Hi Shellboy,

The latest version of maXbox 4.7.6.50 is shipping & shining on a Linux Mint 21 system (Mate) and Kubuntu from osboxes.org in a VirtualBox in order to execute a mapbox GIS script:
Also mX 5.0.2 as 64-bit box is ready for 2024. If you want to find a specific command, just look at the code. There is a search function that is built into the application itself. It allows you to have parameters, scripts, and starting points set. From Brain to Code:


The latest version of the Kubuntu operating system for desktop PCs and laptops, Kubuntu 20.10 supported with security and maintenance updates, until July 2021.



You recently downloaded “Regression or classification? Automated Essay Scoring for Norwegian.” 14,873 papers on Academia discuss “Recurrent Neural Network.”
Wine 5.0 with maXbox4 and Linux Mint 20 Mate Edition

Dear Max,
The name “Max Kleiner” is cited by a Discourse Analysis researcher in a paper uploaded to Academia.
Made in Borland

This week, Delphi turns 25. Happy birthday! To celebrate, we would like to highlight some Delphi and maXbox specific resources:
maXbox has been updated on BytesIn.com to the 4.7.1.82 version.
You can check out your application listed our site at:
https://www.bytesin.com/software/maXbox/
The function is easier to use than the one in sysutils. This function can be used for instance to implement another function, which is strangely enough not implemented in StrUtils: aPOS function that starts searching at the back of the string, working its way to the beginning.
Build a Roman Dice:
>>> rdice='I,II,III,IV,V,VI'
>>> rdice= rdice.split(',')
>>> rdice
['I', 'II', 'III', 'IV', 'V', 'VI']
>>> random.choice(rdice)
'III'

Python tries to convert a byte-array (a bytes which it assumes to be a utf-8-encoded string) to a unicode string (str). This process of course is a decoding according to utf-8 rules. When it tries this, it encounters a byte sequence which is not allowed in utf-8-encoded strings (namely this 0xff at position 0).
Performance comparison of state-of-the-art approaches shows a difference between the accuracy reported by the respective authors and the accuracy obtained in our experiments. We attribute this mainly to the lack of detail in the original publications, which did not allow for exact reproduction of the techniques in our implementation.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4981629/
Reinforcment Learning
initialize Q-table Q observe initial state s repeat select and carry out action a observe reward r and move to new state s' Q(s, a) = Q(s, a) + a(r + y maxa' Q(s', a') - Q(s, a)) s = s' until game over
y as gama is discount ~0.9
a as alpha learn rate
You will realize that the algorithm is basically doing stochastic gradient descent on the Bellman equation, backpropagating the reward through the state space (or episode) and averaging over many trials (or epochs). Here a is the learning rate that determines how much of the difference between the previous Q-value and the discounted new maximum Q-value should be incorporated.
XOR Solver


Code for EKON 22 Machine Learning Scripts:
https://sourceforge.net/projects/maxbox/files/Android/TensorFlow/
- 01/09/2018: The Perceptron as an XOR Gate script in Python, the mother of most Neural Networks!
- http://www.softwareschule.ch/examples/perceptron_python.htm
- Test it on a TensorFlow Playground:
- http://playground.tensorflow.org
- There are approaches to tackle multi-class classification as binary classification which are called One-vs-rest classification and One-vs-one classification, other classifiers, such as Random Forests, are able to deal with a multi-class setting in a natural way.
- 03/08/2018 run in show mode with parameter “s” of CLI:
- C:\Program Files (x86)\maxbox>maxbox4.exe
“examples\212_pas_statisticmodule42.TXT” s - 24/06/2018: The Sentiment Analysis API:
- http://www.softwareschule.ch/examples/sentiment.txt
- To analyze the sentiment of some text, do an HTTP POST to http://text-processing.com/api/sentiment/ with form encoded data containg.
WinPython is a free open-source portable distribution of the Python programming language for Windows XP/7/8, designed for scientists, supporting both 32bit and 64bit versions of Python 2 and Python 3.
Since September 2014, Developpement has moved to https://winpython.github.io/

Portable: pre-configured, it should run out of the box like maXbox on any machine under Windows (without any requirement) and the folder containing WinPython can be moved to any location (local, network or removable drive) with most of the application settings
family of siblings (i.e. other words with letters in the same places)
- 15/05/2018: The Perceptron, the mother of Neural Networks!
- http://www.softwareschule.ch/examples/perceptron.htm
- https://www.tensorflow.org/versions/r1.1/get_started/mnist/beginners
A perceptron is an algorithm used in machine-learning. It’s the simplest of all neural networks, consisting of only one neuron, and is typically used for pattern recognition.
- 06/03/2018: Nearly all the data points originally defined to be part of clusters are retained, and the noisy background data points are excluded. This highlights
the advantage of DBSCAN over kmeans() when data that should not be part of a cluster is present in a sample. This obviously is dependent on the spatial characteristics of the given distributions, which the script U_ProbabilityDist2 below shows. - 04/03/2018 Script to dive into common statistic distributions:
- probabilities and the resulting chart is an approximation of the probability density chart for the randoms – Welcome to Random Kingdom!

- https://sourceforge.net/projects/maxbox/files/Examples/13_General/820_U_ProbabilityDist2.pas/download
- 29/01/2018 more DataScience Examples on BigData
- 28/01/2018 measuring max. Entropy:
- maxcalcF(‘-0.5*log(1/2)/log(2)+-0.5*log(1/2)/log(2)’) = 1

Then, we compute the entropy for both the values of our attribute, ‘job’ and ‘publicity’:
Entropy for job and publicity:
job= maxcalcF(‘-7/12*log(7/12)/log(2)+-5/12*log(5/12)/log(2)’); = 0.9798
publicity= maxcalcF(‘-1/3*log(1/3)/log(2)+-2/3*log(2/3)/log(2)’); = 0.9182
- I know that entropy is the measure of randomness (or lack of information) of a process/variable and it can be defined as follows. for a random variable
- X? set A :- H(X)=?xi?A-p(xi)log(p(xi))
- Entropy is maximized if p is uniform means equal probability. Intuitively, I am able to understand it, like if all data-points in set A are picked with equal probability 1/m (m being cardinality of set A), then the randomness or the entropy increases.
- 07/01/2018 Neural Network DLL FANN Neural Network
- 28/12/2017 Web Spider App Check a background worker script!
The trick here is that “await” doesn’t really wait. It relinquishes control back to the main loop which continues to process events etc. In other words – the rest of the program is running as usual. It may also call another asynchronous function and ‘await’ on it. Only when an asynchronous function returns (any of them, if there are more than one running), the control is returned to the point of the appropriate ‘await’ call and the code continues with the next line.

When writing code in a code block I believe that it would be extremely useful if we could have the code auto indented instead of being forced to hit space bar multiple times. It would make editing so much faster. I tried this in maXbox but for the time beeing is just a simple indent guide to structure and find easier your code blocks:

- 20/09/2017 IoT Weatherstation Weatherstation (openweathermap) code
- 19/09/2017 IoT Thingspeak Cloud Check sensor script!
- 31/08/2017 Testfunctions + Servicescript Check Functions script
- 26/08/2017 WMI scripting + Security Check Anti Virus products script!
- 20/08/2017 SHA256 scripting + ADVAPI32.DLL SHA256 script!
- 16/08/2017 Tutorial 53 Real Time UML Real Time UML Bit Report
- 16/09/2017 Tutorial 54 Cryptographic API Crypto API
-
08/08/2017 Code and script of elevator simulator:
- 08/08/2017 the brain drain is running exIT<)

- 24/07/2017 V4.2.5.10 now 777 examples released Work with large examples and Style Lib Darkcolor Style III
- 09/07/2017 V4.2.5.10 Pascal Magazine 63 published WMI Tutor
- 31/05/2017 Most Read said academia Communication_with_a_TCP_Client_Server
- 16/05/2017 Tutorial 52 Second Part WMI Work WMI System
- 14/05/2017 Tutorial 52 Tech Cases WMI Work with WMI

- 02/05/2017 V4.2.5.10 Boules Simulator II Billard on a XP Machine of 2007 GUI
- 27/04/2017 V4.2.5.10 Example 761 Boules Billard GUI
- 27/04/2017 V4.2.5.10 Example 761 761_BoulesBillard3.txt
- 19/04/2017 V4.2.5.10 Example 760 760_XML_DOM_OLE_bestofbox4.TXT
- 19/04/2017 Tutorial 51 Tech Cases online 5 RealBit usecases of RealSoft studies
function getExePath: string; begin result:= ExtractFilePath(Application.ExeName) end;
Get Winbuild (Version) record from registry:
//KEY_EXECUTE (0x20019) is Equivalent to KEY_READ.
Const rsRegWinVerInfoKey =
'\SOFTWARE\Microsoft\Windows NT\CurrentVersion\';
//HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
var OSINFO: TOSVersionInfoEx;
function WindowsBuildFromRegistry: Boolean;
begin
Result:= false;
with TRegistry.Create1(KEY_READ) do try
RootKey:= HKEY_LOCAL_MACHINE;
if OpenKeyReadOnly(rsRegWinVerInfoKey) then
try
OSInfo.dwBuildNumber:=
Cardinal(StrToIntDef(ReadString('CurrentBuildNumber'),0));
Result:= true;
writeln('build# '+itoa(OSInfo.dwBuildNumber))
except
exceptionToString(exceptiontype,exceptionparam)
end;
CloseKey;
finally
Free;
end;
end;
In this session we spot the light on Pascal Script.
A scripting engine allows you (and your clients too) to customize an
application to his or her needs without having to recompile it.
In addition, you can update your apps by just sending a new script file that could even be compiled to byte code or just runs.
procedure Tfrm_liftupTimer(Sender: TObject); begin shp_lift.top:= shp_lift.top-4; shp_door.top:= shp_door.Top-4; if shp_lift.top = tmr_liftup.tag then begin tmr_liftup.enabled:= false; openDoor; buttononoff(true); liftfloorState(tmr_liftup.tag, lbl2) end; end;
The Topics:
– Components Integration in Lazaurs
– How does Pascal Script work ?
– Insight into Compiler and Runtimer
– Real World Examples

IT-security matrix PET
/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Private Extra Timeout
anonymous do backup redundant do logout
surf attrappe data & content sessions
email save password activate
pseudonym manager flight mode
no credit cards create virtualbox switch off router
/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
procedure Functional_5;
var i: integer;
begin
writeln(mbversion)
if mbverI >= 399 then
for i:= 0 to ALGetLocalIPs.Count-1 do
PrintF('ipname2 of %-20s is: %s',[ALgetLocalIPs[i],
ALIPAddrToName(ALgetLocalIPs[i])]);
end;
procedure ListDLLFunctions5(apath: string);
var list: TStrings;
i: Integer; s: string;
begin
list:= TStringList.Create;
try
//ListDLLExports('C:\WINDOWS\SYSTEM32\browseui.dll',List);
ListDLLExports(apath, list);
ShowMessage(IntToStr(list.Count)+' '+apath+' in DLL');
s:= 'List of '+apath+' functions:';
for i:= 0 to list.Count- 1 do
s:= s + #13#10 +itoa(i)+':'+list[i];
writeln(itoa(i)+': '+S);
finally
list.Free
end;
end;
As you may know a SHA (Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a binary data file.
SHA2 algorithm generates an almost-unique, fixed size 256bit (32-byte) hash result. 288: A CSP Cryptographic Service Provider is an independent module that performs all cryptographic operations. At least one CSP is required with each application that uses cryptographic functions realized in this tutor.
http://www.softwareschule.ch/download/maxbox_starter54.pdf
Visual UI Automation Verify (Visual UIA Verify) is a Windows GUI driver for the UIA Test Library that is designed for manual testing of UI automation. It provides an interface to UIA Test Library functionality that eliminates the coding overhead of a command-line tool.
Visual UIA Verify supports only the UIA Verify XML logger (WUIALoggerXml.dll) natively. User-selectable XML transformations are incorporated into Visual UIA Verify to present various views of the XML logger report in the Test Results pane.
















SHA2 algorithm generates an almost-unique, fixed size 256bit (32-byte) hash result. 288: A CSP Cryptographic Service Provider is an independent module that performs all cryptographic operations. At least one CSP is required with each application that uses cryptographic functions realized in this tutor.

