共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
3.
储备单元故障率对备件需求量的影响 总被引:1,自引:0,他引:1
借助冷储备和温储备模型,分别求出了工作单元及储备单元寿命均服从指数分布的设备备件需求量,并分析了二者之间的差别及储备单元故障率对备件需求量的影响规律。对科学地确定备件储备量具有重要的指导意义。 相似文献
4.
5.
为解决维修保障中备件需求预测形式复杂和精度不高的问题,以正态型不可修部件为对象,对备件需求
预测方法进行研究。从保障概率的角度出发,介绍与备件保障相关的指标,建立正态型部件保障概率模型,通过逆
运算确定满足保障概率条件的备件需求数量,给出寿命服从正态分布的部件备件需求量,通过案例得出精确预测方
法和近似预测方法的应用条件。预测结果表明,工程近似方法适合于确定较长时间的备件需求量。 相似文献
6.
针对平时陆军合成部队装备维修保障资源需求确定及其验证问题,开展合成部队装备维修保障资源需求分析和装备维修保障效能评估研究。从保障对象、保障资源、保障策略3个方面对合成部队装备维修保障问题进行分析;以火控系统为例,采用蒙特卡洛仿真方法对单装火控系统维修时间和备件需求进行计算,在此基础上,分别计算单一种类装备群火控系统和多种类装备群火控系统的维修时间和备件需求,进而确定合成部队火控系统的维修保障人员和备件需求量;通过效能评估检验合成部队火控系统维修保障人员和备件需求计算结果的可信性。研究结果表明:采用该仿真方法确定合成部队各装备子系统的维修保障人员和备件需求是可行的;通过维修保障效能评估能够对维修保障资源需求计算结果进行验证。 相似文献
7.
8.
9.
10.
基于备件保障率的备件运行量模型 总被引:6,自引:0,他引:6
给定运输能力的条件下,较好的备件运行量可以减少维修备件的缺货率,从而提高部队的维修保障能力。基于此,提出了一般情况下备件运行量模型,并给出了相应的启发式求解方法。备件运行量模型的目标函数主要由备件对装备承担任务的影响确定,不同情况下模型可能不一样。对此,建立了两种特殊情况下的备件运行量模型,并给出了相应的快速求解方法。实验结果表明:基于备件保障率的备件运行量模型可以较好地反映了备件运行量,模型求解方法简便易行,计算结果接近实际情况,满足战场环境下实时确定备件运行量的需要。 相似文献
11.
Tetraacetyldibenzylhitane (TADBIW) was subjected to debenzylation by nitrosating with inorganic materials available commercially to synthesize tetraacetyldinitrosohexaazaisowurtzitane (TADNSIW). TADNSIW was purified, and its structure was determined by FTIR, 1H NMR, MS and element analysis. The debenzylation reaction of TADBIW gave quantitative benzaldehyde as a by-product. This indicates that the reaction produces an imine cation as an intermediate. Hexanitrohexaazaisowurtzitane (HNIW) was prepared from unpurified TADNSIW with the yield over 96.0 % and the purity more than 98.0 %. And the mechanism of the reaction from TADNSIW to HNIW is proposed to be oxidation of nitroso and nitration of acetyl on the molecule of TADNSIW, This reaction system involved is simple, and the reaction can complete within a short time and under mild conditions. The product can be easily to separate and the waste disposed readily. 相似文献
12.
For measuring velocity and impacting position of single fragment of warhead, a non-contact measuring method is proposed, in which a six-light-screen array, a position indicator, a multi-channel chronograph and a computer are used.The principle of measurement is described. The key device of the system is a light screen array sensor which consists of six light screens allocated with certain geometrical parameters. When the fragment flies through the light screen array, the time of passing through each of the screens is recorded by the multi-channel chronograph. According to the time data and the geometrical parameters of the array, the velocity vector and the location of the fragment can be calculated immediately. The presented method can be used to locate the fragment and to measure the real velocity on its flying direction. It can also be used to measure the velocity of a fragment swarm after the system is engineered further. 相似文献
13.
The technique of watermarking has been introduced into 2D vector maps for many potential applications such as protecting the copyright of important GIS (geographical information system) data and tracing the data source of military maps. In most previous works, although the validity of the map data could be preserved during the embedding procedure, the shape-distortions of the map elements are usually neglected which would tend to degrade the invisibility of the watermarking schemes. A shape-preserving algorithm for watermarking 2D vector maps is presented in this paper. A 1D distance sequence extracted from the original map is adopted as the cover data instead of 2D coordinates. A watermark bit is represented by changing the distributions of the cover data. The embedding procedure induces lower shape-distortions than in former works. Experimental results indicate better invisibility of the proposed scheme, as well as its robustness to certain attacks such as map simplification, interpolation, additive noise and most geometric transforms. 相似文献
14.
阐述了数码电子雷管中,点火药剂细结晶三硝基间苯二酚铅(LTNR)的制备工艺;从点火药剂的种类、加入黏合剂的质量分数、桥丝直径、点火头的电阻值、防潮漆的蘸涂等方面对点火头性能的影响因素进行了探讨;通过震动试验、并联起爆试验、延期精度检测与考核,试验结果表明:一次性合成的细结晶LTNR是制造数码电子雷管点火头较为理想的点火药剂,按技术要求生产的点火头性能指标能够满足行业标准要求。 相似文献
15.
The stability under illumination of transmission-mode GaAs photocathode sealed in the third generation intensifier is investigated by use of spectral response testing instruments. The variations of spectral response with the illumination times under weak and intense illumination are compared. The variations of photoemission performance parameters are also characterized. The results show that during initial several weak illuminations photocathode behaves no evident decay and a maximum sensitivity is achieved, while under intense illumination the sensitivity of photocathode begin to decrease largely at the first illumination. The calculated performance parameters show that the variation of surface escape probability with illumination times is a direct cause of instability of photocathode. It is also found that under intense illumination peak wavelength is moved towards short-wave and peak response is decreased, which shows that the ability of long-wave response of photocathode is decreased. 相似文献
16.
Open rule-setting method advanced in this paper concentrates on providing designers of engines with a convenient way to express their design innovations and develop the expected prototypes in the early CAD stage, and constitute effective models for the following analysis process of CAE and CAPP. The problems arisen in the process of conceptual design with the traditional experience-based development method are analyzed. Based on those analyses, open rule-setting method is presented and some associated technical problems are discussed. The functional framework of open rule-setting system was built as software engineering methods. The speciality of the engine product as a kind of complex product and the requirement of the engine product based on its structural particularity to rule-setting system are considered carefully. A demonstration is supplied to illustrate how the open rule-setting method enhances the efficiency and quality of the engine conceptual design. 相似文献
17.
The implementation of a missile's visual simulation system is explained that is developed with OpenGL(open graphic library) and the flight path and flight carriage in different stages of the missile are displayed. The establishment problems of the 3D scene are circumstantiated including the construction and redeployment of the model, creation of the virtual scene, setting of the multi-viewports and multi-windows etc. The missile's data driver, system flow, the modules and their mutual relations of the missile visual simulation system are discussed. The missile flight simulation results and effect of the scenes are given. 相似文献
18.
By analyzing the working principle of Linux network device driver, discussing the Linux network driver structure and its key technologies, the general network driver structure and its design methodologies in Linux system are summarized. Through modifying the network device driver of Linux device driver 3rd version snull, c and improving the COW technology, the Zero-Copy technology in Linux (kernel version 2.6.11 ) is implemented. In the end, the success test tells us that the thorough analysis of network device driver is the foundation of many applications, and it also provides a certain improvement to a lot of real applications, even to military application development. 相似文献
19.
By analyzing the influencing factors of part quality making of sheet alloy of titanium by vibra cutter, the shape of upper reamer is set as cylinder and wedge-shaped form, and the lower reamer as plain and hemicycle form, and its main structural parameters are defined as well. Then it is validated further that such improved vibra cutter reamer can be used to process curve-edged parts of titanium alloy sheet. The experimental result shows that the titanium alloy sheet parts processed by above equipment have no sharpen angles for convex parts and evident crevasse of concave-edged part. In summary, such improvement can eliminate the free-waved edge and improve the manufacture quality of titanium alloy sheet parts greatly. 相似文献
20.
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results. 相似文献