000856458 001__ 856458
000856458 005__ 20210129235258.0
000856458 020__ $$a978-3-940402-11-0
000856458 0247_ $$2Handle$$a2128/19859
000856458 037__ $$aFZJ-2018-05857
000856458 041__ $$aEnglish
000856458 1001_ $$0P:(DE-HGF)0$$aDietrich, Matthes$$b0
000856458 1112_ $$aSuppression, Detection, and Signaling Research and Applications Conference$$cWashington D.C.$$d2017-09-12 - 2017-09-14$$gSUPDET 2017$$wUSA
000856458 245__ $$aBuoyancy driven flow in an underground metro station for different climate conditions – experimental and numerical investigation
000856458 260__ $$c2017
000856458 300__ $$a121-128
000856458 3367_ $$2ORCID$$aCONFERENCE_PAPER
000856458 3367_ $$033$$2EndNote$$aConference Paper
000856458 3367_ $$2BibTeX$$aINPROCEEDINGS
000856458 3367_ $$2DRIVER$$aconferenceObject
000856458 3367_ $$2DataCite$$aOutput Types/Conference Paper
000856458 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib$$s1540386661_3258
000856458 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book$$mcontb
000856458 520__ $$aIn urban areas the demand for public transportation is constantly growing. Underground railway systems overcome the problem of limited space on the ground and are therefore one of the most powerful systems in urban public transportation. These facilities can be very complex and are used by a large amount of passengers. Therefore, it is important to maintain the safety for people and buildings. Especially in the case of fire or arson attack. This paper focusses on a fire scenario in a complex subway station for different weather conditions. The purpose is to identify the influences of different weather conditions on the smoke spread and the ability of self-rescue in case of a burning luggage. The evaluation of the fire simulations will focus on toxicity and visibility taking into account the FED concept.
000856458 536__ $$0G:(DE-HGF)POF3-511$$a511 - Computational Science and Mathematical Methods (POF3-511)$$cPOF3-511$$fPOF III$$x0
000856458 7001_ $$0P:(DE-HGF)0$$aKnaust, Christian$$b1
000856458 7001_ $$0P:(DE-Juel1)132044$$aArnold, Lukas$$b2$$eCorresponding author$$ufzj
000856458 7001_ $$0P:(DE-HGF)0$$aBrüne, Markus$$b3
000856458 7001_ $$0P:(DE-HGF)0$$aFestag, Sebastian$$b4
000856458 8564_ $$uhttps://juser.fz-juelich.de/record/856458/files/SUPDET17%20Dietrich%20et%20al-1.pdf$$yOpenAccess
000856458 8564_ $$uhttps://juser.fz-juelich.de/record/856458/files/SUPDET17%20Dietrich%20et%20al-1.pdf?subformat=pdfa$$xpdfa$$yOpenAccess
000856458 909CO $$ooai:juser.fz-juelich.de:856458$$pdnbdelivery$$pdriver$$pVDB$$popen_access$$popenaire
000856458 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132044$$aForschungszentrum Jülich$$b2$$kFZJ
000856458 9131_ $$0G:(DE-HGF)POF3-511$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$3G:(DE-HGF)POF3$$4G:(DE-HGF)POF$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data$$vComputational Science and Mathematical Methods$$x0
000856458 9141_ $$y2018
000856458 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000856458 920__ $$lyes
000856458 9201_ $$0I:(DE-Juel1)IAS-7-20180321$$kIAS-7$$lZivile Sicherheitsforschung$$x0
000856458 980__ $$acontrib
000856458 980__ $$aVDB
000856458 980__ $$aUNRESTRICTED
000856458 980__ $$acontb
000856458 980__ $$aI:(DE-Juel1)IAS-7-20180321
000856458 9801_ $$aFullTexts