• No results found

duplication detection

Record Duplication Detection in Database: A Review

Record Duplication Detection in Database: A Review

... locate duplication of database records, there is a dearth of studies available which rate the effectiveness of the diverse techniques used for duplicate record ...of duplication detection, but they ...

8

Secure Duplication Detection in Cloud using Chunk Based Technique

Secure Duplication Detection in Cloud using Chunk Based Technique

... Data De-duplication identifies the duplicate data to remove the redundancies and reduces the overall capacity of data transferred and stored. [4,5] De-duplication often called as "intelligent ...

8

On memory and I/O efficient duplication detection for multiple self-clean data sources

On memory and I/O efficient duplication detection for multiple self-clean data sources

... Research Program Committee Co-Chairs Yoshiharu Ishikawa Nagoya University, Japan Qing Li City University of Hong Kong, China Research Program Committee Members Toshiyuki Amagasa Universi[r] ...

23

A Review on Duplication Detection Techniques
A Mamatha & Rajasekhar Jelli

A Review on Duplication Detection Techniques A Mamatha & Rajasekhar Jelli

... Duplicate detection is the process of finding multiple records in a dataset that represent the same real-world entity. Due to the enormous costs of an exhaustive comparison, typical algorithms select only ...

6

Detecting Forgery in Duplicated Region using Keypoint Matching

Detecting Forgery in Duplicated Region using Keypoint Matching

... region duplication detection methods are based on matching blocks of image pixels or transform coefficients ...region duplication method is proposed to handle duplicated regions rotated with 90, 180 ...

5

A NOVEL APPROACH TO GENERATE DISTRIBUTED GLOBAL AND LOCAL USE CASES: A NEW 
NOTATION

A NOVEL APPROACH TO GENERATE DISTRIBUTED GLOBAL AND LOCAL USE CASES: A NEW NOTATION

... The duplication detection plugin operates on this canonical format, thus it can detect approximate duplications in process models defined in different modeling languages such as BPMN and EPC for ...

6

Efficient and Effective Duplicate Detection Evaluating Multiple Data using Genetic Algorithm

Efficient and Effective Duplicate Detection Evaluating Multiple Data using Genetic Algorithm

... as duplication detection or record linkage is used as a part of the data cleaning process to identify records that potentially refer to the same real-world ...purpose duplication detection ...

6

A Survey on Data De-Duplication Methods in Cloud Storage System

A Survey on Data De-Duplication Methods in Cloud Storage System

... the detection and removal of redundant and error contained data and inconsistencies from the data to improve the quality of data in the cloud storage ...duplicate detection is preceded by a data preparation ...

8

IMAGE DUPLICATION AND ROTATION DETECTION METHODS FOR STORAGE UTILIZATION

IMAGE DUPLICATION AND ROTATION DETECTION METHODS FOR STORAGE UTILIZATION

... pattern detection and pattern recognition are as described ...pattern detection is defined as “consists of examining an arbitrary set of figures and selecting those having some specified form” by ...

6

Array CGH improves detection of mutations in the GALC gene associated with Krabbe disease

Array CGH improves detection of mutations in the GALC gene associated with Krabbe disease

... In two of the 33 cases (6.1%), comprehensive GALC mutation analysis, including sequence analysis, 30-kb de- letion analysis, and deletion/duplication analysis, failed to identify two known mutations. When only one ...

9

Basilar Artery Duplication Associated with Pituitary Duplication: A New Finding

Basilar Artery Duplication Associated with Pituitary Duplication: A New Finding

... A 2-day-old female patient who was born at term was re- ferred for MR imaging to evaluate a protruding whitish mass from the oral cavity. This was thought to be a meningocele or an encephalocele, because the mass ...

6

Cross-Species Comparison of Drosophila Male Accessory Gland Protein Genes

Cross-Species Comparison of Drosophila Male Accessory Gland Protein Genes

... Detection of D. melanogaster Acp orthologs in D. pseudoobscura: The complete genome sequence of D. pseudoobscura (R ichards et al. 2005) allowed us to search for conserved D. melanogaster ACPs in a distantly ...

13

Original Article Duplicated Ureter- A Cadaveric Study

Original Article Duplicated Ureter- A Cadaveric Study

... According to our study,1 in 150 individuals may be having duplicated ureter. Most common type observed with comparison to previous studies was left sided unilateral incomplete duplication. Knowledge of ...

5

Clinical evaluation of panel testing by next-generation sequencing (NGS) for gene mutations in myeloid neoplasms

Clinical evaluation of panel testing by next-generation sequencing (NGS) for gene mutations in myeloid neoplasms

... We therefore closely examined the BWA-MEM align- ments and observed two major differences between wild-type and ITD sequencing reads: (1) longer se- quences became soft-clipped (ignored for analysis in- cluding variant ...

12

Some New Families of Divisor Cordial Graph

Some New Families of Divisor Cordial Graph

... helm; duplication of arbitrary vertex of cycle, duplication of arbitrary edge of cycle; split graph of K 1,n , B n,n , B n,n 2 are divisor cordial ...

10

De-Duplication on Cloud – Survey

De-Duplication on Cloud – Survey

... The other method of de-duplication is Post Process (PP); in this the new data is stored on the device and then being processed in the later stages. It will also analyze the duplicate data. The advantage of using ...

5

Reliability equivalence factors for a series parallel system assuming an exponentiated weibull distribution

Reliability equivalence factors for a series parallel system assuming an exponentiated weibull distribution

... The two main approaches for improving a system are reduction methods and standby redundancy (duplication) methods. The latter comprise two variations, hot duplication and cold duplication. ...

8

De-duplication and Encryption in Cloud Storage

De-duplication and Encryption in Cloud Storage

... de- duplication technology can be deployed in one of two basic ways: at the source or at the ...de- duplication, data copies are eliminated in primary storage before the data is sent to the backup ...de- ...

8

The Prevalence of Inappropriate Image Duplication in Biomedical Research Publications

The Prevalence of Inappropriate Image Duplication in Biomedical Research Publications

... image duplication results from systematic problems in figure preparation by individual researchers, which tend to ...of duplication does not alter the research ...inappropriate duplication, ensuring ...

8

Analysing how physical activity competes: a cross-disciplinary application of the Duplication of Behaviour Law

Analysing how physical activity competes: a cross-disciplinary application of the Duplication of Behaviour Law

... of duplication means that the fit of the law is unsurprising, the evidence of some deviations for the less prevalent activities, including physical activity, demonstrate how different physical activity is and why ...

13

Show all 10000 documents...

Related subjects