ADAPTIVE APPROACH FOR JOINING AND SUBMISSIVE VIEW OF DATA IN DATA WAREHOUSE USING ETL
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 3
Abstract
Data warehouses have emerged as a new business intelligence paradigm where data store and maintain in concurrent. The modifications are required in the implementation of Extract Transform Load (ETL) operations which now need to be executed in an online fashion. The adaptive approach takes two phases. The Extraction phase and the joining phase. The Extraction phase recognition of the subset of source data that should be selected. The joining phase is accountable for producing join results if the two sources are adequate. Both phases of the process are associated and its bring into being highly aggregated data.Real time based data distributed and stored in the data warehouse. Now a day process on streaming warehouses has give attention to on speeding up the Extract-Transform-Load. To improve the performance and efficiency of join operation in active data warehouse, in this paper we proposed to adaptive approach for joining a continuous stream.
Authors and Affiliations
S. Sudha , S. Manikandan
EFFICIENT ESTIMATION ALGORITHM FOR ARMA MODEL FOR COLOURED NOISE
In this paper, a modified estimation algorithm has been developed refers to Covariance Shaping Least Square (CSLS) estimation based on the quantum mechanical concepts and constraints. The algorithm has been applied to Au...
M-BOARD IN AN AD-HOC NETWORK ENVIRONMENT
Notice Board is very essential part of any organization. This paper presents the design and implementation of M-Board (Mobile Notice Board) for Ad-hoc Network Environment that can be established and made available for an...
A SECURITY FRAMEWORK FOR AN ENTERPRISE SYSTEM ON CLOUD
Enterprise systems provide integrated information for all activities in an organization. These systems serve as a vital asset to any organization and hence it becomes mandatory to ensure their security. Information secur...
FUSION OF MULTI FOCUSED IMAGES USING HDWT FOR MACHINE VISION
During image acquisition in machine vision, due to limited depth of field of lens, it is possible to take clear image of the objects in the scene which are in focus only. The remaining objects in the scene will be out of...
A Technique to improve Security of Data in Multilevel Trust
The Privacy Preserving Data Mining technique that is used widely to conserve security of data is a random perturbation method. The original data is modified and many copies are created according to the trust levels in ea...