Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/priyanshii11/error-detection-app

A project called Error Detection Techniques, which checks for errors at the network level to determine if data is corrupt. The project implements an algorithm to practically apply these error detection methods.The core functionality revolves around an algorithm that I implemented, which applies various error detection methods to ensure integrity .
https://github.com/priyanshii11/error-detection-app

algorithms android-application checksum crc java parity-check

Last synced: 7 days ago
JSON representation

A project called Error Detection Techniques, which checks for errors at the network level to determine if data is corrupt. The project implements an algorithm to practically apply these error detection methods.The core functionality revolves around an algorithm that I implemented, which applies various error detection methods to ensure integrity .

Awesome Lists containing this project

README

        

## Error Detection App

### Purpose:
- Ensure data integrity and error detection using advanced techniques, and illustrate how hackers manipulate data.

### **Key Features:**
1. **CRC Calculation:**
- Compute CRC values to detect data transmission errors.
2. **Checksum Generation:**
- Generate checksums for files and data streams to ensure their integrity.
3. **Parity Bit Verification:**
- Check for even and odd parity to quickly identify errors in binary data.
4. **Data Manipulation Detection:**
- Identify and highlight data manipulation attempts by up to three different mediums or agents.
5. **Hacker Simulation:**
- Demonstrate how hackers can manipulate and change data, then send it to another person.
6. **User-Friendly Interface:**
- Easy-to-use interface suitable for both beginners and experts.
7. **Educational Resources:**
- In-app tutorials and guides to learn about different error detection techniques and data manipulation methods.

### **How to Use:**
1. **Input Data:**
- Enter or upload the data you want to verify.
2. **Choose Method:**
- Select CRC, checksum, or parity bit verification.
3. **Hacker Simulation:**
- View simulations of how data could be manipulated by hackers.
4. **Learn:**
- Use educational resources to understand each technique, its application, and how to protect against data manipulation.

### **Ideal Users:**
- Developers
- IT Professionals
- Cybersecurity Enthusiasts
- Anyone concerned with data integrity

### **Advantages:**
- Comprehensive error detection
- Detection of data manipulation by multiple mediums
- Simulations of hacker techniques for educational purposes
- Easy-to-understand tutorials
- Suitable for both technical and non-technical users