000877645 001__ 877645
000877645 005__ 20210130005156.0
000877645 0247_ $$2doi$$a10.17815/CD.2020.24
000877645 0247_ $$2Handle$$a2128/25141
000877645 037__ $$aFZJ-2020-02358
000877645 041__ $$aEnglish
000877645 082__ $$a380
000877645 1001_ $$0P:(DE-HGF)0$$aKlamroth, Kathrin$$b0
000877645 245__ $$aNetwork Simulation for Pedestrian Flows with HyDEFS
000877645 260__ $$aJülich$$bForschungszentrum Jülich$$c2020
000877645 3367_ $$2DRIVER$$aarticle
000877645 3367_ $$2DataCite$$aOutput Types/Journal article
000877645 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article$$bjournal$$mjournal$$s1593160186_7882
000877645 3367_ $$2BibTeX$$aARTICLE
000877645 3367_ $$2ORCID$$aJOURNAL_ARTICLE
000877645 3367_ $$00$$2EndNote$$aJournal Article
000877645 520__ $$aThe reliable simulation of pedestrian movement is an essential tool for the security aware design and analysis of buildings and infrastructure. We developed HyDEFS, an event-driven dynamic flow simulation software which is designed to simulate pedestrian movement depending on varying routing decisions of the individual users and varying constraints. HyDEFS uses given density depending velocities to model congestions and evaluates flow distributions with respect to average and maximum travel time. This is of particular importance when considering evacuation scenarios. We apply HyDEFS on two small networks and cross validate its results by time-discrete and time-continuous calculations.
000877645 536__ $$0G:(DE-HGF)POF3-511$$a511 - Computational Science and Mathematical Methods (POF3-511)$$cPOF3-511$$fPOF III$$x0
000877645 588__ $$aDataset connected to CrossRef
000877645 7001_ $$0P:(DE-HGF)0$$aLang, Bruno$$b1
000877645 7001_ $$0P:(DE-Juel1)132266$$aSeyfried, Armin$$b2$$eCorresponding author
000877645 7001_ $$0P:(DE-HGF)0$$aStiglmayr, Michael$$b3
000877645 773__ $$0PERI:(DE-600)2854776-7$$a10.17815/CD.2020.24$$gVol. 5, p. A24$$pA24$$tCollective dynamics$$v5$$x2366-8539$$y2020
000877645 8564_ $$uhttps://juser.fz-juelich.de/record/877645/files/Klamroth-et-al-CD-45-383-1-PB.pdf$$yOpenAccess
000877645 8564_ $$uhttps://juser.fz-juelich.de/record/877645/files/Klamroth-et-al-CD-45-383-1-PB.pdf?subformat=pdfa$$xpdfa$$yOpenAccess
000877645 909CO $$ooai:juser.fz-juelich.de:877645$$pdnbdelivery$$pdriver$$pVDB$$popen_access$$popenaire
000877645 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132266$$aForschungszentrum Jülich$$b2$$kFZJ
000877645 9131_ $$0G:(DE-HGF)POF3-511$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$3G:(DE-HGF)POF3$$4G:(DE-HGF)POF$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data$$vComputational Science and Mathematical Methods$$x0
000877645 9141_ $$y2020
000877645 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000877645 915__ $$0StatID:(DE-HGF)0501$$2StatID$$aDBCoverage$$bDOAJ Seal$$d2020-01-06
000877645 915__ $$0StatID:(DE-HGF)0500$$2StatID$$aDBCoverage$$bDOAJ$$d2020-01-06
000877645 915__ $$0LIC:(DE-HGF)CCBY4$$2HGFVOC$$aCreative Commons Attribution CC BY 4.0
000877645 915__ $$0StatID:(DE-HGF)0030$$2StatID$$aPeer Review$$bDOAJ : Blind peer review$$d2020-01-06
000877645 920__ $$lyes
000877645 9201_ $$0I:(DE-Juel1)IAS-7-20180321$$kIAS-7$$lZivile Sicherheitsforschung$$x0
000877645 980__ $$ajournal
000877645 980__ $$aVDB
000877645 980__ $$aUNRESTRICTED
000877645 980__ $$aI:(DE-Juel1)IAS-7-20180321
000877645 9801_ $$aFullTexts