Monday, September 3, 2012

Decode the Code :: Aspiration 2020 :: Solution c java

Decode the Code  :: Aspiration 2020


Solution :

#ifndef DECODE_H
#define DECODE_H

char *keys[] = {" ","","abc","def","ghi","jkl","mno","pqrs…
//int cyc[] = {1,0,3,3,3,3,3,4,3,4};

int count(char *ptr)
{
int i, cnt;
for(i=0;;i++)
{
if(*(ptr+i)!=(*ptr))
break;
}
return i;
}


char* decodeCode(char* encodedString)
{
char *decodedString;

int i,j,k,num;
char ch;

k=0;

decodedString = new char[512];
for(i=0;;)
{
ch = encodedString[i];
j = count(&encodedString[i]);

if(ch!='#' && ch!='1') {
num = ch - 0x30;
//num = num % cyc[];
decodedString[k] = keys[num][j-1];
decodedString[k+1] = '\0';
k++;
}

i = i +j;
if(i>(strlen(encodedString)-1))
break;
}

return decodedString;
}
#endif /* DECODE_H */



Question 2

 

Decode the Code

Problem Description
Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another.
In their new technology, they are sending their messages in a number format. This format represents the way that numbers and characters are padded on mobile's keypad. One smuggler sends a text message to the second smuggler, using the numbers corresponding to the letters on the keypad. When the receiving smuggler gets the message, he simply opens the "create text message" function in his mobile and types the number string. This way the receiver finally reads the original message.
For Example: -
6999066263304447777077766622337778 -----> message sent by the first smuggler.
my name is robert---------> message decoded by the second smuggler.
Where '0' denotes the "space".

Explanation:
By pressing '6' (i.e. key'6' one time) on the keypad, the mobile shows 'm' on display screen in write text message area.
By pressing '999' (i.e. key '9' three times) on the keypad, the mobile shows 'y' on display screen in write text message area.
By pressing '0' (i.e. key '0' one time) on the keypad, the mobile shows 'space' on display screen in write text message area.
By pressing '66' (i.e. key'6' two times) on the keypad, the mobile shows 'n' on display screen in write text message area.
By pressing '2' (i.e. key '2' one time) on the keypad, the mobile shows 'a' on display screen in write text message area.
By pressing '6' (i.e. key '6'one time) on the keypad, the mobile shows 'm' on display screen in write text message area.
By pressing '33' (i.e. key '3' two times) on the keypad, the mobile shows 'e' on display screen in write text message area.
By pressing '0' (i.e. key '0' one time) on the keypad, the mobile shows 'space' on display screen in write text message area.
By pressing '444' (i.e. key'4' three times) on the keypad, the mobile shows 'i' on display screen in write text message area.
By pressing '7777' (i.e. key '7' four times) on the keypad, the mobile shows 's' on display screen in write text message area.
By pressing '0' (i.e. key '0' one time) on the keypad, the mobile shows 'space' on display screen in write text message area.
By pressing '777' (i.e. key '7' three times) on the keypad, the mobile shows 'r' on display screen in write text message area.
By pressing '666' (i.e. key '6' three times) on the keypad, the mobile shows 'o' on display screen in write text message area.
By pressing '22' (i.e. key '2' two times) on the keypad, the mobile shows 'b' on display screen in write text message area.
By pressing '33' (i.e. key '3' two times) on the keypad, the mobile shows 'e' on display screen in write text message area.
By pressing '777' (i.e. key '7' three times) on the keypad, the mobile shows 'r' on display screen in write text message area.
By pressing '8' (i.e. key '8' one time) on the keypad, the mobile shows 't' on display screen in write text message area.
But for word monkey
6#666#665533999 this string will be sent by the smuggler one
Here '# ' denotes that if smuggler watches '#' then it means character previous to # is on the same key to the character after the '#' and smuggler has to wait for 2 seconds and then press the same key.
Explanation:
By pressing '6' i.e. key'6' one time on the keypad, the mobile shows 'm' on display screen.
For '#' wait for 2 seconds, and then press next.
By pressing '666' i.e. key'6' three times on the keypad, the mobile shows 'o' on display screen.
For '#' wait for 2 seconds, and then press next.
By pressing '66' i.e. key'6' two times on the keypad, the mobile shows 'n' on display screen.
By pressing '55' i.e. key'5' two times on the keypad, the mobile shows 'k' on display screen.
By pressing '33' i.e. key'3' two times on the keypad, the mobile shows 'e' on display screen.
By pressing '999' i.e. key'9' three times on the keypad, the mobile shows 'y' on display screen.
*Here lower case doesn't matter.
*Assuming that the smuggler one will not send any numeral characters in the original message. For example smuggler will not send any message like "I need 1000 bucks" as it contains numerals.

So policemen need your help to track the smugglers. You have to write a program that decodes the sending smuggler's string (from the number format into plain text).
Instructions to work with Open PBT Client:
  1. Specify the work directory path in the 'Work Directory Path' field. The path should correspond to your solution project directory.
  2. Download the support files by clicking the Get Dev Files.
  3. You will find the following three folders:
    • bin
    • src
    • lib
    in your work directory.
  4. Code the solution in  . java file inside the src folder
  5. All required files will be downloaded to your work directory. Creating additional files is strongly discouraged.
Step 1:
In your solution file:
  • Implement your logic in public String decodeCode(String encodedString) in class DecodeTheCode.
  • String   encodedString:  is string which is send by the smuggler1.
  • You can create more methods but, do it in the same class.
Step 2:
In your solution keep in mind the following constraints.
  1. In this problem you have to write a program that decodes the string, which is send by the first smuggler.
  2. The method decodeCode() takes the string encodedString as an argument. That string is what the first smuggler sends to the second smuggler.
  3. The method decodeCode() returns a string, which is the decoded string in plain text.
  4. The string encodedString should only contain integers, and the special character '#' (if needed).
  5. String encodedString should not contain any alphabetical characters (ex. 'a', 'b'); otherwise return null
  6. String encodedString should not contain any special characters, except '#'; otherwise return null
The Prototype of the method is:
public String decodeCode(String encodedString).
This method takes following arguments.
  • String    encodedString:  represents the string which is sent by the smuggler1.
  • Method decodeCode() will return a string which is the decoded string of that string which is send by the smuggler1.
The constraints are:
  1. String encodedString should have only integer and special character '#' (if needed).
  2. String encodedString should not have any alphabetic character (ex. 'a','b') else return null
  3. String encodedString should not have any special character except '#' else return null
  4. String encodedString is empty then returns null.
Example 1
Input :
String encodedString=6999066263304447777077766622337778

Output :

my name is robert

Explanation:
when you will type the given string in the mobile in create text message area then my name is robert message will be displayed.
Example 2
Input :
String encodedString=777733663084433072#222552433

Output :

send the package
Example 3
Input :
String encodedString=777733663T084L43m30;72#222552433


Output :

null
For Java solutions
Package Name : test.decodethecode
File Name : DecodeTheCode.java
Class Name : DecodeTheCode
Function Name : public String decodeCode(String encodedString)

General Instructions

    
The package names, class names, method signatures are to be used as mentioned in the problem statement. Do not use your own names or change the method signatures and fields. You can add any number of additional methods.
    
The function(s) defined above would be the only functions that would be tested. If you add a main() function for your own testing, that would not be tested.
    
Command line options for the main() function are not supported currently.


--
Hackerx Sasi
Don't ever give up.
Even when it seems impossible,
Something will always
pull you through.
The hardest times get even
worse when you lose hope.
As long as you believe you can do it, You can.

But When you give up,
You lose !
I DONT GIVE UP.....!!!


In three words I can sum up everything I've learned about life - it goes on......
with regards
prem sasi kumar arivukalanjiam

2 comments:

  1. hello can you tell me about back of link if I upload any file online? mean How you give direct link for uploaded file/?

    ReplyDelete

Slider

Image Slider By engineerportal.blogspot.in The slide is a linking image  Welcome to Engineer Portal... #htmlcaption

Tamil Short Film Laptaap

Tamil Short Film Laptaap
Laptapp

Labels

About Blogging (1) Advance Data Structure (2) ADVANCED COMPUTER ARCHITECTURE (4) Advanced Database (4) ADVANCED DATABASE TECHNOLOGY (4) ADVANCED JAVA PROGRAMMING (1) ADVANCED OPERATING SYSTEMS (3) ADVANCED OPERATING SYSTEMS LAB (2) Agriculture and Technology (1) Analag and Digital Communication (1) Android (1) Applet (1) ARTIFICIAL INTELLIGENCE (3) aspiration 2020 (3) assignment cse (12) AT (1) AT - key (1) Attacker World (6) Basic Electrical Engineering (1) C (1) C Aptitude (20) C Program (87) C# AND .NET FRAMEWORK (11) C++ (1) Calculator (1) Chemistry (1) Cloud Computing Lab (1) Compiler Design (8) Computer Graphics Lab (31) COMPUTER GRAPHICS LABORATORY (1) COMPUTER GRAPHICS Theory (1) COMPUTER NETWORKS (3) computer organisation and architecture (1) Course Plan (2) Cricket (1) cryptography and network security (3) CS 810 (2) cse syllabus (29) Cyberoam (1) Data Mining Techniques (5) Data structures (3) DATA WAREHOUSING AND DATA MINING (4) DATABASE MANAGEMENT SYSTEMS (8) DBMS Lab (11) Design and Analysis Algorithm CS 41 (1) Design and Management of Computer Networks (2) Development in Transportation (1) Digital Principles and System Design (1) Digital Signal Processing (15) DISCRETE MATHEMATICS (1) dos box (1) Download (1) ebooks (11) electronic circuits and electron devices (1) Embedded Software Development (4) Embedded systems lab (4) Embedded systems theory (1) Engineer Portal (1) ENGINEERING ECONOMICS AND FINANCIAL ACCOUNTING (5) ENGINEERING PHYSICS (1) english lab (7) Entertainment (1) Facebook (2) fact (31) FUNDAMENTALS OF COMPUTING AND PROGRAMMING (3) Gate (3) General (3) gitlab (1) Global warming (1) GRAPH THEORY (1) Grid Computing (11) hacking (4) HIGH SPEED NETWORKS (1) Horizon (1) III year (1) INFORMATION SECURITY (1) Installation (1) INTELLECTUAL PROPERTY RIGHTS (IPR) (1) Internal Test (13) internet programming lab (20) IPL (1) Java (38) java lab (1) Java Programs (28) jdbc (1) jsp (1) KNOWLEDGE MANAGEMENT (1) lab syllabus (4) MATHEMATICS (3) Mechanical Engineering (1) Microprocessor and Microcontroller (1) Microprocessor and Microcontroller lab (11) migration (1) Mini Projects (1) MOBILE AND PERVASIVE COMPUTING (15) MOBILE COMPUTING (1) Multicore Architecute (1) MULTICORE PROGRAMMING (2) Multiprocessor Programming (2) NANOTECHNOLOGY (1) NATURAL LANGUAGE PROCESSING (1) NETWORK PROGRAMMING AND MANAGEMENT (1) NETWORKPROGNMGMNT (1) networks lab (16) News (14) Nova (1) NUMERICAL METHODS (2) Object Oriented Programming (1) ooad lab (6) ooad theory (9) OPEN SOURCE LAB (22) openGL (10) Openstack (1) Operating System CS45 (2) operating systems lab (20) other (4) parallel computing (1) parallel processing (1) PARALLEL PROGRAMMING (1) Parallel Programming Paradigms (4) Perl (1) Placement (3) Placement - Interview Questions (64) PRINCIPLES OF COMMUNICATION (1) PROBABILITY AND QUEUING THEORY (3) PROGRAMMING PARADIGMS (1) Python (3) Question Bank (1) question of the day (8) Question Paper (13) Question Paper and Answer Key (3) Railway Airport and Harbor (1) REAL TIME SYSTEMS (1) RESOURCE MANAGEMENT TECHNIQUES (1) results (3) semester 4 (5) semester 5 (1) Semester 6 (5) SERVICE ORIENTED ARCHITECTURE (1) Skill Test (1) software (1) Software Engineering (4) SOFTWARE TESTING (1) Structural Analysis (1) syllabus (34) SYSTEM SOFTWARE (1) system software lab (2) SYSTEMS MODELING AND SIMULATION (1) Tansat (2) Tansat 2011 (1) Tansat 2013 (1) TCP/IP DESIGN AND IMPLEMENTATION (1) TECHNICAL ENGLISH (7) Technology and National Security (1) Theory of Computation (3) Thought for the Day (1) Timetable (4) tips (4) Topic Notes (7) tot (1) TOTAL QUALITY MANAGEMENT (4) tutorial (8) Ubuntu LTS 12.04 (1) Unit Wise Notes (1) University Question Paper (1) UNIX INTERNALS (1) UNIX Lab (21) USER INTERFACE DESIGN (3) VIDEO TUTORIALS (1) Virtual Instrumentation Lab (1) Visual Programming (2) Web Technology (11) WIRELESS NETWORKS (1)

LinkWithin