2010
DOI: 10.1007/s11431-010-4063-8
|View full text |Cite
|
Sign up to set email alerts
|

Development of a model to generate a risk map in a building fire

Abstract: Fire simulations and sensors are widely used in building fires, various data such as temperature, CO and CO 2 concentration, visibility can be obtained by sensors and sensor-based simulation. It is important to generate a risk map based on such data so that we can use it to estimate safety of the building. In this paper, we propose a method to generate a dynamical, integrated risk map using sensor readings in a building fire. Such risk evaluation model is developed using similarity comparison between the space… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 10 publications
(6 reference statements)
0
5
0
Order By: Relevance
“…via mobile device or dynamic signposts) [8][9][10]. This evacuation planner accounts for the location of hazards and produces evacuation routes that minimize evacuation time and exposure to the hazard.…”
Section: Route Allocationmentioning
confidence: 99%
“…via mobile device or dynamic signposts) [8][9][10]. This evacuation planner accounts for the location of hazards and produces evacuation routes that minimize evacuation time and exposure to the hazard.…”
Section: Route Allocationmentioning
confidence: 99%
“…In order to implement the modeling method, an H = \l\, P 2 , P 3 , P 4 , P 5 } is defined as a set of composable IA, which is used to describe the control-oriented abstraction [29] model of the safety protocols. P u P 5 are used to describe the safety service users of the two sides of communication respectively.…”
Section: Modeling the Safety Protocols Using Iamentioning
confidence: 99%
“…If cycles can be found not to have this property, the verifier can declare the existence of a nonprogress loop, corresponding to possible starvation. 4 Case study: verification of a safety protocol…”
Section: Properties Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…To assess management platform is vulnerable or not, and improve the risk assessment about the software and hardware. [4] First, the study combines the business information systems and related inventory data of Ching Yun University. Second, the important meetings of competent department confirm the priority order aim on the important system or data analysis.…”
Section: Risk Factors Calculationmentioning
confidence: 99%