Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
This document discusses blockchain technology, including what blockchain is, how it works, types of blockchain networks, applications of blockchain, advantages and disadvantages. Blockchain is a distributed digital ledger that records transactions in blocks that are linked using cryptography. It allows for transactions to be recorded and distributed without a central authority. Consensus algorithms like proof of work are used to validate transactions and add new blocks to the blockchain. Blockchain has applications in financial transactions, asset tracking, data storage and decentralized applications. Its advantages include transparency, security and cost reduction. However, it also faces challenges related to speed and implementation costs.
Blockchain , Deploying your first smart contract to azure ethereum blockchain.
Slides from my session in "Global Azure Bootcamp Chandigarh"
Presentation starts with basic terms like transactions , ledger and contracts. Talks about what is blockchain and ethereum and concludes with deployment of a smart contract to azure ethereum blockchain.
This document summarizes the Ergo platform, a decentralized platform for contractual sound money. It describes Ergo as a permissionless cryptocurrency focused on decentralization and long-term stability. Key aspects covered include Ergo's Autolykos proof-of-work consensus protocol, lightweight client support, the ErgoScript smart contract language, native token properties, voting and upgrade mechanisms, storage rent system, and current status with mining and listings on exchanges. The goal of Ergo is to serve as digital gold and a platform for building decentralized financial applications and tokenized assets.
* Présentation du concept Ethereum
* Comment acheter des ether
* Mettre un place un account/wallet avec mist
* Comment sécuriser ses ether
* Introduction au minage dans un pool
* Tour de table pour les prochains meetup
Blockchain is a distributed ledger that can be used to securely track digital assets and transactions without a central authority. It works by distributing a record of transactions across multiple nodes in a network that must reach a consensus on changes. Smart contracts allow digital assets and transactions to be automatically verified and enforced based on predefined terms. Some potential applications of blockchain technology include digital currencies, supply chain management, digital identity, and more.
Blockchain Technology And CryptocurrencyEno Bassey
A brief presenation about blockchain and understand cryptocurrency. Find out what it is and why you need to know about it. How you can get involved and how it may change the world as we know it.
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
Blockchain has gained lots of attention in recent years. Bitcoin and Ethereum are leading the race. Crypto currencies in spite of uncertainty and volatility are here to stay. Smart contract programming is the future for the Internet 3.0.
Block chains and crypto currencies - introductionInitio
Objectives and knowledge sharing
• What is blockchain? Why should we care?
• Cryptography: Shared secrets and the Blockchain
• Protocols: What’s in those blocks ?!
• Ethereum
• Bitcoin
• Hyperledger
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
The Harvard Business Review (HBR) thinks that Blockchain Technology has to power to keep data safe for consumers and businesses alike; because Blockchain provides a secure and immutable ledger, HBR says it represents the key to taking back privacy of data.
“You can keep certified copies of identity documents, biometric test results, health data, or academic and training certificates online, available at all times, yet safe unless you give away your key. At a whole system level, the database is very secure.”
Portia Burton provides an overview of becoming a blockchain professional. She recommends getting a foundation in blockchain technologies, making a list of how blockchain addresses company pain points, and pitching your expertise to your boss. Key steps include creating a career roadmap, learning through courses like Bitcoin and Cryptocurrency Technologies on Udemy, and contributing to open source projects like 21.co and Hyperledger.
The project deals about how blockchain works, proof-of-work and merkle tree hash function. The project also tries to explain how the bitcoin uses ECDSA algorithmt power the cryptography.
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
Ethereum devcon1 in London, 27th November By Tomoaki Sato I have been to the conference, so I wrote this summary and doing presentation in Japan. The meetup name is "Smart Contract Japan". Some of the presentations are missing, or added.
Please refer these official sources also
Devcon
http://devcon.ethereum.org/
Devcon1 youtube presentations
https://www.youtube.com/user/ethereumproject
Devcon1 slides on reddit
https://www.reddit.com/r/ethereum/comments/3soym7/devcon_1_slides/
The document discusses various applications and improvements of blockchain technology beyond Bitcoin 1.0, including smart contracts, decentralized autonomous organizations, sidechains and counterparty. Ethereum is presented as a platform to build decentralized applications that allows for more transaction types beyond currency, including multi-signature transactions and creating your own currencies. It aims to be a scalable foundational protocol for other applications to utilize improved features like faster block confirmation times.
This presentation is part of New Product Developers (NPD) meetup regularly conducted by Divum. In this session, we covered gentle introduction to blockchain to running a truly decentralised Pizza ordering application built using solidity on ethereum.
Unsung heroes Validator & Infra provider.pdfJiyun Kim
This document discusses validator nodes and infrastructure providers in blockchain networks. It introduces DSRV Labs as an innovator in this space and summarizes some of their products and services, including an all-in-one node platform called All That Node, a multi-chain wallet called Welldone Wallet, blockchain data analytics called Sonar, a multi-chain IDE called Welldone Code, and their role in providing infrastructure for infrastructure to help build out the web3 ecosystem. It also maps the growing web3 infrastructure industry and DSRV's position to lead in Asia.
Blockchain is the currently the hottest tech buzzword. Yet is it just hype or is it that fundamental piece of tech that will it truly change the world we live in, much like the internet did 25 years ago?
This presentation initially explains the fundamentals of blockchain and how it enables a new breed of business models.
Then we will then delve into how you can have a blockchain app on Azure, followed by a demo.
The presention describes analyses Microsoft's strategy with blockchain and how they are working on enabling Azure support to a number of DLTs including Ethereum, Hyperledger Fabric, R3 Corda, Quorum and Chain Core by offering easy-to-deploy templates for these ledgers. And more importantly how Microsoft is integrating these DLTs to the existing rich Azure ecosystem to enable the building of truly scalable, distributed enterprise applications using cryptlets and the Coco Framework.
Blockchain Essentials and Blockchain on AzureNuri Cankaya
In this presentation I cover from the basics of Blockchain and deep-dive into the possibilities with Microsoft Azure on Blockchain projects.
What is Blockchain
Blockchain Disruption
Blockchain Business Scenarios
Microsoft’s Strategy on Blockchain
Blockchain 2.0: Smart Contracts
Blockchain 3.0: Cryptlets innovation
Blockchain on Microsoft Azure
Bletchley Project
Azure Blockchain Solutions
Resource slides for blockchain related questionLin Lin (Wendy)
Question regards Ethereum hard fork, public vs private blockchain, smart contract examples, what is crptocurrency and how to get it, why blockchain starts with fintech etc.
Hands-on introduction to blockchain technologies.
First, basic concepts as peer-to-peer networks, mining and distributed consens are introduced basd on the Bitcoin protocol. Next smart contracts are discussed for the Ethereum protocol and demonstrated using a local/private blockchain.
The session concludes with a live demo of the interaction of a Java based classical business application with a smart contract running in the Ethereum network.
The goal of the session is to provide a meaningful background of blockchain technologies in genral and to enable developers to start exploring Ethereum and smart contracts within a few hours.
The proposed development setup is oriented towards Java developers and contains Docker images for the Geth and TestRPC Ethereum clients that can be run locally. To access Ethereum from Java the web3j Java library is used. The business application that integrates with the smart contracts is built with the Eclipse Scout framework.
Slides have been created by @ZimMatthias for the JUG Switzerland session on May 22, 2017 https://www.jug.ch/html/events/2017/blockchain_ethereum.html
Advanced Blockchain Technologies on Privacy and ScalabilityAll Things Open
This document discusses advanced blockchain technologies for privacy and scalability. It begins by introducing Jim Zhang from Kaleido and his qualifications to speak on this topic. It then covers several techniques for achieving privacy on blockchain, including data isolation, separate blockchains, address generation, and zero-knowledge proofs. It also discusses trusted execution environments. The document next addresses scalability and the blockchain trilemma between security, decentralization and scalability. It notes that enterprise blockchains focus more on competing real-world interests than massive nodes. Finally, it lists approaches for improving scalability such as increasing block size, more efficient consensus algorithms, off-chain transactions, state channels and sharding.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
Blockchain Technology And CryptocurrencyEno Bassey
A brief presenation about blockchain and understand cryptocurrency. Find out what it is and why you need to know about it. How you can get involved and how it may change the world as we know it.
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
Blockchain has gained lots of attention in recent years. Bitcoin and Ethereum are leading the race. Crypto currencies in spite of uncertainty and volatility are here to stay. Smart contract programming is the future for the Internet 3.0.
Block chains and crypto currencies - introductionInitio
Objectives and knowledge sharing
• What is blockchain? Why should we care?
• Cryptography: Shared secrets and the Blockchain
• Protocols: What’s in those blocks ?!
• Ethereum
• Bitcoin
• Hyperledger
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
The Harvard Business Review (HBR) thinks that Blockchain Technology has to power to keep data safe for consumers and businesses alike; because Blockchain provides a secure and immutable ledger, HBR says it represents the key to taking back privacy of data.
“You can keep certified copies of identity documents, biometric test results, health data, or academic and training certificates online, available at all times, yet safe unless you give away your key. At a whole system level, the database is very secure.”
Portia Burton provides an overview of becoming a blockchain professional. She recommends getting a foundation in blockchain technologies, making a list of how blockchain addresses company pain points, and pitching your expertise to your boss. Key steps include creating a career roadmap, learning through courses like Bitcoin and Cryptocurrency Technologies on Udemy, and contributing to open source projects like 21.co and Hyperledger.
The project deals about how blockchain works, proof-of-work and merkle tree hash function. The project also tries to explain how the bitcoin uses ECDSA algorithmt power the cryptography.
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
Ethereum devcon1 in London, 27th November By Tomoaki Sato I have been to the conference, so I wrote this summary and doing presentation in Japan. The meetup name is "Smart Contract Japan". Some of the presentations are missing, or added.
Please refer these official sources also
Devcon
http://devcon.ethereum.org/
Devcon1 youtube presentations
https://www.youtube.com/user/ethereumproject
Devcon1 slides on reddit
https://www.reddit.com/r/ethereum/comments/3soym7/devcon_1_slides/
The document discusses various applications and improvements of blockchain technology beyond Bitcoin 1.0, including smart contracts, decentralized autonomous organizations, sidechains and counterparty. Ethereum is presented as a platform to build decentralized applications that allows for more transaction types beyond currency, including multi-signature transactions and creating your own currencies. It aims to be a scalable foundational protocol for other applications to utilize improved features like faster block confirmation times.
This presentation is part of New Product Developers (NPD) meetup regularly conducted by Divum. In this session, we covered gentle introduction to blockchain to running a truly decentralised Pizza ordering application built using solidity on ethereum.
Unsung heroes Validator & Infra provider.pdfJiyun Kim
This document discusses validator nodes and infrastructure providers in blockchain networks. It introduces DSRV Labs as an innovator in this space and summarizes some of their products and services, including an all-in-one node platform called All That Node, a multi-chain wallet called Welldone Wallet, blockchain data analytics called Sonar, a multi-chain IDE called Welldone Code, and their role in providing infrastructure for infrastructure to help build out the web3 ecosystem. It also maps the growing web3 infrastructure industry and DSRV's position to lead in Asia.
Blockchain is the currently the hottest tech buzzword. Yet is it just hype or is it that fundamental piece of tech that will it truly change the world we live in, much like the internet did 25 years ago?
This presentation initially explains the fundamentals of blockchain and how it enables a new breed of business models.
Then we will then delve into how you can have a blockchain app on Azure, followed by a demo.
The presention describes analyses Microsoft's strategy with blockchain and how they are working on enabling Azure support to a number of DLTs including Ethereum, Hyperledger Fabric, R3 Corda, Quorum and Chain Core by offering easy-to-deploy templates for these ledgers. And more importantly how Microsoft is integrating these DLTs to the existing rich Azure ecosystem to enable the building of truly scalable, distributed enterprise applications using cryptlets and the Coco Framework.
Blockchain Essentials and Blockchain on AzureNuri Cankaya
In this presentation I cover from the basics of Blockchain and deep-dive into the possibilities with Microsoft Azure on Blockchain projects.
What is Blockchain
Blockchain Disruption
Blockchain Business Scenarios
Microsoft’s Strategy on Blockchain
Blockchain 2.0: Smart Contracts
Blockchain 3.0: Cryptlets innovation
Blockchain on Microsoft Azure
Bletchley Project
Azure Blockchain Solutions
Resource slides for blockchain related questionLin Lin (Wendy)
Question regards Ethereum hard fork, public vs private blockchain, smart contract examples, what is crptocurrency and how to get it, why blockchain starts with fintech etc.
Hands-on introduction to blockchain technologies.
First, basic concepts as peer-to-peer networks, mining and distributed consens are introduced basd on the Bitcoin protocol. Next smart contracts are discussed for the Ethereum protocol and demonstrated using a local/private blockchain.
The session concludes with a live demo of the interaction of a Java based classical business application with a smart contract running in the Ethereum network.
The goal of the session is to provide a meaningful background of blockchain technologies in genral and to enable developers to start exploring Ethereum and smart contracts within a few hours.
The proposed development setup is oriented towards Java developers and contains Docker images for the Geth and TestRPC Ethereum clients that can be run locally. To access Ethereum from Java the web3j Java library is used. The business application that integrates with the smart contracts is built with the Eclipse Scout framework.
Slides have been created by @ZimMatthias for the JUG Switzerland session on May 22, 2017 https://www.jug.ch/html/events/2017/blockchain_ethereum.html
Advanced Blockchain Technologies on Privacy and ScalabilityAll Things Open
This document discusses advanced blockchain technologies for privacy and scalability. It begins by introducing Jim Zhang from Kaleido and his qualifications to speak on this topic. It then covers several techniques for achieving privacy on blockchain, including data isolation, separate blockchains, address generation, and zero-knowledge proofs. It also discusses trusted execution environments. The document next addresses scalability and the blockchain trilemma between security, decentralization and scalability. It notes that enterprise blockchains focus more on competing real-world interests than massive nodes. Finally, it lists approaches for improving scalability such as increasing block size, more efficient consensus algorithms, off-chain transactions, state channels and sharding.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
International Journal of Distributed and Parallel systems (IJDPS)samueljackson3773
The growth of Internet and other web technologies requires the development of new
algorithms and architectures for parallel and distributed computing. International journal of
Distributed and parallel systems is a bimonthly open access peer-reviewed journal aims to
publish high quality scientific papers arising from original research and development from
the international community in the areas of parallel and distributed systems. IJDPS serves
as a platform for engineers and researchers to present new ideas and system technology,
with an interactive and friendly, but strongly professional atmosphere.
Value Stream Mapping Worskshops for Intelligent Continuous SecurityMarc Hornbeek
This presentation provides detailed guidance and tools for conducting Current State and Future State Value Stream Mapping workshops for Intelligent Continuous Security.
Analysis of reinforced concrete deep beam is based on simplified approximate method due to the complexity of the exact analysis. The complexity is due to a number of parameters affecting its response. To evaluate some of this parameters, finite element study of the structural behavior of the reinforced self-compacting concrete deep beam was carried out using Abaqus finite element modeling tool. The model was validated against experimental data from the literature. The parametric effects of varied concrete compressive strength, vertical web reinforcement ratio and horizontal web reinforcement ratio on the beam were tested on eight (8) different specimens under four points loads. The results of the validation work showed good agreement with the experimental studies. The parametric study revealed that the concrete compressive strength most significantly influenced the specimens’ response with the average of 41.1% and 49 % increment in the diagonal cracking and ultimate load respectively due to doubling of concrete compressive strength. Although the increase in horizontal web reinforcement ratio from 0.31 % to 0.63 % lead to average of 6.24 % increment on the diagonal cracking load, it does not influence the ultimate strength and the load-deflection response of the beams. Similar variation in vertical web reinforcement ratio leads to an average of 2.4 % and 15 % increment in cracking and ultimate load respectively with no appreciable effect on the load-deflection response.
Passenger car unit (PCU) of a vehicle type depends on vehicular characteristics, stream characteristics, roadway characteristics, environmental factors, climate conditions and control conditions. Keeping in view various factors affecting PCU, a model was developed taking a volume to capacity ratio and percentage share of particular vehicle type as independent parameters. A microscopic traffic simulation model VISSIM has been used in present study for generating traffic flow data which some time very difficult to obtain from field survey. A comparison study was carried out with the purpose of verifying when the adaptive neuro-fuzzy inference system (ANFIS), artificial neural network (ANN) and multiple linear regression (MLR) models are appropriate for prediction of PCUs of different vehicle types. From the results observed that ANFIS model estimates were closer to the corresponding simulated PCU values compared to MLR and ANN models. It is concluded that the ANFIS model showed greater potential in predicting PCUs from v/c ratio and proportional share for all type of vehicles whereas MLR and ANN models did not perform well.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
Sorting Order and Stability in Sorting.
Concept of Internal and External Sorting.
Bubble Sort,
Insertion Sort,
Selection Sort,
Quick Sort and
Merge Sort,
Radix Sort, and
Shell Sort,
External Sorting, Time complexity analysis of Sorting Algorithms.
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...Infopitaara
A feed water heater is a device used in power plants to preheat water before it enters the boiler. It plays a critical role in improving the overall efficiency of the power generation process, especially in thermal power plants.
🔧 Function of a Feed Water Heater:
It uses steam extracted from the turbine to preheat the feed water.
This reduces the fuel required to convert water into steam in the boiler.
It supports Regenerative Rankine Cycle, increasing plant efficiency.
🔍 Types of Feed Water Heaters:
Open Feed Water Heater (Direct Contact)
Steam and water come into direct contact.
Mixing occurs, and heat is transferred directly.
Common in low-pressure stages.
Closed Feed Water Heater (Surface Type)
Steam and water are separated by tubes.
Heat is transferred through tube walls.
Common in high-pressure systems.
⚙️ Advantages:
Improves thermal efficiency.
Reduces fuel consumption.
Lowers thermal stress on boiler components.
Minimizes corrosion by removing dissolved gases.
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
2. Prerequisite
• Knowledge of at least one programming language like what are variables,
data types, loops, etc.
PRESENTATION TITLE 2
Code Eater
3. Blockchain Fundamentals
3
Why Study Blockchain ?
What is Blockchain ?
Blockchain Popularity
Types Of Accounts
Ethereum Gas
Ethereum Gas Price
Ethereum Gas Limit
Much More
Blockchain Applications
What is Ethereum ?
Blockchain Working
Ethereum Node
Code Eater
46. 46
• Bitcoin is a decentralized digital currency, without a central bank or
single administrator, that can be sent from user to user on the peer-
to-peer bitcoin network without the need for intermediaries.
• It uses Blockchain Technology.
What is Bitcoin ?
Code Eater
63. SHA256 Algorithm
Document, Audio , Video etc. SHA256
5819E961F19967B4ECB242
9085E17909CFFD4DCB626
7D0067F6CAEC22150A7B1
This has 64 hexadecimal characters.
Each character is of 4 bits.
So in total it has 64* 4 bits i.e. 256 bits.
Code Eater
67. How Blockchain Is Formed ?
Block No.-1
Data
Hash:0000D8C42
Prev Hash:000000000
Block No.-2
Data
Hash:00003A459
Prev Hash:0000D8C42
Block No.-3
Data
Hash:00003D45F
Prev Hash:00003A459
Genesis Block
Code Eater
78. Ethereum Gas
10 * 3 – 6 = ?
Multiplication – 5 gas Subtraction – 3 gas Equal to – 3 gas
Total gas –> 5 + 3 +3 = 11 Gas
Opcode List - Click Here
Remix IDE - Click Here
Code Eater
79. Why Bitcoin does not support apps ?
Bitcoin Script – Not Turing Complete Solidity – Turing Complete
Code Eater
82. Ethereum Gas Price
Gas /Petrol - 10L
Rupees - ?
1L – Rs.100
Rupees for 10 L = 10 * 100 = Rs.1000
Code Eater
83. Ethereum Gas Price
10 * 3 – 6 = ?
Multiplication – 5 gas Subtraction – 3 gas Equal to – 3 gas
Total gas –> 5 + 3 +3 = 11 Gas
1 Gas price = 10 gwei
Total Gas price = 11 * 10 = 110 gwei
Code Eater
Code Eate
84. 84
What is Gas Price?
• It is the amount the sender wants to pay per unit of gas to get the
transaction mined. gasPrice is set by the sender.
• Gas prices are denoted in gwei. (1 gwei = 10^-9 ETH)
1 Gas price = x gwei where x >0
• X is decided by the demand and supply in the market.
Code Eater
85. Gas Price
• The higher the gas price the faster the transaction will be
mined. It just like the transaction in Bitcoin.
Code Eater
97. Full Node
• All states can be derived from a full node (although very old states are
reconstructed from requests made to archive nodes)
• Serves the network and provides data on request.
• Stores full blockchain data (although this is periodically pruned so a full node
does not store all state data back to genesis)
• Participates in block validation, verifies all blocks and states.
98. Light Node
• The light nodes do not participate in consensus (i.e. they cannot
be miners/validators), but they can access the Ethereum blockchain with the
same functionality as a full node.
• Stores only the block header and depends on full node.
• For low capacity devices which cannot afford to store the gigabytes of data.
99. Archive Nodes
• Stores everything kept in the full node and built an archive of historical
data.
• Requires terabytes of diskspace.
Code Eater
104. Why do we need blockchain?
Code Eater
1. Decentralization: One of the primary reasons for using blockchain technology is to create decentralized
systems. In a decentralized network, there is no central authority or intermediary to control the system, which
makes it more transparent, secure, and resistant to censorship and corruption.
2. Security: Blockchain technology uses cryptographic algorithms to secure transactions and data. Every
transaction on the blockchain is verified and validated by multiple participants, which makes it difficult for any
unauthorized party to alter the data or steal information.
3. Transparency: Blockchain technology provides transparency by creating an immutable ledger of all
transactions. This means that every participant in the network can see all the transactions that have taken place
and can verify their authenticity, which promotes trust and accountability.
4. Efficiency: Blockchain technology can help reduce transaction costs and increase efficiency by eliminating
intermediaries and automating processes. By removing intermediaries, transactions can be completed faster and
more efficiently, which can help reduce costs and increase profits for businesses.
105. What is Blockchain?
Code Eater
Blockchain is a digital ledger technology that enables the creation of secure, transparent, and decentralized
systems. A blockchain is a distributed database that is maintained by a network of computers, or nodes, rather
than a central authority. Every node in the network has a copy of the database, which contains a record of every
transaction that has ever occurred on the blockchain.
Each transaction on the blockchain is verified and validated by multiple nodes in the network, using advanced
cryptographic algorithms. Once a transaction is verified and validated, it is added to the blockchain, creating a
new block in the chain. This block is then broadcast to every node in the network, and each node updates its
copy of the blockchain accordingly.
The blockchain is considered secure because every block in the chain is linked to the previous block, creating an
unbreakable chain of transactions. Once a block is added to the blockchain, it cannot be altered or deleted,
making it a tamper-proof record of all transactions that have ever occurred on the blockchain.
Blockchain technology has a wide range of applications, including financial services, supply chain management,
healthcare, voting systems, and more. Its potential lies in its ability to create trust, security, and transparency in
various industries, while eliminating the need for intermediaries and enabling new business models.
106. Types of Blockchain
Code Eater
There are generally three types of blockchain: public, private, and hybrid.
1. Public Blockchain: A public blockchain is a decentralized blockchain network that is open to anyone to
participate and access. Anyone can join the network, read, and write data. Examples of public blockchains are
Bitcoin, Ethereum, and Litecoin.
2. Private Blockchain: A private blockchain is a blockchain network that is permissioned, meaning that only
authorized participants can access and participate in the network. Private blockchains are typically used within
organizations or among a group of known and trusted parties. Examples of private blockchains are Hyperledger
Fabric, Corda, and Quorum.
3. Hybrid Blockchain: A hybrid blockchain is a combination of both public and private blockchain networks. It
offers the best of both worlds, as it allows authorized participants to access and participate in the private
network while also being able to interact with the public blockchain network. Examples of hybrid blockchains are
Dragonchain, Aion, and Ark.
In addition to these three types of blockchains, there are also other types of blockchains that are variations or
modifications of the three types. For example, there are consortium blockchains that are a type of private
blockchain where a group of organizations come together to jointly operate and manage the network.
107. Blockchain Applications
Code Eater
Blockchain technology has a wide range of applications across various industries. Here are four examples of how
blockchain is being used:
1. Cryptocurrencies: The most well-known application of blockchain technology is the creation and use of
cryptocurrencies like Bitcoin, Ethereum, and Litecoin. These digital currencies are decentralized, meaning they
are not controlled by any government or financial institution, and they use blockchain technology to facilitate
secure, peer-to-peer transactions.
2. Supply Chain Management: Blockchain technology is being used to improve supply chain management by
creating a transparent and secure record of every transaction that occurs in the supply chain. This helps to
reduce fraud, increase efficiency, and improve trust between all parties involved in the supply chain.
3. Identity Verification: Blockchain technology can be used to create secure and tamper-proof digital identities
for individuals. This can help to reduce identity theft and fraud, as well as make it easier for individuals to prove
their identity in a variety of contexts.
4. Smart Contracts: Smart contracts are self-executing contracts that use blockchain technology to automatically
enforce the terms of a contract. This can help to reduce the need for intermediaries like lawyers and banks, as
well as increase the efficiency and speed of contract execution. Smart contracts are being used in a variety of
industries, including real estate, insurance, and financial services.
108. What is Bitcoin?
Code Eater
Bitcoin is a decentralized digital currency, also known as a cryptocurrency, that operates on a peer-to-peer
network without the need for a central authority or intermediary. It was created in 2009 by an anonymous
individual or group of individuals using the pseudonym Satoshi Nakamoto.
Bitcoin transactions are recorded on a public ledger called the blockchain, which is maintained by a network of
computers, or nodes, around the world. Each transaction on the blockchain is verified and validated by multiple
nodes, using advanced cryptographic algorithms.
One of the key features of Bitcoin is its limited supply. The total number of bitcoins that can ever be created is
capped at 21 million, which means that it is a deflationary currency. This is in contrast to fiat currencies, which
are inflationary and can be printed by central authorities at will.
Bitcoin can be bought and sold on cryptocurrency exchanges, and it can be used to purchase goods and services
from merchants that accept it as payment. Bitcoin can also be stored in digital wallets, which can be accessed
from anywhere in the world, as long as there is an internet connection.
Bitcoin has gained significant adoption over the years and has inspired the creation of many other
cryptocurrencies and blockchain-based applications.
109. What is Peer-To-Peer Network?
Code Eater
A peer-to-peer (P2P) network is a type of network in which each node in the network can act as both a client and
a server, allowing it to share resources and information directly with other nodes without the need for a central
server or intermediary. In a P2P network, each node has equal status and can initiate or respond to requests
from other nodes in the network.
In a P2P network, each node maintains its own copy of the data, which can be shared with other nodes in the
network. This allows for distributed computing, where tasks can be divided among multiple nodes, and resources
can be shared among all the nodes in the network.
P2P networks are commonly used for file-sharing, where users can share files directly with other users, without
the need for a central server. P2P networks are also used for distributed computing, where multiple nodes can
work together to solve complex problems or perform large-scale simulations.
One of the advantages of P2P networks is their scalability, as they can handle a large number of nodes without
the need for a centralized infrastructure. P2P networks are also resilient to failures, as nodes can still
communicate with each other even if some nodes are offline or unavailable.
However, P2P networks can also be more difficult to manage and secure, as there is no central authority to
oversee the network or ensure its security. As such, P2P networks require specialized protocols and security
measures to ensure that data is kept safe and secure.
110. What is client-server model?
Code Eater
The client-server model is a computing architecture in which a central server provides resources, data, or
services to multiple client devices. In this model, the server is responsible for managing the resources and
providing access to them, while the clients are responsible for requesting and using those resources.
In a client-server model, the server is typically a powerful computer or set of computers that are designed to
handle a large amount of traffic and requests from multiple clients simultaneously. The clients, on the other
hand, can be any type of device that can communicate with the server, such as a desktop computer, laptop,
tablet, or smartphone.
When a client wants to access a resource or service provided by the server, it sends a request to the server over a
network connection. The server processes the request, retrieves the necessary data or resources, and sends it
back to the client over the same connection. The client then uses the resources or data it received to perform a
task or display information to the user.
The client-server model is commonly used in many different types of applications and services, such as web
browsing, email, file sharing, and database management. It is a widely used model because it provides a scalable
and efficient way to share resources and services among multiple clients, while allowing the server to manage
and maintain control over those resources.
111. What is Ethereum?
Code Eater
Ethereum is a decentralized blockchain platform that enables the creation of smart contracts and decentralized
applications (Dapps). It was launched in 2015 by Vitalik Buterin, a Canadian-Russian programmer.
Like Bitcoin, Ethereum uses a blockchain to record and verify transactions, but it goes beyond Bitcoin by allowing
developers to build and deploy decentralized applications on top of the blockchain. These applications can be
used for a wide range of purposes, including financial services, gaming, social networks, supply chain
management, and more.
One of the key features of Ethereum is its smart contract functionality. Smart contracts are self-executing
programs that run on the Ethereum blockchain, allowing developers to create decentralized applications that can
execute code without the need for intermediaries or trusted third parties. Smart contracts can be used to
automate a wide range of processes, such as the exchange of assets, the management of digital identities, and
the execution of complex financial transactions.
Ethereum has its own cryptocurrency, called Ether (ETH), which is used to pay for transactions and services on
the network. Ether can be bought and sold on cryptocurrency exchanges, and it is used by developers to
incentivize the validation of transactions and the execution of smart contracts.
112. Ethereum Vs Bitcoin Code Eater
Ethereum and Bitcoin are both decentralized blockchain platforms that have some similarities but also some
important differences. Here are some key differences between Ethereum and Bitcoin:
1. Purpose: Bitcoin was created as a decentralized digital currency, while Ethereum was designed as a platform
for decentralized applications (Dapps) and smart contracts.
2. Mining Algorithm: Bitcoin uses a Proof-of-Work (PoW) mining algorithm, which requires a lot of computational
power and energy to validate transactions and add new blocks to the blockchain. Ethereum currently uses PoS
algorithm, which is more energy-efficient.
3. Programming Language: While Bitcoin has a limited scripting language for transactions, Ethereum allows
developers to create custom smart contracts and decentralized applications using a variety of programming
languages, such as Solidity, Vyper, and Rust.
4. Transaction Speed and Scalability: Ethereum is generally faster than Bitcoin when it comes to processing
transactions, with an average block time of around 15 seconds compared to Bitcoin's 10 minutes. However,
Ethereum is facing scalability issues, with network congestion leading to high fees and slower transaction times
during periods of high demand.
5. Supply: Bitcoin has a finite supply of 21 million coins, while Ethereum does not have a fixed supply, with new
Ether tokens being created through mining and transaction fees.
113. Turing Complete – Bitcoin vs Ethereum
Code Eater
Ethereum is Turing-complete, while Bitcoin is not.
Turing completeness is a measure of the ability of a programming language or system to perform any
computation that a Turing machine can do. A Turing machine is a hypothetical machine that can perform any
computation that is algorithmically computable.
Ethereum's smart contract programming language, Solidity, is Turing-complete. This means that any computation
that can be performed by a Turing machine can also be performed by a smart contract on the Ethereum
blockchain.
In contrast, Bitcoin's scripting language is not Turing-complete. While it can perform some basic operations, such
as verifying signatures and checking if a transaction output has been spent, it is not capable of performing
arbitrary computations.
The Turing completeness of Ethereum's smart contract system allows for the creation of more complex and
sophisticated decentralized applications (dApps) on the Ethereum blockchain, such as decentralized exchanges,
prediction markets, and games. However, it also introduces additional security risks, as smart contracts can
potentially be vulnerable to bugs and exploits that can lead to financial losses for users.
114. Ethereum Gas
Code Eater
In the Ethereum network, "gas" refers to the unit of measurement used to calculate the amount of
computational power required to execute a transaction or smart contract. Gas represents the cost of performing
an operation on the Ethereum network, and it is paid for in Ether, the native cryptocurrency of the Ethereum
network.
Every transaction or smart contract execution in the Ethereum network requires a certain amount of gas to be
used. The amount of gas required depends on the complexity of the transaction or smart contract, and the gas
price is determined by the market demand and supply of gas at any given time.
The gas price is denominated in Gwei, which is a fraction of an Ether. Gas prices can vary widely depending on
network congestion and other factors, and users can set their own gas prices when sending transactions or
executing smart contracts.
If a user sets a gas price that is too low, the transaction may take longer to be confirmed or may not be confirmed
at all. On the other hand, if a user sets a gas price that is too high, they may end up paying more than necessary
for the transaction.
In summary, gas is a measure of the computational resources required to execute transactions and smart
contracts on the Ethereum network, and it is paid for in Ether at a market-determined gas price.
115. Ethereum Gas Price
Code Eater
The Ethereum gas price refers to the cost of executing a transaction or smart contract on the Ethereum network.
It is denominated in "gwei," which is a fraction of an Ether.
Gas price is determined by the supply and demand of computational resources needed to execute a transaction
or smart contract at a given time. When there is high demand for computational resources on the network, gas
prices tend to go up, and when there is low demand, gas prices tend to go down.
Users can set their own gas prices when submitting a transaction or smart contract to the Ethereum network. If a
user sets a gas price that is too low, the transaction may not be confirmed by the network, or it may take a long
time to be confirmed. If a user sets a gas price that is too high, they may end up overpaying for the transaction.
Gas prices are typically expressed in gwei per unit of gas. For example, a gas price of 20 gwei per unit of gas
means that the user is willing to pay 20 gwei for each unit of computational resources needed to execute the
transaction or smart contract.
In summary, the Ethereum gas price is the cost of executing a transaction or smart contract on the Ethereum
network, and it is determined by the market supply and demand of computational resources needed for the
execution. Users can set their own gas prices based on their willingness to pay for the computational resources.
116. Ethereum Gas Limit
Code Eater
The Ethereum gas limit is a parameter in the Ethereum network that determines the maximum amount of gas
that can be used in a single block. Gas refers to the computational resources needed to execute a transaction or
smart contract on the Ethereum network.
The gas limit is set by the miners on the network and is adjusted periodically based on the demand for
computational resources. If the gas limit is set too low, it may not be enough to execute all the transactions and
smart contracts in a block, resulting in an incomplete block. On the other hand, if the gas limit is set too high, it
may result in wasted resources and longer block times.
The gas limit is an important factor in determining the cost of executing transactions and smart contracts on the
Ethereum network. The total cost of executing a transaction or smart contract is calculated by multiplying the gas
price (the amount of Ether paid per unit of gas) by the amount of gas used. Therefore, a higher gas limit means
that more complex and resource-intensive transactions can be executed, but it also means that the transaction
or contract will be more expensive.
In summary, the Ethereum gas limit is the maximum amount of gas that can be used in a single block on the
Ethereum network, set by the miners on the network. It is an important factor in determining the cost and
efficiency of executing transactions and smart contracts on the network.
117. Ethereum Gas Limit and Turing Complete
Code Eater
The Turing completeness of Ethereum is related to the Ethereum gas limit because it places a computational
burden on the network.
Since Ethereum is Turing-complete, it is capable of running arbitrary code, including potentially resource-
intensive programs. This means that a poorly designed or malicious smart contract could potentially consume a
large amount of computational resources and slow down the entire network.
To prevent this from happening, Ethereum has implemented a gas limit. Gas is the unit of computation on the
Ethereum network, and each transaction or smart contract execution requires a certain amount of gas to be paid
by the user. The gas limit is the maximum amount of gas that can be used in a block, which is a collection of
transactions that are processed together on the Ethereum network.
The gas limit serves as a way to limit the amount of computational resources that a single transaction or smart
contract execution can consume. If a transaction or smart contract execution exceeds the gas limit, it will fail and
the user will lose the gas they paid.
Therefore, the gas limit is a crucial mechanism for maintaining the stability and security of the Ethereum
network. It ensures that the network is not overwhelmed by resource-intensive computations, while also
incentivizing developers to write efficient and optimized smart contracts.
118. Types of Nodes
Code Eater
In Ethereum, there are several types of nodes, including:
1. Full Nodes: A full node in Ethereum is a node that stores the complete copy of the Ethereum blockchain and
validates all transactions and smart contracts. It communicates with other nodes on the network to synchronize
the blockchain data and maintains a full copy of the state of the network.
2. Light Nodes: A light node in Ethereum is a node that stores only a portion of the blockchain data and relies on
full nodes to validate transactions and smart contracts. Light nodes are useful for users who don't have the
storage or bandwidth capacity to run a full node.
3. Archive Nodes: An archive node in Ethereum is a node that stores not only the current state of the Ethereum
network but also every historical state of the network. This makes it possible to access data from any point in
time on the Ethereum blockchain.
119. Ethereum Accounts
Code Eater
In Ethereum, there are two types of accounts: externally owned accounts (EOAs) and contract accounts.
1. Externally Owned Accounts (EOAs): An EOA is an account that is controlled by a private key and represents an
individual or organization on the Ethereum network. EOAs are used to store and transfer Ether and other ERC-20
tokens. Each EOA has an Ethereum address, which is a 20-byte hexadecimal string that serves as the identifier for
the account.
2. Contract Accounts: A contract account in Ethereum is an account that is controlled by a smart contract.
Contract accounts are created when a smart contract is deployed to the Ethereum network. The contract account
can hold Ether or other tokens, and the smart contract code defines the rules for how the funds can be
transferred or accessed. Each contract account has a unique Ethereum address, just like an EOA.
The main difference between EOAs and contract accounts is that EOAs are controlled by a private key, while
contract accounts are controlled by a smart contract. EOAs can only hold Ether and other tokens, while contract
accounts can hold Ether, tokens, and other assets that are represented by the smart contract code.
120. What is geth?
Code Eater
Geth (short for "go-ethereum") is one of the most popular client implementations of the Ethereum protocol. It is
written in the Go programming language and is developed by the Ethereum Foundation.
Geth is used to connect to the Ethereum network, synchronize with the blockchain, and interact with smart
contracts and dApps. It is a command-line tool that can be run on a local machine or on a remote server.
Some of the key features of Geth include:
1. Node management: Geth allows users to create and manage Ethereum nodes, which are used to connect to
the Ethereum network.
2. Blockchain synchronization: Geth synchronizes with the Ethereum blockchain, ensuring that the node has the
latest copy of the blockchain.
3. Smart contract deployment: Geth allows users to deploy and interact with smart contracts on the Ethereum
network.
Part 1 of 2
121. What is geth?
Code Eater
4. Mining: Geth supports mining, which is the process of adding new blocks to the blockchain and
earning ether as a reward.
5. Web3 API: Geth provides a Web3 API that allows developers to build decentralized applications
that interact with the Ethereum network.
Overall, Geth is an essential tool for developers, miners, and anyone else who wants to participate in
the Ethereum ecosystem. Its robust feature set and active development community make it a reliable
and widely used client implementation of the Ethereum protocol.
Part 2 of 2
122. What is opcode?
Code Eater
In computer science, an opcode (short for "operation code") is a basic instruction that specifies an operation to
be performed by a computer processor. Opcodes are used in machine language and assembly language
programming, which are low-level programming languages that are directly executed by the processor.
Each opcode represents a specific operation that the processor can perform, such as adding two numbers,
moving data from one memory location to another, or jumping to a different part of the program. Opcodes are
typically represented as binary values that are encoded into the machine language instructions.
Programmers use opcodes to write programs that can be executed by a computer. Higher-level programming
languages, such as C, Java, and Python, use compilers to translate their code into machine language, which
consists of sequences of opcodes and operands.
In summary, an opcode is a fundamental building block of machine language and assembly language
programming that represents a specific operation that a computer processor can perform.
123. What is Ethereum opcode?
Code Eater
In Ethereum, there are two types of accounts: externally owned accounts (EOAs) and contract accounts.
1. Externally Owned Accounts (EOAs): An EOA is an account that is controlled by a private key and represents an
individual or organization on the Ethereum network. EOAs are used to store and transfer Ether and other ERC-20
tokens. Each EOA has an Ethereum address, which is a 20-byte hexadecimal string that serves as the identifier for
the account.
2. Contract Accounts: A contract account in Ethereum is an account that is controlled by a smart contract.
Contract accounts are created when a smart contract is deployed to the Ethereum network. The contract account
can hold Ether or other tokens, and the smart contract code defines the rules for how the funds can be
transferred or accessed. Each contract account has a unique Ethereum address, just like an EOA.
The main difference between EOAs and contract accounts is that EOAs are controlled by a private key, while
contract accounts are controlled by a smart contract. EOAs can only hold Ether and other tokens, while contract
accounts can hold Ether, tokens, and other assets that are represented by the smart contract code.