search for: supin

Displaying 6 results from an estimated 6 matches for "supin".

Did you mean: spin
2009 Nov 29
1
Plotting observed vs. fitted values
Dear Wiza[R]ds, I am very grateful to Duncan Murdoch for his assistance with this problem. His help was invaluable. However, the problem has become a little more complicated for me. Now, in each plot, I need to plot the observed and fitted values of a supine and upright posture experiment. Here is what I have and how far I got. # tritiated (3H)-Norepinephrine(NE) disappearance from plasma # concentrations supine and upright # supine datasu <- data.frame( time=c(0,1,2,4,6,8,10,15,20), concsu=c(385.61,265.88,173.87,99.47,66.7,55.27,48.29,39.85,40.66...
2009 Nov 29
3
Plotting observed vs. Predicted values, change of symbols
...Duncan Murdoch, Gray Calhoun, and others. We are almost there. For whatever reason, I can't change the symbol from a circle to a triangle in the upright posture plots. Any ideas? I have included the problem in full. # tritiated (3H)-Norepinephrine(NE) disappearance from plasma # concentrations supine and upright # supine datasu <- data.frame( time=c(0,1,2,4,6,8,10,15,20), concsu=c(385.61,265.88,173.87,99.47,66.7,55.27,48.29,39.85,40.66) ) # upright dataup <- data.frame( time=c(0,1,2,4,6,8,10,15,20), concup=c(767.27,529.03,328.13,225.94,164,151.1,132.02,121.15,70.88) ) # fit supine wt.su...
2023 Mar 18
2
Minimize sshd log clutter/spam from unauthenticated connections
...n failures from an IP address (or network range) it can issue commands to drop any further attempts via a firewall. By having it read its own logfile it's possible to have repeated offenders be cut out for longer and longer time spans. https://www.fail2ban.org/wiki/index.php/Main_Page https://supine.com/posts/2012/08/fail2ban-monitoring-itself-recursively/
2023 Mar 18
4
Minimize sshd log clutter/spam from unauthenticated connections
Dear OpenSSH developers, a publicly accessible sshd on port 22 generates a lot of log clutter from unauthenticated connections. For an exemplary host on a university network, sshd accumulates 5~20k log lines on a single day (more than 90% of the total amount of syslog lines). That is despite the host having a restricted configuration (no SSH password authentication, firewall rate limit for
2009 Jan 28
2
For Whom the Gaza Bell Tolls -- Part 1 and 2 -- Obama’s Mideast Jewish Wet Dream Team
...ibution source was the Zionist international banking firm of Goldman Sachs. (FEC campaign records). In both Obama?s Senate and Presidential campaign he prostrated himself before AIPAC (American Israel Public Affairs Committee) promising even more money and blood for Israel?s terrorism than even the supine John McCain, and even more money and blood than the previous Shabbez Goy in the White House, George Bush. Before the Israeli terrorism and mass murder in Gaza, he went to Israel and said that he supported Israel?s planned murderous terrorism against the men, women and children of Gaza. His first...
2009 Jan 28
2
For Whom the Gaza Bell Tolls -- Part 1 and 2 -- Obama’s Mideast Jewish Wet Dream Team
...ibution source was the Zionist international banking firm of Goldman Sachs. (FEC campaign records). In both Obama?s Senate and Presidential campaign he prostrated himself before AIPAC (American Israel Public Affairs Committee) promising even more money and blood for Israel?s terrorism than even the supine John McCain, and even more money and blood than the previous Shabbez Goy in the White House, George Bush. Before the Israeli terrorism and mass murder in Gaza, he went to Israel and said that he supported Israel?s planned murderous terrorism against the men, women and children of Gaza. His first...