Kardashev scale
Cyberwarfare
Air gap (networking)
lattice paths and ballot numbers
Stuxnet
Lobb Number
Lobb number
Ballot counting
The combinatorics of parentheses is replaced with counting ballots in an election with two candidates in Bertrand's ballot theorem, first published by William Allen Whitworth in 1878. The theorem states the probability that winning candidate is ahead in the count, given known final tallies for each candidate.A random walk is a mathematical object, known as a stochastic or random process, that describes a path that consists of a succession of random steps on some mathematical space such as the integers.
Economic Policy Institute
The Color of Law: A Forgotten History of How Our Government Segregated America
Book • By Richard Rothstein • 2017
What is the Minkowski distance?
The Minkowski distance is a metric in a normed vector space which can be considered as a generalization of both the Euclidean distance and the Manhattan distance:
Taxicab geometry
Random walk in a color of law case
By David Vincent Bell Hirsch
By David Vincent Bell Hirsch
India explores setting up rupee trade accounts with Russia to soften sanctions blow - sources
India is walking a tightrope between Ukraine and Russia
Vrindavan story: Why Lord Krishna Wears Peacock Feather on His Head?
A feather in your cap
The Pied Piper of Hameln
and related legends from other towns
Karni Mata Temple[1] (Hindi: करणी माता मंदिर) is a Hindu temple dedicated to Karni Mata at Deshnoke, 30 km from Bikaner, in Rajasthan, India. It is also known as the Temple of Rats.
The temple is famous for the approximately 25,000 black rats that live, and are revered, in the temple. These holy rats are called kabbas, and many people travel great distances to pay their respects. The temple draws visitors from across the country for blessings, as well as curious tourists from around the world.[2]
The True Story of the Russian Kursk Submarine Disaster
A navy fleet exercise became a desperate race to recover survivors hundreds of feet beneath the sea.
Pandera: A Statistical Data Validation Toolkit for Pandas
Pandera is a a flexible and expressive
toolkit for performing statistical validation checks on pandas data
structures that was recently accepted into the pyOpenSci ecosystem.
Learn more about Pandera.
Choose and configure columns in model-driven app views
Method chaining
A tutorial for the best practice with Pandas Method Chaining
Python Type Checking (Guide)
pandas: powerful Python data analysis toolkit
Refactor your code to make it more understandable
I would rather read binary and bleed from my eyes
Functions — reusable blocks of code
Conjunction, junction, what's your function?Maslenitsa
Maslenitsa (Belarusian: Масленіца, Russian: Мaсленица, Rusyn: Fašengy, Ukrainian: Масниця; also known as Butter Lady, Butter Week, Crepe week, or Cheesefare Week) is an Eastern Slavic
religious and folk holiday, which has retained a number of elements of
Slavic mythology in its ritual, celebrated during the last week before Great Lent, that is, the eighth week before Eastern Orthodox Pascha.
The date of Maslenitsa changes every year depending on the date of the celebration of Easter. It corresponds to the Western Christian Carnival, except that Orthodox Lent begins on a Monday instead of a Wednesday, and the Orthodox date of Easter can differ greatly from the Western Christian date.
The traditional attributes of the Maslenitsa celebration are the Maslenitsa effigy, sleigh rides, festivities. Russians bake bliny and flatbread, while Belarusians and Ukrainians cook pierogi and syrniki.
Great Lent 2022 will begin onMonday, March 7and ends onSaturday, April 23
Maslenitsa
Maslenitsa (Belarusian: Масленіца, Russian: Мaсленица, Rusyn: Fašengy, Ukrainian: Масниця; also known as Butter Lady, Butter Week, Crepe week, or Cheesefare Week) is an Eastern Slavic religious and folk holiday, which has retained a number of elements of Slavic mythology in its ritual, celebrated during the last week before Great Lent, that is, the eighth week before Eastern Orthodox Pascha.
The date of Maslenitsa changes every year depending on the date of the celebration of Easter. It corresponds to the Western Christian Carnival, except that Orthodox Lent begins on a Monday instead of a Wednesday, and the Orthodox date of Easter can differ greatly from the Western Christian date.
The traditional attributes of the Maslenitsa celebration are the Maslenitsa effigy, sleigh rides, festivities. Russians bake bliny and flatbread, while Belarusians and Ukrainians cook pierogi and syrniki.
Come Clean Monday, Dynamic Programing Scheduling (computing) for Easter Monday as Quantum biology with Word and Actor Model within Roosevelt Corollary and Latin America with Roosevelt's quarantine speech: Copper Borromean rings Game Theory of Pifithrin-α, p53 down Kissing stem-loop research of COVID-19
Just war theory
Augustine asserted that this was a personal, philosophical stance: "What is here required is not a bodily action, but an inward disposition. The sacred seat of virtue is the heart."Russian Orthodox Church and just war
The War and Peace section in the Basis of the Social Concept of the Russian Orthodox Church is crucial for understanding the Russian Orthodox Church's attitude towards war. The document offers criteria of distinguishing between an aggressive war, which is unacceptable, and a justified war, attributing the highest moral and sacred value of military acts of bravery to a true believer who participates in a justified war. Additionally, the document considers the just war criteria as developed in Western Christianity eligible for Russian Orthodoxy, so the justified war theory in Western theology is also applicable to the Russian Orthodox Church.[33]
In the same document, it is stated that wars have accompanied human history since the fall of man; according to the gospel, they will continue to accompany it. While recognizing war as evil, the Russian Orthodox Church does not prohibit her members from participating in hostilities if there is the security of their neighbors and the restoration of trampled justice at stake. War is considered to be necessary but undesirable. It is also stated that the Russian Orthodox Church has had profound respect for soldiers who gave their lives to protect the life and security of their neighbors.[34]
Elvira Nabiullina, noted for her symbolic outfits, wore funereal black when announcing the economic response to sanctions
India condemns killings in Ukraine's Bucha in apparent hardening of stance
Beginners Guide to Pyjanitor – A Python Tool for Data Cleaning
conda-forge / packages / 0.22.0
Bartolomé de las Casas
Tandava
Mistrust runs deep between the nuclear-armed neighbors, but Pakistan had a low-key response to what India called a “technical malfunction.” No casualties were reported.
The Infinite Reach of Joel Kaplan, Facebook’s Man in Washington
Deep Learning Is Hitting a Wall
What would it take for artificial intelligence to make real progress?
The ancient guide for uncertain times
In mathematics, in particular in knot theory, the Conway knot (or Conway's knot) is a particular knot with 11 crossings, named after John Horton Conway.[2]
It is related by mutation to the Kinoshita–Terasaka knot,[3] with which it shares the same Jones polynomial.[4][5] Both knots also have the curious property of having the same Alexander polynomial and Conway polynomial as the unknot.[6]
The issue of the sliceness of the Conway knot was resolved in 2020 by Lisa Piccirillo, 50 years after John Horton Conway first proposed the knot.[6][7][8] Her proof made use of Rasmussen's s-invariant, and showed that the knot is not a smoothly slice knot, though it is topologically slice (the Kinoshita–Terasaka knot is both).[9]
Classifying and Applying Rational Knots and Rational Tangles
Louis H. Kauffman and Sofia LambropoulouQuantum entanglement
Quantum social science
The social aspects of quantum entanglement
Knot (mathematics)
Knot theory
["Schubert House, Fletcher Home"]
Uncle David Schubert, here is how we may apply our comprehension of material subject matter as Schubert Calculus:Imaginary time
In quantum statistical mechanics
Quantum Cohomology of Grassmannians
ANDERS SKOVSTED BUCH
SUBVARIETIES OF GLn/P
E. AKYILDIZ, A. LASCOUX & P. PRAGACZ
A tutorial on Quantum Cohomology
68–95–99.7 rule
Lie algebra cohomology
List of cohomology theories
An open loop is a control loop that has an absence of feedback.
Open-loop or open loop may also refer to:
- Open-loop controller, a system controller that does not use feedback
- Open-loop model, a model studied in game theory in which players cannot observe the actions of other players
- Control system, a system for controlling a signal or process that may operate with an open or closed feedback loop
- Control theory, the theory of control systems, which involves the analysis of feedback loops
Closed loop
Prime knot
An Introduction to the Theory of Knots
Giovanni De Sanprime numbers
A Chemist Shines Light on a Surprising Prime Number Pattern
How The Inca Used Knots To Tell Stories
Silvia Ferrara on Quipu, the Ancient Technique of Communicating With Cord
Moving in with other adults has become a lifeline for single moms hit ‘tenfold’ by the pandemic
Single mothers, who have lost jobs at a higher rate than married parents, are turning to cohabitation as a way to get through the pandemic, get child care support and weather rising rents. Many are moving in with family, friends or other single moms.
Quipu
Jerk (physics)
Color charge
Color charge is a property of quarks and gluons that is related to the particles' strong interactions in the theory of quantum chromodynamics (QCD).
The "color charge" of quarks and gluons is completely unrelated to the everyday meaning of color. The term color and the labels red, green, and blue became popular simply because of the loose analogy to the primary colors. Richard Feynman referred to his colleagues as "idiot physicists" for choosing the confusing name.
Color Force
Strong interaction
The Four Color Theorem
Energy scales in physics
Force, Mass & Acceleration: Newton's Second Law of Motion
Changes in energy stores
Energy transfers
Systems and stores
A scalar or scalar quantity in physics is a physical quantity that can be described by a single element of a number field such as a real number, often accompanied by units of measurement. A scalar is usually said to be a physical quantity that only has magnitude, possibly a sign, and no other characteristicsConservation of energy
de Sitter space
Mechanical equivalent of heat
Absolute Temperature Scale
Sun Tzu (mathematician)
His interests were in astronomy. He tried to develop a calendar and for this he investigated Diophantine equations. He is best known for authoring Sun Tzu Suan Ching (pinyin: Sun Zi Suan Jing; literally, "Sun Tzu's Calculation Classic"), which contains the Chinese remainder theoremEntropy (order and disorder)
Conservation of mass
Power (physics)
Mechanical power
Using the Conservation of Energy Theorem to Find an Initial Velocity
Young Frankenstein
Off to the Races
Corporate Governance Update: “Materiality” in America and Abroad
For the stories of how a quarter could buy you an air conditioned theater, pop corn and a cola for all day Saturday fun in 1950s Oklahoma.Combustion reactions
Momentum
In terms of an equation, the momentum of an object is equal to the mass of the object times the velocity of the object. where m is the mass and v is the velocity. The equation illustrates that momentum is directly proportional to an object's mass and directly proportional to the object's velocity.Momentum Transfer to an Atom in a Molecule: Internal Excitation and Bond Dissociation*
Macroscopic Energy
Scale invariance
Scalar curvature
Angular Momentum Coherences in Molecular Dynamics
Momentum diffusion
Linearized gravity
Mechanics
Scalar Quantum Field Theory on Fractals
Microscopic Energy
Average Molecular Kinetic Energy
Bernoulli's
equation
Ricci curvature tensor
Ideal gas law
Bernoulli's principle
Kinetic theory of gases
Kinetic Theory
Convective momentum transport
In it's Scalar form, Coulomb's law is identical to Newton's law of Gravity:
Coulomb's law
Reaction coordinate
Tension (physics)
Tensor
Quantum field theory
Emergence of Riemannian geometry and the massive graviton
Tensor product of modules
GCSE Science/Current, voltage resistance and Ohm's law
Newton's law of universal gravitation
Bimetric gravity
Stress–energy tensor
Massive gravity
Dark fluid
Gravitational wave
Massive gravitons as dark matter and gravitational waves
R-parity
Neutrino Signals from Gravitino Dark
Matter with Broken R-Parity
Electric field
Perlin noise
Fractal cosmology
Spin glass
In condensed matter physics, a spin glass is a model of a certain type of magnet.
Spin ice
Absolute zero
Thermodynamic temperature
Heat capacity
Specific heat capacity
Heat capacity formula
The formula for specific heat looks like this:
c = Q / (mΔT)
Q
is the amount of supplied or subtracted heat (in joules), m
is the mass of the sample, and ΔT
is the difference between the initial and final temperatures. Heat capacity is measured in J/(kg·K).
The heat capacity is equal to the energy input to the system divided by the temperature change
The British Scientist James Joule used this apparatus in his now classic paddle-wheel experiment. Falling weights turned the paddles to churn water; the churning raised the water's temperature slightly, and Joule found that the temperature rise was in direct proportion to the amount of work done by the falling weights.
Atmospheric pressure
Scientific notation
Scientific Notation Calculator
Joule's water friction apparatus, 1843.The experimental aparatus used by James Joule (1818-1889), who proved that energy cannot be created or destroyed, but can only change in form. This idea is now known as the Conservation of Energy. Joule’s experiment consisted of a brass paddle wheel stirring water in a copper vessel. The paddle wheel was turned by falling weights possessing mechanical, or kinetic, energy as they fell. The temperature of the water rose by an amount that depended on how far the weights fell. This showed that the kinetic energy of the weights now existed as heat energy in the water. Joule's experiments also proved that heat is produced by motion, contradicting the caloric theory. The SI unit of energy, the Joule, was named after him.
Flow measurement
Conservation of energy
Temperature Change and Heat Capacity
Gravitational Potential Energy
Energy comes in two forms; organized and disorganized. Organized energy has the potential to be activated (it is being stored). Disorganized energy is the energy of motion. In all natural processes some organized energy is always converted to disorganized energy.Energy is transfered when work is done.
Marianne
SS Leviathan
First Dacian War
Trajan's Dacian Wars
Dolc ̧a Tellols
Tokyo Institute of Technology
tellols.d.aa@m.titech.ac.jp
Legions of the Dacian Wars
String (physics)
String galvanometer
String graph
String group
strings (Unix)
Data Structures
Multitape Turing machine
Magma (computer algebra system)
- Natural language processing, a branch of artificial intelligence concerned with automated interpretation and generation of human language
- Natural-language programming, an ontology-assisted way of programming in terms of natural language sentences
- Nonlinear programming, a process of solving optimisation problems where constraints are nonlinear
Finite element method
The structure of finite element methods
Galerkin method
Scribes: Aditya Bhaskara and Siddhartha Sen
Fracton (subdimensional particle)
Gravitational field
In particle physics, a gauge boson is a force carrier, a bosonic particle that carries any of the fundamental interactions of nature, commonly called forces.
Bright Week
Lord Krishna says to Arjuna, "plunge into the heat of battle and keep your heart at the lotus feet of the lord" PSNS autonomic nervous system is responsible for regulating the body's unconscious actions
Saint Thomas Aquinas
In Summa Theologica Aquinas asserted that it is not always a sin to wage war and set out criteria for a just war. According to Aquinas, three requirements must be met: First, the war must be waged upon the command of a rightful sovereign. Second, the war needs to be waged for just cause, on account of some wrong the attacked have committed. Thirdly, warriors must have the right intent, namely to promote good and to avoid evil.[26] Aquinas came to the conclusion that a just war could be offensive and that injustice should not be tolerated so as to avoid war. Nevertheless, Aquinas argued that violence must only be used as a last resort. On the battlefield, violence was only justified to the extent it was necessary. Soldiers needed to avoid cruelty and a just war was limited by the conduct of just combatants. Aquinas argued that it was only in the pursuit of justice, that the good intention of a moral act could justify negative consequences, including the killing of the innocent during a war.Ukraine invasion live updates: March 4
Pi Day
Cantor Dust
pandas-profiling
Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython
Putting a Wrapper Around a Function
Programming with dplyr
pyjanitor: Clean APIs for Cleaning Data | SciPy 2019 | Eric Ma
Mirror Neurons After a Quarter Century: New light, new cracks
Imitation, Repetition, and Attention
Attention in Psychology, Neuroscience, and Machine Learning
If understanding AI ever scared you, don’t worry it’s not so bad!
AI vs. Machine Learning vs. Deep Learning vs. Neural Networks: What’s the Difference?
A Beginner's Guide to Neural Networks and Deep Learning
Observables
Pandera LabsTidy data
There are three rules which make a dataset tidy:
- Each variable must have its own column.
- Each observation must have its own row.
- Each value must have its own cell.
Data Cleaning & Tidying
A must-know concept for Data Scientists.
Introduction to Tidy Data in R
Tidy data
Data tidying
Ty-D-Bol
pandas ecosystem
Finance
Finance-specific data cleaning functions.
samukweku / data-wrangling-blog
Code Reuse: Functions and Modules
Introduction to Data Cleaning with Pyjanitor
pyjanitor
Python’s Pandas vs R’s Tidyverse: Who Wins?
Wrangling Pandas with Pandas Flavor
Quark
There are six types, known as flavors, of quarks: up, down, charm, strange, top, and bottom. Up and down quarks have the lowest masses of all quarks.Format function
pandera.typing
Data Synthesis Strategies¶
pandera.hypotheses.Hypothesis¶
Falsifiability
Floating-point arithmetic
Boolean data type
R
Boolean data types
Boolean data type in Python
PostgreSQL Boolean Type
Gradual typing
Gradual typing in Python
Level of measurement
Fastest Growing Occupations
Costume attendants |
44% |
$42,910 per year |
Fastest declining occupations
Nuclear power reactor operators |
51-8011 |
5.3 |
3.6 |
-1.8 |
-32.9 |
$104,040 |
---|
Nearly 1 in 3 workers lack foundational digital skills, new report finds
Challenges: Education, Employment, and the Military
Strong and weak typing
Cloud Native Computing Foundation
Pharisee and the Publican
Purusha
Purusha (puruṣa or Sanskrit: पुरुष) is a complex concept[1] whose meaning evolved in Vedic and Upanishadic times. Depending on source and historical timeline, it means the cosmic being or self, consciousness, and universal principle.Prakṛti
Prakriti or Prakruti (Sanskrit: प्रकृति IAST: prakṛti) is "the original or natural form or condition of anything, original or primary substance".[1] It is a key concept in Hinduism, formulated by its Sāṅkhya school, where it does not refer to matter or nature, but "includes all the cognitive, moral, psychological, emotional, sensorial and physical aspects of reality," stressing "prakṛti's cognitive, mental, psychological and sensorial activities."[2] Prakriti has three different innate qualities (guṇas), whose equilibrium is the basis of all observed empirical reality.[3][4] Prakriti, in this school, contrasts with Puruṣa, which is pure awareness and metaphysical consciousness.[3] The term is also found in the texts of other Indian religions such as Jainism,[5] and Buddhism.[6]
In Indian languages derived from Sanskrit roots, Prakriti refers to the feminine aspect of all life forms, and more specifically a woman is seen as a symbol of Prakriti.[7]
Anima - Mania, a five lettered anagram. Pretend play is a form of symbolic play where children use objects, actions or ideas to represent other objects, actions, or ideas using their imaginations to assign roles to inanimate objects or people.
Make believe
Scientific control
Artificial Intelligence and Spiritual Life
The Age of Spiritual Machines
Problem-solving capacities of spiritual intelligence for artificial intelligence
Crescent
The Spaceships of Ezekiel
Parables (משלים) of Messiah
The Frequency of the Earth-Year
Tone: 136.10 Hz = C#
"OM" is the frequency of the Earth cycling one year.
Essential dignity
Cymatics
Mandala
Sanatana Dharma, Hinduism exhumed and resurrected, Part 39 – Capt Ajit Vadakayil
Kippah
How to map the brain
Vagus Nerve as Modulator of the Brain–Gut Axis in Psychiatric and Inflammatory Disorders
See also
|
Hebbian learning and predictive mirror neurons for actions, sensations and emotions
Hebbian theory
Molecular tweezers Electron donor Lone pair Angle changes of some Hairy ball theorem
By David Vincent Bell HirschBrain Cells for Socializing
Does an obscure nerve cell help explain what gorillas, elephants, whales—and people—have in common?
In Bonobos Yawn Contagion Is Higher among Kin and Friends
By Vilayanur Ramachandran [5.31.00]
Plasticity of the connectome
Microscale rewiring
Microscale rewiring is the formation or removal of synaptic connections between two neurons and can be studied with longitudinal two-photon imaging. Dendritic spines on pyramidal neurons can be shown forming within days following sensory experience and learning.[42][43][44] Changes can even be seen within five hours on apical tufts of layer five pyramidal neurons in the primary motor cortex after a seed reaching task in primates.Important Skills for Data Engineer and Data Scientist
Running ETL Spark Job through Dataproc (an ephermal cluster)with Workflow Templates
Charlie Chan - Dangerous Money
Expressions
How to use AND Operator in Python IF?
Create your first ETL Pipeline in Apache Spark and Python
Currency pair
A currency pair is the dyadic quotation of the relative value of a currency unit against the unit of another currency in the foreign exchange market. The currency that is used as the reference is called the counter currency, quote currency, or currency[1] and the currency that is quoted in relation is called the base currency or transaction currency.
Currency pairs are generally written by concatenating the ISO currency codes (ISO 4217) of the base currency and the counter currency, and then separating the two codes with a slash. Alternatively the slash may be omitted, or replaced by either a dot or a dash. A widely traded currency pair is the relation of the euro against the US dollar, designated as EUR/USD. The quotation EUR/USD 1.2500 means that one euro is exchanged for 1.2500 US dollars. Here, EUR is the base currency and USD is the quote currency (counter currency). This means that 1 Euro can be exchangeable to 1.25 US Dollars.
The most traded currency pairs in the world are called the Majors. They involve the currencies euro, US dollar, Japanese yen, pound sterling, Australian dollar, Canadian dollar, and the Swiss franc.
Tuples Class
Tuples in Python
Python Compound statements
Tuple (Database)
Use the BigQuery connector with Spark
Using Spark as an ETL tool for moving data from Hive tables to BigQuery
Insert or delete rows and columns
What is a modulo operator (%) in Python?
With easy to understand examples for beginners!
Preprocessing BigQuery Data with PySpark on Dataproc
Python if else
Transpose (rotate) data from rows to columns or vice versa
Create a list based on a spreadsheet
/ spark-bigquery-connector
Create an in-cell dropdown list
Create drop-down lists in a cell with Google Sheets.
Google Sheets function list
Using arrays in Google Sheets
APD: 2 dead after multiple overdoses near 6th Street overnight
Fentanyl overdoses dropped in 4 states. These solutions are helping
The
cadets, along with another young man, were exposed to what is believed
to be cocaine laced with fentanyl, and two were on ventilators late
Friday, officials said.
Sodium channel
to human pain
Sulayman D. Dib-Hajj, Joel A. Black and Stephen G. Waxman
Narcos: Transnational Cartels and Border Security
Hollywood Woman and TV Actor Charged with
Participating in Home-Delivery Drug Trafficking Ring that Led to Fatal
Fentanyl Overdose
Combatting Transnational Criminal Organizations
Decrease the ability of targeted transnational criminal organizations to conduct illicit activities impacting the southern border and approaches region of the United States. By September 30, 2017, actions by the DHS Joint Task Forces via synchronized component operations will result in the disruption and/or dismantlement of 15% of targeted transnational criminal organizations.
Mexico’s Transnational Criminal Organizations are Benefitting from the Pandemic
Culture and Society
Recontextualizing the social norms construct as applied to health promotion
The Importance of Competition for the American Economy
Beatitudes
Silence Dogood
Russia: Origin and consequences of the debt repudiation of February 10, 1918
France–Russia relations
The True Story of ‘The Underground Railroad’
The adaptation of Colson Whitehead’s Pulitzer Prize–winning novel reimagines the eponymous trail to freedom as an actual train track
Frog, Texas
Frog is an unincorporated community in Kaufman County, located in the U.S. state of Texas.Python | range() does not return an iterator
How to use a List as a key of a Dictionary in Python 3?
Python Dictionaries
Frog
Using Frog from Python
This Biohacker Makes Mutant Frogs — And You Can Buy Them On The Internet
Python Dictionary
Church–Turing thesis
Success of the thesis
Get-ChildItem
Cucumber: BDD Testing & Collaboration Tools for Teams
Shoki or Shōki may refer to:
- the Japanese pronunciation of Zhong Kui, a figure in Chinese mythology, traditionally regarded as a vanquisher of ghosts and evil beings
DNAFET Emboss wordcount Bioinformatics Howler, LuaJIT Project
By David Vincent Bell HirschPowerShell errors: Dealing with 'term is not recognized as the name of a cmdlet'
Hooking FastAPI Endpoints up to a Postgres Database
PostgreSQL
PostgreSQL: The world's most advanced open source database
How Do Arbitrage and Hedging Differ?
ON DEMOCRACY IN RUSSIA AND
EUROPE: IMPLICATIONS FOR
U.S. NATIONAL SECURITY
Hydrothermal synthesis
Thermal Metamaterial: Fundamental, Application, and Outlook
Transfer function
Thermal engineering
Geothermal gradient
Thermal Plasma
Quark–gluon plasma
Plasma parameters
Pairing Geothermal Technology and Solar Photovoltaics for Net-Zero Energy Homes
Solar thermal energy
Hydrothermal circulation
Control system
Knudsen number
Model theory
Free molecular flow
Anisothermal plasma
Nonthermal plasma
The theory and framework of integration design of building consumption efficiency based on BIM
Building information modeling
About Building Energy Modeling
416.1212. Exclusion of the home
Cori Supercomputer Now Fully Installed at Berkeley Lab
Virginia is now the sole winner of Amazon's HQ2.
DC-Area Lobbyists Helped Lay Groundwork for Amazon's HQ2
By Ryan Lovelace | November 15, 2018Amazon will pay $0 in federal taxes this year — and it's partially thanks to Trump
REO Auction Vs. Courthouse Foreclosures
City-Owned Property For Sale
Travis County Foreclosure Sales
State Surplus Property
Jeremiah 29:5 - Build ye houses, and dwell in them; and plant gardens, and eat the fruit of them;University Surplus Property (Equipment and Consumable Supplies)
Psalms 24:1 - (A Psalm of David.) The earth is the LORD'S, and the fulness thereof; the world, and they that dwell therein.A Detailed Look Using Vacancy Data for the State of Texas
Auctions and Sales of State Property
Spiritual care in health care professions
House of David
Interested in our grants? Start here.
Our grants connect, protect, train, support and empower workers and job seekers at home and abroad. Watch agency experts share what you need to know about our grants, and how to apply.
DOE Announces Nearly $83 Million to Increase Building Energy Efficiency and Cut Consumers' Energy Bills
Topological insulator
A simple guide to creating, updating and manipulating python’s most popular data structures, and their key differences.
Anomalous monism
Triangular trade
How to find length of dictionary values?
Weighted Connection
Get length of dictionary in Python
Regular Dictionary vs Ordered Dictionary in Python
Triangulation (psychology)
OrderedDict in Python
Python Dictionaries are Ordered now, but how?…and why?
Enmeshment
Quantum entanglement
Relational enmeshment of entangled minds!
Dicts are now ordered, get used to it
Oscillatory Networks: Pattern Recognition Without a Superposition Catastrophe
OrderedDict vs dict in Python: The Right Tool for the Job
Marshall–Lerner condition
Quantum neural networks
Alexandr A. Ezhov1 and Dan Ventura
Quantum decoherence
Phase-space picture
In physics, the Heisenberg picture (also called the Heisenberg representation[1]) is a formulation (largely due to Werner Heisenberg in 1925) of quantum mechanics in which the operators (observables and others) incorporate a dependency on time, but the state vectors are time-independent, an arbitrary fixed basis rigidly underlying the theory.
It stands in contrast to the Schrödinger picture in which the operators are constant, instead, and the states evolve in time. The two pictures only differ by a basis change with respect to time-dependency, which corresponds to the difference between active and passive transformations. The Heisenberg picture is the formulation of matrix mechanics in an arbitrary basis, in which the Hamiltonian is not necessarily diagonal.
It further serves to define a third, hybrid, picture, the interaction picture.
Schrödinger picture
In physics, the Schrödinger picture (also called the Schrödinger representation[1]) is a formulation of quantum mechanics in which the state vectors evolve in time, but the operators (observables and others) are constant with respect to time.[2][3] This differs from the Heisenberg picture which keeps the states constant while the observables evolve in time, and from the interaction picture in which both the states and the observables evolve in time. The Schrödinger and Heisenberg pictures are related as active and passive transformations and commutation relations between operators are preserved in the passage between the two pictures.Conductance quantum
De Broglie wavelength
Matter wave
Identity (mathematics)
Get() method for dictionaries in Python
How to Use an Arbitrage Strategy in Forex Trading?
Decoherence, the measurement problem, and
interpretations of quantum mechanics
US Hemp Bank Treasury Notes are savings for our Department of Agriculture, Department of Energy, and EPA
By David Vincent Bell HirschGuidelines to use dictionaries in Python
Transfer function
Typology
Beat Generation
How does US culture influence behaviors in state to state healthy competition?Richard P. Feynman Quotes About Energy
EPR paradox
Matrix mechanics
How to use OR operator in Python If Statement?
A Comprehensive Guide To Conditional Statements in Python For Data Science Beginners
Decision-making in a programming language is automated using conditional statements, in which Python evaluates the code to see if it meets the specified conditions. The conditions are evaluated and processed as true or false. If this is found to be true, the program is run as neededThe rupee-rouble trade arrangement may get a push now that Russia is out of SWIFT
Netflix Has Defied the Russian Government, for Now
Meaning of quantum entanglement
get
Python list | pop()
Python break statement
Python Dictionary pop() method
Break statement in Java
JavaScript Array pop() Method
Break Statement in C/C++
An Alternative To Brackets For Dictionary Values in Python
Comparing BigQuery Processing and Spark Dataproc
SWIFT
The Society for Worldwide Interbank Financial Telecommunication (SWIFT), legally S.W.I.F.T. SC, is a Belgian cooperative society providing services related to the execution of financial transactions and payments between banks worldwide. Its principal function is to serve as the main messaging network through which international payments are initiated.[2] It also sells software and services to financial institutions, mostly for use on its proprietary "SWIFTNet", and ISO 9362 Business Identifier Codes (BICs), popularly known as "SWIFT codes".The Dollar Game - Numberphile
Dr Holly Krieger
Charles Lutwidge Dodgson (/ˈlʌtwɪdʒ ˈdɒdʒsən/; 27 January 1832 – 14 January 1898), better known by his pen name Lewis Carroll, was an English writer of children's fiction, notably Alice's Adventures in Wonderland and its sequel Through the Looking-Glass. He was noted for his facility at word play, logic, and fantasy. The poems Jabberwocky and The Hunting of the Snark are classified in the genre of literary nonsense. He was also a mathematician, photographer, and Anglican deacon.
Carroll came from a family of high-church Anglicans, and developed a long relationship with Christ Church, Oxford, where he lived for most of his life as a scholar and teacher. Alice Liddell, daughter of the Dean of Christ Church, Henry Liddell, is widely identified as the original for Alice in Wonderland, though Carroll always denied this.
Born in All Saints' Vicarage, Daresbury, Cheshire, in 1832, Carroll is commemorated at All Saints' Church, Daresbury, in its stained glass windows depicting characters from Alice's Adventures in Wonderland. In 1982, a memorial stone to Carroll was unveiled in Poets' Corner, Westminster Abbey.
Comprehensions in Python
Build, deploy, and scale ML models faster, with pre-trained
and custom tooling within a unified artificial intelligence
platform.
Why do we need it, how good is the code-free ML training, really, and what does all this mean for data science jobs?
Azure Machine Learning capabilities that automate and accelerate the machine learning lifecycle
U.S. Coast Guard offloads $1 billion worth of narcotics
Triangular trade
What Is Amazon SageMaker?
Citing drought, US won’t give water to California farmers
Mexicali Rose
What is Amazon VPC?
Currency Pair
Mexican peso crisis
Apache Airflow Tutorial
This tutorial walks you through some of the fundamental Airflow concepts, objects, and their usage while writing your first pipeline.
What
are the steps in building a data warehouse? What cloud technology
should you use? How to use Airflow to orchestrate your pipeline?
General equilibrium theory
In economics, general equilibrium theory attempts to explain the behavior of supply, demand, and prices in a whole economy with several or many interacting markets, by seeking to prove that the interaction of demand and supply will result in an overall general equilibrium. General equilibrium theory contrasts to the theory of partial equilibrium, which only analyzes single markets. In general equilibrium, constant influences are considered to be noneconomic, therefore, resulting beyond the natural scope of economic analysis.[1]What Is an Oligopoly?
Oligopoly is a market structure with a small number of firms, none of which can keep the others from having significant influence.
How some new $100 bills worth $1,000 or more
The Numeraire Problem in General Equilibrium Models with Market Power : Much Ado About Nothing ?
Denomination
Gresham's law
In economics, Gresham's law is a monetary principle stating that "bad money drives out good". For example, if there are two forms of commodity money in circulation, which are accepted by law as having similar face value, the more valuable commodity will gradually disappear from circulation.Market
Emerging versus Developed markets
Source code for airflow.contrib.hooks.bigquery_hook
Simple ETL with Airflow
Some fundamentals you need to know to start using Airflow with Python
Writing DAGs (workflows)
Fusion Centers and Joint Terrorism Task Forces
VPC network overview
Virtual private cloud (VPC)
PyFlink: The integration of Pandas into PyFlink
U.S. Treasury Announces Unprecedented & Expansive Sanctions Against Russia, Imposing Swift and Severe Economic Costs
Data mart
Developing your C-Suite
by Nancy Atwood, PhD and Terry Bacon, PhD
Corporate title
Limited liability company (LLC)-structured companies are generally run directly by their members, but the members can agree to appoint officers such as a CEO or to appoint "managers" to operate the company.
American companies are generally led by a CEO. In some companies, the CEO also has the title of "president". In other companies, a president is a different person, and the primary duties of the two positions are defined in the company's bylaws (or the laws of the governing legal jurisdiction). Many companies also have a CFO, a chief operating officer (COO) and other senior positions such as General Counsel (CLO), chief strategy officer (CSO), chief marketing officer (CMO), etc. that report to the president and CEO. The next level, which are not executive positions, is middle management and may be called "vice presidents", "directors" or "managers", depending on the size and required managerial depth of the company.
Data Science for Startups: PySpark
Intelligence officer
The New Path To the C-Suite
Understanding the C-Suite
Batch Processing — Apache Spark
Chief Information Officer (CIO)
Accelerator program
Sorting fact, disinformation amid Russian war on Ukraine
Big Data Analytics with Java and Python, using Cloud Dataproc, Google’s Fully-Managed Spark and Hadoop Service
EXCLUSIVE India plans urea import deal with Iran using rupee payments-sources
Apache Spark and Jupyter Notebooks on Cloud Dataproc
Putin bans cash exports from Russia exceeding $10,000 in value - Kremlin
Use Dataproc, BigQuery, and Apache Spark ML for Machine Learning
Feds rescind license extension for Florida nuclear plant
Ukraine jets hit Russian column; Russia has used thermobarics, Ukraine military says
EMERGING MARKETS-Brazil real, Mexican peso higher as Ukraine-Russia tensions mildly ease
Russian oligarchs move yachts as U.S. looks to ‘hunt down’ and freeze assets
Cloud Logging
TITLE 6. PUBLIC OFFICERS AND EMPLOYEESSUBTITLE A. PROVISIONS GENERALLY APPLICABLE TO PUBLIC OFFICERS ANDEMPLOYEESCHAPTER 602. ADMINISTRATION OF OATHS
Mr. Mohammed Ratlamwala , Mr. Omkesh Rane
Project Guide: Prof. Martina D’Souza (B.E IT, M.E Comp)
EAR (file format)
Debug and Diagnose Spark Applications on SQL Server Big Data Clusters in Spark History Server
Behavior-driven development (BDD)
View persistent application user interfaces
Union() function in Python
Python | set() method
Behavioral Economics
Voting behavior
A Step-by-Step Tutorial
Finite element method
The structure of finite element methods
Galerkin method
Attributes and behaviors
Every class contains attributes and behaviors. Attributes are the characteristics of the class that help to distinguish it from other classes. Behaviors are the tasks that an object performsDataproc Persistent History Server
Delegation is one of the core concepts of management leadership. The process involves managers deciding which work they should do themselves and which work should be delegated to others for completion.Delegation (computing)
Pointer (computer programming)
Hooking
What is a behavior class?Method (computer programming)
The behavior of an object is defined by its methods, which are the functions and subroutines defined within the object class. Without class methods, a class would simply be a structure. Methods determine what type of functionality a class has, how it modifies its data, and its overall behavior.Call an object method
__call__ in Python
Python Classes
Social class
Why are strings in Python immutable?
In Python, strings are made immutable so that programmers cannot alter the contents of the object (even by mistake). This avoids unnecessary bugs. Some other immutable objects are integer, float, tuple, and bool.Explaining One Of The Most Fundamental Concepts Of Python Programming Language
While loop
Python While Loop
For loop
Python For loops
Offshore bank
Conditional loop
loops in python
Python range() function
More Control Flow Tools
Memory Diagram Example
Jakarta Persistence
(Java) Using Objects
Calling an object's method is similar to getting an object's variable. To call an object's method, simply append the method name to an object reference with an intervening '. ' (period), and provide any arguments to the method within enclosing parentheses.- Open the command prompt. Follow the menu path Start > Programs > Accessories > Command Prompt.
- Type: java -version and press Enter on your keyboard. Result: A message similar to the following indicates that Java is installed and you are ready to use MITSIS via the Java Runtime Environment.
Java is supported on Windows, OS X and Linux. It is not supported in iOS or Chrome OS. Java is very much involved in Android, but not in a way that is visible to end users.
White's law
White's law, named after Leslie White and published in 1943, states that, other factors remaining constant, "culture evolves as the amount of energy harnessed per capita per year is increased, or as the efficiency of the instrumental means of putting the energy to work is increased".[1]
How Broadway got the nickname ‘The Great White Way’ in 1880
Massive open online course
Celery (software)
Celery - Distributed Task Queue
Sets of tasks, Subtasks and Callbacks
Built-in Functions
Parsing arguments and building values
Passing function as an argument in Python
What are mandatory, optional, args, kwargs parameters and positional, keyword arguments
Pipes and Filters
Pipes and Filters in Linux/Unix
SciPy Defining functions
Using python to transform and filter data in bash pipes
Degeneration (algebraic geometry)
Degeneracy (graph theory)
Python Module Index
Graph coloring
Degenerate energy levels
Mutations Are the Raw Materials of Evolution
Adaptation (film)
Seven stages (Yogi) and Navaragamalika with Nitya Shukla Paksha, Dashami, and Dosha of Wuxing (Chinese philosophy)
ctypes
— A foreign function library for Python
Passing By Pointer Vs Passing By Reference in C++
Shallow Copy and Deep Copy in C++
copy
— Shallow and deep copy operations
Create a directory in Python
Get directory of current Python script
Python Scope of Variables
Global and Local Variables in Python
Common Python Data Structures (Guide)
9. Classes
glob
— Unix style pathname pattern expansion
Standard input, output, and error
fcntl
— The fcntl
and ioctl
system calls
Reading data from UNIX pipes
File and Directory Access
Biopython: Python tools for computation biology
Conda
The Python Standard Library
String Slicing in Python
Indexing and Slicing
string
— Common string operations
Python String Concatenation
Libraries in Python
PostgreSQL to Snowflake ETL – Steps to Migrate Data
Everyday Data Engineering: Data Replication to Snowflake with Python
Learn how to store high volume of data, from Python nested lists to a Snowflake database, that you can query with SQL
Tag cloud
Built-in Types
Python List Slicing
Python | Extract words from given string
Python String find() method
re
— Regular expression operations
Python String format() Method
Vectors
Python Tuples
Running Spark on Kubernetes
Apache Spark on Kubernetes
Cloud-Native Spark: The Easy Way
Bash Reference Manual
Advanced Bash-Scripting Guide:I/O Redirection
Index
Command-line interface (CLI)
argparse
— Parser for command-line options, arguments and sub-commands
Input Output Redirection in Linux
Cat Command
Standard Input and Output Streams
White noise
Brownian motion with Python
append() and extend() in Python
Ways to Iterate Through List in Python
Python Lists
Best ways to run Spark jobs on Kubernetes for development, data exploration and in production
Command line and environment
zip() in Python
pcp-python(1) — Linux manual page
SORT command in Linux/Unix with examples
Unix commands
Dataproc on Google Kubernetes Engine
Infrastructure as code
colorednoise
African-American English
Declarative programming
Command-line argument parsing
Dyck language
What is Infrastructure as Code?
Gennady Eremin
Cluster manager
Dyck Words of given length
Dyck language
Fuss–Catalan number
Cluster vs Client: Execution modes for a Spark application
Giving Credit to the Texas Able program: Pricing Revolution
By David Vincent Bell Hirsch
Cluster Mode Overview
clush
Yale Online Tutorials
Linux/Unix and Command Line
Institute of Nuclear Materials Management
Institute of Nuclear Materials Management
- 1120 Rt 73, Suite 200
- Mount Laurel, NJ 08054
- Tel: 856.380.6813
- Fax: 856.439.0525
White's Law addresses ethics and Morals with a Great Filter of World energy supply and consumption
Submitting Applications
Nuclear material
Abstract
A text useful at the undergraduate and graduate levels with most coverage given to primary components and main materials of nuclear reactors or generators. Special topics in the last three chapters will be of special interest to those involved in research and development. Safety and health are mentioned. Contents, abridged: Nuclear energy and materials. Fundamental radiation effects on materials. Plutonium. Moderator, reflector, blanket, and coolant materials. Control, shielding, and safety system materials. Reactor materials in nuclear fuel cycles, fuel enrichment, and reprocessing. Radioisotopic power generation and nuclear fusion reactor materials.
ClusterShell
Scalable Python Framework
The Cluster and Basic UNIX Commands
Microsoft Windows Failover cluster resource dependencies in SQL Server
Mutable vs Immutable Objects in Python
Molten salt reactor (MSR)
Thorium fuel cycle
Generation IV reactor (GenIV)
Installing Python Modules (Legacy version)
grp
— The group database
MNE software for processing MEG and EEG data
Overview of the MNE tools suite
PaSh: Light-touch Data-Parallel Shell Processing
Pick the right one for you
Pipeline (Unix)
Immutability in Python is *really* hard
Piping in Unix or Linux
Setup modern CI/CD for Azure Functions using .NET6 & GitHub Actions
pipes
— Interface to shell pipelines
Continuous delivery by using GitHub Action
The CI / CD pipeline of Github Action for serverless lambda function containerization deployment.
Subprocesses
Continuous delivery with Azure Pipelines
Working with actions in CodePipeline
Modernizing web application development and deployment
CI/CD Pipeline for OpenWhisk Functions Using Whisk Deploy
Python Streams vs Unix Pipes
Enter the Pyed Piper
The pyed piper, or pyp, is a python-centric command line text manipulation tool. It allows you to format, replace, augment and otherwise mangle text using standard python syntax with a few golden-oldie tricks from unix commands of the past. You can pipe data into pyp just like any other unix command line tool.
After it's in, you can use the standard repertoire of python string and list methods to modify the text.
unix-pipes
A quick overview of GitLab CI
Infrastructure Department Performance Indicators
Infrastructure performance management: The final piece of the puzzle
18 KPIs To Measure Performance (& How To Choose & Track Them)
Learn to connect data streams from one utility to another using STDIO.
stdio.h — Standard input and output
Cat command in Linux with examples
Invoke an AWS Lambda function in a pipeline in CodePipeline
Python Numpy Tutorial (with Jupyter and Colab)
Mutable vs Immutable Objects in Python
Prometheus Cluster Monitoring
Valid Python dictionary keys
The US Military and Oil
The US military uses more oil than any other institution in the world—but it’s also a leader in clean vehicle technology.
Published Jun 1, 2014
US military consumes more hydrocarbons than most countries -- massive hidden impact on climate
The US military's carbon footprint is enormous and must be confronted in order to have a substantial effect on battling global warminOil Dependence and U.S. Foreign Policy
Oil, gas, and corporate social technologies in the remaking
of a Russian region
Yale University
Senator Markey Announces Legislation to Stop Russian Oil Imports
Sen. Markey Urges Support for People of Ukraine, Calls For Ban on Russian Oil
Sen. Ed Markey had introduced legislation earlier this week designed to stop the import of Russian oil into the U.S.
Texas oil and gas pulled in nearly $16 billion in taxes and royalties last year as the industry recovers from pandemic downturn
The
Texas Oil and Gas Association’s annual energy and economic impact
report says both taxes and royalties paid to the state went up by more
than 20% over the previous fiscal year.
An oligopsony is a market form in which the number of buyers is small while the number of sellers in theory could be large. This typically happens in a market for inputs where numerous suppliers are competing to sell their product to a small number of buyers.
In the oil and gas industry, the Organization of the Petroleum Exporting Countries (OPEC) is often used as an example of a cartel. Although there is debate around whether the economic evidence demonstrates it is a true cartel, OPEC's member countries do exert market influence
Hemp as an Agricultural Commodity
Renée JohnsonSpecialist in Agricultural PolicyJune 22, 2018Apparatchik
See also
Roman Patronage in Society, Politics, and Military
Patronage in ancient Rome
Jewish–Roman wars
US Hemp Bank Treasury Notes are savings for our Department of Agriculture, Department of Energy, and EPA
America’s Last Machine Boss Goes Down
US, Russia warships dock in strategic Sudan port
New video shows US forces getting hammered by a barrage of Iranian missiles after Trump had a top general killedHowell (2003) sees narcissism as a type of dissociative disorder that is created by an experience of trauma that leads to a "closed system" being created by the ego as a defense mechanism heightening the importance of empathy and inter-subjectivity.
Do narcissists suffer from cognitive dissonance?
One of the key methods of emotional abuse employed by people with narcissistic tendencies is the generalized concept called cognitive dissonance. What this abuse tactic does is create in the target a sense of unreality, confusion, and a mind-set of not trusting their own perception of the situation
Docbot Careers
As a matter of basic economics, fewer doctors means less care and more expensive services.
Open Medical Record System
GNU Health
List of open-source health software
Precision medicine (PM)
This is a copy of the 18F open source policy.
Open Source
The People's Code
Review NIH's Hyperlink Policy for Grant Applications
Double check the FOAs and NIH guidance to make sure your hyperlinks respect the boundaries set by NIH grant rules and general principles to ensure that your application gets accepted for review.
A scalable, secure, and interoperable platform for deep data-driven health management
Why Apply?
NIA’s SBIR and STTR programs offer non-dilutive, no-strings-attached funding up
to $2.5 million (depending on funding opportunity) to commercialize
products addressing aging and aging-related diseases and conditions.
Small businesses and research organizations retain intellectual property
rights for their innovations, NIH’s rigorous peer-review process lends
validation and visibility to early-stage companies, and the prestige
associated with these awards can help attract more funding from other
partners and investors.
Proximity to Texas oil refineries increases cancer risk, study finds
Hyun Jung Kim
Assistant Professor of Biomedical Engineering and Oncology
Gene Therapy for Cancer Treatment: Past, Present and Future
Telomere shortening rate predicts species life span
Python dictionary of tuples
/ prometheus-operator
Morris W. Hirsch
Daniel Hirsch
Jeffrey M. Hirsch
Geneva Yeargan Rand Distinguished Professor of Law
Dr. Robert L. Hirsch is a Senior Energy Advisor at MISI and a consultant in energy, technology, and management.
A Farnsworth–Hirsch fusor is the most common type of fusor. The typical Farnsworth-Hirsch fusor has two concentric electrical grids inside a vacuum chamber.
You Are Not Your Depression
6 Signs That Your Pet Is Lonely (And What You Can Do About It)
The best dog anxiety medication | ||
---|---|---|
Benadryl (diphenhydramine) | OTC | Antihistamine |
Prozac (fluoxetine) | Rx | Antidepressant selective serotonin reuptake inhibitor (SSRI) |
Trazodone | Rx | Antidepressant selective serotonin reuptake inhibitors (SSRI) |
Xanax (alprazolam) | Rx | Benzodiazepine GABA receptor agonist |
The Vanguard Group
Harry Hipster Gibson - Who Put The Benzedrine In Mrs. Murphys Ovaltine (1944)
Ritalin at 75: what does the future hold?
Bradley’s Benzedrine Studies on Children with Behavioral Disorders
The first benzodiazepine, chlordiazepoxide (Librium), was discovered accidentally by Leo Sternbach in 1955 and was made available in 1960 by Hoffmann–La Roche, which soon followed with diazepam (Valium) in 1963.[1]Diazepam (Valium)
The history of benzodiazepines
Benzodiazepines and Opioids
Pyrrolobenzodiazepine
Blacking Out From Benzodiazepines
For Frog Texas under a BlackRock sake!How a Company Called BlackRock Shapes Your News, Your Life, Our Future
BlackRock and the Vanguard Group, the two largest asset management firms in the world, combined own The New York Times and other legacy media, along with Big Pharma.
Why Do Women Act Catty?
The unhealthy way women act on healthy feelings of competition
Definition of catty
(Entry 1 of 2)
- a thief who enters a building by climbing to an upper story.
President James Garfield
Of all the President's bad Monday's, Garfield takes some kind of cake.Bob Newhart-Stop It
Mental Health And Homelessness: Evidence Of Failed Policy?
PUBLISHED:Winter 1989Competency, Deinstitutionalization, and Homelessness: A Story of Marginalization
Michael L. Perlin
New York Law School,
Data for Change, Notes from Industry
Obtaining interpretable predictions of clients at risk of chronic homelessness 6 months in the future
Blake VanBerlo is a data scientist who supports the Municipal AI Applications Lab at the City of London, Canada. The lab operates out of the Information Technology Services Division. Blake posts about our open source AI projects. See “Contact” section below for other key City stakeholder contacts.
Homelessness team data wrangling meeting
- Wednesday, January 4, 2017
Criminal Behavior
By Elaine Cassel, Douglas A. BernsteinErdős number
COMMITMENT AND SELF-CONTROL IN A PRISONER'S DILEMMA GAME
Revenue may be generated by flipping properties in this enterprise as to house the homeless... just a
Moment (mathematics)
Prisoner’s dilemma shows exploitation is a basic property of human society
A new analysis of the famous game-theory puzzle finds that even when the players seem equal, one can learn to profit at the other’s expense—and the victim will cooperate.
Prisoner’s Dilemma
A Judge Asked Harvard to Find Out Why So Many Black People Were In Prison. They Could Only Find 1 Answer: Systemic Racism
Game Theory, the Nash Equilibrium, and the Prisoner’s Dilemma
Douglas E. Hill8
Prisoner's dilemma
In-group and out-group
Three quarks for Muster Mark!
The passage that Gelll-Mann refers to from Joyce's Finnegans Wake (Book 2, Episode 4, Page 383) is the following:Three quarks for Muster Mark!
Sure he hasn't got much of a bark
And sure any he has it's all beside the mark.
But O, Wreneagle Almighty, wouldn't un be a sky of a lark
To see that old buzzard whooping about for uns shirt in the dark
And he hunting round for uns speckled trousers around by Palmerstown Park?
Hohohoho, moulty Mark!
You're the rummest old rooster ever flopped out of a Noah's ark
And you think you're cock of the wark.
Fowls, up! Tristy's the spry young spark
That'll tread her and wed her and bed her and red her
Without ever winking the tail of a feather
And that's how that chap's going to make his money and mark!
Data Structures
Streaming algorithm
HHS
is the largest grant-making agency in the US. Most HHS grants are
provided directly to states, territories, tribes, and educational and
community organizations, then given to people and organizations who are
eligible to receive funding.
Prometheus Operator
The Prometheus Operator manages Prometheus clusters atop Kubernetes.
Institute of Nuclear Materials Management - Purdue Chapter
Ignatius of Loyola
JAR (file format)
Amygdala Hijack and the Fight or Flight Response
Creating non persistent GKE cluster to run Spark Code
grep(1) — Linux manual page
GNU Grep
John of God
Patronage | Booksellers, hospitals, nurses, the mentally ill and the dying |
---|
Pan (god)
In ancient Greek religion and mythology, Pan (/pæn/;[1] Ancient Greek: Πάν, romanized: Pán) is the god of the wild, shepherds and flocks, nature of mountain wilds, rustic music and impromptus, and companion of the nymphs.[2] He has the hindquarters, legs, and horns of a goat, in the same manner as a faun or satyr. With his homeland in rustic Arcadia, he is also recognized as the god of fields, groves, wooded glens and often affiliated with sex; because of this, Pan is connected to fertility and the season of spring.[citation needed] The word panic ultimately derives from the god's name.
In Roman religion and myth, Pan's counterpart was Faunus, a nature god who was the father of Bona Dea, sometimes identified as Fauna; he was also closely associated with Sylvanus, due to their similar relationships with woodlands. In the 18th and 19th centuries, Pan became a significant figure in the Romantic movement of western Europe and also in the 20th-century Neopagan movement.[3]
Dataproc FAQ
What induces a panic attack?apache/spark
I Dream of Jeannie
Look around you and name three things you see. Then, name three sounds you hear. Finally, move three parts of your body — your ankle, fingers, or arm.
bitnami/spark
Dymphna
Patronage | runaways, mental disorders, neurological disorders, victims of incest, victims of sexual assault, depression, anxiety, sleep disorders |
---|
Python 3.10.2 documentation
A Stoic’s Key to Peace of Mind: Seneca on the Antidote to Anxiety
“There are more things … likely to frighten us than there are to crush us; we suffer more often in imagination than in reality"
Image Segmentation with K-means on Apache Spark and Scala
Get started and do your work with all the common data sources supported by Spark.
The Size and Quality of a Data Set
Material transfer agreement
A Material transfer agreement (MTA) is a contract that governs the transfer of tangible research materials between two organizations when the recipient intends to use it for his or her own research purposes. The MTA defines the rights of the provider and the rights and obligations of the recipient with respect to the materials and any progeny, derivatives, or modifications. Biological materials, such as reagents, cell lines, plasmids, and vectors, are the most frequently transferred materials, but MTAs may also be used for other types of materials, such as chemical compounds, mouse models, and even some types of software.The Gannett Mockingbird Elder Sledgehammer and the Wall
City of the Violet Crown is a term for at least two cities:
- In one of his surviving fragments (fragment 64), the lyric poet Pindar wrote[1] of Athens:
City of light, with thy violet crown, beloved of the poets, thou art the bulwark of Greece.
- The climate of Attica is characterised by low humidity and a high percentage of dust in the air, which make sunsets display hues of violet and purple and the surrounding mountains often appear immersed in a purple haze.
- In Geoffrey Trease's novel The Crown of Violet, the name is explained as referring to the mauve-tinted marble of the Acropolis hill.
- According to the City of Austin's History Center, the phrase first appeared in The Austin Daily Statesman (Now the Austin American Statesman) on May 5th, 1890.[2]
- It was long believed to have originated in O. Henry's story "Tictocq: The Great French Detective, In Austin", published in his collection of short stories The Rolling Stone published October 27, 1894.
- In chapter 2 of Tictocq, O. Henry writes:
The drawing-rooms of one of the most magnificent private residences in Austin are ablaze of lights. Carriages line the streets in front, and from gate to doorway is spread a velvet carpet, on which the delicate feet of the guests may tread. The occasion is the entrée into society of one of the fairest buds in the City of the Violet Crown.
- The phrase is generally thought to refer to the atmospheric phenomenon more commonly known as the Belt of Venus. The phrase is also said to be connected to the moonlight towers of Austin.[3]
- Another explanation: during the 19th century, residents began to
call Austin the "Athens of the South" for its university. With his sly
reference to the poetry of Pindar, O. Henry may have been satirizing
Austin's ambitious claim of a cultural link to ancient Athens.[4]
Ghost Fleet Overlord Unmanned Surface Vessel Program Completes Second Autonomous Transit to the Pacific
June 7, 2021
XONSH is a Python-powered shell
Xonsh is a Python-powered, cross-platform, Unix-gazing shell language and command prompt. The language is a superset of Python 3.6+ with additional shell primitives that you are used to from Bash and IPython. It works on all major systems including Linux, OSX, and Windows. Xonsh is meant for the daily use of experts and novices.
IBM AIX
7 of the Most Popular DevOps Certifications in 2021
Chaining Commands in Linux
Advancing Sustainable Solutions
Coast Guard cutter and RDC join forces to complete annual Arctic Technology Evaluation
UNITED STATES COAST GUARDStephens' constant
Schubert calculus
Prime knot
An Introduction to Ayyam-i-Ha
How ‘Big’ should be your Data?
“Lord Ram gave Hanuman a quizzical look and said,
"What are you, a monkey or a man?" Hanuman bowed his head reverently,
folded his hands and said, "When I do not know who I am, I serve You and
when I do know who I am, You and I are One.” - Tulsidas
Vertex AI Workbench
List of mathematical constants
Stefan–Boltzmann constant
PHYSCI 11. Foundations and Frontiers of Modern Chemistry: A Molecular and Global Perspective.
Professor: James G. Anderson, Gregory TucciHow to deploy a simple Spark ML pipeline using Vertex AI Pipelines
socketserver
— A framework for network servers
Google finally did it and now the dream came true: we are now able to run serverless Kubeflow pipelines from the former AI Platform
Why load everything into a spreadsheet when the terminal can be faster, more powerful, and more easily scriptable?
Create a cluster
Ius
The Austin Forum on Technology & Society
Using generators to create data processing pipelines in Python
Cloud Dataproc API
ACID support
ACID
Distributed transactions
Standard streams
Taking input from console in Python
Woman of the Apocalypse
The Bahá'í Faith
Bhikshatana
Angered by Brahma's vanity, Shiva—as the terrifying Bhairava—cut off one head of the five-headed Brahma with a mere flick of his fingernailPython | Execute and parse Linux commands
IPython and Shell Commands
Input and Output
IDLE
Apache Iceberg
Revelation 12:7-17
Command Line Interfacing
The petabyte architecture you cannot afford to miss! IPython and Shell Commands
Sons of God
Delta Lake guide
Bhairava
Ashta Bhairava
Shatarupa
Guardians of the directions
Eightfold way (physics)
Accessing a Table
R
Package ‘data.table’
Data types and transformations for tabular data
JSON file
Ingest JSON data with Auto Loader
Vagus nerve
Microbiome
Magnetocardiography
PythonEditors
editor.py
Sed Command in Linux/Unix with examples
A Thorough Comparison of Delta Lake, Iceberg and Hudi
Performance comparison: counting words in Python, Go, C++, C, AWK, Forth, and Rust
Battle of Bunker Hill
PySpark Documentation
wc command in Linux with examples
grep command in Unix/Linux
The Relationship between Retinal Microvascular Abnormalities and Coronary Heart Disease: A Review
Delta Lake quickstart
Is Broken Heart Syndrome Real?
Finally, a command
line shell for the 90s
fish is a smart and user-friendly command line
shell for Linux, macOS, and the rest of the family.
Shankha
A Shankha (conch shell) has
religious ritual importance in Hinduism. It is the shell of any suitable
sea snail which had a hole made for the performer's embouchure. In
Hindu history, the shankha is a sacred emblem of The Hindu preserver god Vishnu.
Matsya
Matsya (Sanskrit: मत्स्य, lit. fish) is the fish avatar of the Hindu god Vishnu. Often described as the first of Vishnu's ten primary avatars, Matsya is described to have rescued the first man Manu from a great deluge.
Noah's Ark
Gilgamesh flood myth
Apache Hudi Spark Guide
Hrishikesha, Hṛṣīkeśa, Hrishika-isha: 18 definitions
Create Delta Table from JSON File in Databricks
What can your eyes tell you about heart disease?
Business intelligence analyst vs. data analyst: A comparison
BI analysts and data analysts provide specific benefits for organizations looking to improve how they interpret and use data. Review these unique roles and their responsibilities.
Metadata
Metamaterial
A nanopore is a pore of nanometer size. It may, for example, be created by a pore-forming protein or as a hole in synthetic materials such as silicon or graphene.
When a nanopore is present in an electrically insulating membrane, it can be used as a single-molecule detector. It can be a biological protein channel in a high electrical resistance lipid bilayer, a pore in a solid-state membrane or a hybrid of these – a protein channel set in a synthetic membrane. The detection principle is based on monitoring the ionic current passing through the nanopore as a voltage is applied across the membrane. When the nanopore is of molecular dimensions, passage of molecules (e.g., DNA) cause interruptions of the "open" current level, leading to a "translocation event" signal. The passage of RNA or single-stranded DNA molecules through the membrane-embedded alpha-hemolysin channel (1.5 nm diameter), for example, causes a ~90% blockage of the current (measured at 1 M KCl solution).[1]
It may be considered a Coulter counter for much smaller particles.
The Federal Data Strategy Development Team is comprised of a core group of cross-disciplinary data experts from across the Federal Government.
The Leveraging Data as a Strategic Asset Cross Agency Priority (CAP) Goal commits the Administration to developing a long-term comprehensive Federal Data Strategy. Senior officials from the Department of Commerce, the Small Business Administration, the Office of Management and Budget, and the Office of Science and Technology Policy co-lead the CAP Goal. The Federal Data Strategy Development Team conducts research and analysis; facilitate stakeholders; and distill feedback for the Federal Data Strategy.
|
Peptide Library Data Analysis
Sesquipower
In mathematics, a sesquipower or Zimin word is a string over an alphabet with identical prefix and suffix. Sesquipowers are unavoidable patterns, in the sense that all sufficiently long strings contain one.
Deep Local Volatility∗
Marc Chataigner1,† ; Stéphane Crépey1,‡ ; Matthew Dixon
ABACABA pattern
Learning to rank or machine-learned ranking (MLR)
Content-based image retrieval
Using R for proteomics data analysis
Laurent Gatto, Lisa Breckels, Vlad Petyuk, Thomas Lin Pedersen and Sebastian Gibb
21 August 2021
Hessian affine region detector
The Hessian affine region detector is a feature detector used in the fields of computer vision and image analysis. Like other feature detectors, the Hessian affine detector is typically used as a preprocessing step to algorithms that rely on identifiable, characteristic interest points.
The Hessian affine detector is part of the subclass of feature detectors known as affine-invariant detectors: Harris affine region detector, Hessian affine regions, maximally stable extremal regions, Kadir–Brady saliency detector, edge-based regions (EBR) and intensity-extrema-based (IBR) regions.
Proteomics
Harris affine region detector
Vision chip
Implement a content-based image retrieval using Tensorflow and Numpy.
Differentiable programming
Query by Example
Contrast invariant image analysis and PDE’s
Fr ́ed ́eric Guichard Jean-Michel Morel Robert Ryan
Neuromorphic engineering
Texas Syndromic Surveillance (TxS2)
Texas Syndromic Surveillance (TxS2) is the statewide syndromic surveillance system hosted by the Texas Department of State Health Services (DSHS) for use by Local Health Departments (LHDs), DSHS Public Health Regions (PHRs, see map of DSHS PHRs at http://www.dshs.texas.gov/Scheduling is the action of assigning resources to perform tasks. The resources may be processors, network links or expansion cards. The tasks may be threads, processes or data flows.
Samsung Reportedly Close to Finalizing Its $17 Billion Chip Plant in Texas in an Effort to Catch up to TSMC
From paints to plastics, a chemical shortage ignites prices
Professor who called Dow 20,000 says he’s nervous about trends in inflation that could spark a stock-market correction
Why Is Everyone Talking About a Global Power Shortage?
Business intelligence metadata
Amazon Redshift
Using enhanced dataset metadata
Matthew 7:5
Control of senses
Yamas
3 “Why do you look at the speck of sawdust in your brother’s eye and pay no attention to the plank in your own eye? 4 How can you say to your brother, ‘Let me take the speck out of your eye,’ when all the time there is a plank in your own eye? 5 You hypocrite, first take the plank out of your own eye, and then you will see clearly to remove the speck from your brother’s eye.
people who live in glass houses shouldn't throw stones
Russian traditions and superstitions
Petabyte-scale Analytics with Power BI and Azure
The Heart-Brain Connection: The Neuroscience of Social, Emotional, and Academic Learning
"behavioral interventions can produce more specific brain changes than biological intervention as a medication"
Papez circuit
Prefrontal cortex
Dorsolateral prefrontal cortex
Frontal Structural Neural Correlates of Working Memory Performance in Older Adults
BigQuery : Petabyte Scale Data warehouse In GCP
11 Natural Ways to Lower Your Cortisol Levels
Negative emotion modulates prefrontal cortex activity during a working memory task: a NIRS study
affective chronometry
grep — Search a file for a specified pattern
memory
Scientists Watch a Memory Form in a Living Brain
Dialectical behavior therapy(DBT)
Cognitive-cultural economy
Cognitive behavioral therapy(CBT)
Critical thinking
What is working memory?
Short-term memory
Researchers uncover how the human brain separates, stores, and retrieves memories
What is The BRAIN Initiative®?
The Brain Research Through Advancing Innovative Neurotechnologies® (BRAIN) Initiative is aimed at revolutionizing our understanding of the human brain. By accelerating the development and application of innovative technologies, researchers will be able to produce a revolutionary new dynamic picture of the brain that, for the first time, shows how individual cells and complex neural circuits interact in both time and space
Boundary cell
Dirichlet boundary condition
Cellular neural network
Finite element method
The finite element method (FEM) is a popular method for numerically solving differential equations arising in engineering and mathematical modeling. Typical problem areas of interest include the traditional fields of structural analysis, heat transfer, fluid flow, mass transport, and electromagnetic potential.
The FEM is a general numerical method for solving partial differential equations in two or three space variables (i.e., some boundary value problems). To solve a problem, the FEM subdivides a large system into smaller, simpler parts that are called finite elements. This is achieved by a particular space discretization in the space dimensions, which is implemented by the construction of a mesh of the object: the numerical domain for the solution, which has a finite number of points. The finite element method formulation of a boundary value problem finally results in a system of algebraic equations. The method approximates the unknown function over the domain.[1] The simple equations that model these finite elements are then assembled into a larger system of equations that models the entire problem. The FEM then approximates a solution by minimizing an associated error function via the calculus of variations.
BitTorrent
ZeroNet
ZeroNet
Open, free and uncensorable websites,
using Bitcoin cryptography and BitTorrent network
Net-Zero
The Climate Program leads City efforts to address the challenges of climate change for Austin.Zero Waste Case Study: Austin
Karpman Drama Triangle
Pourquoi story
Google Play Developer API
EVOLUTION OF BEHAVIOR
Writing WebSocket client applications
Internet protocol suite
The Internet protocol suite, commonly known as TCP/IP, is the set of communications protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).Dapper ORM
Hibernate (framework)
Magento
PHP-Nuke
concrete5
io
— Core tools for working with streams
Attention (machine learning)
Neuroplasticity
Pipes
Computer memory
Cognitive computing
python-pipes
Ten Unmistakable Signs Of A Toxic Culture
Fatal Occupational Injuries in Texas
The Texas Cancer Belt
Houston Health Department
Fifth Ward/Kashmere Gardens Union Pacific Railroad Site Contamination and Area Cancer Cluster
Unlearning Toxic Masculinity
Toxic Femininity
Is acting as fragile and frivolous internalized misogyny?
Toxic behavior as traits include unsupportive, manipulative, judgemental, controlling, self centered behavior and trigger feelings of worthlessness, depression, anxiety and unhappiness.
7 Types of Toxic People and How to Spot Them
Kleshas (Hinduism)
Learned helplessness
Chaos, Cancer, the Cellular Operating System and the Prediction of Survival in Head and Neck Cancer
United States federal executive departments
What is the behavioral learning theory?
Your first baby step to learn Deep Learning for Image Classification
NOAA Grants
Assessing the Aquatic Life Use
A simple technique to mitigate microplastic pollution and its mobility (via ballast water) in the global ocean
Cancer cluster
Picard horn
Diagnosis of lung cancer by canine olfactory detection in urine and breath samples.
Dogs Are Teaching Machines to Sniff Out Cancer
In a proof-of-concept study, researchers used dogs’ diagnoses of prostate cancer to inform a machine learning algorithm with the goal of one day detecting cancers with canine-level accuracy.
Python code for octonion and sedenion multiplication
Molecular geometry
Leslie Miller-Robbie1,2, Anu Ramaswami1,3 and Priyanie Amerasinghe4
Cancer clusters in the USA: What do the last twenty years of state and federal investigations tell us?
Great Pacific Garbage Patch
The Great Pacific Garbage Patch is a collection of marine debris in the North Pacific Ocean. Marine debris is litter that ends up in the ocean, seas, and other large bodies of water.
Decision trees: leaf-wise (best-first) and level-wise tree traverse
What is a cancer cluster?
Python | os.getpid() method
ps command in Linux with Examples
gnuplot homepage
What is gnuplot used for?Prefrontal-Hippocampal Interactions in Memory and Emotion
Emotion AI, explained
Radiofrequency ablation
Radiofrequency ablation (RFA), also called fulguration,[1] is a medical procedure in which part of the electrical conduction system of the heart, tumor or other dysfunctional tissue is ablated using the heat generated from medium frequency alternating current (in the range of 350–500 kHz).[2] RFA is generally conducted in the outpatient setting, using either local anesthetics or conscious sedation anesthesia. When it is delivered via catheter, it is called radiofrequency catheter ablation.
Two important advantages of radio frequency current (over previously used low frequency AC or pulses of DC) are that it does not directly stimulate nerves or heart muscle and therefore can often be used without the need for general anesthesia, and that it is very specific for treating the desired tissue without significant collateral damage.
Limbic System: AmygdalaAnthony Wright, Ph.D., Department of Neurobiology and Anatomy, McGovern Medical School
PySerial
What is Python serial library?Welcome to PySerial’s documentation
This module encapsulates the access for the serial port. It provides backends for Python running on Windows, OSX, Linux, BSD (possibly any POSIX compliant system) and IronPython. The module named “serial” automatically selects the appropriate backend.
Tools
serial.tools.list_ports
Visual perception
Early studies
Ganglia
A ganglion is a fluid-filled structure that connects to a joint or tendon sheath through a one-way tract from the joint into the mass.3 Unlike a synovial hernia, the mass lacks a synovial lining and often is filled with mucin.
Optic disc
Optical fiber
Tensor Flow
Image classification
From creating datasets to testing your program accuracy
Emission theory (vision)
Ganglion cell
Optic nerve
Optical Biosensors for Label-Free Detection of Small Molecules
Optical biosensors
Surface plasmon resonance
Amygdala
Warning, warning... The amygdala has a central role in anxiety responses to stressful and arousing situations. Pharmacological and lesion studies of the basolateral, central, and medial subdivisions of the amygdala have shown that their activation induces anxiogenic effects, while their inactivation produces anxiolytic effects.Amygdala hijack
Bhagavad Gita: Chapter 2, Verse 47
Actions do not cling to me because I am not attached to their results. Those who understand this and practise it live in freedom.Screener may refer to:
- Screener (promotional), an advance copy of a film or television episode
- Screener (website), an American movie and television listing website
- A person who engages in any kind of screening
Best Stock Screeners
When you need to find the perfect stock for your investment strategy
American Broadcasting-Paramount Theatres
Persian Bayán
March equinox
Dowry Deaths in India: A Harrowing Reality
How to support a struggling friend
Sometimes it’s hard to know what to say or do. Use these five strategies for providing effective emotional support
Statistics review 7: Correlation and regression
U.S. Debt and Foreign Loans, 1775–1795
What Is a War Chest?
The Plight of the Invisibly Ill
Chronic diseases perplex doctors, while leaving patients mysteriously sick. Meghan O’Rourke explores the struggle in an excerpt from her new book, The Invisible Kingdom.
Retiring members of Congress have $50 million in their campaign coffers. Where will it go?
The Merchant of Venice
Toilet psychology
"Gold Buggery"
Shame
Shame
By James M. Shultz, M.D., Jungian analyst (IRSJA--Austin, Texas)
And yet by a throne set in heaven is signified the Divine truth there, thus heaven as to Divine truth; and by Him that sat upon the throne is meant the Lord.
Singin' in the Bathtub
Director, Center for Texas Music History
Assistant Professor of Practice
Department of History
Texas State University
Thanks Mom, for instrumental orchestration legacy composition sake...
The ancient history of adding insult to injury
Hailing Acoustic Laser & Light Tactical System (HALLTS)
Helicopter Interdiction Tactical Squadron
Research & Development Center
BIENNIAL REPORT 2017-2018
First-Time CubeSat Developers
Jonathan (High Priest)
Battle of Adasa
Alcimus
Shadow Wolves
Bureau of Indian Affairs
Careers
The Bureau of Indian Affairs (BIA), Office of Justice Services (OJS), provides police, investigative, corrections, technical assistance, and court services across this broad expanse of Indian Country.How machine learning can be a force multiplier for public safety
Machine learning can offer an extra pair of hands to do a repetitive task, or provide an extra pair of eyes and ears
12 Innovative Police Technologies
Erik Fritsvold, PhD
Controlling Our Airspace in the Age of Drones
S&T ARTIFICIAL
INTELLIGENCE &
MACHINE LEARNING
STRATEGIC PLAN
Intergovernmental organization (IGO)
Interoperability
covet
verb4You cover up your ignorance with lies;
you are like doctors who can't heal anyone.
5 Say nothing, and someone may think you are wise!
6 Listen while I state my case.
Sophist
Austin resident philosopher David Hirsch DBA Serenity Sells SBIR Blackrock as the rock Texans have been living under for Texas Independence Day 2022 open Maslenitsa forum with democratic representativesMaccabean Revolt
CU Boulder CubeSats
History of navigation
Automatic identification system(AIS)
Feller's coin-tossing constants
Chaotic behavior exists in many natural systems, including fluid flow, heartbeat irregularities, weather and climate. It also occurs spontaneously in some systems with artificial components, such as the stock market and road traffic.Chaos theory
Quantized Columns
How We Can Make Sense of Chaos
Smith–Volterra–Cantor set
Feigenbaum constants
Visual Studio Container Tools for Docker
DADS - Department of Aging Disability Services
701 W 51st St, Austin, TX 78751
Use containers to Build, Share and Run your applications
Greek letters used in mathematics, science, and engineering
Writing a Resilient and Scalable RESTful API in Go
This article covers the topic of creating a scalable and configurable REST API, served with the help of express. The code is written in TypeScript. The API is database-agnostic, but in the final example, I will use MongoDB.
Real-time messaging for web applications using WebSockets and the publish-subscribe pattern
Notebook interface
Data science
Technologies and techniques
Using Python on Unix platforms
How easy it is to write efficient code?
R, Python & Julia in Data Science: A comparison
Apache
NumPy Integration
Julia motivation: why weren’t Numpy, Scipy, Numba, good enough?
Mean, Median, Mode and Range
Stream processing
Domain knowledge
At the Domain in Austin?Domain knowledge
See also
Why domain knowledge is important in Data Science
Primitive data type
Dynamic typing
Indentation style
Variable (computer science)
Free variables and bound variables
Using the Python Interpreter
VISUALIZE CODE EXECUTION
Learn Python, Java, C, C++, JavaScript, and Ruby
Information theory
Qubit
Quantum channel
Memory safety
Network packet
Node (computer science)
Python Shell
Stack-based memory allocation
Stack trace
Stack buffer overflow
C dynamic memory allocation
Feature selection
Data Science Education With Domain Knowledge and System Principles
Cluster analysis
k-means clustering
Standard algorithm (naive k-means)
A Gentle Introduction on Market Basket Analysis — Association Rules
Affinity analysis
Graph Analytics
Basic Introduction to what Graph Analytics is…
Data cleansing
Decision tree learning
Estimate of Positive Correctness
Getting Started
Know your species of machine learning task
Google Chart API
About Google chart tools
Timeline
Overview
The Timeline is an interactive javascript visualization chart to visualize data in time.
You could help your dad or neighbor for example with
A step-by-step guide to visualizing the development of COVID-19 vaccines
Creating a Timeline with TimelineJS and JSON
Coat of arms of Mexico
Snake handling in religion
Garuda
Garuda (Sanskrit: गरुड Garuḍa; Pāli: गरुळ Garuḷa), also Galon or Nan Belu in Burmese and Karura in Japanese, is a legendary bird or bird-like creature in Hindu, Buddhist and Jain faith.[1][3][4] He is variously the vehicle mount (vahana) of the Hindu god Vishnu, a dharma-protector and Astasena in Buddhism, and the Yaksha of the Jain Tirthankara Shantinatha.[3][4][5] The Brahminy kite is considered as the contemporary representation of Garuda.Harvey Birdman, Attorney at Law
My sister Carmen game me a book
Book by Max Ernst
The word zoomorphism derives from the Greek ζωον (zōon), meaning "animal", and μορφη (morphē), meaning "shape" or "form". It can mean:
- Art that imagines humans as non-human animals[1]
- Art that portrays one species of animal like another species of animal
- Art that creates patterns using animal imagery, or animal style
- Deities depicted in animal form, such as exist in ancient Egyptian religion[2]
- Therianthropy: the ability to shapeshift into animal form[3]
- Attributing animal forms or animal characteristics to other animals, or things other than an animal; similar to but broader than anthropomorphism
- The tendency of viewing human behaviour in terms of the behaviour of animals, contrary to anthropomorphism, which views animal or non-animal behaviour in human terms
Three pearls of number theory
Icon (computing)
Iconography
Aniconism
Byzantine Iconoclasm
Zoomorphism
Sacred Animals of India
Magico-religious and social belief of tribals of district Udaipur, Rajasthan
Buddhism : Naga, Nagas, Nagi
Nāga
Jackal God Animal Cults
Totem
- Anishinaabe clan system
- Aumakua
- Charge (heraldry)
- Devak, a type of family totem in Maratha culture
- Fylgja
- Huabiao
- Jangseung
- Little Arpad
- Moe anthropomorphism
- Religious symbolism in U.S. sports team names and mascots
- Tamga, an abstract seal or device used by Eurasian nomadic peoples
- Totem and Taboo by Sigmund Freud
Jackal God Animal Cults
Totem
- Anishinaabe clan system
- Aumakua
- Charge (heraldry)
- Devak, a type of family totem in Maratha culture
- Fylgja
- Huabiao
- Jangseung
- Little Arpad
- Moe anthropomorphism
- Religious symbolism in U.S. sports team names and mascots
- Tamga, an abstract seal or device used by Eurasian nomadic peoples
- Totem and Taboo by Sigmund Freud
Chandra
Allah as a lunar deity
Deities in Ancient Egypt - Thoth
Khonsu
Chronos
Soma and Haoma : Ayahuasca analogues from the Late Bronze Age
- July 2019
- Journal of Psychedelic Studies 3(6):1-13
In ancient Egyptian astronomy, Set was commonly associated with the planet Mercury.[6]
Since he is related to the west of Nile which is the desert, he is sometimes associated with a lesser deity, Ha, god of the desert, which is a deity depicted as a man with a desert determinative on his head.
Budha is part of the Navagraha in Hindu zodiac system, considered benevolent, associated with an agile mind and memory.
Budha
Abode | Budhaloka |
---|---|
Planet | Mercury |
Day | Wednesday |
Mount | Yali lion, or chariot hauled by eight horses of deep yellow colour |
Union (set theory)
The Philosophical Significance of the Concept of Probability in Quantum Mechanics
Cat People
Abuwtiyuw
Stratego
Romulus and Remus
Romulus And Remus And The Similarities Between The Story Of Cain And Abel
Dogon people
6TH-CENTURY MANUSCRIPT ADDS TO MYSTERY OF STAR
Four Noble Truths
Buddhist paths to liberation
Pure land
Amitabha's forty-eight vows
Hinduism and Judaism
Orthodox Jewish philosophy
Anarchism and Orthodox Judaism
Sati (Hindu goddess)
Sati (/ˈsʌtiː/, Sanskrit: सती, IAST: Satī), is also known as Dākṣāyaṇī (Sanskrit: दाक्षायणी, lit. daughter of Daksha), is the Hindu goddess of marital felicity and longevity. She was the first wife of Shiva, other being Parvati, who was her reincarnation after her death.
In Hindu legend, both Sati and Parvati, successively play the
role of bringing Shiva away from ascetic isolation into creative
participation with the world.[1] The act of Sati, in which a Hindu widow self-immolates on her husband's pyre
as a final and consummate act of loyalty and devotion, is patterned
after the deed committed by this goddess to uphold the honour of her
husband.[2]
Vairagya
Vairāgya (वैराग्य) is a Sanskrit term used in Hindu as well as Jain philosophy that roughly translates as dispassion, detachment, or renunciation, in particular renunciation from the pains and pleasures in the temporary material world. The Hindu philosophers who advocated vairāgya told their followers that it is a means to achieve moksha.
True vairāgya refers to an internal state of mind rather than to external lifestyle and can be practiced equally well by one engaged in family life and career as it can be by a renunciate. Vairāgya does not mean suppression of or developing repulsion for material objects. By the application of vivek (spiritual discrimination or discernment) to life experience, the aspirant gradually develops a strong attraction for the inner spiritual source of fulfillment and happiness and limited attachments fall away naturally. Balance is maintained between the inner spiritual state and one's external life through the practice of seeing all limited entities as expressions of the one Cosmic Consciousness or Brahman.
Christianity in Ethiopia
Christianity in Ethiopia is the largest religion in the country and dates back to the ancient Kingdom of Aksum, when the King Ezana first adopted the faith. This makes Ethiopia one the first regions in the world to officially adopt Christianity. Various Christian denominations are now followed in the country. Of these, the largest and oldest is the Ethiopian Orthodox Tewahedo Church (in Amharic: የኢትዮጵያ ኦርቶዶክስ ተዋሕዶ ቤተክርስትያን Yäityop'ya ortodoks täwahedo bétäkrestyan) an Oriental Orthodox church centered in Ethiopia. The Orthodox Tewahedo Church was part of the Coptic Orthodox Church until 1959, when it was granted its own patriarch by Coptic Orthodox Pope of Alexandria and Patriarch of All Africa Cyril VI. Ethiopia was the only region of Africa to survive the expansion of Islam as a Christian state.[1]Kwanzaa
Nag Hammadi library
The Gnostic Gospels
Keepers of the Lost Ark?
Christians in Ethiopia have long claimed to have the ark of the covenant. Our reporter investigated
Bezalel
In rabbinical literature
Church of Our Lady Mary of Zion
Remembering the Perez Orchestra
"Perez-Uzzah", literally "Outburst Against Uzzah",[37]
Ark of the Covenant
In the days of King David
In the Biblical narrative, at the beginning of his reign over the United Monarchy, King David removed the Ark from Kirjath-jearim amid great rejoicing. On the way to Zion, Uzzah, one of the drivers of the cart that carried the Ark, put out his hand to steady the Ark, and was struck dead by God for touching it. The place was subsequently named "Perez-Uzzah", literally "Outburst Against Uzzah",[37] as a result. David, in fear, carried the Ark aside into the house of Obed-edom the Gittite, instead of carrying it on to Zion, and it stayed there for three months.[38][39]
On hearing that God had blessed Obed-edom because of the presence of the Ark in his house, David had the Ark brought to Zion by the Levites, while he himself, "girded with a linen ephod ... danced before the Lord with all his might" and in the sight of all the public gathered in Jerusalem, a performance which caused him to be scornfully rebuked by his first wife, Saul's daughter Michal.[40][41][42] In Zion, David put the Ark in the tent he had prepared for it, offered sacrifices, distributed food, and blessed the people and his own household.[43][44][45] David used the tent as a personal place of prayer.[46][47]
The Levites were appointed to minister before the Ark.[48] David's plan of building a temple for the Ark was stopped on the advice of the prophet Nathan.[49][50][51][52] The Ark was with the army during the siege of Rabbah;[53] and when David fled from Jerusalem at the time of Absalom's conspiracy, the Ark was carried along with him until he ordered Zadok the priest to return it to Jerusalem.[54]
ATK-SemiEmpirical
(ATK-SE) can model the electronic properties of molecules,
crystals and devices using both self-consistent and
non-self-consistent tight-binding models. In this chapter the
implemented tight-binding models based on the Slater-Koster model
and the extended Hückel model are presented.
In Solomon's Temple
According to the Biblical narrative, when Abiathar was dismissed from the priesthood by King Solomon for having taken part in Adonijah's conspiracy against David, his life was spared because he had formerly borne the Ark.[55] Solomon worshipped before the Ark after his dream in which God promised him wisdom.[56]
During the construction of Solomon's Temple, a special inner room, named Kodesh Hakodashim (Eng. Holy of Holies), was prepared to receive and house the Ark;[57] and when the Temple was dedicated, the Ark—containing the original tablets of the Ten Commandments—was placed therein.[58] When the priests emerged from the holy place after placing the Ark there, the Temple was filled with a cloud, "for the glory of the Lord had filled the house of the Lord".[59][60][61]
When Solomon married Pharaoh's daughter, he caused her to dwell in a house outside Zion, as Zion was consecrated because it contained the Ark.[62] King Josiah also had the Ark returned to the Temple,[63] from which it appears to have been removed by one of his predecessors (cf. 2 Chron. 33-34 and 2 Kings 21-23).
Indiana Jones and the Temple of Doom
Sobek
Ammit
Worship of this Egyptian goddess spread from Egypt to England
Egyptians adored Isis, divine protector of the dead, for two millennia before her cult spread beyond the Nile to the rest of the Roman Emprie.
Abdallah Gad
From cats to cows to crocodiles, ancient Egyptians worshipped many animal gods
As 3,000 years of art and sculpture reveal, the divine menagerie of ancient Egypt reflects the rich and varied creatures of the Nile Valley.
Maat
evolution
Evolution Runs Faster on Short Timescales
The timetable of evolution
Old MacDonald Had a Farm
UAS/AUV Lab Experiment Results
10 Properties of Secure Embedded Systems
Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin,
Sean R. O’Melia, and Roger I. Khazan
CubeSat-based Science Missions for Geospace and Atmospheric Research
AIS Vessel Traffic Data - Continental US - US Coast Guard - Yearly Totals
An end to end pipeline for deep learning on satellite imagery
Maureen K. Rowel
EPIC v. USCG – Nationwide Automatic Identification System
Emerging approaches applied to maritime transport research: Past and future
Maritime Safety and Security Information System (MSSIS)
Coast Guard RDT&E partners with Defense Innovation Unit
The AI advantage in
defence and security
Micro Aerial Vehicles (MAV) Assured Navigation in Search and Rescue Missions
Robust Localization, Mapping and Detection US Army Artificial Intelligence Innovation Institute (A2I2) Aiding Multi-DomainOperations (MDO)
Micro Aerial Vehicles (MAV) Assured Navigation in Search and Rescue Missions
Robust Localization, Mapping and DetectionMilitary Applications of Artificial Intelligence: Ethical Concerns in an Uncertain World
Real-time kinematic positioning (RTK)
GNSS reflectometry
GNSS positioning calculation
GNSS software-defined receiver
GNSS applications
DARPA Opportunities
DARPA Robotics Challenge
Antonov An-225 Mriya
The world's largest cargo aircraft was reportedly destroyed in Ukraine during a Russian attack. Take a look at the plane, which was big enough to carry 50 cars.
Cybersecurity
Minotaur Mission System
Coast Guard Using Sensors and Satellite Imaging to Track Vessels in Real Time
Assistant Commandant for Capability (CG-7)
Coast Guard Office of C4 & Sensors Capabilities (CG-761)
Formerly the Office of Command and
Control Capabilities (CG-37RCC)
CONTRIBUTION OF ARTIFICIAL INTELLIGENCE TO BORDER SECURITY
Kokkalis, KonstantinosMonterey, CA; Naval Postgraduate School
Comments
Post a Comment