Fault Tolerant Weighted Voting Algorithms

نویسندگان

  • Azad H. Azadmanesh
  • Alireza Farahani
  • Lotfi Najjar
چکیده

Agreement algorithms can be categorized in different ways. One categorization of such algorithms is based on whether the final decisions are exact or inexact. In inexact algorithms, also known as approximate agreement algorithms, each node produces its final decision that may not be necessarily the exact same decision value produced by a different non-faulty node. Most studies on such algorithms are either oblivious to the confidence level placed on each node or the impact of malicious behavior is not accounted for. This study introduces a family of inexact agreement algorithms taking into account both the confidence level placed on each node and the presence of malicious behavior. Expressions are developed for the convergence rate and fault tolerance of these algorithms, and the effect of weights are shown when the agreement process favors nodes with a specific level of trust. The study also describes the difficulties for applying weights to the existing voting algorithms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Voting Algorithm Based on Adaptive Neuro Fuzzy Inference System for Fault Tolerant Systems

some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...

متن کامل

Voting Algorithm Based on Adaptive Neuro Fuzzy Inference System for Fault Tolerant Systems

some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...

متن کامل

A Neuro-Fuzzy Approach Based Voting Scheme for Fault Tolerant Systems Using Artificial Bee Colony Training

Voting algorithms are extensively used to make decisions in fault tolerant systems where each redundant module gives inconsistent outputs. Popular voting algorithms include majority voting, weighted voting, and inexact majority voters. Each of these techniques suffers from scenarios where agreements do not exist for the given voter inputs. This has been successfully overcome in literature using...

متن کامل

Exploiting Omissive Faults in Synchronous Approximate Agreement

ÐIn a fault-tolerant distributed system, it is often necessary for nonfaulty processes to agree on the value of a shared data item. The criterion of Approximate Agreement does not require processes to achieve exact agreement on a value; rather, they need only agree to within a predefined numerical tolerance. Approximate Agreement can be achieved through convergent voting algorithms. Previous re...

متن کامل

Voting Algorithms in Multiple Error Scenarios for Real-time Control Applications

Voting algorithms are used to arbitrate between the results of variants in fault-tolerant systems. Industrial sectors which employ such systems include process control, transportation (such as railway and avionics), nuclear power plants, and military applications. Typical voters used in fault tolerant systems are majority, plurality, median, and weighted average. These voters can produce either...

متن کامل

A Novel N-Input Voting Algorithm for X-by-Wire Fault-Tolerant Systems

Voting is an important operation in multichannel computation paradigm and realization of ultrareliable and real-time control systems that arbitrates among the results of N redundant variants. These systems include N-modular redundant (NMR) hardware systems and diversely designed software systems based on N-version programming (NVP). Depending on the characteristics of the application and the ty...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2008