Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 6301 - 6330 of 6763

Full-Text Articles in Physical Sciences and Mathematics

Why Don’T People Use Refactoring Tools?, Andrew P. Black, Emerson Murphy-Hill Jan 2007

Why Don’T People Use Refactoring Tools?, Andrew P. Black, Emerson Murphy-Hill

Computer Science Faculty Publications and Presentations

Tools that perform refactoring are currently under-utilized by programmers. As more advanced refactoring tools are designed, a great chasm widens between how the tools must be used and how programmers want to use them. In this position paper, we characterize the dominant process of refactoring, demonstrate that many research tools do not support this process, and initiate a call to action for designers of future refactoring tools.


Image Segmentation Using Multi-Coloured Active Illumination, Tze Ki (Xu Shuqi) Koh, Nicholas Miles, Barrie Hayes-Gill Jan 2007

Image Segmentation Using Multi-Coloured Active Illumination, Tze Ki (Xu Shuqi) Koh, Nicholas Miles, Barrie Hayes-Gill

Research Collection School Of Computing and Information Systems

In this paper, the use of active illumination is extended to image segmentation, specifically in the case of overlapping particles. This work is based on Multi-Flash Imaging (MFI), originally developed by Mitsubishi Electric Labs, to detect depth discontinuities. Illuminations of different wavelengths are projected from multiple positions, providing additional information about a scene compared to conventional segmentation techniques. Shadows are used to identify true object edges. The identification of non- occluded particles is made possible by exploiting the fact that shadows are cast on underlying particles. Implementation issues such as selecting the appropriate colour model and number of illuminations are …


Integrating Semantic Templates With Decision Tree For Image Semantic Learning, Ying Liu, Dengsheng Zhang, Guojun Lu, Ah-Hwee Tan Jan 2007

Integrating Semantic Templates With Decision Tree For Image Semantic Learning, Ying Liu, Dengsheng Zhang, Guojun Lu, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Decision tree (DT) has great potential in image semantic learning due to its simplicity in implementation and its robustness to incomplete and noisy data. Decision tree learning naturally requires the input attributes to be nominal (discrete). However, proper discretization of continuous-valued image features is a difficult task. In this paper, we present a decision tree based image semantic learning method, which avoids the difficult image feature discretization problem by making use of semantic template (ST) defined for each concept in our database. A ST is the representative feature of a concept, generated from the low-level features of a collection of …


An Improvement Heuristic For The Timetabling Problem, Aldy Gunawan, Kien Ming Ng, Kim Leng Poh Jan 2007

An Improvement Heuristic For The Timetabling Problem, Aldy Gunawan, Kien Ming Ng, Kim Leng Poh

Research Collection School Of Computing and Information Systems

This paper formulates a timetabling problem, which is often encountered in a university, as a mathematical programming model. The proposed model combines both teacher assignment and course scheduling problems simultaneously, which causes the entire model to become more complex. We propose an improvement heuristic algorithm to solve such a model. The proposed algorithm has been tested with several randomly generated datasets of sizes that are comparable to those occurring in a university in Indonesia. The computational results show that the improvement heuristic is not only able to obtain good solutions, but is also able to do so within reasonable computational …


Editors' Introduction, Robert John Kauffman, Jae Kyu Lee, Norman M. Sadeh Jan 2007

Editors' Introduction, Robert John Kauffman, Jae Kyu Lee, Norman M. Sadeh

Research Collection School Of Computing and Information Systems

This issue features a blend of empirical studies andtechnology-related articles, covering a number of aspectsof e-commerce research and industry applications. Thecontent includes works on online advertising and customerservice on the Internet, the social and human aspects ofradio frequency identification (RFID), the usability of theWeb, content delivery and wireless local area networks,electronic auctions, micropayments, and e-government.This reflects the editorial mission of this journal, which isto attract a breadth of scholarship from the Computer Science and technical research community, the InformationSystems and Technology research community, and fromthe Management, Strategy, Marketing, Operations, Finance and Policy communities associated with businessschools and schools of public …


Analysis Of Finline Structures With Consideration Of Metallization Thickness And Substrate Mounting Grooves, Abderrahmane Ouadi, Hadj Bourdoucen Jan 2007

Analysis Of Finline Structures With Consideration Of Metallization Thickness And Substrate Mounting Grooves, Abderrahmane Ouadi, Hadj Bourdoucen

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, mathematical analysis and numerical calculations of main parameters of finline structures with finite metallization thickness and substrate mounting grooves are developed based on the Method of Lines (MoL). The results obtained provide confirmation of the validity of the technique used and prove its simplicity and adequacy for treating different types of planar structures mainly finline based structures. Unilateral and bilateral finlines including practical parameters, such as metallization thickness and grooves' depths, have been investigated. The effect of these two parameters have been discussed based on realistic configurations and the results show that, at higher frequencies, the grooves …


New Method For Investigation Of Dynamic Parameters Of Thermoelectric Modules, Raşi̇t Ahiska Jan 2007

New Method For Investigation Of Dynamic Parameters Of Thermoelectric Modules, Raşi̇t Ahiska

Turkish Journal of Electrical Engineering and Computer Sciences

Precise calculation of parameters of thermoelectric modules and thermoelectric devices under operating conditions by present methods is very difficult. In this study, a new method is developed to calculate all parameters of thermoelectric modules. This new method makes it possible to determine the dynamic parameters of a real thermoelectric module operated under different working regimes. Measurement of thermoemf created by an operating module is the basis of this new method. An unloaded thermoelectric module, whose dynamic output parameters are necessary in the design of a medical helmet for the cooling of brain, has been investigated using this new method. A …


Data Mining And Costas Arrays, Konstantinos Drakakis Jan 2007

Data Mining And Costas Arrays, Konstantinos Drakakis

Turkish Journal of Electrical Engineering and Computer Sciences

Costas arrays are used in RADAR (and SONAR) engineering to represent frequency-hopping patterns that optimize the RADAR's performance. In this work, using all available Costas arrays up to and including order 26, as well as data mining techniques, we investigate how the Costas property and the balance of signs in the difference triangle of a permutation are related. Our conclusion is that there is sufficient evidence to believe that the mechanism responsible for the formation of Costas arrays changes from low to high orders.


A Combinatorial Approach Of Real Ga & Fuzzy To Atc Enhancement, Hossein Farahmand, Masoud Rashidinejad, Ali Akbar Gharaveici Jan 2007

A Combinatorial Approach Of Real Ga & Fuzzy To Atc Enhancement, Hossein Farahmand, Masoud Rashidinejad, Ali Akbar Gharaveici

Turkish Journal of Electrical Engineering and Computer Sciences

Under new de-regulated environment an open access to transmission system seems to be desired. Transmission system operators (TSOs) are encouraged to use the existing facilities more efficiently. This paper focuses on study of the best location for SVC as a FACTS device to improve voltage profile as well as maximum available transfer capacity (ATC) in order to achieve lower prices. Real genetic algorithm (RGA) is used for optimization technique and analytical hierarchy process (AHP) associated with fuzzy sets to obtain priority vector for each alternative to evaluate the GA fitness. The effectiveness of the proposed methodology is shown through case …


Offline Signature Verification Using Graph Matching, Ibrahim S. I. Abuhaiba Jan 2007

Offline Signature Verification Using Graph Matching, Ibrahim S. I. Abuhaiba

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, we present a simple and effective signature verification method that depends only on the raw binary pixel intensities and avoids using complex sets of features. The method looks at the signature verification problem as a graph matching problem. The method is tested using genuine and forgery signatures produced by five subjects. An equal error rate of 26.7% and 5.6% was achieved for skilled and random forgeries, respectively. A positive property of our algorithm is that the false acceptance rate of random forgeries vanishes at the point of equal false rejection and skilled forgery false acceptance rates. Keeping …


A Review Of Studies In Swarm Robotics, Levent Bayindir, Erol Şahi̇n Jan 2007

A Review Of Studies In Swarm Robotics, Levent Bayindir, Erol Şahi̇n

Turkish Journal of Electrical Engineering and Computer Sciences

Swarm robotics is a new approach to the coordination of large numbers of relatively simple robots. The approach takes its inspiration from the system-level functioning of social insects which demonstrate three desired characteristics for multi-robot systems: robustness, flexibility and scalability. In this paper we have presented a preliminary taxonomy for swarm robotics and classified existing studies into this taxonomy after investigating the existing surveys related to swarm robotics literature. Our parent taxonomic units are modeling, behavior design, communication, analytical studies and problems. We are classifying existing studies into these main axes. Since existing reviews do not have enough number of …


Aggregation, Foraging, And Formation Control Of Swarms With Non-Holonomic Agents Using Potential Functions And Sliding Mode Techniques, Veysel Gazi̇, Bariş Fi̇dan, Y. Si̇nan Hanay, İlter Köksal Jan 2007

Aggregation, Foraging, And Formation Control Of Swarms With Non-Holonomic Agents Using Potential Functions And Sliding Mode Techniques, Veysel Gazi̇, Bariş Fi̇dan, Y. Si̇nan Hanay, İlter Köksal

Turkish Journal of Electrical Engineering and Computer Sciences

In this article we consider the aggregation, foraging, and formation control of swarms whose agents are moving in 2-dimensions with non-holonomic unicycle agent dynamics. We approach these problems using artificial potentials and sliding mode control. The main contribution is extension of the recent results (mainly for aggregation) in the literature based on a similar approach for simple integrator agent dynamics models to a significantly more realistic and more difficult setting with non-holonomic unicycle agent dynamics models. In particular, we design continuous-time control schemes via a constructive analysis based on artificial potential functions and sliding mode control techniques. The effectiveness of …


A Vrp-Based Route Planning For A Mobile Robot Group, Osman Parlaktuna, Aydin Si̇pahi̇oğlu, Ahmet Yazici Jan 2007

A Vrp-Based Route Planning For A Mobile Robot Group, Osman Parlaktuna, Aydin Si̇pahi̇oğlu, Ahmet Yazici

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a vehicle routing problem-based approach is presented to construct non-intersecting routes for the members of a mobile robot team. It is assumed that each robot starts from a central location such as the charging point, completes its route and returns to the starting location. The proposed method consists of three algorithms: a sweep algorithm determines the position of each node in clockwise (or counter clockwise) manner with respect to the starting location; savings algorithm calculates the saving obtained by adding a node to the route of a robot; Dijkstra's shortest path algorithm is used to calculate the …


Aggregation In Swarm Robotic Systems: Evolution And Probabilistic Control, Onur Soysal, Erki̇n Bahçeci̇, Erol Şahi̇n Jan 2007

Aggregation In Swarm Robotic Systems: Evolution And Probabilistic Control, Onur Soysal, Erki̇n Bahçeci̇, Erol Şahi̇n

Turkish Journal of Electrical Engineering and Computer Sciences

In this study we investigate two approachees for aggregation behavior in swarm robotics systems: Evolutionary methods and probabilistic control. In first part, aggregation behavior is chosen as a case, where performance and scalability of aggregation behaviors of perceptron controllers that are evolved for a simulated swarm robotic system are systematically studied with different parameter settings. Using a cluster of computers to run simulations in parallel, four experiments are conducted varying some of the parameters. Rules of thumb are derived, which can be of guidance to the use of evolutionary methods to generate other swarm robotic behaviors as well. In the …


A Communication Module And Tdma Scheduling For A Swarm Of Small Submarines, Ram Somaraju, Felix Schill Jan 2007

A Communication Module And Tdma Scheduling For A Swarm Of Small Submarines, Ram Somaraju, Felix Schill

Turkish Journal of Electrical Engineering and Computer Sciences

Swarming algorithms usually require fast and reliable local information distribution among neighbouring nodes. Additionally, many applications also require global information distribution in the shortest possible time. We show that communication links with a range which is small compared to the size of the swarm offer many advantages. We propose a system using low frequency radio communication as a viable alternative to acoustic communication. A time division multiple access algorithm is presented together with results from simulations. The presented system can be effectively used in large scale swarms of small submersibles.


Design And Implementation Of An Ad-Hoc Routing Protocol For Mobile Robots, Carlos Agüero, Jose M. Canas, Miguel Ortu˜No, Vicente Matellan Jan 2007

Design And Implementation Of An Ad-Hoc Routing Protocol For Mobile Robots, Carlos Agüero, Jose M. Canas, Miguel Ortu˜No, Vicente Matellan

Turkish Journal of Electrical Engineering and Computer Sciences

Mobile robots need to be able to communicate among themselves, as well as with hosts participating in the task that they are all involved in. Wired networks are obviously not suitable for mobile robots. Current wireless networks based on a fixed infrastructure (GSM, WiFi, etc.) to route packets may not be suitable because this infrastructure does not cover every place and the requirements of its resources. The best choice for mobile robots are Ad-Hoc networks, which are wireless and do not need a fixed infrastructure. This article describes PERA, a complete communications library including link, net, and transport layers for …


The Fate Of Nitrogren Fixed By Diazotrophs In The Ocean, Margaret R. Mulholland Jan 2007

The Fate Of Nitrogren Fixed By Diazotrophs In The Ocean, Margaret R. Mulholland

OES Faculty Publications

While we now know that N2 fixation is a significant source of new nitrogen (N) in the marine environment, little is known about the fate of this N (and associated C), despite the importance of diazotrophs to global carbon and nutrient cycles. Specifically, does N fixed during N2 fixation fuel autotrophic or heterotrophic growth and thus facilitate carbon (C) export from the euphotic zone, or does it contribute primarily to bacterial productivity and respiration in the euphotic zone? For Trichodesmium, the diazotroph we know the most about, the transfer of recently fixed N2 (and C) appears …


Otolith Chemistry Reflects Frontal Systems In The Antarctic Circumpolar Current, J. R. Ashford, A. I. Arkhipkin, C. M. Jones Jan 2007

Otolith Chemistry Reflects Frontal Systems In The Antarctic Circumpolar Current, J. R. Ashford, A. I. Arkhipkin, C. M. Jones

OES Faculty Publications

Pronounced environmental trends across fronts suggest that the otolith chemistry of oceanic fish can resolve zones on either side, promoting application to population questions at similar spatial scales. Trace and minor elements laid down immediately prior to capture - along the edges of otoliths from Patagonian toothfish Dissostichus eleginoides - discriminated frontal zones in the Antarctic Circumpolar Current in the Southwestern Atlantic Ocean. Mean values differentiated sampling areas by up to 2.6 standard deviations, suggesting: (1) otolith Mg/Ca enrichment related to fish activity around the Burdwood Bank; (2) Mn/Ca enrichment associated with South America; (3) Sr/Ca linked to the presence …


Super-Resolution Enhancement Of Digital Video, Russell C. Hardie, Richard R. Schultz, Kenneth E. Barner Jan 2007

Super-Resolution Enhancement Of Digital Video, Russell C. Hardie, Richard R. Schultz, Kenneth E. Barner

Electrical and Computer Engineering Faculty Publications

SR from digital video is a relatively new field, in only its third decade of existence. There is no doubt that as imaging sensor technologies, optical fabrication techniques, and computational algorithms mature, SR will find its way into digital video products such as cameras and digital cable set-top boxes. These papers on the fundamental SR topics of image registration, regularization, photometric diversity, detector nonuniformity, compression, optical design, and performance metrics serve as pioneers in the dynamic and evolving field of SR image reconstruction research and development. We are proud to present them to the image and video processing research community. …


Providing Vanet Security Through Active Position Detection, Gongjun Yan, Gyanesh Choudhary, Michele C. Weigle, Stephan Olariu Jan 2007

Providing Vanet Security Through Active Position Detection, Gongjun Yan, Gyanesh Choudhary, Michele C. Weigle, Stephan Olariu

Computer Science Faculty Publications

Our main contribution is a novel approach to enhancing position security in VANET. We achieve local and global position security by using the on-board radar to detect neighboring vehicles and to confirm their announced coordinates. We compute cosine similarity among data collected by radar and neighbors' reports to filter the forged data from the truthful data. Based on filtered data, we create a history of vehicle movement. By checking the history and computing similarity, we can prevent a large number of Sybil attacks and some combinations of Sybil and position-based attacks.


Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti Jan 2007

Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti

Computer Science Faculty Publications

This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) …


Crate: A Simple Model For Self-Describing Web Resources, Joan A. Smith, Michael L. Nelson Jan 2007

Crate: A Simple Model For Self-Describing Web Resources, Joan A. Smith, Michael L. Nelson

Computer Science Faculty Publications

If not for the Internet Archive’s efforts to store periodic snapshots of the web, many sites would not have any preservation prospects at all. The barrier to entry is too high for everyday web sites, which may have skilled webmasters managing them, but which lack skilled archivists to preserve them. Digital preservation is not easy. One problem is the complexity of preservation models, which have specific meta-data and structural requirements. Another problem is the time and effort it takes to properly prepare digital resources for preservation in the chosen model. In this paper, we propose a simple preservation model called …


Application Of Maldis-Ms To Identification Of Phytoplankton In Ballast Water, Dana Woodruff, Karen L. Wahl, Nancy B. Valentine, Fred Dobbs Jan 2007

Application Of Maldis-Ms To Identification Of Phytoplankton In Ballast Water, Dana Woodruff, Karen L. Wahl, Nancy B. Valentine, Fred Dobbs

OES Faculty Publications

Non-native invasive species are increasingly evident in marine and estuarine environments, largely because of the intake and release of ballast water from sea vessels. Innovative methods are needed to quickly and accurately detect and speciate non-native and/or harmful phytoplankton in ballast water. Recent advances in ionization techniques such as matrix-assisted laser desorption/ionization mass spectrometry (MALDI-MS) have allowed detection of intact biomolecules within ballast samples. Statistically-based algorithms are used to discern "fingerprints" of phytoplankton species and to discern individual species from mixtures. MALDI-MS is particularly attractive for field applications because of the speed of analysis, minimal liquids/consumables required, and femtomole (10-15) …


Grazing Impacts Of Diverse Zooplankton Taxa On Thin Layers, Alexander Bochdansky Jan 2007

Grazing Impacts Of Diverse Zooplankton Taxa On Thin Layers, Alexander Bochdansky

OES Faculty Publications

The US Navy needs to know how distributions and abundances of light-scattering and sound-scattering organisms in the ocean vary in space and time, particularly in the vertical dimension. Recent field observations have shown that many biological properties may vary substantially over small e.g. centimeter scales, commonly referred to as thin layers e.g. Cowles et al. 1998, 1999, Hanson Donaghay 1998, Holliday et al. 1999, Dekshenieks et al. 2001, Alldredge et al. 2002, Rines et al. 2002. Our previous ONR-funded research has allowed us to begin to understand how zooplankton interact with thin layers and how they can take advantage of …


Hybrid Training With Binary Search Protocol For Wireless Sensor Networks, Ruzana Ishak, Qingwen Xu, Stephan Olariu, Shaharuddin Salleh Jan 2007

Hybrid Training With Binary Search Protocol For Wireless Sensor Networks, Ruzana Ishak, Qingwen Xu, Stephan Olariu, Shaharuddin Salleh

Computer Science Faculty Publications

Locationing problem in Wireless Sensor Networks(WSN) can be viewed as a general distributed sensor problem. It is with sensors that can discover other nodes or estimate ranges between nodes. that serve as position references. In this paper. we show that sensors acquire coarse-grain location awareness by the training protocol. The training protocol which hybrids the synchronization and training procedure. In this protocol, synchronization and training are combined into one scheme. The sink node sends two beacons in each slot instead of one. In the training, sensor searching for its location using a binary search scheme. Our simulation results shown less …


Istart 2: Improvements For Efficiency And Effectiveness, Irwin B. Levinstein, Chutima Boonthum, Srinivasa P. Pillarisetti, Courtney Bell, Danielle S. Mcnamara Jan 2007

Istart 2: Improvements For Efficiency And Effectiveness, Irwin B. Levinstein, Chutima Boonthum, Srinivasa P. Pillarisetti, Courtney Bell, Danielle S. Mcnamara

Computer Science Faculty Publications

iSTART (interactive strategy training for active reading and thinking) is a Web-based reading strategy trainer that develops students' ability to self-explain difficult text as a means to improving reading comprehension. Its curriculum consists of modules presented interactively by pedagogical agents: an introduction to the basics of using reading strategies in the context of self-explanation, a demonstration of self-explanation, and a practice module in which the trainee generates self-explanations with feedback on the quality of reading strategies contained in the self-explanations. We discuss the objectives that guided the development of the second version of iSTART toward the goals of increased efficiency …


Assessing The Format Of The Presentation Of Text In Developing A Reading Strategy Assessment Tool (R-Sat), Sara Gilliam, Joseph P. Magliano, Keith K. Millis, Irwin Levinstein, Chutima Boonthum Jan 2007

Assessing The Format Of The Presentation Of Text In Developing A Reading Strategy Assessment Tool (R-Sat), Sara Gilliam, Joseph P. Magliano, Keith K. Millis, Irwin Levinstein, Chutima Boonthum

Computer Science Faculty Publications

We are constructing a new computerized test of reading comprehension called the Reading Strategy Assessment Tool (R-SAT). R-SAT elicits and analyzes verbal protocols that readers generate in response to questions as they read texts. We examined whether the amount of information available to the reader when reading and answering questions influenced the extent to which R-SAT accounts for comprehension. We found that R-SAT was most predictive of comprehension when the readers did not have access to the text as they answered questions.


All Minimal Prime Extensions Of Hereditary Classes Of Graphs, Vassilis Giakoumakis, Stephan Olariu Jan 2007

All Minimal Prime Extensions Of Hereditary Classes Of Graphs, Vassilis Giakoumakis, Stephan Olariu

Computer Science Faculty Publications

The substitution composition of two disjoint graphs G1 and G2 is obtained by first removing a vertex x from G2 and then making every vertex in G1 adjacent to all neighbours of x in G2. Let F be a family of graphs defined by a set Z* of forbidden configurations. Giakoumakis [V. Giakoumakis, On the closure of graphs under substitution, Discrete Mathematics 177 (1997) 83–97] proved that F∗, the closure under substitution of F, can be characterized by a set Z∗ of forbidden configurations — the minimal prime extensions of Z. He also …


How Much Preservation Do I Get If I Do Absolutely Nothing? Using The Web Infrastructure For Digital Preservation, Martin Klein, Frank Mccown, Joan A. Smith, Michael Nelson Jan 2007

How Much Preservation Do I Get If I Do Absolutely Nothing? Using The Web Infrastructure For Digital Preservation, Martin Klein, Frank Mccown, Joan A. Smith, Michael Nelson

Computer Science Faculty Publications

To date, most of the focus regarding digital preservation has been on removing copies of the resources to be preserved from the “living web” and placing them in an archive for controlled curation. Once inside an archive, the resources are subject to careful processes of refreshing (making additional copies to new media) and migrating (conversion to new formats and applications). For small numbers of resources of known value, this is a practical and worthwhile approach to digital preservation. However, due to the infrastructure costs (storage, networks, machines) and more importantly the human management costs, this approach is unsuitable for web …


Brass: A Queueing Manager For Warrick, Frank Mccown, Amine Benjelloun, Michael L. Nelson Jan 2007

Brass: A Queueing Manager For Warrick, Frank Mccown, Amine Benjelloun, Michael L. Nelson

Computer Science Faculty Publications

When an individual loses their website and a backup can-not be found, they can download and run Warrick, a web-repository crawler which will recover their lost website by crawling the holdings of the Internet Archive and several search engine caches. Running Warrick locally requires some technical know-how, so we have created an on-line queueing system called Brass which simplifies the task of recovering lost websites. We discuss the technical aspects of recon-structing websites and the implementation of Brass. Our newly developed system allows anyone to recover a lost web-site with a few mouse clicks and allows us to track which …