LU (Computer Quintet)
(凸机五人合唱组)
LU (Computer Quintet)
(凸机五人合唱组)
LU (Computer Quintet) (凸机五人合唱组)
Computer Quintet freely or prolongedly Set up Odds about e-Commerce Chart(6,2)
That Quintet consists of Four Fates Six Fields opening One Joker Slot for any Varying Fifth Member
Version (27Jun2014: 1.0) (20Mar2021: 2.0 | 辛丑年二月初八·春分):
Original Research Article in Library Reserves Domain
Xpree Kok-Wah LEE (Author, Engineer[Computer, Communications, Info], Zcie2176)
Domain: Zhongwen Cryptology & Information Engineering
Silicon Space (Si-space): Xpreeli.org, <https://sites.google.com/view/xpreeli>, Google Sites, SG.
MY: Lee Kok Wah Websites, No. 112, Persiaran Perak 4, Taman Perak Indah, 31900 Kampar, Perak (MY).
Email: contact@xpreeli.org, xpreee@gmail.com | Tel. (txt): +6016-5378336
Abstract— In mid 1999, XKW Lee the Ode Chart Illustrator sketched an e-commerce chart, composing of eight roles. Till Feb. 2014, He becomes Fates in Water Mutuality Field (SJM-field) and Metal Key Field (JYM-field) in both C-space and Si-space. Yet in a month ago, His Cardiac-airplane from his bachelor thesis was revised at 6.17GB as the Fifth Member. Thus, in analogy to the stalemate state of the Western Chess, a Computer Quintet, alike the British Isles & Ireland, is then naturally formed to welcome any varying fifth members, each carrying at least 1.0GB, to gain speech freedom from research casinos the Damned Hell. Calling Taoism Yinyang Arts, water controls fire, fire controls metal. So and so the storylines, a metal-type Si-space cryptosystem at the inner chart, is then free to pass over the fire-type e-commerce ring network. There comes the intersected area of data and info engineering.
Keywords- fire-type e-commerce chart; illustrated groupings; computer quintet; western chess; multihash key; cryptosystems; Lee Gossip Decoding (LGD); Byzantine Generals Problem (BGP).
Recall to an illustration since mid 1999 as in Fig. 1, there is a yellowish egg in the inner chart, eight role entities in the middle range forming a fire-type ring network, and outer bluish background. In figurative meanings, the roles based ring network can effectively present the illustrated groupings within a business, company, organization, co-op, or society.
This e-commerce (electronic commerce) chart(6,2) may have its roles split into six hosts and two guests (6H2G). The hosts are: customer, merchant, customer’s bank, merchant’s bank, certifiers, and deliverer. Meanwhile, the guests are: white hackers (WH), black crackers (BC); each 3 subgroups.
WH group: 2.3 (李张) >> 16.4 (朱黄) << 5.9 (何马).
BC group: 14.15 (柯冯) >> 1.13 (陈吴) << 8.12 (胡孙).
From Taoism Yinyang Arts (CN: 阴阳五行学): Water element > controls > fire element > controls > metal element (水克火克金). Insofar understood and open from Fig. 1, inner yellow egg is Metal Key Field (JYM-field) in Si-space, fighting to pass through mountain ranges of intermediate ring network formed by fire-type roles. Particularly here, the 6H2G e-commerce chart in the middle part has its human ring network to be constrained by a threshold platform of a common language. XKW Lee picks out CN/ZW, (A)EN, JP.
The bluish background figuratively means Water Mutuality Field (SJM-field) in C-space. Either LGD (Lee Gossips Decoding), or BGP (Byzantine Generals Problem) [1] is able to inspect who the Evil or Devil (group) is/are.
For illustrated groupings from e-commerce transactions:
#Host groupings = 6C2 = 6*5/2 = 15 groups
#Guest groupings = (3+3)C2 = 6*5/2 = 15 groups
#hack-crack arrow = set{(w,b): ww, bb, wb, bw}=> 4 arrows
#arrows at each host = 4*6 = 24 pointers
The potential e-commerce communications methods include: Computer(website, login, email, e-messenger); Mobile Device(SMS, voice, image); Postal Mail; Face-to-Face(talks, contracts).
Email communications in its starting era used by the elite society is once the most popular method. However, computer cracking and thousands of junk emails monthly, causing either the data theft or time wasting, have made email to be less welcomed nowadays after two decades of usages.
To alleviate the data theft, then a computer cryptosystem, such like XKW Lee’s MobileECC [2], will work, under the dangers of keyboard logging and shoulder surfing attacks. Whereas on the threatening problem of rubbish emails, one has to know beforehand that at least an email address has to be publicized, due to the keywords: CONTACT & ABOUT-FACE. Similar people tend to assembly together, alike the chess pieces. Mathematics in Chinese Chess, chemistry in Western Chess, biology in Japanese Chess, etc. Here, computer software is the cream of data processing machine, in the confluence of math equations and chemical elements.
After pondering over factors of contacts and about face, then to enable one’s email system to accept first email from strangers or acquaintances, a web master or name card needs search key to quicken the email filtering. Search key stored at login page or as mobile SMS, can function as message identifiers monthly or regularly to sharpen email quality.
In case the rubbish email quantity is even terrible, then computer-net segmentation or partitioning is needed. This is possible at the HCI (Human-Computer Interface) by using the Lee’s multihash key(human ID || computer-net ID || key) [3] to generate HCI ID (CN: 人机ID,即人机证件).
On income sources for either money or cash, the field masters (i.e. Father) and/or fellowships at the pyramid peak adopts Barter System. Likewise [4], WH group is on money or honor (名); whereas BC group is on cash or tort (利).
Let the Fates (i.e. Father cum Fellow) be the first entity group to start the assembly to trade something for something. Service item types are: keyword (basis 1¢ per word; max $1k for 14-year validity), phrase, clause, sentence, data/info, news, sheet(s), books, etc.
For example of sheet-anchor [5], Kinta Sword the Oral Cipher (《近打定真假》), aka “Short Decision Making”, is in analogy with Gold General (金将) in Japanese Chess (日本将棋). Varying combinations of Gold Generals and Silver Generals (银将), on how to move steps to withdraw from a battlefield, figuratively tell stories that Zhongwen (ZW) the Encoder acts as Gold General, and Japanese (JP) language the Decoder acts as Silver General.
Mixing SJY-ships(data, info) in C-space and Si-space, news is the first trade-able services in this e-commerce chart. For secret communications, then JYM-field and JYY-ships shall be called along with a cryptosystem, e.g. MobileECC [2, 8]. For localization into a geo-political region, i.e. (state, province, special admin area, transit zone), a few areas surrounding the South China Sea have been preset [1, 6]. For residents in this region, the multilingual nature gives birth to the convenience of news translation or interpretation.
To differentiate among the true or false messages, or to support both dominant and recessive factors in the same community, for completeness of societal functionalities, then SJM-field [7] has good foundation in both BGP and LGD. In short, news for imperative, critical, urgent, or important aims is of precious priorities. For instance, spot news originates from either a Fate, a Field Master, or a Fellowship.
Western Chess quintet is a special human group analogy, in view of the stalemate state. The present geography analogy is the British Isles(England, Scotland, Wales, North Ireland) and (South) Ireland. Great Britain is at the west most sunset direction from Tian Shan (天山). Let say there was an info meme originated from Tian Shan, then the occidental amplification after series of further processing. The USA Independence Day on 4 July 1776 is somehow caused by the more expensive products from GB, exploded at the tea price.
Since the first computer in World War II (WW2), civilian computer was born in Jan. 1984 as PC (Personal Computer). Later in Jan. 1991, computer-net started its popularity.
The 3-decade tournament for PC was till 2014.1, and thus the individual winner over at least 2 out of 3 rounds should become the center seed for future legislation or regulations, upon the winner's mature next few generations. On the other hand, the 3-decade tournament for computer-net is till 2021.1, and thus the most imperative timeline has not had its first three rounds ended up yet. Insomuch that the ode cases:
If honor is heavier, then Zorro-like Zero-th Ranger is on.
If cash over debt is costlier, then opted for tunnel outlet.
AEN(Computer Quintet) [9-11]: Claude E. Shannon (data engineering; digital communications); Dennis M. Ritchie (PC in C language); Bjarne Stroustrup (computer networks in C++ language); Xpree K.W. Lee (AI in LGD; mnemonic secrets); Fifth Member the Joker Card Slot [(CE Shannon/XKW Lee: 2nd Field/Ship/Plane) OR (Other One’s Bear-/Dragon-type Particle Structure)].
Legends: AEN = (American) English language; PC = Personal Computer; AI = Artificial Intelligence; LGD = Lee’s Gossips Decoding. Each Field Master's field carries 20% (≥5.0 GB*2), and four fields add up to 80%, later plus the fifth member score around 10%.
So, a computer quintet shall have four Fates at minimum 10GB*4 = 40 GB. Then a Follower’s time effort is 4.0+ GB. Since ≥5GB is needed to gain speech freedom, lacks of 1GB. Otherwise, extortion will have a worker to choose to become outsider witness, or insider quiet lamb. One may lose a job, or even to leave a career field, and many select to be ghosts.
The previous +1.0GB is the first exit option. Second way is to call up a cryptosystem. As for exemplary MobileECC, its cryptosystems (certificate, encryption, signature) is 0.6GB. Then, Hosted MobileECC = 0.6*15 = 9.0GB
- follower’s time effort = 9.0/10 = 0.9GB lack 0.1GB (亨字)
The third exit is special models of XKW Lee’s SJY-ship. Cargoes at Lee-Shannon Model = 0.01 + 4m*10 = 0.05GB
Without Lee-Shannon Model = 4m*12 + title(2m) = 0.05GB. Recognized SJM-field master = 2*0.05 = 0.1GB
Nut: Choose tunnel(past t)(隧) or Feather(present t)(躍).
References
[1] Online e-File: XKW Lee (2014, Mar.)(US+CA; SG). “Earth base field: TJY5SCS Sea the tropical heads (Bamboo v1.0)”. <URL: http://goods.xpreeli.com/tjy5scs-ship.htm>
[2] Online SW: XKW Lee (96.8%), AWC Tan (0.2%), Microsoft WinXP MSVC (3.0%) (2014). “Mobile ECC (v2.0),” Computer Software. <URL: http://www.xpreeli.com/Mobile_ECC.htm> (beta version)
[3] XKW Lee (2014, Feb.)(US-OK; SG). Revised Article “Multiple hashes of single key with passcode for multiple accounts (Reserves v1.4),” in e-book entitled “Metal key field: JYY-ships the wisdom worships (Reserves v1.0),” unpublished.
[4] XKW Lee (2013, Nov.)(US-NY; SG). Article “Byzantine agreement for electronic commerce (v1.1),” in e-book entitled “Water mutuality field: SJY-ship & feedbacks (Reserves v1.0),” unpublished.
[5] Online e-File: XKW Lee (2012, Feb.)(SG; XpLi). “Short decision making” (《近打定真假》(繁筆版+简体版)) (v1.0)”. <URL: http://goods.xpreeli.com/shortDecision.htm>
[6] XKW Lee (2014, June)(US-NY; SG). “SJM-field airport: Bio-signal features the cardiac-plane (Chrysanthemum v2.0),” unpublished.
[7] XKW Lee (2014, Apr.)(US-OK; SG). “Water mutuality field: SJM-field the oceanic bow (Winter v2.0),” unpublished.
[8] XKW Lee (2014, Mar.)(US+CA; SG). “Metal key field: JYM-field the honesty codes (Centipede v1.1),” unpublished.
[9] N.J.A. Sloane & A.D. Wyner (eds.), Claude Elwood Shannon Collected Papers. Piscataway, New Jersey, USA: IEEE Press, 1993.
[10] H.M. Deitel & P.J. Deitel, C++ How to Program (2nd ed.)(draft standard). Upper Saddle River, New Jersey, USA: Prentice Hall 1998. ISBN: 013-528910-6.
[11] B. Stroustrup, The C++ Programming Language (4th ed.). Upper Saddle River, New Jersey, USA: Addison-Wesley, 2013.
LU_CQuintet Footnotes (24.03.2022 the FireDay)
Software on the Basis of Barter Trades/Exchanges = { 2D Key the PW100, MobileECC v2 }
Click Link at https://xpreeli.org/
List of Exchanges at Step Function Responses:
[1] First Example: LHL’s “Sudoku_Solver the DOS exe”. Cpp file size (5 kB). < URL >
[2]
[3]