A Survey on Different Levels of Risks during Different Phases in Data Warehouse
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: The term Data Warehouse represents huge collection of historical data which are subject-oriented, non-volatile, integrated, and time-variant and such data is required for the business needs [1]. Data warehouses and on-line analytical processing (OLAP) tools have become essential elements of decision support systems. Traditionally, data warehouses are refreshed periodically (for example, nightly) by extracting, transforming, cleaning and consolidating data from several operational data sources. The data in the warehouse is then used to periodically generate reports, or to rebuild multidimensional (data cube) views of the data for on-line querying and analysis. Increasingly, business intelligence applications in telecommunications, electronic commerce, and other industries, that are characterized by very high data volumes and data flowrates, and that require continuous analysis and mining of the data. For such applications, rather different data warehousing and on-line analysis architectures are required [2]. Although Data warehousing is a part ofBusiness Intelligence and the motto of implementing a data warehouse is for business strategic needs, however our scope is to understand the various components that is involved in data warehousing, their purpose of work and scope of each components. Through this study we will be working on the methodologies of data cleansing techniques and improvement in such area [3].
Authors and Affiliations
Prangyan Mohapatra , Nachiketa Tarasia , Ananta Chandra Das
FEQRP: a Fuzzy based Energy-efficient and QoS Routing Protocol over WSNs
Abstract: In this paper, an energy efficient and QoS routing protocol; named Fuzzy based Energy-efficient and QoS Routing protocol (FEQRP) for wireless sensor networks; is proposed to extend the life time of the network....
An Analytical Study of Genetic Algorithm for Generating Frequent Itemset and Framing Association Rules At Various Support Levels
Abstract: In customary, frequent itemsets are propogated from large data sets by employing association rule mining algorithms like Apriori, Partition, Pincer-Search, Incremental and Border algorithm etc., which gains ino...
Auto Mutating Cryptosystem- An approach towards better security
Abstract: The concept of learning systems has been an intriguing one since first appearance of Artificial Intelligence (AI) in literature. With the progress in each decade of research, new systems have been developed to...
A Mobile Based Women Safety Application (I Safe Apps)
Abstract: Many unfortunate incidents have been taking place in woman’s case. Problems may come from anydirection such as women walking on the road after the work, going to super market or many other reasons forwhic...
Regression Test Case Selection &PrioritizationUsing Dependence Graph and Genetic Algorithm
Abstract: Regression testing is very important process in software maintenance. Unfortunately, it iscostly and time consumingto allow for the re-execution of all test cases during regression testing. The challenge...