UNIDAG

in #ico6 years ago

Features and practical applications of UniDAG

Thanks to the technology dagchain, it became possible to keep data in the same way both in computer networks and on the side of individual devices. In addition, the consensus of decentralization makes it possible to apply the dagchain where it was simply impossible before, and expand the scope of use from a small chip in an electric kettle to quantum supercomputers. Unique approaches to already known problems have created the same unique solutions. Undoubtedly, it is impossible to give examples of all the fields of application of UniDAG because of too broad a spectrum, but those few that are indicated below will give a general idea of the possibilities and practical application of the dagchain.

Data retention

Backup logs.

Creating an event logging subroutine based on the UniDAG backup framework is a very useful solution. Often there are situations when intentionally (or not) the log files are erased / changed, which entails various kinds of problems. In fact, such a subroutine can be used wherever it is necessary to keep logs intact and unchanged. The construction of such a subroutine is performed either with the preset time parameters of the “write delay”, which will lead to the formation of blocks strictly in accordance with the time interval, or with the set block size. If necessary, it is possible to use any encryption algorithm at the stage of block formation, which will lead to increased security.

Student attendance program

A small program based on UniDAG will make it possible to create an unchanged student attendance register. It is very relevant in the age of development of digital technologies and young computer geniuses (or hackers). It is possible to create an individual program based on the UniDAG backup framework, which the teacher will use on a separate device. Either create a modified program to a more complex version using the decentralization framework, where the student’s mobile device can act as a client, and the node can be a teacher’s device (mobile phone, laptop, etc.).

Decentralization of existing services and programs

Decentralized “cloud” data services
With the help of the UniDAG decentralization framework, it is possible to easily reformat modern cloud services, increasing the level of security, data transmission speed and the safety of user information. If you use clustering and data distribution in accordance with the geographic location of users and servers, this approach will allow you to distribute loads and increase the stability of the entire system.

Distributed Computing
The problem of computing power is still very acute in many areas of applied science. The system would make it possible to use both quantum computers and small mobile devices in achieving certain computational results. With the help of the symbiosis of active and passive Dagchains UniDAG, network clustering and decentralized power distribution, it became possible to create such a system of grids to solve the most global tasks of our time.

The decentralized identifier (DID)
Allows you to store data in an unchanged dagchain, access to which can be obtained through a personal device. Information such as a driver’s license or bank account is stored in an encrypted form, and platforms such as DID allow you to manage your identities and use them, for example, for various transactions, to enter web services or to make purchases.

Decentralized applications (DApps)

Crypto-decentralized application
With the help of the UniDAG decentralization framework, a decentralized cryptocurrency application can be implemented. It is competing not only with bitcoin and other altcoins, but also is a direct competitor to centralized transaction payment systems Visa, MasterCard, PayPal, etc. Due to the speed of operation, reliability of the algorithm and transparency, public dagchain has every chance to become a new step in the development of the financial system of all mankind. Below is a conditional algorithm for the operation of such an application.

All operations of a cryptocurrency application can be divided into 3 main stages:

Synchronization with UniDAG client network.
Data operations on the client side.
Data operations on the node side.
Synchronize with network

The client generates its identifier (address) using the client software layer.
The client sends its identifier to all nodes in the network.
Each node generates its own pair ‘Client ID — Client Key’ and stores it in the database layer for a predetermined period of time.
Each of the nodes open / closed (encrypted) method forward the key to the client.
Work on the client side

The client creates a block consisting of a header and data for transmission, and adds its identifier (address) to the header.
The program layer of the client automatically (with the possibility of manual control) pings all nodes and forms the order of transmission.
The logic layer encrypts or doesn’t (depending on the system settings) the data specified by the specified method.
The logic layer hashes the data with the specified system method.
The logic layer alternately hashes the given system with the hash algorithm and each of the keys obtained during synchronization with the network, to obtain unique hashes for each node.
After adding all received hashes to the header of the block, the block of the first node is sent from the transmission sequence list.
In the event that there is no response from the receiving node (see step 3 on the node side) for a predetermined period of time, the client passes the block to the next node according to the priority list.
Work on the node side

The node receives the block and verifies the integrity of the data on the node side.
Noda checks a unique hash with a pair of identifier-key. In case of mismatches, the node removes the block from the processing queue.
The initial processing of the data in the block is carried out: the node identifier and the assigned sequence number are added to the block header, after which the block is sent to other nodes. The resulting block that already has a node identifier and a sequence number in the header is not sent.
After the “record delay” expired by the final parameters of the block (based on UniDAG consensus), the header, hash of data and hashes of the 2 previous blocks are hashed to get a hash of the entire block. In the event that the same hash of the block data is detected, a block with a large sequence number is deleted. In the event that other blocks from the same client are found in the “queue repository”, the block with the smallest sequence number is received, and the remaining ones are deleted.
The block is written to the UniDAG chain.
The node sends a signal to the client about the successful (or not) addition of the block to the dagchain.
Decentralized application of smart contracts
A decentralized application where Alice and Bob will have the opportunity to enter into a contract / agreement. Its implementation does not depend on the actions of the third party. Such an application can be implemented with the help of the decentralization framework and two dagchains: active and passive. Active dagchain is the body of the contract (program), the passive one is the place where intermediate data is stored. Because the only constant in the dagchain UniDAG is time, then the possibilities of such smart contracts are significantly increasing in comparison with existing analogues.

Decentralized Marketplace
Implementation of such a decentralized application is possible using the decentralization framework UniDAG, several active and passive dagchains, network clustering, integration with a cryptocurrency application, application of smart contracts and IPFS.

Decentralized social network
To create a decentralized social network with the protection of private information, many unique approaches and solutions will be required for the Dagchin UniDAG, as well as the use of group signatures, integrated P2P applications, secure communication channels, IPFS.

P2P applications

Messaging application
To implement such an application, several variants of work algorithms are possible. Consider one of them.

The application uses a single database of user profiles — decentralized dagchain third party. It stores short information about the user and his public address (public key). The application on the user’s device acts as a client for the database nodes. Parallel to this, each device is an “internal” client and node of the application itself. To search for another user, the public dagchain (profile database) is used. To send a message to another user, a public address (public key) is used and a secure communication channel is created. Each device is a node in relation to the other. The order of identifiers is determined by the rule of priority of receiving “foreign” public keys. Thus, it is possible to create a group chat. For each private conversation, that is, the user-user \ group creates its own separate dagchain. In addition, all correspondence data is stored exclusively on the devices of the users themselves in the form of a dagchain.

Voting application
The voting application may be needed in cases when it is necessary to take any decision to a group of people. A decentralization framework is used, where the user’s device acts as a client and a node at the same time, and also uses a group signature. The device identifiers (addresses) must be known in advance to all network participants.

Internet of Things (IoT)

Smart House
Refrigerators, televisions, air conditioners … With built-in microchips and connection to the Internet, it will be possible to implement global projects of individual houses and entire cities in decentralized networks. Clustering and various modifications of the solutions of the Dagchain UniDAG will make it possible to realize such ideas.

Utility counters
The utility company must use meters connected to the local / global network for gas, water, light, etc. with built-in microchips. Microchips act as clients and transfer blocks with data on the use of consumed resources to the company’s nodes. Data protection is carried out by the presence of certificates stitched into hardware counter software, and the transfer of blocks with a symmetric / hybrid encryption algorithm.

It is last part of our main document. You can read others here:

Part 1: Philosophy of the world UniDAG

Part 2: DAGchain

Part 3: UniDAG Backup Framework

Part 4: The decentralization framework UniDAG

Part 5: Software Development Kit UniDAG

For more information,please visit

http://www.unidag.world

https://www.facebook.com/unidagworld/

https://t.me/World_UniDAG

https://twitter.com/WorldUniDAG

https://bitcointalk.org/index.php?topic=4516651.0

Author : Bitcoin demon
https://bitcointalk.org/index.php?action=profile;u=2078332

Myeth :
0xdb2BC9aFe9d38Ea587302F09ED440C09cC6b27D3

Coin Marketplace

STEEM 0.20
TRX 0.12
JST 0.029
BTC 61038.71
ETH 3404.98
USDT 1.00
SBD 2.50