A Review on Effective and Efficient Detection of Duplicates in Data
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
Detection of Duplication is an essential step in data cleansing. Data duplication techniques are used to link records which relate to the same entity in one or more data sets where a unique identifier is not available. Duplication detection is also called as Record Linkage. The major challenges in detection of duplication are the computational complexity and the linkage accuracy. Blocking and Windowing are two approaches used in Duplication detection. Windowing is a Sorted Neighbourhood Method; compare the records within window when it slides. Blocking is partition record method. The main focus of this paper is on maintain and improve efficiency as well as effectiveness of duplication detection by using adaptive windowing and blocking algorithms.
Authors and Affiliations
Varsha Wandhekar, Arti Mohanpurkar
Operations on Hesitant Fuzzy Hypergraph
The concept of hypergraphs was extended to fuzzy hypergraph. In this paper, we extend the concepts of fuzzy hypergraphs into that of hesitant fuzzy hypergraphs. Based on the definition of hesitant fuzzy graph, order of...
Privacy in Data Storage and MultiOwner Authentication with Load Balancing in Cloud Computing
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the encumbrance of local data stora...
Human Activity Recognition in Video on Exploration of Hog
The analysis of human activities is one of the most important open issues for the automated video surveillance community. Since few years ago, human activity/behavior has been handled by Computer Vision and Pattern Reco...
Spatial Aware Query Processing For Social Networks
With the rapid advances in positioning and smartphone technologies, a number of social networks namely Facebook and twitter are gaining the dimension of location. Most of the location-based social networks released chec...
Authenticating Machines by Using Human Biometric
The main aim of this paper is to design and implement authenticating machines by using human biometric which can be organized in bank, secured offices and homes. In this system only authorized person can be used bank lo...