Explore chapters and articles related to this topic
Digital audio principles
Published in Francis Rumsey, Desktop Audio Technology, 2003
Since this book is concerned with digital audio for workstations the topic of error correction will only be touched upon briefly. Although dedicated audio recording formats need specially designed systems to protect against the effects of data errors, systems that use computer mass storage media do not. The reason for this is that mass storage media are formatted in such a way as to make them essentially error free. When, for example, a computer disk drive is formatted at a low level, the formatting application attempts to write data to each location and read it back. If the location proves to be damaged or gives erroneous replay it is noted as a ‘bad block’, after which it is never used for data storage. In addition, disk and tape drives look after their own error detection and correction by a number of means that are normally transparent to the digital audio system. If a data error is detected when reading data then the block of data is normally re-read a few times to see if the data can be retrieved. The only effect of this is to slow down transfer slightly.
Continuous Random Variables
Published in William M. Mendenhall, Terry L. Sincich, Statistics for Engineering and the Sciences, 2016
William M. Mendenhall, Terry L. Sincich
Breaking block ciphers. A block cipher is an encryption algorithm that transforms a fixed-length block of unencrypted text data (called plaintext) into a block of encrypted text data (called ciphertext) of the same length for security purposes. A group of Korean communications engineers have designed a new linear approximation method for breaking a block cipher (IEICE Transactions on Fundamentals, Jan. 2005). The researchers showed that the success rate Y of the new algorithm has a beta distribution with parameters α = n/2 and β = N/2n, where n is the number of linear approximations used and N is the number of plaintexts in the encrypted data.
Graphical Models
Published in William S. Levine, Control System Fundamentals, 2019
Dean K. Frederick, Charles M. Close, Norman S. Nise
A block diagram is an interconnection of symbols representing certain basic mathematical operations in such a way that the overall diagram obeys the system’s mathematical model. In the diagram, the lines interconnecting the blocks represent the variables describing the system behavior, such as the input and state variables. Inspecting a block diagram of a system may provide new insight into the system’s structure and behavior beyond that available from the differential equations themselves.
Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography
Published in IETE Journal of Research, 2021
“International Data Encryption Algorithm” (IDEA) is one of the most secure and widely acknowledged algorithms for a variety of application. IDEA is a software or hardware method which may be built according to demands. Two major features of the IDEA “International-Data-Encryption-Algorithm” [28] are significant. One is a symmetric cryptic technique that requires both encryption and decryption with the same key, while the other is the block cipher with 16 bits of encryption and decryption data. In IDEA, all input information can be provided internally in 16-bit blocks. IDEA encryption works with a 128-bit key on 64-bit input data and generates a 64-bit encoder output. IDEA's internal operation has 8 rounds of outcome manipulation. There are six 16-bit keys used for each round, where data management is based on these keys and four more key blocks for the final round. Totally (8*6) + 4 = 52 keys are needed in all rounds. These 52 keys blocks come from the 128-bit primary input key. First 8 key blocks from the 128-bit input key are generated and 25-bit left-circular shift allocate the 128-bit key blocks. The process continued until all the 52 blocks of keys are received. Due to its symmetrical properties, encrypted data are retrieved in decryption with the same encryption key.
Efficient high capacity technique to embed EPR information and to detect tampering in medical images
Published in Journal of Medical Engineering & Technology, 2020
Embedding of EPR information is done either after encrypting the data by means of any efficient encryption technique or as such by incorporating the checksum bits of each block. The embedding process is explained as follows:First step in embedding is to get the cover image ready from the input image which is explained in Section 3.1.Next step of generating the checksum bits for tamper detection is detailed in Section 3.2.Then, the cover image is divided into 2 × 2 nonoverlapping blocks for embedding the data stream.Next, the EPR information and the checksum bits are concatenated to form a single data bit stream (b) in a convenient way for embedding.In the 2 × 2 pixel block shown in Figure 4, one pixel is SP and two pixels are data embedding pixels (DEPs) and one pixel is checksum embedding pixel (CEP). Data bit stream (b) is formed in such a way that two EPR information bits are followed by a checksum bit.Embedding is done using intermediate significant bit (ISB) [45] substitution.Each nonoverlapping block carries a checksum bit which helps to find out whether the block is being tampered.
High-Performance 10-Transistor Adder Cell for Low-Power Applications
Published in IETE Journal of Research, 2022
Aishani Misra, Shilpi Birla, Neha Singh, Shashi Kant Dargar
Carry-select adder based on hierarchical Manchester carry chain has been presented in Ref. [16] and can be used for power delay-efficient devices. This has been further applied to implement 16-bit and 32-bit adders, respectively. Fourteen percent power reduction is seen in the adders because of clock usage, and the delay of the circuit has been reduced as well. Energy-efficient carry-select adder has been proposed in Ref. [17]. It is based on appropriately partitioned bit width of cascading bit-slice blocks. As a result, the adder shows less delay, power consumption, and PDP as compared to the rest of the adders.