A New Method for Transformation Techniques in Secure Information Systems

Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 1

Abstract

The transformation technique relies on the comparison of parity values computed in two ways. The fault detection structures are developed and they not only detected subsystem faults but also corrected faults introduced in the data processing system. Concurrent parity values techniques are very useful in detecting numerical error in the data processing operations, where a single fault can propagate to many output faults. Parity values are the most effective tools used to detect faults occurring in the code stream. In this paper, we present a methodology for redundant systems that allows to detect faults. Checkpointing is the typical technique to tolerate such faults. This paper presents a checkpointing approach to operate on encoded data. The advantage of this method is that it is able to achieve very low overhead according to the specific characteristic of an application. The numerical results of the multiple checkpointing technique confirm that the technique is more efficient and reliable by not only distributing the process of checkpointing over groups of processors. This technique has been shown to improve both the reliability of the computation and the performance of the checkpointing.

Authors and Affiliations

Hodjatollah Hamidi

Keywords

Related Articles

Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes

In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method...

A Persian Fuzzy Plagiarism Detection Approach

Plagiarism is one of the common problems that is present in all organizations that deal with electronic content. At present, plagiarism detection tools, only detect word by word or exact copy phrases and paraphrasing is...

Scalable Community Detection through Content and Link Analysis in Social Networks

Social network analysis is an important problem that has been attracting a great deal of attention in recent years. Such networks provide users many different applications and features; as a result, they have been mentio...

COGNISON: A Novel Dynamic Community Detection Algorithm in Social Network

The problem of community detection has a long tradition in data mining area and has many challenging facet, especially when it comes to community detection in time-varying context. While recent studies argue the usabilit...

A Basic Proof Method for the Verification, Validation and Evaluation of Expert Systems

In the present paper, a basic proof method is provided for representing the verification, Validation and evaluation of expert systems. The result provides an overview of the basic method for formal proof such as: partiti...

Download PDF file
  • EP ID EP184546
  • DOI 10.7508/jist.2016.01.003
  • Views 144
  • Downloads 0

How To Cite

Hodjatollah Hamidi (2016). A New Method for Transformation Techniques in Secure Information Systems. Journal of Information Systems and Telecommunication, 4(1), 19-26. https://europub.co.uk/articles/-A-184546