scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
17 Apr 2008
TL;DR: In this article, a method for controlling access to a shared memory is proposed, which comprises the steps of: judging whether or not there is data corruption in one of said at least two headers; and copying the control information in any one of other headers to said one header if there are data corruption.
Abstract: The shared memory includes a header section and a data section, wherein said header section includes at least two headers in which control information is stored. The method comprises the steps of: judging whether or not there is data corruption in one of said at least two headers; and copying the control information in any one of other headers to said one header if there is data corruption in said one header. A method for controlling access to a shared memory is also disclosed.
13 Jul 2015
TL;DR: In this article, the authors identify and analyze the factors that cause the perception of fraud according to the auditor, including greed and fear of losing office factors does not determine the occurrence of fraud.
Abstract: Fraud is defined as foul or scam in finance, which is not only problems faced by business es and industr ies , but also haunt s the implementation of government conduct around the world, also in Indonesia. The data by KPK shows Indonesia n corruption cases from 2011 to 2014 (as of October 31, 2014) . T he perpetrators of corruption based on positions are as many as 193 actors, based on the type of case as many as 207 cases , and as many as 206 cases based agencies. In North Sulawesi, according to data Corruption Court Class 1 A, the number of cases of Corruption during 2011 to October 2014 are as many as 125 cases. The purpose of this research is to identify and analyze the factors that cause the perception of fraud according to the auditor. This study used 105 respondents by the Judgement sampling technique and exploratory factor analysis method was used . The results show s greed and fear of losing office factors does not determine the occurrence of fraud . T here are five new factor determinant s of fraud that ar e classified as individual behavior, lack of supervision, lack of attention boss, financial pressures and working comfort factors . Role of synergy between the Internal Auditor, Independent Auditor, Government Auditor and Tax Auditor with the Government and leaders of the business community and local government in North Sulawesi province is expected to prevent fraud by making fraud prevention action plan . Keywords: fraud, perception, auditor
Patent
05 Jun 2014
TL;DR: In this paper, the authors propose a data read-write method to cope with data corruption by delay destruction in flash memory, where a CPU 11 reads data from each page included in a page ring to RAM 12, detects an error of the data by using an error detection code included in the data on the RAM 12 and searches and identifies the latest written page and the oldest written page among each of pages included in page ring R by using a flag included in data in which the error is not detected.
Abstract: PROBLEM TO BE SOLVED: To provide an IC card, a data read-write method and a data read-write program which are capable of coping with data corruption by delay destruction in flash memorySOLUTION: A CPU 11 reads data from each page included in a page ring to RAM 12, detects an error of the data by using an error detection code included in the data on the RAM 12, searches and identifies the latest written page and the oldest written page among each of pages included in the page ring R by using a flag included in the data in which the error is not detected, reads the data from the identified latest page to the RAM 12, updates the data on the RAM 12, and writes the updated data to the identified oldest page
Proceedings ArticleDOI
06 Nov 2020
TL;DR: The in between nodes are known as intermediate nodes, that act as node which act as nodes which involved in data forwarding process, and are included in problems like data loss, data mismatch, data corruption, data deletion etc.
Abstract: The in between nodes are known as intermediate nodes, that act as nodes which involved in data forwarding process. Network designed based on the node inter connected with each other, the node get connected from one node to another via full duplex mode form the connected network. Detection of false data plays a major role in network security while forwarding the data through number of nodes. The data forwarding through the intermediates node included in problems like data loss, data mismatch, data corruption, data deletion etc. To overcome these kinds of problem number of techniques generated in term of detecting it, but overcoming or preventing plays a different part from them.
Patent
David C. Reed1, Gregory E. McBride1
29 Jun 2018
TL;DR: In this article, a method for analyzing data corruption is described, which includes identifying a data set containing corrupted data and searching the data set for the corrupted data to verify that corrupted data is contained within the data sets.
Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set containing corrupted data. The method searches the data set for the corrupted data to verify that the corrupted data is contained within the data set. The method repeatedly performs the following until the corrupted data is no longer found within the data set: revert to a previous version of the data set by removing an incremental update to the data set, and search the previous version for the corrupted data. When a previous version of the data set is found that no longer contains the corrupted data, the method determines a timestamp associated with the previous version and provides the timestamp to a user. A corresponding system and computer program product are also disclosed.

Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727