This document discusses error detection and correction codes. It introduces parity bits which add an extra bit to allow detection of errors in binary data transmission. Hamming codes are described as allowing for both error detection and correction by adding multiple parity bits in specific locations. Finally, the document notes that Hamming codes can be modified to enable single error correction and double error detection.
Manchester & Differential Manchester encoding schemeArunabha Saha
The two main variants of biphase encoding techniques are discussed here. Manchester and Differential Manchester encoding scheme are explained with examples. Comparison between several classes of polar encoding techniques are done along with the exposure about the advantages and disadvantages of both schemes.
This ppt contains information about concepts of wireless communication, signal propagation effects, spread spectrum, cellular systems, multiple access systems.
Data Communication & Computer Networks: Multi level, multi transition & block...Dr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. It covers Multi level, Multi transition and Block codes which are used in communication of data. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Manchester & Differential Manchester encoding schemeArunabha Saha
The two main variants of biphase encoding techniques are discussed here. Manchester and Differential Manchester encoding scheme are explained with examples. Comparison between several classes of polar encoding techniques are done along with the exposure about the advantages and disadvantages of both schemes.
This ppt contains information about concepts of wireless communication, signal propagation effects, spread spectrum, cellular systems, multiple access systems.
Data Communication & Computer Networks: Multi level, multi transition & block...Dr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. It covers Multi level, Multi transition and Block codes which are used in communication of data. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
In the world of technology is already integrated into the network must have a data transmission process. Sending and receiving data communications systems do not avoid mistakes. Packets of data sent from the server to the client computer always have an error in transmission. These shipments have leaks that occur due to changes in voltage, frequency or impact. One of the methods used to detect and correct errors in data transmission is the Hamming method. This method will check bit errors in delivery. Hamming is to do the process at fault detection, and then the error will be corrected so that the arrangement of the bits will go back to the bit sequence before the data is sent. With the application of this method, the data transmission process will avoid mistakes. Data will be saved to the destination.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Planning Of Procurement o different goods and services
Error detection & correction codes
1. ERROR DETECTION &
CORRECTION CODES
CONTENTS:
Introduction
Parity bit
Hamming code
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 1
2. ERROR DETECTION AND CORRECTION CODES
When the digital information in the binary form is
transmitted from one circuit or system to another
circuit or system an error may occur.
This means the signal corresponding to 0 may
change to 1 or vice-versa due to presence of noise
To maintain data integrity between transmitter
and receiver, extra bit or more than one bit are
added in the data.
These extra bits allow the detection and sometimes
the correction of error in the data.
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 2
3. • The data along with the extra bit /bits form the
code
• Codes which allow only error detection are called
error detecting codes and codes which allow error
detection and correction are called error
detecting and correcting codes
Parity bit
• A parity bit is used for the purpose of detecting
errors during transmission of binary information.
• A parity bit is an extra bit included with a binary
message to make the number of 1s either odd or
even.
Contd…
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 3
4. • The message including the parity bit is transmitted and
then checked at the receiving end for errors.
• An error is detected if the checked parity does not
correspond with the one transmitted.
• The circuit that generates the parity bit in the transmitter
is called a parity generator and the circuit that checks the
parity in the receiver is called a parity checker.
• In even parity the added parity bit will make the total
number of 1s an even amount. In odd parity the added
parity bit will make the total number of 1s an odd
amount.
• As a general rule in the digital system where the
transmission system is relatively short, it may be assumed
that probability of a single-bit error is small and that of a
double-bit error and higher order errors is extremely
small.
Contd….
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 4
5. The parity error detection system just described detects any odd
number of errors.
However, it cannot detect an even number of error because such
errors will not destroy the parity of the transmitted group of bits
Block parity:
When several binary words are transmitted or received in
succession, the resulting collection of bits can be regarded as a
block of data, having rows and columns.
Example: four eight bit words in succession form an 4x8 block.
Parity bits can then be assigned to both rows and columns.
This scheme is known as block parity
It makes it possible to correct any single error occurring in a
data word and to detect any two errors in a word.
Contd…
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 5
6. K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y
6
7. HAMMING CODE
Hamming code not only provides the detection of a bit
error, but also identifies which bit is in error so that it can
be corrected.
Thus hamming code is called error detecting and
correcting code.
The code uses a number of parity bits(dependent on the
number of information bits) located at certain position in a
group.
Number of parity bits:
The number of parity bits depends on the number of
information bits
If the number of bits is designated as x, then the number of
parity bits P is determined using the relation
2 𝑝
≥ 𝑥 + 𝑃 + 1
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 7
8. CONTD…
Location of the parity bits in a code:
• The parity bits are located in the positions that are
numbered corresponding to ascending powers of
two(1,2,4,8,….).
• Therefore, for 7-bit code, locations for parity bits and
information bits are as follows:
D4, D3,D2,P3, D1,P2,P1
Assigning values to parity bit:
• In hamming code , each parity bit provides a check on
certain other bits in the total code, therefore we must
know the value of these others in order to assign the
parity bit value.
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 8
9. Bit Designation D4 D3 D2 P3 D1 P2 P1
Bit Location 7 6 5 4 3 2 1
Binary Location
Number
111 110 101 100 011 010 001
Information Bits
Parity Bits
Bit Location Table:
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 9
10. CONTD…
Assignment of P1:
This parity bit checks all bit locations, including itself, that
have 1s in the same location in the binary location
numbers.
Assignment of P2:
This parity bit checks all bit locations, including itself, that
have 1s in the middle bit.
Assignment of P3:
This parity bit checks all bit locations, including itself, that
have 1s in the left-most bit.
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 10
11. SINGLE ERROR CORRECTION AND DOUBLE
ERROR DETECTION
With the light modification, it is possible to construct
hamming code for single error correction and double
error detection.
A one more parity bit is added in the hamming code to
ensure hamming code contains an even number of
ones.
The resulting hamming code enables single error
correction and double error detection.
When overall parity bit is correct, there is no single
error during the transmission of the code.
If overall parity bit is incorrect, then there is single
error and the bit position of the error can be indicated
by binary number formed after checking the parity
bits.
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 11
12. CONTD….
Hence, single error correction can be
achieved.
If overall parity bit is correct and binary
number formed after checking the parity bits
is other than 0-0-0, there are two errors.
In this case, double error detection is
achieved.
However, no correction is possible.
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 12
13. Conclusion:
The various types of error detecting and correcting methods are discussed
in brief manner.
References:
• Mandal, “Digital Electronics Principles & Application, McGraw Hill
Edu, 2013.
• William Keitz, Digital Electronics-A Practical Approach with VHDL,
Pearson, 2013.
• Thomas L.Floyd, ‘Digital Fundamentals’, 11th edition, Pearson
Education, 2015.
• Charles H.Roth, Jr, Lizy Lizy Kurian John, ‘Digital System Design
using VHDL, Cengage,2013.
• D.P.Kothari,J.S.Dhillon, ‘Digital circuits and Design’,Pearson
Education, 2016.
• A.P.Godse., Dr.D.A.Godse, ‘Digital Logic Circuits’ , Technical
Publications Third Edition 2016
• Other Web Sources
K O N G U N A D U C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y 13