DISTRIBUTION OF ETHEREUM BLOCKCHAIN ADDRESSES
Journal Title: Scientific Journal of Astana IT University - Year 2020, Vol 4, Issue 4
Abstract
In the contemporary world, Ethereum is a very reliable financial saving among cryptocurrencies. It is also well known as a blockchain platform for creating and launching its own cryptocurrency. The applications run on Ethereum executed by a platform-specific cryptographic token, ether. During 2014, Ethereum had launched a pre-sale for ether, which had received an overwhelming response. Ether is used broadly for two purposes: it is traded as a digital currency exchange like other cryptocurrencies, and it is used inside Ethereum to run applications and even to monetize work. It should be noticed that the smart contract has brought a significant share of the success to Ethereum. The smart contract is a computer programme that independently performs assigned tasks between network participants without the participation of a third trusted party. Smart contracts and their intranet transactions have facilitated the rapid expansion of the Ethereum network. Smart contracts are widely represented on the market, either as electronic transaction payments or as applications for the implementation of logistics supplies, gambling, and other sectors. These transactions are irreversible and fully tracked online. Whereas the electronic records are available in a public distributed ledger and include data about user addresses, whereas the real names are hidden. The article explains the usage of decentralized accounts and their electronic transactions in the Ethereum network. The results are presented through different application sectors. Additionally, a new method for extracting blockchain records through node cluster via IPFS path is implemented in the research.
Authors and Affiliations
A. Seitenov, G. Smagulova, Astana IT University, Kazakhstan
BLOCKCHAIN AS DATA PROTECTION IN FINANCE
Five years ago, it would have been difficult to describe Kazakhstan’s economy as highly digitized. However, the country is currently implementing state programs aimed at improving the socio-economic conditions of its cit...
USING OF ADDITIONAL METHODS OF USER AUTHORIZATION
The article considers the methods of additional authorization of users of information systems, their advantages, and disadvantages, typical examples of usage. Multifactor authentication is becoming a standard tool for...
Integrated Anti-risk Management of Conflicts of a Scientific Project in a Behavioral Economics
The object of the research is the processes of managing uncertainties such as risks, conflicts, and factors of behavioral economics which may have negative consequences for a scientific project. The study has revealed...
GESTURE RECOGNITION OF MACHINE LEARNING AND CONVOLUTIONAL NEURAL NETWORK METHODS FOR KAZAKH SIGN LANGUAGE
Recently, there has been a growing interest in machine learning and neural networks among the public, largely due to advancements in technology which have led to improved methods of computer recognition of objects, sound...
DATA SECURITY, MODELING AND VISUALIZATION OF DATA FROM IOT DEVICES
The article describes the IoT infrastructure, the hardware of the IoT system, considers the issue of security of the chosen LoRa data transmission technology. Data was received from sensors for gas, temperature and hum...