ArticlePDF Available

Artificial Intelligence Implementations on the Blockchain. Use Cases and Future Applications

Authors:

Abstract and Figures

An exemplary paradigm of how an AI can be a disruptive technological paragon via the utilization of blockchain comes straight from the world of deep learning. Data scientists have long struggled to maintain the quality of a dataset for machine learning by an AI entity. Datasets can be very expensive to purchase, as, depending on both the proper selection of the elements and the homogeneity of the data contained within, constructing and maintaining the integrity of a dataset is difficult. Blockchain as a highly secure storage medium presents a technological quantum leap in maintaining data integrity. Furthermore, blockchain’s immutability constructs a fruitful environment for creating high quality, permanent and growing datasets for deep learning. The combination of AI and blockchain could impact fields like Internet of things (IoT), identity, financial markets, civil governance, smart cities, small communities, supply chains, personalized medicine and other fields, and thereby deliver benefits to many people.
Content may be subject to copyright.
future internet
Article
Artificial Intelligence Implementations on the
Blockchain. Use Cases and Future Applications
Konstantinos Sgantzos 1, * and Ian Grigg 2
1
Department of Computer Science and Biomedical Informatics, University of Thessaly, 35100 Lamia, Greece
2YangSec Ltd, MST9051 Mosta, Malta
*Correspondence: sgacos@gmail.com; Tel.: +30-693-657-6979
Received: 30 June 2019; Accepted: 31 July 2019; Published: 2 August 2019


Abstract:
An exemplary paradigm of how an AI can be a disruptive technological paragon via the
utilization of blockchain comes straight from the world of deep learning. Data scientists have long
struggled to maintain the quality of a dataset for machine learning by an AI entity. Datasets can
be very expensive to purchase, as, depending on both the proper selection of the elements and the
homogeneity of the data contained within, constructing and maintaining the integrity of a dataset is
dicult. Blockchain as a highly secure storage medium presents a technological quantum leap in
maintaining data integrity. Furthermore, blockchain’s immutability constructs a fruitful environment
for creating high quality, permanent and growing datasets for deep learning. The combination of
AI and blockchain could impact fields like Internet of things (IoT), identity, financial markets, civil
governance, smart cities, small communities, supply chains, personalized medicine and other fields,
and thereby deliver benefits to many people.
Keywords:
blockchain; cellular automata; AGI; convolutional neural networks; intelligence
augmentation; deep learning; IoT; identity; decentralized governance; personalized medicine
1. Introduction
One of the biggest puzzles of humanity is the preservation and expansion of knowledge. Humans
strive to provide future generations with accumulated technological and scientific achievements
through immutable records. In ancient times, civilizations have used oral tradition, cave paintings
and stone carvings, before settling on the leaves of papyrus, better known today as paper. Well-made
paper can survive a long time, including centuries and could be copied on demand [
1
]. Unfortunately,
papyrus is not invulnerable to destruction by fire. Alas, the destruction of the Library of Alexandria
led to perhaps the greatest loss of recorded knowledge in history. As has been observed of history
itself, the destruction by fire of recorded knowledge is repetitive; in 2018 a disastrous fire destroyed a
great deal of recorded indigenous knowledge held in the Brazil National Museum [2].
It has been suggested that digital recordings of disks, files and the Internet would be a better
solution, but the record so far is patchy: Disk failures, file system failures and lost websites make
digital storage a non-trivial exercise. We now have a new technology promising to solve all these
problems, called blockchain [3].
Yet humanity has no particular desire to record knowledge for its own sake, rather knowledge is
recorded so knowledge can be expanded as an evolutionary survival strategy. The recent advances
in machine learning within the field of artificial intelligence have not only created a new model for
general computation, they have opened the possibility for the expansion of knowledge beyond the
direct agency of the human mind.
In this paper, we present the hypothesis that a blockchain can not only maintain the datasets on
chain for input into AIs, it can also host an AI advanced enough to work with its own data and achieve
Future Internet 2019,11, 170; doi:10.3390/fi11080170 www.mdpi.com/journal/futureinternet
Future Internet 2019,11, 170 2 of 15
the siren call of independently advancing knowledge—the artificial general intelligence (AGI). We also
explore the possible advancements of such an implementation through the years to come. This is a
controversial proposal, and more so in a decentralized context in which all users will be able to access
and benefit from its computational abilities. It is our belief that this proposal will become a reality
within a decade, give or take.
2. On the Construction of an AI on a Blockchain
On the face of it, blockchain does not suggest itself easily as a platform for AI. Nevertheless,
presenting an immutable storage medium that incorporates a high level of cryptographic security and at
the same time features, which are not available elsewhere in the relevant technologies (e.g., centralized
data centers and supercomputers), we suggest it may become the prominent platform for AI in the
future [4].
2.1. The Blockchain as a Transaction Platform
Blockchain was first introduced in Bitcoin [
3
] as a fully shared ledger that would be globally
visible to all parties when a transaction was recorded on it without any presence of a trusted central
authority. In each transaction, the previous owner signs, using the private signing key corresponding
to her public key, a hash of the transaction in which she received the Bitcoins and the public key of
the next owner [
5
]. The blockchain consists of a set of sequential blocks, where each block embeds
verified transactions. As transactions are processed and verified by miners, they are accepted into
future blocks. Transactions in each block are hashed, paired and hashed again in a Merkle tree until a
single hash is obtained, which is the Merkle root [
6
]. The Merkle root is stored in the header for the
block. Each block header also includes the hash of the of previous block header, which results in a
chain of blocks. The basic structure of blockchain is given in Figure 1[7].
Future Internet 2019, 11, x FOR PEER REVIEW 2 of 15
achieve the siren call of independently advancing knowledge—the artificial general intelligence
(AGI). We also explore the possible advancements of such an implementation through the years to
come. This is a controversial proposal, and more so in a decentralized context in which all users will
be able to access and benefit from its computational abilities. It is our belief that this proposal will
become a reality within a decade, give or take.
2. On the Construction of an AI on a Blockchain
On the face of it, blockchain does not suggest itself easily as a platform for AI. Nevertheless,
presenting an immutable storage medium that incorporates a high level of cryptographic security
and at the same time features, which are not available elsewhere in the relevant technologies (e.g.,
centralized data centers and supercomputers), we suggest it may become the prominent platform for
AI in the future [4].
2.1. The Blockchain as a Transaction Platform
Blockchain was first introduced in Bitcoin [3] as a fully shared ledger that would be globally
visible to all parties when a transaction was recorded on it without any presence of a trusted central
authority. In each transaction, the previous owner signs, using the private signing key
corresponding to her public key, a hash of the transaction in which she received the Bitcoins and the
public key of the next owner [5]. The blockchain consists of a set of sequential blocks, where each
block embeds verified transactions. As transactions are processed and verified by miners, they are
accepted into future blocks. Transactions in each block are hashed, paired and hashed again in a
Merkle tree until a single hash is obtained, which is the Merkle root [6]. The Merkle root is stored in
the header for the block. Each block header also includes the hash of the of previous block header,
which results in a chain of blocks. The basic structure of blockchain is given in Figure 1 [7].
Figure 1. The basic structure of the blockchain [7].
2.2. The Blockchain as a Computing Platform
Blockchain can be considered as a general purpose computing platform at two levels—of the
transaction, and of the system. Unlike prior systems in financial cryptography that specified exactly
the semantics of the transaction, Bitcoin introduced the transaction as a small program in computer
code written in Script [8], a derivative of the FORTH language.
Although opening up the possibility of sophisticated programs such as ‘smart contracts,’ there
are constraints. Transactions in a block are charged for on a byte-by-byte basis, and therefore space is
at a premium. Each transaction has to be verified by every node, including in the face of the halting
problem, or the impossibility of knowing that an arbitrary program will terminate. These constraints
suggest a minimal, efficient language without looping, thus challenging the notion of universal
computing as well as imposing penalties on users for any inefficient calculations. Script can be seen
as Turing complete through the use of two stacks, forming a two-push-down-automaton. In this
arrangement, loops are unrolled in Script with the help of the extra stack [9].
As a system, blockchain can be considered as an unbounded Turing tape exhibiting write once,
read many (WORM) characteristics, where transactions within successive blocks can be linked
computationally, using explicit validating rules to ensure replication. Using Script and a proper
“read and write” head it forms a Wang B machine, being in essence, a special case of a probabilistic
total Turing machine that is controllable in code. Such an implementation is now not only proven to
Figure 1. The basic structure of the blockchain [7].
2.2. The Blockchain as a Computing Platform
Blockchain can be considered as a general purpose computing platform at two levels—of the
transaction, and of the system. Unlike prior systems in financial cryptography that specified exactly
the semantics of the transaction, Bitcoin introduced the transaction as a small program in computer
code written in Script [8], a derivative of the FORTH language.
Although opening up the possibility of sophisticated programs such as ‘smart contracts,’ there are
constraints. Transactions in a block are charged for on a byte-by-byte basis, and therefore space is at a
premium. Each transaction has to be verified by every node, including in the face of the halting problem,
or the impossibility of knowing that an arbitrary program will terminate. These constraints suggest
a minimal, ecient language without looping, thus challenging the notion of universal computing
as well as imposing penalties on users for any inecient calculations. Script can be seen as Turing
complete through the use of two stacks, forming a two-push-down-automaton. In this arrangement,
loops are unrolled in Script with the help of the extra stack [9].
As a system, blockchain can be considered as an unbounded Turing tape exhibiting write
once, read many (WORM) characteristics, where transactions within successive blocks can be linked
computationally, using explicit validating rules to ensure replication. Using Script and a proper “read
and write” head it forms a Wang B machine, being in essence, a special case of a probabilistic total
Future Internet 2019,11, 170 3 of 15
Turing machine that is controllable in code. Such an implementation is now not only proven to exist,
but also available generally in Bitcoin style blockchains [
10
]. Moreover, the blockchain as a storage
medium, or an unbounded Turing tape, oers probably the perfect petri dish for implementation of
evolutionary processes such as genetic algorithms.
2.3. The Genetic Algorithm as a Direction for Machine Learning
A genetic algorithm (GA) emulates the way natural evolution has over billions of years used
division, random mutations and trillions of replications and recombination [
11
,
12
]. A typical GA
consists of an algorithm, called a neuron, that feeds back on itself with from 0.02% to 2% chance of
mutating the inputs to achieve fitness. Unlike a classical computing algorithm approach, which results
in a deterministic, unique solution, the replication and mutability of neurons results in a population of
randomly varied instances that, swarming towards higher performance mediated by fitness, forms a
neural network [13].
2.4. The Cellular Automaton as the Neuron of Genetic Algorithms
The cellular automaton represents the smallest, tightest and general atomic computational unit to
act as a neuron within a genetic algorithm, which makes it singularly suitable for blockchain and its
very constrained transaction size.
Cellular automata were first introduced by John von Neumann in 1951 as a discrete model of
a simple two-state, one dimensional grid of cells that can be either on or o[
14
]. In the 1970s, John
Conway introduced a two-state, two-dimensional cellular automaton named “Game of Life” [
15
].
In the 1980s, Stephen Wolfram conducted a systematic study that organized von Neumann’s cellular
automata on specific set of rules [
16
]. Mathew Cook showed that one of Wolfram’s rules, the CA110,
is Turing-complete. Their work has been published in 2002 in the bestselling book “A New Kind
of Science” [
17
]. William Gilpin establishes that a cellular automaton can be used to construct a
convolutional neural network if and only if it is Turing complete (Figure 2) [18].
Future Internet 2019, 11, x FOR PEER REVIEW 3 of 15
exist, but also available generally in Bitcoin style blockchains [10]. Moreover, the blockchain as a
storage medium, or an unbounded Turing tape, offers probably the perfect petri dish for
implementation of evolutionary processes such as genetic algorithms.
2.3. The Genetic Algorithm as a Direction for Machine Learning
A genetic algorithm (GA) emulates the way natural evolution has over billions of years used
division, random mutations and trillions of replications and recombination [11,12]. A typical GA
consists of an algorithm, called a neuron, that feeds back on itself with from 0.02% to 2% chance of
mutating the inputs to achieve fitness. Unlike a classical computing algorithm approach, which
results in a deterministic, unique solution, the replication and mutability of neurons results in a
population of randomly varied instances that, swarming towards higher performance mediated by
fitness, forms a neural network [13].
2.4. The Cellular Automaton as the Neuron of Genetic Algorithms
The cellular automaton represents the smallest, tightest and general atomic computational unit
to act as a neuron within a genetic algorithm, which makes it singularly suitable for blockchain and
its very constrained transaction size.
Cellular automata were first introduced by John von Neumann in 1951 as a discrete model of a
simple two-state, one dimensional grid of cells that can be either on or off [14]. In the 1970s, John
Conway introduced a two-state, two-dimensional cellular automaton named “Game of Life[15]. In
the 1980s, Stephen Wolfram conducted a systematic study that organized von Neumann’s cellular
automata on specific set of rules [16]. Mathew Cook showed that one of Wolfram’s rules, the CA110,
is Turing-complete. Their work has been published in 2002 in the bestselling book “A New Kind of
Science” [17]. William Gilpin establishes that a cellular automaton can be used to construct a
convolutional neural network if and only if it is Turing complete (Figure 2) [18].
Figure 2. Conways Game of Life as a convolutional neural network. Two convolutional filters
identify the value of the center pixel and count the number of neighbors. These features are then
scored and summed to generate a prediction for the system at the next time point.
As an extension to the above notion, if such an automaton is formed, then a swarm of cellular
automata of similar origin could possibly form what is described as a Church-Turing thesis [19].
Furthermore, above a certain point of computational evolution, they could form what is described
by the Church–TuringDeutsch principle, which states that a universal computing device can
simulate every physical process [20,21].
The fundamental paragon of the topological locality as a result of a dynamical update rule on a
cellular automaton, which consequently certifies that the rule domain is minimal, sets an upper
bound on the rate at which information propagates across space. This locality makes cellular
automata explicitly analogous to a convolutional neural network (CNN), the de facto standard
neural network architecture for the analysis of images or high-dimensional data [18,22]. The
aforementioned study [18] supports our theoretical approach [4].
Figure 2.
Conway’s Game of Life as a convolutional neural network. Two convolutional filters identify
the value of the center pixel and count the number of neighbors. These features are then scored and
summed to generate a prediction for the system at the next time point.
As an extension to the above notion, if such an automaton is formed, then a swarm of cellular
automata of similar origin could possibly form what is described as a Church-Turing thesis [
19
].
Furthermore, above a certain point of computational evolution, they could form what is described by
the Church–Turing–Deutsch principle, which states that a universal computing device can simulate
every physical process [20,21].
The fundamental paragon of the topological locality as a result of a dynamical update rule on
a cellular automaton, which consequently certifies that the rule domain is minimal, sets an upper
bound on the rate at which information propagates across space. This locality makes cellular automata
explicitly analogous to a convolutional neural network (CNN), the de facto standard neural network
architecture for the analysis of images or high-dimensional data [
18
,
22
]. The aforementioned study [
18
]
supports our theoretical approach [4].
Future Internet 2019,11, 170 4 of 15
2.5. Implementing GAs on Blockchains
We show the task of implementing a GA on a blockchain in two ways: By theory and by
practice. In theory, if the blockchain’s transactional computing capability is Turing complete, then
it can implement any algorithm including a cellular automaton. Even though the notion of Turing
completeness is usually associated with loops, this can be finessed with the method of unrolling the
loop [
9
]. As a system, if transactions can be linked by validation rules in e.g., Script, to ensure that
new transactions replicate the GA with some small chance of mutation, evolution is simulated [
4
].
Iteration within a GA is computationally heavy, and to do so on-chain within many transactions would
require an economic or gamified incentive. More likely, iteration would be done ochain, with only
the best optimized generation posted as a new epoch. In the future, genetic algorithm iteration could
be programmed as a new proof-of-work process, re-using the energy currently spent on mining.
In practice, it is shown by Chepurnoy et al. that Turing-completeness of a Script-based blockchain
system can be achieved through unwinding a set of recursive calls between multiple transactions and
several blocks on a blockchain, instead of using a single block to do it [
23
]. Their method implemented
a rule 110 cellular automaton (CA110), a control script to ensure that the CA110 transformation keeps
the same rules during future iterations together with a validation script for the output representing the
single bit, and the unbound grid (Figure 3).
Future Internet 2019, 11, x FOR PEER REVIEW 4 of 15
2.5. Implementing GAs on Blockchains
We show the task of implementing a GA on a blockchain in two ways: By theory and by
practice. In theory, if the blockchain’s transactional computing capability is Turing complete, then it
can implement any algorithm including a cellular automaton. Even though the notion of Turing
completeness is usually associated with loops, this can be finessed with the method of unrolling the
loop [9]. As a system, if transactions can be linked by validation rules in e.g., Script, to ensure that
new transactions replicate the GA with some small chance of mutation, evolution is simulated [4].
Iteration within a GA is computationally heavy, and to do so on-chain within many transactions
would require an economic or gamified incentive. More likely, iteration would be done off chain,
with only the best optimized generation posted as a new epoch. In the future, genetic algorithm
iteration could be programmed as a new proof-of-work process, re-using the energy currently spent
on mining.
In practice, it is shown by Chepurnoy et al. that Turing-completeness of a Script-based
blockchain system can be achieved through unwinding a set of recursive calls between multiple
transactions and several blocks on a blockchain, instead of using a single block to do it [23]. Their
method implemented a rule 110 cellular automaton (CA110), a control script to ensure that the
CA110 transformation keeps the same rules during future iterations together with a validation script
for the output representing the single bit, and the unbound grid (Figure 3).
Figure 3. Evolution of a cellular automaton rule 110. Every non-boundary transaction spends three
outputs, and generates three new ones with identical bit values. Hatching indicates “mid” flag
being un-set. Numbers in the cells on the right pane correspond to the transaction numbers on the
left [23].
Harris and Waggoner propose to reduce the current centralization of AI with a framework to
post and train models on Ethereum blockchain [24]. Their experiment used a single layer perceptron
model on reviews of movies. Ethereum’s high gas costs limited their experiment to small inputs such
as text.
3. Use Cases and Future Applications
A conspicuous question is, what would be our motivation for implementing genetic algorithms
on a medium like blockchain, while more centralized approaches produce equally meaningful
results without the cost of maintaining such a network? There are numerous reasons to store a
neural network on the blockchain, many of which were explored in our previous work [4], but here
we will narrow down the significant ones leading to our conclusion.
By investigating six use cases and future applications, we demonstrate how AI entities can
utilize the capabilities of blockchain for important purposes including, but not limited to, deep
learning, Internet of things (IoT) and Monte Carlo analysis. We also explore the possibility of storing
externally trained AI agents on such a medium and utilize them via pay per use. Finally, we describe
an already trained neural network employed to recover the relevant physical variables, both in
quantum and classical systems.
Figure 3.
Evolution of a cellular automaton rule 110. Every non-boundary transaction spends three
outputs, and generates three new ones with identical bit values. Hatching indicates “mid” flag being
un-set. Numbers in the cells on the right pane correspond to the transaction numbers on the left [23].
Harris and Waggoner propose to reduce the current centralization of AI with a framework to post
and train models on Ethereum blockchain [
24
]. Their experiment used a single layer perceptron model
on reviews of movies. Ethereum’s high gas costs limited their experiment to small inputs such as text.
3. Use Cases and Future Applications
A conspicuous question is, what would be our motivation for implementing genetic algorithms
on a medium like blockchain, while more centralized approaches produce equally meaningful results
without the cost of maintaining such a network? There are numerous reasons to store a neural network
on the blockchain, many of which were explored in our previous work [
4
], but here we will narrow
down the significant ones leading to our conclusion.
By investigating six use cases and future applications, we demonstrate how AI entities can utilize
the capabilities of blockchain for important purposes including, but not limited to, deep learning,
Internet of things (IoT) and Monte Carlo analysis. We also explore the possibility of storing externally
trained AI agents on such a medium and utilize them via pay per use. Finally, we describe an already
trained neural network employed to recover the relevant physical variables, both in quantum and
classical systems.
Future Internet 2019,11, 170 5 of 15
3.1. The Integrity and Validity of Information
Blockchain as a data and framework store presents a number of advantages over the Internet or
over internal stores. By way of two exemplary challenges to the AI world, we present how blockchain
can address these in novel ways.
One of the biggest challenges in data science today is the collection of a proper dataset, which
can be utilized for training a neural network. The pluralism of data over the Internet is enormous,
but the quality is minimal due to the habit of people to post inaccurate things, mainly, because there
is no control. A characteristic paradigm is the “fake news” explosion in recent years, which tends
to propagate faster than well documented and verified news [
25
]. Internet giants like Facebook and
Google have tried to tackle the problem via several computational methods, but even though there
seems to be a sucient theoretical basis for separating “signal” from “noise” [
26
], the problem still
thrives as of today.
A second challenge is adversarial interference with the processing. Tesla’s autopilot was shown
to be vulnerable to remote root privilege attacks that could control the steering system and disturb
the “autowipers” function [
27
]. By introducing false information in the physical world such as minor
changes in the road, it was possible to mislead the car into the opposite lane. The consequential risks
of such vulnerability include, but are not limited to, human injuries and death. Many other examples
abound. Blockchains can address these issues in a comprehensive way through integrity, security,
triple entry and provenance.
Data as fact integrity
: The cryptographic inventions of digital signatures and hashes have led to
a general technique for making data reliable within the context and limitations of the technical means,
a characteristic called integrity. In practice this means that we can state with (cryptographic) certainty
that a piece of data existed no later than a particular time, and that it remains untampered with.
These cryptographic techniques need some software to deliver results. Timestamping [
28
] involves
taking the hash of a document and placing it in a timed sequence of hashes that is kept alive essentially
without limit on time. Each new document’s hash is placed in a block, which is then hashed, along
with a hash of the last block and the current time. As the cryptographic hash is essentially unforgeable
without the actual block, this ensures both the inclusion of the new document(s) and the proof that the
last block, and by induction all previous blocks and included documents, are securely timestamped.
The reliability of the stamp of time is the reliability of the recording of the time in each block, and the
space between the blocks.
Facts by people, securely
: Digital signing takes the evidence of a hash one step further by
indicating who it was that made that stamp. Digital signatures are made by a private key, and
verified by a public key, which latter also takes the form of an identifier for the private key called
a pseudonym. This security model is essential for a blockchain as it ensures that only the proper
pseudonymous agent, as holder of the private key, can make new transactions. Money is perhaps the
most harshly attacked activity of humanity after wars, and therefore can only survive if protected by
strong security. The cryptographic security model of pseudonymous digital signing used in blockchains
is battle-hardened and is available for free for all other applications beyond transfers of value. This is
no trivial benefit as the Internet has quite poor security models, and big Internet applications such as
online banking and autonomous vehicles generally have trouble deploying robust security to users.
Injection of information from unknown sources is rampant, and simply adding data stamping and
signing as used in blockchain makes the attacker’s job harder.
Facts as shared knowledge:
A technique known as triple entry accounting [
29
] adds a further
advantage captured by the aphorism “I know that what you see is what I see.” Triple entry takes the
above integrity techniques and makes records such as oers and acceptances, payments, receipts and
invoices both shared and reliably the same to all relevant parties, which allows software to work with
reliable raw data as facts produced by other parties; triple entry accounting does for trading groups
what double entry accounting did for the firm. Independence from weak data, whether summarized,
prepared, or sanitized, results in the elimination of diverging data sets and unreliable outcomes.
Future Internet 2019,11, 170 6 of 15
For example, clearing and settlement in financial trading is highly simplified if the data is already
guaranteed to be the same for all.
Blockchains go further and incorporate a public database that ensures everyone has access to
the same data, and some parties are financially motivated to keep that database alive. This ability to
always find the data comes at the cost of privacy—whatever is posted to the blockchain as a document
is readable by all. There is some promise of more exotic cryptography and software techniques to allow
posting and recovery of private data into a public store, but these techniques remain experimental, and
the bar of confidentiality or privacy is typically a high one.
Knowledge as truth
: What remains is the provenance of the data at the time of posting.
The blockchain supports two easy controls, and one hard control. Firstly, if the data is a financial
transaction on a blockchain, in an asset mediated by that very blockchain, then the transaction record
can support its own provenance, gained in part that someone went to the eort of moving money, and
in other part that it cost a small fee. Secondly, the use of the pseudonymous digital signatures provides
a minimal form of identity system: A document’s utility and provenance can be analyzed within the
context of all the documents posted by the same agent. If Alice generally posts good documents, then
the next is likely to be good; if Bob posts fake news then people should expect more of the same. Pay on
demand is discussed in the next section.
Consider two trivial statements, “this statement is true” and the equally light “this statement is
false”. Both can as easily be posted, but only one is reliable. Software can guarantee both statements
were made at a time, but cannot guarantee the content is reliable or even meaningful.
Then, to encourage statements that may be relied upon by others requires more: Posters need
to be incentivized to post useful and reliable statements, and to not post useless and unreliable ones.
Due to the pseudonymous nature of blockchain, posting stake or gamification is suggested as a control
however these methods limit participation through the cost of capital and time, and leave aside the
question of how to punish [
24
]. A more serious feedback control on bad participation would be a due
process to also incentivize agents to not post unreliable data. The process itself would also need to
pass the same test of reliability as the statements delivered.
Such a due process is typically called Public Key Infrastructure (PKI). The more common Internet
secure browsing form organizes a certification authority to make signed statements, called certificates.
Its due process is described in documents such as a certificate practice statement, which are reviewed
and approved by browsers and other relying parties. Reliance based on commercial authorities and
their statements is typically only strong enough for relatively weak statements because it lacks an
incentive model to properly handle the liability for bad data [
30
]. CAcert has extended the concept
to cover a wide range of stronger statements through a cooperative form that includes arbitration to
allocate liability in the case of bad data [31].
Blockchains are therefore not only ideal storage for the data of deep learning, they include much
data worth analyzing, and they are ideal storage for the trained frameworks themselves. In time we
expect the discrimination between good and bad data to become easier based on pseudonyms and
incentive models.
3.2. Programs Stored on Chain and Composed Within Transactions—Pay Per Use
As above, a blockchain forms a novel method to store information on a public space, via a payment
procedure [
32
]. As well as static information such as literature or news, we could also store the code
for programs in much the same was as Github [
33
], and indeed, the underlying git system is very like a
blockchain in many respects. These programs can be read freely as they are part of the immutable
data of the chain. Each transaction that posts data on the blockchain costs money and thus it is
uneconomical and non-incentivized to continue posting programs unless there is at least a minimum
revenue possibility.
A collection of on-chain applications can be made browsable via a portal such as Agora [
34
],
forming a new channel for distribution of software (Figure 4). This lays the foundation for a long held
Future Internet 2019,11, 170 7 of 15
ideal of programmers, being an independent marketplace where the developers can be paid for their
work without any intermediates [
35
]. The space is fairly new at the moment of writing but it does
not lack for novelty and innovation, including applications in art, music, money and weather. Other
applications that could fit include IoT sensors over power grids, security systems or transport networks.
Future Internet 2019, 11, x FOR PEER REVIEW 7 of 15
Other applications that could fit include IoT sensors over power grids, security systems or transport
networks.
Figure 4. Agora, the homepage for Metanet [33].
By employing the OP_RETURN op_code instruction of Bitcoin Script [7], a new world of
application utilization emerges. Transactions can refer to and run other programs on a “pay per use”
basis, allowing for programmers to ‘compose’ larger programs out of many smaller ones. An
example of pay per use is found in Moneybutton [36]. With such tools it is possible to construct a
‘Metanet’ being an immutable version of Internet as we now experience it.
3.3. Trained AI Frameworks that can be Parsed Via Pay on Demand
As well as storing code and programs on the blockchains, we could also post trained neural
networks. Then, users could post new transactions that cited and used the trained CNN frameworks
to check the submitted information [24]. For example, consider a deep learning algorithm like Sci-kit
in Python [37], that classifies documents, in a very different approach to that we might expect:
Words can be represented as embedding vectors with the idea that two words that are semantically
similar to each other have similar vectors (Figure 5) [38].
Figure 5. Representation of a 2D embedding space with five embedding vectors each representing a
different word [38]: Red—queen, blue—king, green—man, black—woman and yellow—oil.
Figure 4. Agora, the homepage for Metanet [33].
By employing the OP_RETURN op_code instruction of Bitcoin Script [
7
], a new world of
application utilization emerges. Transactions can refer to and run other programs on a “pay per use”
basis, allowing for programmers to ‘compose’ larger programs out of many smaller ones. An example
of pay per use is found in Moneybutton [
36
]. With such tools it is possible to construct a ‘Metanet’
being an immutable version of Internet as we now experience it.
3.3. Trained AI Frameworks that can be Parsed Via Pay on Demand
As well as storing code and programs on the blockchains, we could also post trained neural
networks. Then, users could post new transactions that cited and used the trained CNN frameworks
to check the submitted information [
24
]. For example, consider a deep learning algorithm like Sci-kit
in Python [
37
], that classifies documents, in a very dierent approach to that we might expect: Words
can be represented as embedding vectors with the idea that two words that are semantically similar to
each other have similar vectors (Figure 5) [38].
Future Internet 2019,11, 170 8 of 15
Future Internet 2019, 11, x FOR PEER REVIEW 7 of 15
Other applications that could fit include IoT sensors over power grids, security systems or transport
networks.
Figure 4. Agora, the homepage for Metanet [33].
By employing the OP_RETURN op_code instruction of Bitcoin Script [7], a new world of
application utilization emerges. Transactions can refer to and run other programs on a “pay per use”
basis, allowing for programmers to ‘compose’ larger programs out of many smaller ones. An
example of pay per use is found in Moneybutton [36]. With such tools it is possible to construct a
‘Metanet’ being an immutable version of Internet as we now experience it.
3.3. Trained AI Frameworks that can be Parsed Via Pay on Demand
As well as storing code and programs on the blockchains, we could also post trained neural
networks. Then, users could post new transactions that cited and used the trained CNN frameworks
to check the submitted information [24]. For example, consider a deep learning algorithm like Sci-kit
in Python [37], that classifies documents, in a very different approach to that we might expect:
Words can be represented as embedding vectors with the idea that two words that are semantically
similar to each other have similar vectors (Figure 5) [38].
Figure 5. Representation of a 2D embedding space with five embedding vectors each representing a
different word [38]: Red—queen, blue—king, green—man, black—woman and yellow—oil.
Figure 5.
Representation of a 2D embedding space with five embedding vectors each representing a
dierent word [38]: Red—queen, blue—king, green—man, black—woman and yellow—oil.
Under such a model, concepts that are similar to each other are close together (e.g., man and
woman) in this embedding space and concepts not related are further apart (e.g., oil). Therefore,
assuming that the embedding vectors for dogs and puppies are close together, the similarity of two
documents talking about dogs and puppies will be recognized by a machine learning algorithm or a
deep neural network trained on that topic [
38
]. Such tools, well composed, could assist programmers
in their use of the aforementioned code repository.
3.4. Artificial Intelligence Agents Trained Via Submitted Blockchain Data and Operated on Chain.
An artificial intelligence agent (AIA) goes one step further than a trained framework by utilizing
the new data in the user’s request to advance the neural network forward by a new epoch; in other
words, it learns as it works. Fitness is determined when minimal or no other changes are required
with any future submitted data. Let us consider an example extended from above. In the recent years,
a plethora of authored code in various programming languages has been stored in repositories such as
GitHub [
33
]. Complex algorithmic programming is a time consuming and costly task; a programmer
requires a high intellect and years of education, and complex tasks often require many months of
collaborating work between several parties.
Blockchains can assist in two ways. Firstly, as above, a blockchain can store the code. Secondly, an
AIA, encoded on the blockchain, can assist the programmer in many ways: Conversion of code from
one language to another, searching for algorithms that match patterns, conformance of requirements or
documentation to code and eventually in authoring new algorithms. Using deep learning techniques
and big data mining from existing code repositories, this AIA would present a reliable, secure and
disruptive technology.
AIAs are described in computer science as abstract entities that are able to monitor and evaluate
certain parameters through various input sources (i.e., IoT sensors, I/O raw data, databases, ontologies,
etc.) towards achieving a rational goal [
39
,
40
]. Their basic role is usually described as that of an
actuator, with the simplest implementation of an AIA to be derived from a reflex machine, such as a
thermostat, but they can vary from very simple to extremely complex. There are four architectures of
AIA to be considered [
39
]: (a) Logic-based agents (decision of action is derived via logical inference),
(b) reactive agents (decision is based in some form of direct mapping from situation to action),
(c) belief–desire–intention agents (decision depends upon the manipulation of data structures) and
(d) layered architectures (decision is realized via various software layers, each depended on its
environment at dierent levels of abstraction). There are also five classes of AIA to be considered [
40
]:
(a) Simple reflex agents, (b) model-based reflex agents, (c) goal-based agents, (d) utility-based agents
and (e) learning agents.
All the above AIAs learn from the submission of fresh data, e.g., code from programmers from
anywhere in the world, who will be incentivized to post their work on the blockchain, either for gaining
revenue, or under a specific license (i.e., Opensource, MIT, etc.). Moreover, a new opportunity emerges
through the concept of AIA paying another AIA for services or paying a sensor for data. An example
Future Internet 2019,11, 170 9 of 15
is WeatherSV (Figure 6), which oers weather prediction to users in their selected territory by utilizing
the data collected by a set of global IoT sensors. The service can be activated for a cost of $5 AUD and
delivers hourly reports for about 123 days, based on current fees of Bitcoin SV [41].
The notion of live data feed and immutable storage can form a basis for implementing several
other applications such as decentralized logistics, as shown in the work by Christodoulou et al. [
42
],
also as a supply chain for manufacturing, the agricultural sector or even a modern city. A Smart
City [
43
] that uses dierent types of electronic IoT sensors to collect data and then uses the data to
manage assets and resources eciently can use the blockchain as an immutable record ledger both for
integrity, for deep learning and also for historical purposes. For example, Zweispace in Japan now
stores the national earthquake sensor data on the blockchain [44].
By utilizing the proper AIA or CNN with the data provided on chain, we can have productive
outcomes towards the implementation of a far more economic and robust Smart City economy.
A similar opportunity applies wherever there are vast amounts of both data and users learning from
that data: Trac control and other problems in transportation and supply chain, education and health.
Additional applications of AIAs on chain can facilitate analysis of financial markets, DNA for rare
genetic disease detection, high definition imaging of stellar bodies for possible collision detection,
auditing and protection of network against attacks and more.
Future Internet 2019, 11, x FOR PEER REVIEW 9 of 15
that data: Traffic control and other problems in transportation and supply chain, education and
health. Additional applications of AIAs on chain can facilitate analysis of financial markets, DNA for
rare genetic disease detection, high definition imaging of stellar bodies for possible collision
detection, auditing and protection of network against attacks and more.
Figure 6. WeatherSV demonstrates the ability to index and retrieve climate data immutably stored
on a distributed ledger [41].
A collaboration of AIAs as a swarm is also applicable via payments in the form “Machine
paying Machine” in order to achieve solutions to more complex tasks.
3.5. Proof of Work Via dSHA256 as a Source of Randomness and Monte Carlo Method Via ASICs
The concept of proof of work (PoW) as introduced in Bitcoin is a reward mechanism to the
solvers of a random puzzle. A hash puzzle is a set of mathematical problems, which are solved by
creating a hash that conforms to a specific requirement, being firstly a hash over a new proposed
block. Secondly, in the block’s header, an extra value called a ‘nonce’ or ‘number-once-used’ is
cycled repetitively to produce a trial hash value with a large number of leading zeros.
Solving the puzzle is competitive and thus computationally difficult. Unless the cryptographic
hash function used for calculating the block hashes is broken, the only fruitful strategy is to try
different nonces until a solution is found [45]. Bitcoin uses the SHA-256 hash function [46], which is a
leading standard for hashes.
The fastest participant to find and propagate a winning solution is rewarded. Bitcoin also
includes two feedback loops that vary over time. Firstly, the difficulty, or the minimum threshold of
number of zeros, is varied every two weeks to keep the expected time to solve around 10 min.
Secondly, the reward paid for solving the puzzle halves every four years.
At the time of writing, the reward stands at 12.5 Bitcoins [47] and the Bitcoin Hashrate is
estimated on average at 53.85 Eh/s (SHA-256) [48]. That gives us 53.85 × 10
18
random numbers per
second, in effect, making the miners pseudo-random number generators (PRNGs). The result of this
is the generation of an impressively large number of random numbers, for every block. A
well-known computational method that is capable of providing solutions in Non-deterministic
Polynomial-time – Hard (NP-hard) and Non-deterministic Polynomial-time – Complete
(NP-complete) problems via utilizing the random numbers that a SHA256 miner can produce is the
Figure 6.
WeatherSV demonstrates the ability to index and retrieve climate data immutably stored on a
distributed ledger [41].
A collaboration of AIAs as a swarm is also applicable via payments in the form “Machine paying
Machine” in order to achieve solutions to more complex tasks.
3.5. Proof of Work Via dSHA256 as a Source of Randomness and Monte Carlo Method Via ASICs
The concept of proof of work (PoW) as introduced in Bitcoin is a reward mechanism to the solvers
of a random puzzle. A hash puzzle is a set of mathematical problems, which are solved by creating a
hash that conforms to a specific requirement, being firstly a hash over a new proposed block. Secondly,
in the block’s header, an extra value called a ‘nonce’ or ‘number-once-used’ is cycled repetitively to
produce a trial hash value with a large number of leading zeros.
Future Internet 2019,11, 170 10 of 15
Solving the puzzle is competitive and thus computationally dicult. Unless the cryptographic
hash function used for calculating the block hashes is broken, the only fruitful strategy is to try dierent
nonces until a solution is found [
45
]. Bitcoin uses the SHA-256 hash function [
46
], which is a leading
standard for hashes.
The fastest participant to find and propagate a winning solution is rewarded. Bitcoin also includes
two feedback loops that vary over time. Firstly, the diculty, or the minimum threshold of number
of zeros, is varied every two weeks to keep the expected time to solve around 10 min. Secondly, the
reward paid for solving the puzzle halves every four years.
At the time of writing, the reward stands at 12.5 Bitcoins [
47
] and the Bitcoin Hashrate is estimated
on average at 53.85 Eh/s (SHA-256) [
48
]. That gives us 53.85
×
10
18
random numbers per second,
in eect, making the miners pseudo-random number generators (PRNGs). The result of this is the
generation of an impressively large number of random numbers, for every block. A well-known
computational method that is capable of providing solutions in Non-deterministic Polynomial-time
Hard (NP-hard) and Non-deterministic Polynomial-time Complete (NP-complete) problems via
utilizing the random numbers that a SHA256 miner can produce is the Monte Carlo method. Monte
Carlo is a category of computational algorithms, which is based on continuous and repetitive random
sampling in order to solve complex problems. The underlying concept is to use random solutions
to solve problems that can be deterministic in nature. The method is often used in physical and
mathematical cases and is very useful when it is dicult or impossible to use other approaches.
The Monte Carlo method is used in three categories of problems: Optimization, numerical integration
and guessing results from a probability distribution [49].
As a side-eect of PoW, blockchains can extend their activity to solving massive Monte Carlo
problems. Blockchains are in eect the biggest PRNG in the world right now and probably the fastest
PRNG swarm that could solve literally any computationally hard problem via utilizing the Monte
Carlo method.
3.6. Solving Physical Problems via CNNs and Simulation of Quantum Computing
There are numerous studies demonstrating the abilities of a neural network. For instance, a
deep neural network is able to learn through training and produce fairly accurate predictive results
correlated to the dataset they trained on, while recurrent neural networks are being used towards the
deterministic analysis of speech recognition, down to video prediction [
50
]. Neural networks can be
trained oine and then can be stored on the blockchain and parsed via pay per use. On another note,
because of the fact that users will be using the medium to submit data the entity can evolve to a higher
scale and store a more advanced version of itself for later use.
One of the most dicult tasks in neural network mechanics is to understand how they function
and how they are able to extract results. They are often used as “black boxes” and consequently our
perception of the mechanics of them are limited. Several studies have tried to analyze the inner-works
of CNNs but we believe the most prominent way to answer this question is the simulation of physical
concepts and the solution analysis.
What we propose is not new; several studies have tried to employ a CNN towards simulation
of a “human-like problem analysis” and the results were quite impressive. We now know that a
Region-based Convolutional Neural Network (R-CNN) can be trained recursively to analyze problems
via data pretty much like a human brain can. Moreover, the outcome is extremely accurate to the
expected results. The materialization graph of SciNet, a CNN that represents the aforementioned
process is displayed below (Figure 7) [51].
Future Internet 2019,11, 170 11 of 15
Figure 7.
Learning physical representations. (
a
) Human problem analysis. Experimental observations
are compressed into a simple representation (encoding). If any question is asked about the physical
setting, the human should be able to produce a correct answer using only the representation and
not the original data. The process of producing the answer (by applying a physical model to the
representation) is called decoding; (
b
) Neural network structure for SciNet. Observations are encoded
as real parameters fed to an encoder (a feed-forward neural network), which compresses the data into a
representation (latent representation). The question is also encoded in a number of real parameters,
which, together with the representation, are fed to the decoder network to produce an answer [51].
In the aforementioned work and by utilizing the same concept it is shown that, based only on
(simulated) experimental data and without being given any assumptions about quantum theory,
SciNet recovers a faithful representation of the state of small quantum systems and can make accurate
predictions (Figure 8) [51].
Future Internet 2019, 11, x FOR PEER REVIEW 11 of 15
In the aforementioned work and by utilizing the same concept it is shown that, based only on
(simulated) experimental data and without being given any assumptions about quantum theory,
SciNet recovers a faithful representation of the state of small quantum systems and can make
accurate predictions (Figure 8) [51].
The implementation of neural networks based on similar technologies when implemented on
the blockchain can dramatically amplify their computation abilities via the utilization of a PRNG
engine provided by the PoW procedure as per solving complex problems. Furthermore, such a
computational entity can provide solutions to many problems that are now impossible to approach
(e.g., deterministic computing and chaotic system analysis).
Figure 8. Quantum tomography. SciNet is given tomographic data for one or two qubits and an
operational description of a measurement as a question input and has to predict the probability of
outcomes for this measurement. It was trained with both tomographically complete and incomplete
sets of measurements, and found that, given tomographically complete data, SciNet could be used
to find the minimal number of parameters needed to describe a quantum state (two parameters for
one qubit and six parameters for two qubits) [51].
4. Discussion
The implications of such a hypothesis are enormous. Ray Kurzweil predicted that by the end of
2029 the world would possibly have one AI that matches human intelligence [52]. What we show in
this paper endorses this prediction, and suggests the possibility this could happen much earlier.
Preliminary forms of such entities are already in existence [53], so it is not a matter of if, rather when
this happens. The evolutionary process, from a certain point forth, follows an exponential curve.
Hence, when the critical point of reaching human intelligence is met, then it might be a matter of
months or even days before it expands to much higher levels. The materialization of such an entity
on a blockchain provides many pros and cons that we have presented in this paper. The cost of PoW,
the cryptographic security procedure and the mandatory usage of tokens for fees, ensures that such
an entity will not be able to interact without a fee. This is both good and bad.
Several times in the past, the scientific world has witnessed an inherent limitation of every
formal axiomatic system. Each system could contain problems that were impossible to be solved
from the theory itself. The incompleteness theorem of Kurt Gödel [54] describes this barrier and
predicts that a new theory needs to be invented, in effect to expand the old theory, so that science
will once again be able to produce solutions to problems. Gödel expansions are the path to
innovation, the “secret” ingredient for new science. They happened with Riemannian geometry and
relativity theory, with the parabolic and Euclidean geometry, with the information technology and
physics, biology, mathematics and now with an artificial intelligence of a generic form (AGI).
If such a computational entity were to be materialized and controlled by only one company or
one country, it would likely be the biggest tragedy for all the rest of us that do not possess a similar
entity. Blockchain forms the most adequate medium for such a computational scheme, since it is
decentralized, secure, non-controllable and it will be accessible by everyone [24]. Numerous
scientific problems will find their solutions by only utilizing a portion of the computational power
that this entity will have. Personalized medicine will also benefit, since by using newer encryption
Figure 8.
Quantum tomography. SciNet is given tomographic data for one or two qubits and an
operational description of a measurement as a question input and has to predict the probability of
outcomes for this measurement. It was trained with both tomographically complete and incomplete
sets of measurements, and found that, given tomographically complete data, SciNet could be used to
find the minimal number of parameters needed to describe a quantum state (two parameters for one
qubit and six parameters for two qubits) [51].
The implementation of neural networks based on similar technologies when implemented on the
blockchain can dramatically amplify their computation abilities via the utilization of a PRNG engine
provided by the PoW procedure as per solving complex problems. Furthermore, such a computational
entity can provide solutions to many problems that are now impossible to approach (e.g., deterministic
computing and chaotic system analysis).
4. Discussion
The implications of such a hypothesis are enormous. Ray Kurzweil predicted that by the end
of 2029 the world would possibly have one AI that matches human intelligence [
52
]. What we show
in this paper endorses this prediction, and suggests the possibility this could happen much earlier.
Preliminary forms of such entities are already in existence [
53
], so it is not a matter of if, rather when
this happens. The evolutionary process, from a certain point forth, follows an exponential curve.
Future Internet 2019,11, 170 12 of 15
Hence, when the critical point of reaching human intelligence is met, then it might be a matter of
months or even days before it expands to much higher levels. The materialization of such an entity on
a blockchain provides many pros and cons that we have presented in this paper. The cost of PoW, the
cryptographic security procedure and the mandatory usage of tokens for fees, ensures that such an
entity will not be able to interact without a fee. This is both good and bad.
Several times in the past, the scientific world has witnessed an inherent limitation of every formal
axiomatic system. Each system could contain problems that were impossible to be solved from the
theory itself. The incompleteness theorem of Kurt Gödel [
54
] describes this barrier and predicts that a
new theory needs to be invented, in eect to expand the old theory, so that science will once again
be able to produce solutions to problems. Gödel expansions are the path to innovation, the “secret”
ingredient for new science. They happened with Riemannian geometry and relativity theory, with the
parabolic and Euclidean geometry, with the information technology and physics, biology, mathematics
and now with an artificial intelligence of a generic form (AGI).
If such a computational entity were to be materialized and controlled by only one company or
one country, it would likely be the biggest tragedy for all the rest of us that do not possess a similar
entity. Blockchain forms the most adequate medium for such a computational scheme, since it is
decentralized, secure, non-controllable and it will be accessible by everyone [
24
]. Numerous scientific
problems will find their solutions by only utilizing a portion of the computational power that this
entity will have. Personalized medicine will also benefit, since by using newer encryption mechanisms
in blockchain it will be technically possible to store medical information such as a person’s DNA on it
and get medical results privately. As a concept, AGI on the blockchain even suggests a step towards
direct democracy as it was presented by the ancient Greeks; a cornerstone for building up the next
evolutionary step for humanity.
5. Conclusions
Bitcoin’s creation in 2009 was a revolutionary idea in the financial world. It is considered as the
digital cash of the new age. It is secure, non-centralized and can provide the world with “honest”,
non-inflatable money. Game theory is utilized in maintaining consensus, without the need of any
central corruptible authority, while competition with national monies can present a check on inflation,
sorely lacking in the international financial system since the demise of gold as a real force.
Implementing a swarm of AIAs on the blockchain can form what is described as the
Church–Turing–Deutsch principle machine, which could in turn, open a brave new world of
applications for a better humanity from computer assisted governance to extinction level events
predictions. With emergent technologies such as the human–machine interface and intelligence
augmentation devices, able to decode human brainwave patterns, such an entity could directly interact
with the human brain, use it as a dataset to acquire information on how it functions and ultimately,
provide extensive knowledge in many fields of science, which was previously impossible to acquire.
Using deep machine learning techniques, the evolutionary level of the algorithmic entity could reach
unprecedented levels exponentially, by utilizing the big data acquired by smart contracts, everyday
transactions, weather conditions, IoT or stored literature on a blockchain.
The interaction with such an entity could be achieved via interpreted commands using the
transaction system. For this, blockchain tokens (e.g., coins) will be used as a means of transaction and
fees are important. At the first stages of evolution the system would provide low-level programming
support, but could be educated through machine learning to accept natural language interaction.
Finally, a point of discussion could be about “what happens next”? At this point, a reference to
the great text of Isaac Asimov, “The Last Question” [55] is needed:
Can this chaos not be reversed into the Universe once more? Can that not be done?
Author Contributions:
K.S. conceived the ideas and authored the paper except for Section 3.1. I.G. authored
Section 3.1, helped in reforming some ideas and both contributed in minor corrections.
Future Internet 2019,11, 170 13 of 15
Funding: This research received no external funding.
Acknowledgments:
The authors would like to thank Bernhard Frank Müller Hug, Georgios N. Papageorgiou and
Emmanouil Benis for their helpful discussions and proofreading on early drafts of this work.
Conflicts of Interest: The authors declare no conflict of interest.
References
1.
The Archimedes Palimpsest; University of Pennsylvania Libraries: Philadelphia, PA, USA; Available online:
http://archimedespalimpsest.net/(accessed on 1 June 2016).
2.
Cultural Tragedy: Massive Inferno Engulfs 200-Year-Old Museum in Brazil. Available online: https:
//www.cbsnews.com/news/fire-national-museum-brazil-rio-de-janeiro-today-2018-09-02/(accessed on 6
March 2019).
3.
Wright, C. (Pseudonym: Nakamoto, S). Bitcoin: A Peer-to-Peer Electronic Cash System; Whitepaper: Sydney,
Australia, October 2008.
4.
Sgantzos, K. Implementing a Church-Turing-Deutsch Principle Machine on a Blockchain. In Proceedings
of the 12th Hellenic Society for Computational Biology and Bioinformatics Conference, Athens, Greece,
11–13 October 2017; Available online: https://sites.google.com/site/hscbb17/program/HSCBB17-Booklet.pdf
(accessed on 26 May 2019).
5.
Meiklejohn, S.; Pomarole, M.; Jordan, G.; Levchenko, K.; McCoy, D.; Voelker, G.M.; Savage, S. A fistful of
bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on
Internet Measurement Conference, Barcelona, Spain, 23–25 October 2013.
6.
Merkle, R.C. A Digital Signature based on a Conventional Encryption Function. In Advances in
Cryptology—CRYPTO ’87, Santa Barbara, California, August 21-25, 1988, Lecture Notes in Computer Science;
Springer: Berlin, Germany, 1988; Volume 293, pp. 369–378.
7.
Khalilov, M.C.K.; Levi, A. A Survey on Anonymity and Privacy in Bitcoin-like Digital Cash Systems. IEEE
Commun. Surv. Tutor. 2017,20, 2543–2585. [CrossRef]
8.
Opcode List in BitcoinSV (v. 0.2).
©
2009 S. Nakamoto,
©
2009–2016 The Bitcoin Core developers,
©
2018-19
Bitcoin Association. Distributed under the Open BSV Software License. Available online: https://github.com/
bitcoin-sv/bitcoin-sv/blob/master/src/script/script.h (accessed on 12 June 2019).
9.
Aisopos, K.; Kakarountas, A.P.; Michail, H.; Goutis, C.E. High throughput implementation of the new Secure
Hash Algorithm through partial unrolling. In Proceedings of the IEEE 2005 International Workshop on
Signal Processing Systems (SiPS’05), Athens, Greece, 2–4 November 2005; pp. 99–103.
10. Wang, H. A Variant to Turing’s Theory of Computing Machines. JACM 1957,4, 63–92. [CrossRef]
11.
Alberts, B.; Johnson, A.; Lewis, J.; Ra, M.; Roberts, K.; Walter, P. Molecular Biology of the Cell, 5th ed.; Garland
Science: New York, NY, USA, 2007; pp. 264–328.
12.
What is DNA Replication? Available online: https://www.yourgenome.org/facts/what-is-dna-replication
(accessed on 24 February 2017).
13.
Genetic Algorithms, Mathworks. 2017. Available online: https://www.mathworks.com/matlabcentral/
fileexchange/11565-genetic-algorithms-application (accessed on 25 May 2019).
14.
von Neumann, J. The General and Logical Theory of Automata. In Cerebral Mechanisms in Behavior—The
Hixon Symposium; Jeress, L.A., Ed.; John Wiley & Sons: New York, NY, USA, 1951; pp. 1–31.
15.
Gardner, M. Mathematical Games: The fantastic combinations of John Conway’s new solitaire game of life.
Sci. Am. 1970,223, 120–123. [CrossRef]
16. Wolfram, S. Statistical Mechanics of Cellular Automata. Rev. Mod. Phys. 1983,55, 601–644. [CrossRef]
17. Wolfram, S. A New Kind of Science; Wolfram Media Inc.: Champaign, IL, USA, 2002.
18.
William, G. Cellular automata as convolutional neural networks. Department of Applied Physics, Stanford
University. arXiv 2018, arXiv:1809.02942.
19.
Michael, O.R. Turing, Church, Gödel, Computability, Complexity and Randomization: A Personal View.
Available online: http://www.bu.edu/cphs/files/2013/08/Rabin.pdf (accessed on 26 May 2019).
20.
Nielsen, M. Interesting Problems: The Church–Turing–Deutsch Principle. Available online: http://michaelnielsen.
org/blog/interesting-problems-the-church-turing-deutsch-principle/(accessed on 31 May 2019).
21.
Deutsch, D. Quantum theory, the Church—Turing principle and the universal quantum computer.
In Proceedings of the Royal Society, London, UK, July 1984.
Future Internet 2019,11, 170 14 of 15
22.
LeCun, Y.; Bengio, Y.; Hinton, G. Quantum Deep Learning Triuniverse. Nature
2015
,521, 436. Available
online: https://www.scirp.org/reference/ReferencesPapers.aspx?ReferenceID=1899138 (accessed on 3 June
2019). [CrossRef] [PubMed]
23.
Chepurnoy, A.; Kharin, V.; Meshkov, D. Self-Reproducing Coins as Universal Turing Machine. 2018. Available
online: https://arxiv.org/pdf/1806.10116.pdf (accessed on 6 June 2019).
24.
Justin, D.; Harris, B.W. Decentralized & Collaborative AI on Blockchain. In Proceedings of the 2019 IEEE
International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019.
25.
Donath, J. Why Fake News Stories Thrive Online. 2016. Available online: https://edition.cnn.com/2016/11/20/
opinions/fake-news-stories-thrive-donath/(accessed on 10 June 2019).
26.
Gerck, E. The Einstein Phenomenon and Fake News. 2019. Available online: https://www.researchgate.net/
publication/331561385_The_Einstein_Phenomenon_and_fake_news (accessed on 10 June 2019).
27.
Tencent Keen Security Lab. Experimental Security Research of Tesla Autopilot. 2019. Available online: https:
//keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf (accessed
on 09 June 2019).
28. Haber, S.; Stornetta, W.S. How to time-stamp a digital document. J. Cryptol. 1991,3. [CrossRef]
29.
Grigg, I. Triple Entry Accounting. 2004. Available online: https://iang.org/papers/triple_entry.html (accessed
on 26 June 2019).
30.
Grigg, I. PKI Considered Harmful. 2008. Available online: https://iang.org/ssl/pki_considered_harmful.html
(accessed on 26 June 2019).
31.
Grigg, I. An Open Audit of an Open Certification Authority. Large Installation Systems Administration
(LISA). 2008. Available online: https://iang.org/papers/open_audit_lisa.html (accessed on 26 June 2019).
32.
Media, B. Add any File to the BSV Blockchain. 2019. Available online: https://add.bico.media/(accessed on
10 June 2019).
33.
Github.inc. The World’s Leading Software Development Platform. 2019. Available online: https://github.com/
(accessed on 10 June 2019).
34.
Agora Startup Page for Bitcoin SV Applications & Services. Available online: https://www.agora.icu/
(accessed on 12 June 2019).
35.
Grigg, I.; Petro, C.C. Using Electronic Markets to Achieve Ecient Task Distribution. In Proceedings of the
Financial Cryptography First International Conference FC’97, Anguilla, British West Indies, 24–28 February
1997; Springer-Verlag: Germany 1997 LNCS1318. Available online: https://iang.org/papers/task_market.html
(accessed on 10 June 2019).
36.
Money Button Is an API and a UI/UX Layer for the Bitcoin SV Blockchain. Available online: https:
//docs.moneybutton.com/(accessed on 7 June 2019).
37.
Brownlee, J. A Gentle Introduction to Scikit-Learn: A Python Machine Learning Library. 2014.
Available online: https://machinelearningmastery.com/a-gentle-introduction-to-scikit-learn-a-python-
machine-learning-library/(accessed on 26 June 2019).
38.
Hamel, L. Deep Learning Finds Fake News with 97% Accuracy. 2019. Available online: https:
//opendatascience.com/deep-learning-finds-fake-news-with-97-accuracy/(accessed on 10 June 2019).
39. Weiss, G. Multiagent Systems, 2nd ed.; The MIT Press: Cambridge, MA, USA, 2013.
40.
Stuart, J.R.; Norvig, P. Artificial Intelligence: A Modern Approach, 2nd ed.; Prentice Hall: Upper Saddle River,
NJ, USA, 2003; Chapter 2; ISBN 0-13-790395-2.
41.
WeatherSV, Index and Retrieve Climate Data Immutably Stored on a Distributed Ledger. 2019. Available
online: https://weathersv.app/find (accessed on 11 June 2019).
42.
Christodoulou, P.; Christodoulou, K.; Andreou, A. A decentralized application for logistics: Using blockchain
in real-world applications. Cyprus Rev. 2018,30, 171–183.
43.
McLaren, D.; Agyeman, J. Sharing Cities: A Case for Truly Smart and Sustainable Cities; MIT Press: Cambridge,
MA, USA, 2015.
44.
Zweispace Starts to Record Tokyo Earthquake Detector Data into the Bitcoin SV (BSV) Blockchain. Available
online: https://coingeek.com/zweispace-starts-to-record-tokyo-earthquake-detector-data-into-the-bitcoin-
sv-bsv-blockchain/(accessed on 14 June 2019).
45.
Eastlake, D., III; Hansen, T. US Secure Hash Algorithms (SHA and SHA-Based HMAC and HKDF), RFC 6234
(Informational), Internet Engineering Task Force. 2011. Available online: http://www.ietf.org/rfc/rfc6234.txt
(accessed on 12 June 2019).
Future Internet 2019,11, 170 15 of 15
46.
Tschorsch, F.; Scheuermann, B. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies.
IEEE Commun. Surv. Tutor. 2016,18, 2084–2123. [CrossRef]
47.
George, P. Bitness: Bitcoin Usage in an Enterprise Environment, Opportunities and Challenges. Master’s
Thesis, University of Greenwich, London, UK, 2013.
48. Hashrate Comparing data. Available online: https://blockchair.com/compare (accessed on 14 June 2019).
49.
Kroese, D.P.; Brereton, T.; Taimre, T.; Botev, Z.I. Why the Monte Carlo method is so important today. WIREs
Comput. Stat. 2014,6, 386–392. [CrossRef]
50.
Mathieu, M.; Couprie, C.; LeCun, Y. Deep multi-scale video prediction beyond mean square error. arXiv
2016, preprint. arXiv:1511.05440.
51.
Iten, R.; Metger, T.; Wilming, H.; del Rio, L.; Renner, R. Discovering Physical Concepts with Neural Networks;
Institute for Theoretical Physics: ETH Zurich, Zurich, Switzerland, 2018.
52.
Kurzweil, R. Don’t Fear Artificial Intelligence. 2014. Available online: http://time.com/3641921/dont-fear-
artificial-intelligence/(accessed on 14 June 2019).
53.
Watson, AI for Business, 2016–2019,
©
IBM. Available online: https://www.ibm.com/watson/(accessed on 14
June 2019).
54.
Gödel, K. Über formal unentscheidbare Sätze der Principia Mathematica und verwandter Systeme I.
Monatshefte Math. Phys. 1931,38, 173–198. [CrossRef]
55.
Asimov Isaac. The Last Question”, Science Fiction Quarterly. 1956. Available online: https://www.multivax.
com/last_question.html (accessed on 14 June 2019).
©
2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
... This technology provides transparency and data integrity, eliminating the need for centralized intermediaries and ensuring secure transactions and data storage. In combination with AI, blockchain opens up new possibilities for applications in various fields [13]. ...
Article
Full-text available
This paper provides a bibliometric analysis of current research trends in the field of artificial intelligence (AI), focusing on key topics such as deep learning, machine learning, and security in AI. Through the lens of bibliometric analysis, we explore publications published from 2020 to 2024, using primary data from the Clarivate Analytics Web of Science Core Collection. The analysis includes the distribution of studies by year, the number of studies and citation rankings in journals, and the identification of leading countries, institutions, and authors in the field of AI research. Additionally, we investigate the distribution of studies by Web of Science categories, authors, affiliations, publication years, countries/regions, publishers, research areas, and citations per year. Key findings indicate a continued growth of interest in topics such as deep learning, machine learning, and security in AI over the past few years. We also identify leading countries and institutions active in researching this area. Awareness of data security is essential for the responsible application of AI technologies. Robust security frameworks are important to mitigate risks associated with AI integration into critical infrastructure such as healthcare and finance. Ensuring the integrity and confidentiality of data managed by AI systems is not only a technical challenge but also a societal necessity, demanding interdisciplinary collaboration and policy development. This analysis provides a deeper understanding of the current state of research in the field of AI and identifies key areas for further research and innovation. Furthermore, these findings may be valuable to practitioners and decision-makers seeking to understand current trends and innovations in AI to enhance their business processes and practices.
... Financial incentives, such as tax breaks and financial incentives, can be an additional motivator for companies and individuals implementing green innovations. The development of low-interest-rate financing programs can also support sustainable construction projects [10]. ...
Article
Full-text available
The article examines current trends in the use of green technologies in construction in order to create sustainable and environmentally friendly cities. The authors highlight various aspects of green innovation, such as energy-efficient building materials, waste management systems, sustainable infrastructure and energy efficiency of buildings. The paper also condemns the benefits of green innovation, including reducing environmental impacts, improving the energy efficiency of buildings, improving air and water quality in urban environments, and examines examples of successful implementation of green technologies in various countries and cities. The researchers call for the active introduction of green innovations in construction in order to create sustainable cities that can combine modern amenities with minimal impact on natural resources. The article emphasizes that green innovations in construction not only contribute to reducing the negative impact on the environment, but can also significantly save resources and costs for the operation of buildings in the long term. The authors draw attention to the fact that the support and development of green technologies in construction can lead to job creation, stimulate innovation and improve the quality of life in cities. The role of state and municipal authorities in promoting green initiatives, implementing sustainable construction standards, as well as providing financial incentives for enterprises actively involved in creating environmentally sustainable urban environments is also highlighted. In general, the paper notes the need to understand the importance of the transition to green innovations in construction in order to ensure the sustainability of cities, improve the quality of life of citizens, and, what is especially important in the modern world, to cope with the challenges of climate change.
... The increasing complexities of contemporary trade, exacerbated by an everexpanding web of intermediaries, necessitate a robust system capable of tracing the organic journey from farm to table (Nassar et al., 2020). The symbiotic integration of Blockchain's decentralized ledger and AI's cognitive capabilities offers a novel approach to address the intricacies of this challenge (Sgantzos and Grigg, 2019), providing technologically fortified support against counterfeit and fraudulent practices. The rise of the organic food movement has spurred an exponential growth in demand for transparency and authenticity throughout supply chains (Sanders et al., 2019;Sah et al., 2021). ...
Article
Background: The increasing demand for organic legume products has raised concerns about the validity of supply chains. This research explores the integration of blockchain and Artificial Intelligence (AI) technologies as a robust solution for ensuring the accuracy of organic legume products in supply chains. Leveraging the immutable and transparent nature of blockchain, the study establishes a decentralized ledger to record and validate each stage of the supply chain, from crop husbandry to distribution. Methods: Artificial intelligence (AI) algorithms are used in tandem to examine data points and identify irregularities that can signal the existence of fake goods. Through the integration of various technologies, the research aims to offer an advanced and flexible system that can anticipate and detect any risks to the validity of the product. Smart contract implementation on the blockchain enables automated verification procedures assuring, adherence to organic norms and laws. Result: Through case studies and empirical evidence, this paper demonstrates the efficacy of the proposed blockchain and AI integration in mitigating the risks associated with counterfeit organic legume products. This research contributes to the burgeoning field of blockchain and AI applications in supply chain management, offering a novel approach to fortify the integrity of organic food supply chains.
... The normal result of this exploration is a substantial and creative commitment to the improvement of secure and strong conveyed record frameworks in the time of quantum figuring. The joining of grid based cryptography and hash-based marks into a quantum-safe blockchain structure is ready to give a diagram to the up and coming age of cryptographic frameworks, guaranteeing the proceeded with security of computerized exchanges notwithstanding propelling quantum innovations [30] . ...
Article
Full-text available
The examination investigates the joining of quantum-safe cryptographic calculations into blockchain innovation, zeroing in on grid-based cryptography and hash-based marks. Because of the inescapable danger presented by quantum processing, this study proposes a quantum-safe blockchain system intended to upgrade the security and flexibility of circulated records. The cross-section-based cryptography calculation uses the computational intricacy of grid issues, offering protection from quantum goes like Shor's calculation. Simultaneously, hash-based marks give lightweight and quantum-safe choices for advanced marks, supporting the general validity of blockchain exchanges. The examination includes a multi-staged approach, incorporating a complete writing survey, hypothetical system improvement, algorithmic execution, and exhaustive investigation of versatility, execution, and information security. Reproduction results will illuminate ensuing equipment executions, approving the down-to-earth attainability of the proposed quantum-safe blockchain. Besides, the review digs into moral and administrative contemplations, adding to the foundation of capable rules for quantum-safe blockchain innovation. Insights into the performance of lattice-based cryptography and hash-based signatures, as well as the provision of a blueprint for future research in quantum-resistant distributed ledger systems, are among the anticipated contributions. The powerful idea of quantum advancements and blockchain requires continuous investigation, and the exploration makes way for future examinations concerning quantum-safe agreement components, upgraded Quantum Key Dispersion, and interdisciplinary coordinated efforts. 1. Introduction The combination of quantum mechanics and blockchain innovation presents a change in perspective in the scene of secure and decentralized computerized exchanges. Quantum Blockchain, an emanant interdisciplinary field, weds the standards of quantum mechanics with the heartiness of blockchain to address intrinsic weaknesses in traditional cryptographic frameworks [1]. New cryptographic methods, such as Quantum Key Distribution (QKD), which can guarantee communication channels that are proven to be secure, are introduced in quantum mechanics. The urgent need to incorporate quantum-resistant cryptography into distributed ledger frameworks underscores traditional cryptographic algorithms, which are susceptible to quantum attacks like Shor's algorithm [2]. Blockchain, proclaimed for its straightforwardness, changelessness, and decentralized engineering, experiences possible dangers from quantum figuring's unmatched computational power. By examining the fundamental ideas of quantum mechanics, the fundamental principles of blockchain technology, and the symbiotic relationship between these two realms, the Introduction seeks to shed light on the motives behind the fusion of quantum mechanics and blockchain. This examination tries to disentangle the undiscovered possibility of quantum cryptography in strengthening conveyed records against quantum dangers, cultivating a safe and strong computerized future [3]. As quantum innovations advance, figuring out the ramifications and tackling the cooperative energies between quantum mechanics and blockchain is critical for the development of secure and trustless computerized biological systems.
... Successful enterprises generate, spread and integrate knowledge into the technologies they use (Wee and Chua, 2013). Therefore, BCT could enhance knowledge management by formalizing and transforming tacit knowledge into explicit knowledge across enterprises (Bracci et al., 2021;Sgantzos and Grigg, 2019). Akhavan et al. (2018) provided a theoretical framework by integrating BCT into knowledge management within the SC, particularly in terms of how knowledge is created, shared, stored and used. ...
Article
Full-text available
Purpose Despite the importance of green supply chain integration (GSCI) in advancing green innovation (GI) is recognized, it remains unclear how firms can translate their GSCI efforts into GI. Therefore, this study aims to understand how GSCI affects GI, with its dimensions (exploitative GI and exploratory GI), as well as to investigate the mediating role of green knowledge integration capability (GKIC) and the moderating role of blockchain technology (BCT) adoption. Design/methodology/approach On the basis of data collected from 247 managers working in Indian firms in the automotive industry, the authors tested the proposed model using the PROCESS macro tool via SPSS software. Findings The empirical results indicate that GSCI is positively associated with both exploitative and exploratory GI, with a higher effect on exploitative GI. In addition, GKIC mediates the link between GSCI and exploitative GI in contrast to exploratory GI. Notably, the relationship between GSCI and GKIC is stronger when BCT adoption is high. Originality/value This study opens the black box of how GSCI affects exploitative and exploratory GI by revealing the mediating role of GKIC and the moderating role of BCT adoption. It provides valuable insights for practitioners to translate GSCI efforts into GI through developing GKIC and adopting BCT.
... Such amount of scientific literature is overwhelming and challenging for scholars and practitioners to build an inclusive grasp of relevant information. Accordingly, many researchers have provided recent state-of-the-art studies on BT-AI with valuable contributions [26][27][28][29][30]. Despite that, these studies have followed a qualitative review approach which may be significantly impacted by subjective biases or judgments concerning the interpretation of findings based on researchers' cognitive limitations and values. ...
Article
Full-text available
Integrating Artificial Intelligence (AI) with Blockchain Technology (BT) is deemed the fourth generation of BT applications (Blockchain 4.0). This generation has gained considerable attention from the research community. Such attention has led to a vast amount of scientific literature. However, a comprehensive quantitative analysis of this literature is still missing. The present study conducts a scientometric analysis to explore and characterize the development track and trends of BT-AI research. Using the Web of Science (WoS) Core Collection database, a total of 2615 peer-reviewed journal articles were identified between 2017-2023 and extracted for analysis, while employing VOSviewer and Biblioshiny as software tools. First, the publication trend was analyzed, and the pivotal articles were identified. Second, the scientific collaboration networks were analyzed and mapped to identify the key researchers, countries, and organizations. Third, the sources’ productivity and citation were analyzed and mapped to identify the dependable sources of information and the best-fit sources for publishing the BT-AI studies. Fourth, the conceptual structure for the BT-AI literature was analyzed and visualized using keywords co-occurrence and keywords thematic evolution to explore and identify the research hotspots and emerging themes. The findings of this study can help in further familiarizing new researchers with BT-AI literature and assist practitioners, policy-makers, and editors to focus on the promising and arising BT-AI trends for further development.
... One of the great benefits of Bitcoin is that everything takes place in full, auditable public view, albeit behind private/public signature aliases. This is why attempts to place and distribute AI processes on top of Bitcoin have already begun (Sgantzos and Grigg, 2019), facilitating much needed AI process transparency. By naturally integrating with IPv6, Bitcoin also brings competitive advantage in the form of 'diverse peer-to-peer payment mechanisms and advanced identity-management using cryptographically generated addresses' (Davies and Pagani, 2022). ...
Article
Full-text available
In the long run, Bitcoin transaction fees are the only source of revenue for miners. They compete broadly in two main ways: proof of work effort to win blocks; and transaction processing to gather fee rewards into the blocks they win. This paper contributes to existing literature by developing a dynamic model that separates these two functions, and explores implications for aggregate efficiency outcomes. Specifically, when set by free market forces (unrestricted by artificially imposed block size caps), what happens to overall transaction prices and quantities relative to total energy use? When is it worth Stackelberg-leading miners investing in efficiency-improving R&D? What effect does this have on overall efficiency over time? By explicitly separating specialised capital dedicated to SHA256 hashing (for proof of work) from transaction processing capital (for transaction collection and verification), this paper sheds light on these questions. One key conclusion is that miner innovation lowers energy use per transaction over time for elastic enough transaction demand schedules. The more competitors Bitcoin has (existing fiat and data services, and other new Blockchain-based systems), the stronger is this conclusion.
Chapter
A major objective of this book series is to drive innovation in every aspect of Artificial Intelligent. It offers researchers, educators and students the opportunity to discuss and share ideas on topics, trends and developments in the fields of artificial intelligence, machine learning, deep learning and more, big data and computer science, computer intelligence and Technology. It aims to bring together experts from various disciplines to emphasize the dissemination of ongoing research in the fields of science and computing, computational intelligence, schema recognition and information retrieval. Articles are requested that describe original work in the below areas and related technologies but not limited.
Conference Paper
Full-text available
Genetic Algorithms are the elementary particles of a brand-new world of computing. In recent years, technology has evolved exponentially in terms of Hardware, but not in terms of Software. Genetic Algorithms (GAs) are already filling this gap in fields like Big Data mining, Protein Folding predictions, Finance, etc. In this paper we present the possibility of using an "Unbounded Single Taped Turing" medium like a Blockchain to store a Genetic Algorithm that will be able to provide Turing Complete results on any mathematically given problem.
Article
Full-text available
Despite the success of neural networks at solving concrete physics problems, their use as a general-purpose tool for scientific discovery is still in its infancy. Here, we approach this problem by modeling a neural network architecture after the human physical reasoning process, which has similarities to representation learning. This allows us to make progress towards the long-term goal of machine-assisted scientific discovery from experimental data without making prior assumptions about the system. We apply this method to toy examples and show that the network finds the physically relevant parameters, exploits conservation laws to make predictions, and can help to gain conceptual insights, e.g., Copernicus’ conclusion that the solar system is heliocentric.
Article
Full-text available
A prototypical smart contract (wrapped as a decentralized application) is presented for investigating the potential benefits for applying Blockchain for Logistics. The decentralized application proposed exposes the various design challenges that programmers are likely to face when realizing the implementation of the application. The proposed methodolog y utilises the implementation of a dedicated smart contract that was developed based on a special-purpose structure for satisfying the requirements of the use-case. The evaluation was based on the execution of each of the functions measuring the gas costs and execution time. The prototype design was deployed and evaluated on a real-world Blockchain framework and can be considered as a first solution to how the Blockchain technolog y can be utilized within Logistics to overcome any barriers that may exist between professionals. In this paper we present a real implementation of a smart contract for the Logistics industry. The proposed dApp provides a live example of how Blockchain can be utilized within Logistics as it enables users to send and track products.
Conference Paper
Full-text available
How does a lightweight community Certification Authority ("CA") engage in the heavyweight world of PKI and secure browsing? This talk tracks the systems audit of CAcert, an open-membership CA, as a case study in auditing versus the open Internet, community versus professionalism, quality versus enthusiasm. It will walk through the background of "what, why, wherefore an audit," look at how CAcert found itself at this point, and then walk through some big ticket items: risks/liabilities/obligations; assurance and what's in a name; disputes and reliance; and systems and security. Can CAcert deliver on its goal of free certs? The audit is into its 3rd year as of this writing; and remains incomplete. Some parts are going well, and other parts are not; by the end of the year 2008, we should be able to check all of the important areas, or rethink the process completely. Hence, finally, the talk will close with progress and status, and recommendations for the future.
Article
Deep-learning techniques have recently demonstrated broad success in predicting complex dynamical systems ranging from turbulence to human speech, motivating broader questions about how neural networks encode and represent dynamical rules. We explore this problem in the context of cellular automata (CA), simple dynamical systems that are intrinsically discrete and thus difficult to analyze using standard tools from dynamical systems theory. We show that any CA may readily be represented using a convolutional neural network with a network-in-network architecture. This motivates the development of a general convolutional multilayer perceptron architecture, which we find can learn the dynamical rules for arbitrary CA when given videos of the CA as training data. In the limit of large network widths, we find that training dynamics are nearly identical across replicates, and that common patterns emerge in the structure of networks trained on different CA rulesets. We train ensembles of networks on randomly sampled CA, and we probe how the trained networks internally represent the CA rules using an information-theoretic technique based on distributions of layer activation patterns. We find that CA with simpler rule tables produce trained networks with hierarchical structure and layer specialization, while more complex CA produce shallower representations—illustrating how the underlying complexity of the CA's rules influences the specificity of these internal representations. Our results suggest how the entropy of a physical process can affect its representation when learned by neural networks.
Article
Bitcoin is the most widely known distributed, peer-to-peer (P2P) payment network without existence of a central authority. In Bitcoin, users do not use real names; instead, pseudonyms are used. Managing and verifying transactions and issuing of bitcoins are performed collectively by peers in the network. Since pseudonyms are used without providing any identity, it is perceived that Bitcoin provides anonymity. However, it is one of the most transparent payment networks since all transactions are publicly announced. Blockchain, which is the public ledger of Bitcoin, includes all transactions to prevent double-spending and to provide integrity. By using data in the blockchain, flow of bitcoins between transactions can be observed and activities of the users can be traced. When the implications obtained from the blockchain are combined with external data, identity and profile of a user can be revealed. This possibility has undesirable effects such as spending history of a user becomes accessible to other people, or cash flow of a merchant becomes exposed to competitors. There are several proposals as extensions or alternatives to Bitcoin, which improve anonymity and privacy. This survey presents an overview and detailed investigation of anonymity and privacy in Bitcoin-like digital cash systems. We examine the studies in the literature/web in two major categories: (i) analyses of anonymity and privacy in Bitcoin, and (ii) extensions and alternatives to Bitcoin, which improve anonymity and privacy. We list and describe methods and outcomes for both categories and group studies according to these methods and outcomes. We also present relationships between outcomes of analyses and the improvement methods. We compare performances of the methods and show relationships between the proposals. Moreover, we present guidelines for designing an anonymity/privacy improvement and discuss future research directions.
Conference Paper
Learning to predict future images from a video sequence involves the construction of an internal representation that models the image evolution accurately, and therefore, to some degree, its content and dynamics. This is why pixel-space video prediction is viewed as a promising avenue for unsupervised feature learning. In this work, we train a convolutional network to generate future frames given an input sequence. To deal with the inherently blurry predictions obtained from the standard Mean Squared Error (MSE) loss function, we propose three different and complementary feature learning strategies: a multi-scale architecture, an adversarial training method, and an image gradient difference loss function. We compare our predictions to different published results based on recurrent neural networks on the UCF101 dataset.