2 research outputs found

    Determining Optimal Mining Work Size on the OpenCL Platform for the Ethereum Cryptocurrency

    Get PDF
    In terms of cryptocurrency, mining is a process of creating a new transaction block to add it to the blockchain. The cryptocurrency protocol should ensure the reliability of new transaction blocks. One of the popular mining protocols is the Proof-of-Work protocol, which requires the miner to perform a certain work to verify its right to add a new block into the blockchain. To perform this work, high-performance hardware is used, such as GPU. On the program level, hardware needs special computing framework, for example, CUDA or OpenCL. In this article, we discuss Ethereum cryptocurrency mining using the OpenCL standard. The Ethereum cryptocurrency is the most popular cryptocurrency with GPU-based mining. There are several open-source implementations of the Ethereum cryptocurrency miners. The host-part of the OpenCL-miner is considered, which makes the research results independent of the mining algorithm and allows using the results of the research in the mining of other cryptocurrencies. During the research, we have found the problems, which lead to mining productivity loss, and we are looking for the ways to resolve these problems and thus increase mining performance. As part of solving these problems, we have developed the algorithm for the functioning of the miner and proposed the methodology of determining the optimal size of OpenCL work, which allows to reduce the impact of problems found and achieve maximum mining productivity using OpenCL framework

    Research of prohibited content distribution mechanisms in the darknet

    No full text
    In this paper was researched such an issue as prohibited content spreading in the Darknet. Author reviews different ways of data distribution and effective actions against them. The article describes an experiment which was conducted to analyze the extent of the problem and studying the principles of content distribution, for example, one of the sites where the distribution of child pornography, which was the main object of study. During the experiment for collection and analysis of information of the investigated resource the software package was implemented. Received by results of work of modules of software complex data containing the number of active users of the resource, the number created by the video and other content, allow us to estimate the magnitude of the problem. These results prove the assumption that methods used to combat the spread of illicit content, not cope with its task, and the number continues to grow, especially on the resources of the network Darknet. In the final part of the paper provides a set of methods which the author suggests using in future works in which it is planned to try to stop the distribution of content on such sites
    corecore