000877645 001__ 877645 000877645 005__ 20210130005156.0 000877645 0247_ $$2doi$$a10.17815/CD.2020.24 000877645 0247_ $$2Handle$$a2128/25141 000877645 037__ $$aFZJ-2020-02358 000877645 041__ $$aEnglish 000877645 082__ $$a380 000877645 1001_ $$0P:(DE-HGF)0$$aKlamroth, Kathrin$$b0 000877645 245__ $$aNetwork Simulation for Pedestrian Flows with HyDEFS 000877645 260__ $$aJülich$$bForschungszentrum Jülich$$c2020 000877645 3367_ $$2DRIVER$$aarticle 000877645 3367_ $$2DataCite$$aOutput Types/Journal article 000877645 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article$$bjournal$$mjournal$$s1593160186_7882 000877645 3367_ $$2BibTeX$$aARTICLE 000877645 3367_ $$2ORCID$$aJOURNAL_ARTICLE 000877645 3367_ $$00$$2EndNote$$aJournal Article 000877645 520__ $$aThe reliable simulation of pedestrian movement is an essential tool for the security aware design and analysis of buildings and infrastructure. We developed HyDEFS, an event-driven dynamic flow simulation software which is designed to simulate pedestrian movement depending on varying routing decisions of the individual users and varying constraints. HyDEFS uses given density depending velocities to model congestions and evaluates flow distributions with respect to average and maximum travel time. This is of particular importance when considering evacuation scenarios. We apply HyDEFS on two small networks and cross validate its results by time-discrete and time-continuous calculations. 000877645 536__ $$0G:(DE-HGF)POF3-511$$a511 - Computational Science and Mathematical Methods (POF3-511)$$cPOF3-511$$fPOF III$$x0 000877645 588__ $$aDataset connected to CrossRef 000877645 7001_ $$0P:(DE-HGF)0$$aLang, Bruno$$b1 000877645 7001_ $$0P:(DE-Juel1)132266$$aSeyfried, Armin$$b2$$eCorresponding author 000877645 7001_ $$0P:(DE-HGF)0$$aStiglmayr, Michael$$b3 000877645 773__ $$0PERI:(DE-600)2854776-7$$a10.17815/CD.2020.24$$gVol. 5, p. A24$$pA24$$tCollective dynamics$$v5$$x2366-8539$$y2020 000877645 8564_ $$uhttps://juser.fz-juelich.de/record/877645/files/Klamroth-et-al-CD-45-383-1-PB.pdf$$yOpenAccess 000877645 8564_ $$uhttps://juser.fz-juelich.de/record/877645/files/Klamroth-et-al-CD-45-383-1-PB.pdf?subformat=pdfa$$xpdfa$$yOpenAccess 000877645 909CO $$ooai:juser.fz-juelich.de:877645$$pdnbdelivery$$pdriver$$pVDB$$popen_access$$popenaire 000877645 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132266$$aForschungszentrum Jülich$$b2$$kFZJ 000877645 9131_ $$0G:(DE-HGF)POF3-511$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$3G:(DE-HGF)POF3$$4G:(DE-HGF)POF$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data$$vComputational Science and Mathematical Methods$$x0 000877645 9141_ $$y2020 000877645 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess 000877645 915__ $$0StatID:(DE-HGF)0501$$2StatID$$aDBCoverage$$bDOAJ Seal$$d2020-01-06 000877645 915__ $$0StatID:(DE-HGF)0500$$2StatID$$aDBCoverage$$bDOAJ$$d2020-01-06 000877645 915__ $$0LIC:(DE-HGF)CCBY4$$2HGFVOC$$aCreative Commons Attribution CC BY 4.0 000877645 915__ $$0StatID:(DE-HGF)0030$$2StatID$$aPeer Review$$bDOAJ : Blind peer review$$d2020-01-06 000877645 920__ $$lyes 000877645 9201_ $$0I:(DE-Juel1)IAS-7-20180321$$kIAS-7$$lZivile Sicherheitsforschung$$x0 000877645 980__ $$ajournal 000877645 980__ $$aVDB 000877645 980__ $$aUNRESTRICTED 000877645 980__ $$aI:(DE-Juel1)IAS-7-20180321 000877645 9801_ $$aFullTexts