{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:50:23Z","timestamp":1771703423196,"version":"3.50.1"},"reference-count":55,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T00:00:00Z","timestamp":1564704000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>An exemplary paradigm of how an AI can be a disruptive technological paragon via the utilization of blockchain comes straight from the world of deep learning. Data scientists have long struggled to maintain the quality of a dataset for machine learning by an AI entity. Datasets can be very expensive to purchase, as, depending on both the proper selection of the elements and the homogeneity of the data contained within, constructing and maintaining the integrity of a dataset is difficult. Blockchain as a highly secure storage medium presents a technological quantum leap in maintaining data integrity. Furthermore, blockchain\u2019s immutability constructs a fruitful environment for creating high quality, permanent and growing datasets for deep learning. The combination of AI and blockchain could impact fields like Internet of things (IoT), identity, financial markets, civil governance, smart cities, small communities, supply chains, personalized medicine and other fields, and thereby deliver benefits to many people.<\/jats:p>","DOI":"10.3390\/fi11080170","type":"journal-article","created":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T11:58:16Z","timestamp":1564747096000},"page":"170","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["Artificial Intelligence Implementations on the Blockchain. Use Cases and Future Applications"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9033-5805","authenticated-orcid":false,"given":"Konstantinos","family":"Sgantzos","sequence":"first","affiliation":[{"name":"Department of Computer Science and Biomedical Informatics, University of Thessaly, 35100 Lamia, Greece"}]},{"given":"Ian","family":"Grigg","sequence":"additional","affiliation":[{"name":"YangSec Ltd, MST9051 Mosta, Malta"}]}],"member":"1968","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"key":"ref_1","unstructured":"The Archimedes Palimpsest, University of Pennsylvania Libraries. Available online: http:\/\/archimedespalimpsest.net\/."},{"key":"ref_2","unstructured":"(2019, March 06). Cultural Tragedy: Massive Inferno Engulfs 200-Year-Old Museum in Brazil. Available online: https:\/\/www.cbsnews.com\/news\/fire-national-museum-brazil-rio-de-janeiro-today-2018-09-02\/."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Wright, C. (2008). (Pseudonym: Nakamoto, S). Bitcoin: A Peer-to-Peer Electronic Cash System, Whitepaper.","DOI":"10.2139\/ssrn.3440802"},{"key":"ref_4","unstructured":"Sgantzos, K. (2017, January 11\u201313). Implementing a Church-Turing-Deutsch Principle Machine on a Blockchain. Proceedings of the 12th Hellenic Society for Computational Biology and Bioinformatics Conference, Athens, Greece. Available online: https:\/\/sites.google.com\/site\/hscbb17\/program\/HSCBB17-Booklet.pdf."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., and Savage, S. (2013, January 23\u201325). A fistful of bitcoins: Characterizing payments among men with no names. Proceedings of the 2013 Conference on Internet Measurement Conference, Barcelona, Spain.","DOI":"10.1145\/2504730.2504747"},{"key":"ref_6","first-page":"369","article-title":"A Digital Signature based on a Conventional Encryption Function","volume":"Volume 293","author":"Merkle","year":"1988","journal-title":"Advances in Cryptology\u2014CRYPTO \u201987, Santa Barbara, California, August 21-25, 1988, Lecture Notes in Computer Science"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2543","DOI":"10.1109\/COMST.2018.2818623","article-title":"A Survey on Anonymity and Privacy in Bitcoin-like Digital Cash Systems","volume":"20","author":"Khalilov","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","unstructured":"Opcode List in BitcoinSV (v. 0.2) (2019, June 12). \u00a92009 S. Nakamoto, \u00a92009\u20132016 The Bitcoin Core developers, \u00a92018-19 Bitcoin Association. Distributed under the Open BSV Software License. Available online: https:\/\/github.com\/bitcoin-sv\/bitcoin-sv\/blob\/master\/src\/script\/script.h."},{"key":"ref_9","unstructured":"Aisopos, K., Kakarountas, A.P., Michail, H., and Goutis, C.E. (2005, January 2\u20134). High throughput implementation of the new Secure Hash Algorithm through partial unrolling. Proceedings of the IEEE 2005 International Workshop on Signal Processing Systems (SiPS\u201905), Athens, Greece."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/320856.320867","article-title":"A Variant to Turing\u2019s Theory of Computing Machines","volume":"4","author":"Wang","year":"1957","journal-title":"JACM"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Alberts, B., Johnson, A., Lewis, J., Raff, M., Roberts, K., and Walter, P. (2007). Molecular Biology of the Cell, Garland Science. [5th ed.].","DOI":"10.1201\/9780203833445"},{"key":"ref_12","unstructured":"(2017, February 24). What is DNA Replication?. Available online: https:\/\/www.yourgenome.org\/facts\/what-is-dna-replication."},{"key":"ref_13","unstructured":"(2019, May 25). Genetic Algorithms, Mathworks. Available online: https:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/11565-genetic-algorithms-application."},{"key":"ref_14","unstructured":"Jeffress, L.A. (1951). The General and Logical Theory of Automata. Cerebral Mechanisms in Behavior\u2014The Hixon Symposium, John Wiley & Sons."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1038\/scientificamerican1070-120","article-title":"Mathematical Games: The fantastic combinations of John Conway\u2019s new solitaire game of life","volume":"223","author":"Gardner","year":"1970","journal-title":"Sci. Am."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1103\/RevModPhys.55.601","article-title":"Statistical Mechanics of Cellular Automata","volume":"55","author":"Wolfram","year":"1983","journal-title":"Rev. Mod. Phys."},{"key":"ref_17","unstructured":"Wolfram, S. (2002). A New Kind of Science, Wolfram Media Inc."},{"key":"ref_18","unstructured":"William, G. (2018). Cellular automata as convolutional neural networks. Department of Applied Physics, Stanford University. arXiv."},{"key":"ref_19","unstructured":"Michael, O.R. (2019, May 26). Turing, Church, G\u00f6del, Computability, Complexity and Randomization: A Personal View. Available online: http:\/\/www.bu.edu\/cphs\/files\/2013\/08\/Rabin.pdf."},{"key":"ref_20","unstructured":"Nielsen, M. (2019, May 31). Interesting Problems: The Church\u2013Turing\u2013Deutsch Principle. Available online: http:\/\/michaelnielsen.org\/blog\/interesting-problems-the-church-turing-deutsch-principle\/."},{"key":"ref_21","unstructured":"Deutsch, D. (, January July). Quantum theory, the Church\u2014Turing principle and the universal quantum computer. Proceedings of the Royal Society, London, UK."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Quantum Deep Learning Triuniverse","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_23","unstructured":"Chepurnoy, A., Kharin, V., and Meshkov, D. (2019, June 06). Self-Reproducing Coins as Universal Turing Machine. Available online: https:\/\/arxiv.org\/pdf\/1806.10116.pdf."},{"key":"ref_24","unstructured":"Justin, D., and Harris, B.W. (2019, January 14\u201317). Decentralized & Collaborative AI on Blockchain. Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA."},{"key":"ref_25","unstructured":"Donath, J. (2019, June 10). Why Fake News Stories Thrive Online. Available online: https:\/\/edition.cnn.com\/2016\/11\/20\/opinions\/fake-news-stories-thrive-donath\/."},{"key":"ref_26","unstructured":"Gerck, E. (2019, June 10). The Einstein Phenomenon and Fake News. Available online: https:\/\/www.researchgate.net\/publication\/331561385_The_Einstein_Phenomenon_and_fake_news."},{"key":"ref_27","unstructured":"Tencent Keen Security Lab (2019, June 09). Experimental Security Research of Tesla Autopilot. Available online: https:\/\/keenlab.tencent.com\/en\/whitepapers\/Experimental_Security_Research_of_Tesla_Autopilot.pdf."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Haber, S., and Stornetta, W.S. (1991). How to time-stamp a digital document. J. Cryptol., 3.","DOI":"10.1007\/BF00196791"},{"key":"ref_29","unstructured":"Grigg, I. (2019, June 26). Triple Entry Accounting. Available online: https:\/\/iang.org\/papers\/triple_entry.html."},{"key":"ref_30","unstructured":"Grigg, I. (2019, June 26). PKI Considered Harmful. Available online: https:\/\/iang.org\/ssl\/pki_considered_harmful.html."},{"key":"ref_31","unstructured":"Grigg, I. (2019, June 26). An Open Audit of an Open Certification Authority. Large Installation Systems Administration (LISA). Available online: https:\/\/iang.org\/papers\/open_audit_lisa.html."},{"key":"ref_32","unstructured":"Media, B. (2019, June 10). Add any File to the BSV Blockchain. Available online: https:\/\/add.bico.media\/."},{"key":"ref_33","unstructured":"Github.inc (2019, June 10). The World\u2019s Leading Software Development Platform. Available online: https:\/\/github.com\/."},{"key":"ref_34","unstructured":"(2019, June 12). Agora Startup Page for Bitcoin SV Applications & Services. Available online: https:\/\/www.agora.icu\/."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Grigg, I., and Petro, C.C. (1997, January 24\u201328). Using Electronic Markets to Achieve Efficient Task Distribution. Proceedings of the Financial Cryptography First International Conference FC\u201997, Anguilla, British West Indies. Available online: https:\/\/iang.org\/papers\/task_market.html.","DOI":"10.1007\/3-540-63594-7_89"},{"key":"ref_36","unstructured":"(2019, June 07). Money Button Is an API and a UI\/UX Layer for the Bitcoin SV Blockchain. Available online: https:\/\/docs.moneybutton.com\/."},{"key":"ref_37","unstructured":"Brownlee, J. (2019, June 26). A Gentle Introduction to Scikit-Learn: A Python Machine Learning Library. Available online: https:\/\/machinelearningmastery.com\/a-gentle-introduction-to-scikit-learn-a-python-machine-learning-library\/."},{"key":"ref_38","unstructured":"Hamel, L. (2019, June 10). Deep Learning Finds Fake News with 97% Accuracy. Available online: https:\/\/opendatascience.com\/deep-learning-finds-fake-news-with-97-accuracy\/."},{"key":"ref_39","unstructured":"Weiss, G. (2013). Multiagent Systems, The MIT Press. [2nd ed.]."},{"key":"ref_40","unstructured":"Stuart, J.R., and Norvig, P. (2003). Artificial Intelligence: A Modern Approach, Prentice Hall. [2nd ed.]. Chapter 2."},{"key":"ref_41","unstructured":"(2019, June 11). WeatherSV, Index and Retrieve Climate Data Immutably Stored on a Distributed Ledger. Available online: https:\/\/weathersv.app\/find."},{"key":"ref_42","first-page":"171","article-title":"A decentralized application for logistics: Using blockchain in real-world applications","volume":"30","author":"Christodoulou","year":"2018","journal-title":"Cyprus Rev."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"McLaren, D., and Agyeman, J. (2015). Sharing Cities: A Case for Truly Smart and Sustainable Cities, MIT Press.","DOI":"10.7551\/mitpress\/9780262029728.001.0001"},{"key":"ref_44","unstructured":"(2019, June 14). Zweispace Starts to Record Tokyo Earthquake Detector Data into the Bitcoin SV (BSV) Blockchain. Available online: https:\/\/coingeek.com\/zweispace-starts-to-record-tokyo-earthquake-detector-data-into-the-bitcoin-sv-bsv-blockchain\/."},{"key":"ref_45","unstructured":"Eastlake, D., and Hansen, T. (2019, June 12). US Secure Hash Algorithms (SHA and SHA-Based HMAC and HKDF), RFC 6234 (Informational), Internet Engineering Task Force. Available online: http:\/\/www.ietf.org\/rfc\/rfc6234.txt."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","article-title":"Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies","volume":"18","author":"Tschorsch","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_47","unstructured":"George, P. (2013). Bitness: Bitcoin Usage in an Enterprise Environment, Opportunities and Challenges. [Master\u2019s Thesis, University of Greenwich]."},{"key":"ref_48","unstructured":"(2019, June 14). Hashrate Comparing data. Available online: https:\/\/blockchair.com\/compare."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1002\/wics.1314","article-title":"Why the Monte Carlo method is so important today","volume":"6","author":"Kroese","year":"2014","journal-title":"WIREs Comput. Stat."},{"key":"ref_50","unstructured":"Mathieu, M., Couprie, C., and LeCun, Y. (2016). Deep multi-scale video prediction beyond mean square error. arXiv, preprint."},{"key":"ref_51","unstructured":"Iten, R., Metger, T., Wilming, H., del Rio, L., and Renner, R. (2018). Discovering Physical Concepts with Neural Networks, Institute for Theoretical Physics."},{"key":"ref_52","unstructured":"Kurzweil, R. (2019, June 14). Don\u2019t Fear Artificial Intelligence. Available online: http:\/\/time.com\/3641921\/dont-fear-artificial-intelligence\/."},{"key":"ref_53","unstructured":"(2019, June 14). Watson, AI for Business, 2016\u20132019, \u00a9IBM. Available online: https:\/\/www.ibm.com\/watson\/."},{"key":"ref_54","first-page":"173","article-title":"\u00dcber formal unentscheidbare S\u00e4tze der Principia Mathematica und verwandter Systeme I","volume":"38","year":"1931","journal-title":"Monatshefte Math. Phys."},{"key":"ref_55","unstructured":"Asimov Isaac (2019, June 14). The Last Question\u201d, Science Fiction Quarterly. Available online: https:\/\/www.multivax.com\/last_question.html."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/8\/170\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:12:37Z","timestamp":1760188357000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/8\/170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,2]]},"references-count":55,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2019,8]]}},"alternative-id":["fi11080170"],"URL":"https:\/\/doi.org\/10.3390\/fi11080170","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,2]]}}}