A New Method for Transformation Techniques in Secure Information Systems

Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 1

Abstract

The transformation technique relies on the comparison of parity values computed in two ways. The fault detection structures are developed and they not only detected subsystem faults but also corrected faults introduced in the data processing system. Concurrent parity values techniques are very useful in detecting numerical error in the data processing operations, where a single fault can propagate to many output faults. Parity values are the most effective tools used to detect faults occurring in the code stream. In this paper, we present a methodology for redundant systems that allows to detect faults. Checkpointing is the typical technique to tolerate such faults. This paper presents a checkpointing approach to operate on encoded data. The advantage of this method is that it is able to achieve very low overhead according to the specific characteristic of an application. The numerical results of the multiple checkpointing technique confirm that the technique is more efficient and reliable by not only distributing the process of checkpointing over groups of processors. This technique has been shown to improve both the reliability of the computation and the performance of the checkpointing.

Authors and Affiliations

Hodjatollah Hamidi

Keywords

Related Articles

The Separation of Radar Clutters using Multi-Layer Perceptron

Clutter usually has negative influence on the detection performance of radars. So, the recognition of clutters is crucial to detect targets and the role of clutters in detection cannot be ignored. The design of radar det...

A New Finite Field Multiplication Algorithm to Improve Elliptic Curve Cryptosystem Implementations

This paper presents a new and efficient implementation approach for the elliptic curve cryptosystem (ECC) based on a novel finite field multiplication in GF(2m) and an efficient scalar multiplication algorithm. This new...

Better Performance of New Generation of Digital Video Broadcasting-terrestrial (DVB-T2) Using Alamouti scheme with Cyclic Delay Diversity

The goal of the future terrestrial digital video broadcasting (DVB-T) standard is to employ diversity and spatial multiplexing in order to achieve the fully multiple-input multiple-output (MIMO) channel capacity. The DVB...

Target Tracking in MIMO Radar Systems Using Velocity Vector

The superiority of multiple-input multiple-output (MIMO) radars over conventional radars has been recently shown in many aspects. These radars consist of many transmitters and receivers located far from each other. In th...

Effects of Wave Polarization on Microwave Imaging Using Linear Sampling Method

Linear Sampling Method (LSM) is a simple and effective method for the shape reconstruction of unknown objects. It is also a fast and robust method to find the location of an object. This method is based on far field oper...

Download PDF file
  • EP ID EP184546
  • DOI 10.7508/jist.2016.01.003
  • Views 140
  • Downloads 0

How To Cite

Hodjatollah Hamidi (2016). A New Method for Transformation Techniques in Secure Information Systems. Journal of Information Systems and Telecommunication, 4(1), 19-26. https://europub.co.uk/articles/-A-184546