419 research outputs found

    Philosophical Disagreement and Skepticism

    Get PDF
    Disagreement is ubiquitous in philosophy. Although this disagreement is sometimes easily explained, other times we find more difficult disagreement arising between epistemic peers. There are a few different ways we can react to peer disagreement in philosophy. Following Hilary Kornblith, I argue that we should suspend judgment in the face of such disagreement. Although I think this is the most rational choice, it eventually leads to an uncomfortable skepticism towards philosophical methods. I conclude that when we examine the reliability of philosophy based on its usual defenses, we find that philosophy is indeed unreliable

    Social Norms, Discrete Choices, and False Dichotomies

    Get PDF
    Eric Schniter and Nathaniel Wilcox comment on Bram Tucker\u27s article, Do Risk and Time Experimental Choices Represent Individual Strategies for Coping with Poverty or Conformity to Social Norms? Evidence from Rural Southwestern Madagascar , which revisits a debate played out in Current Anthropology as to whether subsistence decisions are the result of individual strategy to cope with poverty and increase wealth... or conformity to social norms

    A Relay Prevention Technique for Near Field Communication

    Get PDF
    The use of near field communication (NFC) has expanded as rapidly as Bluetooth or similar technologies and shows no signs of slowing down. It is used in many different systems such as contactless payment processing, movie posters, security access and passport identification. NFC enabled devices include cell phones, credit cards and key chains. With the spread of any new technology come security vulnerabilities that malicious users will try to exploit. NFC is particularly vulnerable to what is known as a relay attack. The relay attack is similar to the man-in-the-middle attack but the data need not be unencrypted to be vulnerable. The relay attack is currently undetectable and unstoppable. Many solutions have been proposed but no real-world solution has been found that does not require significant changes to the NFC protocol, or even the hardware. In this work we propose a technique that uses careful timing analysis of tag communication to identify a transaction as dangerous and thus set off an alert of the potential threat. This could be built into mobile devices and readers already deployed and provide a level of security to the market not currently available while maintaining the protocols set forth by the ISO. A proof of concept has been built and tested on custom hardware as well as on an Android Nexus 4 to detect and prevent the relay attack. In this thesis we give an overview of security issues in NFC communication, describe the relay attack in detail, present our timing based countermeasures and its implementation, and give results of our evaluation of timing based relay prevention

    The environment power system analysis tool development program

    Get PDF
    The Environment Power System Analysis Tool (EPSAT) is being developed to provide space power system design engineers with an analysis tool for determining system performance of power systems in both naturally occurring and self-induced environments. The program is producing an easy to use computer aided engineering (CAE) tool general enough to provide a vehicle for technology transfer from space scientists and engineers to power system design engineers. The results of the project after two years of a three year development program are given. The EPSAT approach separates the CAE tool into three distinct functional units: a modern user interface to present information, a data dictionary interpreter to coordinate analysis; and a data base for storing system designs and results of analysis

    Reply

    Get PDF

    Information Transmission and the Oral Tradition: Evidence of a Late-Life Service Niche for Tsimane Amerindians

    Get PDF
    Storytelling can affect wellbeing and fitness by transmitting information and reinforcing cultural codes of conduct. Despite their potential importance, the development and timing of storytelling skills, and the transmission of story knowledge have received minimal attention in studies of subsistence societies that more often focus on food production skills. Here we examine how storytelling and patterns of information transmission among Tsimane forager-horticulturalists are predicted by the changing age profiles of storytellers’ abilities and accumulated experience. We find that storytelling skills are most developed among older adults who demonstrate superior knowledge of traditional stories and who report telling stories most. We find that the important information transmitted via storytelling typically flows from older to younger generations, and stories are primarily learned from older same-sex relatives, especially grandparents. Our findings suggest that the oral tradition provides a specialized late-life service niche for Tsimane adults who have accumulated important experience and knowledge relevant to foraging and sociality, but have lost comparative advantage in other productive domains. These findings may help extend our understanding of the evolved human life history by illustrating how changes in embodied capital predict the development of information transmission services in a forager-horticulturalist economy

    Exploring Aerosols near Clouds with High-Spatial-Resolution Aircraft Remote Sensing During SEAC4RS

    Get PDF
    Since aerosols are important to our climate system, we seek to observe the variability of aerosol properties within cloud systems. When applied to the satelliteborne Moderateresolution Imaging Spectroradiometer (MODIS), the Dark Target retrieval algorithm provides global aerosol optical depth (AOD; at 0.55 m) in cloudfree scenes. Since MODIS' resolution (500m pixels, 3 or 10km product) is too coarse for studying nearcloud aerosol, we ported the Dark Target algorithm to the highresolution (~50m pixels) enhancedMODIS Airborne Simulator (eMAS), which flew on the highaltitude ER2 during the Studies of Emissions, Atmospheric Composition, Clouds, and Climate Coupling by Regional Surveys Airborne Science Campaign over the United States in 2013. We find that even with aggressive cloud screening, the ~0.5km eMAS retrievals show enhanced AOD, especially within 6 km of a detected cloud. To determine the cause of the enhanced AOD, we analyze additional eMAS products (cloud retrievals and degradedresolution AOD), coregistered Cloud Physics Lidar profiles, MODIS aerosol retrievals, and groundbased Aerosol Robotic Network observations. We also define spatial metrics to indicate local cloud distributions near each retrieval and then separate into nearcloud and farfromcloud environments. The comparisons show that low cloud masking is robust, and unscreened thin cirrus would have only a small impact on retrieved AOD. Some of the enhancement is consistent with clearcloud transition zone microphysics such as aerosol swelling. However, 3D radiation interaction between clouds and the surrounding clear air appears to be the primary cause of the high AOD near clouds
    • …
    corecore