VAM 3 Violation Approach Method