Hash function mining
You can refer to the following, according to some commonly used graphics cards in the Internet bar market, sort out the price and calculation power of a related graphics card, as well as the expected return to the current period, It can be used as a reference:
{rrrrrrr}
power consumption: 243w
computing power: 22.4m
price of graphics card: 1999 yuan
quantity of eth g every 24 hours: 0.015
revenue generated every 24 hours: 24.48 yuan
expected payback time: 81.66 days
power consumption: 159w
computing power: 24.3m
price of graphics card: 1599 yuan Yuan
number of eth g every 24 hours: 0.017
revenue generated every 24 hours: 27.9 yuan
estimated payback time: 57.31 days
total power consumption: 171w
computing power: 24.4m
price: 1999 yuan
number of eth g every 24 hours: 0.017
revenue generated every 24 hours: 27.87 yuan
estimated payback time: 71.73 days
Video card (graphics card) full name display interface card, also known as display adapter, is the most basic configuration of computer, one of the most important accessories. As an important part of the computer host, the graphics card is the equipment of digital to analog signal conversion, and it undertakes the task of output display graphics
the graphics card is connected to the main board of the computer, which converts the digital signal of the computer into an analog signal for the display. At the same time, the graphics card still has the ability of image processing, which can help the CPU work and improve the overall running speed. For those engaged in professional graphic design, graphics card is very important. Civil and military graphics chip suppliers mainly include amd (ultra micro semiconctor) and NVIDIA (NVIDIA). Today's TOP500 computer, including graphics card computing core. In scientific computing, graphics card is called display accelerator
hash algorithm is a cryptographic algorithm that can only encrypt, but not decrypt. It can convert any length of information into a fixed length string
this string has two characteristics:
1. Even if the input value changes only a little, the output hash value will be very different
2. Only exactly the same input value can get exactly the same output value
3. There is no rule between the input value and the output value, so the input value cannot be calculated by the output value. In order to find the specified output value, we can only use enumeration method: constantly change the input value to find the output value that meets the conditions
hash algorithm ensures that the results of bitcoin mining can not be deced reversely. Therefore, the miner's continuous operation is essentially brutally cracking the correct input value. Whoever finds the first one will get the bitcoin reward.
-
bitcoin is a string of code generated by an open-source P2P software, which we call cryptocurrency, e-currency and so on. Bitcoin is proced by mining. Generally speaking, bitcoin mining is to use your hardware to calculate the mathematical problems of sh265 algorithm, confirm network transactions, and ensure the security of the whole network system. As a reward, bitcoin system will give a certain amount of bitcoin reward according to the amount of computing power contributed by miners
-
mining is bitcoin. Bitcoin will be generated several times every other period of time, and whoever grabs it will own it. The computer connected to the bitcoin system is the tool "miner" for grabbing bitcoin. As for the issue of national recognition of bitcoin, simply speaking, it depends on the possible impact on the country< br />
1. Delete the original ethash folder and create a folder with the same name. Then set the folder property to [read only]
2. Search deploy64 and rbcentry.dll files, And then smash them with the drug bully's files
In today's era of high development of the Internet, we are using the Internet more and more frequently, which has become an indispensable and important tool in our life. In particular, the mobile phone used for Internet communication has been used as a medium. In today's era, we are using mobile payment more and more, There are more and more ways to move. So what is digital currency? What do you know about it{ But generally speaking, it is a form of money< p> Finally, for such a form of transaction, it's all for the convenience of our daily life, and it's also for serving our own broad masses of people, so we don't have to worry about the advantages and disadvantages of digital currency and mobile payment
1 - data layer: data block, chain structure and time stamp
2 - network layer: P2P network, propagation mechanism, verification mechanism
3 - consensus layer: pow, POS, dpos
4 - incentive layer: issuance mechanism, distribution mechanism
5 - contract layer: script code, algorithm mechanism, smart contract
6-application layer: encapsulates various application scenarios
in the future, jinwowo group will focus on promoting the legal circulation and commercial application of big data with blockchain technology.
Hash algorithm maps any length of binary value to a fixed length of smaller binary value, which is called hash value. Hash value is a unique and compact numerical representation of a piece of data. If you hash a piece of plaintext and change only one letter of the paragraph, subsequent hashes will proce different values. It is computationally impossible to find two different inputs with the same hash value
message authentication code (MAC) hash function is usually used with digital signature to sign data, while message detection code (MDC) hash function is used for data integrity
the basic information of bitcoin network is as follows:
all digital currencies that need to be mined have hash values, such as Laite coin, Ruitai coin, doggy coin, Weimeng coin, Diandian coin, Yuanbao coin, etc< br />