
Intelligent System for Automated Duplicate Detection Using File Hashing | IJET â Volume 12 Issue 2 | IJET-V12I2P94

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access ⢠Peer Reviewed ⢠High Citation & Impact Factor ⢠ISSN: 2395-1303
Volume 12, Issue 2 | Published: April 2026
Author: {{author}}
DOI: https://doi.org/{{doi}} ⢠PDF: Download
Abstract
In modern academic environments, the extensive use of digital learning resources such as e-books and PDF documents has significantly increased. These resources are frequently shared across multiple platforms, including messaging applications, emails, and portable storage devices.However, this widespread sharing often results in the unintentional duplication of files, leading to redundant storage, inefficient space utilization, and difficulty in managing study materials.
This paper presents an Intelligent E-Book Management System designed to automatially detect
and prevent duplicate file storage using file hashing techniques. The system generates a unique
digital fingerprint for each uploaded file and compares it with existing records in the database.
Upon detecting duplication, users are immediately notified, thereby preventing redundant storage.
The proposed system enhances data organization, improves storage efficiency, and simplifies digital file management, making it highly suitable for academic and institutional use.
Keywords
{{keywords}}
Conclusion
ďˇThe Intelligent E-Book Management System successfully addresses the problem of duplicate file storage in academic environments. By using file hashing techniques, the system ensures efficient detection and management of duplicate e- books.
References
ďˇ[1] J. Ullman, âData Mining and Knowledge Discovery,â Springer, 2018
ďˇ[2] M. Rabin, âFingerprinting by Random Polynomials,â Harvard University, 1981.
ďˇ[3] A. Broder, âOn the resemblance and
containment of documents,â Proceedings of Compression and Complexity of Sequences, 1997.
ďˇ[4] W. Stallings, âCryptography and
Network Security: Principles and Practice,â
Pearson, 2017.
ďˇ[5] K. Elmagarmid, P. Ipeirotis, and V.
Verykios, âDuplicate Record Detection: A Survey,â IEEE Transactions on Knowledge and Data Engineering, 2007.
ďˇ[6] S. Ghemawat, H. Gobioff, and S. Leung, âThe Google File System,â ACM Symposium on Operating Systems Principles, 2003.
ďˇ[7] R. Rivest, âThe MD5 Message-Digest Algorithm,â MIT Laboratory for Computer Science, 1992.
Cite this article
APA
{{author}} (April 2026). {{title}}. International Journal of Engineering and Techniques (IJET), 12(2). https://doi.org/{{doi}}
{{author}}, â{{title}},â International Journal of Engineering and Techniques (IJET), vol. 12, no. 2, April 2026, doi: {{doi}}.
