## put some function in cloud and execute from any place cellular phone or tablet or laptop

Mostly I would like to have back a small string produced after entering few integers…

anyway the functions is:

``pw[j_Integer, nd_Integer, sl_Integer, oeo_Integer] :=   Style[StringJoin[" ",     Map[ctec[[# + 1]] &,      First[RealDigits[N[1/Prime[j*sl + oeo], (j*sl + oeo)*10*5],        Length[ctec], nd, -sl*oeo]]], " "], FontSize -> 25,    FontColor -> Red, Bold, Background -> Yellow] ``

where ctec is a list of all key-able characters in Latin-kb

## Greedy heuristic for buying fewest fridges of set temperature for products that can be kept in some temp. ranges?

We have a set of $$n$$ products, each $$i$$th product can be kept in a temperature between $$c_i$$ and $$h_i$$.

We have to buy fewest number of fridges for these products. The fridges can only have a fixed temperature.

For me I think of this problem as intervals of product temperatures that are placed on the axis.

My idea to solve it is to see which product’s temperature range overlaps with most other products temperature ranges, then we can place these products in one fridge.

But the algorithm for this would be inefficient..

What’s a simple greedy solution for this? any ideas?

## [ Insurance ] Open Question : If parents take out whole life insurance on their kids, then die first, shouldn’t someone get some cash back for the years of payments made?

The cover page says each child was insured for \$ 5K, ‘whole life paid up at age 65’ with number of years payable at 54 (for the child that was 11 when the policy started) with annual premiums of \$ 53.30. Isn’t the purpose of ‘whole life’ policies that it’s like an investment? Parents are most likely to die first, so of course their payments would stop before the kids ever reach 65. Is the policy worthless when payments stop? This seems like a bad, ill-advised deal if no one gets money back.   It doesn’t make sense to me that any LONG TERM policy should cancel just because a person was unable to make payments for a temporary period of time, like after getting laid off from work, disabled, death of a spouse, etc. It would be no wonder insurance companies make so much money if they get to keep all the money they taken in for many years from people who will never file a claim before they stop making payments for whatever reason.

## What are some possible repurcussions of using story-based leveling rather than experience points?

I am the DM for a D&D 4e game. Recently, I stopped keeping track of XP, on the assumption that I could just give my players a level every time they finished a major quest. In my mind, this had a few benefits:

1. It severely reduces bookkeeping, both for the players, and for me, because it means I don’t have to worry about each adventure having exactly ten encounters.
2. It prevents leveling at an awkward time ― we’ll never have an issue where the PCs finish an adventure and aren’t quite leveled up, and then get an encounter or two into the next adventure. In this way, it also helps split the game into even chunks.
3. It also removes a mindset that I think a lot of players pick up from videogames, where they feel like they need to go fight monsters and engage in random, pointless fights just to gain XP. This is not the sort of thing I want.

However, before I completely commit to this progression system, I’m like to see it from the opposite perspective, to see what I may be missing out on by abandoning XP.

What benefits does an XP-based leveling system offer that I will lose if I use a story-based leveling system?

## Algorithm for determining whether 2 entities of some feature are the same?

I’m trying to think of a way to do approximate joins between 2 rows in a data table. Like for example lets say I have a row where the person name is “John Doe” but then another data table uses a different person format like “Doe, John.” Now suppose I can put them both to a standard format say “John Doe.” Sweet so I have a way to reference them and let’s say there’s other data correlated with “John Doe” is there any algorithms out there to infer whether these 2 John Does are the same given the other data columns? You can see the other data columns as features as well, because I know FB has an algorithm to stop duplicates for the same person and StackOverflow will merge accounts if it thinks they’re being used by the same person. Any suggestions?

## What are some generalizations of the tree diameter?

Survey papers about tree diameters(and graph diameters) and their generalizations are also welcome

## Need a code to convert some sample text to .vtt format

I need a python code to convert some sample text in notepad to .vtt format. After the conversion the code should look like the .vtt form given below. The sample is text I want to convert from to .vtt is also give bellow. Please I want the code to be written in python

After conversion the text should look like the .vtt form given below.

WEBVTT

00:00.210 –> 00:00.930 Hi there.

00:00.940 –> 00:06.110 So would you be willing to take a look at mathematical operation on me in my lab.

00:06.120 –> 00:10.700 So first thing we are going to do is to create fullest Ari.

00:11.010 –> 00:26.070 Let’s say one hour later he can dance on 3 4 and 6 AM we going to create another four or eight B that

00:26.070 –> 00:29.620 contains five six eight.

00:30.030 –> 00:39.490 Make sure that you can either use space or comma to separate your Each element in the key.

Example of the sample text(example before the conversion) that I want to convert from to .vtt format is ….

0:00I’ve got a transformation, m that’s a mapping from Rn 0:06Rn, and it can be represented by the matrix A. 0:10So the transformation of x is equal to A times x. 0:14We saw in the last video it’s interesting to find the 0:17vectors that only get scaled up or down by the 0:20transformation. 0:21So we’re interested in the vectors where I take the 0:23transformation of some special vector v. 0:27It equals of course, A times v. 0:29And we say it only gets scaled up by some factor, 0:32lambda times v. 0:34And these are interesting because they make for 0:35interesting basis vectors. 0:38You know, the transformation matrix in the alternate 0:40basis– this is one of the basis vectors.

## How to remove some parts in contour-plot?

I am using this `ContourPlot`

``With[{n = 18},   Module[{colors},    colors = Join[{White}, (Lighter[Blue, #] & /@ Subdivide[1, 0, n])[[      3 ;; -3]], {Black}];   ContourPlot[\[Alpha]1^2 \[Alpha]3^-1, {\[Alpha]3, 0,      0.8}, {\[Alpha]1, 0, 0.8}, AspectRatio -> 1,     BaseStyle -> {FontSize -> 9},     FrameLabel -> {Style[\[Alpha]3, FontSize -> 14, Blue],       Style[\[Alpha]1, FontSize -> 14, Blue]},     Contours ->      Function[{min, max},       Range[Floor[min, -50], Ceiling[max, 50], 0.5]],     ContourStyle -> {Dashed},     ContourShading -> {Black, Darker[Red, 0.6], Darker[Red, 0.4],       Darker[Red, 0.2], Lighter[Red, 0.4], Lighter[Red, 0.75],       Lighter[Red, 0.9], Lighter[Blue, 0.9], Lighter[Blue, 0.75],       Lighter[Blue, 0.6], Lighter[Blue, 0.4], Lighter[Blue, 0.2], Blue,       Darker[Blue, 0.2], Darker[Blue, 0.4], Darker[Blue, 0.6],       Darker[Blue, 0.8]}, PlotLegends -> Automatic,     ImageSize -> {Automatic, 500}, PlotRange -> All]]] ``

The thing is, the left side of figure is kind of complicated. How can I reduce the contours in this area? In other words, how can I more decorate this plot and make it more professional?

## Some questions about encryption in Java

I have some questions about encryption in java as I’m trying to develop a password-manager-like application for my final test in Computer Science in High School (Germany). The password manager uses a server with a REST API to save the passwords in a database to transfer the passwords encrypted to the user where he might save it or just use it.

1. I have to do an extension for the browser Chrome to insert the passwords, but Chrome forces me to use JavaScript for writing the extension. So should I decrypt the passwords on the server and send them plain text by SSL or should I send the encrypted password and encrypted private key and let the extension decrypt both. But the problem here is that Java and JavaScript Crypto Libraries aren’t creating them the same, so I might need to call a java application from the extension.
2. I’m currently using `RSA/ECB/PKCS1Padding` as the Algorithm for encrypting text with public and private keys, I know, there is also AES, but I need public/private keys for my application, and therefore I want to ask if this algorithm is secure enough for saving passwords. Note: I’m encrypting the Private Key with PBE.
3. As I noted, I’m using PBE to encrypt my private key with a password that the user provides for the Password Manager, I’m using `PBEWithSHA1ANdDESede` therefore, is this also secure enough or is there anything that is better in the Java Standard Library.

## Nmap does not scan some IPs? [closed]

When I run the following command, `nmap -oG - 192.168.1.0-255 -vv > /root/Desktop/Results`, it does not scan 192.168.1.0-255 and therefore never finishes running. (This is my home network if that helps).