This document discusses horizontal fragmentation of database tables. It begins by outlining the basic requirements for horizontal fragmentation, including identifying simple predicates, minterm predicates, minterm selectivity, and access frequencies. It then provides an example PROJECT table and identifies relevant predicates. The document defines minterms and outlines an algorithm for determining minterms for a table. It walks through applying the algorithm to the example PROJECT table to identify the actual horizontal partitions. The summary identifies the key steps and concepts discussed in fragmenting tables horizontally.
Layer between OS and distributed applications,Hides complexity and heterogeneity of distributed system ,Bridges gap between low-level OS communications and programming language abstractions,Provides common programming abstraction and infrastructure for distributed applications.
Query Processing : Query Processing Problem, Layers of Query Processing Query Processing in Centralized Systems – Parsing & Translation, Optimization, Code generation, Example Query Processing in Distributed Systems – Mapping global query to local, Optimization,
Layer between OS and distributed applications,Hides complexity and heterogeneity of distributed system ,Bridges gap between low-level OS communications and programming language abstractions,Provides common programming abstraction and infrastructure for distributed applications.
Query Processing : Query Processing Problem, Layers of Query Processing Query Processing in Centralized Systems – Parsing & Translation, Optimization, Code generation, Example Query Processing in Distributed Systems – Mapping global query to local, Optimization,
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
TF-IDF, short for Term Frequency - Inverse Document Frequency, is a text mining technique, that gives a numeric statistic as to how important a word is to a document in a collection or corpus. This is a technique used to categorize documents according to certain words and their importance to the document
The protocol is based on the Routing Information Protocol (RIP).[1] The router generates a routing table with the multicast group of which it has knowledge with corresponding distances (i.e. number of devices/routers between the router and the destination). When a multicast packet is received by a router, it is forwarded by the router's interfaces specified in the routing table.
DVMRP operates via a reverse path flooding technique, sending a copy of a received packet (specifically IGMP messages for exchanging routing information with other routers) out through each interface except the one at which the packet arrived. If a router (i.e. a LAN which it borders) does not wish to be part of a particular multicast group, it sends a "prune message" along the source path of the multicast.
Transformer 이전(2015) Attention에 대해 Alignment를 이용한 Attention Mechnism을 Neural Machine Translation에 적용하여 Long Input Sequence에 대해 성능 개선을 보여줌
Attention Mechanism에 대해 Global Attention과 Local Attention 2가지 방법을 제시
Explore detailed Topic Modeling via LDA Laten Dirichlet Allocation and their steps.
Thanks, for your time, if you enjoyed this short video there are tons of topics in advanced analytics, data science, and machine learning available in my medium repo. https://medium.com/@bobrupakroy
Denial of Service attacks – Definitions, related surveys
Traceback of DDoS Attacks – Proposed method, advantages, future work
Detection methods with Shannon and Renyi cross entropy – Previous works, proposed method, dataset and results
The added value of entropy detection methods
References
Asynchronous Web requests using AJAX, Creating REST API using PHP
jQuery: Working with jQuery, Using plugins in jQuery and Creating Image slider, Generating charts from data using 3rd Party Libs
Introduction to Server side programming , PHP variables, decision and looping with examples, PHP and HTML, Arrays, Functions, Browser control and detection, String, Form processing, File uploads, Dates and timezone, Working with Regular Expressions, Exception Handling, Working with JSON data, Object Oriented Programming with PHP
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
TF-IDF, short for Term Frequency - Inverse Document Frequency, is a text mining technique, that gives a numeric statistic as to how important a word is to a document in a collection or corpus. This is a technique used to categorize documents according to certain words and their importance to the document
The protocol is based on the Routing Information Protocol (RIP).[1] The router generates a routing table with the multicast group of which it has knowledge with corresponding distances (i.e. number of devices/routers between the router and the destination). When a multicast packet is received by a router, it is forwarded by the router's interfaces specified in the routing table.
DVMRP operates via a reverse path flooding technique, sending a copy of a received packet (specifically IGMP messages for exchanging routing information with other routers) out through each interface except the one at which the packet arrived. If a router (i.e. a LAN which it borders) does not wish to be part of a particular multicast group, it sends a "prune message" along the source path of the multicast.
Transformer 이전(2015) Attention에 대해 Alignment를 이용한 Attention Mechnism을 Neural Machine Translation에 적용하여 Long Input Sequence에 대해 성능 개선을 보여줌
Attention Mechanism에 대해 Global Attention과 Local Attention 2가지 방법을 제시
Explore detailed Topic Modeling via LDA Laten Dirichlet Allocation and their steps.
Thanks, for your time, if you enjoyed this short video there are tons of topics in advanced analytics, data science, and machine learning available in my medium repo. https://medium.com/@bobrupakroy
Denial of Service attacks – Definitions, related surveys
Traceback of DDoS Attacks – Proposed method, advantages, future work
Detection methods with Shannon and Renyi cross entropy – Previous works, proposed method, dataset and results
The added value of entropy detection methods
References
Asynchronous Web requests using AJAX, Creating REST API using PHP
jQuery: Working with jQuery, Using plugins in jQuery and Creating Image slider, Generating charts from data using 3rd Party Libs
Introduction to Server side programming , PHP variables, decision and looping with examples, PHP and HTML, Arrays, Functions, Browser control and detection, String, Form processing, File uploads, Dates and timezone, Working with Regular Expressions, Exception Handling, Working with JSON data, Object Oriented Programming with PHP
Javascript Syntax, Types of Javascript, variables, arrays, functions, conditions, loops, Pop up boxes, Javascript objects and DOM, Javascript inbuilt functions, Javascript validations, Regular expressions, Event handling with Javascript, Callbacks in Javascript, Function as arguments in Javascript, Object concepts in Javascript
HTML page structure, formatting tags in HTML, tables, links, images, meta tags, frames, html form tags, media, APIs, HTML5 tags in relation to validations and SEO.
CSS: Need for CSS, Basic syntax and structure, Backgrounds, Colors and properties, Manipulating texts, Fonts, borders and boxes, Margins, Padding Lists, CSS2, CSS3, Animations, Tool-Tips, Style images, Variables, Flex Box, Media Queries, Wildcard Selectors (*, ^ and $) in CSS, Working with Gradients, Pseudo Class, Pseudo elements, basic of frameworks like Bootstrap, Responsive web design and Media Query, CSS variables
Basics of WWW, HTTP protocol methods and headers, HTTP Request and Response, Architecture of web browser, Web server installation and configuration, Web security, CORS, Understanding SEO
Development Of Unix/Linux, Role & Function Of Kernel, System Calls, Elementary Linux command & Shell Programming, Directory Structure, System Administration
Case study: Linux, Windows Operating System
Virtual machines; supporting multiple operating systems simultaneously on a single hardware platform; running one operating system on top of another. True or pure virtualization.
Process and Threads Management: Process Concept, Process states, Process control, Threads, Uni-processor Scheduling: Types of scheduling: Preemptive, Non preemptive, Scheduling algorithms: FCFS, SJF, RR, Priority, Thread Scheduling, Real Time Scheduling. System calls like ps, fork, join, exec family, wait.
Key management and distribution, symmetric key distribution using symmetric and asymmetric encryptions, distribution of public keys, X.509 certificates, Public key infrastructure
Digital Signature, its properties, requirements and security, various digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
Distributed DBMS - Unit - 4 - Data Distribution Alternatives
1. Unit – 4
Data Distribution Alternatives
Fragmentation
2. Horizontal Fragmentation
• Basic Requirement of Horizontal Fragmentation
1. Find out simple predicate Pr
2. Find out Minterm predicates M
3. Minterm selectivity sel(mi)
4. Access Frequencies acc(qi)
5. Access Frequencies Minterm acc(qi)
1/11/2017 2Prof. Dhaval R. Chandarana
3. Fragmentation Examples
• Example PROJECT table:
• PROJ:
PNO PNAME BUDGET LOC
P1 Instrumentation 150000 Montreal
P2 Database Develop 135000 New York
P3 CAD/CAM 250000 New York
P4 Maintenance 310000 Paris
1/11/2017 3Prof. Dhaval R. Chandarana
4. Predicates
• Predicates
• Appear in the WHERE clause of a query
• Important determiner of fragmentation
• Determine the composition of table fragments
• Let R(A1, A2, …, An) be a relation
• Ai is defined over a domain Di
• We say pi is a simple predicate if it is of the form
• Pi ʘ Value where ʘ ԑ { =, <, >, , , <> }
• Examples:
• PNAME = 'CAD/CAM'
• BUDGET > 200000
1/11/2017 4Prof. Dhaval R. Chandarana
5. Predicates
• Usually, multiple predicates are necessary to describe a selection of
rows in a relation
• Most Boolean combinations can be translated into conjunctive normal
form
• p1 ^ p2 ^ …^ pk
• We attempt to fragment tables according to selection (WHERE clause)
patterns
• A combination of predicates in conjunctive normal form is a Minterm
• Let a set of predicates on a relation be:
Pr = {p1, p2, …, pk }
1/11/2017 5Prof. Dhaval R. Chandarana
6. Minterms
• Let set of minterm predicates be
M = { m1, m2, …, mz }
where M = {mj | mj = ^(pn ԑ Pr) pn}
• Some property equivalences:
• For equality: !(attr = val) = (attr <> val)
• For inequality: !(attr > val) = (attr val)
• It is not necessary to duplicate predicates
• In minterms, one is sufficient
1/11/2017 6Prof. Dhaval R. Chandarana
7. Minterm Examples
• p1: LOC = 'Montreal'
• p2: LOC = 'New York'
• p3: LOC = 'Paris'
• p4: BUDGET > 200000
• p5: BUDGET <= 200000
• m1: LOC = 'New York' ^ BUDGET > 200000
• m2: LOC = 'New York' ^ BUDGET <= 200000
• m3: LOC = 'Paris' ^ BUDGET > 200000
• m4: LOC = 'Paris' ^ BUDGET <= 200000
• m5: LOC = 'Montreal' ^ BUDGET > 200000
• m6: LOC = 'Montreal ' ^ BUDGET <= 200000
1/11/2017 7Prof. Dhaval R. Chandarana
8. Minterm Properties
• Minterm selectivity
• Number of records that satisfy minterm
• sel(m1) = 1; sel(m2) = 1; sel(m4) = 0
• Access frequency by applications and users
• Q = {q1, q2, …, qq} is set of queries
• acc(q1) is frequency of access of query 1
1/11/2017 8Prof. Dhaval R. Chandarana
9. Primary Horizontal Fragmentation
• Using minterms and access frequency, one can generate a horizontal
fragmentation
• Suppose there are w fragments
• Then each relation fragment Ri is given by a formula Fi, where each
formula represents a minterm expression of predicates
Ri = ϭ Fi(R) where 1 <= i <= w
• Examples:
• PROJ1 = BUDGET<=200000 (PROJ)
• PROJ2 = BUDGET>200000 (PROJ)
1/11/2017 9Prof. Dhaval R. Chandarana
10. Algorithm for Determining Minterms
• Rule 1: fragment is partitioned into at least two parts that are
accessed differently by at least one application
• Definitions
• R - relation
• Pr - set of simple predicates
• Pr' - another set of simple predicates
• F - set of minterm fragments
1/11/2017 10Prof. Dhaval R. Chandarana
11. Algorithm for Determining Minterms
• Define set of inferences from the predicates
• Assume val1 and val2 are complimentary and complete the set of values:
• p1: att = val1
• p2: att = val2
• i1: (att = val1) => !(att = val2)
• i2: (att = val2) => !(att = val1)
• set of possible minterms
• m1: (att = val1) ^ (att = val2)
• m2: (att = val1) ^ !(att = val2)
• m3: !(att = val1) ^ (att = val2)
• m4: !(att = val1) ^ !(att = val2)
• m1 and m4 cannot be minterms because they contradict inferences
1/11/2017 11Prof. Dhaval R. Chandarana
12. Calculate Minterms for Table
PHORIZONTAL {
Pr' = COM_MIN(R, Pr)
determine set of minterms M
determine inference set I among Pr'
eliminate contradictory mi's according to I from M
eliminate subsumed minterms
what is left in M is horizontal fragmentation
}
1/11/2017 12Prof. Dhaval R. Chandarana
13. Example
Step 1: Identify relevant predicates
• p1: LOC = 'Montreal'
• p2: LOC = 'New York'
• p3: LOC = 'Paris'
• p4: BUDGET > 200000
• p5: BUDGET <= 200000
1/11/2017 13Prof. Dhaval R. Chandarana
14. Define Full Minterm Set
• m1: LOC = ‘Montreal’
• m2: LOC = ‘New York’
• m3: LOC = ‘Paris’
• m4: BUDGET > 200000
• m5: BUDGET <= 200000
• m6: LOC = ‘Montreal’ ^ LOC = ‘New York’
• m7: LOC = ‘Montreal’ ^ LOC = ‘Paris’
• m8: LOC = ‘Montreal’ ^ BUDGET > 200000
• m9: LOC = ‘Montreal’ ^ BUDGET <= 200000
• m10: LOC = ‘New York’ ^ LOC = ‘Paris’
• m11: LOC = ‘New York’ ^ BUDGET > 200000
• m12: LOC = ‘New York’ ^ BUDGET <= 200000
1/11/2017 14Prof. Dhaval R. Chandarana
15. Define Full Minterm Set
• m13: LOC = ‘Paris’ ^ BUDGET > 200000
• m14: LOC = ‘Paris’ ^ BUDGET <= 200000
• m15: BUDGET > 200000 ^ BUDGET <= 200000
• m16: LOC = ‘Montreal’ ^ LOC = ‘New York’ ^ LOC = ‘Paris’
• m17: LOC = ‘Montreal’ ^ LOC = ‘New York’ ^ BUDGET > 200000
• m18: LOC = ‘Montreal’ ^ LOC = ‘New York’ ^ BUDGET <= 200000
• m19: LOC = ‘Montreal’ ^ LOC = ‘Paris’ ^ BUDGET > 200000
• m20: LOC = ‘Montreal’ ^ LOC = ‘Paris’ ^ BUDGET <= 200000
• m21: LOC = ‘Montreal’ ^ BUDGET > 200000 ^ BUDGET <= 200000
• m22: LOC = ‘New York’ ^ LOC = ‘Paris’ ^ BUDGET > 200000
• m23: LOC = ‘New York’ ^ LOC = ‘Paris’ ^ BUDGET <= 200000
• m24: LOC = ‘New York’ ^ BUDGET > 200000 ^ BUDGET <= 200000
• m25: LOC = ‘Paris’ ^ BUDGET > 200000 ^ BUDGET <= 200000
1/11/2017 15Prof. Dhaval R. Chandarana
16. Define Full Minterm Set
• m26: LOC = ‘Montreal’ ^ LOC = ‘New York’ ^ LOC = ‘Paris’ ^ BUDGET >
200000
• m27: LOC = ‘Montreal’ ^ LOC = ‘New York’ ^ LOC = ‘Paris’ ^ BUDGET <=
200000
• m28: LOC = ‘Montreal’ ^ LOC = ‘New York’ ^ BUDGET > 200000 ^ BUDGET
<= 200000
• m29: LOC = ‘Montreal’ ^ LOC = ‘Paris’ ^ BUDGET > 200000 ^ BUDGET <=
200000
• m30: LOC = ‘New York’ ^ LOC = ‘Paris’ ^ BUDGET > 200000 ^ BUDGET <=
200000
• m31: LOC = ‘Montreal’ ^ LOC = ‘New York’ ^ LOC = ‘Paris’ ^ BUDGET >
200000 ^ BUDGET <= 200000
1/11/2017 16Prof. Dhaval R. Chandarana
17. Define Inferences
• Inferences:
• p1 => ~p2 p3 => ~p1
• p1 => ~p3 p3 => ~p2
• p2 => ~p1 p4 => ~p5
• p2 => ~p3 p5 => ~p4
• Left with only:
• m1: LOC = ‘Montreal’ m8: LOC = ‘Montreal’ ^ BUDGET > 200000
• m2: LOC = ‘New York’ m9: LOC = ‘Montreal’ ^ BUDGET <= 200000
• m3: LOC = ‘Paris’ m12: LOC = ‘New York’ ^ BUDGET <= 200000
• m4: BUDGET > 200000 m13: LOC = ‘Paris’ ^ BUDGET > 200000
• m5: BUDGET <= 200000 m14: LOC = ‘Paris’ ^ BUDGET <= 200000
• After subsumption, only m8, m9, m11, m12, m13, m14 remain
1/11/2017 17Prof. Dhaval R. Chandarana
18. Actual Partitions
• The four actual partitions are: m9, m11, m12, m13
• The two partitions m8 and m14 have no data
PNO PNAME BUDGET LOC
P1 Instrumentation 150000 Montreal
P2 Database Develop 135000 New York
P3 CAD/CAM 250000 New York
P4 Maintenance 310000 Paris
1/11/2017 18Prof. Dhaval R. Chandarana