• Title/Summary/Keyword: evacuation simulation

Search Result 320, Processing Time 0.023 seconds

The Evaluation of VR Applicable Work in Building Design Phase using IPA (IPA를 활용한 건축 설계단계 VR 적용가능업무 평가)

  • Lee, Dongyoun;Seo, Myoung Bae
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.152-161
    • /
    • 2020
  • In the construction, VR(Virtual Reality) is simply used by users to implement and experience 3D modeling in virtual reality, such as safety, practical education, and promotion. The VR related research includes content development and visualization simulation such as disaster safety evacuation simulation and design education contents. Research on developing suitable VR and presenting directionality is insufficient, which is required in practice. Therefore, in this study, prior to the development of VR suitable for the construction, quantitative evaluation, and analysis based on the judgment of experts are performed. However, the research was conducted on the design stages, which are believed to have high needs and application effects of VR during the lifecycle of construction. There are nine tasks that can be applied to VR in the design stage, and these tasks were evaluated and analyzed using IPA(Importance Performance Analysis) by surveying the level of expectations, importance, and performance. As a result, it was evaluated and analyzed that VR and content development was necessary for the review of member interference and collaboration work for decision making among related stakeholders. The results of this study are expected to be used as basic data for the development of VR to be applied in the design stage to the future.

Fundamental Study on Algorithm Development for Prediction of Smoke Spread Distance Based on Deep Learning (딥러닝 기반의 연기 확산거리 예측을 위한 알고리즘 개발 기초연구)

  • Kim, Byeol;Hwang, Kwang-Il
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.1
    • /
    • pp.22-28
    • /
    • 2021
  • This is a basic study on the development of deep learning-based algorithms to detect smoke before the smoke detector operates in the event of a ship fire, analyze and utilize the detected data, and support fire suppression and evacuation activities by predicting the spread of smoke before it spreads to remote areas. Proposed algorithms were reviewed in accordance with the following procedures. As a first step, smoke images obtained through fire simulation were applied to the YOLO (You Only Look Once) model, which is a deep learning-based object detection algorithm. The mean average precision (mAP) of the trained YOLO model was measured to be 98.71%, and smoke was detected at a processing speed of 9 frames per second (FPS). The second step was to estimate the spread of smoke using the coordinates of the boundary box, from which was utilized to extract the smoke geometry from YOLO. This smoke geometry was then applied to the time series prediction algorithm, long short-term memory (LSTM). As a result, smoke spread data obtained from the coordinates of the boundary box between the estimated fire occurrence and 30 s were entered into the LSTM learning model to predict smoke spread data from 31 s to 90 s in the smoke image of a fast fire obtained from fire simulation. The average square root error between the estimated spread of smoke and its predicted value was 2.74.

A study on prediction and improvement method of fire risk for a newly built college dormitory (신축 승선생활관의 화재 위험성 예측 및 개선방안에 관한 연구)

  • Kim, Byeol;Hwang, Kwang-Il
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.3
    • /
    • pp.228-234
    • /
    • 2016
  • As a college dormitory has the features of high dwelling density and a floating population that becomes crowded during particular times, when a disaster such as a fire occurs, it has the risk of causing much loss of life. In this study, the fire simulation program Fire Dynamics Simulator (FDS), is used to predict the risk when a fire occurs, to analyze the problem, and to suggest an improvement plan for a new cadet dormitory at an university in Korea. The research results are as follows. When a fire occurred in the ironing room inside the cadet dormitory, a smoke detector operated after 65 seconds. Thirteen seconds later, a sprinkler started to operate. The temperature and carbon monoxide density reached the limit value at 241 and 248 seconds, respectively. Because the limit visibility value was reached within 66 seconds after the occurrence of a fire, it is predicted that preparation must be finished and evacuation should begin within 1 minute after the fire occurs, in order to have no casualties. Synthesizing this dormitory fire risk prediction result, the visibility value is considered to be the most dangerous factor for personal safety. Because of this, installing a smoke extraction system is suggested to secure visibility. After the installation of a smoke extraction system, the problem of smoke diffusion in the corridors improved.

A Study on Plan for Introduction of Fire Influence Evaluation System through Risk Assessment of the Urban Lifestyle Housing Buildings (도시형 생활주택의 위험성 분석을 통한 화재영향성평가제도의 도입방안에 관한 연구)

  • Kim, Dong-Wook;Baek, Sona;Choi, Jun-Ho
    • Fire Science and Engineering
    • /
    • v.31 no.1
    • /
    • pp.10-17
    • /
    • 2017
  • Securing fire safety using only fire-fighting facilities is difficult because causes of modern fire vary, such as architectural structures and building use patterns. In order for fire safety to be guaranteed by enacting and revising fire regulations reflecting the fire hazard characteristics and user's characteristics, the introduction of fire influence evaluation (fire risk assessment) system needs to be considered in a timely manner to be adopted but unfortunately two attempts before have failed. In this study, a fire case of urban lifestyle housing was surveyed to introduce a fire influence evaluation system and a field survey on the actual condition of the 414 urban lifestyle housing buildings and fire & evacuation simulation results of one representative building in Suyoung-gu and Nam-gu District of Busan Metropolitan City were analyzed. The necessity, procedures and implementation method of fire influence evaluation system were questioned and tested by the professional fire experts, fire officers and firefighters and architects. On the basis of these facts, introduction of (fire influence evaluation system) should be absolutely adopted and the fire department and fire regulation are eligible to implement the system. Therefore, fire regulation needs to be enacted or revised in accordance with the new fire environment and fire safety system that needs to be built up. Accordingly, aggressive promotion through public hearings on the necessity of fire impact assessments, consensus among departments and fostering experts to carry out fire influence evaluation system will be the core.

A study on possibility of soft target terrorism by ISIS in South Korea (자국내 IS테러단체에 의한 소프트타깃 테러발생 가능성에 대한 연구)

  • Oh, Sei-Youen;Yun, Gyeong-Hui
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.85-117
    • /
    • 2016
  • These days, ISIS terrorists have been expanding not only to european countries, but also to asian countries so South Korea is no longer safe from terrorists' attacks. Especially, 'soft target terrorism' makes many people maximizing fear of terrorism because it is caused by small groups - those who are armed with small arms and light weapons - and they are able to carry out hit and run attacks on civilian targets. It poses even more dangerous to kill massively. That is why November 2015 Paris attacks and January 2016 Jakarta attacks killed and injured many people because of 'soft target terrorism.' Therefore, the South Korea has also recognized the seriousness of terrorism by ISIS. The study has shown the precautionary measures about 'soft target terrorism' and how to defend against 'soft target terrorism' by looking through overseas examples. It is for the possibilities of 'soft terrorism' in South Korea because of the expansion of ISIS. As a result, 'soft target terrorism', caused by ISIS, could happen in South Korea. The counterplan is as in the following. First of all, 'soft target terrorism', which is collaborated with ISIS and domestic terrorists, could be caused by negative awareness of foreign residents and xenophobia so the public should change stereotypes about the foreign residents and there should be legislation about racial discrimination enacted by parliament and the government must practice the law. Second, the Korean anti-terrorism laws should be modified to minimize violations of human rights, related to the Korean citizens' personal information, and to stop the concentration of power into the hands of one law enforcement. Third, the government has to develop and to initiate the refuge&evacuation simulation, which prepares for 'soft target terrorism' and minimizes the damages if terrorists attack hot spots like central commercial areas or event halls.

  • PDF

A study on the Optimum Capacity of Citadel (선원대피처의 적정규모에 관한 연구)

  • Kim, Won-Ouk;Chae, Yang-Bum;Kim, Chang-Jae
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.21-26
    • /
    • 2012
  • Recently, vessel hijacking by pirates has been a big issue around the world. For example, the hostages of VLCC "SAMHO Dream" were released for a large sum of ransom. On January 20, 2011 "SAMHO Jewelry" succeeded releasing all of the 21 crews on the vessel by attacking the pirates in international waters for the first time since the founding of the Naval Force. Furthermore, the "HANJIN Tianjin" crews evacuated to the Citadel promptly and were rescued by the navy. As hijacking of Korean vessels by pirates is increasing, various safety measures must be implemented. As a matter of fact, the standard for ship's facilities has been partially revised and setting up an evacuation shelter on all vessels sailing dangerous zone has been reinforced. This research aims to discuss crew Citadel installation on vessels intended for long haul. In addition, it will look at measures against potential gas flow in the event of pirate armed attacks and fire outbreak onboard a vessel. It will also assess the optimal number of crew Citadels theoretically. Lastly, the optimal number of shelters in the event of fire outbreak will be discussed based on an FDS simulation.

Development of distributed inundation routing method using SIMOD method (SIMOD 기법을 이용한 분포형 침수 추적 기법 개발)

  • Lee, Suk Ho;Lee, Dong Seop;Kim, Jin Man;Kim, Byung Sik
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.7
    • /
    • pp.579-588
    • /
    • 2016
  • Changes in precipitation due to climate change is made to induce the local and intensive rainfall, it is increasing damage caused by inland inundation. Therefore, it requires a technique for predicting damage caused by flooding. In this study, in order to determine whether this flood inundated by any route when the levee was destroyed, Which can simulate the path of the flood inundation model was developed for the SIMOD (Simplified Inundation MODel). Multi Direction Method (MDM) for differential distributing the adjacent cells by using the slope and Flat-Water Assumption (FWA)-If more than one level higher in the cell adjacent to the cell level is the lowest altitude that increases the water level is equal to the adjacent cells- were applied For the evaluation of the model by setting the flooding scenarios were estimated hourly range from the target area. SIMOD model can significantly reduce simulation time because they use a simple input data of topography (DEM) and inflow flood. Since it is possible to predict results within minutes, if you can only identify inflow flood through the runoff model or levee collapse model. Therefore, it could be used to establish an evacuation plan due to flooding, such as EAP (Emergency Action Plan).

A Study on Required Safe Egress Time (RSET) Comparison and Error Calculation in Relation to Fire Room Range Set Conditions of Performance Based Fire Safety Designers (성능위주설계자들의 화재실 범위 설정 방식에 따른 소요피난안전시간(RSET) 비교 및 오차산정에 관한 연구)

  • Baek, Sona;Choi, Jun-Ho;Hong, Won-Hwa;Jung, Jong-Jin
    • Fire Science and Engineering
    • /
    • v.30 no.3
    • /
    • pp.73-78
    • /
    • 2016
  • The Installation, Maintence, and Safety Control of Fire-fighting Systems Act of South Korea regulates that over 30-storey high-rise buildings including underground spaces should vitally perform the Performance-based Design to minimize property damage and personal injury as a fire risk assessment in advance. Therefore a PBD designer such as a fire safety professional engineer evaluate occupant's life safety by a scientific methodology. In order to evaluate the life safety, fire safety designers calculate the Required Safety Egress Time (RSET) which does not have the legal criteria regarding the standard method of calculation yet. So this way has been showing different results depending upon the designer's choice, knowledges and experiences. In this study, RSET calculation methods by six designers respectively were analysed from the thirteen reports of real performance based design projects conducted in Busan for a last five years. In particular, the Response Time calculation methods which have the most powerful effect for figuring the RSET are compared with the other designer's to deduce an error value.

A Study on the Production of Flooding Maps in Small Stream (소하천 홍수범람지도 제작에 관한 연구)

  • Lee, Dong Hyeok;Jun, Kye Won;Kim, Il Dong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.2
    • /
    • pp.51-59
    • /
    • 2021
  • Due to recent climate change, the flood damage is becoming larger due to the development of localized heavy rains. 2020.12 The Ministry of Environment provides 100-year flood flood map, but in the case of small rivers, river structures are designed at 50-80 years frequency, making it difficult to predict damage and provide evacuation information. This study prepared flood map of Donamcheon district in Geumnam-myeon, Sejong Special Self-Governing Province, which is a small stream and habitual flood zone. The flood level was calculated using HEC-RAS and the flood area was visualized through HEC-GeoRAS. The analysis results showed that property damage such as special crops and roads occurred during the 30-80 year frequency rainfall, and it affected private houses such as general residential areas and public land when the frequency occurred for 100 years. The results of the comparison and analysis of the flood map provided by the Ministry of Environment and the results of the HEC-GeoRAS simulation showed that the flood map provided by the Ministry of Environment did not consider small streams. Further studies on flood flood maps considering the large and small stream are needed in the future.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.