Intelligent System for Automated Duplicate Detection Using File Hashing | IJET – Volume 12 Issue 2 | IJET-V12I2P94

International Journal of Engineering and Techniques (IJET) Logo

International Journal of Engineering and Techniques (IJET)

Open Access • Peer Reviewed • High Citation & Impact Factor • ISSN: 2395-1303

Volume 12, Issue 2  |  Published: April 2026

Author: {{author}}

DOI: https://doi.org/{{doi}}  â€˘  PDF: Download

Abstract

In modern academic environments, the extensive use of digital learning resources such as e-books and PDF documents has significantly increased. These resources are frequently shared across multiple platforms, including messaging applications, emails, and portable storage devices.However, this widespread sharing often results in the unintentional duplication of files, leading to redundant storage, inefficient space utilization, and difficulty in managing study materials. This paper presents an Intelligent E-Book Management System designed to automatially detect and prevent duplicate file storage using file hashing techniques. The system generates a unique digital fingerprint for each uploaded file and compares it with existing records in the database. Upon detecting duplication, users are immediately notified, thereby preventing redundant storage. The proposed system enhances data organization, improves storage efficiency, and simplifies digital file management, making it highly suitable for academic and institutional use.

Keywords

{{keywords}}

Conclusion

The Intelligent E-Book Management System successfully addresses the problem of duplicate file storage in academic environments. By using file hashing techniques, the system ensures efficient detection and management of duplicate e- books.

References

[1] J. Ullman, “Data Mining and Knowledge Discovery,” Springer, 2018 [2] M. Rabin, “Fingerprinting by Random Polynomials,” Harvard University, 1981. [3] A. Broder, “On the resemblance and containment of documents,” Proceedings of Compression and Complexity of Sequences, 1997. [4] W. Stallings, “Cryptography and Network Security: Principles and Practice,” Pearson, 2017. [5] K. Elmagarmid, P. Ipeirotis, and V. Verykios, “Duplicate Record Detection: A Survey,” IEEE Transactions on Knowledge and Data Engineering, 2007. [6] S. Ghemawat, H. Gobioff, and S. Leung, “The Google File System,” ACM Symposium on Operating Systems Principles, 2003. [7] R. Rivest, “The MD5 Message-Digest Algorithm,” MIT Laboratory for Computer Science, 1992.

Cite this article

APA
{{author}} (April 2026). {{title}}. International Journal of Engineering and Techniques (IJET), 12(2). https://doi.org/{{doi}}
{{author}}, “{{title}},” International Journal of Engineering and Techniques (IJET), vol. 12, no. 2, April 2026, doi: {{doi}}.
Submit Your Paper