Design and implementation of transmission of 128- bit digital data generated from a data generation unit from one base station to another base station with its reception at the receiver end using “Hamming (224,128) Code technique” written in VHDL code
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 7
Abstract
The proposed paper mainly deals with the generation of the 128-bit digital data using a data generation unit with it transmission and reception over space. The data generation unit consists of control unit, data path unit, memory unit and backup unit. The desired 128-bit data is encrypted before transmission using Hamming (224,128) code technique to produce 224-bit encrypted data. The encrypted data is received at the receiver end and passed through the error detection unit and the error is corrected if it is present in the data. Then, the corrected 224-bit encrypted data is decrypted using reverse Hamming (128,224) code technique. The main advantage of using Hamming code technique is that it provides both error detection and correction in the encrypted data. The proposed work can best be implemented in providing high security to the digital data. This can be used in the banking sector, military sector, telecommunication sector. The proposed work is done by using VHDL language. The code is tested and simulated using Xilinx ISE9.2i software.
Authors and Affiliations
Paresh Kumar Pasayat, Sonam Barik
slugCyber Security in India’sTourism
The growing use of ICT for administration of all the spheres of our daily life cannot be ignored. Also, we also cannot ignore the need to secure the ICT infrastructures used for meeting social function like Tourism. To...
Language-Independent ORB (Oriented Fast & Rotated Brief) Algorithm for Handwritten Documents
Handwritten character recognition is a demanding task in the image processing because handwriting varies from person to person. And also handwriting styles, sizes and its orientation make it complex. Applications like,...
Transient thermal analysis of modified emergency container
Conventional emergency containers used in steel industry are of less capacity and they had to line with refractory lining which is not economical and time killing process and even the material used for the container is...
Data Mining of Web Access Logs Using Classification Techniques
This paper focus on classification, technological advancement, business have gone online. Because of the growing popularity of the World Wide Web. Many website typically experience Lac of visitors every day. Data mining...
Multivariate Correlation Analysis for Detection of Denial-Of-Service Attack
In networking systems, many Web servers, Database servers, Cloud computing servers and so on, are now under threats from network attackers. One of most common types of attack is denial-of-service (DoS) attacks which cau...