Hi Shellboy,

maxbox_screencode

The latest version of maXbox 4.7.6.50 is shipping & shining on a Linux Mint 21 system (Mate) and Kubuntu from osboxes.org in a VirtualBox in order to execute a mapbox GIS script:

Also mX 5.0.2 as 64-bit box is ready for 2024. If you want to find a specific command, just look at the code. There is a search function that is built into the application itself. It allows you to have parameters, scripts, and starting points set. From Brain to Code:

maxbox5_64logologo2

VirtualBox_ubuntu14_2_07_08_2019_15_29_24

The latest version of the Kubuntu operating system for desktop PCs and laptops, Kubuntu 20.10 supported with security and maintenance updates, until July 2021.

virtualbox_kubuntu_04_07_2021_11_56_13-1

UCScreenshot2024-03-14160410mX5

CodinGame-2020-Developer-Survey-technologien

You recently downloaded “Regression or classification? Automated Essay Scoring for Norwegian.” 14,873 papers on Academia discuss “Recurrent Neural Network.”

Wine 5.0 with maXbox4 and Linux Mint 20 Mate Edition

EKON 25

Dear Max,
The name “Max Kleiner” is cited by a Discourse Analysis researcher in a paper uploaded to Academia.

Made in Borland

maXbox4_25

This week, Delphi turns 25. Happy birthday! To celebrate, we would like to highlight some Delphi and maXbox specific resources:

maXbox has been updated on BytesIn.com to the 4.7.1.82 version.
You can check out your application listed our site at:
https://www.bytesin.com/software/maXbox/

The function is easier to use than the one in sysutils. This function can be used for instance to implement another function, which is strangely enough not implemented in StrUtils: aPOS function that starts searching at the back of the string, working its way to the beginning.

Build a Roman Dice:

>>> rdice='I,II,III,IV,V,VI'
>>> rdice= rdice.split(',')
>>> rdice
['I', 'II', 'III', 'IV', 'V', 'VI']
>>> random.choice(rdice)
'III'

securecode_wcloud2

Python tries to convert a byte-array (a bytes which it assumes to be a utf-8-encoded string) to a unicode string (str). This process of course is a decoding according to utf-8 rules. When it tries this, it encounters a byte sequence which is not allowed in utf-8-encoded strings (namely this 0xff at position 0).

Performance comparison of state-of-the-art approaches shows a difference between the accuracy reported by the respective authors and the accuracy obtained in our experiments. We attribute this mainly to the lack of detail in the original publications, which did not allow for exact reproduction of the techniques in our implementation.

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4981629/

Reinforcment Learning

initialize Q-table Q
observe initial state s
repeat
select and carry out action a
observe reward r and move to new state s'
Q(s, a) = Q(s, a) + a(r + y maxa' Q(s', a') - Q(s, a))
s = s'
until game over

y as gama is discount ~0.9
a as alpha learn rate

You will realize that the algorithm is basically doing stochastic gradient descent on the Bellman equation, backpropagating the reward through the state space (or episode) and averaging over many trials (or epochs). Here a is the learning rate that determines how much of the difference between the previous Q-value and the discounted new maximum Q-value should be incorporated.

XOR_MLXOR Solver

xornettest

EKON23_19_Webbanner_1000x500_Medienpartner_51327

Code for EKON 22 Machine Learning Scripts:

https://sourceforge.net/projects/maxbox/files/Android/TensorFlow/

WinPython is a free open-source portable distribution of the Python programming language for Windows XP/7/8, designed for scientists, supporting both 32bit and 64bit versions of Python 2 and Python 3.
Since September 2014, Developpement has moved to https://winpython.github.io/

winpython_launchers2

Portable: pre-configured, it should run out of the box like maXbox on any machine under Windows (without any requirement) and the folder containing WinPython can be moved to any location (local, network or removable drive) with most of the application settings

https://pbs.twimg.com/media/FKmL2huWUAMevKG?format=png&name=360x360 family of siblings (i.e. other words with letters in the same places)

A perceptron is an algorithm used in machine-learning. It’s the simplest of all  neural networks, consisting of only one neuron, and is typically used for pattern recognition.

  • 06/03/2018: Nearly all the data points originally defined to be part of  clusters are retained, and the noisy background data points are excluded. This highlights
    the advantage of DBSCAN over kmeans() when data that should not be part of a cluster is present in a sample. This obviously is dependent on the spatial characteristics of the given distributions, which the script U_ProbabilityDist2 below shows.
  •  
  • 04/03/2018 Script to dive into common statistic distributions:
  • probabilities and the resulting chart is an approximation of the probability density chart for the randoms – Welcome to Random Kingdom!
  • royalimage003
  • https://sourceforge.net/projects/maxbox/files/Examples/13_General/820_U_ProbabilityDist2.pas/download
  •  
  • 29/01/2018 more DataScience Examples on BigData
  • 28/01/2018 measuring max. Entropy:
  • maxcalcF(‘-0.5*log(1/2)/log(2)+-0.5*log(1/2)/log(2)’) = 1

entropy_all

Then, we compute the entropy for both the values of our attribute, ‘job’ and ‘publicity’:

Entropy for job and publicity:

job= maxcalcF(‘-7/12*log(7/12)/log(2)+-5/12*log(5/12)/log(2)’);  = 0.9798

publicity= maxcalcF(‘-1/3*log(1/3)/log(2)+-2/3*log(2/3)/log(2)’); = 0.9182

  • I know that entropy is the measure of randomness (or lack of information) of a process/variable and it can be defined as follows. for a random variable
    • X? set A :- H(X)=?xi?A-p(xi)log(p(xi))
  • Entropy is maximized if p is uniform means equal probability. Intuitively, I am able to understand it, like if all data-points in set A are picked with equal probability 1/m (m being cardinality of set A), then the randomness or the entropy increases.
  •  
  • 07/01/2018 Neural Network DLL FANN Neural Network
  •  
  • 28/12/2017 Web Spider App Check a background worker script!

The trick here is that “await” doesn’t really wait. It relinquishes control back to the main loop which continues to process events etc. In other words – the rest of the program is running as usual. It may also call another asynchronous function and ‘await’ on it. Only when an asynchronous function returns (any of them, if there are more than one running), the control is returned to the point of the appropriate ‘await’ call and the code continues with the next line.

maXbox_ubuntu_wine_24staging

When writing code in a code block I believe that it would be extremely useful if we could have the code auto indented instead of being forced to hit space bar multiple times. It would make editing so much faster. I tried this in maXbox but for the time beeing is just a simple indent guide to structure and find easier your code blocks:

mx4_screenshot_full6

sierpinski4real

function getExePath: string;
begin
  result:= ExtractFilePath(Application.ExeName)
end;

Get Winbuild (Version) record from registry:

//KEY_EXECUTE (0x20019) is Equivalent to KEY_READ.

Const rsRegWinVerInfoKey =
 '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\';
//HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

var OSINFO: TOSVersionInfoEx;

function WindowsBuildFromRegistry: Boolean;
begin
 Result:= false;
 with TRegistry.Create1(KEY_READ) do try
  RootKey:= HKEY_LOCAL_MACHINE;
  if OpenKeyReadOnly(rsRegWinVerInfoKey) then
  try
   OSInfo.dwBuildNumber:= 
     Cardinal(StrToIntDef(ReadString('CurrentBuildNumber'),0));
   Result:= true;
   writeln('build# '+itoa(OSInfo.dwBuildNumber))
  except
   exceptionToString(exceptiontype,exceptionparam)
  end;
  CloseKey;
 finally
  Free;
 end;
end;
In this session we spot the light on Pascal Script.

A scripting engine allows you (and your clients too) to customize an
application to his or her needs without having to recompile it.
In addition, you can update your apps by just sending a new script file that could even be compiled to byte code or just runs.

procedure Tfrm_liftupTimer(Sender: TObject);
begin
 shp_lift.top:= shp_lift.top-4;
 shp_door.top:= shp_door.Top-4;
if shp_lift.top = tmr_liftup.tag then begin
 tmr_liftup.enabled:= false;
 openDoor;
 buttononoff(true);
 liftfloorState(tmr_liftup.tag, lbl2)
end;
end;

The Topics:
– Components Integration in Lazaurs
– How does Pascal Script work ?
– Insight into Compiler and Runtimer
– Real World Examples

arduino_chesscapture

IT-security matrix PET

/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

Private                                           Extra                                           Timeout
anonymous                                   do backup redundant             do logout
surf  attrappe                               data & content                           sessions

email                                              save password                           activate
pseudonym                                   manager                                     flight mode

no credit cards                             create virtualbox                      switch off router

/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

procedure Functional_5;
var i: integer;
begin
writeln(mbversion)
if mbverI >= 399 then
for i:= 0 to ALGetLocalIPs.Count-1 do
PrintF('ipname2 of %-20s is: %s',[ALgetLocalIPs[i],
ALIPAddrToName(ALgetLocalIPs[i])]);

end;

procedure ListDLLFunctions5(apath: string);
var list: TStrings;
    i: Integer; s: string;
begin
  list:= TStringList.Create;
  try
    //ListDLLExports('C:\WINDOWS\SYSTEM32\browseui.dll',List);
    ListDLLExports(apath, list);
    ShowMessage(IntToStr(list.Count)+' '+apath+' in DLL');
    s:= 'List of '+apath+' functions:';
    for i:= 0 to list.Count- 1 do
      s:= s + #13#10 +itoa(i)+':'+list[i];
    writeln(itoa(i)+': '+S);
  finally
    list.Free
  end;
end;

tee_kraftwerk_cover

As you may know a SHA (Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a binary data file.

mX3QRCodeMonitor4SHA2 algorithm generates an almost-unique, fixed size 256bit (32-byte) hash result. 288: A CSP Cryptographic Service Provider is an independent module that performs all cryptographic operations. At least one CSP is required with each application that uses cryptographic functions realized in this tutor.

http://www.softwareschule.ch/download/maxbox_starter54.pdf

teaching_today2020_4

Visual UI Automation Verify (Visual UIA Verify) is a Windows GUI driver for the UIA Test Library that is designed for manual testing of UI automation. It provides an interface to UIA Test Library functionality that eliminates the coding overhead of a command-line tool.

maxbox_pane_uitool

Visual UIA Verify supports only the UIA Verify XML logger (WUIALoggerXml.dll) natively. User-selectable XML transformations are incorporated into Visual UIA Verify to present various views of the XML logger report in the Test Results pane.

pattern_konkret_2003_cover

Kubuntu 21

Lazarus with maXbox Pascal Script
TensorFlow and Keras on Ubuntu 20 VirtualBox
V 4.7.5
the modeler of super solar plant
Colgne out from maXbox4