SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Information and Knowledge Management                                                                   www.iiste.org
ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
Vol.3, No.2, 2013


   A Frame Work for Data Warehouse for Nigerian Police Force: A
               Way of Ensuring National Security
                             Georgina N. Obunadike 1*         Richard K. Tyokyaa 2
       1. Department of Mathematical Sciences and IT, Federal University, Dutsin-ma, Katsina State, Nigeria.
       2. Department of Mathematical Sciences and IT, Federal University, Dutsin-ma, Katsina State, Nigeria.
                                     * E-mail: nkoliobunadike@yahoo.com

Abstract
Security is presently a major challenge in Nigeria today, Nigerians and non- Nigerians are killed on daily basis and
in their numbers. Since the advent of the present democratic dispensation, new forms of violent crimes have become
common; these include kidnapping for ransom, pipeline vandalization, Boko Haram bombings, rape, political
violence and more. Though the government claims to be on top of the situation, the problem persists. This work
attempts to propose a frame work for integration of criminal databases from different state police databases to form a
data warehouse for easy access and analysis of criminal data for necessary actions. Data integration involves
combining data residing in different sources to form a data warehouse there by providing users with a unified view of
these data. Data Integration Technologies have experienced explosive growth in the last few years, and data
warehousing has played a major role in the integration process.

Key words: National Security, Data integration, Data Warehousing, Star Schema, Data Mart,

1. Introduction
The Nigerian society is getting more and more insecure, more people are getting into crimes and they are getting
more ruthless, desperate and sophisticated. In Nigeria of today especially since the advent of the present democratic
dispensation, new forms of violent crimes have become common; these include kidnapping for ransom, pipeline
vandalization, Boko Haram bombings, rape, political violence and more. Public and private institutions are attacked
and vandalized by gangs, even the United Nations building and the Nigerian Police Headquarters in Abuja were
bombed and scores of people killed. Something needs to be done and that urgently. It is widely agreed that security
should be the responsibility of all and sundry, not restricted to government, the Police force or security agencies
(Otto and Ukpere, 2012).

This work attempts to propose integration of criminal databases from different state police databases to form a data
warehouse for easy access and analysis of criminal data for necessary actions. Data integration involves combining
data residing in different sources and providing users with a unified view of these data. Data Integration
Technologies have experienced explosive growth in the last few years, and data warehousing has played a major role
in the integration process. Data warehousing is a collection of decision support technologies, aimed at enabling the
knowledge worker (executive, manager, and analyst) to make better and faster decisions. The goal of data
warehouses is to make the right information available at the right time. It involves bringing together disparate data
from throughout an organization for decision-support purposes (Surajit and Dayal, 1997).

The data warehouse concept was developed as IT professionals increasingly realized that the structure of data
required for transaction reporting was significantly different from the structure required to analyze data. It was
designed to contain summarized, historical views of data in production systems. This collection provides business
users and decision-makers with a cross-functional, integrated, subject-oriented view of the enterprise. Data
warehouse also known as OLAP (Online Analytical Processing), provides managerial users with meaningful views
of past and present enterprise data. User-friendly formats, such as graphs and charts are frequently employed to
quickly convey meaningful data relationships (Humphries, 1998).

It is not possible to anticipate the information requirements of decision-makers for the simple reason that their needs
depend on the business situation that they face. Decision-makers need to review enterprise data from different
dimensions and at different levels of detail to find the source of a business problem before they can attack it. They
likewise need information for detecting business opportunities to exploit (Humphries, 1998).


                                                          1
Information and Knowledge Management                                                                  www.iiste.org
ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
Vol.3, No.2, 2013

Decision-makers also need to analyze trends in the performance of the enterprise. Rather than waiting for problems
to present themselves, decision-makers need to proactively mobilize the resources of the enterprise in anticipation of
a business situation. Since these information requirements cannot be anticipated, the decision-maker often resorts to
reviewing predesigned inquiries or reports in an attempt to find or derive needed information. Alternatively, the IT
professional is pressured to produce an ad hoc report from legacy systems as quickly as possible. If unlucky, the IT
professional will find the data needed for the report are scattered throughout different legacy systems. An even
unluckier may find that the processing required to produce the report will have a toll on the operations of the
enterprise. These delays are not only frustrating both for the decision-maker and the IT professionals; they are
dangerous for the enterprise. The information that eventually reaches the decision-maker may be inconsistent,
inaccurate, or worse, obsolete. Decision support applications (or OLAP) that obtain data from the data warehouse are
recommended for this particular need (Humphries, 1998).

Data warehousing technologies have been successfully deployed in many industries: manufacturing (for order
shipment and customer support), retail (for user profiling and inventory management), financial services (for claims
analysis, risk analysis, credit card analysis, and fraud detection), transportation (for fleet management),
telecommunications (for call analysis and fraud detection), utilities (for power usage analysis), and healthcare (for
outcomes analysis). The rest of this paper presents a roadmap of data warehousing technologies, focusing on the
special requirements of data warehousing.

2. Data Warehouse Concept
Database computing has shifted its focus from operational to decisional concerns. The differences in operational and
decisional information requirements presented new challenges that old computing practices could not meet. This
change in computing focus has become the impetus for the development of data warehousing technologies (Maurice,
2002).

A Data Warehouse (DW) is defined as “a subject-oriented, integrated, time-variant, non-volatile collection of data in
support of management’s decision-making process” (Batini et al, 1992). Data warehouses store huge amount of
information from multiple data sources which is used for query and analysis. The data warehouse holds transformed
and integrated enterprise-wide operational data appropriate for strategic decision-making, as shown in Figure 1. The
data warehouse also contains data obtained from external sources, whenever this data is relevant to decision-making.
Decision support applications analyze and make data warehouse information available in formats that are readily
understandable by decision-makers.




Figure 1: Data Warehouse as an integrated enterprise-wide operational data appropriate for strategic decision-making
Source: (Maurice, 2002)

Since these information requirements cannot be anticipated, operational systems (which correctly focus on recording
and completing different types of business transactions) are unable to provide decision-makers with the information
they need. As a result, business managers fall back on the time-consuming, and often frustrating, process of going
through operational inquiries or reports already supported by operational systems in an attempt to find or derive the

                                                          2
Information and Knowledge Management                                                                     www.iiste.org
    ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
    Vol.3, No.2, 2013

    information they really need. Alternatively, IT professionals are pressured to produce an ad hoc report from the
    operational systems as quickly as possible (Maurice, 2002).

    It will not be unusual for the IT professional to find that the data needed to produce the report are scattered
    throughout different operational systems and must first be carefully integrated. Worse, it's likely that the processing
    required to extract the data from each operational system will demand so much of the system resources that the IT
    professional must wait until nonoperational hours before running the queries required to produce the report. These
    delays are not only time-consuming and frustrating both for the IT professionals and the decision-makers they are
    dangerous for the enterprise. When the report is finally produced, the data may be inconsistent, inaccurate, or
    obsolete. There is also the very real possibility that this new report will trigger the request for another ad hoc report.
    Since a data warehouse maintains a copy of information from the source transaction systems. This provides the
    opportunity to:
          •   Maintain data history, even if the source transaction systems do not.
          •   Integrate data from multiple source systems, enabling a central view across the enterprise. This benefit is
              always valuable, but particularly so when the organization has grown by merger.
          •   Improve data quality, by providing consistent codes and descriptions, flagging or even fixing bad data.
          •   Present the organization's information consistently.
          •   Provide a single common data model for all data of interest regardless of the data's source.
          •   Restructure the data so that it makes sense to the business users.
          •   Restructure the data so that it delivers excellent query performance, even for complex analytic queries,
              without impacting the operational systems.
          •   Add value to operational business applications, notably customer relationship management (CRM) systems

    3. DATA WAREHOUSE PLATFORM
    A data warehouse platform consists of one or more hardware servers, an operating system, a database management
    system (DBMS), and data storage. These communicate via a LAN or WAN, although a multi-node data warehouse
    platform may have its own specialized network. Note that a data warehouse platform manages a data warehouse,
    defined as a collection of metadata, data model, and data content, designed for the purposes of reporting, analyzing
    information, and making decisions. But the data warehouse is not part of the platform per se (Russom, 2009).
  Warehouse
    Data




                        Meta Data                          Data Models                             Data Content

                                                    Operating                    Database                      Data
                          Server
Warehouse




                                                     System                     Mgt System                    Storage
 platform




                         Hardware
   Data




                                                                    Networking


    Figure 2: A data warehouse platform manages a data warehouse, but the two are separate
    Source: (Russom, 2009).

    4. Data Warehousing Architecture
    Data warehouse architecture includes tools for extracting data from multiple operational databases and external
    sources; for cleaning, transforming and integrating this data; for loading data into the data warehouse; and for
    periodically refreshing the warehouse to reflect updates at the sources and to purge data from the warehouse, perhaps
    onto slower archival storage. In addition to the main warehouse, there may be several departmental data marts. Data

                                                                3
Information and Knowledge Management                                                                 www.iiste.org
       ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
       Vol.3, No.2, 2013

       the warehouse and data marts is stored and managed by one or more warehouse servers, which present
       multidimensional views of data to a variety of front end tools: query tools, report writers, analysis tools, and data
       mining tools. Finally, there is a repository for storing and managing metadata, and tools for monitoring and
       administering the warehousing system. Figure 3: shows a typical data warehousing architecture.




                   Monitoring & Administration

                                                         Data Warehouse               OLAP Server
        External Source               Meta Data                                                                 Analysis
                                      Repository




                          Extract                                                                          Query/Reporting
                                                                                      Server
                                                                                      Serve
                          Transform
Operational




                          Load
Database




                          Refresh
                                                                                                             Data Mining


        Data Source
                                                       Data Marts



       Figure 3: Data Warehousing Architecture
       Source: (Surajit and Dayal, 1997).

       5. Data Warehousing Methodology
       Data warehousing has been cited as the highest-priority post-millennium project of more than half of IT executives.
       A large number of data warehousing methodologies and tools are available to support the growing market. However,
       with so many methodologies to choose from, a major concern for many firms is which one to employ in a given data
       warehousing project (Arun and Atish, 2005). In this article, we propose a top-down design approach of data
       warehousing.

       Online transaction processing (OLTP) systems are useful for addressing the operational data needs of a firm.
       However, they are not well suited for supporting decision-support queries or business questions that managers
       typically need to address. Such questions involve analytics including aggregation, drilldown, and slicing/dicing of
       data, which are best supported by online analytical processing (OLAP) systems. Data warehouses support OLAP
       applications by storing and maintaining data in multidimensional format. Data in an OLAP warehouse is extracted
       and loaded from multiple OLTP data sources (including DB2, Oracle, IMS databases, and flat files) using Extract,
       Transfer, and Load (ETL) tools. The warehouse is located in a presentation server.
       It can span enterprise wide data needs or can be a collection of “conforming” data marts (Kimball and Ross, 2002).
       Data marts (subsets of data warehouses) are conformed by following a standard set of attribute declarations called a
       data warehouse bus. The data warehouse uses a metadata repository to integrate all of its components. The metadata
       stores definitions of the source data, data models for target databases, and transformation rules that convert source
       into target data. The concepts of time variance and non volatility are essential for a data warehouse (Inmon, 2002).


                                                                4
Information and Knowledge Management                                                               www.iiste.org
ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
Vol.3, No.2, 2013

Inmon emphasized the importance of cross-functional slices of data drawn from multiple sources to support a
of needs (Inmon, 2002); the foundation of his subject-oriented design was an enterprise data model.

 Kimball introduced the notion of dimensional modeling marts (Kimball and Ross, 2002), which addresses the gap
between relational databases and multidimensional databases needed for OLAP tasks. These different definitions and
concepts gave rise to an array of data warehousing methodologies and technologies. Data warehousing
methodologies share a common set of tasks which includes business requirements analysis, data design, architecture
design, implementation, and deployment which represents the top-down design approach of data warehousing
(Kimbal et al, 1998).



                                                         Business Requirement
                                                                Analysis



                                                            Data Design


                                 Data Modeling                                     Normalization


                  Entity                          Dimensional
            Relationship (ER)



                                                        Architecture
                                                           Design
                             Enterprise wide
                                                                              Data Mart Design
                             Data warehouse
                                 Design




                                                      Implementation

                                      SDLC                                         RAD Type



                                                            Deployment




Figure 4: Flowchart for the proposed Top Down Design approach


                                                        5
Information and Knowledge Management                                                                   www.iiste.org
ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
Vol.3, No.2, 2013

 For business requirements analysis, techniques such as interviews, brainstorming, and JAD sessions are used to
elicit requirements. Business requirements analysis is used to elicit the business questions from the intended users of
the data warehouse. Business questions are decision support or analytic questions that managers typically pose
project (Arun and Atish, 2005). After all the business questions are elicited, they are prioritized by asking the users
to rate the questions, or by estimating the risk associated with the solutions needed for the questions. Next, a very
high-level conceptual model (also known as the subject-area data model) of the solution for each of the business
questions is created. The conceptual model serves as the blueprint for the data requirements of an organization.

The data design task includes data modeling and normalization. The two most popular data modeling techniques for
data warehousing are Entity-Relational and Dimensional modeling. The Entity-Relational modeling follows the
standard OLTP database design process, starting with a conceptual entity-relationship (ER) design, translating the
ER schema into a relational schema, and then normalizing the relational schema.

A dimensional model is composed of a fact table and several dimension tables (Kimbal and Ross, 2002). A fact table
is a specialized relation with a multi-attribute key and contains attributes whose values are generally numeric and
additive. A dimension table has a single attribute primary key (usually surrogate) that corresponds exactly to one of
the attributes of the multi-attribute key of the fact table. The characteristic star-like structure of the physical
representation of a dimensional model is called a star join schema, or simply a star schema. A dimensional model can
be extended to a snowflake schema, by removing the low cardinality attributes in the dimensions and placing them in
separate tables, which are linked back into the dimension table with artificial keys (Kimbal et al, 1998).
Dimensional modeling is a data modeling techniques that have gained popularity and acceptance for data warehouse
design (Arun and Atish, 2005).

Figure 4 presents a star schema for the proposed data warehouse design. It is made up of a suspect fact table and
several dimension tables, the schema analyzes suspect by offenses, dates, place, time, age, courts, prison and
informant.




                                                          6
Information and Knowledge Management                                                                www.iiste.org
ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
Vol.3, No.2, 2013




Figure 4: A Star Schema for the Proposed Data Warehouse Design for Nigerian Police Force
Architecture is a blueprint that allows communication, planning, maintenance, learning, and reuse. It includes
different areas such as data design, technical design, hardware and software infrastructure design. The architecture
design philosophy has its origins in the schema design strategy of OLTP databases. Several strategies for schema
design exist, such as top-down, bottom-up, inside-out, and mixed (Batini et al, 1992). The data warehouse
architecture design philosophies can be broadly classified into enterprise wide data warehouse design and data mart
design (Hackey, 1997). The data mart design, espoused by Kimball et al (1998) follows the mixed (top-down as well
as bottom-up) strategy of data design. The goal is to create individual data marts in a bottom- up fashion, but in
conformance with a skeleton schema known as the “data warehouse bus.” The data warehouse for the entire
organization is the union of those conformed data marts.

Data warehouse implementation activities include data sourcing, data staging (ETL), and development of decision
support oriented end-user applications. These activities depend on two things—data quality management and
metadata management (Inmon,2000). As data is gathered from multiple, heterogeneous OLTP sources, data quality
management is a very important issue. A data warehouse generates much more metadata than a traditional DBMS.
Data warehouse metadata includes definitions of conformed dimensions and conformed facts, data cleansing
specifications, DBMS load scripts, data transform runtime logs, and other types of metadata (Kimbal et al, 1998).
Because of the size of metadata, every data warehouse should be equipped with some type of metadata management
tool.
The deployment task focuses on solution integration, data warehouse tuning, and data warehouse maintenance.
Although solution integration and data warehouse tuning are essential, maintenance is cited as one of the leading
causes of data warehouse failures. Warehouses fail because they do not meet the needs of the business, or are too
difficult or expensive to change with the evolving needs of the business. Due to increased end-user enhancements,
repeated schema changes, and other factors, a data warehouse usually goes through several versions.

6. Summary

                                                         7
Information and Knowledge Management                                                                   www.iiste.org
ISSN 2224-5758 (Paper) ISSN 2224-896X (Online)
Vol.3, No.2, 2013

The interview technique was use to elicit the required information from the Nigerian Police Force that supposed to
be keeping the criminal data. It was observed in the course of the interview that as a Nation we don’t have a database
for criminal activities not to talk of integrating the database. That is why we have proposed the frame work to serve
as a guideline for designing a data warehouse for this Nation to aid in monitoring of criminal activities in this Nation
and for better analytics and decision making in order to ensure national security. After all the required information
was elicited from the Nigeria Police Force it was used to design a star schema for the proposed data warehouse.



7. Conclusion
The successful implementation of data warehousing will creates new possibilities for tackling crime in this Nation.
Applications that previously were not feasible due to the lack of integrated data will now be possible. Since the
data warehouse will be designed to store historical data, it will be an ideal technology for analyzing criminal trends
in this nation. Warehouse users can produce reports that compare current crime rate to historical figures. Their
analysis may highlight trends that will reveal some major issues that affect our national security. Such performance
trend analysis capabilities are crucial for the success of planning for the so called national security.

References

Arun S. and Atish P. S. (2005) “A Comparism of Data Warehousing Methodologies, ACM,Vol.             48, No. 3, pp. 79-
    84.



Batini, C., Ceri, S., and Navathe, S.K. (1992) “Conceptual Database Design: An Enity- Relationship Approach”.
     Benjamin/Cummings, Redwood City, CA

Hackney, D. (1997) “Understanding and Implementing Successful Data Marts”, Addison-
    Wesley, Reading, MA.

Humphries, H. (1998) “Data Warehousing Architecture and Implementation”, First Edition,         Prentice Hall, USA.

Inmon, W.H. (2002) “Building the Data Warehouse”, 3rd edition”, Wiley, New York.

Inmon, W. (2000) “Metadata in the data warehouse”, White Paper,
    www.inmoncif.com/library/whiteprs/earlywp/ttmeta.pdf.

Kimball, R. and Ross, M.(2002) “The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling”,
         2nd edition, Wiley, New York.

Kimball, R., Reeves, L., Ross, M., and Thronthwaite, W. (1998) “ Data Warehouse Lifecycle             Toolkit”, Wiley,
New      York.

Russom P. (2009) “ Next Generation Data Warehouse Platforms”, TDWI Report, www.tdwi.org

Surajit C. and Dayal U. (1997) “ An Overview of Data Warehousing and OLAP Technologies” , ACM Sigmod




  Impact of Information Literacy Skills on Academic Staff Research
                                                           8
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org


                               CALL FOR PAPERS

The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Contenu connexe

Tendances

IRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in SoftwareIRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in SoftwareIRJET Journal
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big DataAkshata Humbe
 
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial DomainIRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial DomainIRJET Journal
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
 
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataThe Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataMarkLogic Corporation
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...IRJET Journal
 
BVRM 402 unit 1 Information Management System
BVRM 402 unit 1 Information Management SystemBVRM 402 unit 1 Information Management System
BVRM 402 unit 1 Information Management SystemDrNilimaThakur
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
 
Big Data Analytics: Recent Achievements and New Challenges
Big Data Analytics: Recent Achievements and New ChallengesBig Data Analytics: Recent Achievements and New Challenges
Big Data Analytics: Recent Achievements and New ChallengesEditor IJCATR
 
Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Dataijtsrd
 

Tendances (19)

Taming the data beast
Taming the data beastTaming the data beast
Taming the data beast
 
IRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in SoftwareIRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in Software
 
Ch03
Ch03Ch03
Ch03
 
BVRM 402 IMS UNIT V
BVRM 402 IMS UNIT VBVRM 402 IMS UNIT V
BVRM 402 IMS UNIT V
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Big data
Big dataBig data
Big data
 
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial DomainIRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial Domain
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Ch03
Ch03Ch03
Ch03
 
H1802045666
H1802045666H1802045666
H1802045666
 
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured DataThe Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
BVRM 402 unit 1 Information Management System
BVRM 402 unit 1 Information Management SystemBVRM 402 unit 1 Information Management System
BVRM 402 unit 1 Information Management System
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...
 
Big Data Analytics: Recent Achievements and New Challenges
Big Data Analytics: Recent Achievements and New ChallengesBig Data Analytics: Recent Achievements and New Challenges
Big Data Analytics: Recent Achievements and New Challenges
 
Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Data
 
J017536064
J017536064J017536064
J017536064
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 

Similaire à A frame work for data warehouse for nigerian police force

A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSA SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSijistjournal
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Science Council of America
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data MiningIOSR Journals
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldNeil Raden
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...IJERDJOURNAL
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesAIRCC Publishing Corporation
 
Big data analytics in Business Management and Businesss Intelligence: A Lietr...
Big data analytics in Business Management and Businesss Intelligence: A Lietr...Big data analytics in Business Management and Businesss Intelligence: A Lietr...
Big data analytics in Business Management and Businesss Intelligence: A Lietr...IRJET Journal
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Acumen insurance Data Warehouse
Acumen insurance Data WarehouseAcumen insurance Data Warehouse
Acumen insurance Data WarehouseNIIT Technologies
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...IT Support Engineer
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIIJCSEA Journal
 

Similaire à A frame work for data warehouse for nigerian police force (20)

A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSA SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICS
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
big-data.pdf
big-data.pdfbig-data.pdf
big-data.pdf
 
A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data Mining
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Data Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope SurveyData Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope Survey
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and Opportunities
 
Big data analytics in Business Management and Businesss Intelligence: A Lietr...
Big data analytics in Business Management and Businesss Intelligence: A Lietr...Big data analytics in Business Management and Businesss Intelligence: A Lietr...
Big data analytics in Business Management and Businesss Intelligence: A Lietr...
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Abstract
AbstractAbstract
Abstract
 
Acumen insurance Data Warehouse
Acumen insurance Data WarehouseAcumen insurance Data Warehouse
Acumen insurance Data Warehouse
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

A frame work for data warehouse for nigerian police force

  • 1. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 A Frame Work for Data Warehouse for Nigerian Police Force: A Way of Ensuring National Security Georgina N. Obunadike 1* Richard K. Tyokyaa 2 1. Department of Mathematical Sciences and IT, Federal University, Dutsin-ma, Katsina State, Nigeria. 2. Department of Mathematical Sciences and IT, Federal University, Dutsin-ma, Katsina State, Nigeria. * E-mail: nkoliobunadike@yahoo.com Abstract Security is presently a major challenge in Nigeria today, Nigerians and non- Nigerians are killed on daily basis and in their numbers. Since the advent of the present democratic dispensation, new forms of violent crimes have become common; these include kidnapping for ransom, pipeline vandalization, Boko Haram bombings, rape, political violence and more. Though the government claims to be on top of the situation, the problem persists. This work attempts to propose a frame work for integration of criminal databases from different state police databases to form a data warehouse for easy access and analysis of criminal data for necessary actions. Data integration involves combining data residing in different sources to form a data warehouse there by providing users with a unified view of these data. Data Integration Technologies have experienced explosive growth in the last few years, and data warehousing has played a major role in the integration process. Key words: National Security, Data integration, Data Warehousing, Star Schema, Data Mart, 1. Introduction The Nigerian society is getting more and more insecure, more people are getting into crimes and they are getting more ruthless, desperate and sophisticated. In Nigeria of today especially since the advent of the present democratic dispensation, new forms of violent crimes have become common; these include kidnapping for ransom, pipeline vandalization, Boko Haram bombings, rape, political violence and more. Public and private institutions are attacked and vandalized by gangs, even the United Nations building and the Nigerian Police Headquarters in Abuja were bombed and scores of people killed. Something needs to be done and that urgently. It is widely agreed that security should be the responsibility of all and sundry, not restricted to government, the Police force or security agencies (Otto and Ukpere, 2012). This work attempts to propose integration of criminal databases from different state police databases to form a data warehouse for easy access and analysis of criminal data for necessary actions. Data integration involves combining data residing in different sources and providing users with a unified view of these data. Data Integration Technologies have experienced explosive growth in the last few years, and data warehousing has played a major role in the integration process. Data warehousing is a collection of decision support technologies, aimed at enabling the knowledge worker (executive, manager, and analyst) to make better and faster decisions. The goal of data warehouses is to make the right information available at the right time. It involves bringing together disparate data from throughout an organization for decision-support purposes (Surajit and Dayal, 1997). The data warehouse concept was developed as IT professionals increasingly realized that the structure of data required for transaction reporting was significantly different from the structure required to analyze data. It was designed to contain summarized, historical views of data in production systems. This collection provides business users and decision-makers with a cross-functional, integrated, subject-oriented view of the enterprise. Data warehouse also known as OLAP (Online Analytical Processing), provides managerial users with meaningful views of past and present enterprise data. User-friendly formats, such as graphs and charts are frequently employed to quickly convey meaningful data relationships (Humphries, 1998). It is not possible to anticipate the information requirements of decision-makers for the simple reason that their needs depend on the business situation that they face. Decision-makers need to review enterprise data from different dimensions and at different levels of detail to find the source of a business problem before they can attack it. They likewise need information for detecting business opportunities to exploit (Humphries, 1998). 1
  • 2. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 Decision-makers also need to analyze trends in the performance of the enterprise. Rather than waiting for problems to present themselves, decision-makers need to proactively mobilize the resources of the enterprise in anticipation of a business situation. Since these information requirements cannot be anticipated, the decision-maker often resorts to reviewing predesigned inquiries or reports in an attempt to find or derive needed information. Alternatively, the IT professional is pressured to produce an ad hoc report from legacy systems as quickly as possible. If unlucky, the IT professional will find the data needed for the report are scattered throughout different legacy systems. An even unluckier may find that the processing required to produce the report will have a toll on the operations of the enterprise. These delays are not only frustrating both for the decision-maker and the IT professionals; they are dangerous for the enterprise. The information that eventually reaches the decision-maker may be inconsistent, inaccurate, or worse, obsolete. Decision support applications (or OLAP) that obtain data from the data warehouse are recommended for this particular need (Humphries, 1998). Data warehousing technologies have been successfully deployed in many industries: manufacturing (for order shipment and customer support), retail (for user profiling and inventory management), financial services (for claims analysis, risk analysis, credit card analysis, and fraud detection), transportation (for fleet management), telecommunications (for call analysis and fraud detection), utilities (for power usage analysis), and healthcare (for outcomes analysis). The rest of this paper presents a roadmap of data warehousing technologies, focusing on the special requirements of data warehousing. 2. Data Warehouse Concept Database computing has shifted its focus from operational to decisional concerns. The differences in operational and decisional information requirements presented new challenges that old computing practices could not meet. This change in computing focus has become the impetus for the development of data warehousing technologies (Maurice, 2002). A Data Warehouse (DW) is defined as “a subject-oriented, integrated, time-variant, non-volatile collection of data in support of management’s decision-making process” (Batini et al, 1992). Data warehouses store huge amount of information from multiple data sources which is used for query and analysis. The data warehouse holds transformed and integrated enterprise-wide operational data appropriate for strategic decision-making, as shown in Figure 1. The data warehouse also contains data obtained from external sources, whenever this data is relevant to decision-making. Decision support applications analyze and make data warehouse information available in formats that are readily understandable by decision-makers. Figure 1: Data Warehouse as an integrated enterprise-wide operational data appropriate for strategic decision-making Source: (Maurice, 2002) Since these information requirements cannot be anticipated, operational systems (which correctly focus on recording and completing different types of business transactions) are unable to provide decision-makers with the information they need. As a result, business managers fall back on the time-consuming, and often frustrating, process of going through operational inquiries or reports already supported by operational systems in an attempt to find or derive the 2
  • 3. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 information they really need. Alternatively, IT professionals are pressured to produce an ad hoc report from the operational systems as quickly as possible (Maurice, 2002). It will not be unusual for the IT professional to find that the data needed to produce the report are scattered throughout different operational systems and must first be carefully integrated. Worse, it's likely that the processing required to extract the data from each operational system will demand so much of the system resources that the IT professional must wait until nonoperational hours before running the queries required to produce the report. These delays are not only time-consuming and frustrating both for the IT professionals and the decision-makers they are dangerous for the enterprise. When the report is finally produced, the data may be inconsistent, inaccurate, or obsolete. There is also the very real possibility that this new report will trigger the request for another ad hoc report. Since a data warehouse maintains a copy of information from the source transaction systems. This provides the opportunity to: • Maintain data history, even if the source transaction systems do not. • Integrate data from multiple source systems, enabling a central view across the enterprise. This benefit is always valuable, but particularly so when the organization has grown by merger. • Improve data quality, by providing consistent codes and descriptions, flagging or even fixing bad data. • Present the organization's information consistently. • Provide a single common data model for all data of interest regardless of the data's source. • Restructure the data so that it makes sense to the business users. • Restructure the data so that it delivers excellent query performance, even for complex analytic queries, without impacting the operational systems. • Add value to operational business applications, notably customer relationship management (CRM) systems 3. DATA WAREHOUSE PLATFORM A data warehouse platform consists of one or more hardware servers, an operating system, a database management system (DBMS), and data storage. These communicate via a LAN or WAN, although a multi-node data warehouse platform may have its own specialized network. Note that a data warehouse platform manages a data warehouse, defined as a collection of metadata, data model, and data content, designed for the purposes of reporting, analyzing information, and making decisions. But the data warehouse is not part of the platform per se (Russom, 2009). Warehouse Data Meta Data Data Models Data Content Operating Database Data Server Warehouse System Mgt System Storage platform Hardware Data Networking Figure 2: A data warehouse platform manages a data warehouse, but the two are separate Source: (Russom, 2009). 4. Data Warehousing Architecture Data warehouse architecture includes tools for extracting data from multiple operational databases and external sources; for cleaning, transforming and integrating this data; for loading data into the data warehouse; and for periodically refreshing the warehouse to reflect updates at the sources and to purge data from the warehouse, perhaps onto slower archival storage. In addition to the main warehouse, there may be several departmental data marts. Data 3
  • 4. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 the warehouse and data marts is stored and managed by one or more warehouse servers, which present multidimensional views of data to a variety of front end tools: query tools, report writers, analysis tools, and data mining tools. Finally, there is a repository for storing and managing metadata, and tools for monitoring and administering the warehousing system. Figure 3: shows a typical data warehousing architecture. Monitoring & Administration Data Warehouse OLAP Server External Source Meta Data Analysis Repository Extract Query/Reporting Server Serve Transform Operational Load Database Refresh Data Mining Data Source Data Marts Figure 3: Data Warehousing Architecture Source: (Surajit and Dayal, 1997). 5. Data Warehousing Methodology Data warehousing has been cited as the highest-priority post-millennium project of more than half of IT executives. A large number of data warehousing methodologies and tools are available to support the growing market. However, with so many methodologies to choose from, a major concern for many firms is which one to employ in a given data warehousing project (Arun and Atish, 2005). In this article, we propose a top-down design approach of data warehousing. Online transaction processing (OLTP) systems are useful for addressing the operational data needs of a firm. However, they are not well suited for supporting decision-support queries or business questions that managers typically need to address. Such questions involve analytics including aggregation, drilldown, and slicing/dicing of data, which are best supported by online analytical processing (OLAP) systems. Data warehouses support OLAP applications by storing and maintaining data in multidimensional format. Data in an OLAP warehouse is extracted and loaded from multiple OLTP data sources (including DB2, Oracle, IMS databases, and flat files) using Extract, Transfer, and Load (ETL) tools. The warehouse is located in a presentation server. It can span enterprise wide data needs or can be a collection of “conforming” data marts (Kimball and Ross, 2002). Data marts (subsets of data warehouses) are conformed by following a standard set of attribute declarations called a data warehouse bus. The data warehouse uses a metadata repository to integrate all of its components. The metadata stores definitions of the source data, data models for target databases, and transformation rules that convert source into target data. The concepts of time variance and non volatility are essential for a data warehouse (Inmon, 2002). 4
  • 5. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 Inmon emphasized the importance of cross-functional slices of data drawn from multiple sources to support a of needs (Inmon, 2002); the foundation of his subject-oriented design was an enterprise data model. Kimball introduced the notion of dimensional modeling marts (Kimball and Ross, 2002), which addresses the gap between relational databases and multidimensional databases needed for OLAP tasks. These different definitions and concepts gave rise to an array of data warehousing methodologies and technologies. Data warehousing methodologies share a common set of tasks which includes business requirements analysis, data design, architecture design, implementation, and deployment which represents the top-down design approach of data warehousing (Kimbal et al, 1998). Business Requirement Analysis Data Design Data Modeling Normalization Entity Dimensional Relationship (ER) Architecture Design Enterprise wide Data Mart Design Data warehouse Design Implementation SDLC RAD Type Deployment Figure 4: Flowchart for the proposed Top Down Design approach 5
  • 6. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 For business requirements analysis, techniques such as interviews, brainstorming, and JAD sessions are used to elicit requirements. Business requirements analysis is used to elicit the business questions from the intended users of the data warehouse. Business questions are decision support or analytic questions that managers typically pose project (Arun and Atish, 2005). After all the business questions are elicited, they are prioritized by asking the users to rate the questions, or by estimating the risk associated with the solutions needed for the questions. Next, a very high-level conceptual model (also known as the subject-area data model) of the solution for each of the business questions is created. The conceptual model serves as the blueprint for the data requirements of an organization. The data design task includes data modeling and normalization. The two most popular data modeling techniques for data warehousing are Entity-Relational and Dimensional modeling. The Entity-Relational modeling follows the standard OLTP database design process, starting with a conceptual entity-relationship (ER) design, translating the ER schema into a relational schema, and then normalizing the relational schema. A dimensional model is composed of a fact table and several dimension tables (Kimbal and Ross, 2002). A fact table is a specialized relation with a multi-attribute key and contains attributes whose values are generally numeric and additive. A dimension table has a single attribute primary key (usually surrogate) that corresponds exactly to one of the attributes of the multi-attribute key of the fact table. The characteristic star-like structure of the physical representation of a dimensional model is called a star join schema, or simply a star schema. A dimensional model can be extended to a snowflake schema, by removing the low cardinality attributes in the dimensions and placing them in separate tables, which are linked back into the dimension table with artificial keys (Kimbal et al, 1998). Dimensional modeling is a data modeling techniques that have gained popularity and acceptance for data warehouse design (Arun and Atish, 2005). Figure 4 presents a star schema for the proposed data warehouse design. It is made up of a suspect fact table and several dimension tables, the schema analyzes suspect by offenses, dates, place, time, age, courts, prison and informant. 6
  • 7. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 Figure 4: A Star Schema for the Proposed Data Warehouse Design for Nigerian Police Force Architecture is a blueprint that allows communication, planning, maintenance, learning, and reuse. It includes different areas such as data design, technical design, hardware and software infrastructure design. The architecture design philosophy has its origins in the schema design strategy of OLTP databases. Several strategies for schema design exist, such as top-down, bottom-up, inside-out, and mixed (Batini et al, 1992). The data warehouse architecture design philosophies can be broadly classified into enterprise wide data warehouse design and data mart design (Hackey, 1997). The data mart design, espoused by Kimball et al (1998) follows the mixed (top-down as well as bottom-up) strategy of data design. The goal is to create individual data marts in a bottom- up fashion, but in conformance with a skeleton schema known as the “data warehouse bus.” The data warehouse for the entire organization is the union of those conformed data marts. Data warehouse implementation activities include data sourcing, data staging (ETL), and development of decision support oriented end-user applications. These activities depend on two things—data quality management and metadata management (Inmon,2000). As data is gathered from multiple, heterogeneous OLTP sources, data quality management is a very important issue. A data warehouse generates much more metadata than a traditional DBMS. Data warehouse metadata includes definitions of conformed dimensions and conformed facts, data cleansing specifications, DBMS load scripts, data transform runtime logs, and other types of metadata (Kimbal et al, 1998). Because of the size of metadata, every data warehouse should be equipped with some type of metadata management tool. The deployment task focuses on solution integration, data warehouse tuning, and data warehouse maintenance. Although solution integration and data warehouse tuning are essential, maintenance is cited as one of the leading causes of data warehouse failures. Warehouses fail because they do not meet the needs of the business, or are too difficult or expensive to change with the evolving needs of the business. Due to increased end-user enhancements, repeated schema changes, and other factors, a data warehouse usually goes through several versions. 6. Summary 7
  • 8. Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.3, No.2, 2013 The interview technique was use to elicit the required information from the Nigerian Police Force that supposed to be keeping the criminal data. It was observed in the course of the interview that as a Nation we don’t have a database for criminal activities not to talk of integrating the database. That is why we have proposed the frame work to serve as a guideline for designing a data warehouse for this Nation to aid in monitoring of criminal activities in this Nation and for better analytics and decision making in order to ensure national security. After all the required information was elicited from the Nigeria Police Force it was used to design a star schema for the proposed data warehouse. 7. Conclusion The successful implementation of data warehousing will creates new possibilities for tackling crime in this Nation. Applications that previously were not feasible due to the lack of integrated data will now be possible. Since the data warehouse will be designed to store historical data, it will be an ideal technology for analyzing criminal trends in this nation. Warehouse users can produce reports that compare current crime rate to historical figures. Their analysis may highlight trends that will reveal some major issues that affect our national security. Such performance trend analysis capabilities are crucial for the success of planning for the so called national security. References Arun S. and Atish P. S. (2005) “A Comparism of Data Warehousing Methodologies, ACM,Vol. 48, No. 3, pp. 79- 84. Batini, C., Ceri, S., and Navathe, S.K. (1992) “Conceptual Database Design: An Enity- Relationship Approach”. Benjamin/Cummings, Redwood City, CA Hackney, D. (1997) “Understanding and Implementing Successful Data Marts”, Addison- Wesley, Reading, MA. Humphries, H. (1998) “Data Warehousing Architecture and Implementation”, First Edition, Prentice Hall, USA. Inmon, W.H. (2002) “Building the Data Warehouse”, 3rd edition”, Wiley, New York. Inmon, W. (2000) “Metadata in the data warehouse”, White Paper, www.inmoncif.com/library/whiteprs/earlywp/ttmeta.pdf. Kimball, R. and Ross, M.(2002) “The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling”, 2nd edition, Wiley, New York. Kimball, R., Reeves, L., Ross, M., and Thronthwaite, W. (1998) “ Data Warehouse Lifecycle Toolkit”, Wiley, New York. Russom P. (2009) “ Next Generation Data Warehouse Platforms”, TDWI Report, www.tdwi.org Surajit C. and Dayal U. (1997) “ An Overview of Data Warehousing and OLAP Technologies” , ACM Sigmod Impact of Information Literacy Skills on Academic Staff Research 8
  • 9. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar