Midas Touch of Blockchain Industry

MAI Public Chain
MAI Public Chain
Published in
7 min readNov 24, 2018

1 Mining

The word “mining” should be heard from the first batch of Bitcoin gold digger. Bitcoin is the public chain of cryptocurrency in the blockchain world, and its digital currency is the digital gold. With the expansion of the consensus, the original miners made a lot of money. Since then, people all poured into the this place. The mining of bitcoin is like the gold rush of the year. At that time, many gold diggers go to the sea to make gold. In the end, only a few people became rich, and most of them lost everything. The original intention of the Bitcoin network designed by Nakamoto was decentralized and universal. However, with the increasing concentration of machine computing, Bitcoin mining has shown a trend of re-centralization. So the gap between the wealthy and the poor have widen. It’s difficult for a large number of ordinary users to join the mining. This is very similar to the mining of precious metals in the real world, and other similar digital currencies also have such problem.

Blockchain is a significant change in the way human society use code to deliver the value and trust. The blockchain 3.0 is the era of application. Vigorously developing an application-oriented public chain is an inevitable trend. Application-oriented public chain mining must return to the era of universality, allowing more users to participate. But in fact, everyone is confused, what is mining? What is the process of mining?

First, we want to supervise the transaction broadcast.There are some transactions broadcasted every time throughout the Bitcoin network, and then it is necessary to verify that the miners’ signatures are valid. Whether the transaction has been paid repeatedly.

The second is to maintain the block network and to monitor the new block, then the miners’ primary responsibility is to maintain the blockchain. And Nakamoto design it very perfect to ensure that the miners are required to synchronize the history before he joined the blockchain to the local from other miners and nodes at the beginning. Then supervise the new blocks that are broadcast to the network.The job of the miner is to verify that each block is valid after each broadcast receives each block. And then, the next step is produce blocks. Each block contains a random number, find a random number that makes your block very efficient, and let the whole network accept your block. After receiving your block, you will be rewarded after being recorded on the blockchain. This is your profit.

Now let’s explain what is called a valid block, that is, each block has a valid random number. First, select some valid transactions from your trading pool, arrange and translate them into a dendrogram. You can arbitrarily choose the number of transactions compiled, but only if you do not exceed the upper limit of the transaction number for each block. You can try different random number arrangements until the hash value of the entire random number in the entire block is less than the target value. This target value is generally represented by a number of specific digits starting from zero, that is, starting from zero, increasing the value by one each time until the random number can make the block valid.

2 Development History of Mining

If you are embarrassed about this paragraph, I will tell you the development history of the blockchain, which is the history of mining.

Mining is from the CPU to the GPU and then to the ASIC. Why is the CPU at the beginning? Because when Bitcoin was born at the time, Nakamoto’s vision was to reach one CPU one vote to maintain the balance of the entire ecological network. Until now, Nakamoto’s vision has become farther and farther. We all know that Bitcoin networks, ETH networks and EOS networks are all developing towards a centralization trend. Nowadays, there are more and more mines, and the miners are join the mine to increase their probability of mining.

If you want all the computers that have joined the mine to dig into the tokens, you should verify the random number as soon as possible. And many random numbers will be verified. For example, if these computers are in the same mine, they will verify some random numbers together in a mine. In other words, each computer verifies different random numbers simultaneously, the probability of cracking the random numbers will become higher. As the probability of random number cracking increases, the income that all miners in the mine can get is getting higher, and that is why the large mines appeared.

But CPU mining has many drawbacks. Because the hashrate of CPU is limited, other miners can use more advanced hashrate to verify random numbers, so it is increasingly impossible to use the CPU to mine. The miners who still use the CPU to mine because they do not know the operating principle of Bitcoin and the return rate of mining they can get is very low.

The second generation of mining is GPUs, which are very beneficial for mining because of the capabilities of GPU throughput and high parallel processing. In 2010, because the OPENCL language was born, the GPU could be used for non-image processing, and GPU mining became the mainstream at that time. Because the GPU can be used for over clock, for example, if we make the throughput 1.5 times, the computational success rate drops to 0.7, which means you increase by 5%. The last point is that the CPU can drive multiple GPUs. Each GPU is responsible for different data processing, which can greatly reduce the mining time.

However, GPU mining also has shortcomings. Most of the GPU’s floating-point arithmetic unit does not use mining in this built-in hardware. This operation of SHA256 does not play any help, and the GPU does not have a very powerful cooling function, and it consumes a lot of power. Therefore, this is a mining history in the middle of the GPU and ASIC, which is FPGA mining. This has been over clocked, so it is very easy to report errors, which is very embarrassing for FPGA mining.

The mines are dominated by ASIC chips today, which are designed to be used for mining. In fact, the development of this chip requires very professional knowledge and a long development cycle. The development of this chip has greatly exceeded the development speed of the ordinary chip. We know that the development of the blockchain is very rapid, and all the companies that make chips will fight for this goal, and then exceed a lot of chips of the same value. This is a digression, but most of the early ASIC chips have a very short life span and were eliminated in about six months. This has led to the time and speed of shipments that determine the return rate of users. Manufacturers are still working hard to do these things, so that productivity can be improved, and users who purchase it in advance can get the goods faster.

Finally, I want to tell you about the PC framework. anti-ASIC is actually a matter that everyone has been talking about for a long time, because everyone wants to suppress the advantages of this kind of specific equipment for mining, and the idea of one CPU one vote conceived by Nakamoto was completely contradictory. We don’t really want this to happen, so many people are working on the research of anti-ASIC. Our company is also committed to the research work of anti-ASIC. We will use several methods to do that, such as rigid memory decryption, and memory decryption algorithms. We will also develop some algorithms for this kind of anti-ASIC, and then solve the problems we are facing. There are many ASIC algorithms on the market, but they are all cracked by ASIC chips. Recently, some companies that do blockchain projects are also working on anti-ASIC algorithm protocols, which is what MAI is determined to pursue.

We have an idea to use a moving target only as a decryption for this mining, but the decryption algorithm itself will change. For example, the decryption difficulty in Bitcoin will change periodically. In an ideal state, the mining hardware optimized for the previous decryption algorithm is no longer applicable to the next decryption algorithm. This is a changeable theory, that is to say, our decryption algorithm will change continuously with the cycle, and some chip manufacturers of ASIC will be unprofitable. The development process it very difficult because it change with our cycle of change. Perhaps the order of these decryption algorithms can be automatically generated, but it is also difficult.

3 PC Mining Machine

The PC mining machine dives from the CPU mining to CPU + GPU mining, while limiting the GPU and the expanding anti-ASIC chip. It is automatically adjusted by artificial intelligence when the PC is busy and idle. This kind of bandwidth resource will spread the application-oriented public chain, which is what we do.

MAI Telegram (English): https://t.me/MaiEN8888

MAI Telegram (Chinese): https://t.me/MAI888888

MAI Twitter: https://twitter.com/MaiPublicChain

MAI Reddit: https://new.reddit.com/user/MAI_AI

MAI FACEBOOK: https://www.facebook.com/MaiPublicChain/

--

--

MAI Public Chain
MAI Public Chain

Artificial Intelligence-centric Decentralized Ecological Network