BIT CHECK IN ERROR DETECTION ON TEXT DATA TRANSMISSION USING HAMMING CODE ALGORITHM

##plugins.themes.academic_pro.article.main##

Pilipus Tarigan

Abstract

When data or information is transmitted via wireless or via cable channels, errors may occur while the data is transmitted. One of the efforts made is to apply error control coding. Hamming code is an example of an existing error control coding technique. Hamming code performance is distinguished by the number of parity bits it has. Ontelecommunications allows everyone to communicate with each other quickly over long distances though. Data that is transmitted or sent in the form of text data can fail (error). Errors cause changes in the contents of the data transferred to the recipient (Receiver) to change or fail. One way to detect simple errors is to use Hamming Code with single error correction. In the detection, this algorithm uses the EX-OR (Exclusive–OR) operation in the error detection process.In testing the data sent is not the same as the result received, the bit has experienced an error, and the system will correct the position where the bit has an error.

##plugins.themes.academic_pro.article.details##

How to Cite
Tarigan, P. (2021). BIT CHECK IN ERROR DETECTION ON TEXT DATA TRANSMISSION USING HAMMING CODE ALGORITHM. INFOKUM, 9(2, June), 535-543. Retrieved from http://infor.seaninstitute.org/index.php/infokum/article/view/205

References

1. Jogyanto HM, "Analysis & Design", ANDI Publisher, Yogjakarta, 2005
2. Ariyus, Doni & Andri, Rum KR, “Data Communication”, Andi Publisher, Yogyakarta, 2008
3. Albar, Ahmad Alfi, Poltak and Sani, Arman. Designing Error Detection System And Error Correction System Using Hamming Code Method In Text Data Delivery.
4. Gupta, Brajesh K. and Rajeshwar Lal dua. 2012. 30 BIT Hamming Code For Error Detection and Correction with even parity and odd parity Check Method by using VHDL.
5. Saragih, Arlando Saragi and Hanapi Gunawan, 2011, Simulation of Concealing Errors in Image Using Multi Directional Interpolation (MDI) Method.
6. Purnomo, Galih, "The Hamming Method".
7. Maharani, Tamara, Pratiarso, Aries and Arifin, "Simulation of Sending and Receiving Information Using BCH Code".