Blog

  • CAPP_122_Chicago_Crime_Dashboard

    Visit original content creator repository
    https://github.com/brinda1410/CAPP_122_Chicago_Crime_Dashboard

  • UseCases

    License

    UseCases

    Is a library that is a generic implementation of the Repository pattern applied in the Data layer in Uncle Bob’s clean architecture. Now in Kotlin

    Motivation

    As developers, we always need to deliver high quality software on time, which is not an easy task. In most tasks, we need to make either a IO operation, whether from the server, db or file, which is a lot of boiler plate. And getting it functioning and efficient every time is a bit challenging due to the many things that you need to take care of. Like separation of concerns, error handling and writing robust code that would not crash on you. I have noticed that this code repeats almost with every user story, and i was basically re-writing the same code, but for different models. So i thought what if i could pass the class with the request and not repeat this code over and over. Hence, please welcome the UseCases lib.

    Requirements

    UseCases Library can be included in any Android application that supports Android 4.2 (Gingerbread) and later.

    Installation

    Easiest way to start

    // Create Class Dao to expose your models to the lib configuration
    // Standard Room init
    @Dao
    interface UserDao : BaseDao<User>
    
    @Dao
    interface RepoDao : BaseDao<Repository>
    
    @Database(entities = [User::class, Repository::class], version = 1)
    abstract class AppDatabase : RoomDatabase() {
    
        abstract fun userDao(): UserDao
        abstract fun repoDao(): RepoDao
    }
    
    // Fastest start
    DataServiceFactory(DataServiceConfig.Builder(context).build()).instance!!// all extra features are disabled
                    
    // Advanced init
    DataServiceFactory(DataServiceConfig.Builder(context)
                .baseUrl(API_BASE_URL)
                .okHttpBuilder(getOkHttpBuilder())
                .withRoom(object : DataBaseManagerUtil {
                                          override fun getDataBaseManager(dataClass: Class<*>): DataBaseManager? {
                                              return RoomManager(db, object : DaoResolver {
                                                  override fun <E> getDao(dataClass: Class<E>): BaseDao<E> {
                                                      return when (dataClass) {
                                                          User::class.java -> db.userDao() as BaseDao<E>
                                                          Repository::class.java -> db.repoDao() as BaseDao<E>
                                                          else -> throw IllegalArgumentException("")
                                                      }
                                                  }
                                              })
                                          }
                                      })
                .withCache(3, TimeUnit.MINUTES, 8192) // adds a cache layer with maximum size to allocate in bytes
                .okHttpBuilder(provideOkHttpClientBuilder()) 
                .okhttpCache(provideCache()) // you can also provide a cache for okHttp
                .postExecutionThread(AndroidScheduler.mainThread()) // your implementation of the post execution thread
                .build())
                .instance!!
    
    

    Code Example

    Get Object From Server:

    dataService.<Order>getObject(GetRequest
            .GetRequestBuilder(Order::class.java, true) // true to save result to db, false otherwise.
            .url(URL) // if you provided a base url in the DataServiceConfig.Builder
            .idColumnName(Order.ID)
            .id(orderId)
            .build())
            .subscribe()
    

    Get Object From DB:

    mDataService.<Order>getObject(GetRequest
            .GetRequestBuilder(Order::class.java, true)
            .idColumnName(Order.ID)
            .id(mItemId)
            .build())
            .subscribe()
    

    Get List From Server:

    mDataService.<Order>getList(GetRequest
            .GetRequestBuilder(Order::class.java, false)
            .fullUrl(FULL_URL) // for server access
            .build())
            .subscribe()
    

    Get List From DB:

    mDataService.<Order>getList(GetRequest
            .GetRequestBuilder(Order::class.java, false)
            .build())
            .subscribe()
    

    Post/Put Object:

    mDataService.<MyResponse>postObject(PostRequest // putObject
            .PostRequestBuilder(Payload::class.java, true) // Type of expected server response
            .idColumnName(Order.ID) // for persistance
            .url(URL) // remove for DB access
            .payLoad(order) // or HashMap / JSONObject
            .responseType(MyResponse::class.java)
            .build())
            .subscribe()
    

    Post/Put List:

    mDataService.<MyResponse>postList(PostRequest // putList
            .PostRequestBuilder(Payload::class.java, true) // Type of expected server response
            .payLoad(orders)
            .idColumnName(Order.ID) // for persistance
            .url(URL) // remove for DB access
            .responseType(MyResponse::class.java)
            .build())
            .subscribe()
    

    Delete Collection

    mDataService().<MyResponse>deleteCollectionByIds(PostRequest // putList
            .PostRequestBuilder(Payload::class.java, true)
            .payLoad(ids)
            .idColumnName(Order.ID) // for persistance
            .url(URL) // remove for DB access
            .responseType(MyResponse::class.java)
            .build())
            .subscribe()
    

    Delete Item:

    mDataService().<MyResponse>deleteCollectionByIds(PostRequest // putList
            .PostRequestBuilder(Payload::class.java, true)
            .payLoad(id)
            .idColumnName(Order.ID) // for persistance
            .url(URL) // remove for DB access
            .responseType(MyResponse::class.java)
            .build())
            .subscribe()
    

    Delete All from DB:

    mDataService.deleteAll(PostRequest
            .PostRequestBuilder(Order::class.java, true)
            .idColumnName(Order.ID)
            .build())
            .subscribe()
    

    Upload File

    mDataService.<MyResponse>uploadFile(FileIORequest
            .FileIORequestBuilder(FULL_URL, File("")) // always full url
            .queuable(true, false) // onWifi, whileCharging
            .responseType(MyResponse::class.java)
            .build())
            .subscribe()
    

    Download File

    mDataService.downloadFile(FileIORequest
            .FileIORequestBuilder(FULL_URL, File(""))
            .queuable(true, false) // onWifi, whileCharging
            .requestType(Order::class.java)
            .build())
            .subscribe()
    

    License

    Licensed under the Apache License, Version 2.0 (the “License”) you may not use this file except in compliance with the License. You may obtain a copy of the License at

    http://www.apache.org/licenses/LICENSE-2.0

    Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

    Visit original content creator repository https://github.com/Zeyad-37/UseCases
  • sql

    MySQL Projects

    Beginner Projects

    Create a simple database and table. Perform Create, Read, Update, and Delete (CRUD) operations.

    Build a user authentication system with registration and login functionalities.

    Develop a basic blog where users can create, read, update, and delete posts.

    Create a system to manage product inventory.

    Build a system to manage student information.

    Create a to-do list app with basic CRUD functionalities.

    Develop a system to manage personal and professional contacts.

    Create a system to manage books and library members.

    Build an online poll or survey system.

    Develop a simple product listing page for an e-commerce site.

    Create an employee directory with search functionality.

    Develop a basic banking system to manage accounts and transactions.

    Build a system to manage events and attendees.

    Create a simple dashboard to display key metrics.

    Develop a database to manage a collection of movies and their details.

    Create a system to manage recipes and ingredients.

    Build a task management system with project and task tracking.

    Develop a database to manage a bookstore’s inventory.

    Create a system to track personal expenses and income.

    Build a database to manage a music library.

    Intermediate Projects

    Develop a full-featured blogging platform with user roles and permissions.

    Create a database for an online store with categories, products, and orders.

    Build a social media platform with posts, comments, likes, and friendships.

    Develop a tool for managing projects, tasks, and team members.

    Create a system to manage hotel bookings, rooms, and customers.

    Build a CRM system to manage customer interactions and data.

    Develop a system to manage orders, payments, and shipping.

    Create a CMS to manage web content and user permissions.

    Build a forum system with categories, threads, and posts.

    Develop a system to track attendance for classes or events.

    Create a system for conducting and managing online exams.

    Build a system to manage real estate properties and listings.

    Develop a fitness tracking system to log workouts and progress.

    Create a platform for managing courses, students, and instructors.

    Build a system to manage subscriptions and recurring payments.

    Develop a job portal to manage job listings and applications.

    Create an online auction platform to manage listings and bids.

    Build a system to manage restaurant reservations and tables.

    Enhance a blogging platform to include tagging functionality.

    Create a multi-tenant application to manage multiple clients’ data.

    Develop a system to manage a loyalty program for customers.

    Build a platform for freelancers to list services and get hired.

    Create a system to manage sports leagues, teams, and matches.

    Develop a system to manage car rentals and reservations.

    Build a system to manage patient records and appointments.

    Create a system to handle online payments and transactions.

    Develop a platform to manage charity donations and campaigns.

    Build a tool for creating and grading online assessments.

    Create a system to manage job postings and applications.

    Develop a system to manage conferences, sessions, and attendees.

    Advanced Projects

    Enhance the blogging platform with advanced features like SEO optimization and analytics.

    Build a highly scalable e-commerce platform with multiple payment options and analytics.

    Develop an advanced CRM with predictive analytics and automation.

    Create a database to store and manage data for machine learning projects.

    Build a high-performance online store with caching and load balancing.

    Create a real-time analytics dashboard for monitoring key metrics.

    Develop a financial system with advanced features like budgeting and forecasting.

    Create a database to manage and analyze data from IoT devices.

    Develop a system to manage and verify blockchain transactions.

    Build a data warehousing solution for large-scale data storage and analysis.

    Create a real-time chat application with message storage and retrieval.

    Develop a recommendation system using AI and store the data in a MySQL database.

    Build a system to predict and schedule maintenance for machinery.

    Create a system to assess and manage financial risks.

    Develop a system to detect and prevent fraudulent activities.

    Build a system to optimize inventory levels and reduce costs.

    Create a system to manage and control smart home devices.

    Develop a learning platform that adapts to individual user needs and progress.

    Build a system to analyze healthcare data and provide insights.

    Create a system to manage and analyze data from autonomous vehicles.

    Develop a system to analyze sports performance data and provide insights.

    Build a platform to manage and analyze data from various smart city systems.

    Create a system to monitor and prevent cybersecurity threats.

    Develop a system to analyze climate data and predict changes.

    Build a system to manage and deliver virtual reality content.

    Create a system to store and analyze biometric data.

    Develop a system to optimize logistics and supply chain operations.

    Develop a system to create personalized marketing campaigns based on user data.

    Build a platform for high-frequency trading with real-time data processing.

    Create a system to manage and analyze data from smart agriculture devices.

    Develop a system to forecast inventory needs based on historical data.

    Build a system to monitor and analyze energy consumption data.

    Create a system to monitor patient health data remotely.

    Develop a system to manage and optimize financial portfolios.

    Build a system to process and analyze text data using advanced NLP techniques.

    Create a system to analyze and predict sales trends.

    Develop a system to analyze user behavior and provide insights.

    Build a system to monitor and manage traffic data in real-time.

    Create a system to analyze eCommerce data and optimize business strategies.

    Develop a system to detect and prevent financial fraud.

    Build a system to analyze stock market data in real-time.

    Create a system to manage and optimize smart factory operations.

    Develop a system to analyze patient data and provide medical insights.

    Build a platform to manage and analyze data from IoT devices.

    Create a system to analyze weather data and predict weather patterns.

    Develop a system to recommend personalized content to users.

    Build a system to manage and analyze blockchain data.

    Create a system to process and analyze events in real-time.

    Develop a system to optimize supply chain operations and logistics.

    Build a system to gather and analyze cybersecurity threat intelligence.

    Visit original content creator repository
    https://github.com/sammou00/sql

  • olympic-dash-R

    olympic-dash

    An interactive dashboard illustrating historic olympic data and trends

    Welcome!

    Thank you for visiting the olympic-dash project repository!

    This README file is a hub to give you some information about the project. Jump straight to one of the sections below, or just scroll down to find out more.

    What Are We Doing?

    “The goal of the Olympic Movement is to contribute to building a peaceful and better world by educating youth through sport practiced without discrimination of any kind and in the Olympic spirit, which requires mutual understanding with a spirit of friendship, solidarity and fair play.”

    — International Olympic Committee

    We propose building a visualization app to allow IOC members (and members of the general public) to explore historical Olympic results to review the success trends of various countries to determine abnormal performance trends and which countries could be future high medal achievers. All in the interest of making the olympic games more competitive and reward the countries that are developing their athletes and improving their performance in the games.

    Description of The Dashboard

    To explore the current dashboard, please click here.

    This app contains a dashboard which visualizes Olympic data from 1896 up until 2016. Key metrics of interest will be displayed including:

    • Medals earned per country
    • Medals earned depending on athlete age
    • Athlete height based on Olympic events
    • Medals per country will be displayed

    Medals earned per country will be displayed via a bubble chart. Countries are color coded by the IOC continent region they belong to.

    A bar chart will show the medals earned for each athlete age bracket, while a histogram will show the distribution of athlete heights based on the event selected. These figures will contain a slider allowing users to adjust athlete age ranges and a dropdown list, allowing users to select the event visualized respectively.

    Lastly, a line graph will display the number of medals earned by countries over time. This figure will be accompanied by a dropdown list allowing users to select a subset of countries to display on the graph.

    Radio buttons on the side of the dashboard will allow for filtering of summer/winter Olympics data, in addition to allowing for users to filter data by the type of medals. Additionally a year slider will allow for users to filter data in the bubble chart and both histograms by year. Using these filters, users will be able to investigate trends in Olympic success between countries, medal types, athlete demographics, and more.

    Example Usage

    Alt text

    Contribute to This Dashboard

    You are welcome to contribute to olympic-dash if you have any idea regarding to this dashboard. Please go through the contributing guidelines for the recommended ways if you want to contribute or report/fix any existing bugs.

    How to install and run locally

    Run the following command at the root directory of the project:

    1. Copy and paste the following link: git clone https://github.com/UBC-MDS/olympic-dash-R.git to your Terminal.

    2. On your terminal, type: cd olympic-dash-R.

    3. To run an app instance locally, first install the dependencies by typing: Rscript init.R

    4. Launch app.R by typing: Rscript app.R

    5. Using any modern web browser, visit http://127.0.0.1:8050/ to access the app.

    Contributors

    This app was developed by the following contributors:

    Contributor Github Username
    Allyson Stoll @datallurgy
    Helin Wang @helingogo
    Rubén De la Garza Macías @ruben1dlg
    Andy Yang @AndyYang80

    Code of Conduct

    In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation. For more details, see our code of conduct.

    License

    olympic-dash-R was created by Allyson Stoll, Helin Wang, Rubén De la Garza Macías and Song Bo Andy Yang . It is licensed under the terms of the MIT license.

    Visit original content creator repository https://github.com/UBC-MDS/olympic-dash-R
  • Manypriors

    PyTorch reference implementation of
    “End-to-end optimized image compression with competition of prior distributions”
    by Benoit Brummer and Christophe De Vleeschouwer ( https://github.com/trougnouf/Manypriors )

    Forked from PyTorch implementation of
    “Variational image compression with a scale hyperprior”
    by Jiaheng Liu ( https://github.com/liujiaheng/compression )

    This code is experimental.

    Requirements

    TODO torchac should be switched to the standalone release on https://github.com/fab-jul/torchac (which was not yet released at the time of writing this code)

    Arch

    pacaur -S python-tqdm python-pytorch-torchac python-configargparse python-yaml python-ptflops python-colorspacious python-pypng python-pytorch-piqa-git
    

    Ubuntu / Slurm cluster / misc:

    TMPDIR=tmp pip3 install --user torch==1.7.0+cu92 torchvision==0.8.1+cu92 -f https://download.pytorch.org/whl/torch_stable.html
    TMPDIR=tmp pip3 install --user tqdm matplotlib tensorboardX scipy scikit-image scikit-video ConfigArgParse pyyaml h5py ptflops colorspacious pypng piqa
    
    

    torchac must be compiled and installed per https://github.com/trougnouf/L3C-PyTorch/tree/master/src/torchac

    torchac $ COMPILE_CUDA=auto python3 setup.py build
    torchac $ python3 setup.py install --optimize=1 --skip-build
    

    or (untested)

    torchac $ pip install .
    

    Once Ubuntu updates PyTorch then tensorboardX won’t be required

    Dataset gathering

    Copy the kodak dataset into datasets/test/kodak

    cd ../common
    python tools/wikidownloader.py --category "Category:Featured pictures on Wikimedia Commons"
    python tools/wikidownloader.py --category "Category:Formerly featured pictures on Wikimedia Commons"
    python tools/wikidownloader.py --category "Category:Photographs taken on Ektachrome and Elite Chrome film"
    mv "../../datasets/Category:Featured pictures on Wikimedia Commons" ../../datasets/FeaturedPictures
    mv "../../datasets/Category:Formerly featured pictures on Wikimedia Commons" ../../datasets/Formerly_featured_pictures_on_Wikimedia_Commons
    mv "../../datasets/Category:Photographs taken on Ektachrome and Elite Chrome film" ../../datasets/Photographs_taken_on_Ektachrome_and_Elite_Chrome_film
    python tools/verify_images.py ../../datasets/FeaturedPictures/
    python tools/verify_images.py ../../datasets/Formerly_featured_pictures_on_Wikimedia_Commons/
    python tools/verify_images.py ../../datasets/Photographs_taken_on_Ektachrome_and_Elite_Chrome_film/
    
    # TODO make a list of train/test img automatically s.t. images don't have to be copied over the network
    

    Crop images to 1024*1024. from src/common: (in python)

    import os
    from libs import libdsops
    for ads in ['Formerly_featured_pictures_on_Wikimedia_Commons', 'Photographs_taken_on_Ektachrome_and_Elite_Chrome_film', 'FeaturedPictures']:
        libdsops.split_traintest(ads)
        libdsops.crop_ds_dpath(ads, 1024, root_ds_dpath=os.path.join(libdsops.ROOT_DS_DPATH, 'train'), num_threads=os.cpu_count()//2)
    
    #verify crops
    python3 tools/verify_images.py ../../datasets/train/resized/1024/FeaturedPictures/
    python3 tools/verify_images.py ../../datasets/train/resized/1024/Formerly_featured_pictures_on_Wikimedia_Commons/
    python3 tools/verify_images.py ../../datasets/train/resized/1024/Photographs_taken_on_Ektachrome_and_Elite_Chrome_film/
    # use the --save_img flag at the end of verify_images.py commands if training fails after the simple verification
    

    Move a small subset of the training cropped images to a matching test directory and use it as args.val_dpath

    JPEG/BPG compression of the Commons Test Images is done with common/tools/bpg_jpeg_compress_commons.py and comp/tools/bpg_jpeg_test_commons.py

    Loading

    Loading a model: provide all necessary (non-default) parameters s.a. arch, num_distributions, etc.
    Saved yaml can be used iff the ConfigArgParse patch from https://github.com/trougnouf/ConfigArgParse is applied,
    otherwise unset values are overwritten with the “None” string.

    Training

    Train a base model (given arch and num_distributions) for 6M steps at train_lambda=4096, fine-tune for 4M steps with lower train_lambda and/or msssim lossf
    Set arch to Manypriors for this work, use num_distributions 1 for Balle2017, or set arch to Balle2018PTTFExp for Balle2018 (hyperprior)
    egrun:

    python train.py --num_distributions 64 --arch ManyPriors --train_lambda 4096 --expname mse_4096_manypriors_64_CLI
    # and/or
    python train.py --config configs/mse_4096_manypriors_64pr.yaml
    # and/or
    python train.py --config configs/mse_2048_manypriors_64pr.yaml --pretrain mse_4096_manypriors_64pr --reset_lr --reset_global_step # --reset_optimizer
    # and/or
    python train.py --config configs/mse_4096_hyperprior.yaml
    

    –passthrough_ae is now activated by default. It was not used in the paper, but should result in better rate-distortion. To turn it off, change config/defaults.yaml or use –no_passthrough_ae

    Tests

    egruns:
    Test complexity:

    python tests.py --complexity --pretrain mse_4096_manypriors_64pr --arch ManyPriors --num_distributions 64
    

    Test timing:

    python tests.py --timing "../../datasets/test/Commons_Test_Photographs" --pretrain mse_4096_manypriors_64pr --arch ManyPriors --num_distributions 64
    

    Segment the images in commons_test_dpath by distribution index:

    python tests.py --segmentation --commons_test_dpath "../../datasets/test/Commons_Test_Photographs" --pretrain mse_4096_manypriors_64pr --arch ManyPriors --num_distributions 64
    

    Visualize cumulative distribution functions:

    python tests.py --plot --pretrain mse_4096_manypriors_64pr --arch ManyPriors --num_distributions 64
    

    Test on kodak images:

    python tests.py --encdec_kodak --test_dpath "../../datasets/test/kodak/" --pretrain mse_4096_manypriors_64pr --arch ManyPriors --num_distributions 64
    

    Test on commons images (larger, uses CPU):

    python tests.py --encdec_commons --test_commons_dpath "../../datasets/test/Commons_Test_Photographs/" --pretrain checkpoints/mse_4096_manypriors_64pr/saved_models/checkpoint.pth --arch ManyPriors --num_distributions 64
    

    Encode an image:

    python tests.py --encode "../../datasets/test/Commons_Test_Photographs/Garden_snail_moving_down_the_Vennbahn_in_disputed_territory_(DSCF5879).png" --pretrain mse_4096_manypriors_64pr --arch ManyPriors --num_distributions 64 --device -1
    

    Decode that image:

    python tests.py --decode "checkpoints/mse_4096_manypriors_64pr/encoded/Garden_snail_moving_down_the_Vennbahn_in_disputed_territory_(DSCF5879).png" --pretrain mse_4096_manypriors_64pr --arch ManyPriors --num_distributions 64 --device -1
    

    Visit original content creator repository
    https://github.com/trougnouf/Manypriors

  • preservation-nxng-engine

    nXng

    The Syndrome 3D engine

    ⚠️ This is LEGACY software. This source code is shared for historical purposes.
    The C++ source is most probably incomplete.

    nXng by Emmanuel JULIEN, 1999~2000



    Table of Content

    1. About
    2. Rules and Things to know
    3. Restrictions and loosy stuff
    4. Major features
    5. The Replay engine and MOA

    About

    nXng is a NEWTEK’s Lightwave based demo 3D-Engine. It barely works like any other 3D-Engine.

    It is pure software 3d-engine. Transformations/clippings/lightning are hand written the only calls made to D3D when using hardware rasterizer are SETRENDERSTATE and DRAWPRIMITIVE.

    Demos that use nX

    Requirements

    • Pentium class processor (MMX is NOT a plus),
    • DirectX 7.0 with at least a DirectX compatible graphic card,

    Legacy screenshots



    RULES AND THINGS TO KNOW

    • gAudio MP3 Library is available for FREE non-commercial use here: http://www.idf.net/gods
    • A scene !MUST NOT! have any of its objects first appearing with this motion step:
      • Position X, Y & Z: -9999999999,123456 m
      • Angle H, P & B: -9999999999,123456 °
      • Scale X, Y & Z: -9999999999,123456 *
      • If you fail to respect this rule then nX behavior is not predictable! (even if there is only one chance on infinity you make this ! (8)
    • !!! There are reserved keywords in surface’s name !!!:
      • See the SETTING UP THE SURFACE SHADERS section for a complete list.
    • TEXTURE REPEAT is VERY IMPORTANT!
      • nX will surely crash if you intend to wrap a texture without setting the appropriate
      • Surface’s flag !!! BEWARE ALSO specifying texture wrap when unused is a MEMORY HOLE !!!
      • In order to wrap texture with software renderer nX must stretch EACH wrapping textures to 256×256 ! (You might sometimes want to use this option to increase linear mapper precision but I really do not recommand doing random wrapping settings!)
      • NOTE : This does not apply when rendering via Direct3D.
    • Throughout this document MOA will be refered to as motion overdrawing
    • If you find some problems with truemap textured D3D surfaces or flashing/jerky lightning, try another scene size!
    • There is NO clipping bugs. Disappearing polygons are because of MOA being calculated every 8 frames, if you want no replay bug then update MOA in 1x mode <but have a good night then (;>,
    • MOA SHOULD BE updated whenever the scene changes BUT sometimes nX won’t detect scenes changes and this may result in HEAVY PLAYBACK BUGS! In this case just check the ‘update MOA’ option.
    • Last but not least : try to catch an AMIGA and get a life.

    RESTRICTIONS AND LOOSY STUFF

    • Supported texture formats are in prefered order TARGA, JPEG, BMP and IFF.

      • TARGA, BMP and IFF code are originals. JPEG is based on IJG distribution.
    • When using precalculated motion the number of face in scene must not exceed 65535,

    • Texture width is limited to 256×256 pixels in ALL rendering type IF wrapping otherwise specify [WM] in surface name to activate wide map support for surface (upto 65535×65535).

      • WARNING!: Wide texture repeat WILL crash!
      • But any size lower than 256×256 is allowed (even non-2^x size) with wrapping,
      • Direct3D has hardware texture size limitation (accelerator dependent).
      • Note: A 1024×1024 texture fill upto 4mo! think about it and don’t even think about CPU-caching datas (;
        • If a rendering type does not have WIDE support you’ll get a warning at load time.
    • Because of the way nX calculate UV mapping coordinate, the LIGHTWAVE’s texture velocity behavior cannot be reproduced. Only x and y component are took in account and added to u and v texture components.

      • i.e: if you specify an x velocity of 1.0 then the texture seen from front will scroll left because its U (x in texture space) will be increased each frame.

    MAIN FEATURES

    • Engine
      • Internal RGB888 routines,
      • Full Float32 FPU 3D calculations,
      • Light color support for all types,
      • Fully independent texture levels (center, size & velocity),
      • Scalable and morphable particle objects,
      • Dynamic shading based upon all lights in scene,
      • Fully parametrable lightning models on a per-surface basis, (specified by keyword ‘LGT_x[+x][+…]’ in surface name -G3E compatible-) NOTE : specifying LGT is only needed when restricting surface lightning to specific lights,
      • Diffuse and Specular percentage variable,
      • Specular and Glossiness pow support for all shaded rendering methods,
      • Extra texture effects for all rendering type,
      • Lightning speed load engine (even faster than Lightwave!),
      • Works both windowed/fullscreen either soft or d3d.
    • Lightwave functions compatibility level
      • ‘Planar image map’, ‘Cubic image map’, ‘Cylindrical image map’ support,
      • LIGHTWAVE’s ‘MetaMorph’ support (vertices + normals),
      • MORPH-GIZMO (extension to metamorph for multiple targets),
      • Alpha transparency (256 levels for both software & hardware),
      • Object dissolve fully supported (correctly affect transparency),
      • Transparency texture level support,
      • LIGHTWAVE’s ‘MaxSmoothingAngle’ support,
      • Camera focal envellop,
      • Support for unlimited lights: (with all envellop supported including cone angle&edge angle ones)
        • Ambient light intensity,
        • Distant Light,
        • Point Light,
        • Spot light,
        • Lens flare support.
      • Null object,
      • Inverse Kinematik (but not ala Lightwave so it is quite unusable for now),
      • Parent objects,
      • Target object,
      • Scale and pivot point,
      • Support motion/envelop End Behavior (Reset is interpreted as Stop),
    • Extra functions
      • Fully configurable spark emiters
    • Software rasterizer
      • Polygonal rasterizer/clippers (up to 333 edges),
      • Sub-pixel/Sub-texel accurate polydrawer with FLOAT32 precision,
      • GENERIC SOFTWARE RASTERIZER
        • Software has support for ALL render types!
        • Just try MAPPING + EVMAP + BUMP + ALPHA TEXTURE + ADDITIVE + GOURAUD it WORKS! (((:
        • plus 30 custom optimized cases (most common ones).
      • Software colored linear fog,
      • Software selective Z-Buffer (32 bits), must specify ‘[ZBUFFER]’ in surface name to activate,
      • Texture Width & Height wrapping (UV Wrap),
    • D3D rasterizer
      • Uses the texture management feature of D3D (DirectX 6+),
      • ZBuffer automatically select largest Zbuffer type available,
      • CAPS based rendering taking advantage of multipass/multitexture capable accelerators,

    THE REPLAY ENGINE AND MOA

    The precalculation works by previewing faces visibility for the whole motion (so you must recompute the full precalculation as soon as you change any scene’ entity motion). As the precalculation allows a GREAT speed improvement an option allows user to select precalculation precision so that you can use it at any time you try a scene. OF COURSE, the less precision you set the more glitches you’ll get during playback! As a rule you should only use x8 motion analysis for previewing scenes and final compilation should be done with HI precaprec. Preca precision bugs often appears as missing polygons …
    ONE VERY IMPORTANT THING TO REMEMBER IF YOU WISH TO GET MAXIMUM PROFIT FROM PRECALCULATION!:
    Always split your worlds/scenes in different objects. No matter if instead of one big static world you get 32 moving parent objects (or whatever more complex things you wish) the replay using preca will ALWAYS be FAR faster (except if you always see all objects at once (: ) bcoz the precalculation permits X32 to skip non-visible objects without even doing 1 mul for the object! {-8*

    Visit original content creator repository https://github.com/demoscene-source-archive/preservation-nxng-engine
  • windpipe

    Logo

    TypeScript streams influenced by Rust, an experimental successor to Highland.

    Features

    • Strict typing of stream values

    • Built-in error handling for stream operaitons

    • Many common stream operations (map, tap, flat_map, etc.)

    • Interopability with other async primitives:

      • Promises

      • Iterators (async and standard)

      • Node streams (WIP)

    • Stream kind (single emitter, multi-emitter, fallible, etc) in type system (WIP)

    • Control flow operators (if and case, WIP)

    • Stream-relative stack traces (nested anonymous functions in stack traces no more!)

    Examples

    Simple

    const values = await Stream.of(10) // Create a stream with a single value
        .map((value) => value * 2) // Double each value in the stream
        .tap((value) => console.log(`The doubled value is: ${value}`)) // Perform some side effect on each value
        .flat_map((value) => [value, -1 * value]) // Use each value to produce multiple new values
        .toArray(); // Consume the stream into a promise that will emit an array
    
    console.log(values); // [20, -20]

    Error Handling

    const s = Stream.from([1, 2, 5, 0])
        .map((value) => {
            if (value === 0) {
                // Invalid value, produce an error
                return err({ msg: "can't divide by zero"});
            }
    
            return 10 / value;
        })
        .map_err((err) => ({
            // We have to shout at the user, change the error message
            loud_msg: err.msg.toUpperCase()
        }));
    
    
    while (true) {
        const next = await s.next();
    
        if (is_end(next)) {
            // End of the stream reached!
            break;
        } else if (is_ok(next)) {
            // Successful value!
            console.log(next.value);
        } else if (is_err(next)) {
            // An error was encountered
            console.error("encountered an error:", next.value);
        }
    }
    
    /* Outputs:
      (log)   10
      (log)   5
      (log)   2
      (error) { loud_msg: "encountered an error: CAN'T DIVIDE BY ZERO" }
    */

    Control Flow

    In an effort to make common patterns like applying if statements in a flat_map, some basic control flow operations are available directly on the stream!

    // Using stream control flow:
    Stream.from([83, 18398, 915, 618])
        .if((value) => value > 750, (value) => process_large_transaction(value))
        .else_if((value) => value < 100, (value) => process_small_transaction(value))
        .else((value) => process_transaction(value))
    
    // Using regular `flat_map` with native control flow
    Stream.from([83, 18398, 915, 618])
        .flat_map((value) => {
            if (value > 750) {
                return process_large_transaction(value);
            } else if (value < 100) {
                return process_small_transaction(value);
            } else {
                return process_transaction(value);
            }
        });

    Error Handling

    Error handling is a crucial component to every application, however languages like JavaScript and TypeScript make it exceptionally easy to omit error handling, producing unrelaiable applications, and increasing debugging time due to there being no documentation within the source of where an error may be produced.

    Windpipe attempts to solve this by including errors as part of the core stream type: Stream<T, E>, where T is the type of the ‘success’ value of the stream, and E is the type of the ‘application error’. For example, if a stream was being used as part of a financial system for processing transactions then T could be number (representing the current value of the transaction) and E could be an instance of TransactionError which could include fields like error_no and message. As stream operations are applied to the value in the stream, each step may emit T onwards (indicating that all is well, the stream can continue), or E to immediately terminate that value in the stream and produce an error. Including the type of the error in the stream makes it obvious to the consumer that a) an error may be produced, and b) the shape of the error so that there aren’t any runtime gymnastics to work out what this error value actually is.

    Windpipe also includes a third variant that isn’t encoded in the type, aptly called unknown. This is meant to handle the many possible unhandled errors that may be thrown within an application that the developer mightn’t have explicitly handled. This attempts to address the prevalent issue with JavaScript where it’s impossible to know what errors may be thrown.

    The result of this is that the developer has a choice of three things to consume from each advancement of the stream:

    • T: The value we would expect to return from the stream

    • E: Some application error that we have explicitly defined and will have types for

    • any: An unknown error that was thrown somewhere, which we could try recover from by turning it into a value or an application error

    With an error type encoded in our type, we can do all the same fun things we can do with the stream values, such as mapping errors into a different error type. For example, if a login page uses a HTTP helper that produces Stream<T, HttpError>, .map_err can be used to convert HttpError into a LoginError.

    Windpipe vs x

    Windpipe is an attempt to plug a few holes left by other solutions.

    Windpipe vs Highland

    Highland is what originally spurred me to create Windpipe. Functionally, it’s relatively similar however its type support leaves a lot to be desired. The @types/* definitions for the package are incomplete, out of date, or incorrect, and the library itself is unmaintained. Finally, Highland has no support for typed application errors, it only emits as either a ‘value’ or an ‘error’.

    I am intending for Windpipe to be mostly compatible with Highland (particularly for the basic operators), ideally with some kind of adapter to convert one stream type into another, for partial adoption.

    Windpipe vs Native Promises

    Compared to Windpipe, native promises have three main downfalls:

    • Promises are eagerly executed, meaning that they will immediately try to resolve their value when they are created, rather than when they are called.

    • Promises may only emit a single value or a single error, emitting a mix or multiple of either is not possible without other (cumbersome) APIs such as async iterators.

    • Only the ‘success’ value of a promise is typed, the error value is completely untyped and may be anything.

    Windpipe should be able to completely support any use case that promises may be used for, in addition with many features that promises can never support.

    Visit original content creator repository https://github.com/clear/windpipe
  • curated-infosec

    curated-infosec

    curated list of free (or free tier available) infosec sites, & example content from there

    gettenantpartitionweb.azurewebsites.net

    Search String	cisa.gov
    Tenant ID	69c613d2-b051-4234-8ed1-fd530b70d5d3
    Azure AD Instance	Azure AD Global: North America
    Tenant Scope	GCC
    

    downloads.iqual.co.uk/Microsoft

    [To Parent Directory]
           <dir> Dell OEM
           <dir> dotNET
       616366080 NRMLFPP_EN1.ISO
           <dir> Office
           <dir> Server
           <dir> SQL
           <dir> Teams
           <dir> Windows
    

    files.rg-adguard.net/category

    Applications
    Business Solutions
    Designer Tools
    Developer Tools
    Insider Program
    Insider Program (ESD)
    MSDN Library
    Operating Systems
    Operating Systems - (ESD)
    Servers
    Themes
    Tools and Resources
    

    pan.huang1111.cn/s/45xRfg (DM me on KB for pword)

    Screenshot 2023-08-23 152732

    infosec.exchange/home

    infosec.exchange is part of the decentralized social network powered by Mastodon. A Mastodon instance for info/cyber security-minded people.
    

    osintframework.com

    OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
    

    cia.start.me

    Independent Security Researcher
    

    defuse.ca

    Welcome to Defuse Security
    Please feel free to check out, download, and share some of our free software, services, and research...
    Services
    PIE BIN
    "Pre-Internet Encryption for Text" - A pastebin with client-side (JavaScript) encryption.
    CrackStation.net Hash Cracker
    A HUGE database of precomputed password hashes, rainbow tables, and more.
    TRENT - Trusted Random Entropy
    A trusted third party for doing online drawings, contests, or anything else that needs unbiased random numbers.
    Online x86 / x64 Assembler
    Convert any x86 or x64 intel assembly language code into the bytes the CPU executes. Useful for shellcode development and reverse engineering.
    Big Number Calculator
    A calculator for obtaining the decimal representation of very large numbers.
    Software
    Password Generator
    Ultra-random Windows, Linux, and UNIX password generator.
    "HelloWorld!" Secure CMS for PHP
    A very lightweight, but very secure, Content Management System for PHP.
    PHP Hash Cracker
    A versatile hash cracking script written in PHP.
    Backup Verification Script (Ruby)
    A probabilistic recursive directory comparison tool.
    Sockstress
    A C implementation of the sockstress attack discovered in 2008.
    Security Research
    How to Hash Passwords (The Right Way)
    A detailed explanation of why passwords need to be hashed, and how to do it right.
    Password Policy Hall of Shame
    A list of websites that probably aren't hashing their users' passwords.
    NTFS File System Events Filename Disclosure
    It is possible to view the names of files in protected NTFS folders while they are being created or modified.
    PUP Confusion
    Evading antivirus detection using PUPs - Potentially Unwanted Programs.
    ... we hope you find our pages useful. Thanks for visiting!
    

    opensourcesecurityindex.io

    Open Source Security Index
    The Most Popular & Fastest Growing Open Source Security Projects on GitHub
    The Open Source Security Index is designed to make finding open source security projects easier for everyone. We use the Github API to pull projects based on popular security topics (# tags) and manually add projects without labelled topics. This is a live project evolving with the help of the open source security community, please share feedback including anything we have left out at @OSecurityIndex
    

    mvsp.dev

    Minimum Viable Secure Product
    A minimum security baseline for enterprise-ready products and services
    Minimal. Baseline criteria for secure products.
    Practical. Specifies checks applicable even to small companies.
    Modern. Updated annually.
    

    securemessagingapps.com

    Secure Messaging Apps Comparison
    

    fullhunt.io

    FullHunt is the attack surface database of the entire Internet. FullHunt enables companies to discover all of their attack surfaces, monitor them for exposure, and continuously scan them for the latest security vulnerabilities. All, in a single platform, and more.
    

    securitytxt.org

    security.txt
    A proposed standard which allows websites to define security policies.
    

    sso.tax

    The SSO Wall of Shame
    A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
    

    ed448.no

    This domain is protected with DNSSEC algorithm 16 (Ed448). It is hosted at domainname.shop. They sign all their zones using DNSSEC by default.
    Ed448 was standardized for use with DNSSEC in February 2017 (RFC8080) and has been a RECOMMENDED algorithm since June 2019 (RFC8624). It has been supported in the .no zone since February 2020. The latest stable versions of OpenSSL (3.x / 1.1.1) fully support Ed448. All older versions (including 1.1.0, 1.0.2 and 1.0.0) are now out of support and users of these older versions are encouraged to upgrade to 3.x or 1.1.1 as soon as possible.
    Ed448 is an Edwards-curve Digital Signature Algorithm (EdDSA). Like other ellipctic curve algorithms, its main advantage over RSA is that it offers the same level of security with much shorter key lengths, leading to shorter DNSKEY and RRSIG records. This in turn means that most DNS responses will fit in a single UDP packet (<512 bytes), and the potential for DNS amplification DDoS attacks is greatly reduced. EdDSA also has a number of advantages over ECDSA algorithms such as DNSSEC algorithm 13 (ECDSA P-256) and 14 (ECDSA P-384): it is faster, it is not dependent on a unique random number when generating signatures, it is more resilient to side-channel attacks, and it is easier to implement correctly.
    

    jitsi.org

    More secure, more flexible, and completely free video conferencing
    

    pgptool.org (or must use gpg to gen 25519 SC E A with comment)

    PGP Tool
    A simple and secure online client-side PGP Key Generator, Encryption and Decryption tool. Generate your PGP Key pairs, encrypt or decrypt messages easily with a few clicks.
    

    crackstation.net

    Free Password Hash Cracker
    Enter up to 20 non-salted hashes, one per line:
    32ca9fc1a0f5b6330e3f4c8c1bbecde9bedb9573
    Supports: LM, NTLM, md2, md4, md5, md5(md5_hex), md5-half, sha1, sha224, sha256, sha384, sha512, ripeMD160, whirlpool, MySQL 4.1+ (sha1(sha1_bin)), QubesV3.1BackupDefaults
    Hash	Type	Result
    32ca9fc1a0f5b6330e3f4c8c1bbecde9bedb9573	sha1	Password1!
    Color Codes: Green: Exact match, Yellow: Partial match, Red: Not found.
    

    slsa.dev

    Safeguarding artifact integrity across any software supply chain
    Supply-chain Levels for Software Artifacts, or SLSA ("salsa").
    It’s a security framework, a checklist of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure. It’s how you get from "safe enough" to being as resilient as possible, at any link in the chain.
    

    findsecuritycontacts.com

    What is a security contact?
    A security contact is a way for websites or services to sign post where and how security researchers can get in contact. It also typically describes whether there is any vulnerability disclosure policy or bug bounty.
    There are two methods to set security contacts, with a security.txt file served on a known path and with DNS TXT records.
    findsecuritycontacts.com scans the top 500 sites daily for their security.txt file or DNS records.
    You can also query any website to see if there is a security.txt file (RFC 9116) or DNS records and whether they appear to be formatted correctly.
    You can find more about the security.txt file at securitytxt.org or by looking up RFC 9116; and about DNS security records and the status on dnssecuritytxt.org
    

    dnssecuritytxt.org

    DNS Security TXT
    A standard allowing organizations to nominate security contact points and policies via DNS TXT records.
    This proposal was first made public on March 25, 2021 and is is currently a draft. We welcome comments and feedback! To make suggestions please submit a PR via Github or submit a ticket. Thanks for your interest!
    Find us on Twitter: https://twitter.com/dnssecuritytxt
    

    breachdirectory.org

    Maintenance Complete - visit deletemydata for removal
    BY ROHAN PATRA
    CHECK IF YOUR INFORMATION WAS EXPOSED IN A DATA BREACH
    ELON@TESLA.COM
    Protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
    Show 5 entries
    Search:
    CENSORED PASSWORD	SHA-1 HASH
    g?3@***********	e3b5b2c8ec279492f2fc347c00dec294efd91f52
    /RK2***********	aab763efd11eaa9dc986c48f09a002742b6a2b00
    4R6F***********	57a01a05a9724f518ac42391a4a4779aedd81cc6
    7555**	a65e955177bbc882c57ad93f4f3480b5487f34f5
    5UXr***********	f87302519c6a91b56054328b9cfaa9ca73cd1cc9
    Showing 1 to 5 of 6 entries
    

    dnsviz.net

    DNSViz is a tool for visualizing the status of a DNS zone. It was designed as a resource for understanding and troubleshooting deployment of the DNS Security Extensions (DNSSEC). It provides a visual analysis of the DNSSEC authentication chain for a domain name and its resolution path in the DNS namespace, and it lists configuration errors detected by the tool. Your feedback is appreciated.
    ed448.no
    2023-07-29
    Select a date 
    Updated: 2023-07-29 21:51:03 UTC (26 days ago) Update now
    « Previous analysis | Next analysis »
    Tweet
    DNSSEC Responses Servers Analyze
    DNSSEC options (show)
    Notices
    DNSSEC Authentication Chain
    RRset statusRRset status
    Secure (7)
    DNSKEY/DS/NSEC statusDNSKEY/DS/NSEC status
    Secure (8)
    Delegation statusDelegation status
    Secure (2)
    NoticesNotices
    Errors (1)
    DNSKEY legend
    Full legend
    SEP bit set	SEP bit set
    Revoke bit set	Revoke bit set
    Trust anchor	Trust anchor
    See also
    DNSSEC Debugger by Verisign Labs.
    

    zerotrustroadmap.org

    A Roadmap to Zero Trust Architecture
    Transform your network and modernize your security
    Learn which products will help you get started
    Questions about Zero Trust?
    Email info@zerotrustroadmap.org
    

    qr-code-generator.com (no signup, DL as jpg)

    CREATE YOUR QR CODE FOR FREE
    

    nordpass.com/secure-password

    How secure is my password?
    Take a moment to check if your passwords are easy pickings for bad actors.
    ••••••••••
    Password strength:
    WEAK
    Time it takes to crack your password:2 seconds
    Password composition
    Make sure that your password is long enough and contains various types of characters.
    At least 12 characters
    Lowercase
    Uppercase
    Symbols (?#@…)
    Numbers
    Has this password been previously exposed in data breaches?
    This password has been exposed 8,902 times.
    powered by haveibeenpwned.com
    

    uic.edu/apps/strong-password

    Password strength test
    This strength tester runs on your local machine and does not send your password over the network.
    Password
    ••••••••••
    Hide password
    Complexity
    Strong
    Score
    

    passwordsgenerator.net/plus

    Password Generator PlusBeta
    Password Length:33
    Include Numbers:( e.g. 123456 )Include Lowercase Characters:( e.g. abcdefgh )Include Uppercase Characters:( e.g. ABCDEFGH )Begin With A Letter:( don't begin with a number or symbol )Include Symbols: 
    !";#$%&'()*+,-./:;<=>?@[]^_`{|}~
    No Similar Characters:( don't use characters like i, l, 1, L, o, 0, O, etc. )No Duplicate Characters:( don't use the same character more than once )No Sequential Characters:( don't use sequential characters, e.g. abc, 789 )Auto Generate On The First Call:( generate passwords automatically when you open this page )Quantity:1
    Save My Preference:( save all the settings above in cookies )
    

    securityeducationcompanion.org

    SECURITY EDUCATION COMPANION
    A free resource for digital security educators
    SECURITY EDUCATION 101
    LESSONS
    TEACHING MATERIALS
    Welcome to the Security Education Companion!
    SEC is a resource for people teaching digital security to their friends and neighbors. If you’d like to help your community learn about digital security but aren’t sure where to start, these articles, lesson plans, and teaching materials are for you!
    

    coveryourtracks.eff.org

    See how trackers view your browser
    Learn About
    Test your browser to see how well you are protected from tracking and fingerprinting:
    TEST YOUR BROWSER
    Test with a real tracking company ?
    How does tracking technology follow your trail around the web, even if you’ve taken protective measures? Cover Your Tracks shows you how trackers see your browser. It provides you with an overview of your browser’s most unique and identifying characteristics.
    Only anonymous data will be collected through this site.
    Want to learn more about tracking? Read how it works with our guide:
    LEARN MORE ABOUT FINGERPRINTING
    

    security.lfx.linuxfoundation.org

    Security Leaderboard
    13,384
    Vulnerabilities Detected
    5,166
    Recommended Fixes
    7,800
    Unique Vulnerabilities Fixed out of 93,772
    2,197
    Repositories Successfully Scanned out of 3,666
    

    cryptii.com/pipes/ascii85-encoding (base85 more efficient than base64)

    Ascii85 / base85: Encode, decode and translate text online
    Ascii85, also called Base85, is a form of binary-to-text encoding used to communicate arbitrary binary data over channels that were designed to carry only English language human-readable text.
    

    freetsa.org

    Time Stamp Authority
    freeTSA.org provides a free Time Stamp Authority. Adding a trusted timestamp to code or to an electronic signature provides a digital seal of data integrity and a trusted date and time of when the transaction took place.
    

    Hash CheckSums

    lddgo.net/en/encrypt/crc

    CRC Calculation Online
    TAG back-end hardware
    Input Content
    

    toolkitbay.com/tkb/tool/BLAKE3

    BLAKE3 Hash
    Generate BLAKE3 (successor of BLAKE2) Hash / Checksum from your text or file.
    Text Input
    File Input
    32 Chars Key (Optional)
    

    Temp Services

    Temp Email: temp-mail.org

    Your Temporary Email Address
    autogen@autogen.com
    Forget about spam, advertising mailings, hacking and attacking robots. Keep your real mailbox clean and secure. Temp Mail provides temporary, secure, anonymous, free, disposable email address.
    

    Temp Virtual Shared SMS Number: (most apps deny) smstome.com/country/usa

    Receive SMS Online In USA
    The phone numbers below are free for personal use and are sorted by date of when they were acquired. The value in parentheses indicates how many messages have been received since the number was posted on our website. Please choose an area code or region that best fits your use case to hand over to the service provider asking for phone verification. Keep in mind these numbers are temporary and will be removed after about a month of time.
    

    GPG KeyServers

    keys.openpgp.org

    We found an entry for support@keys.openpgp.org
    https://keys.openpgp.org/vks/v1/by-fingerprint/864C145731DD963466CC7571A2604867523C7ED8
    Hint: It's more convenient to use keys.openpgp.org from your OpenPGP software.
    The keys.openpgp.org server is a public service for the distribution and discovery of OpenPGP-compatible keys, commonly referred to as a "keyserver".
    For instructions, see our usage guide.
    

    pgp.surf.nl

    Search results for '0x1A5D6C4C7DB87C81'
    Type bits/keyID            cr. time   exp time   key expir
    pub rsa4096/d2eb44626fddc30b513d5bb71a5d6c4c7db87c81 2009-09-15T23:54:29Z
    uid UEC Image Automatic Signing Key <cdimage@ubuntu.com>
    sig  sig  1a5d6c4c7db87c81 2009-09-15T23:58:29Z ____________________ ____________________ [selfsig]
    sig  sig  5759f35001aa4a64 2009-09-16T00:11:19Z ____________________ ____________________ 5759f35001aa4a64
    sig  sig  28deae7f29982e5a 2009-09-16T00:11:31Z ____________________ ____________________ 28deae7f29982e5a
    
    Visit original content creator repository https://github.com/roelds/curated-infosec
  • MicrOS

         /|    //| |                          //   ) ) //   ) )
        //|   // | |    ( )  ___      __     //   / / ((
       // |  //  | |   / / //   ) ) //  ) ) //   / /    \\
      //  | //   | |  / / //       //      //   / /       ) )
     //   |//    | | / / ((____   //      ((___/ / ((___ / /
    

    MicrOS

    A multitasking operating system for Arduino and compatible boards.

    The idea behind this operating system is to use the Arduino as a standalone computer. The only thing you’ll need (beside the Arduino itself) is a way to send and receive text via serial (the serial monitor that comes with the Arduino IDE for example). There is also an easy way to add libraries for keyboards and LCD screens for example, to use those as input and/or output devices. You will be able to program on the Arduino itself over the serial connection, run those programs and even save them to the EEPROM!

    Still under development

    MicrOS is still under development and far away from being finished. If you like this project, please consider giving it a star!

    Compatibility

    Board Compatibility Reason
    Nano Not Compatible Not enough dynamic memory
    UNO Not Compatible Not enough dynamic memory
    MEGA Fully Compatible

    This list is not completed yet and may change at any time during the development process!

    How to install

    Remeber: MicrOS is not finished yet! You might get unexpected results.

    1. Install the Arduino IDE if you have not done this already.
    2. Download the latest (unstable) main commit – right click, ‘Save link as…’ and save as ‘MicrOS.ino’.
    3. Open the downloaded ‘MicrOS.ino’ file in the Arduino IDE, select your board and the correct port in the ‘Tools’ section.
    4. Open the serial monitor in the ‘Tools’ section and set it to ‘Newline’ line-ending and 9600 bauds.
    5. Upload the sketch to your board.
    6. MicrOS should now be usable in the serial monitor window.
    7. MicrOS setup assistant
    8. After you have completed the initial setup and restarted your board, you will see the command line.
    9. MicrOS setup assistant
    10. You can find more information on how to use MicrOS below this.

    Instructions and documentations (not finished yet)

    Visit original content creator repository https://github.com/Techcrafter/MicrOS
  • FB-BEV

    Forward-Backward View Transformation for Vision-Centric AV Perception

    FB-BEV and FB-OCC are a family of vision-centric 3D object detection and occupancy prediction methods based on forward-backward view transformation.

    News

    • [2023/8/01] FB-BEV was accepted to ICCV 2023.
    • 🏆 [2023/6/16] FB-OCC wins both Outstanding Champion and Innovation Award in Autonomous Driving Challenge in conjunction with CVPR 2023 End-to-End Autonomous Driving Workshop and Vision-Centric Autonomous Driving Workshop.

    Getting Started

    Model Zoo

    Backbone Method Lr Schd IoU Config Download
    R50 FB-OCC 20ep 39.1 config model
    • More model weights will be released later.

    License

    Copyright © 2022 – 2023, NVIDIA Corporation. All rights reserved.

    This work is made available under the Nvidia Source Code License-NC. Click here to view a copy of this license.

    The pre-trained models are shared under CC-BY-NC-SA-4.0. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.

    For business inquiries, please visit our website and submit the form: NVIDIA Research Licensing.

    Citation

    If this work is helpful for your research, please consider citing:

    @inproceedings{li2023fbbev,
      title={{FB-BEV}: {BEV} Representation from Forward-Backward View Transformations},
      author={Li, Zhiqi and Yu, Zhiding and Wang, Wenhai and Anandkumar, Anima and Lu, Tong and Alvarez, Jose M},
      booktitle={IEEE/CVF International Conference on Computer Vision (ICCV)},
      year={2023}
    }
    
    @article{li2023fbocc,
      title={{FB-OCC}: {3D} Occupancy Prediction based on Forward-Backward View Transformation},
      author={Li, Zhiqi and Yu, Zhiding and Austin, David and Fang, Mingsheng and Lan, Shiyi and Kautz, Jan and Alvarez, Jose M},
      journal={arXiv:2307.01492},
      year={2023}
    }
    

    Acknowledgement

    Many thanks to these excellent open source projects:

    Visit original content creator repository https://github.com/NVlabs/FB-BEV