Blockchain storage space
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. Blockchain is an important concept of bitcoin,
in essence, it is a decentralized database. At the same time, as the underlying technology of bitcoin, it is a series of data blocks generated by using cryptographic methods. Each data block contains a batch of information of bitcoin network transactions, Used to verify the validity of its information (anti-counterfeiting) and generate the next block
extended data
most blockchain public chains are limited by scalability. The biggest feature of blockchain technology is decentralization, which requires that all accounts in the network need to deal with the accounting process. Distributed accounting has high security, low misoperation rate, political neutrality and correctness
however, blockchain technology embraces these features at the same time, sacrificing scalability, unable to meet the personalized supervision, and slightly insufficient in protecting data privacy. Moreover, with the increase of the number of ledger, the interaction delay will increase exponentially, that is to say, the more ledger in the blockchain network, the higher the delay
1. Hardware and infrastructure, the typical miner proction, distribution chain, where you can buy miner, mining to earn money
2. The underlying platform of blockchain and common technologies, such as Ethereum and other public chains, and the privacy protocol nucypher, where you can make money by investing in its token, building applications on the chain, and providing services for users
3. Various vertical applications, such as supply chain traceability and Finance Based on blockchain, right confirmation and trading, can be used or invested to make money
Service facilities, such as digital asset exchange and wallet, media procts, etc., you can make money by making your own exchange
extended data:
the characteristics of blockchain
1. Decentralization
blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain
2. Openness
the foundation of blockchain technology is open source. In addition to the private information of all parties involved in the transaction is encrypted, the data of blockchain is open to everyone. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent
3. Independence
based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention
With the rapid development of Internet technology, it has brought us infinite wonderful and convenient life. At the same time, with the continuous improvement of 5g network, container cloud and high-performance storage hardware, data growth has entered an unprecedented stage of development
AR, VR, Internet of things, edge computers and other devices available everywhere generate a continuous stream of data, just like an open water pipe, the data source has been flowing out. The data generated will increase geometrically. At this time, the storage technology of blockchain will be demonstrated. A few years ago, there was an excellent IPFs project in the blockchain storage technology
{rrrrrrr}
yottachain takes the blockchain as the underlying technology and develops a powerful incentive scheme for miners. With 1GB
of space invested by miners, yottachain can generate 5-10gb of storage capacity, which proces the miracle effect that the purchasing power of digital currency obtained by resource suppliers exceeds the resources they supply
I hope I can help you:
webpage link
abey blockchain technology is from Ciprian pungela & amp; Co., two doctors in the Department of artificial intelligence from the Department of computer science, School of mathematics and information, Western University of timishwara, Romania; Vorel negru's own research project. Constant lightweight blockchain technology and multi-layer programming and extended blockchain solution are adopted. The scale of abey's blockchain remains unchanged, with only 50 active blocks. Abey blockchain technology is suitable for the use of e-money in e-commerce system for mass transactions, and has multi-level, scalability and security, and can be programmed
according to the official white paper, abey is suitable for the blockchain solution in e-commerce system, which uses digital currency to carry out mass transactions and can carry out multi-layer programming and expansion
specific implementation method of abey blockchain Technology:
using a multi-level and programmable blockchain method to realize digital currency (for simplicity, we call it "DC"). This method can pave the way for the implementation of various e-commerce purposes, such as loan financing, completion of refundable transactions and non refundable transactions. In the first layer of the blockchain, we can realize the inherent digital currency design, which is commonly referred to as the base layer ("FL"). The various upper layers built on this foundation can be used to describe various additional functions related to various business driven application examples (which we will briefly introce below). All of the above levels are fully programmable, and can be easily adapted for various applications
although most of today's digital goods store transaction balance in the blockchain, abey's method is more similar to Pascal coin digital currency. This method uses what we call a "vault" encryption structure“ The "vault" structure can only save the balance of all accounts in the network, instead of a complete list of all completed transactions, and can be reconstructed in the evolution history of the blockchain. Since vault allows the deletion of useless content at any time, it can significantly rece the storage cost of blockchain. In contrast, at the time of writing this article, the storage space required to download bitcoin database is 70gb (the alarm rate is still growing, and it is expected to reach 300gb in 2019), so it is not feasible to use ultrabooks or notebooks with small storage space (such as 120GB or 256gb) to carry out mining operation. On the other hand, the size of the abey blockchain will remain unchanged, with only 50 blocks (at the time of writing, there are more than 525000 blocks in the bitcoin blockchain)
vault fully supports digital currency transfer between accounts. In addition, vault can assign an owner defined name to each account instead of using hashing algorithms like today's cryptocurrency - which makes the account easier to remember and makes the name public
one of the important functions that vault can help prevent the daily expenses of blockchain from being too high (especially those related to transaction history) is that vault can save such states and rece the size of blockchain itself by creating a secure of blockchain states. Because there is no transaction history and all accounts can save their direct balance, the blockchain information has the feature of partial erasure. All the blockchain states that can be stored can be regarded as landmarks of the blockchain
secure data sharing:
through the block chain structure design, for each transaction sent to the network, the block chain may contain encrypted metadata. The metadata can only be decrypted by the transaction recipient. For the transaction sent to the network, the sender's public key is included in the transaction, and the transaction receiver decrypts the metadata using the public key. Since the transaction receiver holds the private key for decryption, only the transaction receiver can implement the data decryption process. From the perspective of encryption method, although bitcoin is limited to elliptic curve cryptography, blockchain metadata can use any other encryption mechanism to complete the encryption process. This not only provides complete flexibility in security selection, but also does not have any adverse impact on the structure or function of the blockchain
scalability:
since the abey blockchain supports the creation of historical landmarks by design, it is very easy for the network itself to achieve high scalability from the point of view that the blockchain will always need to store (related to the latest existing SLS). This method completely eliminates the need to store transaction history to calculate the balance of all accounts, and can directly store all account balances, so as to ensure that the specific balance information provided by all nodes in the network meets the requirements of Byzantine consistency
proof of security and workload:
it is impossible to have two-way payment operation in abey's method (in the specified appropriate scenario, the vast majority of today's mainstream cryptocurrencies may theoretically have two-way payment operation). Each transaction means that the balance of the corresponding account is updated in a relatively simple way, and there is no special way to restore the transaction from the network pending transaction team. For the abey blockchain, since all technical / functional layers are built on vault, vault is the infrastructure of our blockchain, so vault is very important for mining operations. Our proposed blockchain model is composed of a series of blocks, each of which is generated by the nodes in the network who are willing to mine. All nodes in the network can update the account balance independently according to the transaction (part of the block), and are independent of other nodes. The mining operation will affect the first functional layer. In addition to updating the balance, each node can also update other matters that may belong to the upper functional layer in the composition of the blockchain structure. Once an update occurs, a new mining incentive block will be created. The mining reward block contains a number of new reward accounts that have been assigned to miners. The miner is the winner of the above reward according to the workload Certificate (currently there are 50 reward accounts). The way to reward is to distribute the public key of all such accounts to the reward recipient
blockchain technology layer:
abey's digital currency model contains a multi-layer structure, in which the first layer represents the realization of the digital currency itself (see Figure 7 for graphic explanation). The corresponding levels include:
tier 1 → digital currency (cryptocurrency): currency transfer, mining
tier 2 → refundable transaction and non refundable transaction: allowing the use of digital justice system to complete refundable transaction
Tier 3 → related parties and commission: allowing the automatic distribution of Commission to related parties
Tier 4 → contacting currency: by lending currency, Income based on interest
layer 5 → programmable: reserved for future realization of Turing complete programming model, so as to process blockchain data in a customized way (such as smart contract)
layer 6 → custom protocol: reserved for future use
transaction type:
abey mode allows different levels in blockchain through design, Complete a variety of transaction types. The transaction types in the second layer are as follows:
1 → fund transfer: fund transfer between accounts (1-to-1 transfer)
2 → refundable fund transfer: refundable transaction between accounts. Use escrow balance instead of regular account balance
3 → key change: change the key that can be used to process the account
4 → restore the account: recover funds from the lost and invalid account
5 → set account name: define the name of the account held by the founder
6 → sales preparation: mark the account for sale
7 → move out of the sales queue: remove the account sales mark, And the account is marked as non saleable
refundable transaction and mediator:
for the vast majority of cases, non refundable transaction is equivalent to all "pay to pay" transactions in blockchain based digital currency mode. But abey has introced the concept of refundable transactions into its digital currency model. In abey mode, the transaction marked with small flag belongs to refundable or non refundable transaction. In addition, in abey's blockchain network, each account contains two types of balance: regular and unchangeable balance (used to mark the amount that the account has received and can be paid immediately, but cannot be recovered after the payment) and escrow balance (including the transaction list marked as refundable transaction and the minutes of each transaction)
8 → payment dispute: for the corresponding transaction that has been marked as a refundable transaction, the payment dispute can be initiated only by the payer
9 → refund request: for the corresponding transaction previously marked as a refundable transaction, a refund request can be initiated, but only by the payer
10 → cancel escrow: cancel the escrow funds and return the funds to the payer immediately. It can only be initiated by the payee
11 → release trusteeship: release the trusteeship fund and add the amount to the balance of the payee's account immediately. It can only be initiated by the payer
related parties and commissions:
one of the important deficiencies in today's blockchain driven financial technology is the lack of the ability to provide rewards to related parties who sell specific procts or services. The third layer of abey blockchain can solve this problem< Lending digital currency:
lending digital currency is not only a simple and quick way to allow people to borrow legal tender, but also to ensure the security of encrypted assets. Given that today's valuable digital currencies are also used for transactions, the reason why lending digital currencies is feasible is not only that it allows borrowers to mortgage any type of cryptocurrency they save, but also that it is attractive because it is a way to retain their digital assets in a completely safe or very low-risk way. In addition, abey's model also provides built-in protection through the customer vault lending gateway (VLG), and enables the VLG to act as a buffer between the lender and the borrower
12 → borrowed funds: the borrower initiates transactions in the network, announces the intention of borrowing funds, and specifies the VLG account of the borrowed funds. The transaction is similar to depositing the balance of the regular / escrow account in the selected VLG account
13 → return of collateral: the transaction is initiated by the VLG itself. VLG will return the collateral to the borrower in accordance with the risk management policy
14 → loan repayment: the transaction is initiated by the borrower. If VLG accepts repayment of the loan in digital currency, the borrower may choose to repay the loan in digital currency. Under this condition, the digital monetary fund will be converted into VLG regular account balance<
programmable blockchain:
with its associated metadata payload, the layer of blockchain can be retained to allow the further creation of intelligent contracts between peers in the network by executing the grammar based "complete Turing basic programming language" according to the original blockchain data processing mode. For each payload, encryption or public visibility processing can be implemented, and can be performed in a dedicated virtual environment (similar to a virtual machine). This method can effectively protect data security and avoid the impact of data destruction and security vulnerabilities. The main advantage of this method is that this layer can create and enforce digital contracts without any blockchain specific programming. For Ben
2. Radiation engineers have less damage to armored combat vehicles
3. Radiation engineers have no damage to spiders and mining vehicles
4. Radiation engineers have no damage to buildings
these are the original data
1. The "load" in dispatching is the electric quantity, unit: degree, also is kilowatt hour, kW & 8226; h;
load is not a constant value, but a variable value with time. Because the electrical equipment does not run at the same time, even at the same time, not all can reach the rated capacity. In addition, the working system of each electrical equipment is different, including long-term, short-term and repeated short-term
2. "Load" used in power flow calculation refers to the outgoing power flow of a node, which is the power
S=P+jQ
where p is active power
unit: W, kW, MW
q is reactive power, unit VaR, kvar, Mvar
s is complex power, unit VA, KVA, MVA
in design, if the capacity of each electrical equipment is simply added up as the basis for selecting conctor, cable section and electrical equipment capacity, the equipment will be under loaded, resulting in a waste of investment and non-ferrous metals; If it is too small, overload operation will occur
the result is either uneconomic, or overheating insulation damage and line loss increase, which will affect the safe operation of wires, cables or electrical equipment, and even cause fire accidents. Therefore, the load calculation is only close to the actual capacity
the total load of power system is the sum of the total power consumed by all electrical equipment in the system; By adding the power consumed by instry, agriculture, posts and telecommunications, transportation, municipal administration, commerce and urban and rural residents, the comprehensive power load of power system can be obtained; The power of comprehensive power load plus network loss is the power that each power plant in the system should supply, which is called the power supply load (power supply) of power system; The power supply load plus the power consumed by each power plant itself (i.e. auxiliary power) is the power that should be generated by each generator in the system, which is called the generation load (generation capacity) of the system
the load is a random change, every time the electrical equipment starts or stops, the corresponding load will change, which can be found to have a certain regularity to some extent. For example, some loads change to a certain extent with seasons (summer and winter) and enterprise working system (one shift or shift operation). The regularity of its change can be described by load curve: the so-called load curve refers to the graph of active and reactive load changing with time of electrical equipment in a certain period of time, which constitutes active load curve (P) and reactive load curve (q) respectively
Deflection refers to the linear displacement of the axis of the member perpendicular to the axis or the central plane of the shell perpendicular to the central plane when the force or non-uniform temperature changes
the deflection of slender body (such as beam or column) refers to the displacement of each point on its axis in the normal plane of the axis at that point. The deflection of thin plate or shell refers to the displacement of each point on the middle plane normal at this point. The rule that the deflection of each point on the object changes with position and time is called deflection function or displacement function
the deflection observation of building includes the deflection observation of building foundation, building main body and independent structure (such as independent wall and column). For high-rise buildings, when there is a large concentrated load on a small area, it may lead to the settlement of the foundation and buildings. The uneven settlement will lead to the inclination of the building, the bending of local components and the generation of cracks
extended data
1. Deflection calculation formula: ymax = 5ql ^ 4 / (384ei) (EI is the bending stiffness of beam under uniform load q)
deflection is related to load size, member section size and material physical properties of member
Deflection the linear displacement of the centroid of the cross section along the direction perpendicular to the axis ring bending deformation is called deflection γ Expressionrotation angle the angle at which the cross section turns relative to its original position ring bending deformation is called rotation angle θ Expression
The traditional bridge deflection measurement mostly uses dial indicator or displacement meter to measure directly, which is still widely used in bridge maintenance, old bridge safety assessment or new bridge acceptance