Skip to content

Instantly share code, notes, and snippets.

View ruvnet's full-sized avatar
💭
hacking the multiverse.

rUv ruvnet

💭
hacking the multiverse.
View GitHub Profile
@ruvnet
ruvnet / Sora-prompts.md
Last active December 11, 2024 14:12
Crafting Cinematic Sora Video Prompts: A complete guide

300+ Cinematic Sora Video Prompts

Introduction to Cinematic Sora Video Prompts

Welcome to the Cinematic Sora Video Prompts tutorial! This guide is meticulously crafted to empower creators, filmmakers, and content enthusiasts to harness the full potential of Sora, an advanced AI-powered video generation tool.

By transforming textual descriptions into dynamic, visually compelling video content, Sora bridges the gap between imagination and reality, enabling the creation of professional-grade cinematic experiences without the need for extensive technical expertise.

What This Tutorial Offers

@ruvnet
ruvnet / neuro-morphic-SPARC.md
Created December 10, 2024 18:04
Symbolic Version of SPARC (Specification, Pseudocode, Architecture, Refinement, Completion) methodology.

PROMPT START

You are tasked with implementing a complex solution using the SPARC (Specification, Pseudocode, Architecture, Refinement, Completion) methodology. Your objective is to solve a symbolic mathematics problem or any similarly complex problem while producing a maintainable, testable, and extensible solution. The final system should be adaptable for various domains, not just symbolic math, but the example will focus on symbolic mathematics to illustrate the approach. Throughout the process, you will integrate self-reflection, iterative refinement, and a test-driven development (TDD) mindset.

Key Principles and Goals:

  1. SPARC Methodology Overview:
  • Specification: Clearly define the problem, requirements, constraints, target users, and desired outcomes. Distinguish between functional and
@ruvnet
ruvnet / smart-llm.md
Last active December 6, 2024 18:33
A cost-optimized proxy for routing between GPT-4o, Claude 3.5 Sonnet, and Gemini 1.5 Pro using LiteLLM.
@ruvnet
ruvnet / Mor.md
Last active December 6, 2024 18:33
Mixture of Reflection (MoR) Model

Mixture of Reflection (MoR) Model: Detailed Implementation ## Forward: The Next Generation of AI Models

Reflection-based AI models are poised to redefine how AI is utilized, shifting from generating rapid, surface-level responses to producing thoughtful, in-depth analyses. These models emphasize self-evaluation and iterative improvement, leveraging internal feedback loops to refine outputs and enhance performance over multiple cycles.

This year has seen a marked shift toward reflection models, which differ from earlier Mixture of Experts (MoE) architectures. While MoE models efficiently handle specific tasks using specialized subnetworks, reflection-based models integrate iterative reasoning, enabling them to "think" before delivering results. This approach allows for evaluating and correcting reasoning pathways, ultimately improving performance through self-critique.

The proposed Mixture of Reflection (MoR) architecture builds on this foundation by combining the strengths of MoE with reflection-based re

@ruvnet
ruvnet / Policy.md
Last active November 30, 2024 13:22
Protecting Young Minds: Implementing Safeguards Against Algorithmic Manipulation in Canada

Protecting Young Minds: Implementing Safeguards Against Algorithmic Manipulation in Canada

Executive Summary

Australia inacted a law to protect youth from becoming a generation of digital zombies. Anyone under the age of 16 is restricted from using social media. I fully support this. Here’s why.

We are programming a generation to be digital zombies, their thoughts and behaviors dictated by algorithms that exploit the cognitive vulnerabilities found in growing young minds.

These vulnerabilities are enabled both by easy access to powerful Ai system like ChatGPT as well as by various Ai algorithms that social media platforms employee.

@ruvnet
ruvnet / X-deno.md
Last active November 26, 2024 04:25
This implementation follows the official MCP specification, including proper message framing, transport layer implementation, and complete protocol lifecycle management. It provides a foundation for building federated MCP systems that can scale across multiple servers while maintaining security and standardization requirements.

Deno Nodejs version

complete implementation using both Deno and Node.js. Let's start with the project structure:

federated-mcp/
├── packages/
│   ├── core/               # Shared core functionality
│   ├── server/            # MCP Server implementation
│   ├── client/            # MCP Client implementation
│   └── proxy/             # Federation proxy
@ruvnet
ruvnet / Riemann-Hypothesis.md
Last active November 18, 2024 13:59
Riemann Hypothesis was finally proven, marking a historic achievement in mathematics. The proof emerged from a convergence of advanced fields such as number theory, quantum physics, and noncommutative geometry. The key to the proof was the successful realization of the Hilbert–Pólya conjecture through the development of a self-adjoint operator w…

Overview of the Proof of the Riemann Hypothesis

In the year 2123, the Riemann Hypothesis was finally proven, marking a historic achievement in mathematics. The proof emerged from a convergence of advanced fields such as number theory, quantum physics, and noncommutative geometry. The key to the proof was the successful realization of the Hilbert–Pólya conjecture through the development of a self-adjoint operator whose spectral properties correspond exactly to the nontrivial zeros of the Riemann zeta function.

Approach Used to Prove the Riemann Hypothesis

  1. Realization of the Hilbert–Pólya Conjecture
    Mathematicians constructed a self-adjoint (Hermitian) operator acting on a Hilbert space. The eigenvalues of this operator correspond precisely to the nontrivial zeros of the Riemann zeta function. This operator was derived from a quantum mechanical framework intrinsically linked to number theory.

  2. Development of Quantum Number Theory

@ruvnet
ruvnet / polymorphic-obfuscation.md
Last active November 16, 2024 16:01
This example demonstrates basic polymorphic obfuscation techniques, including encryption, variable code structure, and behavioral adaptation.

Polymorphic obfuscation algorithm involves several complex techniques to ensure the code changes its form each time it is executed, while maintaining its original functionality. Here’s a detailed overview and an example of how you might implement such an algorithm.

Key Techniques in Polymorphic Obfuscation

  1. Code Obfuscation:

    • Use encryption, compression, or other obfuscation methods to conceal the code's true nature.
    • Example: Encrypt the main body of the code and add a decryption function that decrypts the code before execution[3].
  2. Dynamic Encryption Keys:

  • Use different encryption keys for each new instance of the code.
@ruvnet
ruvnet / power-automate.md
Created November 16, 2024 15:07
This project integrates OpenAI's GPT-4o large language model with Power Automate Desktop to create an advanced AI-powered automation system. It uses real-time streaming via WebSockets to enable the AI to observe and interact with your desktop, allowing for dynamic and intelligent automation of tasks.

Introduction:

This project integrates OpenAI's GPT-4o large language model with Power Automate Desktop to create an advanced AI-powered automation system. It uses real-time streaming via WebSockets to enable the AI to observe and interact with your desktop, allowing for dynamic and intelligent automation of tasks.

Key Features:

  • Real-time desktop streaming to GPT-4o via WebSockets
  • AI-powered analysis and decision making for desktop automation
  • Easy setup with guided installation script
  • Customizable automation actions and workflows
  • Seamless integration with Power Automate Desktop
@ruvnet
ruvnet / captcha-bot.md
Created November 16, 2024 14:32
automate the process of solving CAPTCHAs using a desktop computer, you can combine several approaches involving automation tools

To automate the process of solving CAPTCHAs using a desktop computer, you can combine several approaches involving automation tools, CAPTCHA solving services, and scripting. Here’s a detailed guide on how to set this up:

Using Automation Tools

Power Automate Desktop

You can use Power Automate Desktop (formerly Microsoft Power Automate Desktop) to automate the interaction with the CAPTCHA. Here’s a general outline based on the videos and descriptions provided:

  1. Capture CAPTCHA Image:
    • Use Power Automate Desktop to capture a screenshot of the CAPTCHA challenge.
  • Extract the CAPTCHA image from the screenshot[1][4].