hello apakabar, we meet in other forums, if you join or want to join this project you will be very happy, this project is running, this extraordinary project will grow to be extraordinary, here I will review about UNIDAG project, the project is in the hands of a team of professionals working in their field.
Below is the review ....
let's see ..
Features and practical applications of UniDAG
Thanks to the technology dagchain, it became possible to keep data in the same way both in computer networks and on the side of individual devices. In addition, the consensus of decentralization makes it possible to apply the dagchain where it was simply impossible before, and expand the scope of use from a small chip in an electric kettle to quantum supercomputers. Unique approaches to already known problems have created the same unique solutions. Undoubtedly, it is impossible to give examples of all the fields of application of UniDAG because of too broad a spectrum, but those few that are indicated below will give a general idea of the possibilities and practical application of the dagchain.
Data retention
Backup logs.
Creating an event logging subroutine based on the UniDAG backup framework is a very useful solution. Often there are situations when intentionally (or not) the log files are erased / changed, which entails various kinds of problems. In fact, such a subroutine can be used wherever it is necessary to keep logs intact and unchanged. The construction of such a subroutine is performed either with the preset time parameters of the “write delay”, which will lead to the formation of blocks strictly in accordance with the time interval, or with the set block size. If necessary, it is possible to use any encryption algorithm at the stage of block formation, which will lead to increased security.
Student attendance program
A small program based on UniDAG will make it possible to create an unchanged student attendance register. It is very relevant in the age of development of digital technologies and young computer geniuses (or hackers). It is possible to create an individual program based on the UniDAG backup framework, which the teacher will use on a separate device. Either create a modified program to a more complex version using the decentralization framework, where the student’s mobile device can act as a client, and the node can be a teacher’s device (mobile phone, laptop, etc.).
Decentralization of existing services and programs
Decentralized “cloud” data services
Distributed Computing
The decentralized identifier (DID)
Allows you to store data in an unchanged dagchain, access to which can be obtained through a personal device. Information such as a driver’s license or bank account is stored in an encrypted form, and platforms such as DID allow you to manage your identities and use them, for example, for various transactions, to enter web services or to make purchases.
Decentralized applications (DApps)
Crypto-decentralized application
With the help of the UniDAG decentralization framework, a decentralized cryptocurrency application can be implemented. It is competing not only with bitcoin and other altcoins, but also is a direct competitor to centralized transaction payment systems Visa, MasterCard, PayPal, etc. Due to the speed of operation, reliability of the algorithm and transparency, public dagchain has every chance to become a new step in the development of the financial system of all mankind. Below is a conditional algorithm for the operation of such an application.
- All operations of a cryptocurrency application can be divided into 3 main stages:
- Synchronization with UniDAG client network.
- Data operations on the client side.
- Data operations on the node side.
- Synchronize with network
The client sends its identifier to all nodes in the network.
Each node generates its own pair ‘Client ID — Client Key’ and stores it in the database layer for a predetermined period of time.
Each of the nodes open / closed (encrypted) method forward the key to the client.
Work on the client side
The program layer of the client automatically (with the possibility of manual control) pings all nodes and forms the order of transmission.
The logic layer encrypts or doesn’t (depending on the system settings) the data specified by the specified method.
The logic layer hashes the data with the specified system method.
The logic layer alternately hashes the given system with the hash algorithm and each of the keys obtained during synchronization with the network, to obtain unique hashes for each node.
After adding all received hashes to the header of the block, the block of the first node is sent from the transmission sequence list.
In the event that there is no response from the receiving node (see step 3 on the node side) for a predetermined period of time, the client passes the block to the next node according to the priority list.
Work on the node side
Noda checks a unique hash with a pair of identifier-key. In case of mismatches, the node removes the block from the processing queue.
The initial processing of the data in the block is carried out: the node identifier and the assigned sequence number are added to the block header, after which the block is sent to other nodes. The resulting block that already has a node identifier and a sequence number in the header is not sent.
After the “record delay” expired by the final parameters of the block (based on UniDAG consensus), the header, hash of data and hashes of the 2 previous blocks are hashed to get a hash of the entire block. In the event that the same hash of the block data is detected, a block with a large sequence number is deleted. In the event that other blocks from the same client are found in the “queue repository”, the block with the smallest sequence number is received, and the remaining ones are deleted.
The block is written to the UniDAG chain.
The node sends a signal to the client about the successful (or not) addition of the block to the dagchain.
Decentralized application of smart contracts
Decentralized Marketplace
Implementation of such a decentralized application is possible using the decentralization framework UniDAG, several active and passive dagchains, network clustering, integration with a cryptocurrency application, application of smart contracts and IPFS.
Decentralized social network
P2P applications
Messaging application
To implement such an application, several variants of work algorithms are possible. Consider one of them.
The application uses a single database of user profiles — decentralized dagchain third party. It stores short information about the user and his public address (public key). The application on the user’s device acts as a client for the database nodes. Parallel to this, each device is an “internal” client and node of the application itself. To search for another user, the public dagchain (profile database) is used. To send a message to another user, a public address (public key) is used and a secure communication channel is created. Each device is a node in relation to the other. The order of identifiers is determined by the rule of priority of receiving “foreign” public keys. Thus, it is possible to create a group chat. For each private conversation, that is, the user-user \ group creates its own separate dagchain. In addition, all correspondence data is stored exclusively on the devices of the users themselves in the form of a dagchain.
Voting application
The voting application may be needed in cases when it is necessary to take any decision to a group of people. A decentralization framework is used, where the user’s device acts as a client and a node at the same time, and also uses a group signature. The device identifiers (addresses) must be known in advance to all network participants.
Internet of Things (IoT)
Smart House
Refrigerators, televisions, air conditioners … With built-in microchips and connection to the Internet, it will be possible to implement global projects of individual houses and entire cities in decentralized networks. Clustering and various modifications of the solutions of the Dagchain UniDAG will make it possible to realize such ideas.
Utility counters
The utility company must use meters connected to the local / global network for gas, water, light, etc. with built-in microchips. Microchips act as clients and transfer blocks with data on the use of consumed resources to the company’s nodes. Data protection is carried out by the presence of certificates stitched into hardware counter software, and the transfer of blocks with a symmetric / hybrid encryption algorithm.
It is last part of our main document. You can read others here:
It is last part of our main document. You can read others here:
Part 1: Philosophy of the world UniDAG
Part 2: DAGchain
Part 3: UniDAG Backup Framework
Part 4: The decentralization framework UniDAG
Part 5: Software Development Kit UniDAG
That is my review of the UNIDAG project, hopefully it will be very useful for you all, what if you are less understood with my review, you do not worry, because I will let you know and please visit it below, hopefully can help you.
Tidak ada komentar:
Posting Komentar