TY - JOUR TI - A New Method for Transformation Techniques in Secure Information Systems JO - Journal of Information Systems and Telecommunication (JIST) JA - Iranian Academic Center for Education,Culture and Research LA - en SN - 2322-1437 AU - hojatallah hamidi AD - عضو هیئت علمی Y1 - 2016 PY - 2016 VL _ 13 IS - 1 SP - 1 EP - 10 KW - Transformation Techniques KW - Information Systems KW - Redundancy KW - Checkpointing DO - 10.7508/jist.2016.01.003 N2 - The transformation technique relies on the comparison of parity values computed in two ways. The fault detection structures are developed and they not only detected subsystem faults but also corrected faults introduced in the data processing system. Concurrent parity values techniques are very useful in detecting numerical error in the data processing operations, where a single fault can propagate to many output faults. Parity values are the most effective tools used to detect faults occurring in the code stream. In this paper, we present a methodology for redundant systems that allows to detect faults. Checkpointing is the typical technique to tolerate such faults. This paper presents a checkpointing approach to operate on encoded data. The advantage of this method is that it is able to achieve very low overhead according to the specific characteristic of an application. The numerical results of the multiple checkpointing technique confirm that the technique is more efficient and reliable by not only distributing the process of checkpointing over groups of processors. This technique has been shown to improve both the reliability of the computation and the performance of the checkpointing. UR - http://rimag.ir/fa/Article/14795 L1 - http://rimag.ir/fa/Article/Download/14795 TY -JOURId - 14795