نتایج جستجو برای: warranty distribution network

تعداد نتایج: 1233920  

Journal: :journal of optimization in industrial engineering 2010
babak abbasi behrouz afshar nadjafi

as is well known, estimating parameters of the tree-parameter weibull distribution is a complicated task and sometimes contentious area with several methods vying for recognition. weibull distribution involves in reliability studies frequently and has many applications in engineering. however estimating the parameters of weibull distribution is crucial in classical ways. this distribution has t...

Journal: :مهندسی صنایع 0
محمد جعفر تارخ دانشگاه صنعتی خواجه نصیر الدین طوسی امیر ناصری کارشناسی ارشد مهندسی صنایع

in this paper, the distribution network for multi-level supply chain has been studied. products produced in factories are sent to customers through warehouses and distribution centers based on specific demands. warehouses as holding inventory facilities are located close to factories and the distribution centers are placed in the most accessible locations for services near customers. each item ...

M Aliakbar-Golkar M Sedghi

Conventional passive distribution networks are changing to modern active distribution networks which are not radial. Conventional load flow methods should be modified for new distribution networks analysis. In modern distribution networks distributed generation (DG) units are embedded with conventional and/or renewable resources. DG units are generally modeled as PV or PQ nodes which inject ...

2010
S. BOUGUERRA

This paper addresses the problem related to the adoption of an extended warranty period for randomly failing products sold under warranty. The possibility of buying an extended warranty for a given additional cost is often offered to the buyer by the manufacturer. The buyer has then to decide to take the extended warranty or not when purchasing the product. We develop in this paper a mathematic...

2011
Nicholas J. Bryan Ge Wang

Computational analysis of musical influence networks and rank of sample-based music is presented with a unique outside examination of the WhoSampled.com dataset. The exemplary dataset maintains a large collection of artist-to-artist relationships of sample-based music, specifying the origins of borrowed or sampled material on a song-by-song basis. Directed song, artist, and musical genre networ...

Journal: :Mathematical biosciences 2012
Tom Britton David Lindenstrand

A social (sexual) network is modeled by an extension of the configuration model to the situation where edges have weights, e.g., reflecting the number of sex-contacts between the individuals. An epidemic model is defined on the network such that individuals are heterogeneous in terms of how susceptible and infectious they are. The basic reproduction number R(0) is derived and studied for variou...

Journal: :Advances in Complex Systems 2003
Dafang Zheng Güler Ergün

We introduce and solve a model which considers two coupled networks growing simultaneously. The dynamics of the networks is governed by the new arrival of network elements (nodes) making preferential attachments to pre-existing nodes in both networks. The model segregates the links in the networks as intra-links, cross-links and mix-links. The corresponding degree distributions of these links a...

Journal: :CoRR 2012
Heiko Bauke Cristopher Moore Jean-Baptiste Rouquier David Sherrington

Preferential attachment is a popular model of growing networks. We consider a generalized model with random node removal, and a combination of preferential and random attachment. Using a high-degree expansion of the master equation, we identify a topological phase transition depending on the rate of node removal and the relative strength of preferential vs. random attachment, where the degree d...

A. Moosavienia, K. Mohammadi,

In this paper we first show that standard BP algorithm cannot yeild to a uniform information distribution over the neural network architecture. A measure of sensitivity is defined to evaluate fault tolerance of neural network and then we show that the sensitivity of a link is closely related to the amount of information passes through it. Based on this assumption, we prove that the distribu...

Journal: :CoRR 2010
A. Yazdani Paul Jeffrey

In this paper we propose an alternative approach for the assessment of network vulnerability under random and intentional attacks as compared to the results obtained from the “vulnerability function”given by Criado et al. [Int. J. Comput. Math., 86 (2)(2009), pp. 209-218]. By using spectral and statistical measurements, we assess robustness as the antonym to vulnerability of complex networks an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید