MIT Explores VR Technology for Treating Paedophilia!

At the Forbidden Research conference at the Massachusetts Institute of Technology (MIT), Ethan Zuckerman warned everyone: "If we pass this resolution today and you don't feel any wrong, then we must have done something wrong. Something."

The Forbidden Research conference was organized by the MIT Media Lab to encourage people to explore the imprisoned science and culture. Forbidden Research often discusses current hotspots or areas of research that are considered dangerous by the academic community, such as secret government monitoring practices, human genetic engineering, Islam, and women's rights.

For me participating in the conference, the topic of concern is: "Sexual Deviance: Can Technology Protect Our Children?" (Sexual Psychological Abnormal: Technology Can Protect Our Children?). Within a few hours of lunch, two researchers will discuss a hypothetical future, what will happen when technologies such as robotics and virtual reality meet child pornography.

This future may not be as distant as you think. The Japanese company Trottla has produced a child-sized sex toy and has shipped it to the world. In 2013, a Canadian man was arrested for ordering such a sex toy and was tried earlier this year. Because Canadian law considers this to be child pornography, this Canadian man can be sentenced to prison for up to seven years.

But if such a sex toy can help us instead of hurt it? Ron Arkin, a robot engineer at the Georgia Institute of Technology in the United States, is also a guest at Forbidden Research. He believes that the law not only needs to allow people to have such a sex toy, but also should Give people some instructions and teach them how to use them. In his view, virtual reality and sex robots may be a way to meet people's sexual needs, turning the dark side of people's hearts into machines rather than real children. If successful, this will not only help people who have experienced sex crimes to re-integrate into society, but also prevent people who have never experienced sexual crimes from committing sexual abuse.

Difficult to evaluate

There is a group of invisible populations who have a strong sexual desire but are trying hard to control themselves. These people are completely ignored by the legal and medical systems that can help them. What's more, laws that recognize these desires can have serious social and legal effects. We do not know how many people have pedophilia, and some reports predict that these people account for 0.5%-1% of the population, but it is difficult for us to verify this data. In various considerations, people are not willing to admit that they are a pedophile, so only true criminals may prove to be suffering from pedophilia.

Patrice Renaud, a psychologist at the University of Montreal in Canada, uses pornographic experiences and role-playing techniques to study sexually impetuous patients. Every year, the court and specialized clinics let Renaud's team evaluate some sexually impetuous patients to see if they would pose a threat to others. The patient will be asked to wear an eye tracker, an EEG brain monitor, and a device to measure the engorgement of the external genital organs. They will then be given visual and auditory sexual stimulation to assess whether they have overcome the criminal impulse. For paedophilia patients, they use police to rush photos of real children taken at the crime scene, but later the Canadian government banned this behavior, so Renaud's laboratory turned to audio recordings to describe different sex scenes.

Renaud said that both of the above mentioned practices have problems. Real photos can cause public concern that there is no standard for this kind of randomly collected photos; audio recordings are not enough to cause sexual impulse reactions.

Therefore, Renaud started thinking about virtual reality porn more accurately in assessing sexual impulse patients several years ago, and it does not cause moral and ethical problems. So Renaud and her colleagues started a series of experiments that put normal and sexual offenders in a computer-generated erotic environment and assessed their physical reactions. Experiments have shown that the sexual response of the test subjects matches their sexual bias, which also shows that virtual reality can create a “sex sense of presence”.

Unknown effect

Renaud's lab is currently investigating how virtual reality can help assess paedophilia patients, but he also hopes to use virtual reality for sexual patient treatment. Virtual reality has many precedents for treatment, such as treatment phobia, posttraumatic stress sequelae, and schizophrenia.

There is not much room for choice. Renaud said: "It's difficult to treat pedophiles. Unlike bad habits like changing cigarettes, you can't let them change their sexual preferences." For those who want to be treated, they can try cognitive behavioral therapy. Many countries even offer chemical castration. On the Internet, there are anonymous organizations such as Virtuous Pedophiles that help those who want to control themselves or do not want to risk finding a therapist.

Perhaps, as Renaud suggests, combining cognitive-behavioral therapy with virtual reality can help people overcome and understand their sexual desires. One of their ongoing studies is to let patients walk in a park full of crime opportunities. Renaud also mentioned a treatment that uses virtual reality to generate compassion for patients and helps paedophiles who have had a criminal experience to understand the victim's feelings in order to prevent them from committing a crime again. In a controlled lab setting, a sex robot may come in handy to increase the sense of touch and feel for these experiences, thereby increasing the sense of reality.

Some researchers are cautiously optimistic about this idea. Michael C. Seto, head of the forensic research team at the Royal Ottawa Health Care Group in Canada, said that virtual child pornography and other simulations may be a safe way to meet people's sexual needs.

But Seto and Renaud do not agree to open child-sized sex robots unless they know the impact of these tools on paedophilia patients. Renaud said: "I wouldn't risk letting people use this kind of robot. Perhaps some people with strong control can use these tools, but for others, I think this will only deepen their desire and lead them to commit crimes. ."

Courage to explore the boundaries of science

In such a situation, these sexual perversion behaviors may be normalized, thereby posing a greater threat to children. Kate Darling, an MIT human-computer interaction researcher, said: "We don't know the answer. We don't know what the future direction of development will be, and we can't conduct research either." In the case of insufficient funds, it is necessary to find willingness to participate in the experiment. Pedophilia patients are not easy. In addition, this can also cause many people to resent. For example, Campaign Against Sex Robots issued a document last year saying that these sexual substitutes did not reduce the demand for prostitutes.

It is difficult to conduct objective research on paedophilia patients, especially because of ethical and instinctive aversion. But perhaps we can overcome this fear in the future. Seto said: "Understand this is very important, because we must work harder to prevent children from being sexually assaulted." The emergence of artificial intelligence tools is only a matter of time. But how realistic are these tools? Will more advanced and realistic technologies help solve these problems, or will they make them worse? We need to assess the impact of these things. As Arkin said at the Forbidden Research Conference: If we do not explore, then we will pay an unbearable price.

Networking Keystone Jacks

Networking Keystone Jacks.China Cat5e Coupler Jack,Keystone Jack Short Body manufacturer, choose the high quality Cat5e Jack Short,Keystone Jack Unshield, etc, included keystone jacks for CAT6A, CAT6, CAT5E, and CAT3

Keystone jacks are snap in modules used to mount low voltage electrical connectors into a keystone wall plate, patch panel, face plate or surface mount box.

Our Keystone Jacks are available in 10 different colors for easy color-coded installations.

RJ45 port editing

1. Origin:



2. The name RJ stands for the registered jack and is the USOC (universal service ordering codes) code of bell system. USOC is a series of registered sockets and their wiring mode, which are developed by bell system to connect the user's equipment to the public network. FCC regulations control the application of this purpose. The FCC (Federal Communications Commission) issued a document on behalf of the U.S. government to specify RJ11.



3. RJ11 is the common name of the connector developed by Western Electric Co. Its shape is defined as a 6-pin connecting device. Originally called wexw, where x means "active", contact or needle. For example, we6w has all six contacts, numbered from 1 to 6. The we4w interface only uses four pins, the outermost two contacts (1 and 6) are not used, and we2w only uses the middle two pins. For RJ11, the information source is contradictory. It can be a 2 or 4-core 6-pin connector. What's more confusing is that RJ11 is not only used to represent the 6-pin connector, it also refers to the 4-pin version.



4. RJ45 and RJ11: different standards, different sizes



5. Due to the different sizes of the two (RJ11 is 4 or 6-pin, RJ45 is an 8-pin connection device), it is obvious that the RJ45 plug cannot be inserted into the RJ11 socket. However, it is physically feasible (RJ11 plug is smaller than RJ45 jack), which makes people think that they should or can work together. It's not. It is strongly recommended not to use RJ11 plug for RJ45 socket.



⒍ because RJ11 is not internationally standardized, its size, insertion force, insertion angle, etc. are not in accordance with the international standard connector design requirements, so interoperability cannot be guaranteed. They even cause damage to both. Since the RJ11 plug is smaller than the RJ45 socket, the plastic parts on both sides of the plug will damage the metal pin of the inserted socket.



RJ - 45 port is our most common port, it is our common twisted pair Ethernet port



Because twisted pair is mainly used as transmission medium in Fast Ethernet, RJ-45 port can be divided into 10Base-T network RJ-45 port and 100base TX network RJ-45 port.



Among them, the RJ-45 port of 10Base-T network is usually identified as "eth" in the router, while the RJ-45 port of 100base TX network is usually marked as "10 / 100btx". This is mainly due to the fact that most products of Fast Ethernet router still adopt 10 / 100Mbps bandwidth adaptive.



The left figure shows the RJ-45 port of 10Base-T network, while the right figure shows the RJ-45 port of 10 / 100base-tx network. In fact, the two RJ-45 ports are exactly the same in terms of the port itself, but the corresponding network circuit structure in the ports is different, so they can not be connected casually.



Definition of RJ45 interface pin signal



Ethernet 10 / 100Base-T interface:



1 TX + tranceive data +



2 TX - tranceive data -



3 RX + receive data +



4 N / C not connected



5 N / C not connected



6 RX - receive data



7 n / C not connected



8 N / C not connected



Ethernet 100base-t4 interface:



1 TX_ D1 + tranceive data +



2 TX_ D1 - tranceive data



3 RX_ D2 + receive data +



4 BI_ D3 + bi directional data +



5 BI_ D3 bi directional data



6 RX_ D2 - receive data



7 BI_ D4 + bi directional data +



8 BI_ D4 bi directional data



Note: RJ45 interface adopts differential transmission mode, TX + and TX - are a pair of twisted pair, which can reduce interference when twisted together.

Cat5e Coupler Jack,Keystone Jack Short Body,Cat5e Jack Short,Keystone Jack Unshield

ShenZhen Antenk Electronics Co,Ltd , https://www.antenkcon.com

Posted on