In the world of technology is already integrated into the network must have a data transmission process. Sending and receiving data communications systems do not avoid mistakes. Packets of data sent from the server to the client computer always have an error in transmission. These shipments have leaks that occur due to changes in voltage, frequency or impact. One of the methods used to detect and correct errors in data transmission is the Hamming method. This method will check bit errors in delivery. Hamming is to do the process at fault detection, and then the error will be corrected so that the arrangement of the bits will go back to the bit sequence before the data is sent. With the application of this method, the data transmission process will avoid mistakes. Data will be saved to the destination.
In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed here.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed here.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
Download to View - Animated Examples
------------------------------------------------------------
Error detection uses the concept of redundancy, which means adding extra bits for detecting error at the destination.
Parity Check is one of the Error Correcting Codes.
Download to View - Animated Examples
------------------------------------------------------------
Error detection uses the concept of redundancy, which means adding extra bits for detecting error at the destination.
Parity Check is one of the Error Correcting Codes.
In sending data, a transmission will experience a damage or an error in the delivery process. Corrupted data will not be used for their intended purpose. Stop-and-Wait methods of Automatic Repeat Request is a method that is applied to correct errors in the process of sending the frame at the time of transmission. Data transmission is always done between the sending computer and the receiving computer. This method ensures that information is not lost due to packet drops and that the received packets in the correct order. This is the simplest type of method Automatic Repeat Request. Stop-and-Wait method will automatically fix corrupted data occurs in the transmission process. This method works by calculating the waiting time and timeout on both computers. If the data packets successfully sent and the recipient receives the data properly, then it will send an acknowledgment to the sender. It states that the transmission was not a failure or none of the bits sent change from 0 to 1 or vice verse. Timeout function is to record how long the computer wait if there is incongruity at the time of delivery. After a specified time limit runs out, either framed or acknowledgment will be sent again to correct the mistake.
This project is concerned with the
design of SoC for detecting and correcting the error which may occur in the memory unit due to
radiation in LEO (Lower Earth Orbit) and due to stuck-at faults in memory unit in space station.
The error free data is feed to the predestined processor using the serial communication protocol
(UART) and perform its function specified in the data input which is sent from the ground station.
Computer Science - Error Checking and Correction
This includes parity bit, majority voting and check digit which are all explained with their rules and more information.
To Download this click on the link below:-
http://www29.zippyshare.com/v/42478054/file.html
Number System
Decimal Number System
Binary Number System
Why Binary?
Octal Number System
Hexadecimal Number System
Relationship between Hexadecimal, Octal, Decimal, and Binary
Number Conversions
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
Linear block code (LBC) is an error detection and correction code that is widely used in
communication systems. In this paper a special type of LBC called Hamming code was implemented and
debugged using FPGA kit with integrated software environments ISE for simulation and tests the results of
the hardware system. The implemented system has the ability to correct single bit error and detect two bits
error. The data segments length was considered to give high reliability to the system and make an
aggregation between the speed of processing and the hardware ability to be implemented. An adaptive
length of input data has been consider, up to 248 bits of information can be handled using Spartan 3E500
with 43% as a maximum slices utilization. Input/output data buses in FPGA have been customized to meet
the requirements where 34% of input/output resources have been used as maximum ratio. The overall
hardware design can be considerable to give an optimum hardware size for the suitable information rate.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Survey on Error Control Coding TechniquesIJTET Journal
Abstract - Error Control Coding techniques used to ensure that the information received is correct and has not been corrupted, owing to the environmental defects and noises occurring during transmission or the data read operation from Memory. Environmental interference and physical effects defects in the communication medium can cause random bit errors during data transmission. While, data corruption means that the detection and correction of bytes by applying modern coding techniques. Error control coding divided into automatic repeat request (ARQ) and forward error correction (FEC).First of all, In ARQ, when the receiver detects an error in the receiver; it requests back the sender to retransmit the data. Second, FEC deals with system of adding redundant data in a message and also it can be recovered by a receiver even when a number of errors were introduce either during the process of data transmission, or on the storage. Therefore, error detection and correction of burst errors can be obtained by Reed-Solomon code. Moreover, the Low-Density Parity Check code furnishes outstanding performance that sparingly near to the Shannon limit.
Data Communication & Computer Networks:Digital Signal EncodingDr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. It covers Digital signal Encoding which are used in communication of data over transmission medium. it is useful for engineering students & also for the candidates who want to master data communication & computer networking.
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
Compression is an activity performed to reduce its size into smaller than earlier. Compression is created since lack of adequate storage capacity. Data compression is also needed to speed up data transmission activity between computer networks. Compression has the different rule between speed and density. Compressed compression will take longer than compression that relies on speed. Elias Delta is one of the lossless compression techniques that can compress the characters. This compression is created based on the frequency of the character of a character on a document to be compressed. It works based on bit deductions on seven or eight bits. The most common characters will have the least number of bits, while the fewest characters will have the longest number of bits. The formation of character sets serves to eliminate double characters in the calculation of the number of each character as well as for the compression table storage. It has a good level of comparison between before and after compression. The speed of compression and decompression process possessed by this method is outstanding and fast.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Overview on Edible Vaccine: Pros & Cons with Mechanism
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
1. International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
12
Single-Bit Parity Detection and Correction using
Hamming Code 7-Bit Model
Wirda Fitriani
Faculty of Computer Science
Universitas Pembangunan
Panca Budi
Jl. Jend. Gatot
Subroto Km. 4,5
Sei Sikambing,
20122, Medan,
Sumatera Utara, Indonesia
Andysah Putera
Faculty of Computer Science
Universitas Pembangunan
Panca Budi
Jl. Jend. Gatot Subroto
Km. 4,5 Sei Sikambing,
20122, Medan,
Sumatera Utara, Indonesia
Utama Siahaan
Faculty of Computer Science
Universitas Pembangunan
Panca Budi
Jl. Jend. Gatot Subroto Km.
4,5 Sei Sikambing,
20122, Medan, Sumatera
Utara,
Indonesia
ABSTRACT
In the world of technology is already integrated into the
network must have a data transmission process. Sending and
receiving data communications systems do not avoid mistakes.
Packets of data sent from the server to the client computer
always have an error in transmission. These shipments have
leaks that occur due to changes in voltage, frequency or
impact. One of the methods used to detect and correct errors
in data transmission is the Hamming method. This method
will check bit errors in delivery. Hamming is to do the process
at fault detection, and then the error will be corrected so that
the arrangement of the bits will go back to the bit sequence
before the data is sent. With the application of this method, the
data transmission process will avoid mistakes. Data will be
saved to the destination.
General Terms
Data Transmission
Keywords
Hamming Code, Error Detection
1. INTRODUCTION
Delivery of a message from someone that is confidential or
personal to others or the desired person is a way to change the
message to be sent into a code word so the secret message can
be read only by the sender and the person concerned. The
theory is used to change a secret message into a code word or
otherwise change the code word becomes the message is the
theory Encoding [1]. Encoding is the process of adding binary
numbers of n-m characters in each code to form a code word.
Decoding is the process of outlining a code word into a
message [7][8]. The examples of encoding and decoding
techniques are repetition and Hamming. In the encoding form
of repetition code, the code word obtained by repeating a
message that has been modified in the form k times as much
code. In Hamming encoding, the code word is obtained by
adding the binary numbers on every message that has been
modified as K characters [9][10]. Meanwhile, in the form of
repetition code decoding, the message is obtained by dividing
the total code word K parts. In decoding such as Hamming
code, the message was obtained by deleting the code word
before by K character. To determine the received message is
equal to sent it needs to be checked, and the error correcting
code word is received, i.e., the specific ways to obtain the
actual message.
2. THEORIES
2.1 Data Transmission
The data transmission is the process of sending data from one
data source to a data receiver using an electronic device. To
perform data transmission requires the medium, this medium
itself has several kinds such as buses, cables commonly found
on the computer, while the external computer in the
transmission of data can use external cables (Wired) and Wi-Fi
(Wireless).
Wired Cable
Wired cable is used to perform the data transmission process
directly; there are several kinds of which are as follows:
• Wired UTP or commonly known as Unshielded
Twisted Pair cable is used for transmitting over a
computer network such as in the office or cafe. In
addition to UTP, STP (Shielded Twisted Pair) in
which there are several wires in one bundle can also
be used to transmit data.
• Coaxial cable which consists of two kinds of
conductors separated by using an insulator.
• Fiber Optics is commonly called FO, where a cable
that can transmit information by passing data using
light waves.
Wireless
Wireless communication is having telecommunications using
electromagnetic waves instead of cable media. Nowadays
wireless technology has developed rapidly. It can be seen by
the increasing number of cellular phone use, besides
developing wireless technology is also used for integrated into
the same network. Wireless, also known as Media
Transmission Wireless is unguided, can only transmit data
without too much obstacles. The cast of data on the network is
typically done using a tool known as the antenna or
transceiver. Some of the wireless are:
• Radio
• Microwave
• Infra Red
• Bluetooth
• NFC
2. International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
13
Fig. 1 Transmission Process
Figure 1 shows the OSI model. It is a description for layered
communications and computer network protocol design. It
was developed as part of the Open Systems Interconnection
(OSI) initiative. In its most basic form, it divides network
architecture into seven layers which, from bottom to top, are
the Physical, Data-Link, Network, Transport, Session,
Presentation, Application Layers.
2.2 Hamming Code
Hamming code is an error correction system that uses parity
bits to correct the mistake [3][6]. Beside Hamming Code,
there are many other systems in a more efficient error
correction method to correct data error consists of many bits
[4][5]. Parity of method is to check the the codes that exist.
Linear error-correction code has various limitations error. On
Hamming Code, only one mistake can be repaired. For a two-
bit mistake, it can be only detected.
Hamming method is a frequently used error detection and
correction method. This method is quite simple. This method
uses XOR logic operation in the detection and correction of
errors. The tested data is a row of binary numbers of data
transmitted. Hamming code will check the error from the first
to the last bit, so the method is also called a linear error
correcting code. Hamming code method works by inserting
several pieces of check bits to data at a specific position. The
number of check bits inserted depending on data length.
𝑐𝑏 = 2 𝑛
− 𝑛 − 1 > 𝑝 (1)
Where:
cb : checkbit value
n : total checkbits
p : bit length
Table 1. Check Bit and Total Bit
Check-Bit Total Bit Position
1 0 1
2 1 2
3 4 4
4 11 8
5 26 16
6 57 32
7 120 64
8 247 128
Table 1 shows the limit of bit length. The total check-bits
obtained depends on the bit length. For example, if the bit
length is seven then the check-bit is 11. The following
illustration will describe how it works.
p = 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 21
− 1 − 1
= 0 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 22
− 2 − 1
= 1 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 23
− 3 − 1
= 4 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 24
− 4 − 1
= 11 > 7
The calculation run continuously until reach cb > p. For bit
length = 7, there will be four check-bits to check the bit data.
Table 2. Bit example
1 0 0 1 0 0 0
1 2 3 4 5 6 7
Table 3. Data and parity
x x 1 x 0 0 1 x 0 0 0
1 2 3 4 5 6 7 8 9 10 11
Table 2 shows the original data consists of seven bits only.
When it is transmitted, the Hamming code adds some extra
bits to mark the position. Since the bit length is seven bits, the
result will be 11 bits as shown in Table 3.
3. METHODOLOGY
Normally, a frame consists of m bits of data and r redundant,
or check bits. Take the total length of n (n = m + r). An n-bit
unit containing data and check-bit often attributed as the n bit
code word. In most data transmission applications, all 2m data
messages are legal data. However, as regards the method of
calculating the check bits, not all 2n used. If specified
algorithm to calculate the check bits, it will be possible to
make a complete list of the legal codewords. From this list can
be searched two codewords its minimum Hamming distance.
This distance is the Hamming distance of the complete code.
Assume two codewords: 10001001 and 10110001. This part
determine how many bits are related differently. In this case,
there are three different bits. To determine just do
EXCLUSIVE OR operation on the second codeword, and
count the number of 1 bits in operating results. Hamming
distance is the number of bit positions in which two
codewords differ. The thing to note is that when two separate
codewords with Hamming distance d, it will take a single bit
error d to convert from the one into the other. The properties
of error detection and error recovery of a code depend on its
Hamming distance. To detect d errors, it needs a code with d +
1 because of the code as it was unlikely that d single-bit errors
can change a valid codeword into another valid codeword.
3. International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
14
When the recipient sees an invalid codeword, there has been
an error in transmission. Likewise, to correct d errors, it needs
a code within 2d + 1 because it was declared legal codeword
can be separated even with d changes, the original codeword
will be closer than the other, then the error recovery can be
determined uniquely.
As a simple example for error detection code, download a
code in which a single parity bit is added to the data. The
parity bit is chosen so that the number of 1 bits in the
codeword becomes even (or odd). For example, if 10110101 is
delivered in even-numbered parity by adding a bit at the
edges, then the data was 101101011, while the even-numbered
10110001 parity becomes 101100010. A code with a single
parity bit has a distance of 2 because any single-bit error
produces a codeword with parity wrong.
The following steps are done to calculate the hamming code
as cited from Tim Downey from Florida International
University [2]. The key to the Hamming Code is the use of
extra parity bits to allow the identification of a single error.
Create the codeword as follows:
• Mark all bit positions that are powers of two as
parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.)
• All other bit positions are for the data to be encoded.
(positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17,
etc.)
• Each parity bit calculates the parity for some of the
bits in the code word. The position of the parity bit
determines the sequence of bits that it alternately
checks and skips.
• Position 1: check 1 bit, skip 1 bit, check 1 bit, skip 1
bit, etc. (1,3,5,7,9,11,13,15,...)
• Position 2: check 2 bits, skip 2 bits, check 2 bits,
skip 2 bits, etc. (2,3,6,7,10,11,14,15,...)
• Position 4: check 4 bits, skip 4 bits, check 4 bits,
skip 4 bits, etc. (4,5,6,7,12,13,14,15,20,21,22,23,...)
• Position 8: check 8 bits, skip 8 bits, check 8 bits,
skip 8 bits, etc. (8-15,24-31,40-47,...)
• Position 16: check 16 bits, skip 16 bits, check 16
bits, skip 16 bits, etc. (16-31,48-63,80-95,...)
• Position 32: check 32 bits, skip 32 bits, check 32
bits, skip 32 bits, etc. (32-63,96-127,160-191,...)
Set a parity bit to 1 if the total number of ones in the positions
it checks is odd. Set a parity bit to 0 if the total number of
ones in the positions it checks is even.
4. EVALUATION
4.1 Transmit
This section describes the calculation of the Hamming code.
Assume the data to transmit is the character of H. The bit
value of the character is 01001000. Since the Hamming code
uses 7 bits in this research, the bit value of H is 1001000. The
following calculation will explain how the character is
transmitted.
Character : H
Decimal : 72
Binary : 1001000
Bit 1 0 0 1 0 0 0
Position 1 2 3 4 5 6 7
The bit length is 7 represented by p.
p = 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 21
− 1 − 1
= 0 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 22
− 2 − 1
= 1 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 23
− 3 − 1
= 4 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 24
− 4 − 1
= 11 > 7
After the calculation, the total check-bits is 4 check-bits.
Parity x x 1 x 0 0 1 x 0 0 0
Position 1 2 3 4 5 6 7 8 9 10 11
There will be four check-bits must be inserted to the bit data.
The total length will be 11 bits (𝑏𝑖𝑡𝑑𝑎𝑡𝑎 + 𝑏𝑖𝑡𝑝𝑎𝑟𝑖𝑡𝑦). The
bits are still unknown. There is a technique to replace the x
with 0 or 1.
Table 4. Data extraction
Pos Binary Parity Data
11 1011 0
10 1010 0
9 1001 0
8 1000 x
7 0111 1
6 0110 0
5 0101 0
4 0100 x
3 0011 1
2 0010 x
1 0001 x
Table 4 shows the extraction from the previous parity data.
This step is to determine the value of x whether 0 or 1. The
method is to calculate how many “1” in each index of binary
data (Parity not included).
4. International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
15
Table 5. Parities value
Parity Value Amount
x1 0 there are 2 of 1
x2 0 there are 2 of 1
x3 1 There are 1 of 1
x4 0 There are 0 of 1
Table 5 show the value of every parity. There is rule to
determine the value.If the amount is even then the value is 0
and if the amount is odd then the value is 1.
Table 6. Data and parity
Position Insertion
1 x1 1 0 0 1 0 0 0
2 x1
x
2
1 0 0 1 0 0 0
4 x1
x
2
1
x
3
0 0 1 0 0 0
8 x1
x
2
1
x
3
0 0 1 x4 0 0 0
Result 0 0 1 1 0 0 1 0 0 0 0
Table 6 shows the final result of the data and parity formation.
There are 11 bits now after the parity addtion.
New Binary : 00110010000
4.2 Receive
This section tries to detect and fix the error from previous
binary string. The following calculation describes the full
explanation of the Hamming. Assume that the error is set to
the fifth bit.
Set Error : 00111010000 (the 5th
)
Bit Received : 1101000
Bit 1 1 0 1 0 0 0
Position 1 2 3 4 5 6 7
Table 7. Data extraction
Pos Binary Parity Data
11 1011 0
10 1010 0
9 1001 0
8 1000 x
7 0111 1
6 0110 0
5 0101 1
4 0100 x
3 0011 1
2 0010 x
1 0001 x
Table 7 shows the extraction from the previous parity data.
Table 8. Parities value
Parity Value Amount
x1 1 there are 3 of 1
x2 0 there are 2 of 1
x3 0 There are 1 of 1
x4 0 There are 0 of 1
Table 8 show the value of every parity. The value is different
from the first before the error. Until now, it is proved there
was a modification of the bit value. It means the data is not
retrieved perfectly.
Table 9. Error position
T. Parity R. Parity Error Pos
0 1 1
0 0 0
1 0 1
0 0 0
Error Position : 1010
Position Index : 5
The Hamming code detected the error in the fifth position as
determined previously. It is proved that the method works to a
significant condition.
5. CONCLUSION
By the test results and discussion programs that do, it can be
concluded that the method of Hamming code can detect bit
errors in the file received by the receiver file. The checking is
done by comparing the value of the check bits with the
original value of bits that exist in the file. Methods hamming
code can make corrections damage bits as a bit, or it is called
single bit error detection. It is the unfortunate method of
Hamming code can not detect if there is more than one-bit
error. Error detected just as much as the pieces only error even
though possessed more than one.
6. FUTURE SCOPE
The next research is needed to expand the single error parity
checking to the multi-error parity checking. The Hamming
code is limited to one error only. If multi-error or burst error
happens, Hamming can only detect the single error. By
composing the block system, it lets the computer program
perform the multi-error checking.
7. REFERENCES
[1] R. S. Geiger and A. Lampinen, "Old Against New, or a
Coming of Age? Broadcasting in an Era of Electronic
Media," Journal of Broadcasting & Electronic Media,
vol. 58, no. 3, pp. 333-341, 2014.
[2] T. Downey, "Calculating the Hamming Code," Florida
International University, 25 2 2016. [Online]. Available:
http://users.cis.fiu.edu/~downeyt/cop3402/hamming.html
. [Accessed 1 10 2016].
[3] K. P. Debalina Roy Choudhury, "Design of Hamming
Code Encoding and Decoding Circuit Using
Transmission Gate Logic," International Research
Journal of Engineering and Technology, vol. 2, no. 7, pp.
1165-1169, 2015.
5. International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
16
[4] E. S. Abuelyaman and A.-A. S. Al-Sehibani,
"Optimization of the Hamming Code for Error Prone
Media," International Journal of Computer Science and
Network Security, vol. 8, no. 3, pp. 278-285, 2008.
[5] R. W. Hamming, "Error Detection and Error Correction
Codes," Bell Systems Tech. Journal, vol. 29, no. 1, pp.
147-160, 1950.
[6] Z. Ramadhan and A. P. U. Siahaan, "Stop-and-Wait ARQ
Technique for Repairing Frame and Acknowledgment
Transmission," International Journal of Engineering
Trends and Technology, vol. 38, no. 7, pp. 384-387, 2016.
[7] N. Shep and P. Bhagat, "Implementation of Hamming
code using VLSI," International Journal of Engineering
Trends and Technology, vol. 4, no. 2, pp. 186-190, 2013.
[8] D. R. Choudhury and K. Podder, "Design of Hamming
Code Encoding and Decoding Circuit Using
Transmission Gate Logic," International Research
Journal of Engineering and Technology, vol. 2, no. 7, pp.
1165-1169, 2015.
[9] H. Saleh, "Design of Hamming Encoder and Decoder
Circuits For (64, 7) Code and (128, 8) Code Using
VHDL," Journal of Scientific and Engineering Research,
vol. 2, no. 1, pp. 1-15, 2015.
[10] S. Cha and H. Yoon, "Efficient Implementation of Single
Error Correction and Double Error Detection Code with
Check Bit Precomputation for Memories," Journal of
Semiconductor Technology and Science, vol. 12, no. 4,
pp. 418-425, 2012.
8. AUTHOR PROFILE
Wirda Fitriani was born in Medan, Indonesia, in 1979. She
received the S.Kom. degree in computer science from
Universitas Pembangunan Panca Budi, Medan, Indonesia, in
2005, She joined the Department of Engineering, Universitas
Pembangunan Panca Budi, as a Lecturer in 2008, and in 2014,
she entered the post-graduate university, AMIKOM,
Yogyakarta. She is now studying for her master degree. She
has become a writer in several conferences. She is still
working as a System Support at PT. Buana Varia Komputama,
Medan.
Andysah Putera Utama Siahaan was born in Medan,
Indonesia, in 1980. He received the S.Kom. degree in
computer science from Universitas Pembangunan Panca Budi,
Medan, Indonesia, in 2010, and the M.Kom. in computer
science as well from the University of Sumatera Utara,
Medan, Indonesia, in 2012. In 2010, he joined the Department
of Engineering, Universitas Pembangunan Panca Budi, as a
Lecturer, and in 2012 became a researcher. He is applying for
his Ph.D. degree in 2016. He has written several international
journals. He is now active in writing papers and joining
conferences.
IJCATM : www.ijcaonline.org