Evaluation Operator

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 33198 Experts worldwide ranked by ideXlab platform

Rongwei Yang - One of the best experts on this subject based on the ideXlab platform.

  • Operator theory in the hardy space over the bidisk iii
    Journal of Functional Analysis, 2001
    Co-Authors: Rongwei Yang
    Abstract:

    This paper is a continuation of a project of developing a systematic Operator theory inH2(D2). A large part of it is devoted to a study ofEvaluation Operator which is a very useful tool in the theory. A number of elementary properties of the Evaluation Operator are exhibited, and these properties are used to derive results in other topics such as interpretation of characteristic opertor function inH2(D2), spectral equivalence, compactness, compressions of shift Operators, etc., Even though some results reflect the two variable nature ofH2(D2), the goal of this paper is to manifest a close tie between the Operator theory inH2(D2) and classical single Operator theory. The unilateral shift of a finite multiplicity and the Bergman shift will be used as examples to illustrate some of the results.

  • Operator theory in the hardy space over the bidisk ii
    Integral Equations and Operator Theory, 2000
    Co-Authors: Ronald G Douglas, Rongwei Yang
    Abstract:

    This paper is a continuation of a project of developing a systematic Operator theory inH 2(D 2). A large part of it is devoted to a study ofEvaluation Operator which is a very useful tool in the theory. A number of elementary properties of the Evaluation Operator are exhibited, and these properties are used to derive results in other topics such as interpretation of characteristic opertor function inH 2(D 2), spectral equivalence, compactness, compressions of shift Operators, etc., Even though some results reflect the two variable nature ofH 2(D 2), the goal of this paper is to manifest a close tie between the Operator theory inH 2(D 2) and classical single Operator theory. The unilateral shift of a finite multiplicity and the Bergman shift will be used as examples to illustrate some of the results.

M U Yongzhen - One of the best experts on this subject based on the ideXlab platform.

  • a comprehensive Evaluation index system of power grid security and benefit based on multi Operator fuzzy hierarchy Evaluation method
    Power system technology, 2015
    Co-Authors: M U Yongzhen
    Abstract:

    A new comprehensive Evaluation index system of power grid security and benefit is proposed. The indices in the proposed system are divided into three categories: the regulation security indices, the general security indices and the efficiency indices, and a hierarchical system, which composes of four layers: the target layer, the class layer, the index layer and the sub-index layer, is constructed. A novel comprehensive fuzzy Evaluation Operator, in which the master-slave multiplication Operator, the zero-one multiplication Operator and the fuzzy analytic hierarchy process are included, is put forward for the weight analysis and index computation. Combining with fuzzy analytical hierarchy process(AHP), a multi-Operator fuzzy analytical hierarchy Evaluation model and corresponding solution method are built. Case study results show that using the proposed method the comprehensive attributes of power grid can be effectively evaluated, thus it is possible to provide guidance in following aspects: performing comprehensive Evaluation of power grid, comparing power grid planning and layout and summarizing the operating experience.

Zhu Guang Yu - One of the best experts on this subject based on the ideXlab platform.

  • optimization of process route by genetic algorithms
    Robotics and Computer-integrated Manufacturing, 2006
    Co-Authors: Zhang Wei Bo, Zhu Guang Yu
    Abstract:

    Abstract Process route sequencing is considered as the key technology for computer aided process planning (CAPP) and is very complex and difficult. In this paper, based on the analyzing of various constraints in process route sequencing and the astringency of Genetic Algorithms (GAs), the GA is reconstructed, including the establishing of the coding strategy, the Evaluation Operator and the fitness function. The new GAs can meet the requirement of sequencing work and can meet the requirement of astringency. The natural number is adopted in coding strategy, the “elitist model” and the “tournament selection” are adopted as selection Operators, the nonconforming sequential searching crossover Operator is used and the inconsistent mutation Operator is adopted, the fitness function is defined as a formula of the sum of compulsive constraints with each weighing, and these constraints are used as the control strategy for GAs in the searching process. By using GAs in the optimization, the optimal or near-optimal process route is obtained finally.

Zhang Wei Bo - One of the best experts on this subject based on the ideXlab platform.

  • optimization of process route by genetic algorithms
    Robotics and Computer-integrated Manufacturing, 2006
    Co-Authors: Zhang Wei Bo, Zhu Guang Yu
    Abstract:

    Abstract Process route sequencing is considered as the key technology for computer aided process planning (CAPP) and is very complex and difficult. In this paper, based on the analyzing of various constraints in process route sequencing and the astringency of Genetic Algorithms (GAs), the GA is reconstructed, including the establishing of the coding strategy, the Evaluation Operator and the fitness function. The new GAs can meet the requirement of sequencing work and can meet the requirement of astringency. The natural number is adopted in coding strategy, the “elitist model” and the “tournament selection” are adopted as selection Operators, the nonconforming sequential searching crossover Operator is used and the inconsistent mutation Operator is adopted, the fitness function is defined as a formula of the sum of compulsive constraints with each weighing, and these constraints are used as the control strategy for GAs in the searching process. By using GAs in the optimization, the optimal or near-optimal process route is obtained finally.

Chen Shuguang - One of the best experts on this subject based on the ideXlab platform.

  • the copy structure function and the copy Evaluation Operator security loophole analyzes
    Computer Programming Skills & Maintenance, 2008
    Co-Authors: Chen Shuguang
    Abstract:

    C/C++ took the present more popular development kit, holds the pivotal status in the procedure development, therefore studies the C/C++ procedure the security loophole question, detailed carries on to the security loophole classifies and analyzes the reason and proposed the correlation suggestion is one item very essential, watershed work.The article prime task is unifies ANSIC and the C++ international standard, proposed sketchily from C/C++ language mechanism many aspects in the C/C++ procedure saves crosses copy structure function and copy Evaluation Operator common, model security loophole, and has studied in thoroughly the C++ procedure the unusual aspect security loophole, designs the example description program security loophole the existence and the harm, analyzes the example initiation loophole the reason, and proposed how avoids the feasible suggestion plan which the loophole occurs.The hope by this achieved instructs the programmer safely to use goal of the security loophole in the software performance history which the C/C++ procedure, avoids possibly appearing.