Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.

Education
Research
Travel
Health

Slices & Articles Get by the slice or add to your own ebook

Medium 9781609948221

Four: Choosing Service over Self-Interest

Peter Block Berrett-Koehler Publishers ePub

 

STEWARDSHIP HOLDS THE possibility of shifting our expectations of people in power. Part of the meaning of stewardship is to hold in trust the well-being of some larger entity—our organization, our community, the earth itself. To hold something of value in trust calls for placing service ahead of control, to no longer expect leaders to be in charge and out in front.

There is pride in leadership; it evokes images of direction. There is humility in stewardship; it evokes images of service. Service is central to the idea of stewardship.

 

THE IDEA OF service through stewardship has been with us forever in a religious context. The Bible directs us to care for the earth. Many of our religious institutions have practiced stewardship for ages, primarily as an exercise of financial responsibility. Stewardship committees today function as fund-raising groups, and sometimes they also have a voice in deciding how to distribute funds to worthwhile causes in the community. Corporate stewardship has come to mean financial responsibility for the institution and good citizenship toward the community it lives in. Stewardship for our purposes, though, goes beyond financial accountability and beyond being accountable for the right use of the talents given to us. Stewardship here has a political dimension in that it is also concerned with the use of power. One intent of stewardship is to replace self-interest with service as the basis for holding and using power.

See All Chapters
Medium 9781933952499

Introduction to Working with Layers

Klaus Goelker Rocky Nook ePub

Imagine you want to compose an image from several images that youve stored on your computer. Well, you can do just that! The process is similar to the production of animated cartoons. You begin with a background image. Then you place one or more transparent foils (which are layers comprising image elements on top of transparent backgrounds) on the bottom, or opaque, background layer. A stack, a collage of single images, is created, one on top of the other. Certain file formats let you save those images with foils and layers, to a single file. The layers remain as single images in this one file, so they can be edited and altered afterward. During the editing process, you can move these layers to the front or the back of the image to determine which layer should overlay the other. In GIMP, file formats for saving images with layers are XCF and PSD.

Figure3-6.The layers of a collaged image: (1) aircraft, (2) shadow (of the aircraft), (3) hangar, (4) window pane (layer with glass effect showing through, almost transparent), and (5) background with landscape

See All Chapters
Medium 9780596527488

1. Psychological Security Traps

Andy Oram O'Reilly Media ePub

During my career of attacking software and the facilities they power, many colleagues have remarked that I have a somewhat nonstandard approach. I tended to be surprised to hear this, as the approach seemed logical and straightforward to me. In contrast, I felt that academic approaches were too abstract to realize wide success in real-world applications. These more conventional disciplines were taking an almost completely random tack with no focus or, on the opposite end of the spectrum, spending hundreds of hours reverse-engineering and tracing applications to (hopefully) discover their vulnerabilities before they were exploited out in the field.

Now, please do not take this the wrong way. Im not condemning the aforementioned techniques. In fact I agree they are critical tools in the art of vulnerability discovery and exploitation. However, I believe in applying some shortcuts and alternative views to envelope, enhance, andsometimesbypass these approaches.

In this chapter Ill talk about some of these alternative views and how they can help us get inside the mind of the developer whose code or system we engage as security professionals.

See All Chapters
Medium 9781601324047

Sixth Workshop on Soft Computing in Image Procession and Computer Vision, SCIPCV + Fuzzy Logic

Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti, George Jandieri, Gerald Schaefer, Ashu M. G. Solo (Editors) CSREA Press PDF

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'15 |

405

Automatic Coronary Artery Segmentation Based on Matched

Filters and Estimation of Distribution Algorithms

Ivan Cruz-Aceves1, Arturo Hernandez-Aguirre2, and Ivvan Valdez-Peña2 at Centro de Investigación en Matemáticas, A.C., Guanajuato, Guanajuato, México

2 Centro de Investigación en Matemáticas, A.C., Guanajuato, Guanajuato, México

1 Cátedras-CONACYT

Abstract— This paper presents an estimation of distribution algorithm (EDA) for improving the vessel detection performance of Gaussian matched filters (GMF) in X-ray angiographic images. The GMF method is governed by three discrete parameters and one continuous parameter. The optimal selection of the GMF parameters is highly desirable to maximize the detection rate of blood vessels in different types of medical images. The proposed optimization of these four parameters is carried out by applying a population-based method. From all the potential solutions found by EDA, the area (Az ) under the receiver operating characteristic (ROC) curve is used as fitness function to obtain the best GMF parameters and the corresponding Gaussian response. The detection performance of the proposed method is compared with those obtained using five different GMF methods of the state-of-the-art and the ground-truth vessels hand-labeled by a specialist. The experimental results applying the proposed method demonstrated high detection rate with Az = 0.9113 using a training set of 40 angiograms and Az = 0.9343 with a test set of 40 angiograms.

See All Chapters
Medium 9781491946671

10. Writing a Simple Mobile Game

Dusty Phillips O'Reilly Media ePub

Now that you’ve written and deployed your first mobile app, I hope you’re raring to build another one! I actually recommend that your second mobile application be something that you develop on your own. However, once you’ve dabbled in that for a bit, come back here, and I’ll show you how to build a rather silly game. One of the primary complaints about Kivy is that the widgets don’t integrate well with the “native” look and feel on the various platforms on which it runs. This complaint rarely applies to gaming, and Kivy is a perfect mobile-gaming platform.

In this chapter, I’ll describe a simple idea for a game that has been bouncing around in my head. I’ll start you on some basic touch interaction and graphics. In the next chapter, you’ll look at adding enemies and scoring to the game. Finally, you’ll finish the game by adding graphic textures.

Over the course of my career, I’ve implemented a few games, but I don’t consider myself a game designer. In fact, I can’t promise that the game you are about to implement is going to be fun or even playable. However, the legendary Flappy Bird[1] game tells us that in the mobile space, games don’t have to be fun or playable to be successful!

See All Chapters

See All Slices