5,210 research outputs found

    Game Based Learning for Safety and Security Education

    Full text link
    Safety and security education are important part of technology related education, because of recent number of increase in safety and security related incidents. Game based learning is an emerging and rapidly advancing forms of computer-assisted instruction. Game based learning for safety and security education enables students to learn concepts and skills without the risk of physical injury and security breach. In this paper, a pedestal grinder safety game and physical security game have been developed using industrial standard modeling and game development software. The average score of the knowledge test of grinder safety game was 82%, which is higher than traditional lecture only instruction method. In addition, the survey of physical security game shows 84% average satisfaction ratio from high school students who played the game during the summer camp. The results of these studies indicated that game based learning method can enhance students' learning without potential harm to the students

    Virtual Worlds - Real Courts

    Get PDF

    Virtual Worlds - Real Courts

    Get PDF
    Article published in the VilLaw Law Review

    Tunnel Engineering

    Get PDF
    This volume presents a selection of chapters covering a wide range of tunneling engineering topics. The scope was to present reviews of established methods and new approaches in construction practice and in digital technology tools like building information modeling. The book is divided in four sections dealing with geological aspects of tunneling, analysis and design, new challenges in tunnel construction, and tunneling in the digital era. Topics from site investigation and rock mass failure mechanisms, analysis and design approaches, and innovations in tunnel construction through digital tools are covered in 10 chapters. The references provided will be useful for further reading

    A state-of-the-art review of built environment information modelling (BeIM)

    Get PDF
    Elements that constitute the built environment are vast and so are the independent systems developed to model its various aspects. Many of these systems have been developed under various assumptions and approaches to execute functions that are distinct, complementary or sometimes similar. Also, these systems are ever increasing in number and often assume similar nomenclatures and acronyms thereby exacerbating the challenges of understanding their peculiar functions, definitions and differences. The current societal demand to improve sustainability performance through collaboration, whole-systems and through-life thinking, is driving the need to integrate independent systems associated with different aspects and scales of the built environment to deliver smart solutions and services that improve the wellbeing of citizens. The contemporary object-oriented digitization of real world elements appears to provide a leeway for amalgamating modelling systems of various domains in the built environment which we termed as built environment information modelling (BeIM). These domains included Architecture, Engineering, Construction and Urban Planning and Design. Applications such as Building Information Modelling, Geographic Information Systems and 3D City Modelling systems are now being integrated for city modelling purposes. The various works directed at integrating these systems are examined revealing that current research efforts on integration fall into three categories: (1) data/file conversion systems, (2) semantic mapping systems and (3) the hybrid of both. The review outcome suggests that a good knowledge of these domains and how their respective systems operate is vital to pursuing holistic systems integration in the built environment

    The Crypto Quandary: Is Bankruptcy Ready?

    Get PDF

    Speak Out: Verifying and Unmasking Cryptocurrency User Identity

    Get PDF
    Terror attacks pose a serious threat to public safety and national security. New technologies assist these attacks, magnify them, and render them deadlier. The more funding terrorist organizations manage to raise, the greater their capacity to recruit members, organize, and commit terror attacks. Since the September 11, 2001 terror attacks, law enforcement agencies have increased their efforts to develop more anti-terrorism and anti-money laundering regulations, which are designed to block the flow of financing of terrorism and cut off its oxygen. However, at present, most regulatory measures focus on traditional currencies. As these restrictions become more successful, the likelihood that cryptocurrencies will be used as an alternative to fund illicit behaviors grows. Furthermore, the COVID-19 virus and subsequent social distancing guidelines have increased the use of cryptocurrencies for money laundering, material support to terror, and other financial crimes. Cryptocurrencies are a game-changer, significantly affecting market functions like never before and making it easier to finance terrorism and other types of criminal activity. These decentralized and (usually) anonymous currencies facilitate a high volume of transactions, allowing terrorists to engage in extensive fundraising, management, transfer, and spending for illegal activities. As cryptocurrencies gain popularity, the issue of regulating them becomes more urgent. This Article proposes to reform cryptocurrency regulation. It advocates for mandatory obligations directed at cryptocurrency issuers, wallet providers, and exchanges to verify the identity of users on the blockchain. Thus, courts could grant warrants obligating cryptocurrency-issuing companies to unmask the identity of cryptocurrency users when there is probable cause that their activities support terrorism or other money laundering schemes. Such reforms would stifle terrorism and other types of criminal activity financed through cryptocurrencies, curbing harmful activities and promoting national security. In recognition of the legal challenges this solution poses, this Article also addresses substantial objections that might be raised regarding the proposed reforms, such as innovation concerns, First Amendment arguments, and Fourth Amendment protections. It concludes by addressing measures to efficiently promote application of the proposed reforms
    corecore