期刊名称:International Journal of Computer Technology and Applications
电子版ISSN:2229-6093
出版年度:2011
卷号:2
期号:5
页码:1212-1217
出版社:Technopark Publications
摘要:The mining is a source for the data base as it requires several elements and techniques for the retrieval operations. Some techniques and their corresponding technologies have an important role in the database which is required in large amounts for data access. The primary method is to retrieve the relevant data and the secondary is retrieval of the matched data. Generally the data ware houses is much more than an information technology project for the companies embracing the concept of mass customization. The Armed data warehouses filled with quality information but one has to use mass customization techniques and scientific testing methods to expand the customer based from one million to 10 million in 10 year’s period. The mass customization is ultimate use of data ware housing and the mining techniques which are making the integral part of the business process. Just like the arms, a data ware house and data mining increases the strength with the active use. With every new test and new product valuable information is added and at the same time information is retrieved, modified which allows the analysts to learn from the successes and the failures of the past. The paper is mainly concerned with retrieval operation by enforcing these failures and successful operation in the form of data intrusion. The data intrusion helps in recognizing the data in the form of mass storage and can be retrieved the relevant data. It is simple and one of the techniques which can cope up with the business market.