scholarly journals A DNA-based parity generator/checker for error detection through data transmission with visual readout and an output-correction function

2017 ◽  
Vol 8 (3) ◽  
pp. 1888-1895 ◽  
Author(s):  
Daoqing Fan ◽  
Erkang Wang ◽  
Shaojun Dong

The first DNA-based molecular parity generator/checker, used for error detection through data transmission with fluorescent and visual readouts, has been constructed. The erroneous transmission can be readily distinguished by the naked eye using the G-quadruplex DNAzyme as a signal reporter of the visual outputs.

2018 ◽  
Vol 9 (34) ◽  
pp. 6981-6987 ◽  
Author(s):  
Daoqing Fan ◽  
Yongchao Fan ◽  
Erkang Wang ◽  
Shaojun Dong

The first electrochemical DNA parity generator/checker system for error detection during data transmission was constructed based on “aptamer-nanoclaw”-modulated protein steric hindrance.


2013 ◽  
Vol 135 (28) ◽  
pp. 10230-10233 ◽  
Author(s):  
Magnus Bälter ◽  
Shiming Li ◽  
Jesper R. Nilsson ◽  
Joakim Andréasson ◽  
Uwe Pischel

Author(s):  
Narendra Babu T ◽  
Fazal Noorbasha ◽  
Leenendra Chowdary Gunnam

In this article, an encryption algorithm with an error detection technique is presented for highly secured reliable data transmission over unreliable communication channels. In this algorithm, an input data is mapped into orthogonal code first. After that the code is encrypted with the help of Linear Feedback Shift Register (LFSR). The technique has been successfully verified and synthesized using Xilinx by Spartan-3E FPGA. The results show that the error detection rate has been increased to 100% by proposed encryption scheme is effective and improves bandwidth efficiency.


Author(s):  
Andrii Mikhailovich Grekhov

This chapter is devoted to the modeling of aircraft data transmission via low-orbit satellites. Satellite communication channel models were designed, which allow to investigate BER dependencies on the type of signal modulation, information transfer rate, signal power, antenna diameters, and nonlinearity of a high power amplifier. Impact of a modulation type (BPSK, QPSK, 8PSK, 16QAM), Eb / N0, satellite transponder amplifier gain without and with coding on a BER was investigated. Effectiveness of error detection and correction was analyzed using classic linear block and convolutional codes. Free space path loss, AWGN, and radio frequency satellite channels were considered. MIMO 2 × 1 and 3 × 2 fading uplink/downlink channels with antenna diversity were analyzed. Results were compared with AWGN uplink/downlink channels. On the base of these models, channels integrity was investigated.


Author(s):  
Narendra Babu T ◽  
Fazal Noorbasha ◽  
Leenendra Chowdary Gunnam

In this article, an encryption algorithm with an error detection technique is presented for highly secured reliable data transmission over unreliable communication channels. In this algorithm, an input data is mapped into orthogonal code first. After that the code is encrypted with the help of Linear Feedback Shift Register (LFSR). The technique has been successfully verified and synthesized using Xilinx by Spartan-3E FPGA. The results show that the error detection rate has been increased to 100% by proposed encryption scheme is effective and improves bandwidth efficiency.


2018 ◽  
Vol 12 (3) ◽  
pp. 16-26 ◽  
Author(s):  
Bouchra Echandouri ◽  
Fouzia Omary ◽  
Fatima Ezzahra Ziani ◽  
Anas Sadak

This article describes how the simplicity of data transmission made eavesdropping by malicious people easier. This became one the flaws of computer security that needs to be handled. In order to establish a secure data communication, many data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was to fulfill authentication with a message authentication code (MAC) that was defined by the National Institute of Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than error detection codes or checksums. In this article, the authors propose a new cipher-based message authentication code (CMAC) algorithm. Their proposed algorithm, termed SEC-CMAC, is based on a previously developed symmetric evolutionist ciphering algorithm named symmetrical evolutionist ciphering (SEC). Compared to the well-known previously developed MAC, their suggested algorithm proved to be robust and fulfill some security requirement by resisting an exhaustive key search and mac forgery attacks.


2016 ◽  
Vol 57 (46) ◽  
pp. 5042-5046 ◽  
Author(s):  
Ming-Qi Wang ◽  
Lie-Xiong Gao ◽  
Yi-Fan Yang ◽  
Xian-Ning Xiong ◽  
Zhao-Yi Zheng ◽  
...  

2012 ◽  
Vol 51 (23) ◽  
pp. 12591-12593 ◽  
Author(s):  
Jun-Liang Yao ◽  
Xing Gao ◽  
Wenliang Sun ◽  
Xue-Zhong Fan ◽  
Shuo Shi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document