f Design a Merging Technique Circuit to Error Detection and Correction Based on Hamming Code and Checksum Using VHDL
FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Design a Merging Technique Circuit to Error Detection and Correction Based on Hamming Code and Checksum Using VHDL

Author(s): Mohammed Sami Mohammed, Hanan Badeea Ahmed, Yasir Ghazi Rashid, and Adham Hadi Saleh*

Publisher : FOREX Publication

Published : 30 December 2024

e-ISSN : 2347-470X

Page(s) : 1449-1460




Mohammed Sami Mohammed, Department of Computer, University of Diyala, 32001 Diyala, Iraq

Hanan Badeea Ahmed, Department of Electronic Engineering, University of Diyala, 32001 Diyala, Iraq

Yasir Ghazi Rashid, Department of Electrical Power and Machines, University of Diyala, 32001 Diyala, Iraq

Adham Hadi Saleh*, Department of Electronic Engineering, University of Diyala, 32001 Diyala, Iraq; Email: adham.hadi@yahoo.com

    [1] M. M. Ali, S. J. Hashim, M. A. Chaudhary, G. Ferré, F. Z. Rokhani, and Z. Ahmad, “A Reviewing Approach to Analyze the Advancements of Error Detection and Correction Codes in Channel Coding with Emphasis on LPWAN and IoT Systems,” IEEE Access, vol. 11, pp. 127077–127097, 2023, doi: 10.1109/ACCESS.2023.3331417.
    [2] M. S. O. Anil Dixit, “Design and implementation of hybrid GALOIS filed encoder & decoder,” J. Comput. Technol., vol. 10, no. 3, pp. 1–6, 2022.
    [3] G. Patil and D. Patle, “Design and implementation of an enhanced - using Viterbi Decoder,” IOP Conf. Ser. Mater. Sci. Eng., vol. 12, no. 06, pp. 1–6, 2023, doi: 10.1088/1757-899X/331/1/012009.
    [4] N. K R, M. K.S, and S. C M, “Fpga Implementation of Object Detection in Background Modeling Using Gaussian Mixture Model,” Int. J. Trendy Res. Eng. Technol., vol. 06, no. 02, pp. 35–43, 2022, doi: 10.54473/ijtret.2022.6207.
    [5] A. P. Dewanty and B. A. Wardijono, “Analysis and Design of CRC-32 IEEE 802.3 Generator for 8 Bit Data Using VHDL,” Kilat, vol. 11, no. 1, pp. 78–87, 2022, doi: 10.33322/kilat.v11i1.1536.
    [6] A. EL Makhloufi, S. EL Adib, and N. Raissouni, “Highly Efficient Security Level Implementation in Radiation-Tolerance FPGA Using a Combination of AES Algorithm and Hamming Code: LST-SW Case,” Int. J. Electr. Electron. Eng. Telecommun., vol. 12, no. 4, pp. 223–234, 2023, doi: 10.18178/ijeetc.12.4.223-234.
    [7] S. Singh, J. V. R. Ravindra, and B. R. Naik, “Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip,” Int. J. Mod. Educ. Comput. Sci., vol. 14, no. 4, pp. 75–88, 2022, doi: 10.5815/ijcnis.2022.04.06.
    [8] A. Devrari and A. Kumar, “Turbo encoder and decoder chip design and FPGA device analysis for communication system,” Int. J. Reconfigurable Embed. Syst., vol. 12, no. 2, pp. 174–185, 2023, doi: 10.11591/ijres.v12.i2.pp174-185.
    [9] S. G. Priyadharshini, C. Subramani, and J. Preetha Roselyn, “An IOT based smart metering development for energy management system,” Int. J. Electr. Comput. Eng., vol. 9, no. 4, pp. 3041–3050, 2019, doi: 10.11591/ijece.v9i4.pp3041-3050.
    [10] Y. Tao, “Research and Application of Several Error Correction Codes in Communication,” Highlights Sci. Eng. Technol., vol. 53, pp. 49–55, 2023, doi: 10.54097/hset.v53i.9681.
    [11] P. Belegehalli Siddaiah, M. Puttaswamy, and N. Kamat, “Compact and Energy Efficient QCA Based Hamming Encoder for Error Detection and Correction,” Adv. Electr. Electron. Eng., vol. 21, no. 2, pp. 120–126, 2023, doi: 10.15598/aeee.v21i2.4794.
    [12] P. Megha, B. S. Premananda, and N. Kamat, “Area and energy optimized Hamming encoder and decoder for nano-communication,” vol. 75, no. 3, pp. 229–236, 2024.
    [13] D. D. T. Tran Do Hon Nhien, Vo Tan Thanh, Nguyen Thanh Khoa, Nguyen Quoc Thang, Nguyen Van Thanh Loc, Huynh Hoang Ha, Nguyen Ngo Lam, “Application of Hamming Code for Error Control in Memory,” J. Tech. Educ. Sci., no. 71B, pp. 19–28, 2022, doi: 10.54644/jte.71b.2022.1141.
    [14] M. Sais, N. Rafalia, and J. Abouchabaka, “DNA technology for big data storage and error detection solutions: Hamming code vs Cyclic Redundancy Check (CRC),” E3S Web Conf., vol. 412, 2023, doi: 10.1051/e3sconf/202341201090.
    [15] S. Mitsenko, S. Naumenko, I. Rozlomii, and A. Yarmilko, “Information Protection and Recovery Hamming Codes Based’ Hash Technique,” CEUR Workshop Proc., vol. 3513, pp. 64–77, 2023.
    [16] R. Alom, N. Shakib, and M. A. Rahaman, “Enhanced Hamming Codes.: Reducing Redundant Bit for Efficient Error and Correction,” in 2023 5th International Conference on Sustainable Technologies for Industry 5.0 (STI), 2024, no. December 2023, pp. 1–7.
    [17] X. Wei et al., “ReIPE: Recycling Idle PEs in CNN Accelerator for Vulnerable Filters Soft-Error Detection,” ACM Trans. Archit. Code Optim., 2024, doi: 10.1145/3674909.
    [18] T. Manivannan, Y. Basheerbaba, B. A. Kumar, and D. N. Siva, “Advanced VLSI Technique for Error Detection and Correction in Space Systems,” vol. 5, no. 2, pp. 7–18, 2024.
    [19] M. P. Kiogora, Loyford Njagi, and Josephine Mutembei, “Errors, error detection and correction efficiency in the container number code,” African J. Sci. Technol. Soc. Sci., vol. 2, no. 2, pp. 93–103, 2024, doi: 10.58506/ajstss.v2i2.166.
    [20] A. H. Saleh and M. S. Mohammed, “Enhancing Data Security through Hybrid Error Detection: Combining Cyclic Redundancy Check (CRC ) and Checksum Techniques,” no. August, 2024, doi: 10.37391/IJEER.120312.
    [21] Louis Narmour, Steven Derrien, and Sanjay Rajopadhye, Automatic Algorithm-Based Fault Detection (AABFD) of Stencil Computations, vol. 1, no. 1. Association for Computing Machinery, 2023.
    [22] S. Priyadarshan, H. Nguyen, R. Chouhan, and R. Sekar, “SAFER: Efficient and Error-Tolerant Binary Instrumentation,” 32nd USENIX Secur. Symp. USENIX Secur. 2023, vol. 2, pp. 1451–1468, 2023.
    [23] Y. Huang, “Quaternary checksum, redundancy and Hamming code,” no. May, 2022, [Online]. Available: https://github.com/tom123jack321/.
    [24] V. Sokolovskyi, E. Zharikov, and S. Telenyk, “Development of the Method of Detecting and Correcting Data Transmission Errors in Iot Systems for Monitoring the State of Objects,” Eastern-European J. Enterp. Technol., vol. 1, no. 9(127), pp. 22–33, 2024, doi: 10.15587/1729-4061.2024.298476.
    [25] A. Hadi Saleh, “Design of Hamming Code for 64 Bit Single Error Detection and Correction Using Vhdl,” Diyala J. Eng. Sci., vol. 8, no. 3, pp. 22–37, 2015, doi: 10.24237/djes.2015.08305.
    [26] Delphine Mary. P and S. A, “Design and Implementation of Triplication Error Correction Using Hamming Code,” Irish Interdiscip. J. Sci. Res., vol. 07, no. 03, pp. 106–114, 2023, doi: 10.46759/iijsr.2023.7312.
    [27] C. Ding, Z. Sun, and Q. Yan, “The Support Designs of Several Families of Lifted Linear Codes,” pp. 1–15, 2024, [Online]. Available: http://arxiv.org/abs/2407.15104.
    [28] A. O. Hoori, “A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media,” J. Eng., vol. 19, no. 08, pp. 992–998, 2023, doi: 10.31026/j.eng.2013.08.05.
    [29] P. Koopman, “An Improved Modular Addition Checksum Algorithm.”
    [30] P. Zhang, “Polynomial Intermediate Checksum for Integrity under Releasing Unverified Plaintext and Its Application to COPA,” Mathematics, vol. 12, no. 7, 2024, doi: 10.3390/math12071011.
    [31] H. Pereira et al., “SEGUID v2.: Extending SEGUID checksums for circular , linear , single- and double-stranded biological sequences,” 2024.

Mohammed Sami Mohammed, Hanan Badeea Ahmed, Yasir Ghazi Rashid, Adham Hadi Saleh (2024), Design a Merging Technique Circuit to Error Detection and Correction Based on Hamming Code and Checksum Using VHDL. IJEER 12(4), 1449-1460. DOI: 10.37391/ijeer.120439.