000878396 001__ 878396
000878396 005__ 20220930130248.0
000878396 0247_ $$2doi$$a10.3390/fire3030033
000878396 0247_ $$2Handle$$a2128/25642
000878396 0247_ $$2altmetric$$aaltmetric:88122021
000878396 0247_ $$2WOS$$aWOS:000697569800008
000878396 037__ $$aFZJ-2020-02832
000878396 082__ $$a570
000878396 1001_ $$0P:(DE-Juel1)174283$$aHehnen, Tristan$$b0
000878396 245__ $$aNumerical Fire Spread Simulation Based on Material Pyrolysis—An Application to the CHRISTIFIRE Phase 1 Horizontal Cable Tray Tests
000878396 260__ $$aBasel$$bMDPI$$c2020
000878396 3367_ $$2DRIVER$$aarticle
000878396 3367_ $$2DataCite$$aOutput Types/Journal article
000878396 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article$$bjournal$$mjournal$$s1617695711_23317
000878396 3367_ $$2BibTeX$$aARTICLE
000878396 3367_ $$2ORCID$$aJOURNAL_ARTICLE
000878396 3367_ $$00$$2EndNote$$aJournal Article
000878396 520__ $$aA general procedure is described to generate material parameter sets to simulate fire propagation in horizontal cable tray installations. Cone Calorimeter test data are processed in an inverse modelling approach. Here, parameter sets are generated procedurally and serve as input for simulations conducted with the Fire Dynamics Simulator (FDS). The simulation responses are compared with the experimental data and ranked based on their fitness. The best fitness was found for a test condition of 50 kW/m2. Low flux conditions 25 kW/m2 and less exhibited difficulties to be accurately simulated. As a validation step, the best parameter sets are then utilised to simulate fire propagation within a horizontal cable tray installation and are compared with experimental data. It is important to note, the inverse modelling process is focused on the Cone Calorimeter and not aware of the actual validation step. Despite this handicap, the general features in the fire development can be reproduced, however not exact. The fire in the tray simulation extinguishes earlier and the total energy release is slightly higher when compared to the experiment. The responses of the material parameter sets are briefly compared with a selection of state of the art procedures.
000878396 536__ $$0G:(DE-HGF)POF3-511$$a511 - Computational Science and Mathematical Methods (POF3-511)$$cPOF3-511$$fPOF III$$x0
000878396 536__ $$0G:(DE-Juel1)PHD-NO-GRANT-20170405$$aPhD no Grant - Doktorand ohne besondere Förderung (PHD-NO-GRANT-20170405)$$cPHD-NO-GRANT-20170405$$x1
000878396 536__ $$0G:(DE-Juel1)jjsc27_20190501$$aPyrolysis Modeling (jjsc27_20190501)$$cjjsc27_20190501$$fPyrolysis Modeling$$x2
000878396 588__ $$aDataset connected to CrossRef
000878396 7001_ $$0P:(DE-Juel1)132044$$aArnold, Lukas$$b1$$eCorresponding author
000878396 7001_ $$0P:(DE-HGF)0$$aLa Mendola, Saverio$$b2
000878396 773__ $$0PERI:(DE-600)2924038-4$$a10.3390/fire3030033$$gVol. 3, no. 3, p. 33 -$$n3$$p33$$tFire$$v3$$x2571-6255$$y2020
000878396 8564_ $$uhttps://juser.fz-juelich.de/record/878396/files/Invoice_fire-861992.pdf
000878396 8564_ $$uhttps://juser.fz-juelich.de/record/878396/files/Invoice_fire-861992.pdf?subformat=pdfa$$xpdfa
000878396 8564_ $$uhttps://juser.fz-juelich.de/record/878396/files/fire-03-00033-v2.pdf$$yOpenAccess
000878396 8564_ $$uhttps://juser.fz-juelich.de/record/878396/files/fire-03-00033-v2.pdf?subformat=pdfa$$xpdfa$$yOpenAccess
000878396 8767_ $$8fire-861992$$92020-07-21$$d2020-08-13$$eAPC$$jZahlung erfolgt$$pfire-861992$$zFZJ-2020-02824, Belegnr. 1200156532
000878396 909CO $$ooai:juser.fz-juelich.de:878396$$popenCost$$pVDB$$pdriver$$pOpenAPC$$popen_access$$popenaire$$pdnbdelivery
000878396 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)174283$$aForschungszentrum Jülich$$b0$$kFZJ
000878396 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132044$$aForschungszentrum Jülich$$b1$$kFZJ
000878396 9131_ $$0G:(DE-HGF)POF3-511$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$3G:(DE-HGF)POF3$$4G:(DE-HGF)POF$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data$$vComputational Science and Mathematical Methods$$x0
000878396 9132_ $$0G:(DE-HGF)POF4-899$$1G:(DE-HGF)POF4-890$$2G:(DE-HGF)POF4-800$$3G:(DE-HGF)POF4$$4G:(DE-HGF)POF$$aDE-HGF$$bProgrammungebundene Forschung$$lohne Programm$$vohne Topic$$x0
000878396 9141_ $$y2020
000878396 915__ $$0LIC:(DE-HGF)CCBY4$$2HGFVOC$$aCreative Commons Attribution CC BY 4.0
000878396 915__ $$0StatID:(DE-HGF)0501$$2StatID$$aDBCoverage$$bDOAJ Seal$$d2020-01-02
000878396 915__ $$0StatID:(DE-HGF)0500$$2StatID$$aDBCoverage$$bDOAJ$$d2020-01-02
000878396 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000878396 915__ $$0StatID:(DE-HGF)0030$$2StatID$$aPeer Review$$bDOAJ : Blind peer review$$d2020-01-02
000878396 915__ $$0StatID:(DE-HGF)0561$$2StatID$$aArticle Processing Charges$$f2020-01-02
000878396 915__ $$0StatID:(DE-HGF)0300$$2StatID$$aDBCoverage$$bMedline$$d2020-01-02
000878396 915__ $$0StatID:(DE-HGF)0700$$2StatID$$aFees$$d2020-01-02
000878396 920__ $$lyes
000878396 9201_ $$0I:(DE-Juel1)IAS-7-20180321$$kIAS-7$$lZivile Sicherheitsforschung$$x0
000878396 9201_ $$0I:(DE-82)080012_20140620$$kJARA-HPC$$lJARA - HPC$$x1
000878396 980__ $$ajournal
000878396 980__ $$aVDB
000878396 980__ $$aI:(DE-Juel1)IAS-7-20180321
000878396 980__ $$aI:(DE-82)080012_20140620
000878396 980__ $$aAPC
000878396 980__ $$aUNRESTRICTED
000878396 9801_ $$aAPC
000878396 9801_ $$aFullTexts