39,651 research outputs found

    The *subjectivity* of subjective experience - A representationalist analysis of the first-person perspective

    Get PDF
    This is a brief and accessible English summary of the "Self-model Theory of Subjectivity" (SMT), which is only available as German book in this archive. It introduces two new theoretical entities, the "phenomenal self-model" (PSM) and the "phenomenal model of the intentionality-relation" PMIR. A representationalist analysis of the phenomenal first-person persepctive is offered. This is a revised version, including two pictures

    Journeying to visibility:an autoethnography of self-harm scars in the therapy room

    Get PDF
    This autoethnography explores the experience of a therapist negotiating the visibility of their self‐harm scars in the therapy room. Its form takes the shape of the author's personal meaning‐making journey, beginning by exploring the construction of the therapist identity before going on to consider the wounded healer paradigm and the navigation of self‐disclosure. A thread throughout is finding ways to resist fear and shame as both a researcher and counsellor. The author concludes by recounting fragments of sessions from the first client she worked with while having her scars visible. While not every therapist will have self‐harm scars, all therapists have a body which plays “a significant part of his or her unique contribution to therapy” (Burka, 2013, p. 257). This paper is, therefore, potentially valuable to any therapist, at any stage of development, who seeks to reflect on the role of the body and use of the self

    Field test of multi-hop image sensing network prototype on a city-wide scale

    Get PDF
    Open Access funded by Chongqing University of Posts and Telecommuniocations Under a Creative Commons license, https://creativecommons.org/licenses/by-nc-nd/4.0/Wireless multimedia sensor network drastically stretches the horizon of traditional monitoring and surveillance systems, of which most existing research have utilised Zigbee or WiFi as the communication technology. Both technologies use ultra high frequencies (mainly 2.4 GHz) and suffer from relatively short transmission range (i.e. 100 m line-of-sight). The objective of this paper is to assess the feasibility and potential of transmitting image information using RF modules with lower frequencies (e.g. 433 MHz) in order to achieve a larger scale deployment such as a city scenario. Arduino platform is used for its low cost and simplicity. The details of hardware properties are elaborated in the article, followed by an investigation of optimum configurations for the system. Upon an initial range testing outcome of over 2000 m line-of-sight transmission distance, the prototype network has been installed in a real life city plot for further examination of performance. A range of suitable applications has been proposed along with suggestions for future research.Peer reviewe

    The impact of an intervention to introduce malaria rapid diagnostic tests on fever case management in a high transmission setting in Uganda: A mixed-methods cluster-randomized trial (PRIME).

    Get PDF
    Rapid diagnostic tests for malaria (mRDTs) have been scaled-up widely across Africa. The PRIME study evaluated an intervention aiming to improve fever case management using mRDTs at public health centers in Uganda. A cluster-randomized trial was conducted from 2010-13 in Tororo, a high malaria transmission setting. Twenty public health centers were randomized in a 1:1 ratio to intervention or control. The intervention included training in health center management, fever case management with mRDTs, and patient-centered services; plus provision of mRDTs and artemether-lumefantrine (AL) when stocks ran low. Three rounds of Interviews were conducted with caregivers of children under five years of age as they exited health centers (N = 1400); reference mRDTs were done in children with fever (N = 1336). Health worker perspectives on mRDTs were elicited through semi-structured questionnaires (N = 49) and in-depth interviews (N = 10). The primary outcome was inappropriate treatment of malaria, defined as the proportion of febrile children who were not treated according to guidelines based on the reference mRDT. There was no difference in inappropriate treatment of malaria between the intervention and control arms (24.0% versus 29.7%, adjusted risk ratio 0.81 95\% CI: 0.56, 1.17 p = 0.24). Most children (76.0\%) tested positive by reference mRDT, but many were not prescribed AL (22.5\% intervention versus 25.9\% control, p = 0.53). Inappropriate treatment of children testing negative by reference mRDT with AL was also common (31.3\% invention vs 42.4\% control, p = 0.29). Health workers appreciated mRDTs but felt that integrating testing into practice was challenging given constraints on time and infrastructure. The PRIME intervention did not have the desired impact on inappropriate treatment of malaria for children under five. In this high transmission setting, use of mRDTs did not lead to the reductions in antimalarial prescribing seen elsewhere. Broader investment in health systems, including infrastructure and staffing, will be required to improve fever case management

    Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    Full text link
    Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphone user based on behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We propose novel context-based authentication models to differentiate the legitimate smartphone owner versus other users. We systematically show how to achieve high authentication accuracy with different design alternatives in sensor and feature selection, machine learning techniques, context detection and multiple devices. Our system can achieve excellent authentication performance with 98.1% accuracy with negligible system overhead and less than 2.4% battery consumption.Comment: Published on the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017. arXiv admin note: substantial text overlap with arXiv:1703.0352

    Spartan Daily, November 7, 1958

    Get PDF
    Volume 46, Issue 33https://scholarworks.sjsu.edu/spartandaily/12662/thumbnail.jp

    Consciousness and intentionality

    Get PDF
    Philosophers traditionally recognize two main features of mental states: intentionality and phenomenal consciousness. To a first approximation, intentionality is the aboutness of mental states, and phenomenal consciousness is the felt, experiential, qualitative, or "what it's like" aspect of mental states. In the past few decades, these features have been widely assumed to be distinct and independent. But several philosophers have recently challenged this assumption, arguing that intentionality and consciousness are importantly related. This article overviews the key views on the relationship between consciousness and intentionality and describes our favored view, which is a version of the phenomenal intentionality theory, roughly the view that the most fundamental kind of intentionality arises from phenomenal consciousness
    • 

    corecore