Schmidt process and the Moore–Penrose inverse of partitioned matrices is proposed for computing the pseudoinverse of an m×nm×n real matrix AA with m≥nmn and rank r≤nrn. Numerical experiments show that the resulting pseudoinverse matrix is reasonably accurate and its computation time is significantly less than that of pseudoinverses obtained by the other methods for large sparse matrices.  相似文献   

14.
We introduce (n+1)(n+1)-preprojective algebras of algebras of global dimension nn. We show that if an algebra is nn-representation-finite then its (n+1)(n+1)-preprojective algebra is self-injective. In this situation, we show that the stable module category of the (n+1)(n+1)-preprojective algebra is (n+1)(n+1)-Calabi–Yau, and, more precisely, it is the (n+1)(n+1)-Amiot cluster category of the stable nn-Auslander algebra of the original algebra. In particular this stable category contains an (n+1)(n+1)-cluster tilting object. We show that even if the (n+1)(n+1)-preprojective algebra is not self-injective, under certain assumptions (which are always satisfied for n∈{1,2}n{1,2}) the results above still hold for the stable category of Cohen–Macaulay modules.  相似文献   

15.
In this paper we introduce a new family of measures of divergence for the analysis of the degree of departure from a model with a constant hazard function and also for comparing if two models have proportional hazard rates. Our family of measures is based on the family of divergences introduced by Burbea and Rao (see [J. Burbea, C.R. Rao, On the convexity of higher order Jensen differences based on entropy functions, IEEE Transactions on Information Theory 28 (1982) 961–963]). Some well-known sets of data are reanalyzed using the new families of test statistics and confidence intervals introduced in this paper.  相似文献   

16.
17.
Using techniques introduced by C. Güntürk, we prove that the attractors of a family of overlapping self-affine iterated function systems contain a neighbourhood of zero for all parameters in a certain range. This corresponds to giving conditions under which a single sequence may serve as a ‘simultaneous ββ-expansion’ of different numbers in different bases.  相似文献   

18.
19.
In this paper, we formulate Wolfe and Mond–Weir type second-order multiobjective symmetric dual problems over arbitrary cones. Weak, strong and converse duality theorems are established under ηη-bonvexity/ηη-pseudobonvexity assumptions. This work also removes several omissions in definitions, models and proofs for Wolfe type problems studied in Mishra [9]. Moreover, self-duality theorems for these pairs are obtained assuming the function involved to be skew symmetric.  相似文献   

20.
In this paper, the approximation characteristic of a diagonal matrix in probabilistic and average case settings is investigated. And the asymptotic degree of the probabilistic linear (n,δ)(n,δ)-width and pp-average linear nn-width of diagonal matrix MM are determined.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号