
IntelligentĀ SystemĀ forĀ AutomatedĀ Duplicate DetectionĀ UsingĀ File Hashing | IJET ā Volume 12 Issue 2 | IJET-V12I2P94

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access ⢠Peer Reviewed ⢠High Citation & Impact Factor ⢠ISSN: 2395-1303
Volume 12, Issue 2 | Published: April 2026
Author: {{author}}
DOI: https://doi.org/{{doi}} ⢠PDF: Download
Abstract
In modern academic environments, the extensive use of digital learning resources such as e-books and PDF documents has significantly increased. These resources are frequently shared across multiple platforms, including messaging applications, emails, and portable storage devices.However, this widespread sharing often results in the unintentional duplication of files, leading to redundant storage, inefficient space utilization, and difficulty in managing study materials.
This paper presents an Intelligent E-Book Management System designed to automatially detect
and prevent duplicate file storage using file hashing techniques. The system generates a unique
digital fingerprint for each uploaded file and compares it with existing records in the database.
Upon detecting duplication, users are immediately notified, thereby preventing redundant storage.
The proposed system enhances data organization, improves storage efficiency, and simplifies digital file management, making it highly suitable for academic and institutional use.
Keywords
{{keywords}}
Conclusion
ļ·The Intelligent E-Book Management System successfully addresses the problem of duplicate file storage in academic environments. By using file hashing techniques, the system ensures efficient detection and management of duplicate e- books.
References
ļ·[1] J. Ullman, āData Mining and Knowledge Discovery,ā Springer, 2018
ļ·[2] M. Rabin, āFingerprinting by Random Polynomials,ā Harvard University, 1981.
ļ·[3] A. Broder, āOn the resemblance and
containment of documents,ā Proceedings of Compression and Complexity of Sequences, 1997.
ļ·[4] W. Stallings, āCryptography and
Network Security: Principles and Practice,ā
Pearson, 2017.
ļ·[5] K. Elmagarmid, P. Ipeirotis, and V.
Verykios, āDuplicate Record Detection: A Survey,ā IEEE Transactions on Knowledge and Data Engineering, 2007.
ļ·[6] S. Ghemawat, H. Gobioff, and S. Leung, āThe Google File System,ā ACM Symposium on Operating Systems Principles, 2003.
ļ·[7] R. Rivest, āThe MD5 Message-Digest Algorithm,ā MIT Laboratory for Computer Science, 1992.
Cite this article
APA
{{author}} (April 2026). {{title}}. International Journal of Engineering and Techniques (IJET), 12(2). https://doi.org/{{doi}}
{{author}}, ā{{title}},ā International Journal of Engineering and Techniques (IJET), vol. 12, no. 2, April 2026, doi: {{doi}}.
