scholarly journals Special Numbers, Special Quaternions and Special Symbol Elements

Author(s):  
Diana Savin
Keyword(s):  
VLSI Design ◽  
1999 ◽  
Vol 9 (1) ◽  
pp. 55-67
Author(s):  
Hsiu-Niang Chen ◽  
Kuo-Liang Chung

String matching (SM) problem is to find the occurrences of a pattern within a text. A vanable length don't care (VLDC) is a special symbol, not belonging to a finite alphabet ∑ but in ∑*. Each VLDC in the pattern can match any substring in the text. Given a run-length coded text of length 2n over ∑ and a run-length coded pattern of length 2m over ∑*, this paper first presents an O(1) time parallel SM algorithm for run-length coded strings with VLDCs on a reconfigurable mesh (RM) using O(nm) processors. Consider the hardware limitation in VLSI implementation. In order to be suitable for VLSI modular implementation, a partitionable parallel algorithm on the RM with limited processors is further presented. For N < n and M < m, the SM for run-length coded strings with VLDCs can be solved in O(X^Y^) time on the RM using O(NM)(= O((nm)/((X^Y^))) processors, where X^ = [(n – 1)/(N – 1)] and Y^ = [(m – 1)/(M – 1)].


2011 ◽  
Vol 71-78 ◽  
pp. 465-469
Author(s):  
Bai Tao Mao

A city high-rise building of the environmental balance, and its prominent position in the image and the place has a special symbol. However, high-rise buildings developed to reduce the symbolic value that it has attributed to the relevant system of architectural forms. As more and more dense urban high-rise buildings stand, we should be carefully evaluated: its ecological evvironment, will be the effect? Because of its height and volume, a high-rise building than in the top or bottom is likely in terms of physical environment on the social environment and the impact is much greater. Disturb the existing high-rise buildings in varying degrees between the various functions of the city, increasing the city high-rise buildings in the moment, how to properly control the rapid of high-rise buildings in order to maintain a sustainable ecosystem, is a question worth considering.


Encryption which is defined as a process which converts plain text into a coded form i.e. which is in an unreadable form, so that no one can extract it or read it. It is very important to keep our data safe. There are a lot of techniques which are used for this purpose. Playfair technique is one of them. Playfair technique is used for the encryption of data. Playfair technique allows the existence of alphabets (upper case and lower case both), integer value and special symbol. In many algorithms only alphabets is used, most of the algorithm used alphabets as well as integer value and so on. Playfair techniques consider the plain text as single unit and convert the plain text into cipher text. The use of this technique is a challenge to the attack to understand the text and then decrypt it. Some time it may be possible for the attacker to understand the plaintext due to their weak matrix and key. To overcome this problem, this work proposes a technique that enhances the security of play fair technique using rectangular and substitution matrix. This work uses 8*8 matrices that contain alphabets, integers and special symbols. The objective of this work is to provide security for the data that contain alphabets, integer value as well as special symbols during transmission.


Author(s):  
S. Okonek ◽  
H.J. Reinecke ◽  
I. Löwenthal

Airplanes and airports are in potential danger during transport of highly toxic chemicals, and accidents can occur if the wrapping material is damaged. The chemicals are listed and classified by the International Civil Aviation Authority ICAO) (7). They are subdivided into nine classes, each marked by a special symbol. The classification is derived from the most important properties of the chemicals in relation to the air transport (Table 1). Special positions are listed in class 6. This does not mean, however, that the chemicals of all other classes are non-toxic. On the contrary, highly toxic substances also exist in each other class. For example, class 2 “compressed gas” includes dangerous toxic substances such as hydrochloric acid, fluorine, carbon monoxide or sulphur dioxide. Class 3 (“flammable liquids”) includes benzene, methanol, acrylonitrile and ethyl methyl ketone, for example. In class 6 (“poisons”), special poisons are listed such as tetraethyl lead, dimethyl mercury, organophosphates and aniline. Class 8 (“corrosives”) consists of poisons like bromide, dimethyl sulphate, phorphorous trichloride and hydrofloric acid.


2011 ◽  
Vol 22 (01) ◽  
pp. 237-246
Author(s):  
MIROSLAV LANGER ◽  
ALICA KELEMENOVÁ

Positioned eco-grammar systems (PEG systems, for short) were introduced in [9]. Motivation of introducing positioned eco-grammar systems is an attempt to describe interplay between evolving environment and community of agents living in this environment whereas we focus on the positions of agents in the environment. PEG systems bring a new view to investigating interplay between community of agents and environment. Our approach allows to study local changes in evolving environment caused by agents moreover the position of the agent is strictly given by special symbol and we are able to predict its behavior and control the evolution of environment as well. In this paper we compare generative power of the PEG systems with three types of pure (regulated) grammars.


In order to maintain security, privacy and integrity of important information or data is a great challenge in today’s world. Cryptography is a technique to prevent important data from hackers and intruder by converting important information in encrypted text by using an encryption algorithm. This paper is a review of various symmetric and asymmetric cryptography techniques. In this paper some gaps have been identified after reviewing some algorithms like they don’t work for case sensitive data but merely works for uppercase alphabets, they don’t encrypt numerically, spaces and they don’t run on the special symbol. In our proposed solution an effort to expand the original 5X5 character set of the Play Fair algorithm will be done so as to include lower case alphabets(a-z), some symbols, numeric(0-9) and a special character ‘\0’ for space. So, a new algorithm will encrypt lowercase, numeric, symbols as well as spaces.


2021 ◽  
Author(s):  
Brian Formento ◽  
See-Kiong Ng ◽  
Chuan-Sheng Foo
Keyword(s):  

Dialogue ◽  
2018 ◽  
Vol 57 (4) ◽  
pp. 853-875
Author(s):  
WEIJIA WANG

In the third Critique, Kant claims that beauty is the symbol of morality and that the consideration of this relation is a duty. This paper declares Kant’s argument to be twofold: firstly, experience of beauty strengthens our moral feeling. Secondly, in judging the beautiful, we assume some indeterminate purpose underlying nature, based on which we can conceive of nature as cooperative with our practical pursuit. Hence, for the sake of moral cultivation and moral motivation, it is our duty to regard beauty as the special symbol of morality.


1997 ◽  
Vol 34 (4) ◽  
pp. 326-330
Author(s):  
B. L. Hart

An existing first-order d.c. model of the MOSFET that incorporates a non-standard network element, and requires a special symbol to represent it, is reconstructed to use only standard network elements.


Sign in / Sign up

Export Citation Format

Share Document