Bisection Method is a Derivative Based Method for Optimization.
It is one of the classical optimization techniques.
Numerical on Bisection method is discussed in this Presentation
This document discusses numerical solutions of partial differential equations. It contains an introduction and four chapters:
1. Preliminaries - Defines basic concepts like differential equations, partial derivatives, order of a differential equation.
2. Partial Differential Equations of Second Order - Classifies second order PDEs and provides examples.
3. Parabolic Equations - Discusses explicit and implicit finite difference methods like Schmidt's method and Crank-Nicolson method to solve heat equation.
4. Hyperbolic Equations - Will discuss numerical methods to solve hyperbolic PDEs like the wave equation.
The document discusses off-policy evaluation techniques for estimating the value of a target policy using data collected from a different behavior policy. It provides an overview of contextual bandit and reinforcement learning settings for off-policy evaluation. Several important estimators are discussed, including importance sampling, direct method, augmented importance sampling, and doubly robust estimators. The document also discusses semiparametric efficiency bounds and how various estimators can achieve these bounds.
The document discusses representation learning and the manifold hypothesis. It explains that real-world data can be thought of as concentrating near a lower-dimensional manifold embedded within a high-dimensional space. Representation learning involves modeling the structure of this data-supporting manifold. The geometric notion of manifold provides an important perspective for representation learning, with the goal of learning an intrinsic coordinate system on the embedded manifold.
ICRA 2019 (IEEE International Conference on Robotics and Automation; https://www.icra2019.org/ )の参加速報を書きました。
この資料には下記の項目が含まれています。
・ICRA 2019の概要
・ICRA 2019での動向や気付き
・ICRAの重要技術
・今後の方針
・論文まとめ(102本あります)
Murad Muradi - Quantum Annealing based Optimization of Robotic Movement in Ma...Tom Hubregtsen
1) The document discusses using quantum-inspired optimization techniques to optimize robotic processes in manufacturing.
2) It describes an experimental setup using quantum annealing via the D-Wave 2000Q system and digital annealing to solve a problem involving optimizing the scheduling and sequencing of robotic tasks to seal joints in a PVC sealing process.
3) The results show that digital annealing was able to solve problems with up to 22 seams per robot, while quantum annealing could only handle up to 5 seams due to hardware limitations, but found the optimal solution. Digital annealing provided results comparable to simulated annealing but 1-2 magnitudes faster runtime.
The document discusses the bisection method for finding roots of equations. It begins by defining the bisection method as a root finding technique that repeatedly bisects an interval and selects a subinterval containing the root. It notes that while simple and robust, the bisection method converges slowly. The document then provides the step-by-step algorithm for implementing the bisection method and works through an example of finding the root of f(x) = x^2 - 2 between 1 and 2. It concludes by presenting the bisection method code in C++.
This document describes the bisection method for finding roots of equations numerically. It begins by classifying equations as linear, polynomial, or generally non-linear. For non-linear equations, numerical methods are required. The bisection method iteratively halves the interval that contains a root until a solution is found to within a specified tolerance. An example illustrates the step-by-step process of applying the bisection method to find the root of a sample function. MATLAB code is also presented to implement the bisection method.
The document discusses off-policy evaluation techniques for estimating the value of a target policy using data collected from a different behavior policy. It provides an overview of contextual bandit and reinforcement learning settings for off-policy evaluation. Several important estimators are discussed, including importance sampling, direct method, augmented importance sampling, and doubly robust estimators. The document also discusses semiparametric efficiency bounds and how various estimators can achieve these bounds.
The document discusses representation learning and the manifold hypothesis. It explains that real-world data can be thought of as concentrating near a lower-dimensional manifold embedded within a high-dimensional space. Representation learning involves modeling the structure of this data-supporting manifold. The geometric notion of manifold provides an important perspective for representation learning, with the goal of learning an intrinsic coordinate system on the embedded manifold.
ICRA 2019 (IEEE International Conference on Robotics and Automation; https://www.icra2019.org/ )の参加速報を書きました。
この資料には下記の項目が含まれています。
・ICRA 2019の概要
・ICRA 2019での動向や気付き
・ICRAの重要技術
・今後の方針
・論文まとめ(102本あります)
Murad Muradi - Quantum Annealing based Optimization of Robotic Movement in Ma...Tom Hubregtsen
1) The document discusses using quantum-inspired optimization techniques to optimize robotic processes in manufacturing.
2) It describes an experimental setup using quantum annealing via the D-Wave 2000Q system and digital annealing to solve a problem involving optimizing the scheduling and sequencing of robotic tasks to seal joints in a PVC sealing process.
3) The results show that digital annealing was able to solve problems with up to 22 seams per robot, while quantum annealing could only handle up to 5 seams due to hardware limitations, but found the optimal solution. Digital annealing provided results comparable to simulated annealing but 1-2 magnitudes faster runtime.
The document discusses the bisection method for finding roots of equations. It begins by defining the bisection method as a root finding technique that repeatedly bisects an interval and selects a subinterval containing the root. It notes that while simple and robust, the bisection method converges slowly. The document then provides the step-by-step algorithm for implementing the bisection method and works through an example of finding the root of f(x) = x^2 - 2 between 1 and 2. It concludes by presenting the bisection method code in C++.
This document describes the bisection method for finding roots of equations numerically. It begins by classifying equations as linear, polynomial, or generally non-linear. For non-linear equations, numerical methods are required. The bisection method iteratively halves the interval that contains a root until a solution is found to within a specified tolerance. An example illustrates the step-by-step process of applying the bisection method to find the root of a sample function. MATLAB code is also presented to implement the bisection method.
The document discusses numerical methods for finding roots of equations and integrating functions. It covers root-finding algorithms like the bisection method, Regula Falsi method, modified Regula Falsi, and secant method. These algorithms iteratively find roots by narrowing the interval that contains the root. The document also discusses numerical integration techniques like the trapezoidal rule to approximate the area under a curve without having a closed-form solution. It notes the tradeoffs between different root-finding algorithms in terms of speed, accuracy, and ability to guarantee convergence.
The document discusses numerical computing and various interpolation techniques. Numerical computing involves solving complex mathematical problems using simple arithmetic operations by formulating models that can be solved numerically. The document then discusses nonlinear equations and various iterative methods to solve them, including bracketing methods like bisection and regula falsi, and open-end methods like Newton-Raphson and secant. It also discusses fixed point iteration. Finally, it covers interpolation techniques like Lagrange interpolation and Newton interpolation to estimate values of a function at intermediate points.
The document discusses the bisection method for finding real roots of equations. It provides the step-by-step algorithm for applying the bisection method. The key steps are: (1) find two values a and b where the function has opposite signs, (2) compute the midpoint x0 between a and b and evaluate the function there, (3) replace either a or b with x0 depending on whether f(x0) is positive or negative, and (4) repeat until the desired accuracy is reached. The document includes an example of applying the bisection method to find the root of the equation f(x) = x^3 - 2x - 5 between 2 and 3.
The document describes the bisection method, a root-finding algorithm that uses binary search to find roots (values that make a function equal to zero) of a continuous function. It works by repeatedly bisecting an interval known to contain a root and narrowing in on the root. The key steps are: (1) Start with an interval [a,b] where the function changes sign, ensuring a root exists in the interval. (2) Calculate the midpoint m of the interval. (3) Determine which subinterval [a,m] or [m,b] contains the root based on the sign change and update the interval accordingly. (4) Repeat until the interval size is small enough to approximate the root.
The bisection method is used to find the root of equations by repeatedly bisecting an interval and determining if the function value at the midpoint is positive or negative. The document provides examples of using the bisection method to find roots of equations like X^3-X-1, 4sinx-e^x, and X^2-4X-10. It shows calculating the function values at the endpoints of intervals, determining if the sign changes, bisecting the interval, and repeating until converging on the root.
The bisection method is a root-finding algorithm that uses binary search to find roots or zeroes of a function. It works by repeatedly bisecting an interval and determining whether the root lies in the upper or lower interval based on the sign of the function. The algorithm converges to a root by halving the size of the bracketing interval at each iteration. An example applies the bisection method to find the depth at which a floating ball is submerged. After 10 iterations, the estimated root is found to two significant digits.
Why do we study numerical analysis?
What are errors?
#WikiCourses
https://wikicourses.wikispaces.com/Num001+Numerical+Methods
This document summarizes numerical methods used in various fields including engineering, crime detection, scientific computing, finding roots, and solving heat equations. It discusses how numerical methods are widely used in engineering to model systems using mathematical equations when analytical solutions are not possible. Examples of applying numerical methods include structural analysis, fluid dynamics, image processing to deblur photos, and algorithms for finding roots of equations and solving differential equations.
This presentation discusses the application of numerical methods in real-life scenarios. It provides examples such as estimating ocean currents, modeling combustion flow in coal power plants, and simulating airflow over airplane bodies. The presentation also examines modeling electromagnetics, shuttle/tank separation, and other applications involving differential equations, programming, control systems, and data fitting. In total, 16 real-world uses of numerical methods are outlined.
The document discusses two numerical methods for finding the root of a non-linear equation: the bisection method and the fixed-point method. The bisection method uses an initial interval containing the root and iteratively halves the interval to converge on the root. The fixed-point method rewrites the equation as x=g(x) and iteratively applies the function g to find the root. An example applying both methods to find the root of x^3 - 9x^2 + 18x - 6 = 0 is presented, with the bisection method converging after 9 iterations to a root of 2.2944336.
Scott D. Thomas has over 15 years of experience as a scientific software engineer applying numerical models and algorithms to problems in computational fluid dynamics (CFD), computational engineering mechanics (CEM), and computational infrared radiation (CIR) using languages like Fortran, C, C++, and C#. He has worked for companies like Dell Services Federal Government, Raytheon, and independently on projects involving low-boom supersonic aircraft design, flow simulation optimization, and camera control software. Thomas has an MS in Mathematics with a focus on Numerical Analysis from the University of California, Berkeley.
Abstract:
The explosive growth of online services powered by data centres (web search, cloud computing, etc.) has motivated intense research into data centre network (DCN) design over the past decade. Computational demands are testing the limits of current engineering capabilities, and a new field in theoretical research has emerged with its roots in the area of traditional interconnection networks; adaptations of well-understood topologies such as generalized hypercubes, fat-trees, random regular graphs, WK-recursive networks, butterfly networks, as well as topologies geared explicitly towards DCNs, have all been proposed as DCN topologies in the last 7 years. Along with these custom-built (graph) topologies comes the need for theoretical analysis in scenarios that can be radically different from those ordinarily expected in traditional networks. I will give an overview of this emerging field.
I will then present a generic method of adapting a suitably chosen graph G to build a server-centric DCN topology G*, in such a way that any good networking properties of G can be preserved. In particular, routing algorithms on G can be used in G*, and when G is regular, the bisection width of G* (a well known throughput metric) can be obtained from the solution to an edge-isoperimetric problem on G.
Virtual reality uses computer technology to simulate environments that users can interact with, experiencing them as if real. The document discusses how VR is being applied in fields like therapy, training, and education by creating immersive simulations. Augmented reality enhances real environments with virtual elements like images and information. The future may see VR integrated into daily life and culture as the technology advances.
The document proposes the development of piezoresistive transistors using layered dichalcogenide materials to overcome limitations in silicon-based devices. It outlines a 3-phase technical approach to optimize materials, demonstrate a large-scale functional prototype, and develop a full-scale prototype. A project timeline, budget, and potential economic and social impacts are also presented.
This document describes a bisection method algorithm to find the root of a function f between the values a and b within a specified tolerance eps. The algorithm takes the function f, initial values a and b with opposite signs of f, maximum number of iterations N, and tolerance eps as inputs. It repeatedly bisects the interval [a,b] where f changes sign and returns the root r once the interval is smaller than the tolerance or a root is found directly at the endpoints.
The document discusses different methods for finding the roots or zeros of equations, where the root is the value of x that makes the equation f(x) equal to 0. It describes graphical methods, incremental search methods like bisection which divides the interval in half each iteration, and open methods like Newton-Raphson that use calculus to home in on the root. It also addresses challenges in finding multiple roots where the function is tangent to the x-axis at the root.
The document discusses the Newton-Raphson method for solving nonlinear equations. It involves starting with an initial guess for the root and iteratively improving the estimate using the function value and derivative until reaching an acceptable approximation of the true root. The method relies on linearizing the function using its tangent line to generate improved estimates in each step.
Presentation on binary search, quick sort, merge sort and problemsSumita Das
The document discusses four sorting algorithms: binary search, quicksort, merge sort, and their working principles. It provides:
1) Binary search works by repeatedly dividing a sorted list in half and evaluating the target value against the midpoint.
2) Quicksort uses a pivot element to partition an array into subarrays of smaller size, sorting them recursively.
3) Merge sort divides an array into halves, recursively sorts them, and then merges the sorted halves back together.
4) Examples are given of how each algorithm would sort sample arrays through their divide and conquer approaches.
The document discusses loop alignment techniques to eliminate loop carried dependencies and enable parallelization. It describes how adding an extra iteration and adjusting indices can align references to compute and use values in the same iteration. Alignment incurs overhead from conditionals and modulo operations. While alignment can eliminate dependencies for loops without recurrences, it may not work for loops with recurrences due to possible alignment conflicts between dependencies.
The document discusses how to integrate Google Maps into Android applications. It describes the key classes used to display maps like MapView and MapActivity. It explains how to obtain an API key, set up the permissions, and add a MapView to the layout. Code samples are provided to display maps, control zooming and panning, and retrieve the center point and visible area.
This document discusses hardware and software parallelism in computer architecture. It defines hardware parallelism as the number of instruction issues per machine cycle that a processor can handle, such as a 3-issue processor. Software parallelism comes from aspects of the algorithm, programming style, and program design, and can be seen from the program flow graph. Mismatch can occur between hardware and software parallelism. Examples show how a program with higher software than hardware parallelism would take longer on a processor, and how adding more processors reduces cycle time. The mismatch problem can be addressed by improving compilation or redesigning hardware.
The document discusses network security and cryptography. It covers access matrices and lists, multilevel security models, security levels, trusted systems, and complete mediation, isolation, and verifiability as methods for enhancing system defenses against intruders and malicious programs. The document is authored by Sumita Das and references William Stallings' book on cryptography and network security principles and practices.
The document describes an activity selection problem where a set of activities must share a single resource. Each activity has a start and finish time, and activities are mutually compatible if one activity finishes before another starts. The problem is to find the maximum subset of mutually compatible activities. A recursive greedy algorithm is presented that takes the activities sorted by finish time and recursively selects the next compatible activity to build the subset. Pseudocode for the algorithm is provided and stepped through on a sample activity set to produce the optimal subset.
Asymptotic analysis of parallel programsSumita Das
The document compares four algorithms for sorting a list of numbers in parallel. It presents a table showing the number of processing elements, parallel runtime, speedup, efficiency, and processing element-time product for each algorithm. It analyzes that algorithm A1 has the lowest parallel runtime and is the best if the metric is speed, while algorithms A2 and A4 have the highest efficiency and are the best if the metric is efficiency or cost. The document emphasizes the importance of identifying the objectives of the analysis and using the appropriate metrics.
This document discusses distributed systems and their key characteristics. It defines a distributed system as a collection of independent computers that appear as a single computer to users. Examples provided include web search engines, massively multiplayer online games, financial trading systems, and social networks. Advantages over personal and centralized systems are described, such as increased speed, reliability, flexibility, and economics. Design issues and communication methods like message passing and remote procedure calls are also outlined.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
TrsLabs - Fintech Product & Business ConsultingTrs Labs
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
📕 Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
👨🏫 Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
We’re bringing the TDX energy to our community with 2 power-packed sessions:
🛠️ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
📄 Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
2. Bisection Method
It is a Derivative Based Method for Optimization
Requirements for Bisection Method
f -> c’ i.e. f is continuous for the first derivative.
There exists a minima in the level of uncertainty [a
b]
Function must be unimodal.
PowerPoint Presentation by Sumita Das, GHRCE
3. Algorithm
Initialize Level of uncertainty [a b]
k=1
ak =a
bk =b
ϵ > 0
l : Allowable level of uncertainty such that
(1/2) n <= (1/(b`-a`))
PowerPoint Presentation by Sumita Das, GHRCE
4. While k<= n
ck= (ak +bk )/2
if f(ck)=0
Stop with ck as the
solution
if f(ck)>0
ak+1 = ak
bk+1 = ck
else
ak+1 = ck
bk+1 = bk
end if
k=k+1
end while
Find midpoint
c is now b.
a remains same
c is now a.
b remains same
Midpoint is the minima
PowerPoint Presentation by Sumita Das, GHRCE
5. In Simple words
Midpoint
m
a b
Example: f(x)=3x2 – 2x
f’(x)=6x-2
Put midpoint value in
derivative.
f’(x)=6*50-2=298
1. if f(m)=0, Midpoint is
minima
2. if f(m)>0, Level of
uncertainty will be [a, m]
3. if f(m)<0, Level of
uncertainty will be [m, b]
50 9010
So, 298>0, level of uncertainty will be
[10, 50] ,Follow the procedure.
PowerPoint Presentation by Sumita Das, GHRCE
6. Example
Que: Find Minima f(x)=(x-2)2
[0 6]
Solution: f ‘(x)=2x-4
k ak bk ck f’(ck )
1 0 6 3 2
2 0 3 1.5 -1
3 1.5 3 2.25 0.5
4 1.5 2.25 1.875 -0.25
5 1.875 2.25 2.062 0.123
6 1.875 2.062 1.9685 -0.063
7 1.9685 2.062 2.015 0.0305
8 1.9685 2.015 1.99175 -0.016
9 1.99175 2.015 2.003 0.006
PowerPoint Presentation by Sumita Das, GHRCE