Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

497
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

144
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

1

Information Journal Paper

Title

A NEW METHOD FOR TRANSFORMATION TECHNIQUES IN SECURE INFORMATION SYSTEMS

Pages

  19-26

Abstract

 The transformation technique relies on the comparison of parity values computed in two ways. The fault detection structures are developed and they not only detected subsystem faults but also corrected faults introduced in the data processing system. Concurrent parity values techniques are very useful in detecting numerical error in the data processing operations, where a single fault can propagate to many output faults. Parity values are the most effective tools used to detect faults occurring in the code stream. In this paper, we present a methodology for redundant systems that allows to detect faults. CHECK POINTING is the typical technique to tolerate such faults. This paper presents a CHECK POINTING approach to operate on encoded data. The advantage of this method is that it is able to achieve very low overhead according to the specific characteristic of an application. The numerical results of the multiple CHECK POINTING technique confirm that the technique is more efficient and reliable by not only distributing the process of CHECK POINTING over groups of processors. This technique has been shown to improve both the reliability of the computation and the performance of the CHECK POINTING.

Cites

References

Cite

APA: Copy

HAMIDI, HODJATOLLAH. (2016). A NEW METHOD FOR TRANSFORMATION TECHNIQUES IN SECURE INFORMATION SYSTEMS. JOURNAL OF INFORMATION SYSTEMS AND TELECOMMUNICATION (JIST), 4(1 (13)), 19-26. SID. https://sid.ir/paper/332692/en

Vancouver: Copy

HAMIDI HODJATOLLAH. A NEW METHOD FOR TRANSFORMATION TECHNIQUES IN SECURE INFORMATION SYSTEMS. JOURNAL OF INFORMATION SYSTEMS AND TELECOMMUNICATION (JIST)[Internet]. 2016;4(1 (13)):19-26. Available from: https://sid.ir/paper/332692/en

IEEE: Copy

HODJATOLLAH HAMIDI, “A NEW METHOD FOR TRANSFORMATION TECHNIQUES IN SECURE INFORMATION SYSTEMS,” JOURNAL OF INFORMATION SYSTEMS AND TELECOMMUNICATION (JIST), vol. 4, no. 1 (13), pp. 19–26, 2016, [Online]. Available: https://sid.ir/paper/332692/en

Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top