scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
15 Jan 2019
TL;DR: In this article, the authors propose an apparatus for implementing a method of creating a data chain which can be cryptographically proven to contain valid data, which is capable of providing a technical effect of making a data processing system robust against data corruption, data loss, failure in data communication synchronization and similar practical operational issues.
Abstract: Disclosed is an apparatus for implementing a method of creating a data chain, which can be cryptographically proven to contain valid data. The method comprises steps of: (a) creating a data chain with no elements; (b) validating the data chain for nodes before accepting the data chain; (c) verifying the size of close group to add the data chain; (d) adding a data block to the data chain; (e) removing old copies of entries from the data chain only if a chained consensus would not be broken, else maintaining the entry and marking it as deleted; (f) validating a majority of pre-existing nodes; and (g) validating a signature of the data chain via the data chain of signed elements. The apparatus is operable to support a data communication system, wherein the apparatus is operable to ensure that a given data structure has cryptographically valid data while relocating the data from a switching off node to a live node during a churn event. Such an apparatus is capable of providing a technical effect of making a data processing system robust against data corruption, data loss, failure in data communication synchronization and similar practical operational issues.
01 Jan 2013
TL;DR: This paper presents an error detection and correction method for Euclidean geometry Low density parity check (EG-LDPC) codes with majority logic decoding which significantly reduces memory access time and also it takes three iterations instead of N iterations when there is no error in the data read.
Abstract: Memory is a basic resource in every digital systems but nowadays, single event upsets (SEU) altering these memories by changing its states which is caused by ions or electro-magnetic radiations. Error-correcting code memory (ECC memory) is a type of computer data storage that can detect and correct the more common kinds of internal data corruption. This paper presents an error detection and correction method for Euclidean geometry Low density parity check (EG-LDPC) codes with majority logic decoding. Here the application is mainly focused on memories, since MLDD is used here due to its capability of correcting large errors. Even though they require a large decoding time that will more affecting on memory performance. This can be overcome by the proposed technique which significantly reduces memory access time and also it take three iterations instead of N iterations when there is no error in the data read and it uses majority logic decoder itself to detect failures which minimizes the area and power consumption.
Patent
10 Oct 2019
TL;DR: In this paper, a system and method for identifying data corruption in a data transfer over an error-proof communication link, wherein additional structure checksums are formed to secure a data structure during transfer of the data structure, where representatives are associated with the data types, and the structure checksum is formed via the representatives to provide identification of data corruption.
Abstract: System and method for identifying data corruption in a data transfer over an error-proof communication link, wherein additional structure checksums are formed to secure a data structure during transfer of the data structure, where representatives are associated with the data types, and the structure checksum is formed via the representatives to provide identification of data corruption in a data transfer over an error-proof communication link between a first automation component and a second automation component in industrial control engineering.
Proceedings ArticleDOI
07 Sep 1997
TL;DR: The solution chosen was to create an algorithm which "forces" the data entered in specific fields into the desired alphabet and case, saving time, and all errors of this type are eliminated.
Abstract: The data entered in the Greek Cardiac Pacemaker Registry include some items which are entered in the Greek language and others which use letters from the Latin alphabet. Entering a record in the conventional way thus requires constant switching of the computer keyboard between languages and involves a high risk of data corruption. Rather than relying on checks and annoying error warnings, the solution chosen was to create an algorithm which "forces" the data entered in specific fields into the desired alphabet and case. Keyboard switching is thus no longer necessary, saving time, and all errors of this type are eliminated in a manner transparent to the user. A similar approach could be used in any context which involves a language based on a non-Latin alphabet.
Patent
David C. Reed1, Gregory E. McBride1
02 Jan 2020
TL;DR: In this article, a method for analyzing data corruption is presented, which identifies a specific location within the data set containing corrupted data and analyzes the specific location to determine if the corrupted data is contained therein.
Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set containing corrupted data. The method identifies a specific location within the data set containing the corrupted data and analyzes the specific location to determine if the corrupted data is contained therein. The method repeatedly performs the following until the corrupted data is no longer found within the specific location: revert to a previous version of the specific location by removing an incremental update to the specific location, and analyze the previous version of the specific location to determine if it contains the corrupted data. When a previous version of the specific location is found that no longer contains the corrupted data, the method determines a timestamp associated with the previous version and provides the timestamp to a user. A corresponding system and computer program product are also disclosed.

Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727