In summary, the algorithm used and modus operandi are briefly described in the following points: