Cihan University-Erbil Conferences, 3rd International Conference on Communication Engineering and Computer Science (CIC-COCOS’19)

Font Size: 
A New Scheme for Removing Duplicate Files from Smart Mobile Devices: Images as a case study
Ammar Asaad Mohammed, Ali A. Yassin

Last modified: 2019-04-21

References


[1]     C.-R. Shyu, C. Brodley, A. Kak, A. Kosaka, A. Aisen, and L. Broderick, "Local versus global features for content-based image retrieval," in Proceedings. IEEE Workshop on Content-Based Access of Image and Video Libraries (Cat. No. 98EX173), 1998, pp. 30-34.

[2]     D. A. Lisin, M. A. Mattar, M. B. Blaschko, E. G. Learned-Miller, and M. C. Benfield, "Combining local and global image features for object class recognition," in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05)-Workshops, 2005, pp. 47-47.

[3]     N. Lee, C. Kim, W. Choi, M. Pyeon, and Y. Kim, "Development of indoor localization system using a mobile data acquisition platform and BoW image matching," KSCE Journal of Civil Engineering, vol. 21, pp. 418-430, 2017.

[4]     S. S. Hwang and S. H. Hong, "Pre-extraction of Features and Environment Variable-based Database Filtering for Fast Image Matching on Mobile," in Mobile and Wireless Technologies 2016, ed: Springer, 2016, pp. 223-230.

[5]     J. Machajdik and A. Hanbury, "Affective image classification using features inspired by psychology and art theory," in Proceedings of the 18th ACM international conference on Multimedia, 2010, pp. 83-92.

[6]     L. Wang and H. Wang, "Improving feature matching strategies for efficient image retrieval," Signal Processing: Image Communication, vol. 53, pp. 86-94, 2017.

[7]     M. Agarwal, A. Singhal, and B. Lall, "3D local ternary co-occurrence patterns for natural, texture, face and bio medical image retrieval," Neurocomputing, vol. 313, pp. 333-345, 2018.

[8]     R. Li, Y. Zhao, Q. Xu, and X. Qi, "Research of Subnetting Based on Huffman Coding," in International Conference on Cloud Computing and Security, 2018, pp. 606-616.

[9]     R. Patel, V. Kumar, V. Tyagi, and V. Asthana, "A fast and improved image compression technique using Huffman coding," in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 2283-2286.

[10]  I.-C. Lin and L.-C. Yang, "A Noise Generation Scheme Based on Huffman Coding for Preserving Privacy," in International Conference on Security with Intelligent Computing and Big-data Services, 2017, pp. 149-160.

[11]  M. Sharma, "Compression using Huffman coding," IJCSNS International Journal of Computer Science and Network Security, vol. 10, pp. 133-141, 2010.

[12]  O. Yue-Long, L.-n. ZHANG, and N. Yu, "Researching on MD5's characteristics based on software reversing," The Journal of China Universities of Posts and Telecommunications, vol. 17, pp. 127-130, 2010.

[13]   Ye Tian, Kun Zhang, Pu Wang, Yuming Zhang and Jun Yang , Add "Salt" MD5 Algorithm's FPGA Implementation, 8th International Congress of Information and Communication Technology (ICICT-2018), Procedia Computer Science 131 (2018) 255–260.

[14]  D. Pamula and A. Ziebinski, Hardware implementation of the MD5 algorithm, 9th IFAC Workshop on Programmable Devices and Embedded Systems, Roznov pod Radhostem, Czech Republic, February 10-12, 2009.

[15]  K. Miller, F. Franz, M. Rittinghaus, M. Hillenbrand, and F. Bellosa, "{XLH}: More Effective Memory Deduplication Scanners Through Cross-layer Hints," in Presented as part of the 2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13), 2013, pp. 279-290.

[16]  S.-h. Kim, J. Jeong, and J. Lee, "Selective memory deduplication for cost efficiency in mobile smart devices," IEEE Transactions on Consumer Electronics, vol. 60, pp. 276-284, 2014.

[17]  T. Liu, F. Chen, Y. Ma, and Y. Xie, "An energy-efficient task scheduling for mobile devices based on cloud assistant," Future Generation Computer Systems, vol. 61, pp. 1-12, 2016.

[18]  E. Ahmed, A. Gani, M. Sookhak, S. H. Ab Hamid, and F. Xia, "Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges," Journal of Network and Computer Applications, vol. 52, pp. 52-68, 2015.

[19]  R. N. Widodo, H. Lim, and M. Atiquzzaman, "SDM: Smart deduplication for mobile cloud storage," Future Generation Computer Systems, vol. 70, pp. 64-73, 2017.

[20]  M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller, "Secure data deduplication," in Proceedings of the 4th ACM international workshop on Storage security and survivability, 2008, pp. 1-10.

[21]  N. Haustein, C. A. Klein, U. Troppens, and D. J. Winarski, "Method of and system for adaptive selection of a deduplication chunking technique," ed: Google Patents, 2009.

[22]  B. Zhu, K. Li, and R. H. Patterson, "Avoiding the Disk Bottleneck in the Data Domain Deduplication File System," in Fast, 2008, pp. 1-14.

[23]  D. Meister and A. Brinkmann, "Multi-level comparison of data deduplication in a backup scenario," in Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, 2009, p. 8.

[24]  Y. Won, R. Kim, J. Ban, J. Hur, S. Oh, and J. Lee, "Prun: eliminating information redundancy for large scale data backup system," in 2008 International Conference on Computational Sciences and Its Applications, 2008, pp. 139-144.