ADAPTIVE APPROACH FOR JOINING AND SUBMISSIVE VIEW OF DATA IN DATA WAREHOUSE USING ETL
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 3
Abstract
Data warehouses have emerged as a new business intelligence paradigm where data store and maintain in concurrent. The modifications are required in the implementation of Extract Transform Load (ETL) operations which now need to be executed in an online fashion. The adaptive approach takes two phases. The Extraction phase and the joining phase. The Extraction phase recognition of the subset of source data that should be selected. The joining phase is accountable for producing join results if the two sources are adequate. Both phases of the process are associated and its bring into being highly aggregated data.Real time based data distributed and stored in the data warehouse. Now a day process on streaming warehouses has give attention to on speeding up the Extract-Transform-Load. To improve the performance and efficiency of join operation in active data warehouse, in this paper we proposed to adaptive approach for joining a continuous stream.
Authors and Affiliations
S. Sudha , S. Manikandan
MOBILE ENABLED GOVERNANCE FOR LOCAL GOVERNMENTS IN INDIA
India is heading towards globalization. Its economy is growing faster than the most of any major economy in the world. The Ministry of Statistics and Programme Implementation expects the Indian economy to grow by 7.4 per...
Confidentiality and Availability of Data Warehouses in the Cloud Computing System
With the advent of cloud computing as a new deployment model of computer systems, data warehouses benefit from this new paradigm. In this context, it becomes necessary to protect these data warehouses of different risks...
A New Approach to Microcalcification Detection Using Fuzzy Soft Set Approach
This paper presents a new computer aided detection method for identifying malignant images in digital mammograms using fuzzy soft set theory approach. Fuzzy soft set theory is a mathematical model based on parameterizati...
A SURVEY REPORT ON VPN SECURITY & ITS TECHNOLOGIES
Virtual Private Network (VPN) is a communication network which provides secure data transmission in an unsecured or public network by using any combination of technologies. A virtual connection is made across the users w...
Performance Enhancement of Intrusion Detection using Neuro - Fuzzy Intelligent System
This research work aims at developing hybrid algorithms using data mining techniques for the effective enhancement of anomaly intrusion detection performance. Many proposed algorithms have not addressed their reliability...