首页    期刊浏览 2024年12月05日 星期四
登录注册

文章基本信息

  • 标题:Data Access by Data Intrusion
  • 本地全文:下载
  • 作者:SarathChand P.V ; VenuMadhav K ; Mahendra Arya Bhanu
  • 期刊名称:International Journal of Computer Technology and Applications
  • 电子版ISSN:2229-6093
  • 出版年度:2011
  • 卷号:2
  • 期号:5
  • 页码:1212-1217
  • 出版社:Technopark Publications
  • 摘要:The mining is a source for the data base as it requires several elements and techniques for the retrieval operations. Some techniques and their corresponding technologies have an important role in the database which is required in large amounts for data access. The primary method is to retrieve the relevant data and the secondary is retrieval of the matched data. Generally the data ware houses is much more than an information technology project for the companies embracing the concept of mass customization. The Armed data warehouses filled with quality information but one has to use mass customization techniques and scientific testing methods to expand the customer based from one million to 10 million in 10 year’s period. The mass customization is ultimate use of data ware housing and the mining techniques which are making the integral part of the business process. Just like the arms, a data ware house and data mining increases the strength with the active use. With every new test and new product valuable information is added and at the same time information is retrieved, modified which allows the analysts to learn from the successes and the failures of the past. The paper is mainly concerned with retrieval operation by enforcing these failures and successful operation in the form of data intrusion. The data intrusion helps in recognizing the data in the form of mass storage and can be retrieved the relevant data. It is simple and one of the techniques which can cope up with the business market.
  • 关键词:intrusion; operational systems; legacy systems; homogeneous records; forth coming
国家哲学社会科学文献中心版权所有