Virtual currency PPS
This is the share of ore pool in the past three months:
{rrrrrrr}
but in fact, it's of little use. It's just the difference between 100 yuan and 100.5 yuan. If your calculation power is really big, it may be much worse, but if it's ordinary, it's not much different. It is more important to choose one with low or free service charge
This is the pool share in the past three months:
PPLNs: (the purest Group mining) full name is pay per last n shares, which means "pay income according to the past n shares", which means that once all miners find a block, You will allocate the currency in the block according to the proportion of each person's own shares Share means share)
in PPLNs mode, luck is very important. If the mine pool can find many blocks in a day, then everyone's dividend will be very large. If the mine pool can't find any blocks in a day, then everyone will have no income
PPS: pay per share mode --- this mode is to pay for each share immediately. The expenditure comes from the existing bitcoin funds in the mine pool, so it can be withdrawn immediately without waiting for the block generation or confirmation. In this way, the operation behind the scenes of the pool operators can be avoided. This method reces the risk of miners, but transfers the risk to the pool operator. Operators can charge fees to make up for the possible losses caused by these risks
in order to solve the problem that PPLNs sometimes has a high profit and sometimes has no profit, PPS adopts a new algorithm. PPS estimates the daily available mineral resources of the mine pool according to the proportion of your computing power in the mine pool, and gives you basically fixed income every day
do you feel that this is a stable job? In fact, in order to avoid the risk of loss, the PPS model often charges a high handling charge of 7% - 8%< DGM: Double geometric method. It combines PPLNs and geometric reward type, so that the pool operator can avoid part of the risk. The pool operator will collect part of the excavated currency in a short time, and then return it to the miners with normalized value, such as charge and discharge of electric capacity. If you are lucky, you will get less money for each block and more money for poor luck
175btc: the mining node of 175btc works on a shares chain similar to bitcoin blockchain. Because there is no center, it will not be attacked by DOS. Unlike other existing mine pool technologies, each node's working block includes bitcoin paid to the owner of shares in the early stage and the node's own bitcoin. 99% of the reward (50btc + transaction cost) will be distributed equally to miners, and the other 0.5% will be awarded to those who generate blocks
bitcoin home has a detailed introction.
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
1、 Mining principle
at the beginning, we could dig bitcoin with the computer CPU. The founder of bitcoin, Nakamoto Tsung, g out the world's first creation block with his computer CPU. However, the era of CPU mining has long passed, and now bitcoin mining is the era of ASIC mining and large-scale cluster mining
looking back on the mining history, bitcoin mining has gone through the following five times: CPU mining → GPU mining → FPGA mining → ASIC mining → large-scale cluster mining, The mining speed changes are as follows:
CPU (20mhash / s) → GPU (400mhash / s) → FPGA (25ghash / s) → ASIC (3.5tash / s) → large scale cluster mining (3.5tash / s * x)
mining speed, which is called computing power in professional terms, that is, the ability of computer to generate hash collisions per second. In other words, how many hash collisions can our miner do per second is the calculation force. Computing power is the ability to dig bitcoin. The higher the computing power, the more bitcoin you dig, the higher the return
in the world of bitcoin, a data block is recorded about every 10 minutes. All mining computers are trying to package the data block and submit it, and the person who successfully generates the data block will get a bitcoin reward. Initially, bitcoin rewards of 50 bitcoins could be generated about every 10 minutes. But the payment is halved every four years, and now the bitcoin network can generate 25 bitcoins every 10 minutes
to successfully generate data blocks, miners need to find the effective hash value. To get the correct hash value, there is no shortcut. You can only guess. The process of guessing is the process of computer random hash collision. If you guess correctly, you will get bitcoin
Mining method: from a miner to a large-scale mine, you need to prepare a miner, a computer that can connect to the Internet, an AUC, a raspberry pie, power supply and all kinds of connecting lines, etc. The connection order of various devices is network cable - & gt; Raspberry pie - & gt; Microusb cable - & gt; AUC-> 4Pin cable - & gt; Mining machine and power supply
< EM > Figure 3: Mine Map (scale of tens of thousands of mining machines) < / EM >
nowadays, the profit space of small and medium-sized absenteeism who take one mining machine home or deploy a small family workshop (dozens of mining machines) is very limited, and the mining instry is graally concentrating on enterprises and teams with low-cost power resources and professional deployment ability
there are many factors that affect the mining revenue, such as the performance and power consumption of mining machinery, the computing power and difficulty of the whole network, the deployment and operation and maintenance capacity of the mine, the availability of low-cost electricity resources, and the currency price and policy guidance, etc. At present, excellent mining enterprises have the ability of chip research and development, a lot of computing power, professional mine deployment and operation experience, etc. in the future, resources and computing power will be more and more concentrated in these mining enterprises
2. Mine pool
in addition to the above equipment, you also need a necessary tool - mine pool. The function of the mine pool is to gather a large amount of mineral computing power, increase your probability of getting bitcoin, and at the same time, distribute your future bitcoin income to your account in advance
the simple explanation is as follows: now the bitcoin network generates a block every 10 minutes, which contains 25 bitcoins. Suppose there are 1W people in the world participating in mining, then in these 10 minutes, only one lucky person has taken these 25 bitcoins, and the others have nothing. The principle of the mine pool is that everyone mines in teams and distributes according to the agreed distribution method, so that the income of the miners' bitcoin tends to be stable and the risks of the miners are reced. Let's take the most common PPS allocation method as an example. Suppose that your computing power is 10t, and the computing power of the whole mine pool is 100t. Your computing power accounts for 1 / 10 of the total computing power of the mine pool. Suppose that the mine pool can generate 10 bitcoins a day, then you can get 1 bitcoin a day
3. Cloud computing power
in reality, the supply of mining machines often exceeds the demand, and at the same time, the delivery of mining machines needs a long waiting period. Miner installation, commissioning, maintenance and other processes are very complex, which requires a lot of energy. Miners have to enre the noise and heat of miner. For miners, the biggest cost is not these, but the high electricity charges consumed by mining. The profit space of small and medium-sized miners is getting smaller and smaller, even negative
Mining income and risk mining income can be calculated by the following formula:Mining income = generated bitcoin * currency price - mining machinery cost - electricity fee - custody fee
if you are just a small miner, generally you only need to dect mining machinery cost and electricity fee
Mining risks are as follows:
< UL >at present, the number of bitcoin is less than 4.5 million. If we do not issue additional bitcoin, the price of bitcoin will fluctuate, and the price callback will lead to the extension of the payback cycle
mining difficulty improvement at present, our machines can meet the market demand
the risk of power outage
< EM >
< / EM >
according to the notice and announcement issued by the people's Bank of China and other departments, virtual currency is not issued by the monetary authority, does not have legal compensation and mandatory monetary attributes, is not a real currency, does not have the same legal status as currency, cannot and should not be used as currency in the market, and citizens' investment and transaction of virtual currency are not protected by law
warm tips: ① the above explanations are for reference only, without any suggestions. The relevant procts are issued and managed by the corresponding platform or company, and our bank does not undertake the responsibilities of investment, cashing and risk management of the procts
② there are risks in entering the market, so investment should be cautious. Before making any investment, you should make sure that you fully understand the nature of the investment and the risks involved in the proct. After a detailed understanding and careful evaluation of the proct, you can judge whether to participate in the transaction
response time: January 28, 2021. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
2 after successful registration, we will see a message like "your account has been successfully registered and logged in!" on the web page, It means that we have successfully registered and logged in
3 we can click the "dashboard" button in the upper left corner to see the whole monitoring status of the account
note: in this monitoring dashboard, we are most concerned about "total earnings", which is the bitcoin earned by our current account. In the future, as long as we open the website and enter the monitoring dashboard, we can see the relevant information of our account
4 next, please click "Settings" in the navigation bar of the page. In the settings page, we can set the e-mail address, bit wallet address, change the password, etc.
5 if we set the e-mail address in the account, if we forget the password or steal it in the future, we can restore the password through the set e-mail. First, enter our common email address in the "email address" column, and then click the "change" button
6. Next, a confirmation email will be displayed on the page to confirm that it has been sent to our previously set email
7. Then we open our email and find the email sent by BTC guide. Click the confirmation link, and then the page will show that our email has been successfully set
8. If we set email in the account setting, we can also set email notification for the behavior of mining miners. Find the "idle warnings" column on the setting page, click the drop-down list, select the time when you want to send the email, and then click the "change" button on the right. When we set 10 minutes later, if a miner stops mining, the system will automatically send a notification email to our email after 10 minutes. After receiving the email, we knew that the miner was on strike
9 in addition, we are more concerned about the "bitcoin wallet", that is, the wallet address. You don't need to set this address first. It's not too late for me to fill in when I really get bitcoin
10 after the account is set up, we need to set "worker". What is a worker? This is the login account name we will use later on the bitcoin mining client. The system will create a miner name for us by default. The miner name is composed of our registered account name, an underline and a number. For example, our registered account is XXX, and the first miner's name is "XXX"_ 1 "
11 if we want to set multiple miner names, enter a number such as" 2 "in the" create worker "column, and then click the" create "button to add a new miner's account name
12 in the worker settings page, we can also set the mining payment mode of the mine account separately. Payment method, i.e. mining payment method. There are two types to choose from, PPS and PPLNs. The difference lies in the mining mode and handling charge. The handling charge of PPS is 7.5%, while that of PPLNs is 3%. The system adopts PPLNs by default. If you want to change it, please click the "change" button under the payment method
13 in addition, we can also choose the difficulty of mining mode. If our computer has multiple graphics card GPUs or some special machines, we can set the miner's account name under the minimum difficulty
Step 2, download the mining client software
1 after we complete the registration setting, Next, please click "support" in the page navigation menu, and we will see the download link of the client< There are two types of mining client software:
bfgminer: command line operation interface, which can be downloaded directly
cgminer: it is also operated in the command line format, but the download steps are too complicated
let's take bfgminer as an example and click download as shown in the figure
2 then it will jump to the download page of mining tools. There are two formats of mining tools, one is 32-bit system, the other is 64 bit system. According to the number of system bits, download the corresponding tool version
3. The client size of mining tool is less than 5m, which is a zip compressed file. When the download is complete, locate and open the file. Click the right mouse button and select the "" option
4 here, I take paste extraction to the desktop as an example
Step 3, mining client software detailed settings
1 after opening the mining directory, double-click to open the "bfgminer" file under the directory
2 next, look at the BFG minier window and enter the address of the mine pool at the URL. The pool address can be seen in the BTC guide's support page, such as stratum. Btcguild com:3333 , press enter key
3, and then enter the miner's name set on BTC guide website after the user name, press enter key
4, and then enter at will in the password, as shown in the figure
5. Finally, you can see that many numbers are changing, It means mining. It is worth noting that the places marked in the figure indicate the speed of the current machine button
6 in addition to the current mining speed on the mining client software, we can also see the specific mining speed of each miner in the "active worker summary" list on the "dashboard" page of BTC guide website
7 If you want to close the mining tool, you can directly x drop it, You can also directly press the Q key to exit. If you want to open more, you can open another mining tool in the BFG miner directory< Step 4: cgminer command line client software
1 if you really want to mine, the official recommends that we use "cgminer", that is, to run it at the command prompt. Click "support" on BTC guide page, then click "cgminer" download link page, select the corresponding system version
2, then jump to cgminer download page and click the link as shown in the figure
3 and then select a version of cgminer. Here I download a Windows version as an example.
4 take the Windows version of cgminer as an example. After the download, unzip it to the computer.
5 open the cgminer directory, find "cgminer"
6. Double click "cgminer" with the mouse, and a command-line window will pop up, prompting us to enter the URL address of the connection server. Enter "stratum. Btcguild com:3333 ”, press the Enter key on the keyboard
7, and then prompt us to enter "user name", that is, the account name of the miner. Press the Enter key on the keyboard
8, and then enter the password. Press the Enter key on the keyboard
9, and wait for a moment, When the client and the service establish a connection, the machine will start mining
10 to quit mining, please press the "Q" key on the keyboard in the window
tools / raw materials
PC with independent graphics card
precautions
if you are using cgminer, the graphics card must support the display of general computing standard, otherwise you will not be able to mine.
1. When rock excavation is carried out by intended splitting blasting
a through crack with a certain width is designed at the blasting front of the main blasting area, so as to buffer and reflect the vibration wave of excavation blasting and control its damage effect on the retained rock mass, This blasting technique is presplitting blasting. Presplit blasting is not only widely used in vertical and inclined excavation wall; Presplitting blasting is also used in regular curved surface, twisted surface and horizontal foundation surface< (1) the pre cracks should be connected and have a certain crack width on the surface. For medium hard rock, the joint width should not be less than 1.0cm; The crack width of hard rock should be about 0.5cm; However, when the crack width of soft rock is more than 1.0cm, the damping effect is not significantly improved. More field tests should be done to summarize experience
(2) the unevenness of presplitting surface after excavation should not be greater than 15cm. The unevenness of presplitting surface usually refers to the concave convex degree of presplitting surface formed by presplitting hole. It is an important index to measure the rationality of drilling and blasting parameters, and can be used to verify and adjust the design data
(3) the retention rate of blast hole marks on the presplitting surface should not be less than 80%, and there should be no serious blasting cracks in the rock near the blast hole
according to the characteristics and requirements of presplit blasting, through experiments and repeated studies, the drilling and blasting design is changed appropriately to achieve dynamic control< (1) the diameter of the blast hole is generally 50-200 mm, and it is better to adopt a larger diameter for the deep hole
(2) the distance between blastholes should be 8-12 times of the hole diameter, and the smaller value should be taken for hard rock
(3) the decoupling coefficient (the ratio of blast hole diameter D to cartridge diameter D0) is suggested to be 2-4, and the value of hard rock should be smaller
(4) the linear charge density is generally 250-400 g / m
(5) the most common structural form of the cartridge is to disperse and bind the cartridge on the booster line (Fig. 1-21). The adjacent distance of the dispersed charge roll should not be greater than 50cm and not greater than the blasting distance of the charge roll. Considering the great clamping effect of the hole bottom, the bottom charge should be strengthened, which is about 2-5 times of the line charge density
(6) when charging, do not charge within the depth of about 1m from the orifice, but fill with coarse sand instead of tamping. If the filling section is too short, it is easy to form a funnel, and if it is too long, there will be no cracks
generally speaking, large cross-section or large cross-section excavation should be adopted as far as possible to rece the disturbance to surrounding rock. According to the characteristics of surrounding rock, after repeated research, field investigation, demonstration and excavation of test tunnel, the large cross-section excavation method was finally determined as double and single side wall pilot pit excavation method, and the drilling and blasting scheme was determined as V-level surrounding rock presplitting blasting design, The smooth blasting practice of class IV surrounding rock proves that the two blasting schemes are in line with the reality of IV and V surrounding rock of the tunnel under the jurisdiction. The blasting effect is good according to this scheme. However, the problem to be solved is that the secondary disturbance of double and single wall heading method is relatively large, and the surrounding rock is relatively loose, which is very easy to collapse, especially in the shallow buried section. The scheme is feasible. The problem is how to solve the secondary disturbance problem. Practice and many tests have proved that the secondary disturbance has a great impact on the surrounding rock and the initial support, Under the influence of blasting vibration effect and the initial support surface, cracks and deformations will appear near the tunnel face. Some joints of the arch frame will twist and bend, and even drop the arch. To some extent, the double wall and single wall arch frames play the role of simply supported beam giving a fulcrum in the middle, which is to destroy the overall force. How to make use of the advantages of heading excavation, To learn from each other's strong points and ensure quality and safety, first of all, through theoretical analysis of surrounding rock stress, single and double side walls are a process of partial excavation, phased stress (continuous stress) and overall continuous convergence. Through repeated tests, it is found that if the secondary disturbance is controlled within a certain range of surrounding rock change (vault subsidence, peripheral convergence and displacement), the secondary disturbance will be controlled, Disturbance has the least impact on surrounding rock and initial support. It is the most feasible and safest to carry out lower leg connection, ring formation or arch connection in the middle of heading in this section, and the impact on initial support can be ignored. Secondly, the excavation sequence must be strict. The two inner walls must go first, and the follow-up sequence must follow up the graal process. When encountering relatively weak surrounding rock (such as quicksand, quicksand, etc.) The principle of "short footage, weak blasting, strong support and early closure" should be followed in the excavation of the side wall heading in the fault layer
4. Open cut tunnel and portal
the excavation and support of the side, elevation and open cut tunnel of the portal should be carried out from top to bottom, and the permanent, temporary prevention and drainage outside the tunnel should be carried out first, so as to make the surface water unobstructed and avoid the surface water scouring the slope. It is necessary to adopt artificial slope repair to prevent over excavation and rece disturbance to adjacent sections of the portal; The slope exposed by excavation shall be protected in time to rece the weathering of surrounding rock. The support shall follow closely. The area under the jurisdiction is high side and elevation slope. If the safety is not guaranteed in time, it will waste a lot of manpower and material resources.
the geological state and foundation bearing capacity of the side wall foundation of the open cut tunnel must be checked and rechecked. After meeting the design requirements, the survey and setting out shall be carried out, Erect formwork support, bind steel bars, install internal and external formwork, cast lining concrete first from wall to arch, send formwork by centralized mixing pump, and tamp it tightly with plug-in vibrator and attached vibrator
for the construction of cut bamboo type portal, the construction shall be carried out at the same time as the open cut tunnel. The wood formwork shall be installed on the cut bamboo slope according to the slope, and the angle steel shall be used to fix the slope end formwork and side formwork as a whole
waterproof layer and backfill of open cut tunnel
after the completion of lining of open cut tunnel, the external formwork can be removed and the waterproof layer can be laid. The backfill shall be symmetrical, each layer shall not be more than 30cm, and the height difference between the two sides shall not be more than 50cm. After the backfill is completed to the vault, it shall be fully filled in layers until the completion, and the surface water resisting layer shall be well prepared< When the excavation depth reaches the arch line, the guide wall and large pipe shed should be constructed first. After the lining of the open cut tunnel is completed, the end of the pipe shed should be lengthened and lapped on the open cut tunnel to form a fixed support at the end of the pipe shed. Under the protection of the large pipe shed, the pipe shed should be opened into the inner wall, The footage of two inner wall heading should also be staggered (5-10m). If it is a small space, it is necessary to set prestressed tension anchor
excavation and support of grade V surrounding rock fracture zone
the inner wall heading of the upper section is advanced, with a footage of 0.7m, and the outer wall heading can also be excavated. After the loop footage of the lower section is about 20-35m, the arc heading of the upper part of the core soil is excavated to support the arch, and the middle part and support can be excavated after a footage of 3-5. Finally, the lower tunnel bottom is completely combined with the lower section of the previous left and right heading to form a ring, It is divided into seven parts of excavation and support. All processes must strictly follow the excavation and support steps. The two inner walls must be first, and the subsequent processes must follow up step by step
in addition, after blasting, the excavation contour line must be excavated manually with air pick, and it is strictly forbidden to supplement the blasting. Water drill should be used to complete the hole forming, and temporary drainage should be done in the hole. If necessary, water pump should be used to drain out of the hole. Quartz and mica schist will lose their self stability after being soaked in water, and will accelerate the formation of surrounding rock joints, If the groundwater pressure is too high, it will increase the damage to the support< Class IV excavation
according to the joint development, strike and weathering fragility of the surrounding rock, class IV surrounding rock in this section can be divided into two situations, one is class IV and the other is class IV reinforced section. In order to save cost and maximize time effect, the excavation method is also adjusted. The quasi class IV excavation method is upper and lower bench retaining core soil excavation method normal bench excavation, Class IV reinforcement section is CD construction process excavation single side wall excavation method; In order to further improve the smooth blasting, improve the blasting efficiency, realize safe and rapid excavation, and realize the single end construction in advance, the construction and supervision unit jointly set up a special group of smooth blasting technology. On the basis of seriously summarizing the blasting practice of class III surrounding rock, the whole section smooth blasting technology of class IV surrounding rock was studied and discussed, In the process of construction, the effect is very good, especially the upper and lower bench method. The resial mark rate of blast hole is 95%, the drill mark rate of arch in special section is 85%, the side wall is 80%, the local maximum over excavation amount is 10 cm, and the under excavation amount is 8 cm. The relevant technical parameters and effects obtained by smooth blasting are used in the practice of grade IV surrounding rock. The blasting group has repeatedly revised the blasting parameters through repeated blasting practice, Finally, the drilling and blasting scheme of class IV surrounding rock is determined, and the drilling and blasting design drawing is attached.