Developing visual material can help to recall memory and also be a quick way to show lots of information. Visualization helps us remember (like when we try to picture where we’ve parked our car, and what's in our cupboards when writing a shopping list). We can create diagrams and visual aids depicting module materials and put them up around the house so that we are constantly reminded of our learning
A ppt -not of my design. I downloaded and then couldn't remember the link. If you are the author, please let me know so I can credit. This ppt is only being used in a k-12 educational environment for educational purposes.
Difference between control, construction, and expansion jointsscott-miller
There are numerous joints in every structure because it takes months to develop a building. Almost in every building, it has different joints. These joints need particular attention so that they can’t create a problem for you in the future. Here we discussed some differences between different types of joints
A ppt -not of my design. I downloaded and then couldn't remember the link. If you are the author, please let me know so I can credit. This ppt is only being used in a k-12 educational environment for educational purposes.
Difference between control, construction, and expansion jointsscott-miller
There are numerous joints in every structure because it takes months to develop a building. Almost in every building, it has different joints. These joints need particular attention so that they can’t create a problem for you in the future. Here we discussed some differences between different types of joints
Introduction to Pre-stressed and Precast Concrete TechnologyEngr Shah Farooq
This the first lecture of prestressed and precast technology. In this lecture overview of prestressed concrete is presented in such a way, that it will be very helpful for civil engineering professionals and students new to the field of prestressed concrete technology.
this lecture covers the following topics
Definition of prestressed and precast concrete
Difference between prestressed and normal reinforced concrete
Terminologies related to prestressed like tendons, Anchorage, Pre-tensioning, post-tensioning, etc
Brief History of prestressed concrete
Development of building materials for prestressed concrete
Advantages and disadvantages of prestressed concrete
Difference between pre-tension and post-tension prestressing.
and Difference between prestressed and precast concrete.
#CivilEngineering #CivilEngineer #Prestressed #Concrete #precast
Facebook Link: https://web.facebook.com/engrshahfarooq
Author Youtube Channel link:
www.youtube.com/c/CivilEngineersite
The Sun Temple at Konârak, located on the eastern shores of the Indian subcontinent, is one of the outstanding examples of temple architecture and art as revealed in its conception, scale and proportion, and in the sublime narrative strength of its sculptural embellishment. It is an outstanding testimony to the 13th-century kingdom of Orissa and a monumental example of the personification of divinity, thus forming an invaluable link in the history of the diffusion of the cult of Surya,the Sun God.
Simple explanation of History of architecture ll ( early Christianity , Byzantine Architecture, Islamic, Romanesque,Gothic, Renaissance,
Baroque and Rococo ).
Done by : AUM students .
A planar truss is the one whose all members lies in a single plane. If a plane truss does not change its shape when loaded then it is known as Rigid Planar Truss. Copy the link given below and paste it in new browser window to get more information on Planar Truss:- http://www.transtutors.com/homework-help/civil-engineering/planar-truss/
Romanesque architecture appeared in France at the end of the 10th century, with the development of feudal society and the rise and spread of monastic orders, particularly the Dominicans, which built many important abbeys and monasteries in the style. It continued to dominate religious architecture until the appearance of French Gothic architecture in the Ile-de-France between about 1140-1150.
Distinctive features of French romansque architecture include thick walls with small windows, rounded arches; a long nave covered with barrel vaults; and the use of the groin vault at the intersection of two barrel vaults, all supported by massive columns; a level of tribunes above the galleries on the ground floor, and small windows above the tribunes; and rows of exterior buttresses supporting the walls. Churches commonly had a cupola over the transept, supported by four adjoining arches; one or more large square towers, and a semi-circular apse with radiating small chapels. Decoration usually included very ornate sculpted capitals on columns and an elaborate semi-circular sculpted tympanum, usually illustrating the Last Judgement, over the main portal. Interior decoration often included murals covering the walls, colored tiles, and early stained glass windows. Late in the 12th century, the rib vault began to appear, particularly in churches in Normandy and Paris, introducing the transition to the Gothic style.
There are also present the some epic examples of churches of french romanesque architechture.
1. The Church of St. Trophime in Arles
2. The Abbey of Saint-Gilles-du-Gard
3. The Basilica of St. Sernin
4. The Abbey Church of Sainte Foy
5. Le Puy Cathedral
Introduction to Pre-stressed and Precast Concrete TechnologyEngr Shah Farooq
This the first lecture of prestressed and precast technology. In this lecture overview of prestressed concrete is presented in such a way, that it will be very helpful for civil engineering professionals and students new to the field of prestressed concrete technology.
this lecture covers the following topics
Definition of prestressed and precast concrete
Difference between prestressed and normal reinforced concrete
Terminologies related to prestressed like tendons, Anchorage, Pre-tensioning, post-tensioning, etc
Brief History of prestressed concrete
Development of building materials for prestressed concrete
Advantages and disadvantages of prestressed concrete
Difference between pre-tension and post-tension prestressing.
and Difference between prestressed and precast concrete.
#CivilEngineering #CivilEngineer #Prestressed #Concrete #precast
Facebook Link: https://web.facebook.com/engrshahfarooq
Author Youtube Channel link:
www.youtube.com/c/CivilEngineersite
The Sun Temple at Konârak, located on the eastern shores of the Indian subcontinent, is one of the outstanding examples of temple architecture and art as revealed in its conception, scale and proportion, and in the sublime narrative strength of its sculptural embellishment. It is an outstanding testimony to the 13th-century kingdom of Orissa and a monumental example of the personification of divinity, thus forming an invaluable link in the history of the diffusion of the cult of Surya,the Sun God.
Simple explanation of History of architecture ll ( early Christianity , Byzantine Architecture, Islamic, Romanesque,Gothic, Renaissance,
Baroque and Rococo ).
Done by : AUM students .
A planar truss is the one whose all members lies in a single plane. If a plane truss does not change its shape when loaded then it is known as Rigid Planar Truss. Copy the link given below and paste it in new browser window to get more information on Planar Truss:- http://www.transtutors.com/homework-help/civil-engineering/planar-truss/
Romanesque architecture appeared in France at the end of the 10th century, with the development of feudal society and the rise and spread of monastic orders, particularly the Dominicans, which built many important abbeys and monasteries in the style. It continued to dominate religious architecture until the appearance of French Gothic architecture in the Ile-de-France between about 1140-1150.
Distinctive features of French romansque architecture include thick walls with small windows, rounded arches; a long nave covered with barrel vaults; and the use of the groin vault at the intersection of two barrel vaults, all supported by massive columns; a level of tribunes above the galleries on the ground floor, and small windows above the tribunes; and rows of exterior buttresses supporting the walls. Churches commonly had a cupola over the transept, supported by four adjoining arches; one or more large square towers, and a semi-circular apse with radiating small chapels. Decoration usually included very ornate sculpted capitals on columns and an elaborate semi-circular sculpted tympanum, usually illustrating the Last Judgement, over the main portal. Interior decoration often included murals covering the walls, colored tiles, and early stained glass windows. Late in the 12th century, the rib vault began to appear, particularly in churches in Normandy and Paris, introducing the transition to the Gothic style.
There are also present the some epic examples of churches of french romanesque architechture.
1. The Church of St. Trophime in Arles
2. The Abbey of Saint-Gilles-du-Gard
3. The Basilica of St. Sernin
4. The Abbey Church of Sainte Foy
5. Le Puy Cathedral
Machine learning and linear regression programmingSoumya Mukherjee
Overview of AI and ML
Terminology awareness
Applications in real world
Use cases within Nokia
Types of Learning
Regression
Classification
Clustering
Linear Regression Single Variable with python
Exploring Support Vector Regression - Signals and Systems ProjectSurya Chandra
Our team competed in a Kaggle competition to predict the bike share use as a part of their capital bike share program in Washington DC using a powerful function approximation technique called support vector regression.
Machine Learning Foundations for Professional ManagersAlbert Y. C. Chen
20180526@Taiwan AI Academy, Professional Managers Class.
Covering important concepts of classical machine learning, in preparation for deep learning topics to follow. Topics include regression (linear, polynomial, gaussian and sigmoid basis functions), dimension reduction (PCA, LDA, ISOMAP), clustering (K-means, GMM, Mean-Shift, DBSCAN, Spectral Clustering), classification (Naive Bayes, Logistic Regression, SVM, kNN, Decision Tree, Classifier Ensembles, Bagging, Boosting, Adaboost) and Semi-Supervised learning techniques. Emphasis on sampling, probability, curse of dimensionality, decision theory and classifier generalizability.
Dear students get fully solved SMU MBA Fall 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
This is a preliminary study and the objective of this study is to make simple distributed database system with some basic tutorials. Cassandra is a distributed database from Apache that is highly scalable and designed to accomplish very large amounts of organized data. Without having a single point of failure, it offers high accessibility. This report highlights with a basic outline of Cassandra trailed by its architecture, installation, and significant classes and interfaces. Subsequently, it proceeds to cover how to perform operations such as CREATE, ALTER, UPDATE, and DELETE on KEYSPACES, TABLES, and INDEXES using CQLSH using C#/.NET Client with a sample program done by ASP.NET(C#).
Speckle Noise Reduction in Ultrasound Images using Adaptive and Anisotropic D...Md. Shohel Rana
US Imaging Technique less cost. Nonlinear and Anisotropic filter for removing speckle noise can be removed from US images. Proposed a modified Anisotropic filter which reduces speckle noises.
An Enhanced Model for Inpainting on Digital Images Using Dynamic MaskingMd. Shohel Rana
Given an image with significant portions missing or damaged. Dynamically detect the damaged regions to be inpainted. Reconstitute missing regions with data consistent with the rest of the image. Proposed a method which restore damaged area of the image reducing processing time without blurring output.
Comparing the Performance of Different Ultrasonic Image Enhancement Technique...Md. Shohel Rana
Medical ultrasound US images are usually corrupted by speckle noise during their acquisition. De-noising techniques are to remove noises while retaining the important signal features. Preservation of the image sharpness and details while suppressing the speckle noise. A novel restoration scheme has been introduced for ultrasound (US) images for speckle reduction which enhances the signal-to-noise ratio while conserving the edges and lines in the image
Malware analysis on android using supervised machine learning techniquesMd. Shohel Rana
In recent years, a widespread research is conducted with the growth of malware resulted in the domain of malware analysis and detection in Android devices. Android, a mobile-based operating system currently having more than one billion active users with a high market impact that have inspired the expansion of malware by cyber criminals. Android implements a different architecture and security controls to solve the problems caused by malware, such as unique user ID (UID) for each application, system permissions, and its distribution platform Google Play. There are numerous ways to violate that fortification, and how the complexity of creating a new solution is enlarged while cybercriminals progress their skills to develop malware. A community including developer and researcher has been evolving substitutes aimed at refining the level of safety where numerous machine learning algorithms already been proposed or applied to classify or cluster malware including analysis techniques, frameworks, sandboxes, and systems security. One of the most promising techniques is the implementation of artificial intelligence solutions for malware analysis. In this paper, we evaluate numerous supervised machine learning algorithms by implementing a static analysis framework to make predictions for detecting malware on Android.
This is a preliminary study and the objective of this study has been to reconstruct of missing parts or scratches of digital images is an important field used extensively in artwork restoration. This restoration can be done by using two approaches, image inpainting, and texture synthesis. There are many techniques for the two previous approaches that can carry out the process optimally and accurately. In this paper, the advantages and disadvantages of most algorithms of the image inpainting approach are discussed. Among the different algorithms, the proposed dynamic masking method outperformed than other techniques. This modification produces rapid and simple for reconstruction of small missing and damaged portions of images that are two to three orders of magnitude faster than current methods while producing comparable results with respect to other.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
1. School of Computing, USM
1
Date : November, 2017
Location : USM
Presented by:
Md. Shohel Rana
Instructed by:
Dr. Parthapratim Biswas
VISUAL TECHNIQUES
2. CONTENTS
• Motivation and Contribution
• What is Visual Techniques
• Applications
• Problem Definition
• Result and Discussion
• References
School of Computing, USM
2
3. MOTIVATION AND CONTRIBUTION
• Developing visual material can help to recall memory and also be a
quick way to show lots of information.
• Visualization helps us remember (like when we try to picture where
we’ve parked our car, and what's in our cupboards when writing a
shopping list).
• We can create diagrams and visual aids depicting module materials
and put them up around the house so that we are constantly
reminded of our learning.
School of Computing, USM
3
4. WHAT IS VISUAL TECHNIQUES
• Visual techniques offer an interesting, stimulating and interactive
approach to gathering information. They are appropriate in a variety
of situations, as they fulfil numerous functions.
When should it be used?
• Visual techniques can be used in many settings, as an alternative to
more traditional methods and may be particularly useful as:
Pictures and graphs can help suggest opinions and allow the use of
imagination in expanding on a scene.
Offering an alternative to traditional discussion groups, yet still being able
to draw out the rich variety of qualitative information from participants.
A method of producing tangible outcomes at the end of the research
process (e.g. series of community generated impacts illustrating how
local people view the local area).
School of Computing, USM
4
5. PROBLEM DEFINITION
• Problem 1:
A.Write a short program to generate data points for displaying the
curve y = x2. Plot the data.
B.Add noise to y data points generated above by y0 = y + r s, where r is∗
a random number between 1 and 1 and s is a scaling factor that
controls the strength of the noise. Choose s appropriately to generate
noise and plot the data set.
C.Write a simple filter program by averaging the data points to smooth
the plot in B. You may use any programming languages and ready
made random number generators but not inbuilt smoothing
programs. Investigate the relationship between the strength of the
noise and the number of times you need to run the filter program to
smooth the noisy data set.
School of Computing, USM
5
6. PROBLEM DEFINITION (CONT.)
• Essential in the collection of data taken over time is some form of random
variation. Having many methods for reducing of canceling the effect due to
random variation. An oftenused technique in industry is "smoothing". This
technique, when properly applied, tells more clearly the essential
movement, periodic and cyclic components
• Smoothing data removes random variation and shows trends and cyclic
components taking averages is the simplest way to smooth data
• There are two distinct groups of smoothing methods
Averaging Methods
Exponential Smoothing Methods
• We examined averaging methods, such as the "simple" average of all past
data
School of Computing, USM
6
8. PROBLEM DEFINITION (CONT.)
• In summary, we state that
The "simple" average of all past observations is only a useful estimate for
calculating when there are no trends. If there are trends, use different estimates
that take the trend into account
The average "weighs" all past observations equally. For example, the average of
the values 3, 4, 5 is 4. We know, of course, that an average is computed by
adding all the values and dividing the sum by the number of values. Another way
of computing the average is by adding each value divided by the number of
values.
School of Computing, USM
8
9. PROBLEM DEFINITION (CONT.)
• Problem 2:
A.Write a short program to generate N uniform random variates x
between -1 to +1 in one dimension. Compute the histogram of the N
variates and visualize your data.
B.Repeat the calculation in two dimension.
C.Using the uniform random variates x, construct new variates y, such
that
where m is an integer > 5. Find the distribution (i.e., histogram) of y and plot
your results in two dimension.
School of Computing, USM
9
10. PROBLEM DEFINITION (CONT.)
• A Histogram is a vertical bar chart that depicts the distribution of a set of
data. Unlike Run Charts or Control Charts, a Histogram does not reflect
process performance over time.
• A Histogram will make it easy to see where the majority of values falls in a
measurement scale, and how much variation there is.
• When are Histograms used?
Summarize large data sets graphically
Compare process results with specification limits
Communicate information graphically
Use a tool to assist in decision making
School of Computing, USM
10
12. PROBLEM DEFINITION (CONT.)
• Problem 3:
A.Download the file ‘data.jpg’.
B.Digitize the plot using a digitizing software and save the data in a file.
C.De-convolute the data using a linear combination of gaussian functions as
follows:
Write
where jmax is the number of gaussian functions defined by the parameters σj and xj.
Form the deviation L^(2) (or its square) as discussed in the class:
• Fit L^(2) w.r.t the gaussian parameters above using your favorite fitting program.
• Plot the original and fitted data. Show also the individual gaussian functions and the
fitted data in a separate plot.
School of Computing, USM
12
13. PROBLEM DEFINITION (CONT.)
• Given a large number of data points, we may sometimes want to figure out
which ones vary significantly from the average. For example, in
manufacturing, we may want to detect defects or anomalies. We show how
a dataset can be modeled using a Gaussian distribution, and how the
model can be used for anomaly detection
• The Gaussian distribution is a continuous function which approximates the
exact binomial distribution of events
• The signal error if often a sum of many independent errors. For example, in
CCD camera one could have photon noise, transmission noise, digitization
noise that are mostly independent, so the error will often be normally
distributed due to the central limit theorem.
School of Computing, USM
13
14. PROBLEM DEFINITION (CONT.)
• Distribution fitting involves modelling the probability distribution of a single
variable. The model is a normalized probability density function. The
appropriate plot for the data is a histogram
• The normal distribution is a theoretical function commonly used in inferential
statistics as an approximation to sampling distributions. In general, the
normal distribution provides a good model for a random variable, when:
There is a strong tendency for the variable to take a central value;
Positive and negative deviations from this central value are equally likely;
The frequency of deviations falls off rapidly as the deviations become larger.
School of Computing, USM
14
16. PROBLEM DEFINITION (CONT.)
• Problem 4:
Consider a triangle represented by three vertices v1, v2 and v3 in a plane.
Write a program to compute the center and radius of the circumcircle of
the triangle. This result will be useful in constructing the Delaunay
triangulation of a set of points in two dimensions.
• Problem 5:
a.Generate a set of points P = {xn, yn} on a plane using a random number
generator so that (xn, yn) [0,L] and the distance between any two points is∈
always greater than r0. Choose, for example, n = 100, L = 10 and r = 1.
b.Using MATLAB, write a program to generate Delaunay triangulation of the
set.
• Problem 6:
Repeat problem 5(b) using the DL algorithm discussed in the class.
School of Computing, USM
16
17. PROBLEM DEFINITION (CONT.)
• A technique for creating a mesh of contiguous, nonoverlapping triangles
from a dataset of points. Each triangle's circumscribing circle contains no
points from the dataset in its interior. Delaunay triangulation is named for the
Russian mathematician Boris Nikolaevich Delaunay
• The Delaunay triangulation is a triangulation which is equivalent to the nerve
of the cells in a Voronoi diagram, i.e., that triangulation of the convex hull of
the points in the diagram in which every circumcircle of a triangle is an
empty circle
• Delaunay triangulations help in constructing various things:
Euclidean Minimum Spanning Trees
Approximations to the Euclidean
Traveling Salesperson Problem
School of Computing, USM
17
19. PROBLEM DEFINITION (CONT.)
• Problem 8:
Generate a set of points P = {xn, yn} on a plane using a random number
generator so that (xn, yn) [0,L] and the distance between any two points is∈
always greater than r0. Choose, for example, n = 300, L = 30 and r0 = 1.
Construct the Voronoi diagram for this point set using:
a.the circumcenters of the DL triangles
b.the points of intersection of the perpendicular bisectors of the lines joining
the nearest neighbors of each point
School of Computing, USM
19
21. PROBLEM DEFINITION (CONT.)
• Problem 7:
Generate a set of points {xn, yn} in a plane and construct the convex hull of
the set. Vary n = 500 to n = 10000 in steps of 500 and plot a graph showing
the CPU time versus number of points in the set.
School of Computing, USM
21
22. PROBLEM DEFINITION (CONT.)
• Why Convex Hulls?
shortest path avoiding the obstacle
• Applications:
Image Registration and Retrieval
Image Classification
Uses of convex-hull in Image Editing Softwares i.e. photoshop
Magic-wand Tool
Glow & shadow Effect on layer. Can be better understand by applying on non-rectangular image.
Make a selection by ctrl+click on layer.
Use of convex hull algorithm in daily life by our Mom.
Gathering grain seeds on the floor by hand or using whipper
Use of convex hull algorithm by weather professionals to determine area of rain fall.
Determine total area of waterfalls by analyzing all censors those send signal of waterfall using
convex hell algorithm
School of Computing, USM
22
24. PROBLEM DEFINITION (CONT.)
• Problem 9:
Generate a set of points {xn, yn} in a plane and implement the k-means
cluster algorithm to partition data points into k clusters. Check your results by
generating points from a Gaussian random distribution centered at different
points in the plane. Compute also the radius of gyration of each cluster and
present your results in a 2-dimensional plot for visualization.
School of Computing, USM
24
25. PROBLEM DEFINITION (CONT.)
• K-Means clustering generates a specific number of disjoint, flat (non-
hierarchical) clusters. It is well suited to generating circular clusters.
• The K-Means method is numerical, unsupervised, non-deterministic and
iterative
• k-means becomes a great solution for pre-clustering, reducing the space
into disjoint smaller sub-spaces where other clustering algorithms can be
applied
School of Computing, USM
25
26. PROBLEM DEFINITION (CONT.)
• The K-Means Algorithm Process
1. The dataset is partitioned into K clusters and the data points are randomly
assigned to the clusters resulting in clusters that have roughly the same number
of data points.
2. For each data point:
3. Calculate the distance from the data point to each cluster.
4. If the data point is closest to its own cluster, leave it where it is. If the data point is
not closest to its own cluster, move it into the closest cluster.
5. Repeat the above step until a complete pass through all the data points results
in no data point moving from one cluster to another. At this point the clusters
are stable and the clustering process ends.
6. The choice of initial partition can greatly affect the final clusters that result, in
terms of inter-cluster and intra-cluster distances and unity.
School of Computing, USM
26
28. RESULT AND DISCUSSION
What we learnt from this course?
How to look on problems?
Where we can apply these methodologies?
How to solve related problems using these methodologies?
How to summarize results?
School of Computing, USM
28