Results 1 to 10 of about 29,228 (163)

How error correction affects polymerase chain reaction deduplication: A survey based on unique molecular identifier datasets of short reads [PDF]

open access: yesQuantitative Biology
Next‐generation sequencing data are widely utilised for various downstream applications in bioinformatics and numerous techniques have been developed for PCR‐deduplication and error‐correction to eliminate bias and errors introduced during the sequencing.
Pengyao Ping   +4 more
doaj   +2 more sources

A CAE model-based secure deduplication method [PDF]

open access: yesScientific Reports
Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. Random Message Locked
Chunbo Wang   +3 more
doaj   +2 more sources

DOMe: A deduplication optimization method for the NewSQL database backups. [PDF]

open access: yesPLoS ONE, 2017
Reducing duplicated data of database backups is an important application scenario for data deduplication technology. NewSQL is an emerging database system and is now being used more and more widely.
Longxiang Wang   +4 more
doaj   +1 more source

THE USE OF ROUGH CLASSIFICATION AND TWO THRESHOLD TWO DIVISORS FOR DEDUPLICATION

open access: yesIraqi Journal for Computers and Informatics, 2023
The data deduplication technique efficiently reduces and removes redundant data in big data storage systems. The main issue is that the data deduplication requires expensive computational effort to remove duplicate data due to the vast size of big data ...
Hashem B. Jehlol, Loay E. George
doaj   +1 more source

A survey on DE – Duplication schemes in cloud servers for secured data analysis in various applications

open access: yesMeasurement: Sensors, 2022
Data deduplication in a system perspective is termed to be a single or multiple copy of an original data which could increase the computational complexity while accessing such a data.
K. Pragash, J. Jayabharathy
doaj   +1 more source

A Content Fingerprint-Based Cluster-Wide Inline Deduplication for Shared-Nothing Storage Systems

open access: yesIEEE Access, 2020
Deduplication has been principally employed in distributed storage systems to improve storage space efficiency. Traditional deduplication research ignores the design specifications of shared-nothing distributed storage systems such as no central metadata
Awais Khan   +2 more
doaj   +1 more source

Research on Data Routing Strategy of Deduplication in Cloud Environment

open access: yesIEEE Access, 2022
The application of data deduplication technology reduces the demand for data storage and improves resource utilization. Compared with limited storage capacity and computing capacity of a single node, cluster data deduplication technology has great ...
Qinlu He   +6 more
doaj   +1 more source

A Record Linkage-Based Data Deduplication Framework with DataCleaner Extension

open access: yesMultimodal Technologies and Interaction, 2022
The data management process is characterised by a set of tasks where data quality management (DQM) is one of the core components. Data quality, however, is a multidimensional concept, where the nature of the data quality issues is very diverse.
Otmane Azeroual   +5 more
doaj   +1 more source

Content Sharing Graphs for Deduplication-Enabled Storage Systems

open access: yesAlgorithms, 2012
Deduplication in storage systems has gained momentum recently for its capability in reducing data footprint. However, deduplication introduces challenges to storage management as storage objects (e.g., files) are no longer independent from each other due
Prasenjit Sarkar   +2 more
doaj   +1 more source

Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms

open access: yesEnergies, 2020
Deduplication of encrypted data is a significant function for both the privacy of stored data and efficient storage management. Several deduplication techniques have been designed to provide improved security or efficiency. In this study, we focus on the
Taek-Young Youn   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy