Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (11)

Search Parameters:
Keywords = reputation voting

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 4389 KB  
Article
Trusted Web Service Discovery Based on a Swarm Intelligence Algorithm
by Zhengwang Ye, Hehe Sheng and Haiyang Zou
Mathematics 2025, 13(9), 1402; https://doi.org/10.3390/math13091402 - 25 Apr 2025
Viewed by 386
Abstract
The number of services on the internet has experienced explosive growth, and the rapid and accurate discovery of required services among a vast array of similarly functioning services with differing degrees of quality has become a critical and challenging aspect of service computing. [...] Read more.
The number of services on the internet has experienced explosive growth, and the rapid and accurate discovery of required services among a vast array of similarly functioning services with differing degrees of quality has become a critical and challenging aspect of service computing. In this paper, we propose a trusted service discovery algorithm based on an ant colony system (TSDA-ACS). The algorithm integrates a credibility-based trust model with the ant colony search algorithm to facilitate the discovery of trusted web services. During the evaluation process, the trust model employs a pseudo-stochastic proportion to select nodes, where nodes with higher reputation have a greater probability of being chosen. The ant colony uses a voting method to calculate the credibility of service nodes, factoring in both credibility and non-credibility from the query node’s perspective. The algorithm employs an information acquisition strategy, a trust information merging strategy, a routing strategy, and a random wave strategy to guide ant search. To evaluate the effectiveness of the TSDA-ACS, this paper introduces the random walk search algorithm (RW), the classic max–min ant colony algorithm (MMAS), and a trustworthy service discovery based on a modified ant colony algorithm (TSDMACS) for comparison with the TSDA-ACS algorithm. The experiments demonstrate that this method can achieve the discovery of trusted web services with high recall and precision rates. Finally, the efficacy of the proposed algorithm is validated through comparison experiments across various network environments. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

18 pages, 1899 KB  
Article
Transparent Task Delegation in Multi-Agent Systems Using the QuAD-V Framework
by Jeferson José Baqueta, Mariela Morveli-Espinoza and Cesar Augusto Tacla
Appl. Sci. 2025, 15(8), 4357; https://doi.org/10.3390/app15084357 - 15 Apr 2025
Viewed by 667
Abstract
Task delegation in multi-agent systems (MASs) is crucial for ensuring efficient collaboration among agents with different capabilities and skills. Traditional delegation models rely on social mechanisms such as trust and reputation to evaluate potential partners. While these approaches are effective in selecting competent [...] Read more.
Task delegation in multi-agent systems (MASs) is crucial for ensuring efficient collaboration among agents with different capabilities and skills. Traditional delegation models rely on social mechanisms such as trust and reputation to evaluate potential partners. While these approaches are effective in selecting competent agents, they often lack transparency, making it difficult for users to understand and trust the decision-making process. To address this limitation, we propose a novel task delegation model that integrates explainability through argumentation-based reasoning. Our approach employs the quantitative argumentation with votes framework (QuAD-V), a voting-based argumentation system that enables agents to justify their partner selection. We evaluate our model in a scenario involving the distribution of petroleum products via pipelines, where agents represent bases capable of temporarily storing a quantity of product. The connections between agents represent transportation routes, allowing the product to be sent from an origin to a destination base. The results demonstrate the effectiveness of our model in optimizing delegation decisions while maintaining clear, understandable explanations for agents’ decisions. Full article
Show Figures

Figure 1

18 pages, 1697 KB  
Article
Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology
by Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan, Rabia Khan and Jaime Lloret
Computers 2025, 14(1), 20; https://doi.org/10.3390/computers14010020 - 8 Jan 2025
Cited by 3 | Viewed by 2356
Abstract
Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. A [...] Read more.
Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. A consensus problem is a difficult and significant task that must be considered carefully in a blockchain network. It has several practical applications such as distributed computing, load balancing, and blockchain transaction validation. Even though a lot of consensus algorithms have been proposed, the majority of them require many computational and communication resources. Similarly, they also suffer from high latency and low throughput. In this work, we proposed a new consensus algorithm for consortium blockchain for a leader selection using the reputation value of nodes and the voting process to ensure high performance. A security analysis is conducted to demonstrate the security of the proposed algorithm. The outcomes show that the proposed algorithm provides a strong defense against the network nodes’ abnormal behavior. The performance analysis is performed by using Hyperledger Fabric v2.1 and the results show that it performs better in terms of throughput, latency, CPU utilization, and communications costs than its rivals Trust-Varying Algo, FP-BFT, and Scalable and Trust-based algorithms. Full article
Show Figures

Figure 1

16 pages, 1617 KB  
Article
Improvement of PBFT Consensus Algorithm Based on Affinity Propagation Clustering in Intellectual Property Transaction Scenarios
by Dan Du, Wenlong Feng, Mengxing Huang, Siling Feng and Jing Wang
Electronics 2024, 13(10), 1809; https://doi.org/10.3390/electronics13101809 - 7 May 2024
Cited by 3 | Viewed by 1794
Abstract
In response to the problems of random selection of primary nodes, high communication complexity, and low consensus efficiency in the current consensus mechanism for intellectual property transactions, a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm based on the Affinity-Propagation (AP) clustering algorithm, termed [...] Read more.
In response to the problems of random selection of primary nodes, high communication complexity, and low consensus efficiency in the current consensus mechanism for intellectual property transactions, a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm based on the Affinity-Propagation (AP) clustering algorithm, termed AP-PBFT, is proposed. Firstly, the election strategy of the leader node is constructed based on the reputation mechanism; the reward and punishment mechanism is designed to achieve the dynamic adjustment of the reputation value of the nodes in the PBFT consensus process, and the number of votes among the nodes is introduced to determine the node’s reputation value in collaboration with the reward and punishment mechanism to guarantee the precise ordering of the nodes. Secondly, nodes with high reputation values are selected as cluster centers to run the AP clustering algorithm, and clustering groups of knowledge property transaction nodes are constructed based on responsibility and availability. Finally, the three-stage consensus process of the PBFT consensus algorithm is optimized, and the consensus task is decomposed into two layers: the intra-consensus group and the inter-leader node group, reducing the communication complexity of transaction data in the blockchain. Experimental findings indicate a significant performance improvement of the algorithm over the PBFT consensus algorithm in communication complexity, throughput, and consensus efficiency in the simulation environment of multiple types of transactions in intellectual property transactions, including different types of large-scale transaction scenarios, such as purchases, sales, licenses, and transfers. Full article
Show Figures

Figure 1

18 pages, 2384 KB  
Article
Delegated Proof of Stake Consensus Mechanism Based on Community Discovery and Credit Incentive
by Wangchun Li, Xiaohong Deng, Juan Liu, Zhiwei Yu and Xiaoping Lou
Entropy 2023, 25(9), 1320; https://doi.org/10.3390/e25091320 - 10 Sep 2023
Cited by 17 | Viewed by 5441
Abstract
Consensus algorithms are the core technology of a blockchain and directly affect the implementation and application of blockchain systems. Delegated proof of stake (DPoS) significantly reduces the time required for transaction verification by selecting representative nodes to generate blocks, and it has become [...] Read more.
Consensus algorithms are the core technology of a blockchain and directly affect the implementation and application of blockchain systems. Delegated proof of stake (DPoS) significantly reduces the time required for transaction verification by selecting representative nodes to generate blocks, and it has become a mainstream consensus algorithm. However, existing DPoS algorithms have issues such as “one ballot, one vote”, a low degree of decentralization, and nodes performing malicious actions. To address these problems, an improved DPoS algorithm based on community discovery is designed, called CD-DPoS. First, we introduce the PageRank algorithm to improve the voting mechanism, achieving “one ballot, multiple votes”, and we obtain the reputation value of each node. Second, we propose a node voting enthusiasm measurement method based on the GN algorithm. Finally, we design a comprehensive election mechanism combining node reputation values and voting enthusiasm to select secure and reliable accounting nodes. A node credit incentive mechanism is also designed to effectively motivate normal nodes and drive out malicious nodes. The experimental simulation results show that our proposed algorithm has better decentralization, malicious node eviction capabilities and higher throughput than similar methods. Full article
(This article belongs to the Special Issue Quantum and Classical Physical Cryptography)
Show Figures

Figure 1

14 pages, 1127 KB  
Article
A Survey of Research Participants’ Privacy-Related Experiences and Willingness to Share Real-World Data with Researchers
by Rachele M. Hendricks-Sturrup, Fang Zhang and Christine Y. Lu
J. Pers. Med. 2022, 12(11), 1922; https://doi.org/10.3390/jpm12111922 - 17 Nov 2022
Cited by 4 | Viewed by 2934
Abstract
Background: Real-world data (RWD) privacy is an increasingly complex topic within the scope of personalized medicine, as it implicates several sources of data. Objective: To assess how privacy-related experiences, when adjusted for age and education level, may shape adult research participants’ willingness to [...] Read more.
Background: Real-world data (RWD) privacy is an increasingly complex topic within the scope of personalized medicine, as it implicates several sources of data. Objective: To assess how privacy-related experiences, when adjusted for age and education level, may shape adult research participants’ willingness to share various sources of real-world data with researchers. Methods: An electronic survey was conducted in April 2021 among adults (≥18 years of age) registered in ResearchMatch, a national health research registry. Descriptive analyses were conducted to assess survey participant demographics. Logistic regression was conducted to assess the association between participants’ five distinct privacy-related experiences and their willingness to share each of the 19 data sources with researchers, adjusting for education level and age range. Results: A total of 598 ResearchMatch adults were contacted and 402 completed the survey. Most respondents were over the age of 51 years (49% total) and held a master’s or bachelor’s degree (63% total). Over half of participants (54%) had their account accessed by someone without their permission. Almost half of participants (49%) reported the privacy of their personal information being violated. Analyses showed that, when adjusted for age range and education level, participants whose reputations were negatively affected as a result of information posted online were more likely to share electronic medical record data (OR = 2.074, 95% CI: 0.986–4.364) and genetic data (OR = 2.302, 95% CI: 0.894–5.93) versus those without this experience. Among participants who had an unpleasant experience as a result of giving out information online, those with some college/associates/trade school compared to those with a doctoral or other terminal degree were significantly more willing to share genetic data (OR = 1.064, 95% CI: 0.396–2.857). Across all privacy-related experiences, participants aged 18 to 30 were significantly more likely than those over 60 years to share music streaming data, ridesharing history data, and voting history data. Additionally, across all privacy-related experiences, those with a high school education were significantly more likely than those with a doctorate or other terminal degree to share credit card statement data. Conclusions: This study offers the first insights into how privacy-related experiences, adjusted for age range and education level, may shape ResearchMatch participants’ willingness to share several sources of real-world data sources with precision medicine researchers. Future work should further explore these insights. Full article
Show Figures

Figure 1

19 pages, 6914 KB  
Article
A Blockchain-Based Efficient, Secure and Anonymous Conditional Privacy-Preserving and Authentication Scheme for the Internet of Vehicles
by Kashif Naseer Qureshi, Luqman Shahzad, Abdelzahir Abdelmaboud, Taiseer Abdalla Elfadil Eisa, Bandar Alamri, Ibrahim Tariq Javed, Arafat Al-Dhaqm and Noel Crespi
Appl. Sci. 2022, 12(1), 476; https://doi.org/10.3390/app12010476 - 4 Jan 2022
Cited by 35 | Viewed by 5361
Abstract
The rapid advancement in the area of the Internet of Vehicles (IoV) has provided numerous comforts to users due to its capability to support vehicles with wireless data communication. The exchange of information among vehicle nodes is critical due to the rapid and [...] Read more.
The rapid advancement in the area of the Internet of Vehicles (IoV) has provided numerous comforts to users due to its capability to support vehicles with wireless data communication. The exchange of information among vehicle nodes is critical due to the rapid and changing topologies, high mobility of nodes, and unpredictable network conditions. Finding a single trusted entity to store and distribute messages among vehicle nodes is also a challenging task. IoV is exposed to various security and privacy threats such as hijacking and unauthorized location tracking of smart vehicles. Traceability is an increasingly important aspect of vehicular communication to detect and penalize malicious nodes. Moreover, achieving both privacy and traceability can also be a challenging task. To address these challenges, this paper presents a blockchain-based efficient, secure, and anonymous conditional privacy-preserving and authentication mechanism for IoV networks. This solution is based on blockchain to allow vehicle nodes with mechanisms to become anonymous and take control of their data during the data communication and voting process. The proposed secure scheme provides conditional privacy to the users and the vehicles. To ensure anonymity, traceability, and unlinkability of data sharing among vehicles, we utilize Hyperledger Fabric to establish the blockchain. The proposed scheme fulfills the requirement to analyze different algorithms and schemes which are adopted for blockchain technology for a decentralized, secure, efficient, private, and traceable system. The proposed scheme examines and evaluates different consensus algorithms used in the blockchain and anonymization techniques to preserve privacy. This study also proposes a reputation-based voting system for Hyperledger Fabric to ensure a secure and reliable leader selection process in its consensus algorithm. The proposed scheme is evaluated with the existing state-of-the-art schemes and achieves better results. Full article
(This article belongs to the Special Issue Advances in Information Security and Privacy)
Show Figures

Figure 1

17 pages, 481 KB  
Article
Identifying the Types and Impact of Service Provider’s Responses to Online Negative Reviews in the Sharing Economy: Evidence from B&Bs in China
by Wenlong Liu, Rongrong Ji, Chen (Peter) Nian and Kisang Ryu
Sustainability 2020, 12(6), 2285; https://doi.org/10.3390/su12062285 - 14 Mar 2020
Cited by 13 | Viewed by 5113
Abstract
Online consumer complaints are closely related to business reputation and elicit managers’ persistent efforts. However, service providers in the sharing economy (SE) lack the skills to communicate with consumers because most are informal or nonprofessional property owners. This research aims to examine the [...] Read more.
Online consumer complaints are closely related to business reputation and elicit managers’ persistent efforts. However, service providers in the sharing economy (SE) lack the skills to communicate with consumers because most are informal or nonprofessional property owners. This research aims to examine the relationship between service providers’ responses and prospective consumers’ perceived helpfulness in the SE by using bed and breakfasts (B&B) as the sample. Response length and voice are adopted to measure the content quality of B&B’s response to an online complaint. Three types of voices (defensive, formalistic, and accommodative) are identified by analyzing service providers’ responses to negative reviews, among which the accommodative voice with empathic statements is the most effective. An inverted-U curve relationship between response length and helpfulness votes is verified based on cognitive load theory. Moreover, interactive effects between response length, review length, and images are also examined. This study suggests the investigation of online reviews from comprehensive perspectives, as well as the adoption of personalized strategies by SE practitioners to respond to consumer complaints. Full article
(This article belongs to the Collection Intention and Tourism/Hospitality Development)
Show Figures

Figure 1

24 pages, 561 KB  
Article
Robust and Cooperative Localization for Underwater Sensor Networks in the Existence of Malicious Anchors
by Wenyu Cai, Junlei Yang, Meiyan Zhang, Shiling Peng and Junyi Yang
Sensors 2019, 19(20), 4519; https://doi.org/10.3390/s19204519 - 17 Oct 2019
Cited by 9 | Viewed by 3400
Abstract
Precise and robust localization in three-dimensional underwater sensor networks is still an important research problem. This problem is particularly challenging if there are some malicious anchors among ordinary anchor nodes that will broadcast their locations falsely and deliberately. In this paper, we study [...] Read more.
Precise and robust localization in three-dimensional underwater sensor networks is still an important research problem. This problem is particularly challenging if there are some malicious anchors among ordinary anchor nodes that will broadcast their locations falsely and deliberately. In this paper, we study how to self-localize large teams of underwater sensor nodes under the condition that some malicious anchor nodes mixed with ordinary anchors. Due to malicious characteristic of some deliberate anchor nodes, an iterative and cooperative 3D-localization algorithm for underwater sensor networks in the existence of malicious anchors is proposed in this paper. The proposed robust localization algorithm takes advantage of distributed reputation voting method within 1-Hop neighboring reference nodes to detect and eliminate malicious anchor nodes. Moreover, one kind of Minimum Mean Squared Error estimation based iterative localization method is applied to determine accurate location information. Additionally, we analyze and prove that our localization algorithm would have a bounded error when the number of malicious anchors is smaller than a certain threshold. Extensive simulation results are provided to demonstrate performance improvements comparing to traditional Minimum Mean Squared Error and Attack Resistant Minimum Mean Squared Error based localization methods in terms of localization accuracy and coverage ratio. Full article
Show Figures

Figure 1

11 pages, 247 KB  
Article
Assessing Sustainability-Related Systematic Reputational Risk through Voting Results in Corporate Meetings: A Cross-Industry Analysis
by Marcos Vizcaíno-González, Susana Iglesias-Antelo and Noelia Romero-Castro
Sustainability 2019, 11(5), 1287; https://doi.org/10.3390/su11051287 - 1 Mar 2019
Cited by 3 | Viewed by 2890
Abstract
This research uses Sharpe’s single-index model to analyze voting results in corporate meetings, thus assessing whether voting results at the corporate level are influenced by aggregated voting results at the industry level. We use a sample of votes regarding managerial proposals concerning executive [...] Read more.
This research uses Sharpe’s single-index model to analyze voting results in corporate meetings, thus assessing whether voting results at the corporate level are influenced by aggregated voting results at the industry level. We use a sample of votes regarding managerial proposals concerning executive election and compensation. The companies involved are included in the five most represented industries in NASDAQ, and the analysis focuses on the 2003–2017 period. The votes were disclosed by institutional investors who are especially concerned with corporate governance and sustainability issues, so we consider that they reflect sustainability-driven decisions. Based on previous research linking voting results to reputational consequences, we assess the systematic component of sustainability-related reputational risk within these five industries, finding significant differences among them. Thus, although the systematic component of sustainability-related reputational risk appears to be strong for financial and technological companies, it is weak for healthcare, consumer services, and capital goods companies. Implications for researchers and practitioners are reported. Full article
10 pages, 247 KB  
Article
Glass Houses and Friends-and-Neighbors Voting: An Exploratory Analysis of the Impact of Political Scandal on Localism
by Franklin G. Mixon
Economies 2018, 6(3), 48; https://doi.org/10.3390/economies6030048 - 3 Sep 2018
Cited by 4 | Viewed by 5051
Abstract
The 2017 U.S. Senate Special Election in Alabama, which was decided on 12 December 2017, was one of the most contentious and scandal-laden political campaigns in recent memory. The Republican candidate, Roy Moore, gained notoriety during the 2017 campaign when a number of [...] Read more.
The 2017 U.S. Senate Special Election in Alabama, which was decided on 12 December 2017, was one of the most contentious and scandal-laden political campaigns in recent memory. The Republican candidate, Roy Moore, gained notoriety during the 2017 campaign when a number of women alleged to national media that as teenagers they were subject to sexual advances by Moore, who was then in his early 30s and serving as a local assistant district attorney. The process and results of this particular election provide the heretofore unexamined impact of political scandal on localism or friends-and-neighbors voting in political contests. Based on data from the 2017 special election in Alabama, econometric results presented here suggest that a candidate who is embroiled in political scandal suffers an erosion in the usual friends-and-neighbors effect on his or her local vote share. In this particular case, the scandal hanging over Moore eroded all of the friends-and-neighbors effect that would have been expected (e.g., about five percentage points) in his home county, as well as about 40% of the advantage Moore had at home over his opponent in terms of constituent political ideology. Full article
(This article belongs to the Special Issue Public Choice)
Back to TopTop