One of the most essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the blockchain. And one of the most essential consensus algorithms, Proof of Work, performs...
详细信息
One of the most essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the blockchain. And one of the most essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.
Causal Bayesian networks (CBN) are popular graphical probabilistic models that encode causal relations among variables. Learning their graphical structure from observational data has received a lot of attention in the...
详细信息
The constantly growing size of blockchains becomes a challenge with the increasing usage. Especially the storage of unwanted data in a blockchain is an issue, because it cannot be removed naturally. In order to counte...
详细信息
ISBN:
(数字)9781728170022
ISBN:
(纸本)9781728170039
The constantly growing size of blockchains becomes a challenge with the increasing usage. Especially the storage of unwanted data in a blockchain is an issue, because it cannot be removed naturally. In order to counteract this problem, we present the first concept for the selective deletion of single entries in a blockchain. For this purpose, the general consensus algorithm is extended by the functionality of regularly creating summary blocks. Previous data of the chain are summarized and stored again in a new block, leaving out unwanted information. With a shifting marker of the Genesis Block, data can be deleted from the beginning of a blockchain. In this way, the technology of the blockchain becomes fully transactional. The concept is independent of a specific block structure, network structure, or consensus algorithm. Moreover, this functionality can be adapted to current blockchains to solve multiple problems related to scalability. This approach enables the transfer of blockchain technology to further fields of application, among others in the area of Industry 4.0 and Product Life-cycle Management.
The Internet-of-Things facilitates the interlinking of an extensive number of devices, each capable of executing independent functions and acquiring diverse forms of information. These entities, in conjunction with th...
详细信息
ISBN:
(数字)9798350385922
ISBN:
(纸本)9798350385939
The Internet-of-Things facilitates the interlinking of an extensive number of devices, each capable of executing independent functions and acquiring diverse forms of information. These entities, in conjunction with the copious quantities of data they generate, necessitate scalable, proficient and safe-guarded management. Centralized solutions are not desired due to security concerns and scalability issue. Alternative to the centralized system, Blockchain – a decentralized systems that is proven to be platform to support both integrity and security is a choice. But, as the IoT devices are resource constrained devices, deploying a blockchain for the data management is a challenging task. In this manuscript, we put forth a multi-layer blockchain framework that accomplishes the goal of achieving scalability and access control in Internet of Things (IoT), gadgets including data. This framework is comprised of numerous permissioned blockchains that come together to configure a multi-layer architecture. As a result, it also attains high scalability using parallel processing, specifically through the utilization of blockchain sharding schemes.
Addressing the current surge in blockchain applications and the increasingly significant throughput and scalability challenges of single-chain systems, we propose a cross-chain protocol based on a main-subchain archit...
详细信息
ISBN:
(数字)9798350356502
ISBN:
(纸本)9798350356519
Addressing the current surge in blockchain applications and the increasingly significant throughput and scalability challenges of single-chain systems, we propose a cross-chain protocol based on a main-subchain architecture, utilizing a “
$1+\mathrm{N}$
” model composed of a main blockchain and multiple sidechains. The main blockchain is a permissioned public blockchain that employs relay chain technology, combining the flexibility and scalability of public blockchains with the performance, security, and regulatory advantages of federated blockchains. It serves as the core of the architecture, managing and coordinating the operations of the sidechains. Sidechains maintain a high degree of independence, selecting consensus algorithms tailored to their specific business needs and processing transactions asynchronously across different chains. Cross-chain transactions are decomposed into multiple sub-transactions, which are independently processed and verified by the relevant sidechains and the committee blockchain. This architecture ensures the atomicity, consistency, and security of transactions while enhancing the system's parallel processing capability and overall performance. Finally, this paper demonstrates the superiority of the proposed scheme in terms of fund security, atomicity, consistency, continuity, and dynamics through theoretical analysis.
This paper deals with the formation control problem of multiple unmanned aerial vehicles (UAVs). The UAV models are considered highly nonlinear and only translational motion is considered. Zeroing dynamics was first a...
详细信息
ISBN:
(纸本)9781450353489
This paper deals with the formation control problem of multiple unmanned aerial vehicles (UAVs). The UAV models are considered highly nonlinear and only translational motion is considered. Zeroing dynamics was first adopted to tackle the position and velocity consensus and then extended to the application of formation control using a constant offset vector. The feasibility of the proposed algorithm was analyzed and simulation results of four UAVs' formation flying were shown to validate the effectiveness of the proposed formation control law.
Adversarially robust streaming algorithms are required to process a stream of elements and produce correct outputs, even when each stream element can be chosen as a function of earlier algorithm outputs. As with class...
详细信息
To recommend learning resources that are suitable for students’ learning development, a content recommendation algorithm and KRCF algorithm are proposed based on the relationship between students and knowledge resour...
详细信息
Vizing's theorem asserts the existence of a (∆ + 1)-edge coloring for any graph G, where ∆ = ∆(G) denotes the maximum degree of G. Several polynomial time (∆ + 1)-edge coloring algorithms are known, and the state-...
详细信息
We study learning problems on correlated stochastic block models with two balanced communities. Our main result gives the first efficient algorithm for graph matching in this setting. In the most interesting regime wh...
详细信息
暂无评论