4,683 research outputs found

    Schizophrenia and Moral Responsibility: A Kantian Essay

    Get PDF
    In this paper, I give a Kantian answer to the question whether and why it would be inappropriate to blame people suffering from mental disorders that fall within the schizophrenia spectrum. I answer this question by reconstructing Kant’s account of mental disorder, in particular his explanation of psychotic symptoms. Kant explains these symptoms in terms of various types of cognitive impairment. I show that this explanation is plausible and discuss Kant’s claim that the unifying feature of the symptoms is the patient’s inability to enter into an exchange of reasons with others. After developing a Kantian Quality of Will Thesis, I analyze some real life cases. Firstly, I argue that delusional patients who are unable to enter into an exchange of epistemic reasons are exempted from doxastic rather than moral responsibility. They are part of the moral community and exonerated from moral blame only if their actions do not express a lack of good will. Secondly, I argue that disorganized patients who are unable to form intentions and to make plans are exempted from moral responsibility because they do not satisfy the conditions for agency

    Movement-based Group Awareness with Wireless Sensor Networks

    Get PDF
    We propose a method through which dynamic sensor nodes determine that they move together, by communicating and correlating their movement information. We describe two possible solutions, one using inexpensive tilt switches, and another one using low-cost MEMS accelerometers. We implement a fast, incremental correlation algorithm, with an execution time of 6ms, which can run on resource constrained devices. The tests with the implementation on real sensor nodes show that the method is reliable and distinguishes between joint and separate movements. In addition, we analyze the scalability from four different perspectives: communication, energy, memory and execution speed. The solution using tilt switches proves to be simpler, cheaper and more energy efficient, while the accelerometer-based solution is more reliable, more robust to sensor alignment problems and, potentially, more accurate by using extended features, such as speed and distance

    Online Movement Correlation of Wireless Sensor Nodes

    Get PDF
    Sensor nodes can autonomously form ad-hoc groups based on their common context. We propose a solution for grouping sensor nodes attached on the same vehicles on wheels. The nodes periodically receive the movement data from their neighbours and calculate the correlation coefficients over a time history. A high correlation coefficient implies that the nodes are moving together. We demonstrate the algorithm using two types of movement sensors: tilt switches and MEMS accelerometers. We place the nodes on two wirelessly controlled toy cars, and we observe in real-time the group membership via the LED colours of the nodes. In addition, a graphical user interface running on the base station shows the movement signals over a recent time history, the latest sampled data, the correlation between each two nodes and the group membership

    REAS3: Monte Carlo simulations of radio emission from cosmic ray air showers using an "end-point" formalism

    Full text link
    In recent years, the freely available Monte Carlo code REAS for modelling radio emission from cosmic ray air showers has evolved to include the full complexity of air shower physics. However, it turned out that in REAS2 and all other time-domain models which calculate the radio emission by superposing the radiation of the single air shower electrons and positrons, the calculation of the emission contributions was not fully consistent. In this article, we present a revised implementation in REAS3, which incorporates the missing radio emission due to the variation of the number of charged particles during the air shower evolution using an "end-point formalism". With the inclusion of these emission contributions, the structure of the simulated radio pulses changes from unipolar to bipolar, and the azimuthal emission pattern becomes nearly symmetric. Remaining asymmetries can be explained by radio emission due to the variation of the net charge excess in air showers, which is automatically taken into account in the new implementation. REAS3 constitutes the first self-consistent time-domain implementation based on single particle emission taking the full complexity of air shower physics into account, and is freely available for all interested users.Comment: 18 pages, 13 figures accepted by Astroparticle Physics (2010

    Diffraction-contrast imaging of cold atoms

    Get PDF
    We consider the inverse problem of in-line holography, applied to minimally-destructive imaging of cold atom clouds. Absorption imaging near-resonance provides a simple, but destructive measurement of atom column density. Imaging off resonance greatly reduces heating, and sequential images may be taken. Under the conditions required for off-resonant imaging, the generally-intractable inverse problem may be linearized. A minimally-destructive, quantitative and high-resolution image of the atom cloud column density is then retrieved from a single diffraction pattern.Comment: 4 pages, 3 figures v2: minor changes in response to referee reports, mostly additional experimental detail v3: revisions to figure 3: added trace and changed image. Minor text and referencing changes. Accepted by Phys Rev A (Rapid Commun

    Access Point Security Service for wireless ad-hoc communication

    Get PDF
    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the security solution described here comprise topics such as energy efficiency, security standards and ad-hoc networks. The devised solution is called Access Point Security Service (APSS). APSS is able to provide security by delivering a symmetric key to two wireless devices that require ad-hoc peer-to-peer communication. The main principle of APSS is that it makes use of an existing security relationship between a network provider and its customers. The existing security relationship enables the network provider to deliver security to two or more communicating parties in the form of a shared key. An implementation of APSS is provided making use of the existing Wi-Fi security standards

    Discounting by intervals: a generalized model of intertemporal choice

    Get PDF
    According to most models of intertemporal choice, an agent's discount rate is a function of how far the outcomes are removed from the present, and nothing else. This view has been challenged by recent studies, which show that discount rates tend to be higher the closer the outcomes are to one another (subadditive discounting) and that this can give rise to intransitive intertemporal choice. We develop and test a generalized model of intertemporal choice, the Discounting By Intervals (DBI) model, according to which the discount rate is a function of both how far outcomes are removed from the present and how far the outcomes are removed from one another. The model addresses past challenges to other models, most of which it includes as special cases, as well as the new challenges presented in this paper: Our studies show that when the interval between outcomes is very short, discount rate tends to increase with interval length (superadditive discounting). In the discussion we place our model and evidence in a broader theoretical context
    corecore