A traceability chain algorithm for artificial neural networks using T-S fuzzy cognitive maps in blockchain

Blockchain acts on a big data analytics because transaction data belongs to streaming data and high-dimensional data from distributed computing network. Accordingly, such operation produces irrelevant data problem and further poorly optimized traceability in blockchain. So, we claim that the artificial intelligence of blockchain mining algorithm like traceability chain algorithm runs faster than consensus algorithm because of inference mechanism. Our main goal is to reach traceability decision not consensus decision as fast as possible. Thus, this article proposes a novelty approach called TakagiSugeno Fuzzy cognitive maps ANN as traceability chain algorithm. The numerical example of the proposed algorithm in blockchain mining is evaluated and optimized decisions experiment is analyzed. Objective functions for optimized decision computation is described as participant nodes constraint method. Thus contribution succeeds in meeting the reduction mining efforts for the traceability chain being processed. Our findings also provide a preliminary indication of deep learning applied big blockchain transactions data. The main goal is to reach traceability decision not consensus decision as fast as possible.A novelty approach is TakagiSugeno Fuzzy cognitive maps ANN as traceability chain algorithm.Deep learning network by TakagiSugeno Fuzzy ANN is presented.We provide optimized traceability in blockchain for hierarchical learning features representations on big transaction data.

[1]  Alexandros G. Dimakis,et al.  Geographic Gossip: Efficient Averaging for Sensor Networks , 2007, IEEE Transactions on Signal Processing.

[2]  Michael S. Lew,et al.  Deep learning for visual understanding: A review , 2016, Neurocomputing.

[3]  Prem Prakash Jayaraman,et al.  Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..

[4]  Bart Kosko,et al.  Fuzzy Cognitive Maps , 1986, Int. J. Man Mach. Stud..

[5]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[6]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[7]  Christopher Foster,et al.  Give peas a chance: Transformations in food consumption and production systems , 2005 .

[8]  Pierre Apkarian,et al.  Parameterized linear matrix inequality techniques in fuzzy control system design , 2001, IEEE Trans. Fuzzy Syst..

[9]  Goutam Paul,et al.  Towards a More Democratic Mining in Bitcoins , 2014, ICISS.

[10]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[11]  Xin Li,et al.  The Technology and Economic Determinants of Cryptocurrency Exchange Rates: The Case of Bitcoin , 2014, Decis. Support Syst..

[12]  Huaqun Wang,et al.  Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography , 2020, Future Gener. Comput. Syst..

[13]  Witold Pedrycz,et al.  Fuzzy rule-based models with interactive rules and their granular generalization , 2017, Fuzzy Sets Syst..

[14]  Leslie Lamport,et al.  Byzantizing Paxos by Refinement , 2011, DISC.

[15]  Christian Esposito,et al.  Improving the gossiping effectiveness with distributed strategic learning (Invited paper) , 2017, Future Gener. Comput. Syst..

[16]  Soowoong Kim,et al.  Deep belief network based statistical feature learning for fingerprint liveness detection , 2016, Pattern Recognit. Lett..

[17]  Jana-Rebecca Rehse,et al.  Predicting process behaviour using deep learning , 2016, Decis. Support Syst..

[18]  Christopher Leckie,et al.  High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..

[19]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[20]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[21]  Flavio Paiva Junqueira,et al.  Zab: High-performance broadcast for primary-backup systems , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[22]  Nancy A. Lynch,et al.  Consensus in the presence of partial synchrony , 1988, JACM.

[23]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[24]  Paolo Remagnino,et al.  How deep learning extracts and learns leaf features for plant classification , 2017, Pattern Recognit..

[25]  Mohamed Cheriet,et al.  Tensor representation learning based image patch analysis for text identification and recognition , 2015, Pattern Recognit..

[26]  Tomasz Imielinski,et al.  Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..

[27]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.