000864829 001__ 864829
000864829 005__ 20210130002732.0
000864829 0247_ $$2doi$$a10.1016/j.ijdrr.2019.101295
000864829 0247_ $$2altmetric$$aaltmetric:65367425
000864829 0247_ $$2WOS$$aWOS:000504924200010
000864829 037__ $$aFZJ-2019-04476
000864829 082__ $$a550
000864829 1001_ $$0P:(DE-HGF)0$$aCao, Shuchao$$b0$$eCorresponding author
000864829 245__ $$aCharacteristics of pedestrian's evacuation in a room under invisible conditions
000864829 260__ $$aAmsterdam [u.a.]$$bElsevier$$c2019
000864829 3367_ $$2DRIVER$$aarticle
000864829 3367_ $$2DataCite$$aOutput Types/Journal article
000864829 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article$$bjournal$$mjournal$$s1568272943_2419
000864829 3367_ $$2BibTeX$$aARTICLE
000864829 3367_ $$2ORCID$$aJOURNAL_ARTICLE
000864829 3367_ $$00$$2EndNote$$aJournal Article
000864829 520__ $$aIn this paper, movement characteristics of pedestrian's evacuation under invisible conditions are investigated through a series of evacuation experiments. The typical evacuation behaviors of occupants including moving along walls as well as different conflict resolutions are observed. Moreover, individual evacuation time, movement distance, distance to walls and individual velocity during evacuations are analyzed based on the extracted trajectories. Spatial distribution of evacuees is quantified by using the variance-mean ratio and the nearest-neighbor analysis. It is found that evacuees are randomly distributed in the room at the beginning of evacuation. However, after the start of the experiment, individuals search cautiously their surrounding and start to walk along walls. Under this circumstance aggregated distributions are formed. This study is helpful to understand pedestrian's behavior and develop efficient guidance strategy for crowds under poor visibility. Moreover, the data obtained from the experiment can be used for model validation under invisible conditions.
000864829 536__ $$0G:(DE-HGF)POF3-511$$a511 - Computational Science and Mathematical Methods (POF3-511)$$cPOF3-511$$fPOF III$$x0
000864829 588__ $$aDataset connected to CrossRef
000864829 7001_ $$0P:(DE-HGF)0$$aLiu, Xiaodong$$b1
000864829 7001_ $$0P:(DE-Juel1)132077$$aChraibi, Mohcine$$b2
000864829 7001_ $$0P:(DE-HGF)0$$aZhang, Peng$$b3
000864829 7001_ $$0P:(DE-HGF)0$$aSong, Weiguo$$b4
000864829 773__ $$0PERI:(DE-600)2695877-6$$a10.1016/j.ijdrr.2019.101295$$gVol. 41, p. 101295 -$$p101295 -$$tInternational journal of disaster risk reduction$$v41$$x2212-4209$$y2019
000864829 8564_ $$uhttps://juser.fz-juelich.de/record/864829/files/Shucao2019.pdf$$yRestricted
000864829 8564_ $$uhttps://juser.fz-juelich.de/record/864829/files/Shucao2019.pdf?subformat=pdfa$$xpdfa$$yRestricted
000864829 909CO $$ooai:juser.fz-juelich.de:864829$$pVDB
000864829 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132077$$aForschungszentrum Jülich$$b2$$kFZJ
000864829 9131_ $$0G:(DE-HGF)POF3-511$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$3G:(DE-HGF)POF3$$4G:(DE-HGF)POF$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data$$vComputational Science and Mathematical Methods$$x0
000864829 9141_ $$y2019
000864829 915__ $$0StatID:(DE-HGF)0100$$2StatID$$aJCR$$bINT J DISAST RISK RE : 2017
000864829 915__ $$0StatID:(DE-HGF)0200$$2StatID$$aDBCoverage$$bSCOPUS
000864829 915__ $$0StatID:(DE-HGF)0300$$2StatID$$aDBCoverage$$bMedline
000864829 915__ $$0StatID:(DE-HGF)0199$$2StatID$$aDBCoverage$$bClarivate Analytics Master Journal List
000864829 915__ $$0StatID:(DE-HGF)0111$$2StatID$$aWoS$$bScience Citation Index Expanded
000864829 915__ $$0StatID:(DE-HGF)0150$$2StatID$$aDBCoverage$$bWeb of Science Core Collection
000864829 915__ $$0StatID:(DE-HGF)1150$$2StatID$$aDBCoverage$$bCurrent Contents - Physical, Chemical and Earth Sciences
000864829 915__ $$0StatID:(DE-HGF)9900$$2StatID$$aIF < 5
000864829 920__ $$lyes
000864829 9201_ $$0I:(DE-Juel1)IAS-7-20180321$$kIAS-7$$lZivile Sicherheitsforschung$$x0
000864829 980__ $$ajournal
000864829 980__ $$aVDB
000864829 980__ $$aI:(DE-Juel1)IAS-7-20180321
000864829 980__ $$aUNRESTRICTED