Text Analytics to Data Warehousing
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6
Abstract
Information hidden or stored in unstructured data can play a critical role in making decisions, understanding and conducting other business functions. Integrating data stored in both structured and unstructured formats can add significant value to an organization. With the extent of development happening in Text Mining and technologies to deal with nstructured and semi structured data like XML and ML(Mining Markup Language) to extract and analyze data, text analytics has evolved to handle unstructured data to helps unlock and predict business results via Business Intelligence and Data Warehousing. Text mining involves dealing with texts in documents and discovering hidden patterns, but Text Analytics enhances Information Retrieval in form of search and enabling clustering of results and more over Text Analytics is text mining and visualization. In this paper we would discuss on handling unstructured data that are in documents so that they fit into business applications like Data Warehouses for further analysis and it helps in the framework we have used for the solution.
Authors and Affiliations
Kalli Srinivasa Nageswara Prasad , Prof. S. Ramakrishna
SQL Injection in Oracle An exploration of vulnerabilities
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection ca...
Specifying a model of semantic web service composition
One of the major issues of semantic web is the discovery and identification of the best service that responds to a user request. In this article we specify a semantic web services composition model built through an ontol...
Design and Development of Wireless Sensor Node
This paper presents design and development of intelligent sensor node for environmental monitoring. The node is equipped with multimode sensors for sensing different environmental parameters, the node can sense four diff...
Educational Approach of Refactoring in Facilitating Reverse Engineering
Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically insti...
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security
The internet and the World Wide Web have revolutionized the way in which digital data is distributed. The growing possibilities of modern communication need special means of security especially on computer network. In th...