SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 1, November-December 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD47918 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 912
Analysis of Decoding Plaintext Data:
Using Enhanced Hamming Code Techniques
Afolabi Godfrey PhD1
, Abba Almu PhD2
, Dogondaji. A. M. PhD3
1
Student, Mathematics Department, Usmanu Danfodiyo University, Sokoto, Nigeria
2
Senior Lecturer, Mathematics Department (Computer Unit), Usmanu Danfodiyo University, Sokoto, Nigeria
3
Senior Lecturer, Mathematics Department, Usmanu Danfodiyo University, Sokoto, Nigeria
ABSTRACT
In the last decades, data (information) security has become an issue
of great concern to data (information) analyst (users). To enhance the
efficiency and reliability of data (information), such data
(information) must be encoded before been used, send or saved for
future use as the case maybe. However, such encoded data
(information) need to be decoded before it’s efficiency and reliability
can be ascertained whenever in use. It is against this background
therefore that this study on the analysis of decoding plaintext data:
using enhanced hamming code techniques.
KEYWORDS: ASCII, Data code, Decode, Decoded Plaintext Letter
and Parity key code
How to cite this paper: Afolabi Godfrey
| Abba Almu | Dogondaji. A. M.
"Analysis of Decoding Plaintext Data:
Using Enhanced Hamming Code
Techniques" Published in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN:
2456-6470,
Volume-6 | Issue-1,
December 2021,
pp.912-914, URL:
www.ijtsrd.com/papers/ijtsrd47918.pdf
Copyright © 2021 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
In recent times, data (information) security has
become issue of great concern [1]. This necessitated
the need to encode data (information) to be used,
saved or sent as the case maybe [2]. Before the
efficiency and reliability of encoded data
(information) can be ascertained, it has to be decoded
[3]. It is on this basis therefore that this study on
analysis of decoding plaintext data: using enhanced
hamming code techniques was carried out. Decoding
involves the process and procedure of converting the
encoded data (information) back to it’s original form
[4]. This is basically for the receiver’s understanding,
effective and efficient use (application) of the data
(information) received [5]. The results from this study
shall in great measure contribute positively to the
general knowledge of coding theory.
2. DEFINITION OF ABBREVIATIONS AND
BASIC TERMS USED
Throughout this paper, the following abbreviations
and basic terms as used are defined accordingly as
follows:
A. ASCII: American Standard Code for Information
Interchange
B. DC (Data Code): Taking the hexadecimal
equivalence of the bit entries
C. DCM: Decimal
D. Decode: This involves the procedures and process
of getting back the original data (information)
from the encoded data (information).
E. DP: Data Position
F. DPTL: Decoded Plaintext Letter
G. Encode: This as the process which involves the
addition of parity (correction) bit to the
information being sent, stored or computed. This
is to enable the identification of error(s) when
they occur. Thus, encoding a bit sequence adds
redundant information to aid the intended receiver
in correcting symbol error(s). For example, to
encode the given data 10010011, a parity code
IJTSRD47918
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47918 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 913
1100, calculated would be imputed in positions 1,
2, 4 and 8 respectively. Thus, the encoded data
would be 111000100011 [6].
H. EPTL: Encoded Plaintext Letter
I. Parity: A binary digit called parity is used to
indicate whether the number of bits with ‘1’ in a
given set of bits is even or odd, usually used to
detect transmission or computation error. The
parity bit is then imputed in the original data and
does allow for the restoration of an erroneous bit
when its position is detected.
J. Parity Key: Taking the reverse of the parity
entries.
K. PKC (Parity Key Code): Taking the hexadecimal
equivalence of the parity key entries
L. PTL: Plaintext Letter
3. METHOD / PROCEDURE
The Method and procedures involved in enhanced
hamming code techniques to decode plaintext data as
used in this study are as follows:
Step i: Divide the encoded (received) data
(information) into two blocks B1 and B2; such that,
the parity key code is in B1 while the data code is in
B2.
Step ii: Take and place the binary (4-digits for PKL
and 8-digits for DC) equivalences of entries in B1;
DP 2n
; n = 0, 1, 2 and 3 (that is positions 1, 2, 4 and
8 respectively) and B2 ; DP 3, 5, 6, 7, ,9, 10, 11 and
12 respectively.
Step iii: Take the decimal equivalence of the data
code (DC), that is, entries in DP 3, 5, 6, 7, 9, 10, 11
and 12
Step iv: Take the ASCII character (alphabet / letter)
of the respective decimal equivalences of the data
code (DC).
Step v: Concatenate the ASCII character (alphabet /
letter) in each block to form the original plaintext sent
as encoded data (information), retrieved at the
receiver’s end.
4. PRESENTATION OF DECODING COMPUTATION AND RESULT OF THE ENCODED
PLAINTEXT,
“0D4B0D6E0E6F0977006C0A65096407670A65062006690C73062004500E6F09770A650F72”
The result of the computation of decoding the encoded plaintext
“0D4B0D6E0E6F0977006C0A65096407670A65062006690C73062004500E6F09770A650F72”, as an
example in this work is shown in TABLE 4.0.1 below:
Table 4.0.1 Results Obtained from Decoding Computation on encoded plaintext
“0D4B0D6E0E6F0977006C0A65096407670A65062006690C73062004500E6F09770A650F72”
EPTL PKC DC
DP
1
DP
2
DP
3
DP
4
DP
5
DP
6
DP
7
DP
8
DP
9
DP
10
DP
11
DP
12
ASCII
DCM
DPTL
0D4B 0D 4B 1 1 0 0 1 0 0 1 1 0 1 1 75 K
0D6E 0D 6E 1 1 0 0 1 1 0 1 1 1 1 0 11O n
0E6F 0E 6F 1 1 0 1 1 1 0 0 1 1 1 1 115 o
0977 09 77 1 0 0 0 1 1 1 1 0 1 1 1 119 w
006C 00 6C 0 0 0 0 1 1 0 0 1 1 0 0 108 l
0A65 0A 65 1 0 0 1 1 1 0 0 0 1 0 1 101 e
0964 09 64 1 0 0 0 1 1 0 1 0 1 0 0 100 d
0767 07 67 0 1 0 1 1 1 0 1 0 1 1 1 103 g
0A65 0A 65 1 0 0 1 1 1 0 0 0 1 0 1 101 e
0620 06 20 0 1 0 1 0 1 0 0 0 0 0 0 32
0669 06 69 0 1 0 1 1 1 0 0 1 0 0 1 105 i
0C73 0C 73 1 1 0 0 1 1 1 0 0 0 1 1 115 s
0620 06 20 0 1 0 1 0 1 0 0 0 0 0 0 32
0450 04 50 0 1 0 0 1 0 1 0 0 0 0 0 80 P
0E6F 0E 6F 1 1 0 1 1 1 0 0 1 1 1 1 111 o
0977 09 77 1 0 0 0 1 1 1 1 0 1 1 1 119 w
0A65 0A 65 1 0 0 1 1 1 0 0 0 1 0 1 101 e
0F72 0F 72 1 1 0 1 1 1 1 1 0 0 1 0 114 r
Source: Researcher’s Calculations
Therefore, the decoded (original) plaintext retrieved at the receiver’s end is “Knowledge is Power”.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47918 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 914
5. CONCLUSION
Since efficiency and reliability are the hallmark of
every data (information) analyst (user), therefore,
decoding the encoded data (information) is one very
important step in the right direction to achieving
these. Although the decoding procedure of enhanced
hamming code techniques was carried out on encoded
plaintext
“0D4B0D6E0E6F0977006C0A65096407670A65062
006690C73062004500E6F09770A650F72” in this
study, however, the results obtained is applicable to
plaintext data (information) in particular and coding
theory in general.
REFERENCES
[1] Shannon. C, “Communication Theory of
Secrecy Systems”, Bell Systems Technical
Journal, MD Computing, vol. 15,pp. 57 – 64,
1998.
[2] Afolabi. G, Garba. A. I, Muhammad. S. M and
Dogondaji. A. M, “Analysis of encoding
plaintext data: using enhanced hamming code
techniques”; International Journal of
Advanced Research and Innovative Ideas in
Education (IJARIIE). ISSN (O)-2395-4396.
Vol-7, Issue-5, 2021. www.ijariie.com
[3] Emm. W, “Impact of Multiencryption in Data
Security” International Journal of Computer
Theory and Engineering, vol. 1, pp. 567-571,
2009.
[4] Obaida. M and Al-Hazaaimeh. A, “A New
Approach For Computing, Encrypting and
Decrypting Data” International Journal of
Computer networks and Communications
(IJCNC)vol. 5, No 2, march 2013.
[5] Afolabi, G, Ibrahim, A. A & Zaid, I, The use of
Computational Method of Hamming Code
Techniques for the Detection and Correction of
Computational Errors in a Binary Coded Data:
Analysis on an Integer SequenceA119626;
International Journal of Computational
Engineering Research (IJCER). ISSN: 2250 –
3005. Volume 04, Issue 1 (January 2014) 6 –
15. www.ijcer.org.
[6] Ziegler, J. F, An M.Sc Thesis submitted to the
faculty of Information Technology and
Engineering of George Mason University.
Automatic Recognition and Classification of
Forward Error Correction Code. (Spring 2000,
George Masson University Fairfax, Virginia).
[7] Afolabi, G. & Ibrahim, A. A. The use of
Algorithmic Method of Hamming Code
Techniques for the Detection and Correction of
Computational Errors in a Binary Coded Data:
Analysis on an Integer SequenceA119626;
IOSR Journals of Mathematics (IOSR- JM) e –
ISSN: 2278, P – ISSN: 2319 – 7676. Volume 9,
Issue 2 (Nov. – Dec. 2013) pp 33 – 37.
www.iosrjournals.org.

More Related Content

Similar to Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques

Introduction to data mining which covers the basics
Introduction to data mining which covers the basicsIntroduction to data mining which covers the basics
Introduction to data mining which covers the basicsShivarkarSandip
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringIJECEIAES
 
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONPRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONcscpconf
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...WilliamY3
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
Iciic 2010 114
Iciic 2010 114Iciic 2010 114
Iciic 2010 114hanums1
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
A Novel Secret Sharing Technique Using QR Code
A Novel Secret Sharing Technique Using QR CodeA Novel Secret Sharing Technique Using QR Code
A Novel Secret Sharing Technique Using QR CodeCSCJournals
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 
IJSRED-V2I2P55
IJSRED-V2I2P55IJSRED-V2I2P55
IJSRED-V2I2P55IJSRED
 
IRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF ModuleIRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF ModuleIRJET Journal
 
Enhancing the Security for Clinical Document Architecture Generating System u...
Enhancing the Security for Clinical Document Architecture Generating System u...Enhancing the Security for Clinical Document Architecture Generating System u...
Enhancing the Security for Clinical Document Architecture Generating System u...IRJET Journal
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...inventionjournals
 
Survey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data MiningSurvey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data Miningijcsit
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 

Similar to Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques (20)

Introduction to data mining which covers the basics
Introduction to data mining which covers the basicsIntroduction to data mining which covers the basics
Introduction to data mining which covers the basics
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream Clustering
 
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATIONPRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Iciic 2010 114
Iciic 2010 114Iciic 2010 114
Iciic 2010 114
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
A Novel Secret Sharing Technique Using QR Code
A Novel Secret Sharing Technique Using QR CodeA Novel Secret Sharing Technique Using QR Code
A Novel Secret Sharing Technique Using QR Code
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
IJSRED-V2I2P55
IJSRED-V2I2P55IJSRED-V2I2P55
IJSRED-V2I2P55
 
IRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF ModuleIRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF Module
 
Enhancing the Security for Clinical Document Architecture Generating System u...
Enhancing the Security for Clinical Document Architecture Generating System u...Enhancing the Security for Clinical Document Architecture Generating System u...
Enhancing the Security for Clinical Document Architecture Generating System u...
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
 
Survey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data MiningSurvey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data Mining
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 1, November-December 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD47918 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 912 Analysis of Decoding Plaintext Data: Using Enhanced Hamming Code Techniques Afolabi Godfrey PhD1 , Abba Almu PhD2 , Dogondaji. A. M. PhD3 1 Student, Mathematics Department, Usmanu Danfodiyo University, Sokoto, Nigeria 2 Senior Lecturer, Mathematics Department (Computer Unit), Usmanu Danfodiyo University, Sokoto, Nigeria 3 Senior Lecturer, Mathematics Department, Usmanu Danfodiyo University, Sokoto, Nigeria ABSTRACT In the last decades, data (information) security has become an issue of great concern to data (information) analyst (users). To enhance the efficiency and reliability of data (information), such data (information) must be encoded before been used, send or saved for future use as the case maybe. However, such encoded data (information) need to be decoded before it’s efficiency and reliability can be ascertained whenever in use. It is against this background therefore that this study on the analysis of decoding plaintext data: using enhanced hamming code techniques. KEYWORDS: ASCII, Data code, Decode, Decoded Plaintext Letter and Parity key code How to cite this paper: Afolabi Godfrey | Abba Almu | Dogondaji. A. M. "Analysis of Decoding Plaintext Data: Using Enhanced Hamming Code Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1, December 2021, pp.912-914, URL: www.ijtsrd.com/papers/ijtsrd47918.pdf Copyright © 2021 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION In recent times, data (information) security has become issue of great concern [1]. This necessitated the need to encode data (information) to be used, saved or sent as the case maybe [2]. Before the efficiency and reliability of encoded data (information) can be ascertained, it has to be decoded [3]. It is on this basis therefore that this study on analysis of decoding plaintext data: using enhanced hamming code techniques was carried out. Decoding involves the process and procedure of converting the encoded data (information) back to it’s original form [4]. This is basically for the receiver’s understanding, effective and efficient use (application) of the data (information) received [5]. The results from this study shall in great measure contribute positively to the general knowledge of coding theory. 2. DEFINITION OF ABBREVIATIONS AND BASIC TERMS USED Throughout this paper, the following abbreviations and basic terms as used are defined accordingly as follows: A. ASCII: American Standard Code for Information Interchange B. DC (Data Code): Taking the hexadecimal equivalence of the bit entries C. DCM: Decimal D. Decode: This involves the procedures and process of getting back the original data (information) from the encoded data (information). E. DP: Data Position F. DPTL: Decoded Plaintext Letter G. Encode: This as the process which involves the addition of parity (correction) bit to the information being sent, stored or computed. This is to enable the identification of error(s) when they occur. Thus, encoding a bit sequence adds redundant information to aid the intended receiver in correcting symbol error(s). For example, to encode the given data 10010011, a parity code IJTSRD47918
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD47918 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 913 1100, calculated would be imputed in positions 1, 2, 4 and 8 respectively. Thus, the encoded data would be 111000100011 [6]. H. EPTL: Encoded Plaintext Letter I. Parity: A binary digit called parity is used to indicate whether the number of bits with ‘1’ in a given set of bits is even or odd, usually used to detect transmission or computation error. The parity bit is then imputed in the original data and does allow for the restoration of an erroneous bit when its position is detected. J. Parity Key: Taking the reverse of the parity entries. K. PKC (Parity Key Code): Taking the hexadecimal equivalence of the parity key entries L. PTL: Plaintext Letter 3. METHOD / PROCEDURE The Method and procedures involved in enhanced hamming code techniques to decode plaintext data as used in this study are as follows: Step i: Divide the encoded (received) data (information) into two blocks B1 and B2; such that, the parity key code is in B1 while the data code is in B2. Step ii: Take and place the binary (4-digits for PKL and 8-digits for DC) equivalences of entries in B1; DP 2n ; n = 0, 1, 2 and 3 (that is positions 1, 2, 4 and 8 respectively) and B2 ; DP 3, 5, 6, 7, ,9, 10, 11 and 12 respectively. Step iii: Take the decimal equivalence of the data code (DC), that is, entries in DP 3, 5, 6, 7, 9, 10, 11 and 12 Step iv: Take the ASCII character (alphabet / letter) of the respective decimal equivalences of the data code (DC). Step v: Concatenate the ASCII character (alphabet / letter) in each block to form the original plaintext sent as encoded data (information), retrieved at the receiver’s end. 4. PRESENTATION OF DECODING COMPUTATION AND RESULT OF THE ENCODED PLAINTEXT, “0D4B0D6E0E6F0977006C0A65096407670A65062006690C73062004500E6F09770A650F72” The result of the computation of decoding the encoded plaintext “0D4B0D6E0E6F0977006C0A65096407670A65062006690C73062004500E6F09770A650F72”, as an example in this work is shown in TABLE 4.0.1 below: Table 4.0.1 Results Obtained from Decoding Computation on encoded plaintext “0D4B0D6E0E6F0977006C0A65096407670A65062006690C73062004500E6F09770A650F72” EPTL PKC DC DP 1 DP 2 DP 3 DP 4 DP 5 DP 6 DP 7 DP 8 DP 9 DP 10 DP 11 DP 12 ASCII DCM DPTL 0D4B 0D 4B 1 1 0 0 1 0 0 1 1 0 1 1 75 K 0D6E 0D 6E 1 1 0 0 1 1 0 1 1 1 1 0 11O n 0E6F 0E 6F 1 1 0 1 1 1 0 0 1 1 1 1 115 o 0977 09 77 1 0 0 0 1 1 1 1 0 1 1 1 119 w 006C 00 6C 0 0 0 0 1 1 0 0 1 1 0 0 108 l 0A65 0A 65 1 0 0 1 1 1 0 0 0 1 0 1 101 e 0964 09 64 1 0 0 0 1 1 0 1 0 1 0 0 100 d 0767 07 67 0 1 0 1 1 1 0 1 0 1 1 1 103 g 0A65 0A 65 1 0 0 1 1 1 0 0 0 1 0 1 101 e 0620 06 20 0 1 0 1 0 1 0 0 0 0 0 0 32 0669 06 69 0 1 0 1 1 1 0 0 1 0 0 1 105 i 0C73 0C 73 1 1 0 0 1 1 1 0 0 0 1 1 115 s 0620 06 20 0 1 0 1 0 1 0 0 0 0 0 0 32 0450 04 50 0 1 0 0 1 0 1 0 0 0 0 0 80 P 0E6F 0E 6F 1 1 0 1 1 1 0 0 1 1 1 1 111 o 0977 09 77 1 0 0 0 1 1 1 1 0 1 1 1 119 w 0A65 0A 65 1 0 0 1 1 1 0 0 0 1 0 1 101 e 0F72 0F 72 1 1 0 1 1 1 1 1 0 0 1 0 114 r Source: Researcher’s Calculations Therefore, the decoded (original) plaintext retrieved at the receiver’s end is “Knowledge is Power”.
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD47918 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 914 5. CONCLUSION Since efficiency and reliability are the hallmark of every data (information) analyst (user), therefore, decoding the encoded data (information) is one very important step in the right direction to achieving these. Although the decoding procedure of enhanced hamming code techniques was carried out on encoded plaintext “0D4B0D6E0E6F0977006C0A65096407670A65062 006690C73062004500E6F09770A650F72” in this study, however, the results obtained is applicable to plaintext data (information) in particular and coding theory in general. REFERENCES [1] Shannon. C, “Communication Theory of Secrecy Systems”, Bell Systems Technical Journal, MD Computing, vol. 15,pp. 57 – 64, 1998. [2] Afolabi. G, Garba. A. I, Muhammad. S. M and Dogondaji. A. M, “Analysis of encoding plaintext data: using enhanced hamming code techniques”; International Journal of Advanced Research and Innovative Ideas in Education (IJARIIE). ISSN (O)-2395-4396. Vol-7, Issue-5, 2021. www.ijariie.com [3] Emm. W, “Impact of Multiencryption in Data Security” International Journal of Computer Theory and Engineering, vol. 1, pp. 567-571, 2009. [4] Obaida. M and Al-Hazaaimeh. A, “A New Approach For Computing, Encrypting and Decrypting Data” International Journal of Computer networks and Communications (IJCNC)vol. 5, No 2, march 2013. [5] Afolabi, G, Ibrahim, A. A & Zaid, I, The use of Computational Method of Hamming Code Techniques for the Detection and Correction of Computational Errors in a Binary Coded Data: Analysis on an Integer SequenceA119626; International Journal of Computational Engineering Research (IJCER). ISSN: 2250 – 3005. Volume 04, Issue 1 (January 2014) 6 – 15. www.ijcer.org. [6] Ziegler, J. F, An M.Sc Thesis submitted to the faculty of Information Technology and Engineering of George Mason University. Automatic Recognition and Classification of Forward Error Correction Code. (Spring 2000, George Masson University Fairfax, Virginia). [7] Afolabi, G. & Ibrahim, A. A. The use of Algorithmic Method of Hamming Code Techniques for the Detection and Correction of Computational Errors in a Binary Coded Data: Analysis on an Integer SequenceA119626; IOSR Journals of Mathematics (IOSR- JM) e – ISSN: 2278, P – ISSN: 2319 – 7676. Volume 9, Issue 2 (Nov. – Dec. 2013) pp 33 – 37. www.iosrjournals.org.