scholarly journals Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model

Author(s):  
Andysah Putera Utama Siahaan

In the world of technology is already integrated into the network must have a data transmission process. Sending and receiving data communications systems do not avoid mistakes. Packets of data sent from the server to the client computer always have an error in transmission. These shipments have leaks that occur due to changes in voltage, frequency or impact. One of the methods used to detect and correct errors in data transmission is the Hamming method. This method will check bit errors in delivery. Hamming is to do the process at fault detection, and then the error will be corrected so that the arrangement of the bits will go back to the bit sequence before the data is sent. With the application of this method, the data transmission process will avoid mistakes. Data will be saved to the destination.

2018 ◽  
Vol 7 (3.2) ◽  
pp. 783
Author(s):  
Ida Bagus Ary Indra Iswara ◽  
I Ketut Sudarsana ◽  
Nurlaidy Joice Simamora ◽  
Vivi Novalia Sitinjak ◽  
Nurhayati Purba ◽  
...  

The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly  


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Robbi Rahim

The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.


2021 ◽  
Vol 1791 (1) ◽  
pp. 012054
Author(s):  
A A Lyubchenko ◽  
E Y Kopytov ◽  
A G Malyutin ◽  
A A Bogdanov

Entropy ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. 1250
Author(s):  
Shlomo Shamai (Shitz) ◽  
Abdellatif Zaidi

This book, composed of the collection of papers that have appeared in the Special Issue of theEntropy journal dedicated to “Information Theory for Data Communications and Processing”,reflects, in its eleven chapters, novel contributions based on the firm basic grounds of informationtheory. The book chapters [1–11] address timely theoretical and practical aspects that carry bothinteresting and relevant theoretical contributions, as well as direct implications for modern currentand future communications systems. [...]


2019 ◽  
Vol 11 (21) ◽  
pp. 6171 ◽  
Author(s):  
Jangsik Bae ◽  
Meonghun Lee ◽  
Changsun Shin

With the expansion of smart agriculture, wireless sensor networks are being increasingly applied. These networks collect environmental information, such as temperature, humidity, and CO2 rates. However, if a faulty sensor node operates continuously in the network, unnecessary data transmission adversely impacts the network. Accordingly, a data-based fault-detection algorithm was implemented in this study to analyze data of sensor nodes and determine faults, to prevent the corresponding nodes from transmitting data; thus, minimizing damage to the network. A cloud-based “farm as a service” optimized for smart farms was implemented as an example, and resource management of sensors and actuators was provided using the oneM2M common platform. The effectiveness of the proposed fault-detection model was verified on an integrated management platform based on the Internet of Things by collecting and analyzing data. The results confirm that when a faulty sensor node is not separated from the network, unnecessary data transmission of other sensor nodes occurs due to continuous abnormal data transmission; thus, increasing energy consumption and reducing the network lifetime.


2016 ◽  
Vol 37 (1) ◽  
pp. 231-252
Author(s):  
Marcin Bednarek ◽  
Tadeusz Dąbrowski ◽  
Tomasz Wawer

Abstract Communication between the process stations of the distributed control system is carried out. By the supervision and therapeutic systems of the stations communication process diagnosis is performed. Supervision and therapeutic systems are responsible for the security of transmitted data. The security is considered in this article mainly in the aspect of resistance to external destructive factors on the data transmission process. It is assumed that the transmission security can be provided by mechanisms protecting the integrity of the transmitted data. Correctness of the data is controlled by using one-way hash function calculated on the basis of the transmitted value variable and also is attached to the transmitted data. This allows to maintain the integrity of the transmitted process data. A solutions using one-way hash function to protection of the transmission before changing message contents (caused by eg. intruder interference) are proposed in the article.


T-Comm ◽  
2020 ◽  
Vol 14 (6) ◽  
pp. 4-12
Author(s):  
А.А. Lyubchenko ◽  
◽  
E.Yu. Kopytov ◽  
A.A. Bogdanov ◽  
◽  
...  

Author(s):  
F. E. Potestad-Ordonez ◽  
E. Tena-Sanchez ◽  
R. Chaves ◽  
M. Valencia-Barrero ◽  
A. J. Acosta-Jimenez ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document