75,296 research outputs found

    Game Based Learning for Safety and Security Education

    Full text link
    Safety and security education are important part of technology related education, because of recent number of increase in safety and security related incidents. Game based learning is an emerging and rapidly advancing forms of computer-assisted instruction. Game based learning for safety and security education enables students to learn concepts and skills without the risk of physical injury and security breach. In this paper, a pedestal grinder safety game and physical security game have been developed using industrial standard modeling and game development software. The average score of the knowledge test of grinder safety game was 82%, which is higher than traditional lecture only instruction method. In addition, the survey of physical security game shows 84% average satisfaction ratio from high school students who played the game during the summer camp. The results of these studies indicated that game based learning method can enhance students' learning without potential harm to the students

    Security risk assessment and protection in the chemical and process industry

    Get PDF
    This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical safety. That approach is beneficial for workers in the chemical industry because they recognize the steps in this model from familiar safety models .The model combines the rings-of-protection approach with generic security practices including: management and procedures, security technology (e.g. CCTV, fences, and access control), and human interactions (pro-active as well as re-active). The method is illustrated in a case-study where a practical protection plan was developed for an existing chemical company. This chapter demonstrates that the method is useful for similar chemical- and process industrial activities far beyond the Belgian borders, as well as for cross-industrial security protection. This chapter offers an insight into how the chemical sector protects itself on the one hand, and an insight into how security risk management can be practiced on the other hand

    Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP

    Get PDF
    When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of being detected. With such a channel, a one-time pad can safely be reused many times as long as no eavesdrop is detected, and, planning ahead, part of the capacity of these uncompromised transmissions can be used to send fresh random bits with which to replace the one-time pad when an eavesdrop finally is detected. Unlike other schemes for stretching a one-time pad, this scheme does not depend on complexity-theoretic assumptions such as the difficulty of factoring.Comment: Original 1982 submission to ACM Symposium on Theory of Computing with spelling and typographical corrections, and comments by the authors 32 years later. Submitted to Natural Computin

    Spartan Daily, November 3, 1993

    Get PDF
    Volume 101, Issue 47https://scholarworks.sjsu.edu/spartandaily/8474/thumbnail.jp

    Applying the lessons of the attack on the World Trade Center, 11th September 2001, to the design and use of interactive evacuation simulations

    Get PDF
    The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public attention on the safety of large public buildings. Initiatives in the United States and in Europe have led to the development of interactive simulators that model evacuation from these buildings. The tools avoid some of the ethical and legal problems from simulating evacuations; many people were injured during the 1993 evacuation of the World Trade Center (WTC) complex. They also use many concepts that originate within the CHI communities. For instance, some simulators use simple task models to represent the occupants' goal structures as they search for an available exit. However, the recent release of the report from the National Commission on Terrorist Attacks upon the United States (the '9/11 commission') has posed serious questions about the design and use of this particular class of interactive systems. This paper argues that simulation research needs to draw on insights from the CHI communities in order to meet some the challenges identified by the 9/11 commission

    Lessons from the evacuation of the World Trade Center, Sept 11th 2001 for the future development of computer simulations

    Get PDF
    This paper provides an overview of the state of the art in evacuation simulations. These interactive computer based tools have been developed to help the owners and designers of large public buildings to assess the risks that occupants might face during emergency egress. The development of the Glasgow Evacuation Simulator is used to illustrate the existing generation of tools. This system uses Monte Carlo techniques to control individual and group movements during an evacuation. The end-user can interactively open and block emergency exits at any point. It is also possible to alter the priorities that individuals associate with particular exit routes. A final benefit is that the tool can derive evacuation simulations directly from existing architects models; this reduces the cost of simulations and creates a more prominent role for these tools in the iterative development of large-scale public buildings. Empirical studies have been used to validate the GES system as a tool to support evacuation training. The development of these tools has been informed by numerous human factors studies and by recent accident investigations. For example, the 2003 fire in the Station nightclub in Rhode Island illustrated the way in which most building occupants retrace their steps to an entrance even when there are alternate fire exits. The second half of this paper uses this introduction to criticise the existing state of the art in evacuation simulations. These criticisms are based on a detailed study of the recent findings from the 9/11 Commission (2004). Ten different lessons are identified. Some relate to the need to better understand the role of building management and security systems in controlling egress from public buildings. Others relate to the human factors involved in coordinating distributed groups of emergency personnel who may be physically exhausted by the demands of an evacuation. Arguably the most important findings centre on the need to model the ingress and egress of emergency personnel from these structures. The previous focus of nearly all-existing simulation tools has been on the evacuation of building occupants rather than on the safety of first responders1

    The Cord Weekly (July 17, 1986)

    Get PDF

    Spartan Daily, September 21, 1993

    Get PDF
    Volume 101, Issue 16https://scholarworks.sjsu.edu/spartandaily/8444/thumbnail.jp
    corecore