\

Use cases

  1. Complex Words:
    A complex word like a Medicine Name will be both difficult to communicate and also will require absolute precision.
    Reference:
    Drug Names:
    Folex[ 5 word ]
    Foltx[ 5 word ]
    Notice the close pronunciation.

    Similarly it can be used to communicate even Names without any spelling ambiguity:
    Scenario: You walk in a hotel and the receptionist asks for your name.
    Name:
    Rama Chandrasekharan[ 12 word ]
  2. Numbers:
    Telephone Number
    9801234567[ 4 word ]
  3. Substitute Codes:
    SKU Code against a bar-code
    8901088055871[ 6 word ]
    Scenario: At a supermarket billing counter - the barcode reader is unable to read the barcode off a particular product. Thanks to WCode instead of having to tediously input the long code adjacent to the barcode. The cashier enters the easy to read "Words" quickly and without worrying of getting it wrong.
  4. Geographic Coordinates:
    Scenario: Imagine two friends Bob and Alice. Bob is out in the desert and has a satellite phone which has no Internet. Bob is lost and dehydrated. Bob calls Alice who has a computer with internet. Bob then tells him his precise location in a WCode. Alice upon decoding this WCode gets his precise location quickly and without any possibility of error. He then finds the coordinates of a nearby pond; converts this to a WCode and reads it back to Bob. Bob patches in this WCode gets the coordinates and follows his GPS to the pond.
    Mt. Everest's Location
    27°59'17"N 86°55'31"E[ 5 word ]
  5. Encoded Identifiers:
    Scenario: You need to transfer a small digital identifier e.g. Youtube video ID. This is encoded as a URL variant of Base64. It can easily be done using WCode.
    www.youtube.com/watch?v=QxhVvXqBiDc [A Talk for World Peace]
    QxhVvXqBiDc[ 7 word ]
  6. Small File Transfer:
    Scenario: Imagine - a small registration file needs to be present to run a software. And there is no internet present. The file can be encoded in WCode and can be easily obtained at the receiving end.
    License.reg
    00 1B DA ...[ 1 word / 10 bit ]
    [ ~820 word / KB ]
  7. Remote Troubleshooting:
    Computer commands and debug information like error codes can be easily communicated between a technical person and a nontechnical user using WCode.
    command to get a new IP address
    ipconfig /renew[ ~10 word ]
  8. Shortened URL:
    Shortened URL identifiers can be encoded into an easy to remember WCodes.
    URL
    https://accounts.google.com/b/0/
    IssuedAuthSubTokens
    [ temprorary: ~1 word* ]
    [ permanent: 1 word / 10 bit ]
    *Depending on concurrent load.
    Scenario: Two people on the phone can quickly exchange URLs without requiring a logged-in+connected communication platform.
  9. Easy Text transfer:
    Scenario: Imagine Bob needs to transfer his bank account details to Alice. Both are far away - and both have computers. They are not connected through the Internet. Thus they must send it through a SMS. Also, the phone is not connected to the computers.

    Bob places his original message in the WCode Encoder application. He then manually types in the generated WCode into an SMS and sends it over to Alice. Upon receiving this message Alice manually transfers it to the WCode Decoder application. As it is only words, it is much simpler and thus quick, also less error prone. Since it includes a checksum, correct delivery is guaranteed. Which further saves time by eliminating any need to re-check or verify. The original message is now generated.

    The same can be performed on only voice - making it instant and without compromising accuracy and without the overhead of recheck and verify.
    Account Details
    Bob the Builder, Bank of Cantonia
    a/c 1234567
    [ 1 word / 10 bit ]
  10. Foreign Language Text transfer:
    Scenario: Imagine Bob seeks to transfer a piece of text that is in chinese to Alice. But Bob does not know chinese. Bob can read out the WCode that encoded the chinese text to Alice. Alice upon decoding it receives the original text.
    “Earth” in chinese
    地 球[ ~3 word ]
    *Notice that: this is completely different from transliteration.
  11. Native Language Codes:
    WCodes in a native language can be used to encode any digital data; as long as an appropriate input method for the native language is available.
    This makes it accessible to non-English speaking populace.
    WCode in the nepali language
    981234560\ Cat Apple Mango Tomato /
    \ बिरालो स्याउ आँप टमाटर /
  12. Logographical Codes:
    Logographs can be used against individual words of a WCode. They are more readable and universal (i.e. language independent).
    Graphical WCode
    981234560Cat Apple Mango Tomato
    *Feasibility depends on unique symbol for each word.
    See: Guidelines for details on choosing logographs.
  13. File Signature verification:
    When a file is downloaded - the download manager can display a WCode of the file hash; this the user can verify more easily against the WCode encoded hash on the source website.
    Open Office Win x86 EN-US - SHA1
    4550B371B749FFE74184C85F
    5CD3BBE9C44A2F75
    [ 17 word ]
    Also, the resultant WCode can be used to generate a sequence of Logographs.
    A change in hash will result in very different graphics which can be much easily identified.
  14. Formatted Data Transfer:
    Scenario: Imagine a pathology lab needs to communicate a blood test report to a clinic on a regular basis. Since the format of the fields is uniform and known to both the parties in advance - only the data fields need to be transferred. This makes WCode the ideal solution as it shortens the communication by a significant factor whilst making it guaranteed accurate.
    Blood Report:
    FieldsValue*Unit
    ID:14731
    WBC count:11200/mm3
    Haemoglobin:11.0gm/dl
    ESR13mm/hr
    [ ~12 Word ]
    *Only the values (viz. in Bold) are encoded.
    See: Data Set for custom data structures support.
  15. Secure Communication:
    Data can be encrypted by using scrambled or custom word list or by encrypting original data with asymmetric keys and transmitted on print or audio media without compromising the data.
    Military Command
    Attack at 0300 Hrs[ ~10 word* ]
    *Intercepted WCode cannot be decoded by the rival party.
  16. Error Resilience:
    WCodes can be made resilient to communication errors by integrating error correction techniques. this will result in a longer code though.
    Urgent Code
    0x0110EFAB[ ~m word ]
    -nth word could not be read*
    *The original data could be decoded regardless.
  17. Random Password:
    Computer generated – high entropy, random passwords can be encoded into WCodes which are much easier to remember.
    Generated password
    !4^8*$A[ 5 word ]