Component fulfil this requirement, Computer Engineering

A component has the time to failure distribution that is modelled as the Weibull distribution with shape parameter 3 and scale parameter of 36 months. This component is planned to be deployed for a mission of 6 months at a time. If the needed mission reliability is 0.85, will a latest component fulfil this requirement?

Place the mission reliability versus of the age of the system and justify the age at which the component should be replaced.

Posted Date: 3/18/2013 8:42:31 AM | Location : United States







Related Discussions:- Component fulfil this requirement, Assignment Help, Ask Question on Component fulfil this requirement, Get Answer, Expert's Help, Component fulfil this requirement Discussions

Write discussion on Component fulfil this requirement
Your posts are moderated
Related Questions
How many types of stages include in process of data mining? The process of data mining comprised three stages as given below: a) The initial exploration b) Model buildin

The Concept of Process Unofficially a process is a program in execution subsequent to the program has been loaded in the main memory. Though a process is more than just a progr

what is uml ?

What is Algorithm Design Technique? An  algorithm  design  method  is  a  general  approach  to  solving  problems  algorithmically  that  is applicable to a variety of proble

State about the multiple inheritance multiple inheritance is shown in Figure. In this, one class is inherited from more than one class.

Q. Convention used to represent micro-operations? The convention used to represent micro-operations is: 1.  Computer register names are designated by capital letters (someti

Cheques vs Credit Cards       E-cheques:  E-cheques are used for business dealing in e-commerce.  Transactions of these cheques take place on Internet. In this system the elect

Define Word/byte rotation and XOR bit masking encryption technique to make sure secured transactions on the net? Word/byte rotation and XOR bit masking: In this process t

Problem: (i) What are the main threats that an organisation holding sensitive data, such as Public Data, on computer storage must guard against? (ii) To protect such data,

Why can CRC detect more errors than simple Checksum? There are two purposes a CRC can identify more errors than a simple Checksum. 1. Since an input bit is shifted by all th