Search Results

You are looking at 11 - 20 of 56 items for :

  • "similarity" x
  • Materials and Applied Sciences x
  • All content x
Clear All

cloning probability, which refers to the similarity of two implicated flowers. (iv) The switching between local and global pollination can be controlled by interaction probability P n ∈ [0, 1]. To formulate the algorithm update procedure, the assumptions

Open access

sharing. By using the ontology, syntax and semantics are defined to describe the information explicitly. As discussed in [ 30 ], compared to other information modeling methodologies, the use of ontology has some similarities but also some distinct

Open access

avail specific data for calculations is the zero unitarization method. Another method that is often applied is the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. It exploits the process of non-linear scaling and

Restricted access

and similarity to control ( Struck et al., 2014 ). Other studies showed a significant decrease in scores for overall acceptability for the cake with a replacement of fat and sugar with inulin ( Rodríguez-García et al., 2014 ). Therefore, chia gel may

Restricted access

In this study, the traffic flow of morning peak hour is analyzed in residential areas using dynamic traffic assignment method. A comprehensive analysis of the traffic assignment was performed in six different network topologies. The main goals were to compare different road networks and to identify significant similarities and differences of these patterns. By comparing results, a highly detailed picture of the differences crystallized between travel time, velocity and ratio of used routes.

Restricted access

The well-known SIMP method has been completed for suppressing the checkerboard pattern and other corner contact configuration appearances. The extended and corner contact optimality is used for interpreting some quasi-2D optimal topologies. The calculation results of presented algorithms are in close similarity to the known exact analytical solutions. Comparing the sub-meshing of the presented methods, CO-SIMP is the most advanced one, because there are minimum four times more design variables at the same number of FEs. The corner-contact penalty function was developed for 3D topologies as well.

Restricted access

B. cereus and B. thuringiensis strains have been associated with gastro-intestinal infections due to enterotoxins production. The possibility of differentiating between B. cereus and B. thuringiensis is a real need in preventing intoxication and in monitoring potentially contaminated foods. The use of DNA comparison provides clearer results than classical microbiological methods in distinguishing B. cereus from B. thuringiensis . The use of a Polymerase Chain Reaction (PCR) followed by Endonuclease Restriction (RE) made the distinction possible in spite of the huge similarity between the two closely related species.

Restricted access

One of the most important challenges in urban design is planning an appropriate street network, satisfying the demand of users with different transport modes. Understanding the nature of road networks has been thoroughly studied problem for many years and extensive professional literature is now available in this respect. In this study, five different micro-districts and their road networks have been analyzed in Budapest. Therefore, this paper is aimed at providing a contribution to the knowledge of comparing road networks of different residential estates under different traffic loads. Moreover, significant similarities and differences were identified among urban street layouts in this paper.

Restricted access

In this paper two different password databases are compared. Both of them had only Hungarian human-generated passwords. The first database contained user passwords relating to the authorization mechanism of online banking transactions, while the second one contained passwords relating to the authorization of opening newsletters. The first aim of this paper was to analyze both databases and find differences and similarities between them. The second aim was to develop a method of decrypting the most Hungarian hashed passwords in a given time unit.

Restricted access

Abstract

Human beings live in a complex and magical system of nature. The constitution of everything is like the structure science of architecture, which presents various forms and combinations. The development of structure science makes modern architecture show the high unity of internal structure and external contour. Through the study of branch networks formed by rivers, the mystery of branch growth can be found, for instance fractal self-similarity, preferential growth at the tops, avoidance of homogeneity, etc. Based on the understanding of branch ecosystem, everyone can try to build a sustainable surface structure by mimicking the laws of river network.

Open access