149 relations: ACARS, Addison-Wesley, Adler-32, Advanced Data Communication Control Procedures, AES3, AIXM, Algorithm, American National Standards Institute, ARINC, Asynchronous transfer mode, AUTOSAR, Base64, BCH code, Binary Synchronous Communications, Bit numbering, Block cipher, Block cipher mode of operation, Bluetooth, Btrfs, Burst error, Bus (computing), Bzip2, CAN bus, CDMA2000, Ceph (software), Cksum, Code-division multiple access, Coefficient, Communication channel, Computation of cyclic redundancy checks, Computer hardware, CRC-based framing, Cryptographic hash function, Cyclic code, Dallas Semiconductor, Data integrity, Data Integrity Field, Data Radio Channel, Decoding methods, Defense Technical Information Center, Digital Enhanced Cordless Telecommunications, Digital signature, DigRF, Division (mathematics), Divisor, DNP3, Dr. Dobb's Journal, DVB-S2, Ecma International, Endianness, ..., Entropy (information theory), EPCglobal, Error correction code, Error detection and correction, Ethernet, Eurocontrol, Exclusive or, Ext4, Federal Information Processing Standards, Finite field, Fletcher's checksum, FlexRay, Forward error correction, Function (mathematics), G.hn, Georgia Institute of Technology, GF(2), GSM, Gzip, Hacker's Delight, Hamming code, Hamming distance, Hash function, High-Level Data Link Control, IBM, IEC 60870-5, Information security, Integer overflow, Integrated Services Digital Network, Intel, International Committee for Information Technology Standards, International Organization for Standardization, Irreducible polynomial, ISCSI, ITU-T, Linear function, List of hash functions, List of ITU-T V-series recommendations, Longitudinal redundancy check, Mathematics of cyclic redundancy checks, Maxim Integrated, Memoization, Message authentication code, Meter-Bus, Mitre Corporation, Modbus, MPEG-2, MPT-1327, MultiMediaCard, National Technical Information Service, Nehalem (microarchitecture), Noise (electronics), Obfuscation, Ofcom, On-board diagnostics, OpenSafety, PACTOR, Parity bit, Pearson Education, Physical layer, PKZIP, Polynomial, Polynomial code, Polynomial long division, Portable Network Graphics, POSIX, Primitive polynomial (field theory), Processor register, Profibus, Python (programming language), Quotient, Radio Technical Commission for Maritime Services, Radio teleswitch, Radio-frequency identification, Remainder, Reverse engineering, Ring (mathematics), Rome Laboratory, SCSI, Secure Digital, Serial ATA, Serial port, Simple file verification, Stream cipher, Stream Control Transmission Protocol, Systematic code, Technical standard, Telecommunications network, Train communication network, UniProt, USB, W. Wesley Peterson, Wired Equivalent Privacy, X.25, XMODEM, XZ Utils, Zero divisor, ZMODEM, 1-Wire. Expand index (99 more) » « Shrink index
In aviation, ACARS (an acronym for aircraft communications addressing and reporting system) is a digital datalink system for transmission of short messages between aircraft and ground stations via airband radio or satellite.
Addison-Wesley is a publisher of textbooks and computer literature.
Adler-32 is a checksum algorithm which was invented by Mark Adler in 1995, and is a modification of the Fletcher checksum.
In telecommunication, Advanced Data Communication Control Procedures (or Protocol) (ADCCP) is a bit-oriented data link layer protocol used to provide point-to-point and point-to-multipoint transmission of data frames that contain error control information.
AES3 (also known as AES/EBU) is a standard for the exchange of digital audio signals between professional audio devices.
The Aeronautical Information Exchange Model (AIXM) is designed to enable the management and distribution of Aeronautical Information Services (AIS) data in digital format.
In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems.
The American National Standards Institute (ANSI) is a private non-profit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States.
Aeronautical Radio, Incorporated (ARINC), established in 1929, is a major provider of transport communications and systems engineering solutions for eight industries: aviation, airports, defense, government, healthcare, networks, security, and transportation.
Asynchronous transfer mode (ATM) is, according to the ATM Forum, "a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals".
AUTOSAR (AUTomotive Open System ARchitecture) is a worldwide development partnership of automotive interested parties founded in 2003.
Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation.
In coding theory, the BCH codes or Bose–Chaudhuri–Hocquenghem codes form a class of cyclic error-correcting codes that are constructed using polynomials over a finite field (also called Galois field).
Binary Synchronous Communication (BSC or Bisync) is an IBM character-oriented, half-duplex link protocol, announced in 1967 after the introduction of System/360.
In computing, bit numbering (or sometimes bit endianness) is the convention used to identify the bit positions in a binary number or a container for such a value.
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.
Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).
Btrfs (pronounced as "butter fuss", "better F S", "butter F S", "b-tree F S", or simply by spelling it out) is a file system based on the copy-on-write (COW) principle, initially designed at Oracle Corporation for use in Linux.
In telecommunication, a burst error or error burst is a contiguous sequence of symbols, received over a communication channel, such that the first and last symbols are in error and there exists no contiguous subsequence of m correctly received symbols within the error burst.
In computer architecture, a bus (a contraction of the Latin omnibus) is a communication system that transfers data between components inside a computer, or between computers.
bzip2 is a free and open-source file compression program that uses the Burrows–Wheeler algorithm.
A Controller Area Network (CAN bus) is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other in applications without a host computer.
CDMA2000 (also known as C2K or IMT Multi‑Carrier (IMT‑MC)) is a family of 3G mobile technology standards for sending voice, data, and signaling data between mobile phones and cell sites.
In computing, Ceph (pronounced or) is a free-software storage platform, implements object storage on a single distributed computer cluster, and provides interfaces for object-, block- and file-level storage.
cksum is a command in Unix-like operating systems that generates a checksum value for a file or stream of data.
Code-division multiple access (CDMA) is a channel access method used by various radio communication technologies.
In mathematics, a coefficient is a multiplicative factor in some term of a polynomial, a series or any expression; it is usually a number, but may be any expression.
A communication channel or simply channel refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networking.
Computation of a cyclic redundancy check is derived from the mathematics of polynomial division, modulo two.
Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card and motherboard.
CRC-based framing is a kind of frame synchronization used in Asynchronous Transfer Mode (ATM) and other similar protocols.
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
In coding theory, a cyclic code is a block code, where the circular shifts of each codeword gives another word that belongs to the code.
Dallas Semiconductor, acquired by Maxim Integrated Products in 2001, designed and manufactured analog, digital, and mixed-signal semiconductors (integrated circuits, or ICs).
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
Data Integrity Field (DIF) was an approach to protect data integrity in computer data storage from data corruption.
Data Radio Channel (DARC) is a high-rate (16 kbit/s) standard for encoding data in a subcarrier over radio station broadcasts, DARC was approved as the All-European standard ETS 300 751 in 1997.
In coding theory, decoding is the process of translating received messages into codewords of a given code.
The Defense Technical Information Center (DTIC, pronounced "Dee-tick") is the premier repository for research and engineering information for the United States Department of Defense.
Digital Enhanced Cordless Telecommunications (Digital European Cordless Telecommunications), usually known by the acronym DECT, is a standard primarily used for creating cordless telephone systems.
A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.
The DigRF working group was formed as a MIPI Alliance (MIPI) working group in April 2007.
Division is one of the four basic operations of arithmetic, the others being addition, subtraction, and multiplication.
In mathematics, a divisor of an integer n, also called a factor of n, is an integer m that may be multiplied by some integer to produce n. In this case, one also says that n is a multiple of m. An integer n is divisible by another integer m if m is a divisor of n; this implies dividing n by m leaves no remainder.
DNP3 (Distributed Network Protocol) is a set of communications protocols used between components in process automation systems.
Digital Video Broadcasting - Satellite - Second Generation (DVB-S2) is a digital television broadcast standard that has been designed as a successor for the popular DVB-S system.
Ecma is a standards organization for information and communication systems.
Endianness refers to the sequential order in which bytes are arranged into larger numerical values when stored in memory or when transmitted over digital links.
Information entropy is the average rate at which information is produced by a stochastic source of data.
EPCglobal is a joint venture between GS1 (formerly known as EAN International) and GS1 US (formerly the Uniform Code Council, Inc.). It is an organization set up to achieve worldwide adoption and standardization of Electronic Product Code (EPC) technology.
In computing, telecommunication, information theory, and coding theory, an error correction code, sometimes error correcting code, (ECC) is used for controlling errors in data over unreliable or noisy communication channels.
In information theory and coding theory with applications in computer science and telecommunication, error detection and correction or error control are techniques that enable reliable delivery of digital data over unreliable communication channels.
Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
The European Organisation for the Safety of Air Navigation, commonly known as Eurocontrol, is an international organisation working to achieve safe and seamless air traffic management across Europe.
Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).
The ext4 or fourth extended filesystem is a journaling file system for Linux, developed as the successor to ext3.
Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.
In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements.
The Fletcher checksum is an algorithm for computing a position-dependent checksum devised by John G. Fletcher (1934–2012) at Lawrence Livermore Labs in the late 1970s.
FlexRay is an automotive network communications protocol developed by the FlexRay Consortium to govern on-board automotive computing.
In telecommunication, information theory, and coding theory, forward error correction (FEC) or channel coding is a technique used for controlling errors in data transmission over unreliable or noisy communication channels.
In mathematics, a function was originally the idealization of how a varying quantity depends on another quantity.
G.hn is a specification for home networking with data rates up to 2 Gbit/s and operation over four types of legacy wires: telephone wiring, coaxial cables, power lines and plastic optical fiber.
The Georgia Institute of Technology, commonly referred to as Georgia Tech, is a public research university and institute of technology in Atlanta, Georgia.
GF(2) (also F2, Z/2Z or Z2) is the '''G'''alois '''f'''ield of two elements.
GSM (Global System for Mobile communications) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation digital cellular networks used by mobile devices such as tablets, first deployed in Finland in December 1991.
gzip is a file format and a software application used for file compression and decompression.
Hacker's Delight is a software algorithm book by Henry S. Warren, Jr.
In telecommunication, Hamming codes are a family of linear error-correcting codes.
In information theory, the Hamming distance between two strings of equal length is the number of positions at which the corresponding symbols are different.
A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.
High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO).
The International Business Machines Corporation (IBM) is an American multinational technology company headquartered in Armonk, New York, United States, with operations in over 170 countries.
IEC 60870 part 5 Gordon R. Clarke et al, Practical modern SCADA protocols: DNP3, 60870.5 and related systems, Newnes, 2004 is one of the IEC 60870 set of standards which define systems used for telecontrol (supervisory control and data acquisition) in electrical engineering and power system automation applications.
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
In computer programming, an integer overflow occurs when an arithmetic operation attempts to create a numeric value that is outside of the range that can be represented with a given number of bits – either larger than the maximum or lower than the minimum representable value.
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
Intel Corporation (stylized as intel) is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley.
The InterNational Committee for Information Technology Standards (INCITS), (pronounced "insights"), is an ANSI-accredited standards development organization composed of Information technology developers.
The International Organization for Standardization (ISO) is an international standard-setting body composed of representatives from various national standards organizations.
In mathematics, an irreducible polynomial is, roughly speaking, a non-constant polynomial that cannot be factored into the product of two non-constant polynomials.
In computing, iSCSI is an acronym for Internet Small Computer Systems Interface, an Internet Protocol (IP)-based storage networking standard for linking data storage facilities.
The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU); it coordinates standards for telecommunications.
In mathematics, the term linear function refers to two distinct but related notions.
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.
The ITU-T V-Series Recommendations on Data communication over the telephone network specify the protocols that govern approved modem communication standards and interfaces.
In telecommunication, a longitudinal redundancy check (LRC), or horizontal redundancy check, is a form of redundancy check that is applied independently to each of a parallel group of bit streams.
The cyclic redundancy check (CRC) is based on division in the ring of polynomials over the finite field GF(2) (the integers modulo 2), that is, the set of polynomials where each coefficient is either zero or one, and arithmetic operations wrap around.
Maxim Integrated is an American, publicly traded company that designs, manufactures, and sells analog and mixed-signal integrated circuits.
In computing, memoization or memoisation is an optimization technique used primarily to speed up computer programs by storing the results of expensive function calls and returning the cached result when the same inputs occur again.
In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.
M-Bus (Meter-Bus) is a European standard (EN 13757-2 physical and link layer, EN 13757-3 application layer) for the remote reading of gas or electricity meters.
The Mitre Corporation (stylized as The MITRE Corporation and MITRE) is an American not-for-profit organization based in Bedford, Massachusetts, and McLean, Virginia.
Modbus is a serial communications protocol originally published by Modicon (now Schneider Electric) in 1979 for use with its programmable logic controllers (PLCs).
MPEG-2 (a.k.a. H.222/H.262 as defined by the ITU) is a standard for "the generic coding of moving pictures and associated audio information".
MPT 1327 is an industry standard for trunked radio communications networks.
In consumer electronics, the MultiMediaCard (MMC) is a memory-card standard used for solid-state storage.
The National Technical Information Service (NTIS) is an agency within the U.S. Department of Commerce.
Nehalem is the codename for an Intel processor microarchitecture released in November 2008.
In electronics, noise is an unwanted disturbance in an electrical signal.
Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language.
The Office of Communications (Y Swyddfa Gyfathrebiadau), commonly known as Ofcom, is the UK government-approved regulatory and competition authority for the broadcasting, telecommunications and postal industries of the United Kingdom.
On-board diagnostics (OBD) is an automotive term referring to a vehicle's self-diagnostic and reporting capability.
openSAFETY is a communications protocol used to transmit information that is crucial for the safe operation of machinery in manufacturing lines, process plants, or similar industrial environments.
PACTOR is a radio modulation mode used by amateur radio operators, marine radio stations, and radio stations in isolated areas to send and receive digital information via radio.
A parity bit, or check bit, is a bit added to a string of binary code to ensure that the total number of 1-bits in the string is even or odd.
Pearson Education (see also Pearson PLC) is a British-owned education publishing and assessment service to schools and corporations, as well as directly to students.
In the seven-layer OSI model of computer networking, the physical layer or layer 1 is the first and lowest layer.
PKZIP is a file archiving computer program, notable for introducing the popular ZIP file format.
In mathematics, a polynomial is an expression consisting of variables (also called indeterminates) and coefficients, that involves only the operations of addition, subtraction, multiplication, and non-negative integer exponents of variables.
In coding theory, a polynomial code is a type of linear code whose set of valid code words consists of those polynomials (usually of some fixed length) that are divisible by a given fixed polynomial (of shorter length, called the generator polynomial).
In algebra, polynomial long division is an algorithm for dividing a polynomial by another polynomial of the same or lower degree, a generalised version of the familiar arithmetic technique called long division.
Portable Network Graphics (PNG, pronounced or) is a raster graphics file format that supports lossless data compression.
The Portable Operating System Interface (POSIX) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems.
In field theory, a branch of mathematics, a primitive polynomial is the minimal polynomial of a primitive element of the finite extension field GF(pm).
In computer architecture, a processor register is a quickly accessible location available to a computer's central processing unit (CPU).
PROFIBUS (Process Field Bus) is a standard for fieldbus communication in automation technology and was first promoted in 1989 by BMBF (German department of education and research) and then used by Siemens.
Python is an interpreted high-level programming language for general-purpose programming.
In arithmetic, a quotient (from quotiens "how many times", pronounced) is the quantity produced by the division of two numbers.
The Radio Technical Commission for Maritime Services (RTCM) is an international standards organization.
A radio teleswitch is a device used in the United Kingdom to allow electricity suppliers to switch large numbers of electricity meters between different tariff rates, by broadcasting an embedded signal in broadcast radio signals.
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.
In mathematics, the remainder is the amount "left over" after performing some computation.
Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.
In mathematics, a ring is one of the fundamental algebraic structures used in abstract algebra.
Rome Laboratory (Rome Air Development Center until 1991) is the US "Air Force 'superlab' for command, control, and communications" research and development and is responsible for planning and executing the USAF science and technology program.
Small Computer System Interface (SCSI) is a set of standards for physically connecting and transferring data between computers and peripheral devices.
Secure Digital (SD) is a non-volatile memory card format developed by the SD Card Association (SDA) for use in portable devices.
Serial ATA (SATA, abbreviated from Serial AT Attachment) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
In computing, a serial port is a serial communication interface through which information transfers in or out one bit at a time (in contrast to a parallel port).
Simple file verification (SFV) is a file format for storing CRC32 checksums of files to verify the integrity of files.
A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).
The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol which operates at the transport layer and serves a role similar to the popular protocols TCP and UDP.
In coding theory, a systematic code is any error-correcting code in which the input data is embedded in the encoded output.
A technical standard is an established norm or requirement in regard to technical systems.
A telecommunications network is a collection of terminal nodes, links are connected so as to enable telecommunication between the terminals.
The train communication network (TCN) is a hierarchical combination of two fieldbus for data transmission within trains.
UniProt is a freely accessible database of protein sequence and functional information, many entries being derived from genome sequencing projects.
USB (abbreviation of Universal Serial Bus), is an industry standard that was developed to define cables, connectors and protocols for connection, communication, and power supply between personal computers and their peripheral devices.
William Wesley Peterson (April 22, 1924 – May 6, 2009) was an American mathematician and computer scientist.
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.
X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication.
XMODEM is a simple file transfer protocol developed as a quick hack by Ward Christensen for use in his 1977 MODEM.ASM terminal program.
XZ Utils (previously LZMA Utils) is a set of free command-line lossless data compressors, including LZMA and xz, for Unix-like operating systems and, from version 5.0 onwards, Microsoft Windows.
In abstract algebra, an element of a ring is called a left zero divisor if there exists a nonzero such that, or equivalently if the map from to that sends to is not injective.
ZMODEM is a file transfer protocol developed by Chuck Forsberg in 1986, in a project funded by Telenet in order to improve file transfers on their X.25 network.
1-Wire is a device communications bus system designed by Dallas Semiconductor Corp. that provides low-speed data, signaling, and power over a single conductor.
CRC Values, CRC check, CRC-12, CRC-16, CRC-24, CRC-32, CRC-32C, CRC-32K, CRC-64, CRC-8, CRC-CCITT, CRC16, CRC32, CRC32c, CRC8, Crc16, Crc32, Crc32 mpeg2, Crc32c, Crc64, Cyclic Redundancy Check, Cyclic redundancy, Cyclic redundancy checks, Cyclic redundancy checksum, Cyclic redundancy code, Cyclical redundancy checking, FCS-32, Polynomial CRC representations, Polynomial representations of cyclic redundancy checks.