The world need HYCON
Bitcoin has been a disappointment to create implementation it is because systems built on faith, norms, and foundations inherently function better than the type of no-need-for-trusted-parties systems Blockchain envisions. No matter how much Blockchain has improves it is still aren’t able to create adaptation to the society, which some headed misguided direction by taking investor out of the sight.
HYCON has introduce a unlimited visualization on how to improve Blockchain usage and adaptation of Blockchain product. Which penetrate other segment other than the original intended use of the blockchain. Blockchain was first introduce to power currencies like bitcoin — a way to store and exchange value much like any other currency. As time goes by usage of the blockchain are now seamlessly attaching their product in other segment to improve the scalability of the product.
All the review until now had no negative effect and the price of the product have been stable enough showing the investor how strong the believe in this project and change of view for other in blockchain ecosystem.
HYCON Technical Specification

Hashing Algorithms
The principal form of this document named Blake2b as the only hash task being used as part of the HYCON method. This leads to performance being loosely comparable whether on a CPU or GPU, while also interpreting it incompatible with standard ASIC design. In the future, and in order to deter centralization of mining resources, it is planned to follow the example set by Monero and periodically tweak the hashing algorithm to maintain ASIC resistance over the course of the mining period.
Consensus — SPECTRE Protocol
Nakamoto protocol used for consensus on the Bitcoin blockchain, HYCON implements a protocol called SPECTRE to maintain consensus. SPECTRE generalises a blockchain into the form of a directed acyclic graph(DAG) by provide work for voting algorithm between pairs of blocks in order to specify their order in a pairwise manner, i.e. block x should be applied before block y or block y should be applied before block x. While a full description of the SPECTRE protocol is beyond the scope of this whitepaper, a basic outline of the voting rules is provided below.
Application of SPECTRE Protocol to Example DAGs
In order to illustrate SPECTRE Protocol, it is useful to work through an example of the protocol in action step by step and provide snapshots of the state of the voting process as it proceeds. This particular example is drawn directly from the SPECTRE whitepaper. For example a double spend Take the simplest possible case where a block A contains a transaction t1 and a second block B contains a conflicting transaction t2. These conflicts could be malicious, or merely caused by latency between nodes leading to transactions being published twice, such that two miners are collecting the same transaction fee. Depending on the structure of the DAG the result of this double spend will be resolved differently as the two blocks will have differing pasts and futures.
The initial case for this example looks as follows with blocks A and B being published at approximately the same time as block 5.

At this stage the system is unaware of the double spend, as no subsequent blocks have been published referencing both of the conflicting blocks. However, as the structure of the DAG develops and more blocks are added, the double spend is discovered and the structure of the DAG will be analysed to determine which block takes precedent.

In the above diagram, block 12 is the first block published with reference to the double spend between A and B. Following the rules listed above, the votes can be counted as follows. Blocks 6, 7, and 8 all vote for block A, because block B is not present in their past. Similarly, the votes of blocks 9, 10 and 11 are for B, for the same reason.

Block 12 votes based on a recursive call over its past. As blocks 10 and 11 are not included in past(12) , they are not considered when determining block 12’s vote. The voting area for block 12 is shown below.

Blocks 1–5 are not in the sets of blocks future(A) or future(B) , so they will vote the same as the majority of their futures. In the case of this recursive vote, these blocks all have more votes for block A in their future and so also vote for block A. Block 12’s past contains 9 votes for block A and 2 votes for block B, So block 12 will vote for block A. If there had been a tie, Block 12 would break the tie deterministically so that all servers can agree on which way block 12 votes. Since we only use past(12) to determine the vote of 12, its vote will never change.
The remainder of the voting process in the DAG is based on the future of the remaining blocks. Once Block 12’s vote has been confirmed, Block 5 votes in favour of A because the votes of 7, 8, and 12 outweigh the votes of 9 and 11. Block 4 sees votes for A from A, 5, 6, 7, 8, and 12, with blocks B, 9, 10, and 11 voting for B, thus Block 4 also votes for A. It is a similar case for blocks 3, 2, and 1, which all cast their votes for A. Leading to a final vote tally for this voting procedure of 10 votes in favour of A and 4 votes in favour of B.

An interesting property of SPECTRE is that, especially in simple cases such as the one illustrated here, it replicates longest-chain selection models used in other blockchain technologies. Following the route from 1 -> 12 passing through A, and the same route but passing through B, it can be seen that the route 1->A->12 is longer than the route 1->B->12, i.e. the longest chain wins.
At this stage HYCON system seem will be the next evolution of blockchain showing such immense of working product that will replace Bitcoin to be the next generation of its kind.
Data security
Unpleasant players unswervingly demonstrate that they are able to disrupt even the greatest strong network security systems of companies and governments worldwide, which has caused in a huge loss of society’s most personal information, complex financial details of users and corporations, as well as a loss of trust in the ability of these institutions to properly safeguard sensitive data. Through the Infinity Platform, everyone will have the ability to build a more secure way to safeguard sensitive data through an intuitive user interface, thereby increasing trust between users and those who store their data.
Organizational Transparency
In this era society places a lot of trust in corporations and other entities to implement their own robust system of checks and balances to ensure the security of their parts, products, safety procedures and other systems. However, all of these items can be falsified by mischievous actors and such systems also leave the door open for unavoidable human error. But if organizations have the tools to leverage blockchain technology, they would be able to reduce their liability on existing systems and human error, which will result in better-quality transparency and trust for all parties.

Why the World need HYCON
HYCON platform is set to utilize the DAG & Serialization Portocol for a high concurrency between different nodes. As a result, the platform’s network forms a mixed and multi-chain forest ecosystem.
Each Network will apply to the relevant business with each cohesive company set to run in a chain. The Mining process provide a platform to publish a block that will require proof of work, similar to the majority of existing Cryptocurrencies. Such a design will help provide security isolation and resource optimization within the network. Additionally, the cross-chain access ability will result in a low-cost transfer for users.
HYCON project will feature a much faster transaction confirmation. This project will further provide a promising network comprising architecture, technologies, applications, and resources for all users worldwide to develop a faster and higher information and collaboration platform for a more efficient society.
Thank you. Feel free to comment below.