Medet Ahmetson

Medet Ahmetson

Medet Ahmetson is a developer passionate about technology, programming languages, blockchain, and sharing knowledge through writing.

Posts by Medet Ahmetson

Blockchain Game: AirCoins (AIRX)

14 May 2021Aircoins.ioAircoins describes itself as an augmented reality, cryptocurrency gaming, and marketing App available on Android and IOS App stores. Users can hunt for and collect cryptocurrencies within an interactive AR environment based on geolocation similar to Pokemon Go. The Aircoins team claims to have partnered with over 25 crypto projects, acquiring 27,000 active users with over 13M coins collected within the platform.

Read More

Ara leading ideas

My father wanted me to be an architect. He would bring 3ds Max, Photoshop and books that teaches those softwares. In Turkmenistan, architects earn a lot, and well respected in the society. And since childhood I was into the art, my father wanted me to be architect and be respected in the society. But I didn't want to be an architect. My curiousity led me to learn how computers work. It was in late 2000s. Turkmenistan just opened the Internet for mass. But it was a mobile internet. Slow and very expensive. I didn't have access to the video courses. To read the web articles as it was expensive for the internet traffic. I also didn't know English very well. In my situation, the books with the smallest size (.djvu, .pdf) that covers topic in depth were ideal.  So, I would learn programming by downloading books that were 3-6 megabytes in size in Russian language. And it was the books that are outdated. Books that would talk about Microsoft/Open-source wars, about operating systems such as OS 360/1, programming languages such as Cobol, Fortran and how C, C++ were great than them. Besides touching the history, I also grew up with their dream.  When I was an intern in 2017, I saw how the company organized an event related to the Cryptocurrencies and Web3. But that made me confused. I knew what was web3 as the semantic web not something as data ownership. I knew AI not as the deep learning, but as the expert systems. I knew Steve Jobs not because of Iphone, but from 80s in their war with Microsoft. I was learning programming to earn a passive income. After every project, I learnt something new. About design, UX, market research, team work and so on. The lesson that I took is that, writing the app is just 25% of the work. Another 25% of the work is dedicated for the maintaining the app, another 25% for the markeeting, another 25% for the business operations, UI, and so on. Eventually Entrepreneurship start to drain me. I start to look for the purpose of the life. What is the meaning of the life? One of the books said to me, combine what you are good at and what do you want to do since you were a child. I wanted to write stories. I knew art and programming. Combining them together led me to start working in the game industry. The Ara is a result of my experience: learning design tools before programming, game engines, crypto, open-source and dream of early computer pioneers with what I grew up with. When I moved to China I got an unlimited internet traffic with WiFi. I tried video tutorials. But eventually inclined to the fundamental works. They are dry but covers the topics in a systematic way. My questions about purpose, who am I also led to the interest in the history, religion. But even then, I could get with the monographs rather than reading articles of the science popularizers. And until when I was 25, I was going with what books were telling me, as they are smarter than me. Only in 2020s I start to get my own opinion and build my own philosophy. Still, my teachers are respected by me.

Read More

Ara

Computers are the best technology for expressing and exploring our minds. The result of expressing our thoughts through computers produces structured, precise information. This information has various names:Code Model (in machine learning) Program Software Smartcontract (in blockchain) Script Instructions Algorithm etc.All this information has unique characteristics: the computers or software could execute the data, including the conditions. That means they process the information partially depending on the condition.  Computers could partially replicate our brain activity. It's not meant to replicate fully our brain to replace us in the future. It's not meant to delegate some of our brain activity to automate human tasks. The main goal of computers is to increase our brain activity, including our imagination. Analogously, consider our brain as the laptop hardware. Then the computers are the USB, which adds extra storage. The USBs are pluggable mobile but have less hardware capacity. But with the USB, we can share the data between multiple laptops. The ability of computers to share data over the internet is crucial. In analogy, the internet is the mobility and pluggable parameter of computers. Surprisingly, the original pioneers of computers haven't considered the internet part of computers. But why is the internet a crucial part of computers? Because software is a product of our thinking. For us, the most necessary aspect is to share our ideas. One person does not build ideas. It always relies on the ideas of other people. You need other ideas for the information; you need others not to reinvent the wheels but to use what others built as giants by simply improving their ideas. You need others who would help you to improve your idea. We may need to collaborate on complex ideas with others. Lastly, our inner child tells us to share what we know with others. Thus, computers mediate between people in real-time or from different eras to work on the idea. Software is meant to be created by people for other people. Even if it's not the code itself, the user of the software or the result of the software must be for other people. Thus, we need to understand the internet as the inter-connected software, where everyone can change and modify the software. Understanding the internet opens up the true potential of computers for us. Understanding the internet opens up new software that has not yet been seen worldwide. One potential kind of software is folk software. It's software created by one person. Then, it was improved over time by other people. It might shift from its original form. The second important aspect of folk software is that it has a general version and different variants per user or group of users. Consider, for example, video-sharing software, YouTube. If YouTube was folk software,  the current version would be generic. But every user might have YouTube with a different feature set. For example, some people would prefer to see a 10-star rating instead of the like buttons. Others would want to see the auto-pausing after a few seconds. Sadly, YouTube is not a folk software. It's an online service with full ownership belonging to Google. When you were using the software, how many times have you wished it had the feature but didn't? Maybe you were sending a request to the developers to add that feature? Sadly, a current industry driven by profit would add the feature if it aligns with the profit they get, not by what is needed for a specific user. Even when you use software offline, and want to adjust it, the current software requires deep technical skills that most of us lack. Ara helps to adjust the software that is interconnected to each other. Which means we can compose multiple software into something new. Ara also helps to discover and publish your ideas with other people. In other words, Ara makes all software interconnected, composable, and adjustable by any user with minimum technical skill. Ara tries to work with the existing software rather than build the ecosystem from scratch. Ara consists of three parts. The Meta protocol that makes apps self-explaining. The app could be written in any language or in any internet topology. However, the software must have an endpoint that describes what it's doing so that anyone can use it without knowing its API or documentation upfront. The second component of the Ara is the blockchain-based indexer of all apps worldwide. It also provides a payment system that helps to sort the programs by popularity and rewards the users whose ideas are used by others for profit. The last part of the Ara is the client. The client helps modify, publish, collaborate, or discover software on the internet. The client comes with an AI assistant that understands the meta protocol.When a remixed version of the music becomes more popular than the original song, it's fair to share the reward both for DJ and composer. In the same way if a user creates a variant of the software, and commercializes it, then we want to reward the original authors too. It's a matter of ethics not legal rights.  In today's IT economy is like that. The unknown people dedicate their time to build an open-source software. Then, commercial companies build the software and become billionaire. With the ara we want to reward the open-source developers too. We want to make the economical model in a fair way. By fairness I mean, when an entrepreneur thinks of the commercial product, he shouldn't bother himself with the reward sharing, it's a psychologically implies his product is not his. At the same time, we want open-source software makers to earn a passive income. To solve it, we use the cryptocurrency in our indexer. And advised for all app makers to use the Ara cryptocurrency or backed by it cryptocurrency as the app's payment. This way, if user pays for the service, then ara makes sure that all other services depending on the service also get the share from the users. Using the crypto currency is advised but not required. Then what are the benefits for the commercial app makers? The indexer is what connects the client and the software with the meta protocol. It's more like a search engine, app store and DNS together. The most important part of the indexer is the recommendation system. There will be other softwares like the one that commercial app maker is creating, there will be another apps that is built on top of the commercial app. Thus, to make the software discoverable for more users, that software must be higher in the rank. And that ranking is defined using the payments. The higher the app traffic, the more discoverable it is. To prevent commercial apps from purchasing the traffic, we add additional method in our blockchain. Namely, we also look at the user's activity. The more they use the ara, the diverse is their app pool, the more weight it has in the software ranking. Of course it's the matter of the change as people constantly finds the weakens. The duty of updating the fairness in the recommendation system relies on the ara organization. Any indexer according to the rule must be open-source. And people may create a fork with better recommendation system. Thus, if the ara foundation makes something wrong, there are always people who can instantly replicate and create the better version. In short, there is no any final authoritive, everyone is replacable.  

Read More

Archived projects

WaiMaiPayDemo: https://github.com/ahmetson/wai-mai-paiBackend Source Code: https://github.com/ahmetson/api-wmpThis was the project I was working on in 2017.WaiMaiPay is a delivery man's app that notifies the clients as it gets closer. Sometimes, people are not checking their smartphones. The delivery guy using it should call the customer. WaiMaiPay calls the clients as delivery guy is closer.It tracks the distance by GPS.https://github.com/ahmetson/smartcontract-practiceA side project I tried to make for the internsLearn by creating real projects.Blockchain part: https://github.com/ahmetson/element-words-smartcontractsGame: https://github.com/ahmetson/element-wordsA demo for the Neo hackathon.https://www.youtube.com/watch?v=hVdgSr93qtghttps://www.youtube.com/watch?v=YGLvEwzZU5c 

Read More

Axie Infinity (AXS)

14 May 2021https://axieinfinity.com/It is a blockchain-based trading and battling game partially owned and operated by the players.

Read More

BEPRO Network (BEPRO)

14 May 2021https://bepro.network/It is a codebase for DeFi, Gaming, Prediction Markets, and More.21 December 2023The company was rebranded into a Task Based Work.

Read More

Blockchain Game: DFSocial Gaming (DFSOCIAL)

14 May 2021https://dfsocial.com/It aims to bring together the services of decentralized finance protocols and gaming. Long-term vision is a gaming platform with a mobile app, so holders can earn gaming rewards.

Read More

Blockchain Game: Waxe (WAXE)

14 May 2021Waxe.ioMost convenient way to create, buy, sell, and trade virtual items to anyone, anywhere in the world.

Read More

Conspect: Scavenge - blockchain game created with Cosmos SDK

15 May 2021Terrible tutorial. A lot of things are not clear. Now, I have to deep diving into the code itself. This tutorial is helpful to get a boilerplate.

Read More

Game: Para-para

https://ahmetson.github.io/para-para/A demo of the para para. A new gameplay for the match 3.Match the elements and collect the chemical elements faster than the opponent. Prevent the opponent from containing his chemical elements if he is closer.

Read More

Game: Serdar

Demo: https://github.com/ahmetson/serdarSource Code: https://github.com/ahmetson/serdar-sourceA mobile educational game that teaches math. StoryThere was a Turkmen village under the mountains. An ally of the town called out for a defense as all men went to the rescue.Another village belonged to the wealthiest man in the world. He loved the daughter of the Chief. But the village Chief's daughter didn't respond to the richest man's love. When all the men left the village, the world's richest man attached the village to take the girl by force.The village sent a message to the men. A group of men led by Serdar returned to the town as soon as possible.The wealthiest man mercenaries to block the Serdar while catching the village with his force.GameplayTo not spend his time, help Serdar to choose the right path from multiple routes. 

Read More

Gone projects

Zytara Dollar (ZUSD) - 14 May 2021It's a stablecoin created by Zytara Capital and issued by Prime Trust, a Nevada-based chartered trust company.Pteria (PTERIA) - 14 May 2021A governance token for DAO. This token is designed to be used by third-party DAOs as a functional utility token to allocate tokens to new projects.Playkey (PKT) - 14 May 2021Cloud gaming platform on crypto profitable for everyoneIQeon (IQN) - 14 May 2021IQeon.com is the first p2p platform to support IQN digital asset transactions. Users can participate in the games and monetize their in-game achievements using IQN.Atari Token (ATRI) - 14 May 2021Plan to become a universal means of payment for the game industry. Atari Chain LTD designed it.Lotto Finance (LOTTO) - 14 May 2021Automatically enters all holders into a lottery once in a day.

Read More

Israel vs Hamas: peaceful solution

The 7th October 2023 event is a terrific event that occurred in Israel.What I want is for Israelis to show mercy for this. Because the politics that Hamas is playing versus what Israel is playing are on the different level.Israel is more powerful than the established, prosperous nuclear power supported by the collective West, especially by the USA.To have a piece, we should have mercy. What I despise is that Israel is pretending to be merciful because mercy is not a punishment but forgiveness. Where is the mercy in the warnings when they want to punish Palestinians anyway?Another thing I despise in the politics of Israel is playing the victim when they are the aggressor against Palestinians.What is the real mercy is when in Africa, white people were ruling over the black people, some black people uprised against them. They used all methods to be heard—mainly bombing near the schools.Eventually, they took the victory and brought justice to the black people by giving them the same rights as white people. Nelson Mandela, the leader of this uprising, was named Person of the Year. He is respected by the West, which didn't focus too much on his bombings.What is the solution for Israel giving up half of the land to the Palestinians? To avoid revenge and hatred from their side, Israel, as the wealthiest country, could compensate with money by helping to build Palestine by modernizing it.Rather than spending much on the military budget, they could pay more on building Palestine. Jews would not be richer and have a comfortable life as today, but in return, they would get peace, and they wouldn't have to fear danger behind the border.When a girl X breaks up with a boyfriend and feels a massive hatred in her heart, she casts on porn or goes to a club to have nights with dozens of people. You can't have mercy on such kind of people too much.When girl Y is sent to trade her body at age 15 by her alcoholic parents, the girl is doing the same bad, unjustified things as girl X. But you should have mercy on girl Y because of the conditions that created it. 

Read More

Manva Chat

Chats https://topai.tools/s/anime-character-chatbot https://kajiwoto.ai/https://goatchat.ai/chat/animeai GoatChat talks to the anime character. Comis https://neuralcanvas.io/ Create Photorealistic Comics Series with AIhttps://www.fotor.com/features/ai-comic-generator/ Create and visualize your stories into captivating comics using Fotor’s AI comic generator. Let AI revolutionize the way you create comics and enjoy the innovatively fast and easy AI tool to generate engaging comic scenes!https://aicomicfactory.com/ Create Stunning Comics without Drawing Skills using our cutting-edge AI Comic Generator. Bring Your Comic Dreams to Life with AI Creativity.https://www.plugger.ai/tasks/ai-comic-generator an innovative AI-powered tool that magically transforms text into captivating comic stripsSimilar apps https://chrisgliddon.com/a-trip-down-memory-lane-microsoft-comic-chat-6f23b8a64295 Story of the Microsoft Comic Chat released in mid 1990s.https://kurlander.net/DJ/Videos/ComicChatVideo.shtml Video showcase of the comic chat.https://grail.cs.washington.edu/wp-content/uploads/2015/08/comics.pdf Paper about chat. Learn the purpose of why they created it. I guess it increases the engagement. Attemptshttps://www.youtube.com/watch?v=0Bd4NRqC5DYCan ChatGPT & AI make Comics?https://bootcamp.uxdesign.cc/how-i-created-my-first-comic-book-using-chatgpt-and-midjourney-a0a930b35f8eComic bot made with chat gpthttps://aicontentfy.com/en/blog/chatgpt-and-potential-for-creating-ai-generated-web-comics Potential of chats

Read More

My Neighbor Alice (ALICE)

14 May 2021https://www.myneighboralice.com/It is a multiplayer game where anyone can buy and own virtual islands, collect and build exciting items, and meet new friends.

Read More

Notes on "Practical Deep Learning for Coders"

31 October 2023Course: https://course.fast.ai/Book: https://github.com/fastai/fastbookIntroDeep Learning is a computer technique to extract and transform data using multiple neural network layers.Top used use cases:NLP: answer questions; speech recognition; summarize; classify; find; searchComputer Vision: satellite image interpretation, face recognition, captionMedicine: finding anomalies; counting features in slides; measuring; diagnosingBiology: classifying genomic tasks; analyzing cell interactionsImage GenerationRecommend Systems: search engines, home page layout, product recommendationPlaying GamesRoboticsFinancial, Logistics, etc...In 1943, Warren McCulloch and Walter Pitts developed a mathematical model of artificial neurons. It's declared in "A logical calculus of the ideas immanent in Neurous Activity."The neuron could be represented as addition and thresholding.Frank Rosenblatt gave artificial neurons the ability to learn. He even created the first device on this principle: Mark I Perceptron.We are now about to witness the birth of such a machine - capable of perceiving, recognizing, and identifying the surroundings without any human training or context."The Design of an Intelligent Automata"Frank RosenblattMarvin Minsky and Seymour Papert wrote a book called "Perceptrons." They showed that the device needs multiple layers to learn simple mathematical functions.Perhaps the most pivotal work in neural networks was the "Parallel Distributed Processes" by David Rumelhart, James McCallen, and the PDP Research Group, released in 1986.PDP approach for the programming framework defined requires:process unit setsstate of activationoutput function for each unitconnectivity pattern among unitspropagation rule for propagating through the network of connectivitiesactivation rule for combining inputs impinging on a unit with the current state of that unit to produce output for the unitlearning rule whereby patterns of connectivity are modified by experiencean environment where PDP must operateModern Neural Networks use an approach similar to PDP. The book says that the theoretical knowledge was misunderstood, and the issues held back the development until 2010. But also says that despite having two layers, it was too big and too slow to be helpful. Recent advancements in the hardware allowed training neural networks with more layers.For learning, it is best to use Jupyter Notebooks. The Jupyter Notebooks are software that allows you to include assets and code together.The deep learning uses the neural networks. It's part of machine learning. The deep learning model process and its training apply to the general concepts of machine learning.Machine learning is another form of programming where instead of the algorithm, you write the desired output, and the software finds the path.The term "machine learning" was coined by Arthur Samuel from IBM in 1949. In his 1962 classic essay "Artificial Intelligence: A Frontier of Automation," he wrote machine technique.Rather than describing each step to solve the task, show an example of the problem to solve. Then, let the program figure out the algorithm.There is an actual performance of weight assignment. Then, there is an automatic means of testing performance—a mechanism for improving performance by changing weight assignments.The weights are variables. The weight assignments are a choice of those variables. The program inputs are variables. In modern terminology, machine learning programs are called models.The weight assignment is the second input describing the actual input. In modern terminology, weight assignments are called model parameters.Automatic testing means you let two models work against each other. Actual performance is the desired result. After each iteration, you adjust the model to test the outcome.If you automate the iteration to adjust the model parameters, the program could learn from experience.This automatic iteration is called model training.Once the weights were adjusted, they became part of the model. The neural networks are mathematical functions. The mathematical proof called the Universal Approximation Theorem shows this function can solve any problem in theory.The general approach to adjusting weights is made via Stochastic Gradient Descent (SGD), a mathematical method.The model includes weight, a function producing results, and performance updating weights. The functional part is called architecture.Prediction is the result. The loss is the measurement of the performance. It's measured against the labels.Transformers are code that is applied during the training. There are item and batch transformers. The inputs are not used to train. Some part of the set is kept separated to test that training.The training input is called a training set, while testing data is used as a validation set. Over time, as the validation set is set, the model starts memorizing the labels. Thus, it doesn't find the generalizing patterns. This is called overfitting.Overfitting is the single, most important issue in the model training.Resnet is one of the architectures. It could have 18, 34, 50, 101 and 150 layers. The more layers mean training and with less data will be prone to overfitting.The model that has trained weights is called pre-trained model. It's better to build on the pre-trained models by changing some layers with yours. Using pre-trained model for a task different than what it was originally trained is called transfer learning.Fine tuning is a transfer learning technique where parameters of pretrained models update by additional epoch. Epoch is how many times the model looks at the data.Machine learning has some limitations:A model can not be created without dataIt can learn the patterns from input dataDeep Learning VocabularyLabel - a data we are trying to predictArchitecture - a template of a model we are tring to fit a model; an actual functionParameters - values in model that change what task it can do and updates throughout the training process.Fit - update the parameters such that predictions of model using input to match output labels. Also called Train.Fine Tune - special technique in transfer learning to update pre-trained model.Epoch - one complete task to pass through input dataLoss - a measure how good model is using validation setTraining set - data for trainingValidation set - data for measuring lossOverfitting - training remembers specific features of input than generalizing pattern.CNN - neural network for computer vision

Read More

Notes on "Practical deep learning": foundation

While trying to launch the model, I discovered the book was outdated. Now, we took video lessons more than the book chapters. These are the notes on Lesson 3: How Neural Networks work and how to optimize it. How to learn?Watch the lessons (Read the chapters) Run notebooks and experiment. Reproduce results Repeat with different datasetRun notebooks in the /clean folder from the book repo. About exported model The exported model '.pkl' has two things.Preprocessing steps to turn data into a model: DataLoaderpart. Trained model available in .modelparameter. It's a tree of multiple models for each neural layer. The submodules are available by model.get_submodule()method.@interact(a=1, b=2, c=3) is the particular keyword for jupyter to make interactive parameters. How does Neural Network work? A neural network tries to fit a function to data. The neural network adjusts the function parameters until the function's output is not close to the data. After adjusting the parameter, a loss function is used to see how close the function output is to the data. The mean_mean_error: ((output - data)^2).mean()is the most popular loss function. To automate adjustment by a loss function, we could calculate the derivative. Derivative checks how much parameter value increase increases the output. And how far it is from the data. The distance from the data to the function output is called a slope or gradient. Python tip: func(*params). The * expands the parameters into function arguments as a, b, and c. The PyTorch library has built-in derivative calculating functions. This function is called a tensor.backward(). It's the method of the tensors. How to enable derivative:Create a tensor: abc = torch.tensor([1.5, 1.5, 1.5]) . For example, it created a rank one tensor. Enable derivative calculation in the tensor: abs.requires_grad_(). Calculate loss. Then, calculate a derivative using .backward(). This function adds the .grad property to the tensor with the slope derivative.Once the gradient value is available, we can iterate multiple times by adjusting parameters by the slope number. This loop is called optimization, which means decreasing the loss value. Example Assume we have random dots on the graph for the c*x^2 + b*x + a equation. Let the function find the values for a, b, and c.  We have multiple dots for each part, not one. Because if there was one dot, we could draw a line by them. Initially, we picked some random numbers as the starting point. Then, we calculate the loss using mean_square_error by passing random dots and our initial values. Assume that the numbers are converted into tensors with enabled derivatives. Finally, we adjust the values until the gradient doesn't decrease sufficiently. ReLu Relu is a short name for Rectified Linear: def rectified_linear(m, b, x):  y = m * x + b  return torch.clip(y, 0.) This function is the single function whose negative value is turned into 0. Combining multiple relationships creates a flexible function that can solve almost any problem.  This is pretty much the foundation on which all neural networks are built.

Read More

Notes on "Practical deep learning": launching

Chapter 2: ProductionStart with the objective when designing your model.For example, Google started with the objective: "What is the user's main objective in typing in a search query?" This led to the aim to "show the most relevant search result."The next step is to determine what actions you can take to achieve the objective. In Google's case, it was ranking search results.The third step is determining what new data you need for the actions. In Google's case, what new data would they need to produce such a ranking?They realized that the implicit information regarding which pages linked to which other page could be useful for this purpose.We begin thinking about building a predictive model after these three steps. The objective, levers, the data we have, and the data we need determine the model we make. The models will take the levers and uncontrollable variables as their inputs; the output can be combined to predict the final state of the objective.Recap by answering the questionsIf the images for the bear classifier are from the game, then the app won't work because it was trained with the photo of the real bears.The text models cannot understand the semantics. This could lead to incorrect predictions.Text models could be used to troll the internet to spread disinformation.Usage of AI doesn't guarantee 100% results. It's especially critical with the medical reports. One solution is to work en-par with the people. The highly predictive outputs could be automated. For less predicted outcomes, we can do a manual check.The AI is good at high cardinality tabular data. The high cardinality means it's something that contains ample discrete choices.The recommendation systems work with user-generated behaviors. It recommends similar products from other sales. But it doesn't mean users didn't see them or may want something others didn't pick yet.Drivetrain approach: a) define an objective. b) define actions to reach the objective. c) define the data you need for the actions.Drivetrain approach for the video recommendation system: a) keep users in the platform. b) find liked videos like this from people of similar taste. c) create a data of liked data.The DataLoader class prepares data for training from unprepared data.To create a DataLoader, we need four things: a) What kind of data are we working with: images and text? b) How do you get those data: from files, CSV, or SQL? c) How do you label the items by filename? d) How to create a validation set: split items randomly by a seed.The splitter parameter of DataLoader describes how to get the validation set from the items list.The splitter takes two arguments: the percentage of items in the validation set and a seed to generate a random list.To determine independent variables, we use X. To represent dependent variables, we use Y.When images have different sizes, we need to normalize them—crop, pad, or squish.Data augmentation creates variants of the item by applying transforming functions. It helps to increase the amount of training set.Item transformers apply a function to each data. Batch transformers use the function of a whole batch.The confusion matrix shows a table of the training results. It helps to debug the data we used for training.The export function saves the architecture and model parameters together.To use a prediction model instead for training is called inference.IPython widgets are GUI components combining JavaScript and Python codes.we may use CPU in production since we work with one item at a time. In training, we may use GPU to accelerate the process.If a model is on a server, then there is a risk of working with confidential user data. Or network latency may slow down the prediction.the camera might capture the bears from different angles for a bear classifier, but it didn't work with the night vision. The camera may have low resolution.Out of domain is when an image for inference is not in a category of images we used for training.The domain shift is when the type of data changes over time.Three deployment process steps: a) export model for inference. b) create a UI. c) host the model.Objective: Understand the text in depth. Users should not be distracted.Action: Track all words users encounter.Then, get the description and insert it into the context. If it's a link, get a summary and add it. Data: track all words the user knows. Track how often he read and keep the terminology until it won't increase in appearance.What should happen if it went out? Everyone on the internet uses it.

Read More

OpenZeppelin in Preda programming language

This page describes porting the OpenZeppelin contracts into a PREDA model. The OpenZeppelin contracts consist of multiple parts: Library V5, Upgradeable Plugin, and Subgraph. This is the porting of some parts of version 5. The Upgradeable plugin is ported on its own later. The subgraph is not ported, as it's out of the smart contract programming scope. The OpenZeppelin uses semantic versioning to release new changes. This is the porting of the version 5, the latest by the end of 2023. Parts and what is not ported The OpenZeppelin smart contracts or utilities around them are grouped into various categories. Wizard - Interactive smartcontract generator. Access Control - utility to limit function calls. Tokens - NFT, Cryptocurrency, etc. Governance - Decentralized Autonomous Organization (DAO) tools. Utils - additional useful smartcontracts to use in your projects: Cryptography, Math, Introspection, and many more.We don't implement a wizard, as it's out of the smart contract programming scope.

Read More

Persian role in Seljuk Empire

26 May 2021Persian role in the Seljukid empire is vastly overestimated. This bias began with the Western research back in the Oriental Institute during colonial times, which touched only the sedentary part of the state, mainly skipping the role of nomadic Turks.As such, they started to claim that the conquest of Anatolia by Turks was the result of Seljuk sultans protecting their sedentary Muslim population. Because it was an Iranian empire of Turkic origin.Such a sizeable negative view of Turks by Westerners is primarily related to the sources that they were using for it. Both Arabic and Persian scripts were differentiating the ruling dynasty and their kingship. While praising the role of Seljuks in the Islamic political scene, they were highly damaging to the nomadic Turks, often mentioning them as the plunderers of the cities. The medieval sources, especially Persian ones, in neglecting the view of Turks, are criticized by Edmund Bosworth. He mentioned that writing Turkish titles and names in scripts is largely hard to read, as those people were not interested in them. As such, it is hard to differentiate the characters from titles of Turks. Cambridge History of Iran also mentions it. That starts to criticize the “persianate” face of the state. Or the idea that Anatolia is a little Persia (It also goes against the thesis that Seljuks pushed Turkmens from Iran to Anatolia to avoid the sedentarization; why do Seljuks come to Anatolia themselves, bringing Persians then follow after Turkmens). Seljuks, in fact, were not Persiniate as people think, as, for example, by 1100, the Tughril ibn MalikShah was still living in the tents, not in the cities. Their titles and institutions, such as Khatun or Atabeg, are still borrowed from the old Oghuz Yabgu state and used in the Seljuk Empire.  As a political power, Seljuks were using the Turkish nomadic emblem Tughra (a double head bird), which also shows that they were keeping their nomadic culture strongly. Seljuk's political ideology was based mainly on the Nomadic tradition, not on the Iranian tradition. Unlike the Persian tradition, where it tends to have a single authority, nomads declare the power as the belonging of the clan, where the elder is ruling as the leader. This Nomadic tradition was still alive, as besides the significant branch of Seljuks, we also had several branches living in various areas (Seljuks of Rum, Seljuks of Syria, Seljuks of Iraq, Seljuks of Kerman).The last of the Great Seljukids, Sultan Sanjar, also used this Turkmen tradition to legitimate his power over his young nephew Muhammad as the head of the Great Seljuks. This concludes that the Seljuk Empire was an empire of Muslim dwellers and a nomadic empire. Using the Tughra, Turkish titles in the state, and following Turkmens till Anatolia brings us to the role of nomads. Seljuks, for rising to power, were obligated to Oghuz-Turkmen nomads. As such, in the Seljuk empire, they played a unique role. Their role was also mentioned by Nizam al-Mulk in his Siyasat-name to remember the role of Turkmens and act with them with special care. It is also mentioned in the book dedicated to Sultan Sanjar by the grandson of Nizam al Mulk, as in the bachelor letters of Sanjar translated by David Durand. With such a particular role that none of the other ethnic groups in the empire had, we can conclude that the empire was a Turkmen empire. P.S. When Seljuks removed the special status of Turkmens by listening to their Ghulams and Persian viziers, Turkmens' status was revoked, which was the primary factor in the decline of the Seljuk empire.

Read More

Phantasma (SOUL)

14 May 2021https://phantasma.io/Fast, secure, and scalable blockchain solution that allows developers to build decentralized applications and facilitates interoperability with other blockchains while maintaining a decentralized governance system.

Read More

Phishing by Vera token

2 August 2021Being myself in the crypto industry and as a developer, I never thought I would be scammed. But that happened. And it happened quickly. I was using https://farmfol.io/ to track my wallet balance. And saw that it has 100K USD. I thought that someone deposited his tokens to me accidentally. So, I researched the token. The token is called Vera. And it’s domain name is http://thevera.io/. The website had a “claim” button. I clicked on it to approve my wallet. Then, I suddenly realized that they might withdraw my crypto wallet. It was on Binance bright chain, where transaction confirmation speed is 3-4 seconds. I was a few seconds late before the transaction was confirmed. As a result, I was screwed for 2BNB (~600$). I tried to remove the token from my wallet but without luck. Then I tried to transfer tokens to an empty address, but that didn’t work either. Tokens are smart contracts where the token developer programs every token function. The developer of the Vera token puts a high fee on any transaction or completely rejects any method call. This case also proved my Blockchain idea that makes users own their wallets and accounts. What is the point of having a private key when the tokens in my balance are without my acknowledgment? Or when I can’t do anything with them because the developers decided like this. Solution: The Seascape blockchain will have one token with unlimited minting. When users create a new token, they allocate the part of the native token and add an alias name. Since the core part of the token is a native token, the transferring and burning of the token will be available for any user.Besides that, since all tokens are backed by the native token, through the native token, users will be able to exchange tokens with each other without any dex.

Read More

Programming Language: Preda

In the middle of 2023, I joined a Preda hackathon that kicked out on 18th November 2023. I already have an interest in programming languages. So, I will use this hackathon to try out a new language. But what is Preda programming language? The Language Specification Official website: https://www.preda-lang.org/ Preda is a programming language used to increase transaction throughput for applications on blockchain platforms. Preface The applications in the blockchain platforms are called smartcontracts. Ethereum invented intelligent contracts, the first blockchain platform, in 2015. Even in 2023, Ethereum is the most popular blockchain platform, setting the global trends in the cryptocurrency ecosystem. The Ethereum blockchain network has the Ethereum Virtual Machine (EVM), where smart contracts are executed. The platform provides various programming languages to write a smartcontract targeting EVM. The most popular programming language is Solidity: https://soliditylang.org/. However, EVM could process a single transaction simultaneously, which means a considerable delay during the high traffic. There are many ways to solve the scalability issues. Most of the blockchain trend goes into building a blockchain of blockchains: Cosmos, Polkadot, Layer 2 blockchains, etc. Preda is taking an unusual direction to increase scalability by creating distributed intelligent contracts. Distributed Smartcontracts  To understand a distributed smartcontract, think about a popular web application. Imagine a web application that serves thousands of requests at a time. How would you scale the server to serve multiple requests? The intuitive way to execute multiple requests simultaneously is by creating multiple copies of the application (as a cluster) that run the requests in parallel. But there is a better approach. You could split the app into smaller inter-connected parts rather than creating a copy of the same code. Then, create a cluster of the parts that have a heavy load. When an app consists of multiple inter-connected parts running in parallel, this app is called a distributed application. Almost all modern web applications are distributed with at least a client, server, and database. Similarly, a distributed smart contract consists of multiple parts that execute the transactions together. As I mentioned in the Preface, the current EVM supports a single transaction simultaneously. So, Solidity is created for a single transaction as well. To create distributed intelligent contracts, we need a blockchain that supports distributed systems and a programming language to execute and make asynchronous calls between various allocated parts. Even in modern EVM, you can split an app into multiple intelligent contracts. But their interaction is synchronous, so it blocks all requests until other smart contracts won't complete the execution. Contract A could send request A to contract B by making the requests asynchronous. Meanwhile, execute the request B from the transaction pools. Preda is the programming language used to make asynchronous calls between smart contracts, which solves the second problem for scalable execution.From dioxide.network But why was Preda invented? This is a Smartcontract. Motivation behind Preda As in most aspects of social interactions, the top 1% of the services get the majority of the traffic. So, scalability is needed for them.Source: https://www.theblock.co/data/on-chain-metrics/ethereum/top-20-gas-consuming-smart-contracts-30d Just look at Uniswap, which has about the 18th transactions, while Scroll has 2 thousand transactions. All other two million transactions deployed on Ethereum get less than 2000 transactions. Notes on specification Preda is a new programming language that extends Solidity by adding asynchronous calls between intelligent contracts. To support such kinds of smart contracts, the Preda team also created a blockchain network for that: https://dioxide.network/ The Preda programming language specification Old: https://www.preda-lang.org/pdf/preda-model-sole.pdf The Preda programming language specification: https://preda-lang.org/pdf/PREDA_Model_as_an_Experimental_New_Smart_Contract_Language.pdf Here are the notes I took by highlighting the critical parts of Preda. Preda stands for Parallel Relay Execution Distributed Architecture. Preda introduces two models:Programmable Scope: an isolated state of the smartcontract. Define the scope by data access pattern, which narrows and minimizes the data dependency between the states. Asynchronous Function Relay: a transaction logic that moves execution from one programmable scope to another. The function relay is defined with the explicit data dependency.In Solidity on Ethereum, the smartcontracts are defined as a set of variables (state) and functions (transaction functions). The state and functions are described in the global scope. However, it presents two significant challenges in scaling intelligent contracts. 1. Partitioning the state requires understanding the data access patterns associated with the state variables. The Preda solves it by introducing a Programmable Contract Scope (κ-scope). 2. A function defined on a global scope requires the availability of all functions and state variables. The Asynchronous Functional Relay (λ-relay) narrows the scope for a function to execute. The λ-relay decomposes the execution of k-scopes in the order of data dependency. In Preda, when invoking a function, it must provide a target k-scope, an analogy 'this' pointer in C++. Special k-Scopes Engine Scopes = φθ(i): one instance of k-scope built in for each instance of the execution engine to represent a scope available for immediate read/write by any function executing the current execution engine. The engine scope is not allowed to be the target of λ-relay nor be referred to by specifying θ(i). The variables and functions in the engine scope can be accessed only by the i-th engine. Global Scopes =  φΩ: a built-in k-scope that logically singletones the entire network. PREDA model strictly prohibits referring to a specific instance of an execution engine or making assumptions on the underlying configuration (for example, the number of execution engines). In PREDA, the scopes are defined by fine-grained boundaries of contract states. The actual partitioning strategy is left to the hosting execution engine. Relaying A function initiating a transaction must trigger a λ-relay to execute on another k-scope. The λ-relay is converted into a relay transaction by the host. The relay transaction will be passed to the memory pool as an unordered pending transaction in the destination engine. Global scope transactions will be executed first before conducting an engine scope. Cross-contract invocation can be carried out immediately without doing a relay transaction. Syntax State variable defined and instantiated in a k-scope as: var_type @scope var_name; The @scope specifies a k-scope. It can be:@global, which is by default, thus can be omitted. @engine, for engine scopes. @address or @uint: a keyed k-scope based on the Solidity elementary type name.Functions in the k-scope are always defined as: function fun_name(arg_type arg,..)        @scope modifiers returns (ret_type) &#123;&#125; The @scope values are identical to the variable definition. In the destination k-scope, the target scope and global variables are merged and available as read-only variables. Symbols defined in the current engine are available for read and write. relay @key (var1, var2, ...) &#123;&#125; relay @global (var1, var2, ..) &#123;&#125; The above code defines a relay transaction to continue the execution in another scope. The relay defines a lambda function that is executed in the destination scope. // scope a relay func_name_k(var1, var2); // scope b function func_name_k(var1, var2) @scope public &#123;&#125; Besides passing a lambda function, Preda can also call a named function as defined above. The named functions must be public. The named transaction could be a cross-contract call as well as: relay @key ExtContr(a_addr).named_func_k(var1, var2); relay ExtContr(a_addr).named_func_k(var1, var2); Here, the @key is defining the scope of the ExtContr. The mappings are defined as: mapping<type => type> @scope var_name; Note that any current Solidity smartcontract can be compiled into Preda as is. In this case, all variables and functions will be in the global scope. The global scope is not scalable; therefore, the design goal of the developers is to minimize the global scope. Potential Execution EngineMulti-core single node. Sharded node Multiple Single Nodes across the internetThe guideline on how to use Preda is described on Preda Guideline.

Read More

Programming Language: Rigidity

https://github.com/ahmetson/rigidityA secure version of Solidity to write smartcontracts.It's a type driven inspired by programming languages such as Idris.

Read More

Programming Language: Rust

Rust is a programming language designed by Mozilla Foundation. This is the notes on Rust Book. Cheatsheet CLI applications: rustc rustup cargo cargo new <project_name> cargo build // --release for production cargo run cargo check //ensures code compiles but doesn't build the executable. Hello World fn main() &#123;   println!("Hello, World!");&#125; Write the code above in hello.rs. Open the terminal, and type: rustc ./hello.rs. In rust, there must always be a primary function. It's a starting point of the application. The functions must always have curly braces. The println! is a macro. Macros always end with an exclamation mark. Hello, Cargo Cargo is the package and system manager for Rust. It handles downloading libraries, building the binary, and many other tasks. The libraries that the program uses are called dependencies. Create a cargo project using cargo new <project_name>. The cargo automatically creates version control files using Git as a default VCS. In the project structure using cargo, all files are stored in the src directory. The parameters of the program are defined in the Cargo.toml configuration file. Build the project using cargo build command. Run the program using cargo run.Syntax [associative function] The string is the standard data type in Rust. :: in String::new() calls the associative function. The associative function is the function that is implemented on the type. [enum] Enumerations are called in short as enum, which is the type that can have multiple possible states. We call each possible state a variant.[crate] The crate is a collection of rust files. let a: [i32; 5] = [1, 2, 3, 4, 5]; let a: [i32; 5] = [1, 2, 3, 4, 5];let a: (i32, string, char) = (23, "hello", 'z'); Slices are contiguous sequences of elements in a collection rather than a whole array. It's a kind of a reference.  

Read More

Programming Language: T

https://github.com/ahmetson/tplA programming language with the Turkmen language syntax.

Read More

Revv (REVV)

14 May 2021https://www.revvmotorsport.com/It's the main cryptocurrency for the identical branded motorsports blockchain game titles produced by Animoca Brands.

Read More

RNB Blockchain whitepaper

9th May 2021OVERVIEWGenerating secure random numbers is a challenging task. By fast numbers, I mean that a) predicting what the next number is impossible, and b) &nbsp;It generates numbers without putting them in favor of one of the stakeholders.The nature of public blockchain, with its decentralized p2p architecture, is ideal for producing secure numbers.This whitepaper discusses the implementation of secure random numbers using blockchain.&nbsp;GOALS OF THE PROJECTFree public random number generatorSecure, where numbers are not predictable.Generated numbers are stored in the database permanently for checking in the futureGenerated numbers are not programmed to drop specific numbers with high probability.RNG V 0.0 User-generated numbersSince the creation of the blockchain takes some time, we decided to make a quick version of the RNG. This short version of the RNG blockchain is versioned as 0.0.In this version, the nodes accessing the RNG send a random number in their transactions. The sum of all random numbers divided by all senders within the block is defined as a new Random number for the block.The RNG V 0.0 will have the following transitions:Request a new Random number &nbsp; (DONE)- accepts (one random number) in byte32 format. This number is used to generate a random number. To get a random number, the caller should stake some tokens.- returns another random number in byte32 format. It requires 0.01 RNG tokens to be cut from the staked RNG tokens.Send a random number- accepts (one random number) in byte32 format. This transaction could be sent by participating validators only.Stake a token- Stake 100 RNG tokens. It will register a user to generate a random number. A new stake will be added to the previous ones if a user has already staked tokens.Get a staked token amount- accepts a wallet address- returns an amount of staked tokens for the user.Change fee- accepts a new fee for requesting a Random Number&nbsp;and deadline (up to 24 hours in seconds and a minimum of&nbsp;1 hour).- whether this was accepted.If ⅔ of the users call this transaction with the same fee, the fee for requesting payment will be updated.RNG V 1.0 THEORETICAL SPECIFICATIONSHow does the RNG blockchain work without going to the programming language and technology used in it?The idea is that the RNG blockchain generates random numbers in every block of the blockchain.All validators of the RNG blockchain must provide a unique wallet address for every block for consensus voting. The sum of all unique wallet addresses divided by the number of voters is the Generated Random number of that block.&nbsp;&nbsp;We came up with three solutions to prove that the signature is nondeterministic.Any node that participates in the generation of random numbers also has a representative signature. This signature stakes 100 RNG tokens, which allows this node to participate in number generation. Any unique signature used once can be used to withdraw 50% of the staked RNG tokens per user from the blockchain within the next 30 days after usage of the signature. Suppose the unique signature is used for withdrawing a token. In that case, the representative node is kicked out from the participation of random number generation, while the rest of 50% of staked RNG tokens are redistributed among other stakeholders. So, it is in the interest of all stakeholders to try to find the signature or guess it for the other stakeholders to prevent them from cheating.The node client should always be public, meaning everyone could join the blockchain for random number generation without anyone’s permission. Since the sum of the hash of all wallets is changing dramatically even after the addition of one more signature, it will allow the blockchain to be unpredictable if many nodes connect to the blockchain from around the world.There is the option where anyone, whether a unique signature or representative signature or not related to the RNG signature, can put 1 RNG token, the future block number, and the possible value. If the value generated in the future in the block number is correct, the wallet address could take 50% of all stake RNGs in the blockchain. This will keep all stakes trying to put unpredictable signatures, while those who want to earn money will always try to check the blockchain for prediction. This will ensure that generated random numbers are safe.RNG Blockchain Technical RequirementsIt is a blockchain in Cosmos Network created with Cosmos SDK on the tendermint core. RNG blockchain has the following features:A lightweight clientStates in key-value format: 2.1. A list of all unique addresses of every representative address.&nbsp; &nbsp; Representative Account => array of unique addresses&nbsp; &nbsp; Unique address => representative2.2 List all random numbers since block one, including unique addresses and their numbers.&nbsp; &nbsp; Block number => struct(random_address, array(unique addresses), unique_address_amount, proposer)2.3 A list of representative addresses with their staked RNG tokens amount.&nbsp; &nbsp; Representative stake => stake amount2.4 A balance of each address of RNG tokens that are not used for staking:&nbsp; &nbsp; Wallet address => balance2.5 A prediction list for each block&nbsp; &nbsp; Block number => array of Structs(predicted_address, payment_address)&nbsp; &nbsp; Prediction reserves => balance.Functions such as3.1 Stake RNG tokens to add a representative token to the data structure 2.33.2 A function to push unique address for generating random numbers, 3.3 Generating random number by the sum of all unique addresses pushed to the server, 3.4 Unstaking tokens with the representative address3.5 Unstaking tokens with a unique address, which automatically distributes 50% of staked tokens to other token holders, while 50% goes to the individual address3.6 claim additional tokens for stakes that they got from other stake token distribution, 3.7 Spend 1 RNG with the random number and the block to predict the upcoming number to withdraw 50% of all staked tokens.An easy RPC to fetch the random number by event broadcast or rest API.A bridge to the Ethereum blockchain where RNG tokens are minted. Bridge to transfer into or out from rng blockchain rng tokens.an intelligent contract on the Ethereum blockchain locks RNGs transferred to the RNG blockchain.RNG blockchain Technical implementationWe edit the voter module by adding additional features, such as auto-generating the private keys that voters submit to the block (automatically by the module). The voter module will store the private keys in the local storage, encrypted by the voter’s primary signature.We will also create a new rng-history module to store all the rng states. This module is connected to the voter module to get the voter’s signatures.Finally, we edit the consensus module to connect to the rng-history module to write data into rng states.RNG tokenRNG tokens are erc20 tokens on the Ethereum blockchain. USDT tokens back them.&nbsp;1 usdt = 10 rng token.&nbsp;If a user wants to mint 100 RNG tokens, he has to call the mint function of the RNG token. The mint function will lock ten USD on behalf of the user to issue RNG tokens.If a user wants to take back his USDT tokens used to mint RNG tokens, then the user calls the burn method in the RNG token, which will burn RNGs while transferring the locked USDTs to the user.MILESTONESWrite the whitepaperTill 16th May, write all technical aspects of the RNG blockchain and RNG token.Write the Demo blockchain (without bridge)Till the end of May 2021, write the RNG blockchain using Cosmos SDK.Write the RNG tokenTill 10th June 2021, write the RNG token with mint and burn functions.Write the Bridge blockchain.Till 20th June&nbsp;2021, write the RNG bridge between the RNG blockchain and the&nbsp;Ethereum blockchain.Launch of the productTill 30th June 2021, test the system and launch it.Write the Whitepaper 2.0 for the profitable version of the RNG blockchainHow do RNG blockchain nodes earn money? In the next version of the blockchain, this should be possible.

Read More

So called Armenian Genocide

20 May 2021There is no proof that the Turkish government ordered a systematic extermination of some group of people based on nationality or religion.&nbsp;All the sources claiming that there was an order are nonprovable; only someone heard that Enver Pasha did it in private talk. Who was this guy who told it? The Western sources don't want to show any argument supporting their words.&nbsp;Besides that, some information makes me suspicious about this situation.&nbsp;some sources quoted that Hitler was inspired by the Armenian genocide and quoted it for the holocaust. Recently, it was proven to be wrong.There is a famous picture on the internet where the officer is teasing kids with bread while they are starving. First, it was released by the Oxford Book regarding the Genocide. Later, it was proven that the picture was photoshopped, and Oxford publishers took it from some random Armenian guy.The first two countries that acknowledged the genocide are South America’s little countries, not the major powers of the west. Certainly, someone pushed those countries to accept it.&nbsp;After three points, I feel like&nbsp;the Armenian Genocide is a political movement rather than a historical thing pushed to the world by the&nbsp;Armenian Diaspora.&nbsp;

Read More

Steve Jobs is not a role-model

I use Steve Jobs' own words: "Innovations lead to the innovations". His own company, his own products don't lead to the technical innovations. When you read the history, when there are no new ideas, but a sophistication of what was built, this indicates a decline of the culture. A slow stagnation. If we value products like iPhone, MacBook for it's candy-crash like UI as the greatest thing in the technology, then it's clearly marks the stagnation of the culture. I use iPhone (my family bought me as a gift), it never lead me to build something with it. So for me neither Apple, neither Steve Jobs are respected nor role model.I think they have important in the popularization of the technology. Apple is like Chinese internet, it takes the app and packs it in a nice user interface. These kind of products should be respected by UX designers, not by technology companies. They should take Apple as a role model when it comes to the intuitive user experience when using the technology. To give you analogy, you can't say google is the better than Yahoo in terms of technology because Google has a minimalistic main page. But that is going on with the Apple.

Read More

The Preda Guide

Preda is a programming language to write distributed intelligent contracts that can execute transactions in parallel. If you are unfamiliar with the smart contract or want to see what Preda is, look at Programming Language: Preda, where I wrote some notes about it. This page describes the projects I wrote in the Preda programming language: "Preda Scale-out Smart Contracts Hackathon". The best way to learn a technology is by creating something. I will also provide general lessons and valuable resources that helped me write something on Preda. Brainstorming For the hackathon, we need some ideas to work on. The project will benefit from the parallel execution. Invalid directions Top Smartcontracts As Preda was targeting top smartcontracts, let's take inspiration from them. However, complete intelligent contracts are all for DeFi. DeFi doesn't solve real-world problems, so let's skip it.  Top Transactions The Bridges and Exchanges load the highest traffic on Ethereum. These smartcontracts are easy to implement, so let's skip it. Right direction The best way is to implement something impossible with the current smartcontracts and only available with the Preda's parallel execution. But before working on it, let's create small intelligent contracts to have an understanding of the program in Preda. And lastly, we are always relying on the libraries with the best practices that save us a lot of headaches. So, here is the list of the projects that I will be working on:(Library 1) The OpenZeppelin library is a state-of-the-art library for Ethereum. Let's convert it to Preda to bootstrap the creation of smart contracts. (Library 2) OpenZeppelin Upgradables: This is an interesting part of creating an upgradable contract. Maybe upgrade a certain state, rather than all smartcontract? (Small project 1) Mistransfer: a project that recovers tokens sent to a wrong smart contract. I wrote it for a Chainlink hackathon. And I believe it should be everywhere. So, let's implement it. (Small project 2) Malpie: a loyalty program for apps where users provide their data in exchange for a product discount. (Project)Where does Preda outshine? What kind of app is it possible to make on the blockchain? More in the next section.Real-time app Parallel execution enables real-time applications that were not possible on the blockchain before. What kind of real-time app? Do you know the original motivation behind the creation of the Ethereum? According to the legends, Vitalik was playing World of Warcraft, and one day, Blizzard Studio decided to remove one of his favorite game items. Outraged, he created a distributed platform where "Code is a law." It's a beautiful legend, so let it be. However, Ethereum doesn't allow the creation of a game such as World of Warcraft. But with Preda, we can create it. Each popular multiplayer, real-time game is a session. With Preda, we can make each session a scope with access from the users in that session. This allows, for example, to create a Layer 2 on Ethereum with the PREDA model. Fine-tuned, it could keep thousands of users online with less technical cost than without Preda.Preda tricks return type is inserted in the beginning after the "function" keyword. to make the contract read-only, replace "view" with "const."

Read More

The Sandbox (SAND)

14 May 2021https://www.sandbox.game/According to the whitepaper, the Sandbox's primary mission is to introduce blockchain technology in mainstream gaming successfully.

Read More

Turkmenistan's Problem

14 May 2021The problem with Turkmenistan is that Turkmen is a sleepy nation.Sleepy nations have zero interest in politics, in god. They are interested in their comfortable life. As Turkmens like to say, the most important thing is your health.&nbsp;Sleepy nations are also self-centered, without any compassion for other people. As such, cooperation for common benefit is weird for them. Why would they talk to each other for a common benefit if talking to others is not resulting because others won’t do the same?Moreover, sleepy people can’t trust others. They only expect some terrible behavior from them.&nbsp;As such, the Turkmen value only their health and their family. Turkmen can sacrifice their political freedom in exchange for a wealthy life with one car and one good house. That’s what the current government in Turkmenistan promises. Turkmens don’t care how others view the head of state; just that he made them reach is enough for them.&nbsp;Many Turkmen say it occurred only in the last 30 years, and they like to blame the President. Others say it happened in Soviet times. However, they both are wrong. Turkmen were sleepy throughout all of its history.&nbsp;The reason why Turkmens founded empires was not because of Islam or because Turkmens had to. It’s because of Oghuzes who used Turkmens for it. Turkmen's political raids on Alaman were not because they were warriors but because of the desert pushing Turkmen for water pastures.Once Turkmen have solved the water resources, they will be a silent nation again that won’t interact about anything with other people.&nbsp;And finally, sleepy nations are blind to the knowledge. They can’t see the hidden values, so they can’t appreciate the education. And without education, you can’t control your life. He will always be dependent on other people who know him.&nbsp;So, why should we awaken Turkmens? Why should we make it our goal? First, we need to understand human nature because it has become apparent.&nbsp;&nbsp;Human nature?&nbsp;

Read More

Turkmens are descendants of Oghuzes and Persians?

Turkmen are primarily descendants of Iranian nomads who lived between the Aral Sea and the Caspian Sea. When you are learning the history of a nation, you do a comprehensive analysis of the country from all aspects: tradition, language, and anthropology. Most people who talk about Turkmen as people who came from Altai do not know who the Turkmen are or their traditions. Without knowing the history, you might get the generalized view that ancient Turkmen were nomadic warriors who drank horse milk and ate horse meat. They were a people with slanted eyes and built Kurgans for their ancestors. But Turkmens didn't have slanted eyes, except for the minority. They never farmed horses for meat or milk. And they never built Kurgans for the ancestors.Regarding horse tradition, Turkmenians raised horses for races and battles only. These breeds, in medieval times, were known as Turkoman Horses. These horses are the ancestors of all racing horses in the world. The German Trakehner breed's ancestor: "Turkmen Atti"Turcmanatti by Johan Meno Haas in the 1790s.The English Throughbroud's ancestor: Byerly Turk:You do a DNA analysis, and the closest to all horses are not Arabian, but Akhal Teke (one of the lineage of Turkmen horses named after the Teke tribe). The Turkmen horses are indigenous to Central Asia and have been famous since the Antique period. The Chinese conquered modern Xinjiang, part of Central Asia, to acquire these horses as they were well-known there as Heavenly horses. Ancient Greek and Roman historians described them as the best in the world. This breed has thousands of years of history. And while the breed's name has changed, it's still part of Antique Central Asian history. But here is the thing: Neither Central Asian sedentary Iranians nor Nomadic Turk-Mongolian people except Turkmens were breeding them. From the ancient nomads, this tradition is carried out by Turkmens. And not by one tribe in the region to say it's the influence, but by all tribes, so it's part of national culture. A depiction of Turkmen horse in the Read Dead Redemption 2 (click to see on Wiki Fandom):  The same goes for all other aspects of Turkmen culture. Turkmen have a heavy influence from other people around them and, to a lesser degree, by people along the "Silk Road". But it's a cultural exchange that went bidirectional. As much as Turkmens have it, they also influenced other people.This is the problem of Iranians. When they see Iranian influence, they brag about Greater Iran. Still, when influenced, they want to dismiss the national terminology, discussing regional and Islamic shared culture. To make it fair, either ignore "Iranian" influence by removing national appearance. Or accept that you have Arabic and Turkic influence, too. This is especially seen on Wikipedia, where Nowruz is an Iranian national holiday and Iranian influence. Just like anything that interacted with them. But Turkmen carpets are Iranian because they're part of their day-to-day culture, and they should not be connected with Turkmen only.  

Read More

Ultra (UOS)

14 May 2021https://ultra.io/A blockchain-based PC game distribution platform designed to provide both gamers and game developers with new opportunities. It consists of an ecosystem where gamers can buy games, play games, resell their used games and items.

Read More

Vanilla Network (VNLA)

14 May 2021https://vanilla.network/homeIt relies on fundamental economics to produce an equilibrium price based on demand and supply.

Read More

You are lonely without your nation.

20 august 2021Imagine, at the party, you destroyed your relationship with people around you in a foreign country.You sit on your motorbike, then ride somewhere. I can’t say where because it was in my dream.Then, you got in a traffic accident right next to the motorbike repair service. You see, their reaction is zero. No laugh, no empathy. Feels lonely.You stand up and walk by the street. Suddenly you see a smiling face. She is not that beautiful, but still charismatic. You felt lonely and wanted to talk to someone.You talk to her, she replies. Then, you ask her, “Where is she from?” She replies, “Turkmenistan”. And imagine you are also from that country. You respond with excitement, “I am from Turkmenistan,” as well.It’s a small, landlocked country right at the center of Asia. It's exotic, so you barely see anyone who even knows the name of the land. And she replies, “I know”, to your excited comment.Then you ask her what she is doing; she replies, “Programming, development”. The same thing as you do. You are more excited, as you’ve met a person who has a similar lifestyle. Even her cold answers, her eyes looking at the road, when she replies to you, don’t matter. She then replies, “But I will not do business in China”. You planned that, too. It's hard to create a company in China as a foreigner. So you ask her, “Oh, you wanted to gain experience in China, then travel to the West to set up your business?”. But she is ghosting you. What happened? Nothing.You open your phone; you want to see or talk to Turkmens after seeing your countrymate. And in the groups, you read that admins kicked you out. You felt so sad, so depressed.You want to see Turkmens; even if you don’t want to talk, you still want to be in a company and feel part of it. It's beneficial not to feel abandoned in the harsh times. And it's not going to happen.They reject you. Turkmens are ignoring you in your hard times. They ghost you speaking, even in real life. What is that? How much would you feel if your parents left you?

Read More