Lightcoin lost
In 2016, the global ranking of virtual currency is respectively as follows:
< H2 > bitcoin, Leyte, Ecuadorian, reborn, bitstock, doggy, Diablo, futurecoin, diandiancoin and Xingxing < H2 > first place: bitcoinsince its release in 2009, bitcoin has become the most well-known virtual currency. This virtual currency was developed by indivials or organizations under the pseudonym of "Nakamoto Tsung" (whose real identity has always been unknown), and is mainly used by online merchants. However, in recent years, some small physical merchants have begun to accept bitcoin payment. Through complex algorithms and a large number of computing resources, users can obtain bitcoin through "mining". Of course, they can also purchase bitcoin through exchanges or services like bitinstagnt and coinbase. The total amount of bitcoin that can be mined is about 21 million, while the current mining amount has exceeded 11 million. Bitcoin has attracted the attention of Western Union, MoneyGram and paypal. It is reported that these services are evaluating whether users are allowed to use bitcoin on their respective platforms
< H2 > second place: lightcoinlightcoin is inspired by bitcoin (BTC) and has the same implementation principle in technology. The creation and transfer of lightcoin is based on an open source encryption protocol and is not managed by any central organization. Lightcoin aims to improve bitcoin. Compared with bitcoin, lightcoin has three significant differences. First, the lightcoin network can process a block every 2.5 minutes (instead of 10 minutes), so it can provide faster transaction confirmation. Second, the lightcoin network is expected to proce 84 million lightcoins, four times the amount of money issued by bitcoin network. Thirdly, the scrypt encryption algorithm first proposed by Colin Percival is used in lightcoin's workload proof algorithm, which makes it easier to mine lightcoin on ordinary computer than bitcoin. Each Leyte coin is divided into 100000000 smaller units, and the third place is defined by eight decimal places: Ecuadorian currency. In December 2014, Ecuador launched the "electronic currency system"
Ecuadorian currency, or EDC, which is a digital currency issued by the Central Bank of the government of Ecuador. In December 2014, the Ecuadorian market was launched, In 2015, the number of Ecuadorian currency members reached 500000, which will be recognized and sought after by investors after launching the European market and Asian market in 2015, and achieve a complete success. It will strongly launch the Chinese market at the end of September 2016, and will issue a limited number of 50 million pieces in China, which has a strong scarcity! This is an international hot topic with a wide range of admirers in the world. Historical currency is a kind of P2P digital code. Ecuadorian currency is not issued by a specific monetary institution. It is generated by a large number of calculations based on a specific algorithm. Ecuadorian currency economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions
decentralized encrypted digital currency has no issuing institution, and it does not belong to any indivial, institution, bank or country, so it cannot be shut down. Ecuadorian coin mining machine is mining 24 hours a day, and the extracted Ecuadorian coin can be traded through the trading platform to obtain profits. Ecuadorian coin mining refers to the scrypt algorithm, The process of collecting and sorting the transaction information that has not been recognized by Ecuadorian currency in the past period of time, broadcasting to all nodes in the whole network, and finally being recognized by all nodes and getting Ecuadorian currency. Mining is the only way to issue new currency, which plays an important role in issuing new currency, maintaining Ecuadorian payment function and ensuring system security
Like bitcoin, XRP is a digital currency based on Mathematics and cryptography. However, unlike bitcoin, XRP has no real purpose. XRP has the main function of bridging currency and ensuring security in ripple system, among which the function of ensuring security is indispensable, This requires that all gateways participating in this protocol must hold a small amount of XRPin theory, gateways don't need to buy many xrps, and their prices are very cheap. One XRP is only 0.4 cent (as of March 14, 2015, its price has risen to about 1 cent). Like bitcoin, the number of xrps can not be "over issued" (the total number is 100 billion), but since a small amount of xrps will be destroyed in each transaction, it means that the number of xrps will graally decrease. If ripple protocol can become the global mainstream payment protocol, the gateway's demand for XRP will be more extensive - the demand is strong but the quantity is decreasing, which will lead to the appreciation of XRP
< H2 > fifth place: bitstocksbitstocks adopt an architecture similar to bitcoin blockchain. In the bitcoin blockchain architecture, each transaction data must be written from the previous transaction data, and new outputs are generated almost at the same time to be used for future transaction data writing. Each stroke can only be used once under certain conditions. Each transaction output contains the balance information of bitcoin, proving that it can be used for future transactions. In order not to proce bitcoin out of nothing, the write value of the transaction must be greater than the output value
bitcoin uses a simple script language to evaluate the situation that the balance is insufficient when the transaction is output; However, most of the transaction output only needs the holder's encrypted signature
< H2 > sixth place: dogcoindogcoin, some people call it "dogcoin", was born on December 8, 2013, based on the scrypt algorithm, is the second largest virtual currency in the world after bitcoin in the number of users [1]. Digital currency is a global currency initiated by non-governmental organizations. It does not belong to a certain country, but belongs to the whole mankind. It has the advantages of fast global transfer. For example, it can remit money from China to the United States in a few seconds, with low cost, and the total amount will not be increased at will like legal money, so the total amount is relatively stable
after the launch of dogcoin system, e to the help of reddit (the doge content on this website overflows horribly), the traffic shows an explosive development. However, in two weeks, dogcoin has launched a special blog and forum, with a market value of 100 million as of June 9, 2015. Because there is no pre dig, dog coin distribution is fair, charity, reward culture is popular, and user development is amazing and rapid. On June 9, 2015, the number of Dog Coin client addresses was 1.6 million, more than five times that of Wright coin; The number of active client addresses is 196000 in bitcoin, 83000 in dogcoin and 11000 in lightcoin; There are more than 150000 foreign Twitter users, 1.7 times of bitcoin and 6 times of lightcoin. Facebook likes are the same as bitcoin, far more than lightcoin [2]. The daily real transaction volume has been ranked in the top three of virtual currency for a long time, which is still not as good as the result obtained before the big platform [3]. The biggest value of the enterprise Internet era is the huge number of users. It took one year for the user base of dogcoin to reach one third of the number of bitcoin users, and the seventh place is lightcoin, which is four times the number of bitcoin users. A special solution is one of the infinite (in fact, bitcoin is finite) solutions that can be obtained from the equations. Every particular solution can solve the equation and is unique[ 8] In the metaphor of RMB, black money is the serial number of RMB. If you know the serial number of a note, you have the note. The process of mining is to constantly seek the special solution of the equation system through huge amount of calculation. The equation system is designed to have only 22 million special solutions, so the upper limit of bitcoin is 22 million[ 8]
to mine the dark coin, you can download the special dark coin calculation tool, register various cooperative mine pool websites, fill the registered user name and password (miner user) into the calculation program, and then click the operation to officially start. After completing the installation of the darkcoin client, you can directly obtain a darkcoin address. When others pay, you only need to post the address to others, and you can pay through the same client. After installing the Black Coin client, it will distribute a private key and a public key. You need to back up your wallet data containing your private key to ensure that your property is not lost. Unfortunately, if the hard disk is completely formatted, the personal dark coin will be completely lost
You should be talking about the loss of bitcoin account password of bitcoin trading platform or online wallet. There are generally three solutions:
1. Retrieve or reset the password through the bound mobile phone number or email
2. Help people find or reset their passwords through customer service staff
3. Retrieve or reset the password by submitting the real name authentication information h2>
digital currency is a kind of unregulated and digital currency, which is usually issued and managed by developers and accepted and used by members of specific virtual communities. The European Banking authority defines virtual currency as a digital representation of value, which is not issued by the central bank or authorities, nor linked with legal currency. However, because it is accepted by the public, it can be used as a means of payment, or it can be transferred, stored or traded in electronic form.
keeping a backup of your wallet in a safe place can protect your wallet from computer failure and many human errors. If you encrypt your wallet, it can also be used to restore your wallet when your mobile phone or computer is stolen
back up your entire wallet
some bitcoin wallets use many hidden private keys inside. If you only back up the private key of the visible bitcoin address, most of the money may not be recovered from the backup
encrypt online backup
any online backup is easy to be stolen. Even a computer connected to the Internet is vulnerable to malware. Therefore, it is a good security habit to encrypt any backup exposed to the network
using multiple secure repositories
single point of failure is not concive to security. If your backup is not limited to only one place, it is less likely that something bad will happen and your wallet will not be restored. You can also consider using different storage media, such as USB flash disk, paper and CD-ROM
regular backup
the wallet needs to be backed up regularly to ensure that all the latest bitcoin change addresses and newly created bitcoin addresses are included in the backup. However, soon all applications will use wallets that only need to be backed up once.
1. Concept
here we want to explain an important concept in media streaming processing time coding
time coding is an auxiliary data for video and audio streams. It is contained in video and audio files, which we can understand as timestamps<
SMPTE timecode is the sum of SMPTE time and control code. It is a continuous digital address frame, symbol and additional data in video and audio stream. It is defined in ANSI / smpte12-1986. Its purpose is to provide a video and audio address that can be processed by a computer
the data structure of the most SMPTE time code is an 80bit frame, which contains the following contents:
A, a HH:: mm:: SS:: FF (hour:: minute:: Second:: frame) format timestamp
B. eight 4-bit binary data are usually called "user bits"
C, different flag bits
D, synchronization sequence
e, validation and
this format is defined as timecode in DirectShow_ SAMPLE
time code is divided into two forms, one is linear time format LTC (vertical coding), in continuous time, each time code represents a frame. Another time code is VitC (horizontal encoding), which stores two lines of video signal in the vertical blanking interval, some places between 10 and 20
it is very easy to add LTC time code to video tape, for example, because it is a separate audio signal coding. But it can't be read when the tape drive pauses, slows down, or fast forward. In addition, in the non professional video recorder, it may lose a channel of audio signal
unlike LTC, VitC time code can be read at 0-15 times speed. It can also be read from the video capture card. But if it wants to be recorded on tape, it may need some other equipment, which is usually more expensive
SMPTE time code supports two modes at the same time, one is non lost frame mode, the other is lost frame mode. In non lost frame mode, the time code is continuously recorded. It can complete real-time playback up to 30 frames or higher
the video playback standard of NTSC system is 29.97 frames per second, which is e to the compatibility of monochrome TV system. This leads to a question: in the non frame dropping mode, 108 frames will be out of sync in one hour. That is, in one hour of real time, the time code is read only at 00:59:56:12. When you calculate the playback time of streaming media, there will be some problems. In order to solve this problem, we can implement frame skipping in tolerable circumstances. This method is realized by skipping two frames at the beginning of counting per minute, but not at 00, 20, 30, 40 and 50 minutes. Using this scheme, our network test results show that the error is less than one frame per hour, and the error is about three frames per 24 hours
in the present practical work, although the two modes are provided at the same time, the Dezhen mode is usually adopted by us<
2. Typical application of time code
controlling peripheral devices for video capture and editing is a typical application. This kind of application needs to identify each frame of video and audio frames. The method they use is to use SMPTE time code. Linear editing systems usually control three or more tape machines, and switch video between CD recorders as much as possible. The computer must execute the command accurately, so it must get the address of the designated location of the video tape at a specific time. There are many ways to use time code in application programs, mainly including the following:
A, tracking video and audio sources in the whole editing process
b, synchronizing video and audio
C. synchronize multiple devices
D. use undefined bytes in the time code, which are called userbits. This usually includes date, ASCII code or instrial information of the movie< In general, time code is generated by some capture card devices which have the ability to generate time code. For example, an RS-422 needs a time code to control the communication between the peripheral device and the host
after the generation of time code, we need to obtain the time code from the streaming video and audio, which can be accessed later. Then we deal with the time code through the following two steps:
A. establish a discontinuous index of each frame position, and correspond the time code to each frame one by one. This list is written at the end of the file after capture. The list can be a matrix array with the following structure. For the sake of simplicity, only DirectShow timecode is provided here_ A simplification of sample structure< br />
struct {
DWORD dwOffset; // The offset in the frame
char [11] SZTC// The value of time code in offset value
/ / HH: mm: SS: FF is the format of non frame dropping HH: mm: SS; FF is the format of frame dropping
} timecode
for example, we can give a time code in the video capture stream:
{0, 02:00:00:02},
{16305, 15:21:13:29} / / the time format of 16305 frames
using this table, the time code of any frame can be calculated well
B. another method is to write the time code as video and audio data. We do not recommend the use of this, so we will not introce it
the files written in the time code can be edited, compounded, synchronized, etc. That's enough for us to understand the time code. Many others are about the introction of standards. You can refer to them if you are interested.
