Research Article
[Retracted] Application of Blockchain Technology in Supply Chain Finance of Beibu Gulf Region
Table 6
Comparison of the number of times that malicious nodes were selected as master nodes under different weight coefficients.
| Consensus times | Algorithm | k1 = 0.01, k2 = k3 = 0.37 | k1 = k2 = k3 = 0.33 | k1 = 0.87, k2 = k3 = 0.01 |
| 10 | 0 | 0 | 0 | 0 | 20 | 15 | 14 | 13 | 12 | 30 | 28 | 26 | 19 | 22 | 40 | 24 | 23 | 27 | 25 | 50 | 36 | 29 | 25 | 23 | 60 | 42 | 31 | 29 | 28 | 70 | 38 | 37 | 36 | 34 | 80 | 48 | 45 | 44 | 41 | 90 | 54 | 52 | 49 | 47 | 100 | 61 | 57 | 50 | 49 |
|
|