With the advent of blockchain, reference is made to a distributed ledger and P2P system that utilizes software elements composed of algorithms that are agreed upon using cryptographic techniques and security technologies to secure and maintain the integrity of the system. The classification and ...
replication algorithm is described, which can tolerate Byzantine errors and improve the performance of previous algorithms by replacing public-key signatures with vectors of message authentication codes, reducing the size and quantity of messages, and applying incremental checkpoint management techniques. By...
An important disadvantage of both techniques is the fact that the agreement degree of expert opinions is not taken into account. The methodological contribution and the purpose of the article is to include the procedure for aggregating individual expert opinions into the fuzzy TOPSIS method, taking ...