Position: Home page » Equipment » What are the algorithms for mining

What are the algorithms for mining

Publish: 2021-04-11 03:58:46
1. At present, only a few algorithms of virtual currency are meaningful, such as XPM (prime currency, used to solve prime numbers), GRC (Greider currency, used for scientific operation), etc. I have been using CPU to dig XPM, although my income is limited. In fact, these currencies also have the excellent properties of bitcoin, but they are not favored by most virtual currency lovers. The price is very low, which is really distressing.
2. Qwertycoin, which has been popular recently, was built by the geek team in Germany for 18 months. It is a secure anonymous coin that focuses on privacy and is used for global
secure payment. Qwc has no pre excavation and ICO, and adopts cryptonight algorithm (supporting mainstream mining machine X3 and A8 +) POW mining.
3.

Mining is the use of bitcoin mining machine, which is used to earn bitcoin

one of the ways to get bitcoin is that users download software from personal computer and then run specific algorithm to get corresponding bitcoin after communicating with remote server

bitcoin is a kind of virtual currency. Bitcoin mining system is the process of carrying out mathematical operation for bitcoin network through computer hardware. Miners who provide services can get a reward, because the network reward is calculated according to the tasks completed by miners, so the competition for mining is very fierce

mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it's only hd6770, can surpass the single graphics card of most users

and this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Considering the hardware price and other costs, there is a considerable expenditure in mining

< H2 > extended data:

bitcoin mining process:

1. To find the ore pool

to start mining, there must be a ore pool with convenient operation and stable output. Its function is to subdivide the data packets for each terminal, and pay the corresponding amount of bitcoin according to the proportion of the data packets calculated by the terminal through precise algorithm

2. Download bitcoin miner (software)

in fact, there are many kinds of this miner, you can go to the official website to download

3. Setting mining software is a green software. After installation, we can set the language first to facilitate further setting. Next, you need to set the server, user name, password, equipment and so on. Generally, the server chooses a better network from BTC guide series, and the user name and password are set by ourselves before

4, bitcoin mining start

when we confirm that all settings are correct, click the "start mining" button to start bitcoin mining, and then the graphics card will soon enter the full speed running state, the temperature and fan speed will increase, you can monitor the state through gpu-z or graphics card driver

4. In order to know what mining is calculating, we must first know the essence of bitcoin and its proction process. Bitcoin is a network-based electronic currency, which is actually a string of codes of the Internet, calculated by algorithms. Mining is the process of completing the algorithm and the only way to proce bitcoin. And because of the algorithm, there are only 21 million bitcoins
1. Mining can not only proce bitcoin, but also guarantee transaction information
similarly, a mathematical system contains 21 million mathematical problems, so we need to constantly seek the special solution of each mathematical problem through a huge amount of calculation. In addition, the special solution is unique
mining can not only increase the supply of bitcoin money, but also protect the security of bitcoin transactions and prevent fraulent transactions. In terms of process, bitcoin network is a point-to-point payment system, and anyone can trade through the transaction program
in order to ensure that the transaction process is truthfully recorded, the role of "miner" is required to be responsible for recording bitcoin transaction information. The time interval is 10 minutes. The best recorded transaction records among miners will be packaged and stored in a new block, and the corresponding miners will also receive a certain amount of bitcoin rewards
2. The mining process is extremely complex, which is beyond human power
the specific process is as follows. When a miner listens to the transaction, he will first verify the transaction information. The verified transactions will be recorded by miners and stored in their own database. There may be thousands of miners in the world doing the same thing, but every ten minutes, only one miner has the right to create a new block, so that the transaction information recorded by himself can be recognized and stored permanently
next, miners need to fight for the right to keep accounts. This is a competition of computing power. The core of this competition is to use computers to complete a large number of calculation tasks and find a super difficult random number. This random number is the special solution of the equation mentioned in the first paragraph. The miner who calculates the correct random number first wins. According to the rules of the game, the probability of a miner getting the accounting right is directly proportional to the proportion of his computing power in the total computing power of the whole network. In other words, the probability of finding the random number is equivalent to throwing out 100 million dice, and the total number of dice is less than 150 million. Therefore, mining requires a large number of computers, installation of specific algorithm software, repeated operation day and night, not human
3. Bitcoin mining is actually "villagers' bookkeeping"
maybe some netizens still don't understand, let's take an example. In a village, the villagers often borrow money from each other, even if they write a written document, there is a risk of default. Then, every time there is a loan behavior in the village, we will use the village trumpet to inform everyone that all the villagers (miners) will record all the transaction records in their own account books.
5. To put it simply, mining is to get the corresponding return through the computing power contributed by the computer. Ethash algorithm is based on a large, instantaneous, arbitrarily generated dagger part data set, trying to solve a specific constraint, which is partially determined by the block Title hash
6.

Hash algorithm maps any length of binary value to a fixed length of smaller binary value, which is called hash value. Hash value is a unique and compact numerical representation of a piece of data. If you hash a piece of plaintext and change only one letter of the paragraph, subsequent hashes will proce different values. It is computationally impossible to find two different inputs with the same hash value

message authentication code (MAC) hash function is usually used with digital signature to sign data, while message detection code (MDC) hash function is used for data integrity

the basic information of bitcoin network is as follows:

all digital currencies that need to be mined have hash values, such as Laite coin, Ruitai coin, doggy coin, Weimeng coin, Diandian coin, Yuanbao coin, etc< br />

7. Vein tin ore is different from placer tin ore. vein tin ore exists in rocks and forms deposits or ore beds with other metal or nonmetal minerals. The beneficiation process of vein tin ore is more complex than that of placer tin ore, but in actual proction, gravity separation is still often used to treat vein tin ore, but the specific process also includes grinding, washing, separation and other operations
Gongyi hi tech machinery factory is a professional manufacturer of mineral processing equipment. According to our own practical experience, we briefly introce the mineral processing process of vein tin ore for reference< Ore dressing process flow chart of vein tin ore:

according to the specific situation of the process flow of Gongyi hi tech machinery plant, firstly, the raw ore is fed into the jaw crusher by the loader to crush the raw ore to about 10 mm, then it is fed into the rod mill for grinding to break the connection between the tin ore and the gangue, and the ground tin ore is fed into the spiral classifier for classification, It is divided into coarse and fine particles for separation
the fine-grained tin ore has higher dissociation degree and less proction. The test in our plant shows that the recovery rate of the shaker here is higher than that of other gravity separation equipment, and the concentrate and tailings can be separated by the shaker
the coarse-grained tin ore enters the jig for separation. The main purpose of jig gravity separation here is to recover all the tin placer minerals. It is necessary to ensure the highest gravity recovery rate instead of improving the concentrate grade. The coarse concentrate proced by the jig enters the rod mill for grinding, breaking the tin minerals existing in the intergrowth structure of the coarse concentrate, and the tailings are directly discarded
the rod mill of Gongyi Gaoke Machinery Factory is a kind of high-efficiency fine crushing equipment, which can grind minerals to fine sand without over grinding, recing the loss of Tin Minerals in the gravity separation process e to over grinding. The purpose of this process is to improve the concentrate grade and ensure the highest recovery rate
the concentrate proced by jigger in Gongyi hi tech machinery plant can be used as the final proct, and the tailings are put into the shaker for secondary gravity separation to recover the fine Tin Minerals in the jigger tailings. The main purpose is to improve the recovery rate of the whole process. The concentrate from the shaker and the jigger will merge into the concentrate pool, and the tailings will be directly discarded
Gongyi hi tech machinery factory is an advanced enterprise specialized in R & D and manufacturing of mineral processing equipment. It has specially proced a full set of small-scale experimental equipment and built a perfect small-scale experimental platform, which can carry out mineral processing experiments for customers free of charge. And welcome to visit our factory!
8.

In fact, the mining calculation of bitcoin is to do math problems together. The problem stem is the transaction that needs to be recorded. By doing the problem, everyone grabs the bookkeeping right, and the miners can get system rewards and transaction fees. The feature of sha256 algorithm used in bitcoin is that it is easy to verify the known answers correctly, but it is very troublesome to get the answers, and it needs to try one by one. The miner who got the answer first was recognized by everyone as having snatched the right to keep accounts, and the reward was given to him. Let's continue to grab the bookkeeping right of the next question. In short, the significance of these calculations is only to ensure the stability and safety of the whole system, and there is no more significance

it is not comprehensive to regard bitcoin as a by-proct of computing. The generation and issuance of bitcoin, all the transactions and circulation in the bitcoin chain, and the stability of the bitcoin system are the purpose of computing and are integrated. Of course, in addition to maintaining the system, it does not proce other value and procts. This is also a black spot where bitcoin is accused of not being environmentally friendly and wasting resources. In general, bitcoin, as a milestone blockchain digital currency, is e to the huge value of a large amount of computing power investment and user trust. There is no doubt about that

9. Statistics and visualization to build a good prediction model, you have to understand your own data. The most basic method is to calculate various statistical variables (mean, variance, etc.) and observe the distribution of data. You can also use a PivotTable to view multidimensional data. The types of data can be divided into continuous ones with a numerical value (such as sales volume) or discrete ones, which can be divided into categories (such as red, green and blue). Discrete data can be further classified into sortable, comparable size (e.g., high, medium, low) and nominal, non sortable (e.g., postcode). Graphics and visualization tools are particularly important in the data preparation stage. They allow you to analyze data quickly and intuitively instead of giving you boring text and numbers. It not only allows you to see the whole forest, but also allows you to zoom closer to each tree to see the details. In the graphic mode, it is easy to find the possible patterns, relationships and anomalies in the data, but it is difficult to directly look at the numbers. The problem with visualization tools is that the model may have many dimensions or variables, but we can only display it on a 2D screen or paper. For example, we may look at the relationship between credit risk and age, gender, marital status and working hours. Therefore, visualization tools must use more ingenious methods to display the data of n-dimensional space in two-dimensional space. Although there are some such tools, they all require users to "train" their eyes before they can understand what is drawn in the picture. People with color blindness or poor sense of space may encounter difficulties in using these tools. Aggregation (clustering) aggregation is to divide the whole database into different groups. Its purpose is to make the difference between groups obvious, while the data of the same group should be as similar as possible. Unlike classification (see predictive data mining later), you don't know how to divide the data into groups or how to divide it before aggregation. Therefore, after gathering, a person familiar with the business should explain the meaning of such clustering. In many cases, the clustering you get at one time may not be good for your business. At this time, you need to delete or add variables to affect the clustering. After several iterations, you can finally get an ideal result. Neural network and K-means are commonly used aggregation algorithms. Don't confuse aggregation with classification. Before classification, you already know which categories of data to divide and what the nature of each category is. Aggregation is the opposite. Association analysis association analysis is to find the correlation of the database median. Two common techniques are association rules and sequential patterns. Association rules are used to find the correlation of different items in the same event, such as the correlation of different goods bought in a purchase activity. The sequence pattern is similar to this. What he looks for is the temporal correlation between events, such as the analysis of the rise and fall of stocks. The association rules can be recorded as a = = & gt; B. A is called premise and left (LHS), B is called follow-up or right (RHS). For example, the association rule "people who buy hammers will also buy nails" is used to "buy hammers" on the left and "buy nails" on the right. In order to calculate the probability of a transaction containing a specific item or several items in the database, we only need to make direct statistics in the database. The frequency with which a particular association ("hammer and nail") appears in the database is called support. For example, in a total of 1000 transactions, 15 transactions contain "hammer and nail" at the same time, then the support of this association is 1.5%. A very low level of support (for example, only one out of a million transactions) may mean that the association is not very important, or that there are erroneous data (for example, "male and pregnant"). In order to find meaningful rules, we also need to examine the relative frequency of items and their combinations in rules. What's the probability of B happening when there is a? That is conditional probability in probability theory. Let's go back to our example and ask, "when a man has bought a hammer, how likely is he to buy a nail?" This conditional probability is also called credibility in data mining. The calculation method is to find the percentage: (the frequency of a and B appearing at the same time) / (the frequency of a appearing at the same time). Let's explain these concepts in more detail with an example: total number of transactions (number of transactions): 1000 contains "hammer": 50 contains "nail": 80 contains "pliers": 20 contains "hammer" and "nail": 15 contains "pliers" and "nail": 10 contains "hammer" and "pliers": 10 contains "hammer" and "nail" "Pliers" and "nails": 5 can be calculated: the support of "hammer and nails" is 1.5% (15 / 1000), "hammer, nails and pliers" is 0.5% (5 / 1000), "hammer = = & gt; The credibility of "nail" is 30% (15 / 50) "nail = = & gt; "Hammer" credibility = 19% (15 / 80) "hammer and nail = = & gt; The credibility of "tongs" is 33% (5 / 15) "tongs = = & gt; Reliability of "hammer and nail" = 25% (5 / 20)
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750