全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Simulation Emergency Fire Evacuation Model for Nuclear Power Plant

DOI: 10.4236/jpee.2021.94003, PP. 30-52

Keywords: Fire Safety, Fire Evacuation Model, NPP Evacuation, Localization Technique, CFAST Model, DV-Hop Technique, Dijkstra Algorithm

Full-Text   Cite this paper   Add to My Lib

Abstract:

Simulation of egress is vital for minimizing losses during fire disasters, however accurate simulations are scarce and real-life data is hard to come by. In this paper, a Proposed Wireless Fire Evacuation Model (PWFEM) is proposed to simulate fire evacuation process in a short time to minimize evacuee’s exposure to the harmful radiation and fire hazards. The PWFEM simulation realistic by supposing fire scenario at cabined contains electrical cables inside a standard Main Control Room (MCR) in a Nuclear Power Plant (NPP) building. In addition, a new Hybrid Safest Shortest Exit (HSSE) is developed which consists of three stages: safest route based on rules-based technique, evacuees location based on the DV-hop technique [1] and shortest route that

References

[1]  Yu, W. and Li, H. (2012) An Improved DV-Hop Localization Method in Wireless Sensor Networks. 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, 25-27 May 2012, 199-202.
https://doi.org/10.1109/CSAE.2012.6272938
[2]  US Nuclear Regulatory Commission (1990) NUREG 1150-Severe accident risks: an assessment for five US nuclear power plants. Division of Systems Research, Office of Nuclear Regulatory Research, US Nuclear Regulatory Commission, Washington DC.
[3]  Zheng, H. and Wei, S. (2018) Technical Insights of SSR-2/1 Safety of Nuclear Power Plants: Design (Rev. 1). 2018 26th International Conference on Nuclear Engineering, Paper No: ICONE26-81983, V005T07A013.
https://doi.org/10.1115/ICONE26-81983
[4]  Aghina, M.A.C., Mól, A.C.A., Jorge, C.A.F., Pereira, C.M., Varela, T.F., Cunha, G.G., et al. (2008) Virtual Control Desks for Nuclear Power Plant Simulation: Improving Operator Training. IEEE Computer Graphics and Applications, 28, 6-9.
https://doi.org/10.1109/MCG.2008.86
[5]  Stern, W., Berthelot, L. and Bachner, K. (2017) International Scavenging for First Responder Guidance and Tools: IAEA Products. Brookhaven National Laboratory (BNL), Upton, NY.
https://doi.org/10.2172/1376089
[6]  Li, J.-J. and Zhu, H.-Y. (2018) A Risk-Based Model of Evacuation Route Optimization under Fire. Procedia Engineering, 211, 365-371.
https://doi.org/10.1016/j.proeng.2017.12.024
[7]  Choi, M. and Chi, S. (2019) Optimal Route Selection Model for Fire Evacuations Based on Hazard Prediction Data. Simulation Modelling Practice and Theory, 94, 321-333.
https://doi.org/10.1016/j.simpat.2019.04.002
[8]  Goldberg, A.V. and Harrelson, C. (2005) Computing the Shortest Path: A Search Meets Graph Theory. Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics 3600 University City Science Center Philadelphia, PA, United States, January 2005, 156-165.
https://doi/10.5555/1070432.1070455
[9]  Xing, Z. and Tang, Y. (2012) Simulation of Fire and Evacuation in High-Rise Building. Procedia Engineering, 45, 705-709.
https://doi.org/10.1016/j.proeng.2012.08.227
[10]  Chen, Y.-Z., Shen, S.-F., Chen, T. and Yang, R. (2014) Path Optimization Study for Vehicles Evacuation Based on Dijkstra Algorithm. Procedia Engineering, 71, 159-165.
https://doi.org/10.1016/j.proeng.2014.04.023
[11]  Liu, D., Gu, T. and Xue, J.-P. (2010) Rule Engine Based on Improvement Rete Algorithm. The 2010 International Conference on Apperceiving Computing and Intelligence Analysis Proceeding, Chengdu, 17-19 December 2010, 346-349.
https://doi.org/10.1109/ICACIA.2010.5709916
[12]  Zhang, Q., Zhang, W., Li, Y., Wang, J., Zhang, L. and Hou, T. (2012) A Rule-Based Algorithm for Automatic Bond Type Perception. Journal of Cheminformatics, 4, Article No. 26.
https://doi.org/10.1186/1758-2946-4-26
[13]  Chen, K., Wang, Z.-H., Lin, M. and Yu, M. (2010) An Improved DV-Hop Localization Algorithm for Wireless Sensor Networks. IET International Conference on Wireless Sensor Network 2010 (IET-WSN 2010).
https://doi.org/10.1049/cp.2010.1063
[14]  Golden, B. (1976) Technical Note—Shortest-Path algorithms: A comparison. Operations Research, 24, 1164-1168.
https://doi.org/10.1287/opre.24.6.1164
[15]  Walton, W.D., Carpenter, D.J. and Wood, C.B. (2016) Zone Computer Fire Models for Enclosures. In: Hurley, M.J., et al., Eds., SFPE Handbook of Fire Protection Engineering. Springer, New York, 1024-1033.
https://doi.org/10.1007/978-1-4939-2565-0_31
[16]  Rein, G., Bar-Ilan, A., Fernandez-Pello, A.C. and Alvares, N. (2006) A Comparison of Three Models for the Simulation of Accidental Fires. Journal of Fire Protection Engineering, 16, 183-209.
https://doi.org/10.1177/1042391506056926
[17]  Fonollosa, J., Solórzano, A. and Marco, S. (2018) Chemical Sensor Systems and Associated Algorithms for Fire Detection: A Review. Sensors, 18, 553.
https://doi.org/10.3390/s18020553
[18]  UNRC Division of Human Factors Safety (1981) Guidelines for Control Room Design Reviews, Vol. 88. Division of Human Factors Safety, Office of Nuclear Reactor Regulation.
[19]  UNRC (2007) Verification and Validation of Selected Fire Models for Nuclear Power Plant Applications. NUREG-1824 (EPRI 1011999), Washington DC.
[20]  Babrauskas, V. (2003) Ignition Handbook Vol. 318. Fire Science Publishers, Issaquah.
[21]  Purser, D.A., Rowley, J.A., Fardell, P.J. and Bensilum, M. (1999) Fully Enclosed Design Fires for Hazard Assessment in Relation to Yields of Carbon Monoxide and Hydrogen Cyanide. Proceedings of Interflam’99, Interscience Communications, London, 1163-1169.
[22]  UNRC (2012) Nuclear Power Plant Fire Modeling Analysis Guidelines (NPP FIRE MAG). NUREG-1934, Washington DC.
[23]  Afshar, C., Najafi, B., Joglar, F., Li, Y., Henneke, D., Warner, M., et al. (2010) Fire Probabilistic Risk Assessment Methods Enhancements (NUREG/CR-6850 and EPRI 1011989, Supplement 1). EPRI and NRC.
[24]  Ojugo, A., Eboka, A., Okonta, O., Yoro, R. and Aghware, F. (2012) Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS). Journal of Emerging Trends in Computing and Information Sciences, 3, 1182-1194.
[25]  Ray, S., Starobinski, D., Trachtenberg, A. and Ungrangsi, R. (2004) Robust Location Detection with Sensor Networks. IEEE Journal on Selected Areas in Communications, 22, 1016-1025.
https://doi.org/10.1109/JSAC.2004.830895
[26]  Xu, T. and Cai, Y. (2008) Exploring Historical Location Data for Anonymity Preservation in Location-Based Services. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, 13-18 April 2008, 547-555.
https://doi.org/10.1109/INFOCOM.2007.103
[27]  Li, X., Mao, Y. and Liang, Y. (2008) A Survey on Topology Control in Wireless Sensor Networks. 2008 10th International Conference on Control, Automation, Robotics and Vision, Hanoi, Vietnam, 17-20 December 2008, 251-255.
[28]  Kuo, S.-P., Wu, B.-J., Peng, W.-C. and Tseng, Y.-C. (2007) Cluster-Enhanced Techniques for Pattern-Matching Localization Systems. 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, 8-11 October 2007, 1-9.
https://doi.org/10.1109/MOBHOC.2007.4428664
[29]  Stojanović, D. and Stojanović, N. (2014) Indoor Localization and Tracking: Methods, Technologies and Research Challenges. Facta Universitatis, Series: Automatic Control and Robotics, 13, 57-72.
[30]  Barnes, M., Leather, H. and Arvind, D. (2007) Emergency Evacuation Using Wireless Sensor Networks. 32nd IEEE Conference on Local Computer Networks (LCN 2007), Dublin, 15-18 October 2007, 851-857.
https://doi.org/10.1109/LCN.2007.48
[31]  Kumar, S. and Lobiyal, D. (2013) An Advanced DV-Hop Localization Algorithm for Wireless Sensor Networks. Wireless Personal Communications, 71, 1365-1385.
https://doi.org/10.1007/s11277-012-0880-3
[32]  Kaur, A., Gupta, G.P. and Kumar, P. (2017) A Survey of Recent Developments in DV-Hop Localization Techniques for Wireless Sensor Network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9, 61-71.
[33]  Huang, Y. (2018) Research on the Improvement of Dijkstra Algorithm in the Shortest Path Calculation. In: Proceedings of the 2017 4th International Conference on Machinery, Materials and Computer (MACMC 2017), Atlantis Press, 745-749.
https://doi.org/10.2991/macmc-17.2018.141
[34]  Dijkstra, E.W. (1959) A Note on Two Problems in Connexion with Graphs. Numerische Mathematik, 1, 269-271.
https://doi.org/10.1007/BF01386390
[35]  Hurley, M.J., Gottuk, D.T., Hall Jr., J.R., Harada, K., Kuligowski, E.D., Puchovsky, M., et al. (2015) SFPE Handbook of Fire Protection Engineering. Springer.
https://doi.org/10.1007/978-1-4939-2565-0
[36]  Peacock, R.D., Reneke, P.A. and Forney, G.P. (2017) CFAST-Consolidated Model of Fire Growth and Smoke Transport (Version 7) Volume 2: User’s Guide. NIST Technical Note 1889v2.
[37]  Bonechi, M. (2006) Advanced CANDU Reactor (ACR) Safety Design Approach. Advanced Nuclear Plant Design Options to Cope with External Events, p. 163.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133