Skip to main content

Uncertainpy for World Toilet Day 2022 PU Learning, QuPath, QuTip SALib for Biomass Multiplexed analysis Ion Gas Cracker Reinforcement Learning as Classification

Pareto principle 80 20 Rule, I O Psychology Quantum cognition modeling Social anhedonia and deficits in reinforcement learning

ML | Classification vs Clustering

The Jupyter Notebook

(Formerly known as the IPython Notebook)

Document classification

PU-learning-example

Classification: True vs. False and Positive vs. Negative

Positive-unlabeled learning

HHS Office of Small & Disadvantaged Business Utilization (HHS/OSDBU)

200 Independence Avenue, S.W.
Hubert Humphrey Building, Room 637D
Washington, DC 20201
Telephone Number: 202-690-7300

                      
  HEARING

                               BEFORE THE

                              COMMITTEE ON
                          OVERSIGHT AND REFORM
                        HOUSE OF REPRESENTATIVES

                     ONE HUNDRED SIXTEENTH CONGRESS

THE TRUMP ADMINISTRATION'S CHILD SEPARATION POLICY:
                       SUBSTANTIATED ALLEGATIONS
                            OF MISTREATMENT

The Honorable Carolyn B. Maloney
2308 Rayburn House Office Building
Washington, DC, 20515-3212

Phone: (202) 225-7944

Saint Yves, helper of all who invoke thee, pray for us. Saint Yves, bright light among men of law, pray for us. Lamb of God, who takest away the sins of the world, spare us, O Lord. Lamb of God, who takes away the sins of the world, graciously hear us, O Lord.

Improving Positive Unlabeled Learning: Practical AUL Estimation and NewTraining Method for Extremely Imbalanced Data Sets

South Dakota Senate candidate accused of child abuse

Paxton has been under indictment for securities fraud for seven years and faces a whistleblower lawsuit from former top deputies who accused him of abuse of office. Paxton has denied wrongdoing.

Donald Trump makes bizarre statement that ‘some of us have horrible children’ in rally rant about inheritance

Texas Attorney General Ken Paxton fled his home to avoid being served with subpoena, court record says

In an affidavit, a process server said that the state’s top attorney tried to evade him as he attempted to deliver a subpoena from an abortion fund’s lawsuit against the state.

by Eleanor Klibanoff Sept. 26, 2022

Families That Exclude, Ostracize, or Ignore and the Harm They Do

A Child Psychiatrist’s Perspective on Trump’s Behavior

Texas AG Ken Paxton could be deposed about securities fraud accusations after election

Here Are the Facts About President Trump's Family Separation Policy

where ignorance is bliss, 'tis folly to be wise

proverb It is better to remain unaware or ignorant of things that may otherwise cause one stress; if you don't know about something, you don't need to worry about it. From the 1742 poem "Ode on a Distant Prospect of Eton College," by Thomas Gray.

Recognising adult abuse, exploitation and neglect

Abuse, exploitation or neglect of adults at risk can happen in different ways. If you suspect someone is at risk of abuse, exploitation or neglect contact the Adult Protection Gateway Service. You can also tell the police.

The English proverb children should be seen and not heard means that children are allowed to be present during a conversation but should not be allowed to speak unless they are spoken to first.

Differences in functional and structural social support among female and male veterans and civilians

Sound Health

Funding Announcements and Opportunities

Unwissenheit ist Glückseligkeit, 
folge deiner Glückseligkeit, 
denn Wissen ist Macht und Macht korrumpiert

Ignorance is bliss, follow your bliss for knowledge is power and power corrupts

Lied

In Western classical music tradition, Lied (/ld, lt/, plural Lieder /ˈldər/;[1][2][3] German pronunciation: [liːt], plural [ˈliːdɐ], lit.'song') is a term for setting poetry to classical music to create a piece of polyphonic music.[4] The term is used for any kind of song in contemporary German, but among English and French speakers, lied is often used interchangeably with "art song" to encompass works that the tradition has inspired in other languages as well. The poems that have been made into lieder often center on pastoral themes or themes of romantic love.[5]

The earliest lied date from the late fourteenth or early fifteenth centuries, and can even refer to Minnesang from as early as the 12th and 13th centuries.[6] It later came especially to refer to settings of Romantic poetry during the late eighteenth and nineteenth centuries, and into the early twentieth century. Examples include settings by Joseph Haydn, Wolfgang Amadeus Mozart, Ludwig van Beethoven, Franz Schubert, Robert Schumann, Johannes Brahms, Hugo Wolf, Gustav Mahler or Richard Strauss.

Securities fraud charges against Texas Attorney General Ken Paxton, 2015

Carl Jung - The Power of Knowing Your Dark Side (Written by Eternalised)

mimesis to variety

By David Vincent Bell Hirsch

How Facing Our “Shadow” Can Release Us From Scapegoating

When we scapegoat, we project onto others what we deny about ourselves.

The mimetic theory of desire, an explanation of human behavior and culture, originated with the French historian, literary critic, and philosopher of social science René Girard (1923-2015). The name of the theory derives from the philosophical concept mimesis, which carries a wide range of meanings. In mimetic theory, mimesis refers to human desire, which Girard thought was not linear but the product of a mimetic process in which people imitate models who endow objects with value.[1] Girard called this phenomenon "mimetic desire", and described mimetic desire as the foundation of his theory:

"Man is the creature who does not know what to desire, and he turns to others in order to make up his mind. We desire what others desire because we imitate their desires."[2]

Mimetic theory posits that mimetic desire leads to natural rivalry and eventually to scapegoating - Girard called this the scapegoat mechanism. In his study of history, Girard formed the hypothesis that societies unify their imitative desires around the destruction of a collectively agreed-upon scapegoat.[3]

What does Akrodha mean?

The scapegoat archetype and the need to be right: depth approaches in organizational cultures


According to the Hebrew Bible, God commands Abraham to offer his son Isaac as a sacrifice. After Isaac is bound to an altar, a messenger from God stops Abraham before the sacrifice finishes, saying "now I know you fear God". Abraham looks up and sees a ram and sacrifices it instead of Isaac.

Binding of Isaac

Music

The Binding of Isaac has inspired multiple pieces of music, including Marc-Antoine Charpentier's Sacrificium Abrahae (H.402, oratorio for soloists, chorus, doubling instruments, and continuo; 1680–81), Leonard Cohen's "Story of Isaac" from the 1969 album Songs from a Room,[28] the eponymous "Highway 61 Revisited" from Highway 61 Revisited (1965) by Bob Dylan, Sufjan Stevens' "Abraham" from the album Seven Swans (2004), Gilad Hochman's "Akeda for Solo Viola" (2006), and Anaïs Mitchell's "Dyin' Day" from the album Young Man in America (2012).

 
The Texas Medical Board (TMB) is the state agency mandated to regulate the practice of medicine by Doctors of Medicine (MDs) and Doctors of Osteopathic Medicine (DOs) in Texas. The Board consists of 12 physician members and seven public members appointed for a six-year term by the Governor and confirmed by the Senate.

Sherif Z. Zaafran, M.D. Sherif Z. Zaafran, M.D., of Houston, is the President of the Texas Medical Board.

Doctor Mistakes and Medical Malpractice

As such, civil law allows patients to hold doctors accountable for these mistakes.

I Have No Money, How Can I Hire an Attorney?

Confirmation bias refers to the tendency to seek out and give undue credibility to information that supports a desired conclusion. Due to confirmation bias, a party may unduly discredit contradictory information to the desired conclusion, or incorrectly believe it to reinforce a minority viewpoint at best.

Section VII- Proving Discrimination- Disparate Impact

Charlie Rose: Goat Boy - Saturday Night Live 

The Pareto principle states that for many outcomes, roughly 80% of consequences come from 20% of causes (the "vital few").[1] Other names for this principle are the 80/20 rule, the law of the vital few, or the principle of factor sparsity

Data Science

And how you can do both.

Forget ‘quiet quitting’: Workers now stressing out colleagues with ‘quiet constraint

A bagging SVM to learn from positive and unlabeled examples

What's your Bag baby? Austin Powers BI

Using Python Visuals in Power BI

Bag and tag means ideally to package an item for delivery or for movement, however the original meaning had beginnings in the army or military, and refers to movement of a dead body.

US productivity is on the decline and employees are less willing to ‘engage in hustle culture,' as 1 in 5 Americans admit to doing the 'bare minimum'

Knowledge worker

Knowledge workers are workers whose main capital is knowledge. Examples include programmers, physicians, pharmacists, architects, engineers, scientists, design thinkers, public accountants, lawyers, editors, and academics, whose job is to "think for a living"

Understanding the Pareto principle (The 80/20 rule)

Anhedonia

Anhedonia is a diverse array of deficits in hedonic function, including reduced motivation or ability to experience pleasure.[1] While earlier definitions emphasized the inability to experience pleasure, anhedonia is currently used by researchers to refer to reduced motivation, reduced anticipatory pleasure (wanting), reduced consummatory pleasure (liking), and deficits in reinforcement learning.
Reinforcement learning (RL) is an area of machine learning concerned with how intelligent agents ought to take actions in an environment in order to maximize the notion of cumulative reward. Reinforcement learning is one of three basic machine learning paradigms, alongside supervised learning and unsupervised learning.

The Politics of Authoritarian Rule

What Does Oppositional Defiant Disorder Look Like in Adults? 

Behavior informatics BI

Confusion matrices with more than two categories

Business object

Behavior tree (artificial intelligence, robotics and control)

A prototype can also mean a typical example of something such as in the use of the derivation 'prototypical'.[5] This is a useful term in identifying objects, behaviours and concepts which are considered the accepted norm and is analogous with terms such as stereotypes and archetypes:

Object (computer science)

Methods and Behavior

The behavior of an object is defined by its methods, which are the functions and subroutines defined within the object class. Without class methods, a class would simply be a structure.

Data Scientist’s starter toolkit for end-to-end Machine Learning Life cycle in 2022

The Two Sides Of Dual-Class Shares 

Dual-Class Arbitrage
Typically, each class of stock is entitled to the same cash flow interest in the company, but one share class has superior voting rights (e.g. 10 votes per share). As the stocks are traded, technical market forces can cause prices of the different classes to diverge.

Dual-Class Arbitrage is a Literal Cash Cow.

Structure and agency

Structure is the recurrent patterned arrangements which influence or limit the choices and opportunities available. Agency is the capacity of individuals to act independently and to make their own free choices.

Methods determine what type of functionality a class has, how it modifies its data, and its overall behavior. Methods go beyond what properties do for an object, in that they aren't bound by a rigid implementation guideline and aren't tied to a member data item. They can be subroutines or functions and declared as public, protected, or private.

Behavior Driven Development

Quiet quitting, hustle culture, and purpose: 3 workplace trends to watch

More About Classifier Design

Graph coloring game

Vertex coloring game

Structure and agency

Structure is the recurrent patterned arrangements which influence or limit the choices and opportunities available. Agency is the capacity of individuals to act independently and to make their own free choices
Cross-validation and out-of-bag bootstrap applications

Karpman drama triangle

Family therapy movement

After World War II, therapists observed that while many battle-torn veteran patients readjusted well after returning to their families, some patients did not; some even regressed when they returned to their home environment. Researchers felt that they needed an explanation for this and began to explore the dynamics of family life – and thus began the family therapy movement. Prior to this time, psychiatrists and psychoanalysts focused on the patient's already-developed psyche and downplayed outside detractors. Intrinsic factors were addressed and extrinsic reactions were considered as emanating from forces within the person.[1]

Transactions analysis

In the 1950s, Eric Berne developed transactional analysis, a method for studying interactions between individuals. This approach was profoundly different than that of Freud. While Freud relied on asking patients about themselves, Berne felt that a therapist could learn by observing what was communicated (words, body language, facial expressions) in a transaction. So instead of directly asking the patient questions, Berne would frequently observe the patient in a group setting, noting all of the transactions that occurred between the patient and other individuals.[6]

Triangles/triangulation

The theory of triangulation was originally published in 1966 by Murray Bowen as one of eight parts of Bowen's family systems theory.[1] Murray Bowen, a pioneer in family systems theory, began his early work with schizophrenics at the Menninger Clinic, from 1946 to 1954. Triangulation is the “process whereby a two-party relationship that is experiencing tension will naturally involve third parties to reduce tension”.[7] Simply put, when people find themselves in conflict with another person, they will reach out to a third person. The resulting triangle is more comfortable as it can hold much more tension because the tension is being shifted around three people instead of two.[1]

Bowen studied the dyad of the mother and her schizophrenic child while he had them both living in a research unit at the Menninger clinic. Bowen then moved to the National Institute of Mental Health (NIMH), where he resided from 1954 to 1959. At the NIMH Bowen extended his hypothesis to include the father-mother-child triad. Bowen considered differentiation and triangles the crux of his theory, Bowen Family Systems Theory. Bowen intentionally used the word triangle rather than triad. In Bowen Family Systems Theory, the triangle is an essential part of the relationship.

Triad (sociology)

Couples left to their own resources oscillate between closeness and distance. Two people having this imbalance often have difficulty resolving it by themselves. To stabilize the relationship, the couple often seek the aid of a third party to help re-establish closeness. A triangle is the smallest possible relationship system that can restore balance in a time of stress. The third person assumes an outside position. In periods of stress, the outside position is the most comfortable and desired position. The inside position is plagued by anxiety, along with its emotional closeness. The outsider serves to preserve the inside couple's relationship. Bowen noted that not all triangles are constructive – some are destructive.[7]

OUT-OF-BAG ESTIMATION

Triangulation (psychology)

Triangulation is a manipulation tactic where one person will not communicate directly with another person, instead using a third person to relay communication to the second, thus forming a triangle. It also refers to a form of splitting in which one person manipulates a relationship between two parties by controlling communication between them.

Triangulation may manifest itself as a manipulative device to engineer rivalry between two people, known as divide and conquer[1] or playing one (person) against another.[2]

Abusive power and control 

Family

In family therapy, the term triangulation is most closely associated with the work of Murray Bowen. Bowen theorized that a two-person emotional system is unstable, in that under stress it forms itself into a three-person system or triangle.[11]

In the family triangulation system the third person can either be used as a substitute for the direct communication, or can be used as a messenger to carry the communication to the main party. Usually this communication is an expressed dissatisfaction with the main party. For example, in a dysfunctional family in which there is alcoholism present, the non-drinking parent will go to a child and express dissatisfaction with the drinking parent. This includes the child in the discussion of how to solve the problem of the alcoholic parent. Sometimes the child can engage in the relationship with the parent, filling the role of the third party, and thereby being "triangulated" into the relationship. Alternatively, the child may then go to the alcoholic parent, relaying what they were told. In instances when this occurs, the child may be forced into a role of a "surrogate spouse" The reason that this occurs is that both parties are dysfunctional. Rather than communicating directly with each other, they utilize a third party. Sometimes this is because it is unsafe to go directly to the person and discuss the concerns, particularly if they are alcoholic and/or abusive.

In a triangular family relationship, the two who have aligned risk forming an enmeshed relationship.[12]

Betrayal Trauma - Family Scapegoating Abuse (FSA) Education

The Perverse Triangle

The Perverse Triangle was first described in 1977 by Jay Haley[13] as a triangle where two people who are on different hierarchical or generational levels form a coalition against a third person (e.g., "a covert alliance between a parent and a child, who band together to undermine the other parent's power and authority".[14]) The perverse triangle concept has been widely discussed in professional literature.[15][16][17][18][19][20][21] Bowen called it the pathological triangle,[20] while Minuchin called it the rigid triangle.[22]

Cross-generational coalition

For example, a parent and child can align against the other parent but not admit to it, to form a cross-generational coalition.[23] These are harmful to children.[15][19][24]

Self-control theory of crime

Angel of mercy (criminology)

See also

Family Estrangement: Advice and Information for Adult Children

  • Token, an object (in software or in hardware) which represents the right to perform some operation:
    • Session token, a unique identifier of an interaction session
    • Security token or hardware token, authentication token or cryptographic token, a physical device for computer authentication
      • Bearer token, a type of security token in OAuth that gives access to its bearer
    • Access token, a system object representing the subject of access control operations
    • Tokenization (data security), the process of substituting a sensitive data element
    • Invitation token, in an invitation system
    • Token Ring, a network technology in which a token circles in a logical ring
    • Token, an object used in Petri net theory
  • Lexical token, a word or other atomic parse element
 Token money, money that is of limited legal tender

Gestalt psychology

Quantum cognition modeling

Similarities between Gestalt phenomena and quantum mechanics have been pointed out by, among others, chemist Anton Amann, who commented that "similarities between Gestalt perception and quantum mechanics are on a level of a parable" yet may give useful insight nonetheless.[60] Physicist Elio Conte and co-workers have proposed abstract, mathematical models to describe the time dynamics of cognitive associations with mathematical tools borrowed from quantum mechanics[61][62] and has discussed psychology experiments in this context. A similar approach has been suggested by physicists David Bohm, Basil Hiley and philosopher Paavo Pylkkänen with the notion that mind and matter both emerge from an "implicate order".[63][64] The models involve non-commutative mathematics; such models account for situations in which the outcome of two measurements performed one after the other can depend on the order in which they are performed—a pertinent feature for psychological processes, as an experiment performed on a conscious person may influence the outcome of a subsequent experiment by changing the state of mind of that person. 

Knowledge graph

Boosting Positive and Unlabeled Learning for Anomaly Detection With Multi-Features

Matching pennies

Mertens function

Mertens conjecture

Positive and negative predictive values

Disproof of the Mertens conjecture

ADMoE: Anomaly Detection with Mixture-of-Experts from Noisy Labels

Program for Mobius Function

The Möbius function and the Mertens conjecture

Coordination game

THE SIZE OF OSCILLATIONS IN THE GOLDBACH
CONJECTURE
 

Anomaly Detection in Noisy Images

Sensitivity analysis

Principles and Methods of Sensitivity Analyses

Welcome to Uncertainpy’s documentation!

Uncertainpy is a python toolbox for uncertainty quantification and sensitivity analysis tailored towards computational neuroscience.

Uncertainty quantification (UQ)

Uncertainpy Documentation

Quantum information science (QIS)

Confidence interval

Statistics in Python:
Confidence Intervals

Sensitivity Analysis in Python

Risk Engineering Sensitivity analysis

NATIONAL QUANTUM INITIATIVE

Dist-PU: Positive-Unlabeled Learning from a Label Distribution Perspective

Statistical and Thermal Physics
Using Python

Center for Quantum Information Science and Technology 

Quantum decision tree complexity

Bayesian statistics

QuPath

Multiplexed analysis

The reactions that take place in an electrolyzer are very similar to the reaction in fuel cells, except the reactions that occur in the anode and cathode are reversed. In a fuel cell, the anode is where hydrogen gas is consumed, and in an electrolyzer, the hydrogen gas is produced at the cathode.

Pulse-level noisy quantum circuits with QuTiP

Biomass explained 

Reynolds number

fluid dynamics

Computer Proof ‘Blows Up’ Centuries-Old Fluid Equations

For more than 250 years, mathematicians have wondered if the Euler equations might sometimes fail to describe a fluid’s flow. A new computer-assisted proof marks a major breakthrough in that quest.

Info-stealing trojan hides in malicious PyPI packages on GitHub

Positive and Unlabelled Learning: Recovering Labels for Data Using Machine Learning

Gas cracker

Zero-point energy

Zero-point energy (ZPE) is the lowest possible energy that a quantum mechanical system may have

Carl Jung and the Shadow: The Mechanics of Your Dark Side

Grinch

Big Tech bleeds tens of thousands of jobs after pandemic heyday 

Krampus

The shadow side of organizational culture

Twitter layoffs: The fresh job cuts are expected to target employees in the sales and partnership teams of Twitter.

The Industry

The End of Silicon Valley’s 20-Year Boom

An industry still chasing limitless growth doesn’t lay off legions of workers.

Why tech layoffs are happening all at once — and why the next few weeks could be the worst of them

Mr. Burns

The job cuts of approximately 10,000, which would start as soon as this week, would focus on the company’s devices organization, retail division and human resources.

The Distributed Computing Manifesto

Not everything is Java, python, or javascript

Esoteric programming language

(sometimes shortened to esolang)

Two Esoteric Programming Languages, One Interpreter

Language list

Note that languages that are merely jokes even compared to other esoteric languages are located in the joke language list.

Top Object Detection Algorithms and Libraries in Artificial Intelligence (AI)

Work-Related Injuries While Intoxicated
Also, due to the physical nature of these jobs, the risk of injury is often greater when compared to alcohol abuse and office-type jobs. As much as 16% of workplace injuries involve alcohol; 15% of victims of job-related deaths have tested positive for blood alcohol.
A 25-year-old man died on Thursday, Nov. 10, 2022, when he was dancing on top of an 18-wheeler and knocked off as the truck passed underneath a bridge, according to the Houston Police Department.

Man dies after dancing atop 18-wheeler, colliding with bridge on Houston highway

The man who died had gotten on top of the cargo portion of the truck without the knowledge of the driver, according to Houston police.

‘Pilot’s Salt’: The Third Reich Kept Its Soldiers Alert With Meth

Truth as a Victim: The challenge of anti-trafficking education in the age of Q

An introduction to Q-Learning: Reinforcement Learning

Some QAnon believers are enraged by Trump's 2024 announcement and have started ignoring 'Q drops.' But experts say the movement is as fervent as ever.

American political conspiracy theory and political movement.  

Trump begins openly embracing and amplifying false fringe QAnon conspiracy theory

Jack White leaves Twitter after Musk reinstates Trump: 'Shame on you'

The rocker pulled his record label, Third Man Records, from the social media platform after Elon Musk allowed the former president to return.

Who Is Behind QAnon? Linguistic Detectives Find Fingerprints

Q-ball (disambiguation)

Club Q Colorado shooting: Suspect named after five killed in attack at nightclub

5 dead after shooting at Colorado Springs LGBTQ club late Saturday night

Panic! at the Disco

Unimon qubit

QuPath

Commands  

Introducing Unimon: A new superconducting qubit for quantum computers

BIAS-MOTIVATED CRIMES: THEIR CHARACTERISTICS AND THE LAW ENFORCEMENT RESPONSE 

https://www.jointcommission.org/

John Denver ~ Please Daddy Don't Get Drunk This Christmas

Firetrucks under the Christmas tree 

Class conflict (also class warfare and class struggle) is the political tension and economic antagonism that exists in society consequent to socio-economic competition among the social classes. 

be angry and sin not
The Texas Achieving a Better Life Experience (“Texas ABLE®”) Program was established to encourage and assist individuals with disabilities and their families.

Bayesian Q-learning

Suboxone: Rationale, Science, Misconceptions

Estimating Risk and Uncertainty in Deep Reinforcement Learning

Opium Wars

Forensic analysis: Bayesian inference can be used in Bayesian machine learning to infer the identity of an individual based on DNA evidence. Bayes’ theorem is applied for forensic analysis, which involves reasoning about conditional probabilities and making statistical inferences from observed data (genetic marker alleles) with respect to one or more populations of possible genotypes under study.

DEA takes aggressive stance toward pharmacies trying to dispense addiction medicine

 

China and synthetic drugs: Geopolitics trumps counternarcotics cooperation

Code injection

Code injection is the exploitation of a computer bug that is caused by processing invalid data. The injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of execution. The result of successful code injection can be disastrous, for example, by allowing computer viruses or computer worms to propagate.

Code injection vulnerabilities occur when an application sends untrusted data to an interpreter. Injection flaws are most often found in SQL, LDAP, XPath, NoSQL queries, OS commands, XML parsers, SMTP headers, program arguments, etc. Injection flaws tend to be easier to discover when examining source code than via testing.[1] Scanners and fuzzers can help find injection flaws.[2]

Injection can result in data loss or corruption, lack of accountability, or denial of access. Injection can sometimes lead to complete host takeover.

Certain types of code injection are errors in interpretation, giving special meaning to user input. Similar interpretation errors exist outside the world of computer science such as the comedy routine Who's on First?. In the routine, there is a failure to distinguish proper names from regular words. Likewise, in some types of code injection, there is a failure to distinguish user input from system commands.

SQL injection

Technical implementations

Hacking website using SQL Injection -step by step guide

We have a number of security issues ill addressed. How may we develop healthy state to state competition in constructive cultural campaigns in IGO, CTOC's?
Fentanyl Flowto the United States

Intergovernmental organization (IGO)

The term intergovernmental organization (IGO) refers to an entity created by treaty, involving two or more nations, to work in good faith, on issues of common interest. In the absence of a treaty an IGO does not exist in the legal sense. For example, the G8 is a group of eight nations that have annual economic and political summits. IGOs that are formed by treaties are more advantageous than a mere grouping of nations because they are subject to international law and have the ability to enter into enforceable agreements among themselves or with states. 
 
GARBAGE IN,
GOSPEL OUT

How Data-Driven Policing Technologies
Entrench Historic Racism and ‘Tech-wash’
Bias in the Criminal Legal System

Interoperability

Prevalence and characteristics of addictive behaviors in a community sample: A latent class analysis

Abstract

While addictions to substances such as alcohol, tobacco, and other drugs have been extensively investigated, interest has been growing in potential non-substance-related addictive behaviors (e.g., excessive gambling, buying or playing video games).

Alcohol and Cancer

"behavioral interventions can produce more specific brain changes than biological intervention as a medication"

- Neuroscientist Richard Davidson

The Influence of Hallucinogenic Mushrooms on Christmas

The story of Santa Claus is not the creation of Coca-Cola, nor Saint Nicholas or a children’s story, it exists because of a small living being with great powers: the Amanita muscaria mushroom.

Virtual Reality-Assisted Cognitive Behavioral Therapy for Anxiety Disorders: A Systematic Review and Meta-Analysis 


The annual Austin City Limits Music Festival, held in Austin, Texas each year, is one of the reasons Austin is the Live Music Capital of the WorldThe Institute for Music and Consciousness offers trainings in the Continuum Model of GIM:

Institute for Music and Consciousness

Bonny Method Training in Texas
Denton, TX USA  

Behavior informatics BI 

Matthew 5:22

But I say to you that everyone who is angry with his brother shall be guilty before the court; and whoever says to his brother, ‘You good-for-nothing,’ shall be guilty before the supreme court; and whoever says, ‘You fool,’ shall be guilty enough to go into the fiery hell.

Criminal Intelligence
Manual for Analysts

Matthew 5:43-48

“You have heard that it was said, ‘You shall love your neighbor and hate your enemy.’ But I say to you, love your enemies and pray for those who persecute you, so that you may be sons of your Father who is in heaven; for He causes His sun to rise on the evil and the good, and sends rain on the righteous and the unrighteous

For if you love those who love you, what reward do you have? Do not even the tax collectors do the same? If you greet only your brothers, what more are you doing than others? Do not even the Gentiles do the same? Therefore you are to be perfect, as your heavenly Father is perfect.

The Atlantis model emphasizes GIM as a music-centered psychotherapy for individuals and groups

Ebenezer Scrooge

Bah Humbug

How Shadow Boards Bridge Generational Divides

Profit Margin Defined: How to Calculate and Compare

Liquid capital

Fluid Mechanics/Fluid Properties

The Reynolds number for the flow of a fluid, represented this way, is equal to the density 𝜌 of a fluid multiplied by that fluid speed times what's called the characteristic dimension of the flow, we'll call it capital 𝐿, all divided by the dynamic viscosity 𝜇 of the fluid.

Derivation

Godunov's scheme

Numerical Fluxes and the Riemann Problem

Notes on Godunov Methods

Hirsch Conjecture

Householder transformation

GodunovBurgers.py -- 
a Godunov solver 
for Burgers' inviscid equation
# Written by Daniel J. Bodony
#(bodony@illinois.edu)
# Monday, March  5, 2018 
20:03:02 -0500
# Updated:Tuesday, 
March 26, 2019
 12:57:40 -0500

Path analysis (statistics)

Coloring books innovations, please help me Jasper, Charlie, Ray and Sarah, critical thinking citizens
Family, friends, citizens and departments of government as well academic institutions, these are mathematical and statistics problems to couple with material science research. (For a song)
Hold the being cheesy
Yoga: Paths to Moksha
 

What's your beef?
Beefeater is a term often used to refer to the Yeomen Warders of the Tower of London, but originally referring to the Yeomen of the Guard.

Nanocar

Race condition 

Sādhanā

Noble Eightfold Path

Ashta Bhairava

In physics, the eightfold way is an organizational scheme for a class of subatomic particles known as hadrons that led to the development of the quark model. American physicist Murray Gell-Mann and Israeli physicist Yuval Ne'eman both proposed the idea in 1961

Hindus do not consider the cow to be a god and they do not worship it. Hindus, however, are vegetarians and they consider the cow to be a sacred symbol of life that should be protected and revered. In the Vedas, the oldest of the Hindu scriptures, the cow is associated with Aditi, the mother of all the gods.

Jasper, Hannah and Charlie Wielski,

Structural equation modeling

Jasper Polish Space Wielski, Jonathan, Levi and Richard Schubert Calculus varieties

math identity | Institute for School Partnership | Washington University in St. Louis

Cousin Sarah Hirsch, brother in law Jason and sister Carmen this article was great for educators of mathematics and other topics.

Identity (mathematics)

  Not to be confused with identity element, identity function, or identity matrix.

Introduction to Structural Equation Modeling (SEM) in R with lavaan

How to find the unit tangent vector

Great article connecting pure mathematics with computer science.

Industry-Specific Permits by Rule

Research mining statistics on Lithium and consider sodium ion innovations as well as other materials:

New material pushes sodium-ion batteries to phase out costly lithium

Spin–orbit interaction

Tunnel magnetoresistance

Introduction to spin torques and spin-orbit torques in metal ...

Van der Waals force

Coherent helicity-dependent spin-phonon oscillations in the ferromagnetic van der Waals crystal CrI3 | Nature Communications

Van der Waals junction field effect transistors with both n- and p-channel transition metal dichalcogenides

Perovskites

Perovskites are synthetic compounds that have an orthorhombic crystal structure identical to the naturally occurring mineral with the same name and that share a structurally similar chemical formula.

Perovskite SBIDS Minimum Fisher information dissertation on National Freedom Day

By David Vincent Bell Hirsch

In the mathematical field of differential geometry, a Frobenius manifold, introduced by Dubrovin[1], is a flat Riemannian manifold with a certain compatible multiplicative structure on the tangent space. The concept generalizes the notion of Frobenius algebra to tangent bundles.

Frobenius manifolds occur naturally in the subject of symplectic topology, more specifically quantum cohomology. The broadest definition is in the category of Riemannian supermanifolds. We will limit the discussion here to smooth (real) manifolds. A restriction to complex manifolds is also possible.

Matter wave

de Broglie relations

According to wave-particle duality, the De Broglie wavelength is a wavelength manifested in all the objects in quantum mechanics which determines the probability density of finding the object at a given point of the configuration space. The de Broglie wavelength of a particle is inversely proportional to its momentum.

Lattice energy

The lattice energy of a crystalline solid is a measure of the energy released when ions are combined to make a compound. It is a measure of the cohesive forces that bind ions. Lattice energy is relevant to many practical properties including solubility, hardness, and volatility. The lattice energy is usually deduced from the Born–Haber cycle.[1]

Hydrogen can be produced by the electrolysis of water (using an electric current to break water, H2O, into its component elements of hydrogen and oxygen). If this electric current is produced by a renewable source (e.g. Solar PV or a wind turbine), the clean hydrogen produced is known as green hydrogen.

Theory of Spin-Orbit Torque | NIST

Apply what you have learned from the coloring book proposal with family to reconnect National Coloring Book day with National Siblings day.

Addressing Water Scarcity in the county of Mark Kevin Hirsch for his birthday on August 13, 2022, with Vincent and Margurite having a home in this county too:

Williamson County homeowners concerned about growing rock crushing operations | KXAN Austin

We may address water scarcity in Texas with innovations in system engineering and petitions with the city, state and Texas water board.

The Colorado River and Highland Lakes

How full are the lakes?

Texas Reservoirs: Monitored Water Supply Reservoirs are 68.3% full on 2022-11-16. n.a. n.a.

Water Data For Texas

Having 'droughts' about weather forecasts with water table projections?
NIH SBIR DOE CDC FEMA

Mountaintop Removal Mining: Digging Into Community Health Concerns

The term is used to describe environmental injustice that occurs within a racialized context both in practice and policy. In the context of the United States, environmental racism often emphasizes the inequalities between urban and exurban areas after white flight.

Environmental racism

What is the Department of Interior and how may it address intergovernmental operability?
BUDGET JUSTIFICATIONS
and Performance Information
Fiscal Year 2022
The Department of the Interior manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans.

Texas Water Development Board

Population and Water Demand Projections

Kentucky   Kentucky Profile

State Profile and Energy Estimates

ManagingCoal Mine Closure Achieving a Just Transition for All
November 2018

Bluegrass music

Music in the military contributes to morale, espirit de corps, and public relations. There are musical performances at every major military event, such as ceremonies, parades, concerts, festivals, and dances. The Military is one of the largest employers of musicians in the country.

Consider the 1957 Floods in Kentucky in Hirsch Conjecture


Annual Energy Outlook 2019

with projections to 2050

And

Spin-forbidden reactions

All Austin Batty with

Two-dimensional conformal field theory 

with organic battery innovations as

Perovskite 

Perovskite (structure)

Is perovskite a FCC?
The perovskite structure has simple cubic symmetry, but is related to the fcc lattice in the sense that the A site cations and the three O atoms comprise a fcc lattice. ... Eight such octahedra surround a large cuboctahedral cavity, which is the site of the A ions in the perovskite structure

The Cuboctahedron


Schlegel diagram
One cuboctahedral cell shown  

In geometry, a cuboctahedral prism is a convex uniform 4-polytope. This 4-polytope has 16 polyhedral cells: 2 cuboctahedra connected by 8 triangular prisms, and 6 cubes. It is one of 18 uniform polyhedral prisms created by using uniform prisms to connect pairs of parallel Platonic solids and Archimedean solids.

Slip (materials science)

Spline (mathematics)

How to Find Lattice Constant

Translation operator (quantum mechanics)

Cubic Spline Interpolation

Cubic crystal system

Lattice Dynamics 

Bravais lattice

Hirsch dissertation anyone?

An inflexible semantics for cross-categorial operators

Author(s)
Hirsch, Aron, Ph. D. Massachusetts Institute of Technolo

A Roadmap to the Ammonia Economy

Finding mislabeled data in datasets
A study on finding mislabeled data in datasets by studying loss function
In neural networks, a hidden layer is located between the input and output of the algorithm, in which the function applies weights to the inputs and directs them through an activation function as the output

What Does Hidden Layer Mean?

Adding a hidden layer between the input and output layers turns the Perceptron into a universal approximator, which essentially means that it is capable of capturing and reproducing extremely complex input–output relationships.

A Peek Into the Hidden Layers of a Convolutional Neural Network Through a Factorization Lens

CX-026446: Advanced Ionics, Inc.-Simplified Steam Electrolysis: Hydrogen for Hard-to-Abate Industries

Sonoluminescence is a phenomenon that occurs when a small gas bubble is acoustically suspended and periodically driven in a liquid solution at ultrasonic frequencies, resulting in bubble collapse, cavitation, and light emission.

Plasmonic nanoparticles

Develop an Intuition for Severely Skewed Class Distributions

Skew-symmetric matrix

Project pitch

Submit a Project Pitch to see if your idea might be a good fit for NSF funding. 

Class conflict

Class Distribution

Class distribution (frequency and location of the training instances of all classes).

Cluster algebra

k-medoids

A step-by-step tutorial—with a solved example

Cluster analysis

ML | K-Medoids clustering with solved example 

A Gentle Introduction to Imbalanced Classification

Create and manage cluster labels

Model Interpretability

Understand your K-Means clusters by extracting each cluster’s most important features.

Cluster Analysis: Unsupervised Learning via Supervised Learning with a Non-convex Penalty

Will We Have Self-Flying Cars Before Self-Driving Cars?

Funding Opportunity Announcement:
FY 2023 Research Opportunities in Atmospheric System Research

Funding Opportunity Announcement (FOA) Number: DE-FOA-0002850

Total Estimated Funding: $15 million

Deadline for Pre Applications (required): December 8, 2022 at 5:00 p.m. EST
Deadline for Applications: February 23, 2023 at 11:59 PM ET

The Department of Energy (DOE) Office of Science, Biological and Environmental Research (BER) program hereby announces its interest in receiving applications for Atmospheric System Research (ASR) within BER’s Earth and Environmental Systems Sciences Division (EESSD). ASR supports research on key cloud, aerosol, precipitation, and radiative transfer processes that affect the Earth’s radiative balance and hydrological cycle, especially processes that limit the predictive ability of regional and global models. This FOA solicits research grant applications for observational, data analysis, and/or modeling studies that use observations supported by BER, including the Atmospheric Radiation Measurement (ARM) user facility, to improve understanding and model representation of: 1) Cloud, aerosol, precipitation, and thermodynamic processes from ARM’s Tracking Aerosol Convection Interactions Experiment (TRACER); 2) Cloud, aerosol, precipitation, and radiation processes from ARM’s Surface Atmosphere Integrated Field Laboratory (SAIL); 3) Warm boundary layer atmospheric processes; and 4) Southeast U.S. atmospheric processes through early use of observations from the third ARM Mobile Facility (AMF3). All research supported by awards under this FOA is intended to benefit the public through increasing our understanding of the Earth system.

All types of domestic applicants are eligible to apply. Please see the funding opportunity for agency contacts and more details.

Deconstruction (building)

Deconstructivism

Structuralism (architecture)

Press On

“Nothing in the world can take the place of persistence. Talent will not; nothing is more common than unsuccessful men with talent. Genius will not; unrewarded genius is almost a proverb. Education alone will not; the world is full of educated derelicts. Persistence and determination alone are omnipotent.” U.S. President Calvin Coolidge.

Mazen Barakat, MBA
Sr. Finance & Budget Director

Cognitive load

Semi-structured interview

Case Study Interview Guide With Sample Questions and Answers

Texas Materials Institute

Work through a business case in real-time

A mathematical model to understand how innovations arise

ORNL scores in Mississippi

The University of Mississippi
Consensual Relationships Policy

Tickle College of Engineering
Photonic-crystal fiber (PCF) is a class of optical fiber based on the properties of photonic crystals. Serenity Sells suggests a Schubert Calculus algebraic fiber space cobordism fibered manifold to model CSA Cement 'green cement' Borophene battery block(s) as a SBIR ESCO:
 
Folkman's theorem, Ken Brown's lemma, and Solving Recurrences in Double Free set Chern Class Degrees of Freedom with Schubert calculus

By David Vincent Bell Hirsch
...
The factorisation lemma is a fundamental tool in the theory of categories of fibrant objects (dually: of cofibrant objects).
...
In mathematics, in particular in algebraic topology, differential geometry and algebraic geometry, the Chern classes are characteristic classes associated with complex vector bundles.

The HM-GM-AM-QM Inequalities
The geometric mean–arithmetic mean–quadratic mean inequalities.

Office of Institutional Research

About the Office of Institutional Research

3rd Floor 3100 MAIN, Houston, TX 77266-7517


What Do Information Technology Managers Do?

Many thanks to

Val Huber out in the Bay Area
API Logic Server

Open source and he would like feedback on his amazing work.

No-code development platform

Chris Davis out of Detroit was extremely helpful in last nights Python meetup.
Val Huber helped explain limits with no-coed in dialog with Chris Davis

Interpersonal relationship

Introduction to ANN | Set 4 (Network Architectures)

Intrapersonal communication

Neural Network Architecture Beyond Width and Depth

GSA-DOE Request for Information on Technologies to Decarbonize Commercial Buildings

The U.S. General Services Administration (GSA), in collaboration with the U.S. Department of Energy’s Building Technologies Office, has issued a request for information (RFI) for technologies that help reduce greenhouse gas (GHG) emissions from commercial buildings.

This year’s RFI is focused on technologies that:

  • Improve Operating Efficiency and Promote Healthy Workplaces
  • Enable Whole-Building Electrification
  • Facilitate GHG and Carbon Reduction
  • Provide On-site Energy Generation and Storage Systems
  • Deliver Electric Fleet and Load Management Solutions

A webinar covering details of the RFI is scheduled for November 10th at 1p.m. ET

GSA, DOE Issue RFI for Technologies for Net-Zero Carbon Buildings

Strategy of unbalanced growth

theory is generally associated with Hirschman... along with

Triangulation (Psychology) is a manipulation tactic where one person will not communicate directly with another person, instead using a third person to relay communication to the second, thus forming a triangle. It also refers to a form of splitting in which one person manipulates a relationship between two parties by controlling communication between them.

Triangulation may manifest itself as a manipulative device to engineer rivalry between two people, known as divide and conquer or playing one (person) against another.....  (consider this article):
David Vincent Bell Hirsch

Guglielmo Marconi, 1st Marquis of Marconi (Italian: [ɡuʎˈʎɛlmo marˈkoːni]; 25 April 1874 – 20 July 1937) was an Italian inventor and electrical engineer, known for his pioneering work on long-distance radio transmission, development of Marconi's law, and a radio telegraph system. He is credited as the inventor of radio, and he shared the 1909 Nobel Prize in Physics with Karl Ferdinand Braun "in recognition of their contributions to the development of wireless telegraphy".

The Perennial Philosophy is a comparative study of mysticism by the British writer and novelist Aldous Huxley. Its title derives from the theological tradition of the philosophia perennis

Gustav Theodor Fechner (/ˈfɛxnər/; German: [ˈfɛçnɐ]; 19 April 1801 – 18 November 1887) was a German philosopher, physicist and experimental psychologist. An early pioneer in experimental psychology and founder of psychophysics, he inspired many 20th-century scientists and philosophers. He is also credited with demonstrating the non-linear relationship between psychological sensation and the physical intensity of a stimulus formula, which became known as the Weber–Fechner law.


Serenity Sells suggests: The Italians as Marconi and Pontecorvo may be applied with German Fechner with Psychophysics. I have been trying to explain this to a cousin who is a physicist. Aspects of Triangulation (Psychology) and a Householder Transformation with a Strategy of unbalanced growth are a consideration to simulating a model to address health disparities. I propose Hoetelling's Linear City applied with Slutsky's equation, Roy's Identity, Sheppard's Lemma, Marshallian Demand with product differentiation in quantitative economic modeling as a random walk in a color of law case (further down the email):

Particle physicists knew that a mechanism, discussed back in 1957 by Bruno Pontecorvo, could explain the deficit in electron neutrinos. However, they hesitated to accept it for various reasons, including the fact that it required a modification of the accepted Standard Model. They first pointed at the solar model for adjustment, which was ruled out. Today it is accepted that the neutrinos produced in the Sun are not massless particles as predicted by the Standard Model but rather mixed quantum states made up of defined-mass eigenstates in different (complex) proportions. That allows a neutrino produced as a pure electron neutrino to change during propagation into a mixture of electron, muon and tau neutrinos, with a reduced probability of being detected by a detector sensitive to only electron neutrinos.

Several neutrino detectors aiming at different flavors, energies, and traveled distance contributed to our present knowledge of neutrinos. In 2002 and 2015, a total of four researchers related to some of these detectors were awarded the Nobel Prize in Physics.

Reduction potential (also known as redox potential, oxidation/reduction potential, or Eh) measures the tendency of a chemical species to acquire electrons and thereby be reduced. Reduction potential is measured in volts (V) or millivolts (mV).

from the SBIR ESCO research article:

Gingerbreadman map to rhetorical kissing number charge conjugation with helicity in a neutron magnetic moment

Associate Director Angie Trevino at the Texas Center for Health Disparities,

I am including my nephew whom graduated from UNT with a computer science degree in this follow up email as well Forklift Danceworks, whom I have contacted concerning developing public relations and choreography for project narratives. My niece Claudia Hirsch is earning her bachelors degree in economics. I mention in a research article the strategy of unbalanced growth by Hirschman and dance with Buckingham pi theorem, k-tuple and n-body problem's in a research article suggesting Robert Moses is empowering student's in an epoch journey from the book of Numbers:

Service choreography

Strategy of unbalanced growth

In engineering, applied mathematics, and physics, the Buckingham p theorem is a key theorem in dimensional analysis. In number theory, a prime k-tuple is a finite collection of values representing a repeatable pattern of differences between prime numbers. In physics, the n-body problem is the problem of predicting the individual motions of a group of celestial objects interacting with each other gravitationally.

...as well from my research article Fibrifold a fibroblast with Cure CMD and the Reticular fibers I mention:

Hotelling’s linear city

Advanced Microeconomics:

as

Lecture 8: Product Differentiation

with

lectures on quantitative economic modeling

for a

Random walk in a color of law case

Investigational Therapies

Information on current clinical trials is posted on the Internet at www.clinicaltrials.gov. All studies receiving U.S. government funding, and some supported by private industry, are posted on this government web site.
By David Vincent Bell Hirsch

In this article I mention:

Dr. Anne Rutkowski (co-founder, former chairman, and medical director)

Cure CMD and the Congenital Muscle Disease International Registry

 as well

Dr. Andrew Louden, I am attempting to discern a best fit. My name is David Hirsch and I do business as Serenity Sells, inside sells and innovations, soliciting teaming agreements with academics and agencies as to address technology gaps. The Python programming language has utility to model energy innovations as a SBIR ESCO as well medical innovations for a cure for muscular dystrophy.

Funding Opportunity Title

Simulation Modeling and Systems Science to Address Health Disparities (R01Clinical Trial Not Allowed)

Activity Code

R01 Research Project Grant

The Python programing language may model solutions

 applying

 As to model:

Collagen alpha-2(VI) chain is a protein that in humans is encoded by the COL6A2 gene.

 in context of

Variants in the COL6A1, COL6A2, and COL6A3 Genesin Collagen VI-related Congenital Muscular Dystrophy (P2.042)

Three out of every five gun deaths in Texas are suicides.

 

More than half of all suicides in Texas(58%) are by firearm.

 

•The firearm suicide rate in Texas has increased18% over the last decade.

 

•84% of people who die by firearm suicide in Texas are male; and 90% are White.

To honor veterans Memorial 2019, I contacted multiple agencies and for 11/11/2022 Veterans day

STOPPING GAN VIOLENCE: GENERATIVE UNADVERSARIAL NETWORKS
While the costs of human violence have attracted a great deal of attention from the research community, the effects of the network-on-network (NoN) violence popularised by Generative Adversarial Networks have yet to be addressed.

A northern accent, in general, is an accent characteristic of the northern part of any country or region.
 
Because that is how the word is pronounced in rapid speech. We're really leaving out the vowel entirely, pronouncing the f followed by the liquid retroflex r, which often functions like a vowel.

GAN violence? what fur?

Chicken (game)

Best response mapping and Nash equilibria

Nash equilibrium

Finding a Nash Equilibrium Is No Easier
Than Breaking Fiat-Shamir

DBT   model-paths


Personality pathology refers to enduring patterns of cognition, emotion, and behavior that negatively affect a person's adaptation. In psychiatry and clinical psychology, it is characterized by adaptive inflexibility, vicious cycles of maladaptive behavior, and emotional instability under stress. In the United States and elsewhere, personality disorders are diagnosed categorically on Axis II of the Diagnostic and Statistical Manual of Mental Disorders published by the American Psychiatric Association.

Memory leak

Memory Injection like a Boss

Path tracing rules

Columbia Public Health Path Analysis

Understanding Path Analysis

A Brief Introduction

Chicken (game)

Best response mapping and Nash equilibria

Roy's identity

subservient
The moral of the story is the need to respect the privacy and property of others and how your actions hurt others. What Goldilocks does by entering another's house and using their property is wrong

Chicken or the egg

Are you familiar with the notion of the chicken or the egg?

The crowning achievement of a remarkable life

Think of us as an early-stage incubation engine for technologies that are poised to target America’s #1 source of greenhouse gas emissions: the built environment. We do this by recruiting and fostering dynamic Innovator cohorts and giving them the coaching, mentoring and access to powerful public-private pipelines to help drive their early-stage building and energy technologies towards market and climate impact.

As a program funded by the Department of Energy and implemented by Berkeley Lab, our program relies on a rich collaboration network to reach new, diverse candidates who want to scale their groundbreaking technologies. Selected applicants will participate in a series of pitch coaching workshops, business seminars, mentoring connections with industry leaders, and real-world pitching opportunities through IMPEL’s partnership with Greentown Labs, the Department of Energy, and other collaborators.

Classification types

Do mushrooms really use language to talk to each other? A fungi expert investigates

Computer vision

APPLICATIONS OF MACHINE LEARNING IN OMICS AND COMPUTER VISION

Role of quorum sensing and chemical communication in fungal biotechnology and pathogenesis

Mycorrhizal network 

Pixel classification

The thresholds we applied both in Detecting tissue and Measuring areas introduce a bigger theme: Pixel classification.

In the same way that you can train an object classifier in QuPath, you can also train a pixel classifier.

A thresholder is a pixel classifier. In fact, it’s the simplest one QuPath provides – where the ‘training’ was simply adjusting parameters. But pixel classifiers can also do much more sophisticated things.

Introduction to biosensors

Detection of 3,4-Methylene Dioxy Amphetamine in Urine by Magnetically Improved Surface-Enhanced Raman Scattering Sensing Strategy

Potentiometric titration

Applied Machine Learning for Risk Management

Airlines

ATI is proud to support this Texas Exes program

Longhorn 100


Help us find the world's fastest growing Longhorn businesses


Nomination/application deadline:
December 10, 2022


Alumni from The University of Texas have created and guided some of the fastest growing businesses in the world. The Texas Exes is proud to recognize these amazing business owners and entrepreneurs through the Longhorn 100.

What is the Longhorn 100?

The Longhorn 100 identifies, recognizes, and celebrates the success of the 100 fastest growing Longhorn owned or led businesses in the world. Recipients will be honored at a special annual awards event in May, 2023.

Does my business qualify? Read the criteria and FAQs.

Please nominate or apply by Saturday, December 10.
 


From the weird city of the violet crown, world capital of live music,

You often hear Americans say that they are “pissed”, meaning that they are angry or annoyed. British people also use the phrase “pissed off”, which means the same thing. However, when someone from the UK says that someone is pissed (not “pissed off”), it actually means they are drunk.

Ammoniacal nitrogen

The world is facing helium shortage 4.0

When you are pissed off at so and so, consider inhaling a helium balloon and expressing your frustrations in drama therapy. Serenity Sells the best medicine.

Recent advances in the biosensors application for the detection of bacteria and viruses in wastewater

Serenity Sells medical biosensor innovations for
Saturday
,
November 19 2022 is

Ammonia (data page)

Can ammonia be used as a fuel?

Ammonia is the only potential alternative aviation fuel that allows a pathway for near-elimination of nitrogen oxides in engine exhaust,” he told Robb Report in an email. “In addition, ammonia can also greatly reduce formation of contrails that also impact earth's radiation balance.

NASA, Boeing, UCF to study zero-carbon ammonia jet fuel

Developing Sustainable Aviation Fuel (SAF)

Advanced Ionics, a climate-tech startup that hails from Milwaukee, Wisconsin, is striving to drive down the price of green hydrogen by slashing how much electricity is needed for electrolysis by as much as 50%

Advanced Ionics teases electrolysis innovation ‘to clean up’ the filthy hydrogen business

Flying car by California startup Alef attracts early Tesla investor

https://www.argo.ai/ FORD CORPORATE BOND (DEBT)
Commercialization plan as Adobe Python Honeywell TaaS FES-BOT pitch outlined in blog article/email threads

TaaS Teams as a Service, B2B PSF Grants, FES-BOT P3 as (R34) Quantum BIOMEDICAL APPLICATIONS (R21/R33): NIH Data Sciences Workspace, NIH Anaconda and Python, Determination of Exceptional Circumstances (DECs) Product manager: Jupyter Notebook SciENcv ORCID iD 0000-0002-2951-8976 Statement on Digital Data Management QuTiP Biophotonics, Quantum Molecular Biology BER BIOLOGICAL AND ENVIRONMENTAL RESEARCH BSSD

In Norse mythology, Fólkvangr (Old Norse: [ˈfoːlkˌwɑŋɡz̠], "field of the host"[1] or "people-field" or "army-field"[2]) is a meadow or field ruled over by the goddess Freyja where half of those that die in combat go upon death, whilst the other half go to the god Odin in Valhalla.

valkyrie ("chooser of the slain")

Hermitian matrix

Winged helmet

Hermitian Operators

QuTiP

Quantum Toolbox in Python

Operator (physics)


Saturday
,
November 19

 




The Python Package Index, abbreviated as PyPI and also known as the Cheese Shop, is the official third-party software repository for Python. It is analogous to CPAN, the repository for Perl. Some package managers, including pip, use PyPI as the default source for packages and their dependencies

Aaron's rod refers to any of the staves carried by Moses's brother, Aaron, in the Torah. The Bible tells how, along with Moses's rod, Aaron's rod was endowed with miraculous power during the Plagues of Egypt that preceded the Exodus. There are two occasions where the Bible tells of the rod's power.

Exodus 7:8-13
The staff is first mentioned in the Book of Exodus (chapter 4, verse 2), when God appears to Moses in the burning bush. God asks what Moses has in his hand, and Moses answers "a staff" ("a rod" in the KJV version). The staff is miraculously transformed into a snake and then back into a staff.

Mercy seat

Biopython

Biopython is a set of freely available tools for biological computation written in Python by an international team of developers.

Hermitian adjoint

Awesome ML Positive Unlabeled learning

Jewish symbolism

Fermi Lab Neutrino flavors

Enrico Fermi called the particle a neutrino and developed a theory of beta decay based on it, but it was not experimentally observed until 1956.

From the Pit to the Palace (Genesis 41:1-57)

DOE Office of Science: Contributions to Neutrino Science

TCEQ Controlling Nitrification in Public Water Systems with Chloramines

An integrated biosensor system with mobile health and wastewater-based epidemiology (iBMW) for COVID-19 pandemic

Smart Sanitation—Biosensors as a Public Health Tool in Sanitation Infrastructure

India: The Problem of Open Defecation

Biosensor for medical information one layer then biowaste as energy layer to pay for medical care for the homeless cowgirls on the range and Indians too.

Positive-unlabeled learning in bioinformatics and computational biology: a brief review

Wastewater: The Best Hidden Energy Source You’ve Never Heard Of

What would Benjamin Franklin Do? 
 
Jung and Politics: The Political and Social Ideas of C. G. Jung

Spintronics

What does spin mean in the Bible?
Spin in this verse is a reference to spinning thread, a labour-intensive but necessary part of making clothing. Spinning was traditionally women's work, something made explicit in Luke's version of this verse. This then is one of the few pieces of evidence that Jesus' message is meant equally for women as for men.
In 1971, Roman Catholic pacifist Eileen Egan coined the phrase "seamless garment" to describe a holistic reverence for life. The phrase is a Bible reference from John 19:23 to the seamless robe of Jesus, which his executioners left whole rather than dividing it at his execution.
Texas Throne thoughts on Smart Sanitation systems engineering
Community development financial institutions (CDFIs) are private financial institutions that are 100% dedicated to delivering responsible, affordable lending to help low-income, low-wealth, and other disadvantaged people and communities join the economic mainstream.
 

Statistics review 7: Correlation and regression

U.S. Debt and Foreign Loans, 1775–1795

What Is a War Chest?

Retiring members of Congress have $50 million in their campaign coffers. Where will it go?

Freud’s Shylock
DAVID HILLMAN

Some social conventions look less like a debate about asset classes and more like a religious cult. HAM, LEGION, PIGGYBACKING...

The Merchant of Venice

What is the symbolic meaning of throne?
 
throne, chair of state often set on a dais and surmounted by a canopy, representing the power of the dignitary who sits on it and sometimes conferring that power. ... In the ancient world, especially in the East, thrones almost invariably had symbolic magnificence.Throne is defined as the power of a king, or the chair where royalty sits. An example of a throne is where a queen sits in royal court. noun.

Surgery theory

A Basic Introductory to Surgery thoery

ALGEBRAIC AND GEOMETRIC SURGERY
by Andrew Ranicki 

An introduction to differential topology and surgery theory
Anthony Conway

Transfer learning

A Gentle Introduction to Transfer Learning for Deep Learning

Perform Net Surgery for Transfer Learning 

Transfer Learning in Keras with Computer Vision Models

Transfer learning & fine-tuning 

Public Utility Commission of Texas

Water Utility Information

Find a Water Utility

Emotional Intelligent AI Labor for corporate data governance of artificial neurons

By David Vincent Bell Hirsch

Competency-Based, Asynchronous, and Personalized

Strategic Communications Framework
for Statistical Institutions

Open Space Institute Funding

Green Infrastructure

In Norse mythology, Fólkvangr (Old Norse: [ˈfoːlkˌwɑŋɡz̠], "field of the host"[1] or "people-field" or "army-field"[2]) is a meadow or field ruled over by the goddess Freyja where half of those that die in combat go upon death, whilst the other half go to the god Odin in Valhalla.

valkyrie ("chooser of the slain")

Winged helmet

QuTiP

Quantum Toolbox in Python

/ gpt 

A Python toolkit for lattice field theory, quantum computing, and machine learning
In Norse mythology, Auðumbla is a primeval cow. The primordial frost jötunn Ymir fed from her milk, and over the course of three days she licked away the salty rime rocks and revealed Búri, grandfather of the gods and brothers Odin, Vili and Vé

Valknut

Endless knot

Sound Garden

Organs

In music, the organ is a keyboard instrument of one or more pipe divisions or other means for producing tones, each played with its own keyboard, played either with the hands on a keyboard or with the feet using pedals

And now for something completely different...

The 12 Organs of the human body are the integumentary, skeletal, muscular, nervous, endocrine, cardiovascular, lymphatic, respiratory, digestive, urinary, and reproductive systems. Only the reproductive system varies significantly between males and females

Oh really now?

Suspension of disbelief

You don't say.
A raga or raag is a melodic framework for improvisation akin to a melodic mode in Indian classical music.

'Raga' energy associated with "Shrati" (what the ear distinguishes) as the result of Tammas (centrifugal force) with Sattva (centripetal force) giving rise to (quantum) gravity (Hindu philophy).

Subhraag Singh

NIH SOUND HEALTH to NCATS

'the best physics arguments are very philosophical'

 - Chiara Maletto

Mexican Hat Curve for Hydrogen and Antihydrogen States SBIR Fusor, Fusion Power Deep Learning in the heart of Texas

By David Vincen Bell Hirsch
In the mathematics of chaos theory, a horseshoe map is any member of a class of chaotic maps of the square into itself. ... Most points eventually leave the square under the action of the map. They go to the side caps where they will, under iteration, converge to a fixed point in one of the caps.

In mathematics, in particular in knot theory, the Conway knot (or Conway's knot) is a particular knot with 11 crossings, named after John Horton Conway.[2]

It is related by mutation to the Kinoshita–Terasaka knot,[3] with which it shares the same Jones polynomial.[4][5] Both knots also have the curious property of having the same Alexander polynomial and Conway polynomial as the unknot.[6]

The issue of the sliceness of the Conway knot was resolved in 2020 by Lisa Piccirillo, 50 years after John Horton Conway first proposed the knot.[6][7][8] Her proof made use of Rasmussen's s-invariant, and showed that the knot is not a smoothly slice knot, though it is topologically slice (the Kinoshita–Terasaka knot is both).[9]

Molecular knot

Characterization of nanoparticles

NIST

Nanometrology

What is RPA? A revolution in business process automation

Robotic process automation

Scripting language

Types

Glue languages

Editor languages

A number of text editors support macros written either using a macro language built into the editor, e.g., The SemWare Editor (TSE), vi improved (VIM), or using an external implementation, e.g., XEDIT, or both, e.g., KEDIT. Sometimes text editors and edit macros are used under the covers to provide other applications, e.g., FILELIST and RDRLIST in CMS .

Job control languages and shells

Comparison with other programming paradigms

Procedure (mathematics)

In general, a procedure is a sequence of mathematical operations carried out in order. A solution procedure is a sequence of steps that, when taken, solves an equation. Procedures can also be visualized as flowcharts, where each step is connected by arrows.

What is UiPath?

Particle Physics Project Prioritization Panel (P5)Strategic Planning
2019

Buddha Akshobhya Puja Tuesday Morning

What does Akrodha mean?

puja, also spelled pooja or poojah, in Hinduism, ceremonial worship, ranging from brief daily rites in the home to elaborate temple rituals. The word puja is derived from the Dravidian pu (“flower”). In its simplest form, puja usually consists of making an offering of flowers or fruit to an image of a god.

By David V.B. Hirsch

Office of Science Funding Opportunities

Comparative Review

The annual HEP Comparative Review solicitation is for new or renewal proposals that are in direct support of research.

Current HHS Opportunities


Reflecting the Past,Shaping the Future:
Making AI Work for International Development

Google Rules of Machine Learning:

Best Practices for ML Engineering

Azure Machine Learning

AWS Machine Learning (ML)

Oracle Artificial Intelligence (AI)

Quantum Information Science (QIS)

Early QIS Applications

QIS 3 FAQ: M. Scope of Application

QIS: A Framework for Biomedical Database Federation


NSF-Approved Formats for Current and Pending Support

SciENcv: Science Experts Network Curriculum Vitae

Getting Started with SciENcv

LIGO - A Gravitational-Wave Interferometer

Future

LIGO-India

G2Net Gravitational Wave Detection

Find gravitational wave signals from binary black hole collisions

Indian Initiative in Gravitational-wave Observations

The Laser Interferometer Gravitational-Wave Observatory (LIGO) - India is a planned advanced gravitational-wave observatory to be located in India as part of the worldwide network, whose concept proposal is now under active consideration in India and the USA.

A 'bang' in LIGO and Virgo detectors signals most massive gravitational wave source yet

ISO/IEC JTC 1

ISO/IEC 27001

ISO/IEC 27001 and related standards

Information security management

Quantum Computing and Post-Quantum Cryptography

How to Verify a PayPal Account

Managed Account Verification

User Info API


The Qis|krypt⟩ is a software suite of protocols of quantum cryptography and quantum communications, as well, other protocols and algorithms, built using IBM's open-source Software Development Kit for quantum computing Qiskit.
/ qiskrypt Public

Elements of a mathematical model

Introduction to Algorithmic Differentiation

Data domain

7 SQL Concepts You Should Know For Data Science

Run SQL queries on Excel files

What is Tabular Data? (Definition & Example)

How to Create an Excel Connection to a SQL database

SQL, Python, and Excel for Data Science

How to Use SQL with Excel using Python 

Kaggle

IBM HR Analytics Employee Attrition & Performance

Employee Attrition Dataset 

Extract SQL tables, insert, update, and delete rows in SQL databases through SQLAlchemy

Connecting Pandas to a Database with SQLAlchemy

The Python SQL Toolkit and Object Relational Mapper

SPARQL Query

Create, read, update and delete (CRUD)

RESTful APIs

Types

Remote jobs for junior developers 
 
CSV Excel Small Business to SQL Big Business

Dear Dr. Dollar:

Some of my friends believe that the Federal Reserve and international bankers (Rothschilds, Rockefellers, etc.) run the world. They think the Federal Reserve was formed in secret and is pretty much a conspiracy. This is all hooked up with other conspiracy theories and rightwing views that make me uncomfortable. What do you think? Isn't the banking system part of the whole capitalist system? How does the Federal Reserve work; does it really have so much power?
—Carol Brown, New York, N.Y.

The Holocaust and the Bush family fortune

By Bill Van Auken
5 December 2018 

The Color of Law A Forgotten History of How Our Government Segregated America

2 Maccabees

By Daniel R. Schwartz

...King Seleucus to audit the Treasury...

Seleucus I Nicator

Daniel R. Schwartz

2 Maccabees 4 

HOLC is often cited as the originator of mortgage Redlining 

The Homeowners Refinancing Act (also known as the Home Owners' Loan Act of 1933 and the Home Owners' Loan Corporation Act) was an Act of Congress of the United States passed as part of Franklin Delano Roosevelt's New Deal during the Great Depression to help those in danger of losing their homes. The act, which went into effect on June 13, 1933, provided mortgage assistance to homeowners or would-be homeowners by providing them money or refinancing mortgages.

Sponsored by Senate Majority Leader Joe Robinson of Arkansas, it also created the Home Owners' Loan Corporation (HOLC), building on Herbert Hoover's Federal Loan Bank Board. The Corporation lent low-interest money to families in danger of losing their homes to foreclosure. By the mid-1930s, the HOLC had refinanced nearly 20% of urban homes in the country
 
In the United States, redlining is the systematic denial of various services by federal government agencies, local governments as well as the private sector either directly or through the selective raising of prices. 

In November 1910, six men – Nelson Aldrich, A. Piatt Andrew, Henry Davison, Arthur Shelton, Frank Vanderlip and Paul Warburg – met at the Jekyll Island Club, off the coast of Georgia, to write a plan to reform the nation's banking system.

Nelson Aldrich, the senator, and three bankers he picked --Harry Davidson, Paul Warburg, Frank Vanderlip -- and economist Piatt Andrew (then at the Treasury) Source is Roger Lowenstein's new very readable book, "America's Bank: The Epic Struggle to Create the Federal Reserve."

Pharisee and the Publican 

What families own the Federal Reserve Bank?

 

 


 

 

 

noun

  1. 1.
    a person who vigorously supports their country and is prepared to defend it against enemies or detractors.

“If the American people ever allow private banks to control the issue of their currency, first by inflation, then by deflation, the banks…will deprive the people of all property until their children wake-up homeless on the continent their fathers conquered…. The issuing power should be taken from the banks and restored to the people, to whom it properly belongs.” – Thomas Jefferson in the debate over the Re-charter of the Bank Bill (1809)

“I believe that banking institutions are more dangerous to our liberties than standing armies.” –Thomas Jefferson

“… The modern theory of the perpetuation of debt has drenched the earth with blood, and crushed its inhabitants under burdens ever accumulating.” -Thomas Jefferson

“History records that the money changers have used every form of abuse, intrigue, deceit, and violent means possible to maintain their control over governments by controlling money and its issuance.” -James Madison

“If congress has the right under the Constitution to issue paper money, it was given them to use themselves, not to be delegated to individuals or corporations.” -Andrew Jackson

Six hundred billion dollars approximately equals the budget for the United States Department of Defense for an entire year — enough to pay, feed, and house over 1,000,000 active duty service personnel and 800,000 reservists, operate close to 1,000 military bases, pay 750,000 civilian personnel, and fund all military equipment purchases.

That $600 billion also equals the combined wealth now hoarded by just five American families — specifically, the Walton, Bezos, Koch, Gates, and Mars clans.

“The Government should create, issue, and circulate all the currency and credits needed to satisfy the spending power of the Government and the buying power of consumers. By the adoption of these principles, the taxpayers will be saved immense sums of interest. Money will cease to be master and become the servant of humanity.” -Abraham Lincoln

“Issue of currency should be lodged with the government and be protected from domination by Wall Street. We are opposed to…provisions [which] would place our currency and credit system in private hands.” – Theodore Roosevelt

Despite these warnings, Woodrow Wilson signed the 1913 Federal Reserve Act. A few years later he wrote: “I am a most unhappy man. I have unwittingly ruined my country. A great industrial nation is controlled by its system of credit. Our system of credit is concentrated. The growth of the nation, therefore, and all our activities are in the hands of a few men. We have come to be one of the worst ruled, one of the most completely controlled and dominated Governments in the civilized world no longer a Government by free opinion, no longer a Government by conviction and the vote of the majority, but a Government by the opinion and duress of a small group of dominant men.” -Woodrow Wilson

Years later, reflecting on the major banks’ control in Washington, President Franklin Roosevelt paid this indirect praise to his distant predecessor President Andrew Jackson, who had “killed” the 2nd Bank of the US (an earlier type of the Federal Reserve System). After Jackson’s administration the bankers’ influence was gradually restored and increased, culminating in the passage of the Federal Reserve Act of 1913. Roosevelt knew this history.

The real truth of the matter is,as you and I know, that a financial
element in the large centers has owned the government ever since
the days of Andrew Jackson… -Franklin D. Roosevelt
(in a letter to Colonel House, dated November 21, 1933) 

U.S. Department of the Treasury

The Treasury OIG provides independent oversight of the Department and all of its bureaus except the Internal Revenue Service and activities related to the Troubled Asset Relief Program. Through its audit program, Treasury OIG performs engagements designed to promote economy, efficiency, and effectiveness in Treasury’s programs and operations and to detect fraud, waste, and abuse. 

The Meeting at Jekyll Island

November 20, 1910–November 30, 1910

A secret gathering at a secluded island off the coast of Georgia in 1910 laid the foundations for the Federal Reserve System.

Rumours of a link between the US first family and the Nazi war machine have circulated for decades. Now the Guardian can reveal how repercussions of events that culminated in action under the Trading with the Enemy Act are still being felt by today's president

Palm duality random spider walk in the valley of stability

By David Vincent Bell Hirsch

Federal Breaches and COBOL – the OPM Hack Explained

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

Two separate "penetrations" exposed 14 million people's personal info.

IBM CICS (Customer Information Control System) is a family of mixed-language application servers that provide online transaction management and connectivity for applications on IBM mainframe systems under z/OS and z/VSE.
bWAPP, or a buggy web application, is a free and open source deliberately insecure web application.
It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities.

Kali Linux

Kali Docs

QSAM file buffering questions

Top 11 Google Search APIs: 

The following APIs retrieve search results from Google while being extremely developer-friendly, and are easily accessible. These APIs all have their own benefits to offer. Comparing them with each other will help you decide which API works best for your needs: 

  1. SerpsBot
  2. Google Custom Search API
  3. SerpApi
  4. SerpWow
  5. GeoRanker API
  6. Serpstack
  7. Zenserp
  8. Data For SEO Serp API
  9. SerpHouse
  10. Rapid API’s Google Serp API
  11. Scaleserp

LDAP Injection

LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input

Log4j vulnerabilities status for Visual COBOL, COBOL Server, COBOL Analyzer

COBOL static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your COBOL code

Memory safety

PU Learning Tutorial

An introductory tutorial to the "Learning from Positive and Unlabeled Data" field.

Garbage collection (computer science)

What are SQL Queries?

GnuCOBOL FAQ


Welcome to PyCaret

An open-source, low-code machine learning library in Python

PyCaret

Introduction to Pika

Pika is a pure-Python implementation of the AMQP 0-9-1 protocol that tries to stay fairly independent of the underlying network support library.


Pika is a Python implementation of the AMQP 0-9-1 protocol for RabbitMQ.

RabbitMQ is an open-source message-broker software (sometimes called message-oriented middleware) that originally implemented the Advanced Message Queuing Protocol (AMQP) and has since been extended with a plug-in architecture to support Streaming Text Oriented Messaging Protocol (STOMP), MQ Telemetry Transport (MQTT), and other protocols.[1]

Written in Erlang, the RabbitMQ server is built on the Open Telecom Platform framework for clustering and failover. Client libraries to interface with the broker are available for all major programming languages. The source code is released under the Mozilla Public License.

/ RabbitSSL

What is RPA? A revolution in business process automation

Robotic process automation

Scripting language

Types

Glue languages

Editor languages

A number of text editors support macros written either using a macro language built into the editor, e.g., The SemWare Editor (TSE), vi improved (VIM), or using an external implementation, e.g., XEDIT, or both, e.g., KEDIT. Sometimes text editors and edit macros are used under the covers to provide other applications, e.g., FILELIST and RDRLIST in CMS .

Job control languages and shells

Address space layout randomization

Address space layout randomization (ASLR)

Solidity

Introduction to Smart Contracts

Solidity

Solidity is an object-oriented, high-level language for implementing smart contracts. Smart contracts are programs which govern the behaviour of accounts within the Ethereum state.

Solidity is a curly-bracket language designed to target the Ethereum Virtual Machine (EVM). It is influenced by C++, Python and JavaScript. You can find more details about which languages Solidity has been inspired by in the language influences section.

Dictionaries, HashMaps and Associative Arrays

Working with the Database Backend in OWL

Java collections framework

If you're interested in learning about the Realtime Database, but come from a more traditional SQL background, this series of vidoes from the Firebase YouTube channel might be of interest to you.

Maximum concurrent requests per instance (services)

Serve dynamic content and host microservices using Firebase Hosting

React – A JavaScript library for building user interfaces

React Patterns: The Container pattern

To give you a gentle introduction, React is an open-source JavaScript library used for frontend development, which was developed by Facebook. Its component-based library lets you build high-quality user-interfaces for web apps. This library allows you to place HTML code inside JavaScript and it works with Virtual DOM.

A comprehensive guide to getting started with React JS and start building amazing front-end user-interfaces. 

React Front-End Development

SPARQL queries

Gene Ontology is developing Ontologies and Frameworks to help annotate biology in a consistent way and help users to integrate and reuse our data in their approaches

SPARQL to query GO-CAMs

Gene Ontology Causal Activity Model (or GO-CAM)

Python REST APIs With Flask, Connexion, and SQLAlchemy – Part 3

Canon 915

In the New Testament the word pharmekeia occurs three times (Gal 5:19-21; Rev 9:21; 18:23). Each time, it is translated as ‘sorcery’ or ‘magic’ and it is something that is spoken of in negative terms.

4You cover up your ignorance with lies;
    you are like doctors who can't heal anyone.
Say nothing, and someone may think you are wise!

Listen while I state my case.

Aniconism is the absence of material representations of both the natural and supernatural ... Today, the concept of an aniconic Islam coexists with a daily life for Muslims awash with images. ... of living beings in Islamic countries a modern phenomenon or due to current technology, westernization or the cult of the personality.
may say that by calling poetry “mimesis,” Plato was at the very least calling attention to ... 19 “The Naming of Parts” is the subtitle (Part I) of Henry Reed's famous anti-war poem “Lessons of the. War. ... uses in a lesson about the value of autodidactic persistence. ... inmost shrine of an aniconic cult” (“The Labyrinth” 126).
by Jason Thompson
The phenomenon is generally codified by religious traditions and as such it becomes a taboo. When enforced by the physical destruction of images, aniconism becomes iconoclasm. The word itself derives from Greek εικων 'image' with the negative prefix an- (Greek privative alpha) and the suffix -ism (Greek -ισμος).

Cult of personality

American Idol?

Byzantine Iconoclasm

Shirk (Islam)

In Islam, shirk (Arabic: شركširk) is the sin of idolatry or polytheism (i.e., the deification or worship of anyone or anything besides Allah).[1]

David Koresh in Texas

Reap what you sow
Rabi crops or rabi harvest are agricultural crops that are sown in winter and harvested in the spring in India.

In Judaism, a rabbi is a teacher of Torah, for priestly space sake!

It is a complex Laccanian Loop as an Enless Knot...

mathematical map makings for considering Bezalel, Bezaleel, or Betzalel with the nemesis mentioned in Matthew 12 Beelzebul and then the Key of Solomon as well

cHis tail drew a third dof the stars of heaven eand threw them to the earth. And the dragon stood fbefore the woman who was ready to give birth, gto devour her Child as soon as it was born. She bore a male Child hwho was to rule all nations with a rod of iron. And her Child was icaught up to God and His throne. Then jthe woman fled into the wilderness, where she has a place prepared by God, that they should feed her there kone thousand two hundred and sixty days.

Revelation 12:4–9 

Satan Thrown Out of Heaven

And war broke out in heaven: lMichael and his angels fought mwith the dragon; and the dragon and his angels fought, but they 1did not prevail, nor was a place found for 2them in heaven any longer. So nthe great dragon was cast out, othat serpent of old, called the Devil and Satan, pwho deceives the whole world; qhe was cast to the earth, and his angels were cast out with him.

Belial

BELIAL came last, than whom a Spirit more lewd
Fell not from Heaven, or more gross to love
Vice for it self: To him no Temple stood
Or Altar smoak'd; yet who more oft then hee
In Temples and at Altars, when the Priest
Turns Atheist, as did ELY'S Sons, who fill'd
With lust and violence the house of God.
In Courts and Palaces he also Reigns
And in luxurious Cities, where the noyse
Of riot ascends above thir loftiest Towrs,
And injury and outrage: And when Night
Darkens the Streets, then wander forth the Sons
Of BELIAL, flown with insolence and wine.
Witness the Streets of SODOM, and that night
In GIBEAH, when hospitable Dores
Yielded thir Matrons to prevent worse rape.

John Milton, Paradise Lost, Book 2:

... On th' other side up rose
BELIAL, in act more graceful and humane;
A fairer person lost not Heav'n; he seemd
For dignity compos'd and high exploit:
But all was false and hollow; though his Tongue
Dropt Manna, and could make the worse appear
The better reason, to perplex and dash
Maturest Counsels: for his thoughts were low;
To vice industrious, but to Nobler deeds
Timorous and slothful: yet he pleas'd the eare...

Belial, fictional character, a fallen angel in John Milton's Paradise Lost (in 10 books, 1667; in 12 books, 1674) who tries to persuade the others to be more discreet so that their unacceptable behaviour is less conspicuous.

Paradise Lost Data Visualization and Sentiment Analysis

idiom   very informal
to be very poor:
Any help we can offer them will be appreciated. They don't have a pot to piss in.

The fallen angels are named after entities from both Christian and Pagan mythology, such as Moloch, Chemosh, Dagon, Belial, Beelzebub and Satan himself. Following the canonical Christian narrative, Satan convinces other angels to live free from the laws of God, thereupon they are cast out of heaven.

Evil is the absence or lack ("privation") of good. It is typically attributed to St. Augustine of Hippo, who wrote: ... Just in the same way, what are called vices in the soul are nothing but privations of natural good.
In Catholic canon law, an interdict (/ˈɪntərdɪkt/) is an ecclesiastical censure, or ban that prohibits persons, certain active Church individuals or groups from participating in certain rites, or that the rites and services of the church are banished from having validity in certain territories for a limited or extended time.
According to Dr. Jerry Robison in his book, "Strongman's his name... What's his game?" Says that there are 16 biblically named demonic spirits. So let us look at what scriptural prescription we can give for the deliverance eviction and restoration of a bound/oppressed person. He lists the principality and then the underlies or activities of that spirit, he also lists what to bind and what to loose. Because when you clean a demon out of a person they must be filled up so that the devil won't come back and find that person empty and make it seven times worse.

Mental Illness, Evil Spirits, and Scripture

THE SPIRIT OF POVERTY
Copyright 2004 Gene Brooks

The Mark of a Champion Website

The Bible teaches about poverty and its effec
ts on people. To write or speak about a spirit of poverty does not fall into the arena of prosperity teaching. A spirit of poverty has nothing to do with how much anyone owns, what they eat or wear. A spirit of poverty can oppress, and not infrequently does, wealthy people. Many people below the "poverty level" are not oppressed by this spirit. It has nothing to do with wealth or lack of it. It is related to greed and fear of loss. A spirit of poverty can be defined as a demonic spirit empowered by iniquity and sin in the areas of giving and receiving. It operates generationally through iniquity, therefore it is a familiar (or family-line) spirit. This spirit is related to
Belial, the destroyer, described in Psalm 18:4 and 2 Corinthians 6:15. A spi
rit of poverty is a condition in a person, a people, and / or a land.
Manifestations:
LAZINESS -- Proverbs 6:11; 10:4; 13:18; 14:23; 19:15; 24:30-34. GREED -- Ecclesiastes 5:10, 13; Matthew 6:24; 13:22; Mark 10:22; Luke 15:13; 16:13; Colossians 3:5; 1 Timothy 3:3; 6:10, 17; James 5:2-3; Hebrews 13:5; 1Peter 5:2 LOOTING, STEALING -- Exodus 20:15; Leviticus 19:11; Deuteronomy 5:19; Proverbs 13:11; Luke 3:14; Ephesians 4:28 CONCEALING SIN -- Proverbs
28:13 LACK OF GENEROSITY
-- Proverbs 11:26; 28:22; Ecclesiastes 5:13

WHAT DEFEATS / DESTROYS A SPIRIT OF POVERTY
LOOK TO TRUE SOURCE
-- Deuteronomy 8:17-18; Proverbs 22:4; Psalm 23:1; 34:9 GIVING TO THE LORD -- Proverbs 3:9; Malachi 3:8-10; Matthew 6:31-33; 1 Corinthians 16:2 God does not need our monies -- Romans 11:35; Giving releases resources) GIVING TO THE POOR -- Proverbs 19:17; 28:27 HARD WORK -- Proverbs 21:5; 27:23-27; 28:19 GENEROSITY -- Psalm 112:5; Proverbs 11:24-25; 22:9; Mark 12:44; Luke 6:38;21:4; 2 Corinthians 8:2, 9; 1 Timothy 6:18 OBEDIENCE TO THE WORD OF GOD -- Deuteronomy 5:33; 28:1-6; 29:9; 30:9-
10; Joshua 1:8; 1 Kings 2:3; Psalm 1:3; 128:2; Proverbs 3:2; 13:21; 16:20; 17:20;
19:8; 21:21; 28:13, 25

Fallen angel

Seven deadly sins

Sloth Acedia Accidia Diligence Industria Diligenza

Confession patterns

Confession is the act of admitting the commission of a deadly sin to a priest who, in turn, will forgive the person in the name (in the person) of Christ, give a penance to make up for the sin's offence (partially), and advise the person on what he or she should do afterwards.[tone]

According to a 2009 study by the Jesuit scholar Fr. Roberto Busa, the most common deadly sin confessed by men is lust and the most common deadly sin confessed by women is pride.[63] It was unclear whether these differences were due to the actual number of transgressions committed by each sex or whether differing views on what "counts" or should be confessed caused the observed pattern

Cardinal virtues

Paradise Explained, Meaning Lost

A Nonsensically Annotated Edition of Milton's Epic

nlp/resources/corpora/gutenberg/milton-paradise.txt

Lacan asserted, <“I have never said that the unconscious was an assemblage of words but that the unconscious is precisely structured.” “The meaning of a return to Freud is a return to the meaning of Freud.”

GOO GOO Cluster (what the cookie?) Analysis for Analytic geometry GAGA
GOGO GADGET

In telecommunications, asynchronous communication is transmission of data, generally without the use of an external clock signal, where data can be transmitted intermittently rather than in a steady stream.[1] Any timing required to recover data from the communication symbols is encoded within the symbols.

The most significant aspect of asynchronous communications is that data is not transmitted at regular intervals, thus making possible variable bit rate, and that the transmitter and receiver clock generators do not have to be exactly synchronized all the time. In asynchronous transmission, data is sent one byte at a time and each byte is preceded by start and stop bits.

Collective unconscious

Create A Compiler Step-By-Step

Assembly, Disassembly and Emulation using Python

Learn how to use Keystone engine, Capstone engine and Unicorn engine to assemble, disassemble and emulate machine code (ARM, x86-64 and more) in Python
Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework. 
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86) 

Algebraic geometry and analytic geometry

GAGA

Architecture

According to Pree,[8] software frameworks consist of frozen spots and hot spots. Frozen spots define the overall architecture of a software system, that is to say its basic components and the relationships between them. These remain unchanged (frozen) in any instantiation of the application framework. Hot spots represent those parts where the programmers using the framework add their own code to add the functionality specific to their own project.

In an object-oriented environment, a framework consists of abstract and concrete classes. Instantiation of such a framework consists of composing and subclassing the existing classes.[9]

The necessary functionality can be implemented by using the Template Method Pattern in which the frozen spots are known as invariant methods and the hot spots are known as variant or hook methods. The invariant methods in the superclass provide default behaviour while the hook methods in each subclass provide custom behaviour.

When developing a concrete software system with a software framework, developers utilize the hot spots according to the specific needs and requirements of the system. Software frameworks rely on the Hollywood Principle: "Don't call us, we'll call you."[10][11] This means that the user-defined classes (for example, new subclasses) receive messages from the predefined framework classes. Developers usually handle this by implementing superclass abstract methods.

See also

Markov chains

For an ergodic reversible Markov chain with an underlying graph G, the conductance is a way to measure how hard it is to leave a small set of nodes. Formally, the conductance of a graph is defined as the minimum over all sets of the capacity divided by the ergodic flow out. Alistair Sinclair showed that conductance is closely tied to mixing time in ergodic reversible Markov chains.


Conductance is related to Markov chain mixing time in the reversible setting.

See also

Lacan considered the human psyche to be framed within the three orders of The Imaginary, The Symbolic and The Real (RSI).[6]

Lacanianism or Lacanian psychoanalysis is a theoretical system that explains the mind, behaviour, and culture through a structuralist and post-structuralist extension of classical psychoanalysis, initiated by the work of Jacques Lacan from the 1950s to the 1980s.
Athletic art of skateboarding for the science of mathematics and quantum physics.
Free association (psychology), a technique of psychoanalysis devised by Sigmund Freud

Now, check your Yiddish and dance numbers for fun festivities dudes,

In German folklore, a drude is a kind of malevolent nocturnal spirit associated with nightmares, prevalent especially in Southern Germany.
צייט איז געלט
tseyt iz gelt

Imaginary time

Time is money... put it in a Pauli Matrix, Drude, okay you electrons, you go from the source to the drain in the channel in a Brownian motion random walk (drunken dance for Purim) as such

Pauli matrices

Diagonal matrix

Scalar matrix

Spin matrix

The term spin matrix refers to a number of matrices, which are related to spin (physics).

We may consider quantum chemistry, and quantum biology in tangents

5.61 Physical Chemistry 24 Pauli Spin Matrices

Quantum mechanics and pure mathematics

See also

In pure mathematics and physics:

consider King David doing a dance as well Lord Shiva comparison contrast Joseph Campbell Hero's Journey,

2 Samuel 6:14-22

sort of like Lord Shiva

Tandava

as

Creation and annihilation operators

with Jacobs

Ladder operator

as to

Jacob wrestling with the angel

as seals for the mint of our Treasury to consider with the Hemp as commodity money in US Treasury notes as well with the Mint for coinage with US Postage Stamps for US Navy Seals of approval of Hemp Treasury notes and a Stamp Out Violence Swords to Plowshares campaign in the Chinese year of the Metal Ox (like a Rave Rock concert too for the kids to enjoy), how's about that 2021 Pi day recipe eh? (this was back around Pi day 2021)

Achaemenid coinage

The Achaemenid Empire issued coins from 520 BCE–450 BCE to 330 BCE. The Persian daric was the first gold coin which, along with a similar silver coin, the siglos (from Ancient Greek: σίγλος, Hebrew: שֶׁקֶל‎, shékel) represented the first bimetallic monetary standard.[5] It seems that before the Persians issued their own coinage, a continuation of Lydian coinage under Persian rule is likely. Achaemenid coinage includes the official imperial issues (Darics and Sigloi), as well as coins issued by the Achaemenid provincial governors (satraps), such as those stationed in Asia Minor.
coffers, a treasury; funds: The coffers of the organization were rapidly filled by the contributions. any of various boxlike enclosures, as a cofferdam. Also called caisson, lacunar. Architecture. one of a number of sunken panels, usually square or octagonal, in a vault, ceiling, or soffit.

Time is Imaginary Money:

 

The Theory of Imaginary Money from Charlemagne to the French Revolution

What is that Darius coin doing behind your ear?

Multiple time dimensions

Lacanianism considerations...

A war chest is a metaphor for any collection of tools or money intended to be used in a challenging or dangerous situation. Historically, it referred to the chest located in the homes or barracks of soldiers, in which the soldier kept arms and armor. In the modern era, it more often refers to a collection of funds (or less occasionally special tools or equipment) intended to allow a person or organization to get through a situation that requires much more readiness or money than usual.

A New Refutation of Time: Borges on the Most Paradoxical Dimension of Existence

“Time is the substance I am made of. Time is a river which sweeps me along, but I am the river; it is a tiger which destroys me, but I am the tiger; it is a fire which consumes me, but I am the fire.”

By Maria Popova

Clifford A. Pickover

American author

Who has time to build a time machine in order to optimize the number of naps one may get in a life span.... octogenarians?

Thank you grandfather Harry Hirsch

Houston 610 Loop note

1 Timothy 6:10, NASB: "For the love of money is a root of all sorts of evil, and some by longing for it have wandered away from the faith and pierced themselves with many griefs."
Perhaps we may philosophize like a Jesuit

Noosphere

The noosphere (alternate spelling noösphere) is a philosophical concept developed and popularized by the Russian and Ukrainian biogeochemist Vladimir Vernadsky, and the French philosopher and Jesuit priest Pierre Teilhard de Chardin. Vernadsky defined the noosphere as the new state of the biosphere[1] and described as the planetary "sphere of reason".[2][3] The noosphere represents the highest stage of biospheric development, its defining factor being the development of humankind's rational activities.[4]

The word is derived from the Greek νόος ("mind", "reason") and σφαῖρα ("sphere"), in lexical analogy to "atmosphere" and "biosphere".[5] The concept, however, cannot be accredited to a single author. The founding authors Vernadsky and de Chardin developed two related but starkly different concepts, the former being grounded in the geological sciences, and the latter in theology. Both conceptions of the noosphere share the common thesis that together human reason and the scientific thought has created, and will continue to create, the next evolutionary geological layer. This geological layer is part of the evolutionary chain.[6][7] Second generation authors, predominantly of Russian origin, have further developed the Vernadskian concept, creating the related concepts: noocenosis and noocenology.[8]

Here is a little different variation of a Noosphere for you Jesuit Chardin, a nanosphere
alright you Bachelor's
(was emailing associates, family, friends)

The word "cobalt" is derived from "Kobold," the name of a mischievous goblin in German mythology who, by the way, was closely related to another sprite called "Nickel." Kobold was not really evil, but he loved to tease humans.
In German folklore, a drude is a kind of malevolent nocturnal spirit associated with nightmares, prevalent especially in Southern Germany.

Laplace's demon

Laplace operator

Del squared

  • Del, a vector calculus differential operator
  • Nabla symbol, the symbol used for the Del operator
  • , the partial derivative operator symbol

what/how/why the devil

Laplacian matrix

SciPy

SciPy | Curve Fitting

scipy.optimize.curve_fit

Maxwell's demon is a thought experiment created by the physicist James Clerk Maxwell in 1867 in which he suggested how the second law of thermodynamics might hypothetically be violated. Second law of thermodynamics for Bachelors to consider

Social entropy

Social entropy is a sociological theory that evaluates social behaviours using a method based on the second law of thermodynamics.[1] The equivalent of entropy in a social system is considered to be wealth or residence location.[2] The theory was introduced by Kenneth D. Bailey (sociologist) in 1990.[3]

What is the fabric of society?
 
The fabric of a society or system is its basic structure, with all the customs and beliefs that make it work successfully. The fabric of society has been deeply damaged by the previous regime. Synonyms: framework, structure, make-up, organization More Synonyms of fabric.

What is the moral fabric of society?
 
With the moral fabric of society held in place, the people of that society share a standard of dignity with each other. This standard of dignity is what helps businesses work well with their customers and treat them well. This standard also helps in the political aspect

Social fabric means a country's basic structure, way of life, traditions, customs, and beliefs
 
 

 
 
 
 
What is moral Fibre?
 
Moral fibre is the quality of being determined to do what you think is right. ... a man of stern moral fibre. ... the destruction of the moral fibre of the nation.

Gresham's law

In economics, Gresham's law is a monetary principle stating that "bad money drives out good". For example, if there are two forms of commodity money in circulation, which are accepted by law as having similar face value, the more valuable commodity will gradually disappear from circulation. 
 
What is moral fabric?

The people of a society share a standard dignity through high morals making the moral fabric a keystone; keeping the arch of society and the morals it holds high-together. Submitted By:DavedWachsman3 - 21/03/2013.

Dirichlet series

Analytic properties

Caltech Mathematicians Solve 19th Century Number Riddle – Finally Prove “Patterson’s Conjecture”

Database helpers

Object Relational Tutorial (1.x API)

Python and MongoDB: Connecting to NoSQL Databases

pandas.DataFrame.to_sql 

Python - NoSQL Databases

Azure Cosmos DB Python examples

A backend engineer is responsible for designing, building, and maintaining the server-side of web applications. In other words, a backend engineer's primary responsibility is to build the structure of a software application. They set the software team's foundations of what they need to do to achieve the main goals.

Dependent and independent variables

Statistics

NIH Dependent and Independent Variables

Difference Between Hadoop and Spark

Independent and Dependent Variables: Differences & Examples

Dimensionality reduction

Feature projection

Regression - Features and Labels

A quick look at some basic stuff essential to understand how parameters are learned.

Error Parameters

Bias–variance tradeoff

k-nearest neighbors

MLRUN

Pleasure principle (psychology)

Electra complex

MLflow Models

An MLflow Model is a standard format for packaging machine learning models that can be used in a variety of downstream tools—for example, real-time serving through a REST API or batch inference on Apache Spark. The format defines a convention that lets you save a model in different “flavors” that can be understood by different downstream tools.

Spaces

Hugging Face Spaces offer a simple way to host ML demo apps directly on your profile or your organization’s profile.

Spaces Overview

Research Methods in Psychiatry

Deploy a model to an Azure Kubernetes Service cluster with v1

Kubernetes containerization is the utilization of the Kubernetes open source tool to automate the deployment, scaling, and management of containers without launching virtual machines for any applications.

A quick guide to deploying an ML model with FastAPI and easily containerizing it within VSCode itself.

Fine-tune a 🤗 Transformers model

Working with Json fields

Using Nylon for Creating Machine Learning Model in Natural Language Representation

Wrapper library

Glue logic

GitLab Stages of Auto DevOps
all tiers

CreateEndpoint

AWS SageMaker Endpoint as REST service with API Gateway

Unified Model Serving Framework

What is BentoML?

Encode and Escape Data

Encoding and escaping untrusted data to prevent injection attacks

Encode and Escape Data

Redis

Real‑time model management and deployment for ML

Databricks

Real-Time Machine Learning with Redis, Apache Spark, Tensor Flow, and more

Databricks Deploying Real-Time Decision Services Using Redis

Do your duties without attachment?

Do your duty without attachment. You have a right to perform your prescribed duty, but you are not entitled to the fruits of action. Never consider yourself to be the cause of the results of your activities, and never be attached to not doing your duty.

A capsid is the protein shell of a virus, enclosing its genetic material. It consists of several oligomeric (repeating) structural subunits made of protein called protomers. The observable 3-dimensional morphological subunits, which may or may not correspond to individual proteins, are called capsomeres. The proteins making up the capsid are called capsid proteins or viral coat proteins (VCP). The capsid and inner genome is called the nucleocapsid.

Capsids are broadly classified according to their structure. The majority of viruses have capsids with either helical or icosahedral[2][3] structure. Some viruses, such as bacteriophages, have developed more complicated structures due to constraints of elasticity and electrostatics.[4] The icosahedral shape, which has 20 equilateral triangular faces, approximates a sphere, while the helical shape resembles the shape of a spring, taking the space of a cylinder but not being a cylinder itself.[5] The capsid faces may consist of one or more proteins. For example, the foot-and-mouth disease virus capsid has faces consisting of three proteins named VP1–3.[6]

Some viruses are enveloped, meaning that the capsid is coated with a lipid membrane known as the viral envelope. The envelope is acquired by the capsid from an intracellular membrane in the virus' host; examples include the inner nuclear membrane, the Golgi membrane, and the cell's outer membrane.[7]

Once the virus has infected a cell and begins replicating itself, new capsid subunits are synthesized using the protein biosynthesis mechanism of the cell. In some viruses, including those with helical capsids and especially those with RNA genomes, the capsid proteins co-assemble with their genomes. In other viruses, especially more complex viruses with double-stranded DNA genomes, the capsid proteins assemble into empty precursor procapsids that includes a specialized portal structure at one vertex. Through this portal, viral DNA is translocated into the capsid.[8]

Structural analyses of major capsid protein (MCP) architectures have been used to categorise viruses into lineages. For example, the bacteriophage PRD1, the algal virus Paramecium bursaria Chlorella virus (PBCV-1), mimivirus and the mammalian adenovirus have been placed in the same lineage, whereas tailed, double-stranded DNA bacteriophages (Caudovirales) and herpesvirus belong to a second lineage

Final Report: Crime Modeling
Lotka-Volterra Model
 
Fireship, a naval tactic of intentional suicidal ramming into an enemy ship

Killing vector field

The Fisher-information matrix is used to calculate the covariance matrices associated with maximum-likelihood estimates. It can also be used in the formulation of test statistics, such as the Wald test.

Statistical systems of a scientific nature (physical, biological, etc.) whose likelihood functions obey shift invariance have been shown to obey maximum Fisher information. The level of the maximum depends upon the nature of the system constraints. 

Viral envelope

Context:

ARC: Activity-regulated cytoskeleton-associated protein

The Ark of the Covenant (Hebrew: אָרוֹן הַבְּרִית, Modern: Arōn Ha'brēt, Tiberian: ʾĀrôn Habbərîṯ; Koinē Greek: Κιβωτός της διαθήκης), also known as the Ark of the Testimony, and in a few verses across various translations as the Ark of God, is a gold-covered wooden chest with lid cover described in the Book of Exodus as containing the two stone tablets of the Ten Commandments. According to various texts within the Hebrew Bible, it also contained Aaron's rod and a pot of manna. In the Christian New Testament, Hebrews 9:4 reads that "The ark of the covenant [was] covered on all sides with gold, in which was a golden jar holding the manna, and Aaron's rod which budded, and the tablets of the covenant."

Raiders of the Lost Ark (later marketed as Indiana Jones and the Raiders of the Lost Ark) is a 1981 American action-adventure film directed by Steven Spielberg and written by Lawrence Kasdan from a story by George Lucas and Philip Kaufman.

Cauchy–Schwarz inequality

It is considered to be one of the most important inequalities in all of mathematics.

Hypergeometric function

Schwarz triangle maps

Schwartz kernel theorem

Nuclear space

Schwartz space

Nuclear operator

Cardiac muscle cell



some funny names indeed,

Crystal habit

In mineralogy, crystal habit is the characteristic external shape of an individual crystal or crystal group. The habit of a crystal is dependent on its crystallographic form and growth conditions, which generally creates irregularities due to limited space in the crystallizing medium (commonly in rocks).

Bob Newhart-Stop It

In crystallography, the monoclinic crystal system is one of the 7 crystal systems. A crystal system is described by three vectors. In the monoclinic system, the crystal is described by vectors of unequal lengths, as in the orthorhombic system. They form a rectangular prism with a parallelogram as its base
In crystallography, the triclinic crystal system is one of the 7 crystal systems. A crystal system is described by three basis vectors. In the triclinic system, the crystal is described by vectors of unequal length, as in the orthorhombic system.

The 7 Crystal Systems. The structures of all crystals can be classified according to the symmetry of the unit cells. There are in total 7 groups, collectively called Crystal Systems: Tricinic, Monoclinic, Orthorhombic, Tetragonal, Trigonal, Hexagonal, and Cubic

After his mother's death in 1971 he started taking antidepressants and amphetamines, despite the concern of his friends, one of whom (Ron Graham) bet him $500 ...

Erdős number

The Erdős number (Hungarian: [ˈɛrdøːʃ]) describes the "collaborative distance" between mathematician Paul Erdős and another person, as measured by authorship of mathematical papers. The same principle has been applied in other fields where a particular individual has collaborated with a large and broad number of peers.

Ritalin at 75: what does the future hold?

In 1937, psychiatrist Charles Bradley administered Benzedrine sulfate, an amphetamine, to “problem” children at the Emma Pendleton Bradley Home in Providence, Rhode Island, in an attempt to alleviate headaches; however, Bradley noticed an unexpected effect upon the behavior of the children: improved school performance, social interactions, and emotional responses.

Bradley’s Benzedrine Studies on Children with Behavioral Disorders

The first benzodiazepine, chlordiazepoxide (Librium), was discovered accidentally by Leo Sternbach in 1955 and was made available in 1960 by Hoffmann–La Roche, which soon followed with diazepam (Valium) in 1963.[1]

Diazepam (Valium)

Benzodiazepines (BZD, BDZ, BZs), sometimes called "benzos", are a class of psychoactive drugs whose core chemical structure is the fusion of a benzene ring and a diazepine ring

Is Xanax and benzo the same?

Benzodiazepines (sometimes called "benzos") work to calm or sedate a person, by raising the level of the inhibitory neurotransmitter GABA in the brain. Common benzodiazepines include diazepam (Valium), alprazolam (Xanax), and clonazepam (Klonopin), among others

The history of benzodiazepines

Benzodiazepines and Opioids

Do No Harm issue are ethical concerns for healthcare in Texans. From research, Pyrrolobenzodianepine looks promising:

Pyrrolobenzodiazepine

You realize Morris Hirsch is a famous mathematician and I mention Dr. Robert L. Hirsch is a Senior Energy Advisor at MISI and a consultant in energy, technology, and management.

The US Military and Oil

The US military uses more oil than any other institution in the world—but it’s also a leader in clean vehicle technology.

Published Jun 1, 2014

The US military is the largest institutional consumer of oil in the world. Every year, our armed forces consume more than 100 million barrels of oil to power ships, vehicles, aircraft, and ground operations—enough for over 4 million trips around the Earth, assuming 25 mpg.

-Jun-2019

US military consumes more hydrocarbons than most countries -- massive hidden impact on climate

The US military's carbon footprint is enormous and must be confronted in order to have a substantial effect on battling global warming

Oil Dependence and U.S. Foreign Policy

1850 – 2021

Daniel Hirsch

and then there is Afua Hirsch and

A FarnsworthHirsch fusor is the most common type of fusor. The typical Farnsworth-Hirsch fusor has two concentric electrical grids inside a vacuum chamber. 

and

Jeffrey M. Hirsch

Geneva Yeargan Rand Distinguished Professor of Law

Work
(919) 962-7675
Office
5091 Van Hecke-Wettach Hall

Katya Walter has shown that the Fu Xi Earlier Heaven Ho Tu arrangement of the 64 hexagrams can represent the DNA genetic Code

Since the DNA genetic code can be represented by 
4 things taken 3 at a time, 
or  (2x2) x (2x2) x (2x2) = 64 
Leadership

How to (Actually) Change Someone’s Mind

"behavioral interventions can produce more specific brain changes than biological intervention as a medication"

- Neuroscientist Richard Davidson

Political Colors of noise charge within Just War Theory upon Texas Independence Day

By David Vincent Bell Hirsch
The Jus Ad Bellum Convention. The principles of the justice of war are commonly held to be: having just cause, being a last resort, being declared by a proper authority, possessing right intention, having a reasonable chance of success, and the end being proportional to the means used.

Pandas for Data Science


De-biasing Classifiers with Themis-ml

Themis-ml: A Fairness-aware Machine Learning Interface for End-to-end Discrimination Discovery and Mitigation

  / themis-ml

Fairness-aware Machine Learning

Python Pandas - Working with Text Data

Heuristic (psychology)

Dilution Effect Definition

The Dilution Effect and Information Integration in Perceptual Decision Making

Discerning the Division of Cognitive Labor: An Emerging Understanding of How Knowledge Is Clustered in Other Minds

Folk music

Knowledge workers are workers whose main capital is knowledge. Examples include programmers, physicians, pharmacists, architects, engineers, scientists, design thinkers, public accountants, lawyers, editors, and academics, whose job is to "think for a living".[1]

List of cognitive biases

List of fallacies

We humans

How to make your arguments stronger (hint: longer is not the answer)


Classical ruin theory was developed by Lundberg in 1907 and refined by Cramer in 1930. This theory describes the evolution of the surplus of an insurance company over time. It assumes that an insurance company begins with an initial surplus and then receives premiums continuously at a constant rate

Decision theory

Using a knowledge graph for reasoning over data

A knowledge graph formally represents semantics by describing entities and their relationships.[17] Knowledge graphs may make use of ontologies as a schema layer. By doing this, they allow logical inference for retrieving implicit knowledge rather than only allowing queries requesting explicit knowledge.[18]

In order to allow the use of knowledge graphs in various machine learning tasks, several methods for deriving latent feature representations of entities and relations have been devised. These knowledge graph embeddings allow them to be connected to machine learning methods that require feature vectors like word embeddings. This can complement other estimates of conceptual similarity.

How you get around limited computational resources and work with large datasets

Scaling to large datasets

Efficient Pandas: Using Chunksize for Large Datasets

Chunking (division)

Chunking (psychology)

Language acquisition

Chunking

The central idea of these theories is that language development occurs through the incremental acquisition of meaningful chunks of elementary constituents, which can be words, phonemes, or syllables. Recently, this approach has been highly successful in simulating several phenomena in the acquisition of syntactic categories and the acquisition of phonological knowledge.

Chunking theories of language acquisition constitute a group of theories related to statistical learning theories, in that they assume that the input from the environment plays an essential role; however, they postulate different learning mechanisms.

Progress Bars in Python (and pandas!)

13 Most Important Pandas Functions for Data Science

After using pandas for over three years, here are the 30 methods I have used almost all the time

Top 20 Pandas Functions which are commonly used for Exploratory Data Analysis.

Five Useful Pandas Methods

Pandas Enhancing performance

Kaggle📊Data Science BEST Practices📋with Pandas||PART 2

The Ultimate Guide to the Pandas Library for Data Science in Python

Make Pandas Faster with a Simple Change

How to sum values of Pandas dataframe by rows?

pandas.Series.iteritems

  Data sequnce, data series and data sets

pandas.DataFrame.cumsum

Pandas GroupBy

pandas.DataFrame.iteritems

NumPy  Iterating Over Arrays

numpy.sum() in Python

pyspark.pandas.DataFrame.reindex

Reviewing Deepnote — The New IDE for Data Scientists

NOTES ON STATISTICS, PROBABILITY and MATHEMATICS

Octave

Source Forge

Partial Autocorrelation function

Coefficient 

When the coefficients are themselves variables, they may also be called parameters
Lawson parameter n τ and ion temperature T i

Ion Temperature

Magma (algebra)

Joint European Torus

The Joint European Torus, or JET, is an operational magnetically confined plasma physics experiment, located at Culham Centre for Fusion Energy in Oxfordshire, UK.

Correlated Parameter

Stats: Correlation

pandas.DataFrame.reset_index

Reindexing in Pandas DataFrame

QNet.net_info

Source code for qiskit_metal.renderers.renderer_mpl.mpl_renderer

Source code for qiskit_finance.data_providers.random_data_provider

/ qiskit-quantum-state-classifier

Python Pandas - Reindexing

Reindex & Reset Index of pandas DataFrame from 0 in Python (3 Examples)

Learn how to work with multi-index dataframes with ease

Python | Pandas dataframe.reindex()

Hierarchical Indexing

pandas.DataFrame.reindex

pandas.json_normalize

pandas.io.json.json_normalize

All Pandas json_normalize() you should know for flattening JSON

pandas.json_normalize

Python Pandas – Flatten nested JSON

Pandas Json Normalize

pandas.read_json

json-normalize 1.0.0

Converting nested JSON structures to Pandas DataFrames

Converting nested JSON structures to Pandas DataFrames

How to get desired nested JSON from python dataframe with desired JSON key names

PySpark Select Nested struct Columns

Spark SQL – Flatten Nested Struct Column

Read and Normalize Nested JSON data

Getting Started with EDA tools - Numpy and Pandas

Step-by-step tutorial from scratch in 50 lines of code

Uniform Resource Identifier

A Uniform Resource Identifier (URI) is a unique sequence of characters that identifies a logical or physical resource used by web technologies. URIs may be used to identify anything, including real-world objects, such as people and places, concepts, or information resources such as web pages and books. Some URIs provide a means of locating and retrieving information resources on a network (either on the Internet or on another private network, such as a computer filesystem or an Intranet); these are Uniform Resource Locators (URLs). A URL provides the location of the resource. A URI identifies the resource by name at the specified location or URL. Other URIs provide only a unique name, without a means of locating or retrieving the resource or information about it, these are Uniform Resource Names (URNs). The web technologies that use URIs are not limited to web browsers. URIs are used to identify anything described using the Resource Description Framework (RDF), for example, concepts that are part of an ontology defined using the Web Ontology Language (OWL), and people who are described using the Friend of a Friend vocabulary would each have an individual URI.

See also

(Labor day 2022)

toPandas() should handle nested columns (as a Pandas MultiIndex)

Kaggle Quick Tutorial: Flatten Nested JSON in Pandas

Cyberwar-Netwar: Security in the Information Age

edited by F.D. Carvalho, E. Mateus da Silva

A scalable, secure, and interoperable platform for deep data-driven health management

Can you use SQL in Pandas? Yes and this is how.

Heliotron J is a fusion research device in Japan, specifically a helical-axis heliotron designed to study plasma confinement in this type of device.[1][2][3] It is located at the Institute of Advanced Energy of Kyoto University.

Screw axis (helical axis or twist axis)

A theorem due to Horst Schubert states that every knot can be uniquely expressed as a connected sum of prime knots.[1]

Straintronics (from strain and electronics) is the study of how folds and mechanically induced stresses in a layer of two-dimensional materials can change their electrical properties. It is distinct from twistronics in that the latter involves changes in the angle between two layers of 2D material. It is also distinct from, but similar to, the piezoelectric effects which are created by bending, twisting, or squeezing of certain material.  

Moiré pattern

Geometrical approach

- Plasma Control -
Stellarator-Heliotron Control
5th IAEA DEMO program WS, 7 May 2018, Daejon, Korea
H.Yamada
National Institute for Fusion Science, NINS
The University of Tokyo

FUSION ENERGY SCIENCES (FES) Build-Operate-Transfer (BOT) Contract, Economic bubble and Bubble fusion

By David Vincent Bell Hirsch

pandas.Series.compare

pandas.DataFrame.diff

Difference between map, applymap and apply methods in Pandas

Difference between apply() and transform() in Pandas

Introduction to Pandas apply, applymap and map

pandas.Series.diff

A comprehensive guide to understanding Pandas Series and DataFrame data structures

Introducing Pandas Objects

Pandas Series Tutorial with Examples

5 Pandas Group By Tricks You Should Know in Python

pandas.DataFrame.groupby

Python | Pandas dataframe.groupby()

Pandas groupby() Explained With Examples

pandas GroupBy: Your Guide to Grouping Data in Python

Groupby is a great tool to generate analysis, but in order to make the best use of it and use it correctly, here’re some good-to-know tricks

Group by: split-apply-combine

Kaggle Python Groupby Tutorial

GroupBy in Pandas: Your Guide to Summarizing and Aggregating Data in Python

Pandas Options and settings

Python Pandas - Options and Customization

Pandas tips and tricks to help you get started with Data Analysis

pandas.set_option

Treating PANS and PANDAS may include antimicrobials, immunomodulatory therapy, and psychotherapeutic/behavioral therapy. The PANDAS Physicians Network (PPN) flowcharts for diagnosis and treatment will help clinicians evaluate their patients and determine the best course of treatment based on symptoms severity.

To completely describe the state of a plasma, all of the particle locations and velocities that describe the electromagnetic field in the plasma region would need to be written down. However, it is generally not practical or necessary to keep track of all the particles in a plasma.[citation needed] Therefore, plasma physicists commonly use less detailed descriptions, of which there are two main types:

Fluid model

Fluid models describe plasmas in terms of smoothed quantities, like density and averaged velocity around each position (see Plasma parameters). One simple fluid model, magnetohydrodynamics, treats the plasma as a single fluid governed by a combination of Maxwell's equations and the Navier–Stokes equations. A more general description is the two-fluid plasma,[41] where the ions and electrons are described separately. Fluid models are often accurate when collisionality is sufficiently high to keep the plasma velocity distribution close to a Maxwell–Boltzmann distribution. Because fluid models usually describe the plasma in terms of a single flow at a certain temperature at each spatial location, they can neither capture velocity space structures like beams or double layers, nor resolve wave-particle effects.[citation needed]

Kinetic model

Kinetic models describe the particle velocity distribution function at each point in the plasma and therefore do not need to assume a Maxwell–Boltzmann distribution. A kinetic description is often necessary for collisionless plasmas. There are two common approaches to kinetic description of a plasma. One is based on representing the smoothed distribution function on a grid in velocity and position. The other, known as the particle-in-cell (PIC) technique, includes kinetic information by following the trajectories of a large number of individual particles. Kinetic models are generally more computationally intensive than fluid models. The Vlasov equation may be used to describe the dynamics of a system of charged particles interacting with an electromagnetic field. In magnetized plasmas, a gyrokinetic approach can substantially reduce the computational expense of a fully kinetic simulation.

Tropical geometry is a variant of algebraic geometry in which polynomial graphs resemble piecewise linear meshes, and in which numbers belong to the tropical semiring instead of a field. Because classical and tropical geometry are closely related, results and methods can be converted between them. Algebraic varieties can be mapped to a tropical counterpart and, since this process still retains some geometric information about the original variety, it can be used to help prove and generalize classical results from algebraic geometry, such as the Brill–Noether theorem, using the tools of tropical geometry.[1]
Curved space often refers to a spatial geometry which is not "flat", where a flat space is described by Euclidean geometry. Curved spaces can generally be described by Riemannian geometry though some simple cases can be described in other ways. Curved spaces play an essential role in general relativity, where gravity is often visualized as curved space. The Friedmann–Lemaître–Robertson–Walker metric is a curved metric which forms the current foundation for the description of the expansion of space and shape of the universe

Power Law and Power Law Distribution

Power Laws: How Nonlinear Relationships Amplify Results

Hyperbolic space

CAT(k)-spaces, weak convergence and fixed points

Alexandrov geometry: foundations

An invitation to Alexandrov geometry:
CAT(0) spaces
 

Feynman parametrization

Introduction to Feynman Integrals

DIFFERENTIATION UNDER THE INTEGRAL SIGN

Feynman graph polynomials

Feynman Polytopes and the Tropical Geometry of UV and IR Divergences
Nima Arkani-Hamed,1 Aaron Hillman,2 and Sebastian Mizera

Ultraviolet divergence

Schwinger trick and Feynman Parameters

Tropical geometry

Tropical cyclone

Feynman periods - on graphs, integrals, polytopes and
tropical physics

Erik Panzer

Microlocal analyticity of Feynman integrals 

Hurricane dynamics and cloud microphysics 

Clouds in Tropical Cyclones
ROBERT A. HOUZE J R .

Street-Fighting Mathematics

A new relativistic hydrodynamics code for high-energy heavy-ion collisions

We construct a new Godunov type relativistic hydrodynamics code in Milne coordinates, using a Riemann solver based on the two-shock approximation which is stable under the existence of large shock waves....

Godunov-type schemes for hydrodynamic and magnetohydrodynamic modeling

Farmers' Almanac - Plan Your Day. Grow Your Life.

Knowledge economy

Another Extreme Texas Winter? Here’s What the Farmers’ Almanac (Right “About 85% of the Time”) Predicts

The periodical, first published in 1818 and known for its simplistic and broad extended forecasts, says its largest readership is in Texas. We talked with the editor about why that might be—and what’s in store for the state this winter.

Remember the last Snowpocalypse?

Snowmageddon

MSFragger: ultrafast and comprehensive peptide identification in mass spectrometry–based proteomics 

Graphics processing unit

Methods for analyzing peptides and proteins on a chromatographic timescale by electron-transfer dissociation mass spectrometry 

FragPipe: a complete proteomics pipeline with the MSFragger search engine at heart

MSFragger
MSFragger is an ultrafast database search tool that uses a fragment ion indexing method to rapidly perform spectra similarity comparisons. On a typical quad-core workstation, MSFragger is able to perform open searching (500 Da precursor mass window tolerance) in under 10 minutes for a single LC-MS/MS run.

Fragger

frag

military slangNorth American
noun
  1. a hand grenade.
verb
deliberately kill (an unpopular senior officer) with a hand grenade.  

MSFragger is an ultrafast database search tool for peptide identification in mass spectrometry-based proteomics. It has demonstrated excellent performance across a wide range of datasets and applications. MSFragger is suitable for standard shotgun proteomics analyses as well as large datasets (including timsTOF PASEF data), enzyme unconstrained searches (e.g. peptidome), ‘open’ database searches (i.e. precursor mass tolerance set to hundreds of Daltons) for identification of modified peptides, and glycopeptide identification (N-linked and O-linked) with MSFragger Glyco mode.

Texas Biomedical Research Institute is pioneering and sharing scientific breakthroughs to protect you, your families and our global community from the threat of infectious diseases.

Circuit of the Americas Race Condition of Food’s Big Water Footprint Big MACC Subsurface textile irrigation Lonnie lobby interests EPA Purple Economy in the city of the violet crown

By David Vincent Bell Hirsch
 

OD (Office of the Director)

QuPath is an open, powerful, flexible, extensible software platform for bioimage analysis.

Hashing

Artificial Intelligence in Medical Diagnosis

Addressing the doctor shortage trend in the US with built in security features built into innovation

ORNL
Indeed
Fourth Industrial Revolution

'Trust me, I’m a doc-bot'. 3 steps to get closer to AI-driven healthcare

Definition - What does Tejas mean? Tejas is a Sanskrit term that translates to “fire” or “illumination.” It can be classified as a type of energy, vitality or charisma. It is also one of the five gross material elements that make up the body in Samkhya philosophy.

Quality Of Health Care In India: Challenges, Priorities, And The Road Ahead

DOCBOT LAWBOT BOLLYWOOD storytelling
And now for something completely different
Paramount Theater Austin Texas
 
The Nāṭya Śāstra (Sanskrit: नाट्य शास्त्र, Nāṭyaśāstra) is a Sanskrit treatise on the performing arts.

Jeremiah is a prophet, but he's also an artist, a performance artist...

Ezekiel – The First Performance Artist?

Avanting the Avant Garde by 3000 years

...free exercise thereof...

AISD Performing Arts Center

Frog is an unincorporated community in Kaufman County, located in the U.S. state of Texas.

Tejas (तेजस्, “spirit”) refers to one of the eight aspects of the male's sattva, according to the Nāṭyaśāstra chapter 24.

Impoverishment is a complex process involving the interaction of capitalism, patriarchy, and racism to produce structurally a set of economic, social, and political positions defined by terms with different meanings.

Frog jumping is a competitive pastime for humans in which frogs are entered into competitions to jump certain distances

Frogger

Game theory

Dogon people

The Dogon learned from the Nommos that there was a companion star (Sirius B) ... According to their traditions, the star Sirius has a companion star which is invisible to the human eye. This companion star has a 50 year elliptical orbit around the visible Sirius and is extremely heavy. It also rotates on its axis.

The Sirius Mystery

On the Problem of Arrested Spiritual Development

( the spiritual impoverishment of a commercial society)

Frog symbolism and meaning include fertility, potential, transformation, purity, prosperity, and good luck. ... Thus, frogs and toads have been subjects in the mythologies and folklore of people around the world for centuries.

The Spiritual Impoverishment of Modern Western Man

Race Matters (1993) lamented what he saw as the spiritual impoverishment of the African American underclass and critically examined the "crisis of black leadership" in the United States

Frog Spirit Animal

Bhekasana

Yoga pose
Mandukasana, or Frog posture is a group of seated asanas in Hatha yoga and modern yoga as exercise, all of which put the body in a shape like that of a frog. Another frog-like posture is Bhekasana.
 

Strategies for Ensuring Quality Health Care in India: Experiences From the Field

DRIVe funds early stage companies for life saving innovation.

REQUEST A TECHWATCH MEETING WITH BARDA AND INTERAGENCY PARTNERS

I proposed presenting projects as a one page PDF with JupyterLab: A Next-Generation Notebook Interface

bioimage analysisQuPath from QuTip

A Novel Feature Extraction Method for Power Transformer Vibration Signal Based on CEEMDAN and Multi-Scale Dispersion Entropy

In general relativity, the sticky bead argument is a simple thought experiment designed to show that gravitational radiation is indeed predicted by general relativity, and can have physical effects.

Sticky bead argument

Gravitational time dilation

Blackbody radiation is a theoretical concept in quantum mechanics in which a material or substance completely absorbs all frequencies of light. Because of the laws of thermodynamics, this ideal body must also re-emit as much light as it absorbs.

Black-body radiation

Quantum gravity

Dark Dimension Gravitons as Dark Matter

A cloud engineer is an IT professional responsible for any technological duties associated with cloud computing, including design, planning, management, maintenance and support. Cloud engineer is a general term encompassing a few different roles, including: cloud architect. cloud software engineer.

Magnetospheres

Looking for Neutrinos, Nature’s Ghost Particles

To study some of the most elusive particles, physicists have built detectors in abandoned mines, tunnels and Antarctic ice

Ann Finkbeine

Lidar

Laser light can not only trigger lightning but redirect it, causing it to strike in the same place over and... Laser light can not only trigger lightning but redirect it, causing it to strike in the same place over and over, according to new research. This means lasers could serve as lightning rods.

Lasers Can Be Used to Steer Lightning In Mid-Strike

Laser light can not only trigger lightning but redirect it, causing it to strike in the same place over and...

Harvesting lightning energy

The Physics of Ghost imaging

Magnetic flux quantum

Physicists Argue That Black Holes From the Big Bang Could Be the Dark Matter

Make a good feature description from a user story. Examples

Automation

Feature hashing

One-hot

Comparison with other encoding methods

ML | Label Encoding of datasets in Python

Blocking (statistics)

Sphere packings and lattices

Sphere packing

Bloch sphere

Density operators

R   Feature Columns

Tensor Flow

Classify structured data with feature columns

Introducing TensorFlow Feature Columns

torch.column_stack

PyTorch Tabular Data

Categorical Embeddings

Feature Engineering in Python

Feature Selection with sklearn and Pandas

sklearn.compose.ColumnTransformer

Column Transformer with Mixed Types

Learn how to read data into a Pandas DataFrame in 5 minutes

SciKit Learn

Support Vector Machines

Bagging vs Boosting in Machine Learning

Microgreens have a faster crop cycle than mushrooms. While mushrooms are already an incredibly fast crop at only 3 to 4 weeks to harvest, microgreens are even smaller, and can have a turnaround time as short as two weeks.

Bagging vs Boosting

Hyperparameter tuning

Gradient-based optimization

Grass is greener, grass is always greener, or the grass is always greener on the other side may refer to:

Green's theorem

Thought Police

Physics

Philosophy

philosophy of mind

Computer science

Classes of intelligent agents

I have proposed teaming arrangements for marching band competition here in Austin Texas to address social stratification and housing in our United States.

Profit margin

Some of my earliest memories are of a victory garden my father had and modeled after his father.

Our Lady of Fátima

May 13, 1917 – Oct 13, 1917

The Economic Impact of Texas' HBCUs

What did Fatima say about Russia?

The good will be martyred, the Holy Father will have much to suffer, various nations will be annihilated. In the end, my Immaculate Heart will triumph. The Holy Father will consecrate Russia to me, and she will be converted, and a period of peace will be granted to the world."
The game of chicken, also known as the hawk–dove game or snowdrift game, is a model of conflict for two players in game theory.

Chicken (game)

Stable Baselines3

/ stable-baselines3

Vectorized Environments

Deep Reinforcement Learning - OpenAI's Gym and Baselines on Windows

TF Agent Environments

Install GYM and Visualization related libraries

Training RL agents in stable-baselines3 is easy

Your diagnosis was wrong. Could doctor bias have been a factor?

Bible David harp
According to the Book of Samuel, an “evil spirit from the Lord” plagued King Saul, making him agitated and fearful of persecution. Because music was thought to have a therapeutic effect, the king summoned the hero and warrior David, who was renowned for his skill with the harp

1 Samuel 16:14-23

David Plays the Harp for Saul

David Playing the Harp Before Saul

1701 Manor Road
Austin, Texas 78722

Poland chooses US to build its first nuclear power plant

Grof is known, in scientific circles, for his early studies of LSD and its effects on the psyche—the field of psychedelic therapy.

Stan and Brigitte Grof

Anger is temporary madness: the Stoics knew how to curb it

Moment form

In music, moment form is defined as "a mosaic of moments", and, in turn, a moment is defined as a "self-contained (quasi-)independent section, set off from other sections by discontinuities".[1]

Optical music recognition(OMR)

Shofar

A shofar (/ʃˈfɑːr/ shoh-FAR; from Hebrew: שׁוֹפָר, pronounced [ʃoˈfaʁ] (listen)) is an ancient musical horn typically made of a ram's horn, used for Jewish religious purposes. Like the modern bugle, the shofar lacks pitch-altering devices, with all pitch control done by varying the player's embouchure. The shofar is blown in synagogue services on Rosh Hashanah and at the end of Yom Kippur; it is also blown every weekday morning in the month of Elul running up to Rosh Hashanah.[1] Shofars come in a variety of sizes and shapes, depending on the choice of animal and level of finish.

The Significance of the Shofar - Hebrew for Christians

The Eyes of Texas Are Upon You

The Eyes of Texas are upon you,
All the live-long day.
The Eyes of Texas are upon you,[8]
You cannot get away.
Do not think you can escape them,
From night ‘til early in the morn.
The Eyes of Texas are upon you,
’til Gabriel blows his horn

also called Torricelli's trumpet) is a particular geometric figure that has infinite surface area but finite volume. The name refers to the Christian tradition that (albeit not strictly supported by the Bible itself) identifies the archangel Gabriel as the angel who blows the horn to announce Judgment Day. The properties of this figure were first studied by Italian physicist and mathematician Evangelista Torricelli in the 17th century. 

City of Austin department of Innovation, keeping business local why be a business
SAP

Google AI4Code – Understand Code in Python Notebooks

Predict the relationship between code and comments
 
Live Music Capital of the world

Poles and Polish citizens in the Gulag

Let us sing all together in languages necessary to reach all hearts
Birthdays in the Gulag were tough. 

Las Mananitas

In Western classical music tradition, Lied (/ld, lt/, plural Lieder /ˈldər/;[1][2][3] German pronunciation: [liːt], plural [ˈliːdɐ], lit.'song') is a term for setting poetry to classical music to create a piece of polyphonic music.

Here are some German songs used to wish people a Happy Birthday.

Zum Geburtstag viel Glück! (Best of luck on your birthday!)

Lied about the Polka? What kind of a Honky Tonk is this?

Polka

"STO-100 LAT" - Polish Birthday Song (Eng. Subs)

Uncle Tom Wielski, grandfather of Jasper and Nolah,
Cheers heart of San Jacinto minding lessons with my nephew Pierce Gray, for his November birthday

Hyacinth of Poland

Saint Hyacinth, O.P., (Polish: Święty Jacek or Jacek Odrowąż; ca. 1185 – 5 August 1257) was a Polish Dominican priest and missionary that worked to reform women's monasteries in his native Poland. He was a Doctor of Sacred Studies, educated in Paris and Bologna.

Logic of relatives

Charles Sanders Peirce

Identity (mathematics)

Charles Sanders Peirce

Hodně štěstí, zdraví

Good Luck and Health

Birthday Song

(Czech)

(English)

Hodně štěstí, zdraví,
hodně štěstí, zdraví,
hodně štěstí drahý/á (název)
hodně štěstí, zdraví!

Good luck and health,
Good luck and health,
Good luck dear (*name)
Good luck and health!

Hodně Štěstí

Happy birthday Ian Hlavacek

Arity

Arity (/ˈærɪti/ (About this soundlisten)) is the number of arguments or operands taken by a function or operation in logic, mathematics, and computer science. In mathematics, arity may also be named rank,[1][2] but this word can have many other meanings in mathematics. In logic and philosophy, it is also called adicity and degree.[3][4] In linguistics, it is usually named valency.[5]

What Does Tilde (~) Mean?

The tilde (~) is a character in the standard ASCII character set that is provided on a conventional computer keyboard and is used in both writing and computer programming. It corresponds to ASCII code 126.

The tilde is also sometimes known as the twiddle.
The tilde symbol ~ in physics means “of the order of". It is not the same as other symbols which mean, asymptotically equal to, approximately equal to etc. But “of the order of" can be interpreted differently depending on context. A working definition is, “within a factor of 10".

It means "Order" as in "order of magnitude"

No matter how much you push the nuclear envelope, it'll still be stationery mail with your nuclear family. Nuclear localization sequence Database of protein domains, families and functional sites

In computational physics and chemistry, the Hartree–Fock (HF) method is a method of approximation for the determination of the wave function and the energy of a quantum many-body system in a stationary state.

Nuclear envelope

Burr–Erdős conjecture

Chebyshev's inequality

Erdős number

In mathematics, the ErdősSzekeres theorem is a finitary result that makes precise one of the corollaries of Ramsey's theorem.

Erdős–Szekeres theorem

Ya igrayu na garmoshke:Gena's birthday song 'Cheburashka'

Identity Management Overview

This guide will show you how to use the PicketLink Identity Management API to manage identity data such as partitions, users, roles, groups, credentials, attributes and so forth. It will cover some core concepts and make it easier for you to understand how those concepts are applied in a project.


What is a Network Interface Module?
he Network Interface Module (NIM) is a DOS-based module designed as a generic, network-interface platform for use with TAC II telemetry systems. The NIM functions as an interface between a 10base-T Ethernet network and up to fifteen function modules of any combination.

A computer's network card works by taking the data given to it by the CPU and sending it to a destination.

A virtual network interface (VIF) is an abstract virtualized representation of a computer network interface that may or may not correspond directly to a network interface controller.

A network socket is an internal endpoint for sending or receiving data within a node on a computer network. Concretely, it is a representation of this endpoint in networking software (protocol stack), such as an entry in a table (listing communication protocol, destination, status, etc.), and is a form of system resource.

In computer science, a semaphore is a variable or abstract data type used to control access to a common resource by multiple processes in a concurrent system such as a multitasking operating system. A semaphore is simply a variable.
HIPPA Project Nightingale class action considerations
May a marching band competition help compel university knowledge broker research for strategic teaming arrangements to be forged for innovation with NIH?  
Here is a means to compose a song and IP Block for a Topolgical Quantum Computer as a marching band  flow chart.


Serenity Sells Paramount Theater polygot pitch for NIH


Drama therapy

Film treatment

Remembering the Perez Orchestra

Fokker periodicity block


If you're the family scapegoat, you may find that your character is possibly publicly attacked at every opportunity. Your family may want to convince others that you are not worthy of respect in a potential effort to not admit themselves of their role in the family's dysfunction.

In the Socratic dialogue 'Republic', Plato famously wrote: “our need will be the real creator” (Wikipedia.org, 2020) which was moulded over time into the English proverb 'Necessity is the mother of invention'.

Mother, Fokker organ music to keep Austin, Texas weird Halloween weekend 2022... (pounding out UK Pound Note arbitrage betweeen US/EUR)

Fokker (Dutch pronunciation: [ˈaːdrijaːn ˈdaːnijɛl ˈfɔkər]; 17 August 1887 – 24 September 1972) was a Dutch physicist. He worked in the fields of special relativity and statistical mechanics. He was the inventor of the Fokker organ, a 31-tone equal-tempered (31-TET) organ.

Thank you Dr. Karpman and Dr. Grof with Dr. Foster and NIH Sound Minds for healthy strategic academing teaming agreements to take a theraputic swing at 

Piñata Effigy Implicit stereotype Iconoclasm Green Bonds for Artificial neural network Machines learning about Environmental Racism as solutions for Texas Disparity

By David Vincent Bell Hirsch

What is QuPath?

QuPath is open source software for bioimage analysis.

QuPath is often used for digital pathology applications because it offers a powerful set of tools for working with whole slide images - but it can be applied to lots of other kinds of image as well.

National Center Advancing Translational Sciences

NCATS

SBIR & STTR Research Priorities

Tantras (Hinduism)

What is QuPath?

QuPath is open source software for bioimage analysis.

QuPath is often used for digital pathology applications because it offers a powerful set of tools for working with whole slide images - but it can be applied to lots of other kinds of image as well.

National Center Advancing Translational Sciences

NCATS

SBIR & STTR Research Priorities

Tantras (Hinduism)

Marital stress revealed as one key factor in heart attacks: Yale study

Pranahuti (Yogic Transmission)

Shaktipat

Visualization of quantum states and processes

Prime Knot

Schubert (1949) showed that every knot can be uniquely decomposed (up to the order in which the decomposition is performed) as a knot sum of prime knots.

The granny knot is the knot sum of two trefoils with the same chirality (3_1#3_1), while the square knot is the knot sum of two trefoils with opposite chiralities (3_1#3_1^*).  
 

Poland chooses US to build its first nuclear power plant

Grof is known, in scientific circles, for his early studies of LSD and its effects on the psyche—the field of psychedelic therapy.

TrOCR: Transformer-based Optical Character Recognition with Pre-trained Models

Moment form

In music, moment form is defined as "a mosaic of moments", and, in turn, a moment is defined as a "self-contained (quasi-)independent section, set off from other sections by discontinuities".[1]

Google AI4Code – Understand Code in Python Notebooks

Predict the relationship between code and comments

Hugging Face

TrOCR

Overview

The TrOCR model was proposed in TrOCR: Transformer-based Optical Character Recognition with Pre-trained Models by Minghao Li, Tengchao Lv, Lei Cui, Yijuan Lu, Dinei Florencio, Cha Zhang, Zhoujun Li, Furu Wei. TrOCR consists of an image Transformer encoder and an autoregressive text Transformer decoder to perform optical character recognition (OCR).

Minghao Li1*, Tengchao Lv2, Jingye Chen2, Lei Cui2,
Yijuan Lu2, Dinei Florencio2, Cha Zhang2, Zhoujun Li1, Furu Wei2

Flag semaphore (from the Greek σῆμα, sema, meaning sign and φέρω, phero, meaning to bear; altogether the sign-bearer) is the telegraphy system conveying information at a distance by means of visual signals with hand-held flags, rods, disks, paddles, or occasionally bare or gloved hands. Information is encoded by the position of the flags; it is read when the flag is in a fixed position. Semaphores were adopted and widely used (with hand-held flags replacing the mechanical arms of shutter semaphores) in the maritime world in the 19th century.[citation needed] It is still used during underway replenishment at sea and is acceptable for emergency communication in daylight or using lighted wands instead of flags, at night (Marching Band Choreography consideration)

Using free software for Homestead planning

AGRIVI: Farm Management Software for Digital Agriculture

A Mission Planning Approach for Precision Farming Systems Based on Multi-Objective Optimization

Crop2ML: An open-source multi-language modeling framework for the exchange and reuse of crop model components

Uncertainty and data quality in spatial modelling
D G Rossiter
Section of Soil & Crop Sciences, Cornell University

How to Start a Small Farm

Small Tracts Act

Farmland Values Hit Record Highs, Pricing Out Farmers

In South Dakota, farmland values surged by 18.7 percent from 2021 to 2022, one of the largest increases in the country, according to the Agriculture Department.Credit...Tim Gruber for The New York Times

Corporate Bond: Definition and How They're Bought and Sold

Smallholding

A smallholding or smallholder is a small farm operating under a small-scale agriculture model.[2]
My great grandfather Dr. Price Bell was one of the first western medical doctors from Indian Territory (present day Oklahoma)

Serenity Sells Smallholding solutions

Technology readiness levels for machine learning systems

Property Taxes and Homestead Exemptions

CRISPR-Cas9 can be employed to promptly engineer oncolytic viruses and immune cells for cancer therapeutic applications. More notably, it has the ability to precisely edit genes not only in model organisms but also in human being that permits its use in therapeutic analysis.

Target guide RNA to specific site may be developed with Cas 9 technology

Smallholding

A smallholding or smallholder is a small farm operating under a small-scale agriculture model

Sericulture

Sericulture, or silk farming, is the cultivation of silkworms to produce silk.

How Japanese Farming Million of SilkWorm for silk - Silk cocoon harvest and process in Factory

Songs and Poems About Agriculture

Sericulture is a very important domestic industry in many countries. India and China are the world’s leading producers of silk. The silk output of these two countries combined accounts for over 60% of  global production.

Without strong financial backing farmers and ranchers will not survive, and people will not have food to eat or clothes to wear. 

Sound Health | National Institutes of Health (NIH)

To go for a song means to be sold be little money, to be bought or sold for much less than the item is worth. The idiom go for a song has been in use since at least the early 1600s, and probably longer

 
Aug 14, 1971 – Aug 20, 1971
A prisoner's dilemma is a situation where individual decision-makers always have an incentive to choose in a way that creates a less than optimal outcome for the individuals as a group. The prisoner's dilemmas occur in many aspects of the economy.

COMMITMENT AND SELF-CONTROL IN A PRISONER'S DILEMMA GAME

Glue code Gluon library True environment variables for GLOW Genomics

By David Vincent Bell Hirsch 
 

In the New Testament the word pharmekeia occurs three times (Gal 5:19-21; Rev 9:21; 18:23). Each time, it is translated as ‘sorcery’ or ‘magic’ and it is something that is spoken of in negative terms.

4You cover up your ignorance with lies;
    you are like doctors who can't heal anyone.
Say nothing, and someone may think you are wise!

Listen while I state my case.

Bertrand Russell on Psycho-analysis and Behaviorism 

“For our purposes, the essential discovery of psycho-analysis is this: that an impulse which is prevented, by behaviourist methods, from finding overt expression in action, does not necessarily die, but is driven underground, and finds some new outlet which has not been inhibited by training. Often the new outlet will be more harmful than the one that has been prevented, and in any case the deflection involves emotional disturbance and unprofitable expenditure of energy. It is therefore necessary to pay more attention to emotion, as opposed to overt behaviour, than is done by those who advocate conditioning as alone sufficient in the training of character.”

― Bertrand Russell, Education and the Social Order, Ch. 4: Emotion and Discipline

Evil is the absence or lack ("privation") of good. It is typically attributed to St. Augustine of Hippo, who wrote: ... Just in the same way, what are called vices in the soul are nothing but privations of natural good. 

Disease Mongering—Selling sickness to the worried well

Disease Mongering (noun): “The act of convincing essentially well people that they are sick, or slightly sick people that they are very ill.”

Psychiatrists know about it. Drug companies know about it. Advertising executives throughout the world do, too.

Disease Mongering is a highly successful strategy that turns common life situations into psychiatric disease states, getting people of every walk of life to worry about the latest “mental illness”—and to demand a pill.

And according to one marketing guru, “No therapeutic category is more accepting of condition branding than the field of anxiety and depression, where illness is rarely based on measurable physical symptoms and therefore, open to conceptual definition.”

And it works. Psychiatrists and drug companies have carved out a lucrative market niche grossing over $150,000 every minute.

But with disease mongering campaigns creating the illusion of widespread mental illness, how safe are the drugs psychiatrists are prescribing to treat it?

The 8 Types of Children Scapegoated in Narcissistic Families

4. Truth-tellers.

The Recursive Argument Method of Medieval Science

Mental Illness in Film

Nurse Ratched

Disease Mongering in a Top Psychiatry Journal

Counting symptoms that don't count for fun and profit

Book by David M. Allen

Prayer of Saint Francis

Institution of Marriage

St. Francis De Sales
8200 Roos Road Houston, TX 77036 (713) 774-7475
 
Patron saint of good manners
Referred to as the “Gentleman Saint” because of his meek and humble demeanor, St. Francis de Sales became bishop of Geneva at the age of 35.

Marijuana Found at Ancient Temple in Israel

Judahite Shrine of Tel Arad from 8th century B.C.E. has residue of cannabis and of frankincense

Zoroastrian Magi were known for their use of "bhanga" (cannabis)

Were the Biblical Magi Zoroastrians?

According to Joseph Campbell, the obscure religion of the Magi, known as Zoroastrianism, is the primary religious heritage of the Western world. Magi is the Greek word for Mobeds, a term still used for Zoroastrian priests.

Zoroastrianism and cannabis
The Zoroastriasn texts refer to a substance variously known as bhanga, or in Pahvlavi as mang. Bhanga is still used in Persia to identify cannabis and the related Indian term bhang is still used for cannabis as well

Austin, Texas, Proposition A, Marijuana Decriminalization and Prohibit No-Knock Warrants Initiative (May 2022)

Key points. The right to marry, and the right to end a marriage through divorce, are both fundamental constitutional rights. According to a new Harvard Law School study, access to a lawyer significantly impacts the ability of low-income individuals to obtain a divorce.
"through or by means of one another" and as the epistemic regress problem. It is an element of the Münchhausen trilemma

Anonymous recursion

Recursive data type

Recursion (computer science)

What is Recursion?

Thinking Recursively

There is Another Way

Thinking Corecursively

Thinking Recursively, Rethinking Corecursively

Primitive recursive function

Mutual recursion

Some people going through breakups are reconsidering the best way to end a relationship, including how to honor their time together.


What are the rights of wife after marriage?

Right to live with dignity and self-respect: A wife has the right to live her life with dignity and to have the same lifestyle that of her husband and in-laws have. She also has right to live free from any mental or physical torture. Right to child maintenance: Husband and wife must provide for their minor child.
Icons are an essential part of many user interfaces, visually expressing objects, actions and ideas. When done correctly, they communicate the core idea and intent of a product or action, and they bring a lot of nice benefits to user interfaces, such as saving screen real estate and enhancing aesthetic appearance.

Masking (personality)

Masking is a process by which an individual changes or "masks" their natural personality to conform to social pressures, abuse or harassment. Masking can be strongly influenced by environmental factors such as authoritarian parents, rejection, and emotional, physical, or sexual abuse. An individual may not even know they are masking because it is a behavior that can take many forms.

Masking should not be confused with masking behavior, which is to mentally block feelings of suffering as a survival mechanism.

Bad faith

Mark 12:18-27

The Word of God

Some Sadducees, who say there is no resurrection, came to Jesus and asked him a question, saying, "Teacher, Moses wrote for us that 'if a man's brother dies, leaving a wife but no child, the man shall marry the widow and raise up children for his brother.' There were seven brothers; the first married and, when he died, left no children; and the second married her and died, leaving no children; and the third likewise; none of the seven left children. Last of all the woman herself died. In the resurrection whose wife will she be? For the seven had married her." Jesus said to them, "Is not this the reason you are wrong, that you know neither the scriptures nor the power of God? For when they rise from the dead, they neither marry nor are given in marriage, but are like angels in heaven. And as for the dead being raised, have you not read in the book of Moses, in the story about the bush, how God said to him, 'I am the God of Abraham, the God of Isaac, and the God of Jacob'? He is God not of the dead, but of the living; you are quite wrong."

Mark 12:18-27

Sextus Empiricus

Pyrrhonian skepticism involves having no beliefs about philosophical, scientific, or theoretical matters—and according to some interpreters, no beliefs at all, period.

If someone swallows a story or a statement, they believe it completely.

Machine learning is now seen as a silver bullet for solving all problems, but sometimes it is not the answer.

Two telling limitations: 'They encode correlation, not causation or ontological relationships'; and 'Not well suited for high-level, symbolic reasoning or planning'.
This can manifest itself in two ways: lack of data, and lack of good data. Many machine learning algorithms require large amounts of data before they begin to give useful results.
Double-mindedness is a concept used in the philosophy and theology of the Danish philosopher Søren Kierkegaard (1813–1855) as insincerity, egoism, or fear of punishment. The term was used in the Bible in the Epistle of James. Kierkegaard developed his own systematic way to try to detect double-mindedness in himself.

Double-mindedness

For Hegel, the ontological argument had been a peculiarly modern form of argument for the existence of God, presupposing a 'representationalist' account of the mind and its concepts.

OBO Foundry

The Open Biological and Biomedical Ontologies (OBO) Foundry is a group of people dedicated to build and maintain ontologies related to the life sciences.[1] The OBO Foundry establishes a set of principles for ontology development for creating a suite of interoperable reference ontologies in the biomedical domain. Currently, there are more than a hundred ontologies that follow the OBO Foundry principles.

The OBO Foundry effort makes it easier to integrate biomedical results and carry out analysis in bioinformatics. It does so by offering a structured reference for terms of different research fields and their interconnections (ex: a phenotype in a mouse model and its related phenotype in zebrafish)

Welcome to BioPortal

The world’s most comprehensive repository of biomedical ontologies

Game theory

Game Theory concepts with application in Python using Nashpy (Part 1)

Tutorial: building and finding the equilibrium for a game

Introduction to game theory

Ramsey Games, Markov games, Bayesian games

By David Vincent Bell Hirsch

Games People Play

the ways in which people behave in order to get an advantage: Not telling the whole truth is one of the games that people play.

Uvalde mom sues police, gunmaker in school massacre

Problem of Hell

Welcome to Nashpy’s documentation!

Calculating Nash Equilibrium on Quantum Annealers

Quantum Games with Strategies Induced by Basis Change Rules

Schubert calculus and quantum integrability

Asymptotic analysis

Quantum Integrability and Generalised Quantum Schubert Calculus

Asymptotic Bias

Asymptotic bias, variance, and mse

POSITIVITY IN EQUIVARIANT QUANTUM SCHUBERT
CALCULUS

PUlasso: High-Dimensional Variable Selection With Presence-Only Data

sklearn.linear_model.Lasso¶

Bilinear Games: Polynomial Time Algorithms for Rank Based Subclasses

Nash Equilibria and Bargaining Solutions of Differential Bilinear Games 

 
Positive-Unlabeled (PU) learning is a Machine Learning approach to Binary Classification where the training data comprises of positive instances as well as an additional unlabeled data that might contain positive and negative instances in unknown proportions. Positive-unlabeled learning methods aim to incorporate this unique scenario into the learning process, in a way that improves generalization of the learned representations of the positive class, when compared to simply treating all unlabeled instances as purely negative instances, or alternatively discarding them and training a one-class classifier over only the positive samples. 

What is Python's range() Function?

What is HMAC(Hash based Message Authentication Code)?

Definition

How we are fighting phishing

It is no secret that high-profile phishing campaigns are on the rise across our industry. GitLab decided to accelerate the implementation of the next phase of our security hygiene program, which would further enhance our security posture. As part of this acceleration, GitLab’s IT and Security teams recommended a swift adoption of phishing-resistant authentication across the entire company. This is how we did it and the results we achieved.





Python 3 coding to get user to input a password

Mathematical Trio Advances Centuries-Old Number Theory Problem

The work — the first-ever limit on how many whole numbers can be written as the sum of two cubed fractions — ends “a recurring embarrassment for number theorists.”

Lesson 4
For loop with range

Reverse brute-force attack

John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs

Hash Tables and Hashmaps in Python: What are they and How to implement?

bcrypt

Hashing

Hashcat

GPU Driver requirements:

  • AMD GPUs on Linux require "AMDGPU" (21.50 or later) and "ROCm" (5.0 or later)
  • AMD GPUs on Windows require "AMD Adrenalin Edition" (Adrenalin 22.5.1 exactly)
  • Intel CPUs require "OpenCL Runtime for Intel Core and Intel Xeon Processors" (16.1.1 or later)
  • NVIDIA GPUs require "NVIDIA Driver" (440.64 or later) and "CUDA Toolkit" (9.0 or later)

One-hot

Saint Hubert's Key

St. Hubert, the patron saint of hunters, mathematicians, opticians and metalworkers.

Code smell

In computer programming, a code smell is any characteristic in the source code of a program that possibly indicates a deeper problem. Determining what is and is not a code smell is subjective, and varies by language, developer, and development methodology.

Understanding code smells and how refactoring can help


Packet sniffing is a technique whereby packet data flowing across the network is detected and observed. Network administrators use packet sniffing tools to monitor and validate network traffic, while hackers may use similar tools for nefarious purposes.

scrypt

PBKDF2

List of PBKDF2 implementations

THE FARM CREDIT STRUCTURE

“Multiplier of Wheat” Icon of the Mother of God

The icon of the Theotokos, Multiplier of Wheat, was painted in 1890 in Kaluga, Russia. It was created with the blessing of Saint Ambrose of Optina, who also gave the icon its name. The Theotokos is portrayed as the protectress of farmers. Its feast day is celebrated on the 15th of October

1918–93: Soviet and post-Soviet Russia

The coat of arms of the Russian Soviet Federative Socialist Republic (RSFSR) was adopted on 10 July 1918 by the government of the Russian Soviet Federative Socialist Republic (Soviet Union), and modified several times afterwards. It shows wheat as the symbol of agriculture, a rising sun for the future of the Russian nation, the red star (the RSFSR was the last Soviet Republic to include the star in its state emblem, in 1978) as well as the hammer and sickle for the victory of Communism and the "world-wide socialist community of states".

National emblem of Belarus

Talking to my black neighbor about his work out in the fields of Texas sorting wheat

Freekeh

separate wheat from chaff bible
The wheat when first thrashed lies in one heap with chaff and straw, and is after winnowed to separate it; so the faithful are mixed up in one Church with the unfaithful; but persecution comes as a wind, that, tossed by Christ's fan, they whose hearts were separate before, may be also now separated in place.

Matthew 3:12

Durum

aka pasta wheat[3] or macaroni wheat

For Turkey sake

Bulgur

 Make sure uncle David Schubert has done his Schubert calculus with the

German–Turkish Treaty of Friendship

Allied Relations and Negotiations With Turkey
A. Turkey’s Neutrality in World War II

Turkey breeding profitability depends on investments
However, if turkey breeding is done successfully, it can provide a steady income stream. Turkey meat is in high demand, especially around holidays, and turkey breeders can sell their birds for a healthy profit

In comparison to broiler chickens, turkeys are extremely difficult to start, the brooding period is a much more stressful time for both poult and grower, and turkeys remain on the farm for a much longer period increasing the likelihood that something may go wrong before the flock sells.

Economic warfare

Victory Garden variety of father and son talks

Today’s sanctions regimes are a central legacy of the Great War

John 10:10 The thief cometh not, but for to steal, and to kill, and to destroy: I am come that they might have life, and that they might have it more abundantly.

Cashmere goat

William "Billy" Windsor I is a cashmere goat who served as a lance corporal in the 1st Battalion, the Royal Welsh, an infantry battalion of the British Army.[1]

Scapegoat

Scapegoat in the Bible
In the Bible, a scapegoat is one of a pair of kid goats that is released into the wilderness, taking all sins and impurities with it, while the other is sacrificed. The concept first appears in the Book of Leviticus, in which a goat is designated to be cast into the desert to carry away the sins of the community.
What Does Cabron Mean In Slang? A cabrn is a Spanish term that refers to a male goat, but it varies depending on the context. Cabrn is meant to mean “male goat” in Spanish. This term is commonly used to refer to someone who is rude, ignorant, or stupid.

Rogue Wounds

Playing ill or feigning madness has been a con for hundreds of years. But can a fake sickness become a real sickness?

MOTHER IS ACCUSED OF MAKING CHILD ILL

Kathy Bush courted so much attention for her chronically ill daughter that the family met with Hillary Clinton and testified before Congress.

"Hillarycare" (The proposed Health Security Act of 1993)

Florida woman happily reunited with mom nearly 20 years after arrest for child abuse in high-profile Munchausen case 

U.S. Department of Agriculture (USDA) | GRANTS.GOV

A scapegoat is a person or group you place blame on. When scapegoating children, the child is blamed or shamed for all the issues that arise within dysfunctional households. Here's how scapegoating works: The parent with NPD blames their child (or children) for family issues.
Farming and ranching in Texas: how to get started
  1. Write a business plan. ...
  2. Hire an accountant. ...
  3. Learn the regulations. ...
  4. Find the right property. ...
  5. Secure your financing. ...
  6. Purchase equipment and hire staff. ...
  7. Set up operations.

Grants - Texas Department of Agriculture

Profit margin

Kali (asura)

Kali is the great-great-grandson of Brahma. He is the son of Krodha (Anger) and his sister-turned-wife Himsa (Violence). He is the grandson of Dambha (Vanity) and his sister Maya (Illusion). He is the great-grandson of Adharma (Impropriety) and his wife, Mithya (Falsehood). Adharma was originally created from Brahma's back as a Maleen Pataka (a very dark and deadly sinful object).

Ahimsa silk

German Angora Rabbit
Over a month, a rabbit will eat 11.25 pounds of pellets. During a 90 day shearing interval, a healthy angora can be expected to eat 33.75 pounds of that same feed.

Clipping or plucking an Angora's wool every 90–120 days is necessary to prevent wool block.

“Angora rabbits produce 1 to 4 pounds of wool a year for the space of a three-foot cage [and] 60 bucks a year to feed it.” Angora rabbit wool will also fetch a higher price than the wool from many other fiber animals. “Good quality angora is about $10 an ounce straight off the rabbit,” Smith said

What's Up, Doc? (1950 film)

Rosalind Problems: Fibonacci, Rabbits and Recurrence Relations

Opportunity Cost Formula, Calculation, and What It Can Tell You

The Velveteen Rabbit Was Always More Than a Children’s Book

The basics of raising angora rabbits for wool

Microgreens and mushrooms smallholdings may have automation innovations as a NSF funding pitch

Robots in the Field – Online Videos Illustrate Automation from Seedling Production through Harvesting

Broiler

Robot Chicken

Silkie

The Silkie (also known as the Silky or Chinese silk chicken) is a breed of chicken named for its atypically fluffy plumage, which is said to feel like silk and satin. 

The most popular breeds for small flocks are Embden, Toulouse, African, Chinese, and Pilgrim.

Sebastopol goose

Golden Goose Chase

Avian Flu Kills Record 50.54 Million U.S. Birds, Making It Worst Outbreak in History

A petting zoo can be a lucrative way to bring visitors to your farm, especially if you're already involved in agritourism or you market farm products directly to customers, but it isn't right for every entrepreneur.

How to Start a Mobile Petting Zoo Party Business

Particle zoo

Lagrangian formalism

Protons: The essential building blocks of atoms

Antiquark

Inside the Proton, the ‘Most Complicated Thing You Could Possibly Imagine’

The positively charged particle at the heart of the atom is an object of unspeakable complexity, one that changes its appearance depending on how it is probed. We’ve attempted to connect the proton’s many faces to form the most complete picture yet.

AI Reveals New Possibilities in Matrix Multiplication

Atom (measure theory)

Connection (vector bundle)

Input–output model

Input-output matrix

Input-Output Matrix

Definition

The Industry Transaction Matrix (or Transactions Table) is the fundamental quantitative information used in Input-Output Analysis. It concerns the flow of products from each industrial sector (considered as a producer) to each of the sectors, itself and others (considered as consumers).

Make Sodium Hydroxide by Electrolysis with a Nafion Membrane Cell

Zig (programming language)

User Datagram Protocol UDP

In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths
A scapegoat is a person or group you place blame on. When scapegoating children, the child is blamed or shamed for all the issues that arise within dysfunctional households. Here's how scapegoating works: The parent with NPD blames their child (or children) for family issues.

Rust for Python Developers: Ownership and Borrowing

TypeScript with a Borrow Checker. Multi-threaded, Tiny binaries. No GC. Easy to write.

MIR borrow check

TypeScript Documentation

TypeScript is a free and open source programming language developed and maintained by Microsoft. It is a strict syntactical superset of JavaScript and adds optional static typing to the language. It is designed for the development of large applications and transpiles to JavaScript.[5] As it is a superset of JavaScript, existing JavaScript programs are also valid TypeScript programs.

How To See Black Holes By Catching Neutrinos

Neutrinos, Axions and Conformal Symmetry


Welcome to PyCaret

An open-source, low-code machine learning library in Python

PyCaret

Introduction to Pika

Pika is a pure-Python implementation of the AMQP 0-9-1 protocol that tries to stay fairly independent of the underlying network support library.


Pika is a Python implementation of the AMQP 0-9-1 protocol for RabbitMQ.

RabbitMQ is an open-source message-broker software (sometimes called message-oriented middleware) that originally implemented the Advanced Message Queuing Protocol (AMQP) and has since been extended with a plug-in architecture to support Streaming Text Oriented Messaging Protocol (STOMP), MQ Telemetry Transport (MQTT), and other protocols.[1]

Written in Erlang, the RabbitMQ server is built on the Open Telecom Platform framework for clustering and failover. Client libraries to interface with the broker are available for all major programming languages. The source code is released under the Mozilla Public License.

/ RabbitSSL

What is RPA? A revolution in business process automation

Robotic process automation

Scripting language

Types

Glue languages

Editor languages

A number of text editors support macros written either using a macro language built into the editor, e.g., The SemWare Editor (TSE), vi improved (VIM), or using an external implementation, e.g., XEDIT, or both, e.g., KEDIT. Sometimes text editors and edit macros are used under the covers to provide other applications, e.g., FILELIST and RDRLIST in CMS .

Job control languages and shells

Address space layout randomization

Address space layout randomization (ASLR)


Welcome to PyCaret

An open-source, low-code machine learning library in Python

PyCaret

Introduction to Pika

Pika is a pure-Python implementation of the AMQP 0-9-1 protocol that tries to stay fairly independent of the underlying network support library.


Pika is a Python implementation of the AMQP 0-9-1 protocol for RabbitMQ.

RabbitMQ is an open-source message-broker software (sometimes called message-oriented middleware) that originally implemented the Advanced Message Queuing Protocol (AMQP) and has since been extended with a plug-in architecture to support Streaming Text Oriented Messaging Protocol (STOMP), MQ Telemetry Transport (MQTT), and other protocols.[1]

Written in Erlang, the RabbitMQ server is built on the Open Telecom Platform framework for clustering and failover. Client libraries to interface with the broker are available for all major programming languages. The source code is released under the Mozilla Public License.

/ RabbitSSL

PU Learning Tutorial

An introductory tutorial to the "Learning from Positive and Unlabeled Data" field.

Garbage collection (computer science)

Nafion

Nafion derivatives are first synthesized by the copolymerization of tetrafluoroethylene (TFE) (the monomer in Teflon) and a derivative of a perfluoro (alkyl vinyl ether) with sulfonyl acid fluoride.

Make a Nafion Divided Membrane Cell for Electrolysis 

Degradation mechanism study of perfluorinated proton exchange membrane under fuel cell operating conditions

Resume Dataset

Data Wrangling

Making perfect "Chai" and other tales :)

Chai - Open-source framework for learning NLP

Intro to Machine Learning

Python

Learn the most important language for data science.

Reporting and Visualizing Fitts's Law: Dataset, Tools and Methodologies

Fitts's law

Fitts's law (often cited as Fitts' law) is a predictive model of human movement primarily used in human–computer interaction and ergonomics. The law predicts that the time required to rapidly move to a target area is a function of the ratio between the distance to the target and the width of the target.[1] Fitts's law is used to model the act of pointing, either by physically touching an object with a hand or finger, or virtually, by pointing to an object on a computer monitor using a pointing device. It was initially developed by Paul Fitts.

Fitts's law has been shown to apply under a variety of conditions; with many different limbs (hands, feet,[2] the lower lip,[3] head-mounted sights[4]), manipulanda (input devices),[5] physical environments (including underwater[6]), and user populations (young, old,[7] special educational needs,[8] and drugged participants[9]).

What is Fitts’ Law?

Jigsaw Unintended Bias in Toxicity Classification

Detect toxicity across a diverse range of conversations

Kaggle Competitions

A Simple Hugging Face Classifier

BERT with HuggingFace Transformers

Transformers-Huggingface 🤗 Beginners Guide

G2Net Gravitational Wave Detection

Find gravitational wave signals from binary black hole collisions

Near-optimal inference in adaptive linear regression

To Understand the Fourier Transform, Start From Quantum Mechanics

Transformation (function)

Spectrum of a theory

Spectrum of a sentence

Bias in cubic Gauss sums: Patterson's conjecture

number theory

A Numerical Mystery From the 19th Century Finally Gets Solved

Two mathematicians have proven Patterson’s conjecture, which was designed to explain a strange pattern in sums involving prime numbers.

Kummer sum

An improved spectral large sieve inequality for

 SL3(Z)

Small subgroups of SL(3, Z)

Special values of L-functions

Siegel zero 

Primes represented by binary cubic forms

Dirichlet character 

Dedekind zeta function 

Analytic properties

Hilbert space

Louisville
City in Kentucky

Spin magnetic moment

Time Slicing in CPU scheduling

Go

Appending to a slice

Defining the Time Window and Time Slice Properties

List of dimensionless quantities

Statistical Pictures

Image Statistics 

BLS       Inter-industry relationships (Input-Output matrix)

Generative Adversarial Network(GAN) using Keras

GAN — What is Generative Adversarial Networks GAN?

Hands-On Generative Adversarial Networks with PyTorch 1.0

Backdoor Attack is a Devil in Federated GAN-based Medical Image Synthesis

GANG-MAM: GAN based enGine for Modifying Android Malware

Kaggle Competition

GAN-Based Training for Binary Classifier

The challenge is to use pictorial-based or raw data-based GAN to generate malign samples suitable for classifier training

Cluster Analysis

The cluster analysis (CA) showed a clear separation of the Ocimum basilicum var.

Statistical Conclusion Validity

Types of features

Introduction to SIFT( Scale Invariant Feature Transform)

Mathematical statistics and computer vision

Uncertainty promotes information-seeking actions, but what information?

Statistics

Glossary of probability and statistics

Descriptive Statistics: Definition & Charts and Graphs

Descriptive statistics

Statistical Reasoning — Open & Free

Preparing Your Public Water System for a Natural Disaster

Emergency Preparedness Plans

Biden approves Texas disaster declaration after deadly freeze

Winter Weather

Local Emergency Planning Committee - Tier II

A Different Kind of Storm: Natech Events in Houston’s Fenceline Communities

Winter Storm 2021

Texas largely relies on natural gas for power. It wasn’t ready for the extreme cold.

Texas largely relies on natural gas — especially during times of high demand — to power the state. Experts say natural gas infrastructure, from pumping it out of the ground to the plants in city centers, was unprepared for the plunging temperatures brought by the winter storm.

SOUTH TEXAS COASTALZONE

Preparing Rural Water Systems for Extreme Weather and Climate Disasters



Arc flash

A fatberg is a rock-like mass of waste matter in a sewer system formed by the combination of flushed non-biodegradable solids, such as wet wipes, and fat, oil and grease (FOG) deposits. 

Coronavirus lockdown coincides with rise in fatbergs in sewers

Sick Of Ragging? How One WWTP Put The Kibash On A Rag Plagued Pump

Also note, Ragging is the term used for the so-called "initiation ritual" practiced in higher education institutions in the Indian subcontinent, including India, Pakistan, Bangladesh, and Sri Lanka. The practise is similar to hazing in North America, bizutage in France, praxe in Portugal, and other similar practices in educational institutions across the world. Ragging involves abuse, humiliation, or harassment of new entrants or junior students by the senior students.
TRWA's Professional Development & Training Department offers specialized training on topics such as operations, treatment, regulations, maintenance, operator certification and management skills in both an online and classroom format.

Bioreactor landfill

Drain-waste-vent system

Develop or Update an Emergency Response Plan

Emergency Response Plan (ERP) Template and Instructions



A method for controlling hydrogen sulfide in water by adding solid phase oxygen

HDPE Pipes; The Perfect Choice for Agricultural Applications

HDPE pipe

Magnesium hydroxide

Alkalis and Hydrogen Sulfide

What is a Lift Station?

The role of deep learning in urban water management: A critical review


Boothbay Harbor, Maine

The Importance of Capturing Institutional Knowledge

Balancing Act: How to Capture Knowledge Without Killing It

‘The world should be worried’: Saudi Aramco — the world’s largest oil producer — has issued a dire warning over 'extremely low' capacity. Here are 3 stocks for protection

GOP operative convicted in scheme to funnel Russian money into Trump campaign

Open Semantic ETL toolkit for data integration, data analysis, document analysis, information extraction & data enrichment

Open source frameworks for data integration, document processing, information extraction, data analysis, merging & combining data, content enrichment and data enrichment pipelines

8 Best Open-Source Tools for Data Mining

Difference between ELT and ETL

Debiasing neural retrieval via in-batch balancing regularization

Data based decision making

Data-Driven Decision Making: A Primer for Beginners

Some people going through breakups are reconsidering the best way to end a relationship, including how to honor their time together.

Massively multiplexed nucleic acid detection with Cas13

Combinatorial Arrayed Reactions for Multiplexed Evaluation of Nucleic acids (CARMEN) A platform for scalable pathogen detection

List of tools for static code analysis

Python

  • PyCharm – Cross-platform Python IDE with code inspections available for analyzing code on-the-fly in the editor and bulk analysis of the whole project.
  • PyDev – Eclipse-based Python IDE with code analysis available on-the-fly in the editor or at save time.
  • Pylint – Static code analyzer. Quite stringent; includes many stylistic warnings as well.
  • Semgrep – Static code analyzer that helps expressing code standards and surfacing bugs early. A CI service and a rule library is also available.

Transact-SQL

  • Visual Expert – A SQLServer code analysis tool[16] that reports on programming issues and helps understand and maintain complex code (Impact Analysis, source code documentation, call trees, CRUD matrix, etc.).

Tools with duplicate code detection

What is data preparation? An in-depth guide to data prep



[KDD2021] Federated Adversarial Debiasing for Fair and Transferable Representations: Optimize an adversarial domain-adaptation objective without adversarial or source data.

Ontology engineering

determinants, derivatives, and traces

Domain theory

Domain of discourse

Domain model

HOW TO MEASURE DATA QUALITY ?
A METRIC BASED APPROACH

The extrinsic/intrinsic classification of two-dimensional motion signals with barber-pole stimuli

How Should We Quantify Uncertainty in Statistical Inference?

Reducing Loss: Learning Rate

In Aztec mythology, the Centzon Tōtōchtin (Nahuatl pronunciation: [sent͡son toːˈtoːt͡ʃtin] "four-hundred rabbits"; also Centzontōtōchtin) are a group of divine rabbits who meet for frequent drunken parties. They include Tepoztecatl, Texcatzonatl, Colhuatzincatl, Macuiltochtli ("five-rabbit"), and Ometochtli ("two-rabbit"). Their parents are Patecatl and Mayahuel[1] and they may be brothers of Ixtlilton

ADHD Medication for Amphetamine Addiction Linked to Reduced Risk of Hospitalization and Death

Lionhead rabbit

Transgenic Rabbit

Other transgenic rabbits which have been used for the study of atherosclerosis include those with modified genes for apoE3 (Fan et al., 1998);

Genetically Modified Rabbits for Cardiovascular Research

Transgenic Rabbit Models for Studying Human Cardiovascular Diseases

Rabbit Model for Duchenne Muscular Dystrophy

A novel rabbit model of Duchenne muscular dystrophy generated by CRISPR/Cas9

Gene Editing, CRISPR and BioHacking- The Ultimate Frontier to Alter Humanity? 

Google

Transformers for Image Recognition at Scale

PyTorch

Kaggle

LayoutLM using the SROIE dataset

IBM

Data class of type Regex

Basic Text Analysis in R

A Step-by-Step Guide to Text Annotation [+Free OCR Tool]

A basic explanation of the most widely used preprocessing techniques by the OCR system.

Even the best OCR tool will fail to produce good results when the input image/document quality is too bad. Understanding the nuances of source image quality and also the techniques to improve the document quality will obviously improve your OCR Accuracy.

/ sanskrit-ocr

An OCR for classical Sanskrit document images


Choosing the Right OCR Service for Extracting Text Data

Kaggle
Extract json data(key-value pair) from image (OCR)

Detect text in images

Rigveda

Optical character recognition (OCR) to JSON

Tesseract (software)

Tesseract documentation

pytesseract 0.3.10

How to OCR with Tesseract, OpenCV and Python

Yoga Sutras of Patanjali

PyTesseract: Python Optical Character Recognition | Using Tesseract OCR with Python

Travels with Charley: In Search of America

Automatic Classification of Rhetorical Roles for Sentences: Comparing Rule-Based Scripts with Machine Learning

OpenCV

R

Image segmentation based on Superpixels and Clustering

OpenCV vs Skimage for Image analysis. Which one is better?

Bloom’s Taxonomy

Organizing thoughts from claims of disorganized thoughts may be conducted in category theory with the Hirsch Index and
The h-index is an author-level metric that measures both the productivity and citation impact of the publications, initially used for an individual scientist or scholar.

The index was suggested in 2005 by Jorge E. Hirsch, a physicist at UC San Diego, as a tool for determining theoretical physicists' relative quality[4] and is sometimes called the Hirsch index or Hirsch number.

Tensor Flow word2vec

Descartes’ Theory of Ideas

The Illustrated Word2vec

As a research knowledge broker, indeed the Hirsch Index is utilized to organize and quantify a body of knowledge and ideas.

Knowledge broker

The Intuitions Behind Knowledge Graphs and Reasoning

And the inherent advantages they provide over relational databases...

Apply organized research ideas and thoughts via Hirsch index as suggested by Godfather Wilt
Hello Docbot, hear from the Lawbot?

NVIDIA

Superpixels

Scientists Created a Black Hole in The Lab, And Then It Started to Glow

flake8 is a python tool that glues together pycodestyle, pyflakes, mccabe, and third-party plugins to check the style and quality of some python code.

Some other additions to PyCQA possibly

Pylint is a static code analysis tool for the Python programming language. It is named following a common convention in Python of a "py" prefix, and a nod to the C programming lint program. It follows the style recommended by PEP 8, the Python style guide.[4] It is similar to Pychecker and Pyflakes, but includes the following features:

  • Checking the length of each line
  • Checking that variable names are well-formed according to the project's coding standard
  • Checking that declared interfaces are truly implemented.[5]

It is also equipped with the Pyreverse module that allows UML diagrams to be generated from Python code.

It can be used as a stand-alone program, but also integrates with IDEs such as Eclipse with PyDev,[6] Spyder and Visual Studio Code,[7] and editors such as Atom,[8] GNU Emacs and Vim.

It has received favourable reviews.

Bandit

Bandit is a tool designed to find common security issues in Python code.

Welcome to Bandit

Mathematical Logic with Diagrams
Based on the Existential Graphs of Peirce

Read your Bible nephew Pierce

The logic of relatives, more precisely, the logic of relative terms, is the study of relations as represented in symbolic forms known as rhemes, rhemata, or relative terms. The treatment of relations by way of their corresponding relative terms affords a distinctive perspective on the subject, even though all angles of approach must ultimately converge on the same formal subject matter.

The consideration of relative terms has its roots in antiquity, but it entered a radically new phase of development with the work of Charles Sanders Peirce, beginning with his 1870 paper “Description of a Notation for the Logic of Relatives, Resulting from an Amplification of the Conceptions of Boole's Calculus of Logic”.

Shiloh

Bible

Google Cloud     OS scanning overview

Static Code Analysis

Type and style checking, potential bugs, and code complexity

Overview

Pyre has applications beyond type checking python code: it can also run static analysis, more specifically called Taint Analysis, to identify potential security issues. The Python Static Analyzer feature of Pyre is usually abbreviated to Pysa (pronounced like the Leaning Tower of Pisa).

ELI5: Pysa - A Security-Focused Static Analysis Tool for Python Code

GNU


What is GNU?

Goats are Browsers
Goats may graze head down in pastures like sheep, but if given the choice, they often prefer to reach for the leaves of trees or shrubs – heads up!

Your diagnosis was wrong. Could doctor bias have been a factor?

Rogue Wounds

Playing ill or feigning madness has been a con for hundreds of years. But can a fake sickness become a real sickness?

By Daniel Mason

Battle of Shiloh

John 10:10 The thief cometh not, but for to steal, and to kill, and to destroy: I am come that they might have life, and that they might have it more abundantly.

Cashmere goat

William "Billy" Windsor I is a cashmere goat who served as a lance corporal in the 1st Battalion, the Royal Welsh, an infantry battalion of the British Army.[1]

Scapegoat

Scapegoat in the Bible
In the Bible, a scapegoat is one of a pair of kid goats that is released into the wilderness, taking all sins and impurities with it, while the other is sacrificed. The concept first appears in the Book of Leviticus, in which a goat is designated to be cast into the desert to carry away the sins of the community.

Cppcheck

Cppcheck is a static analysis tool for C/C++ code. It provides unique code analysis to detect bugs and focuses on detecting undefined behaviour and dangerous coding constructs. The goal is to have very few false positives. Cppcheck is designed to be able to analyze your C/C++ code even if it has non-standard syntax (common in embedded projects).

TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology

Google Cloud Method: token

Pylint features

Pylint global options and switches

User Guide

Installation

graphviz provides a simple pure-Python interface for the Graphviz graph-drawing software.

DOT Language

OCR of dot peen markings
with deep learning and image analysis

OCR based Dot Matrix Character Recognition using Tesseract

Baseplate.py glues together tooling for interacting with the reddit backend ecosystem and spackles over things that are missing.

Linters

Instructions_UML_Python.rst

undefined-loop-variable / W0631

How to Write a Checker

Python Enumerate – Python Enum For Loop Index Example

ASP.NET is an open-source,[2] server-side web-application framework designed for web development to produce dynamic web pages. It was developed by Microsoft to allow programmers to build dynamic web sites, applications and services. The name stands for Active Server Pages Network Enabled Technologies.

Classes

Classes are a template for creating objects. They encapsulate data with code to work on that data. Classes in JS are built on prototypes but also have some syntax and semantics that are not shared with ES5 class-like semantics.

Object-Oriented Programming in Python vs Java

A hook can tell about additional source files or data files to import, or files not to import. A hook file is a Python script, and can use all Python features. It can also import helper methods from PyInstaller. utils.

Understanding PyInstaller Hooks

PyInstaller bundles a Python application and all its dependencies into a single package. The user can run the packaged app without installing a Python interpreter or any modules. 

DevStats

This is a toolset to visualize GitHub archives 
using HA Postgres databases and Grafana dashboards.
ESLint is a static code analysis tool for identifying problematic patterns found in JavaScript code.

Find and fix problems in your JavaScript code

Linting and prettifying Frontend(React) with ESLint on Husky and backend(Python) with PyLint on pre-commit.

Pants 2: The ergonomic build system

Pants 2 is a fast, scalable, user-friendly build system for codebases of all sizes. It's currently focused on Python, Go, Java, Scala, Kotlin, Shell, and Docker, with support for other languages and frameworks coming soon.

Backends

How to enable specific functionality.

Put on your programming

Pair of pants (mathematics)

Interface Detector.JavaScanner

Interface Detector.JavaPsiScanner

Android

Improve your code with lint checks

Neuronal Kv7 channels (also termed KCNQ channels) are the molecular correlate of the M-current. The Kv7 channels activate at rather negative membrane potentials (≤ 60 mV), thereby 'fine-tuning' the resting membrane potential. The Kv7 channels are widely expressed in the brain with the Kv7

KCNQ channels

KCQN genes encode family members of the Kv7 potassium channel family. These include Kv7.1 (KCNQ1) - KvLQT1, Kv7.2 (KCNQ2), Kv7.3 (KCNQ3), Kv7.4 (KCNQ4), and Kv7.5 (KCNQ5). Four of these (KCNQ2-5) are expressed in the nervous system. They constitute a group of low-threshold voltage-gated K+ channels originally termed the ‘M-channel’ (see M-current). The M-channel name comes from the classically described mechanism wherein the activation of the muscarinic acetylcholine receptor deactivated this channel.[1]

neural networks

Artificial Neural Nets Finally Yield Clues to How Brains Learn

The learning algorithm that enables the runaway success of deep neural networks doesn’t work in biological brains, but researchers are finding alternatives that could.

Best Image Recognition Software

Neural KCNQ (Kv7) channels

Serotonergic psychedelic

Middleware analyst

Computer programming

Sodium channel

Pharmacologic modulation

Blockers

Sodium channel blockers in neuropathic pain

Activators

The following naturally produced substances persistently activate (open) sodium channels:

Gating modifiers

The following toxins modify the gating of sodium channels:

Block-Recurrent Transformers

Nav1.7

Nav1.7 is a sodium ion channel that in humans is encoded by the SCN9A gene. It is usually expressed at high levels in two types of neurons: the nociceptive (pain) neurons at dorsal root ganglion (DRG) and trigeminal ganglion and sympathetic ganglion neurons, which are part of the autonomic (involuntary) nervous system.

Transformer Schematic Symbols

Potassium channel

Artificial enzyme

Nanozymes

Electrocatalytic Nanoparticles That Mimic the Three-Dimensional Geometric Architecture of Enzymes: Nanozymes

Feedforward neural network

Multi-layer perceptron

These LSD-based drugs seem to help mice with anxiety and depression — without the trip

/ memory-efficient-attention-pytorch

Position-wise Feed-Forward Network (FFN) 

Masking in Transformers’ self-attention mechanism

The persona (or mask) is the outward face we present to the world

Attention network

Neurorobotics

What is Computer Vision?

Computer Vision documentation

Microsoft Azure AI Fundamentals: Explore computer vision

Using Keras and artificial neural networks for handwritten digit recognition

neurons

How Computationally Complex Is a Single Neuron?

Computational neuroscientists taught an artificial neural network to imitate a biological neuron. The result offers a new way to think about the complexity of single brain cells.

Prevention, diagnosis, treatment: What is tested in evidence-based medicine?

Draft Specific Aims and One or More Hypotheses
Your goal is to create aims that are achievable in four to five years and have clear endpoints your reviewers can readily assess. Some people write their Specific Aims first and then develop a hypothesis; others do the reverse—use the approach that works best for you.

Introduction to the Specific Aims Page of a Grant Proposal

The Premise needs to be one page or less.

Goals and Milestones are called Specific Aims and can be expressed in up to 3,000 characters.
 You need to describe your technology in 500 characters.

List of Institutes and Centers

There are 27 NIH institutes. It is necessary to address the optimal department, aligning innovation with organization.

NIH is made up of 27 Institutes and Centers, each with a specific research agenda, often focusing on particular diseases or body systems.

In mathematics, in particular in knot theory, the Conway knot (or Conway's knot) is a particular knot with 11 crossings, named after John Horton Conway.[2]

It is related by mutation to the Kinoshita–Terasaka knot,[3] with which it shares the same Jones polynomial.[4][5] Both knots also have the curious property of having the same Alexander polynomial and Conway polynomial as the unknot.[6]

The issue of the sliceness of the Conway knot was resolved in 2020 by Lisa Piccirillo, 50 years after John Horton Conway first proposed the knot.[6][7][8] Her proof made use of Rasmussen's s-invariant, and showed that the knot is not a smoothly slice knot, though it is topologically slice (the Kinoshita–Terasaka knot is both)

Computational Gene Therapy for Cancer Treatment: Chromatin as a tool for the study of genome function in cancer with Role of Telomeres and Telomerase in Cancer

Chromatin as a tool for the study of genome function in cancer


Combined DNA Index System (CODIS) (512) 424-2790 email


CODIS is the acronym for the Combined DNA Index System and is the generic term used to describe the FBI's program of support for criminal justice DNA databases as well as the software used to run these databases.
 

Accelerate Scientific Discovery by Developing Unique Products

The mission of Novus Biologicals, LLC is to accelerate scientific discovery by developing and marketing unique products for the lifesciences. Novus Biologicals is also organized to provide the biological research community with a mechanism for commercializing unique biological materials. We also focus on continually monitoring scientific trends and supply materials to serve these trends. By making these products widely available to institutional and commercial researchers, Novus Biologicals plays an important role in furthering biological research.



Church Encoding in Python

Keep Austin weird going to Church numerals with the Python programming meetup

Monday, August 30, 2021 12:30 PM, Eastern Daylight Time (New York, GMT-04:00)

Church encoding in Python with Machine Learning Applications In Emergency Management as Two Sides of the Same Coin: The Link Between Illicit Opium Production and Security in Afghanistan

By David Vincent Bell Hirsch

We may develop AI medical machine learning to fight cancer with quantum biological oncology and to fight crime with AI/ML forensics including piezo elctropolatron and quantum sensor node innovations.

I am going to a webinar at 1:30 PM. I am also understanding terms and major grant writing organizations
What does a translational scientist do?

Microfluidics

https://passagetoprofitshow.com/podcast/053-passage-to-profit-show-09-15-2019-judith-sheft/







Girish J. Kotwal * and Sufan Chien














GA RESOURCES FOR BUILDING GRANT CAPACITY AT ASCENSION TEXAS
 


Comprehensive identification of HVs with CARMEN–Cas13a, The development and testing of a panel for all 169 HVs with at least 10 available genome sequences

How about that sister?

The New York Genome Center (NYGC) is an independent, nonprofit academic research institution that serves as a multi-institutional hub for genomic research.

University of Nevada Contact Enterprise & Innovation


SBIR Summit Biomedical Imaging LLC

emerging markets
Zanfer provides engineering services with a commitment to satisfying our customers’ demands in a timely, efficient and disciplined fashion.  We strive for excellence and innovation as demonstrated by the continuous business with current clients. Zanfer's proactive approach has helped us build long-lasting relationships.

University of North Carolina Willmington Research and Innovation Grant Writing Power house
and
Chelsea, MI 48118
BBC Entrepreneurial Training and Consulting was born September 5, 1990 when Mickey Katz-Pek filed for a Woman in Business Enterprise Certification just days after having registered Biotechnology Business Consulting (the BBC in our name) with the state of Michigan.

LARTA INSTITUTE

1149 S. Hill St., Suite 900
Los Angeles, CA 90015
Fax: (213) 622-6230

Convalescent Plasma Strikes Out As COVID-19 Treatment

Responding to this pandemic, preparing for the next

CRISPR enzyme programmed to kill viruses in human cells

Researchers harness Cas13 as an antiviral and diagnostic for RNA-based viruses

Conserved sequence

In evolutionary biology, conserved sequences are identical or similar sequences in nucleic acids (DNA and RNA) or proteins across species (orthologous sequences), or within a genome (paralogous sequences), or between donor and receptor taxa (xenologous sequences). Conservation indicates that a sequence has been maintained by natural selection.

A highly conserved sequence is one that has remained relatively unchanged far back up the phylogenetic tree, and hence far back in geological time. Examples of highly conserved sequences include the RNA components of ribosomes present in all domains of life, the homeobox sequences widespread amongst Eukaryotes, and the tmRNA in Bacteria. The study of sequence conservation overlaps with the fields of genomics, proteomics, evolutionary biology, phylogenetics, bioinformatics and mathematics.

Guide RNA

Guide RNA (gRNA) is a piece of RNAs that function as guides for RNA- or DNA-targeting enzymes, which they form complexes with. Very often these enzymes will delete, insert or otherwise alter the targeted RNA or DNA. They occur naturally, serving important functions, but can also be designed to be used for targeted editing, such as with CRISPR-Cas9.

Pathogen Detection Beta

MicrobeNet

MicrobeNet is an online database that contains information about more than 2,400 rare disease-causing microbes, like bacteria and fungi (molds). MicrobeNet allows public health and clinical laboratories anywhere in the world to match results from their diagnostic tests against CDC’s unique collection of pathogens, making it faster and easier for labs to identify and respond to dangerous diseases.

New CRISPR-Cas system cuts virus RNA

The emerging markets appear to cast innovations to destroy viruses into fighting cancer. I still have a lot of work to research emerging market maker academics, businesses, individuals and organizations.

Chromatin is the material that makes up a chromosome that consists of DNA and protein. A telomere is a region of repetitive nucleotide sequences associated with specialized proteins at the ends of linear chromosomes.

It would help a lot if people just did not get cancer in the first place or bother growing up for reverse age engineering and innovations to target and cut up cancer on a molecular level as we are doing with viruses now with innovations.

Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR)

FUSION ENERGY SCIENCES (FES) Build-Operate-Transfer (BOT) Contract, Economic bubble and Bubble fusion




Comments

Popular posts from this blog

Wisdom of Solomon Chapter 13 Playing with Pyroelectricity Fermi Surface lattice dynamics doping nanopore semiconductors

  Serenity inside Sells ventures, lease options and charters from Texas By David Vincent Bell Hirsch Frank Zappa - Valley Girl Valleytronics (from valley and electronics) is an experimental area in semiconductors that exploits local minima ("valleys") in the electronic band structure . Certain semiconductors have multiple "valleys" in the electronic band structure of the first Brillouin zone , and are known as multivalley semiconductors. [1] [2] Valleytronics is the technology of control over the valley degree of freedom, a local maximum/minimum on the valence / conduction band , of such multivalley semiconductors. The term was coined in analogy to spintronics . While in spintronics the internal degree of freedom of spin is harnessed to store, manipulate and read out bits of information, the proposal for valleytronics is to perform similar tasks using the multiple extrema of the band structure, so that the information of 0s and 1s would be stored as diff

Wild Turkey Calls to not be attached to inaction with Turkey bowling in the Dark Store Theory

Inclusive considerations for Constitutional Freedom of Religion as a convention of our society in the United States has many tangents of consideration: Shahid and Shaheed (Arabic: شهيد ‎ šahīd , plural: شُهَدَاء šuhadāʾ  ; female: šahīda ) originates from the Quranic Arabic word meaning "witness" and is also used to denote a martyr.  The word shahid in Arabic means "witness". Its development closely parallels that of Greek martys (Greek: μάρτυς - "witness", in the New Testament also "martyr"), the origin of the term martyr. Shaheed Singh Martyrs of Sikh History History of Martyrdom in Sikhism During the 1700s And concerning Ram Dass , an American spiritual teacher, former academic and clinical psychologist, and the author of the seminal 1971 book Be Here Now: Cultivating the Witness In philosophy, normative statements make claims about how things should or ought to be, how to value them, which

Thomas Sunday Texas disparity reply follow up with the Latin America Roosevelt Corollary and Roosevelt's quarantine speech, including Frida Kahlo and Saint Hubert Iconography for considerations

Self-portrait on the borderline between Mexico and the United States (1932) Coronavirus: Sick Americans face Kafkaesque nightmare in search of testing Innovation, Anyon ?   Год крысы   God krysy    With Heartful Mind upon moral and etiquette ... cut your cloth (idiom) If you cut your cloth according to your situation, you limit what you do to take account of the resources you have. Ford would be forced to cut its cloth according to the demands of the market. Bless Me, Ultima   What is the meaning of the idiom Cut your coat according to your cloth? cut your coat according to your cloth . UK. said to emphasize that someone should do as well as possible with the limited money they have. Copper Anti-microbial Clothing & Fabrics What is the origin and meaning of the idiom cut from the same cloth? The term cut from the same cloth refers to individuals that are similar in specific ways. The origin of this phras