Improved PBFT Algorithm Based on Comprehensive Evaluation Model

نویسندگان

چکیده

Blockchain technology is well known due to the advent of Bitcoin. With development recent years, blockchain has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm a consensus consortium blockchains. Aiming address problems PBFT algorithm, low efficiency high communication complexity, and malicious behavior primary node leading failure, an improved based on comprehensive evaluation model (TB-PBFT) proposed. First, nodes are divided into several groups multi-formation control strategy unmanned aerial vehicle (UAV) cluster, which significantly reduces complexity. Second, combining entropy method, TOPSIS Borda count proposed, uses as index, score obtained according preferences other nodes. Finally, highest ranking selected through ensure security stability network. We analyze TB-PBFT algorithms compare them with fault tolerance algorithms. Theoretical analysis simulation results show that can improve scalability reduce complexity view switching probability. also prove success rate feasibility effectiveness verified. Hence, it be applied system effectively efficiently.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

Improved Leakage Model Based on Genetic Algorithm

The classical leakage model usually exploits the power of one single S-box, which is called divide and conquer. Taking DES algorithm for example, the attack on each S-box needs to search the key space of 2 in a brute force way. Besides, 48-bit round key is limited to the result correctness of each single S-box. In this paper, we put forward a new leakage model based on the power consumption of ...

متن کامل

An Improved Comprehensive Evaluation Model of Software Dependability based on Rough Set Theory

Dependability of software, a major concern in many computer applications, can be improved through several means. But systematic approaches for its evaluation do not exist, which is the prerequisite for dependability control and improvement. Software dependability evaluation is an urgent problem to be solved. There is some subjectivity about weighting coefficient when applying fuzzy comprehensiv...

متن کامل

teacher educator evaluation model

اگرکیفیت معلم کلاس برای بهبودیادگیری دانش آموزحیاتی است،پس کیفیت اساتیددانشجو-معلمان، یابه عبارتی معلمین معلمان نیزبرای پیشرفت آموزش بسیارمهم واساسی است.ناگفته پیداست که یک سیستم مناسب آموزش معلمان ،معلمین با کیفیتی را تربیت خواهدکرد.که این کار منجربه داشتن مدارس خوب، ودرنتیجه نیروی کارماهرتروشهروندبهتربرای جامعه خواهدشد. اساتیددانشجو-معلمان نقشی بسیارمهم را در سیستم اموزش معلمان درسراسرجهان ای...

AN IMPROVED INTELLIGENT ALGORITHM BASED ON THE GROUP SEARCH ALGORITHM AND THE ARTIFICIAL FISH SWARM ALGORITHM

This article introduces two swarm intelligent algorithms, a group search optimizer (GSO) and an artificial fish swarm algorithm (AFSA). A single intelligent algorithm always has both merits in its specific formulation and deficiencies due to its inherent limitations. Therefore, we propose a mixture of these algorithms to create a new hybrid optimization algorithm known as the group search-artif...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13021117