FITS Checksum Proposal

نویسندگان

  • Rob Seaman
  • William Pence
  • Arnold Rots
چکیده

This paper describes a simple means for embedding a checksum within a FITS header, providing a mechanism for later verifying the integrity of the FITS le. The method uses ASCII coded 32-bit 1's complement arithmetic to force the checksum of each FITS HDU to zero. This technique requires no extension of the FITS standard to be used by any given project, in fact the technique may be used to zero the checksum of any ASCII le. The purpose of this proposal is simply to reserve keywords that will allow projects and software packages to seamlessly verify and update each other's data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LAB Mode for Iterated Hash Functions

In this paper,we proposed a efficient and laconic mode for iterative hash functions and tried to fix the flaws of the Merkle-Damgaard construction completely and certainly tried to prevent varieties of those generic attacks ,such as Multicollisions Attack,Second Preimage Attack and Herding Attack.The structure of this new mode is different from HAIFA or any other proposal,it contains a new meth...

متن کامل

LAB Mode for Iterated Hash Functions

In this paper,we proposed a efficient and laconic mode for iterative hash functions and tried to fix the flaws of the Merkle-Damgaard construction completely and certainly tried to prevent varieties of those generic attacks ,such as Multicollisions Attack,Second Preimage Attack and Herding Attack.The structure of this new mode is different from HAIFA or any other proposal,it contains a new meth...

متن کامل

An Adaptive TCP Protocol for Lossy Mobile Environment

TCP has been designed and tuned as a reliable transfer protocol for wired links. However, it incurs end-to-end performance degradation in wireless environments where packet loss is very high. TCP HACK (Header Checksum Option) is a novel mechanism proposed to improve original TCP in lossy links. It presents an extension to TCP that enables TCP to distinguish packet corruption from congestion in ...

متن کامل

Generalized Numerical Entanglement For Reliable Linear, Sesquilinear And Bijective Operations On Integer Data Streams

We propose a new technique for the mitigation of fail-stop failures and/or silent data corruptions (SDCs) within linear, sesquilinear or bijective (LSB) operations on M integer data streams (M ≥ 3). In the proposed approach, the M input streams are linearly superimposed to form M numerically entangled integer data streams that are stored in-place of the original inputs, i.e., no additional (aka...

متن کامل

K-theory and Ramond-Ramond charge

We discuss the relation between the Ramond-Ramond charges of D-branes and the topology of Chan-Paton vector bundles. We show that a topologically nontrivial normal bundle induces RR charge and that the result fits in perfectly with the proposal that D-brane charge is the topology of the Chan-Paton bundle, regarded as an element of K

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1201.1345  شماره 

صفحات  -

تاریخ انتشار 1995