﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>4</Volume>
      <Issue>13</Issue>
      <PubDate PubStatus="epublish">
        <Year>2016</Year>
        <Month>3</Month>
        <Day>24</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>A New Method for Transformation Techniques in Secure Information Systems</ArticleTitle>
    <VernacularTitle>A New Method for Transformation Techniques in Secure Information Systems</VernacularTitle>
    <FirstPage>1</FirstPage>
    <LastPage>10</LastPage>
    <ELocationID EIdType="doi">10.7508/jist.2016.01.003</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Hojatallah</FirstName>
        <LastName>Hamidi</LastName>
        <Affiliation> K. N. Toosi University of Technology</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2016</Year>
      <Month>4</Month>
      <Day>27</Day>
    </History>
    <Abstract>The transformation technique relies on the comparison of parity values computed in two ways. The fault detection structures are developed and they not only detected subsystem faults but also corrected faults introduced in the data processing system. Concurrent parity values techniques are very useful in detecting numerical error in the data processing operations, where a single fault can propagate to many output faults. Parity values are the most effective tools used to detect faults occurring in the code stream. In this paper, we present a methodology for redundant systems that allows to detect faults. Checkpointing is the typical technique to tolerate such faults. This paper presents a checkpointing approach to operate on encoded data. The advantage of this method is that it is able to achieve very low overhead according to the specific characteristic of an application. The numerical results of the multiple checkpointing technique confirm that the technique is more efficient and reliable by not only distributing the process of checkpointing over groups of processors. This technique has been shown to improve both the reliability of the computation and the performance of the checkpointing.</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Transformation Techniques</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Information Systems</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Redundancy</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Checkpointing</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/14795</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>