Simulation of egress is vital for minimizing losses during fire disasters,
however accurate simulations are scarce and real-life data is hard to come by. In
this paper, a Proposed Wireless Fire Evacuation Model (PWFEM) is proposed to simulate
fire evacuation process in a short timeto minimize
evacuee’s exposure to the harmful radiation and fire hazards. The PWFEMsimulation
realistic by supposing fire scenario atcabined
contains electrical cables inside a standard Main Control Room (MCR) in a Nuclear
Power Plant (NPP) building.In addition, anew Hybrid Safest Shortest Exit (HSSE) is developedwhich consists
of three stages: safest route based on rules-based
technique, evacuees location based on the DV-hop technique [1] and shortest route that
References
[1]
Yu, W. and Li, H. (2012) An Improved DV-Hop Localization Method in Wireless Sensor Networks. 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, 25-27 May 2012, 199-202. https://doi.org/10.1109/CSAE.2012.6272938
[2]
US Nuclear Regulatory Commission (1990) NUREG 1150-Severe accident risks: an assessment for five US nuclear power plants. Division of Systems Research, Office of Nuclear Regulatory Research, US Nuclear Regulatory Commission, Washington DC.
[3]
Zheng, H. and Wei, S. (2018) Technical Insights of SSR-2/1 Safety of Nuclear Power Plants: Design (Rev. 1). 2018 26th International Conference on Nuclear Engineering, Paper No: ICONE26-81983, V005T07A013. https://doi.org/10.1115/ICONE26-81983
[4]
Aghina, M.A.C., Mól, A.C.A., Jorge, C.A.F., Pereira, C.M., Varela, T.F., Cunha, G.G., et al. (2008) Virtual Control Desks for Nuclear Power Plant Simulation: Improving Operator Training. IEEE Computer Graphics and Applications, 28, 6-9. https://doi.org/10.1109/MCG.2008.86
[5]
Stern, W., Berthelot, L. and Bachner, K. (2017) International Scavenging for First Responder Guidance and Tools: IAEA Products. Brookhaven National Laboratory (BNL), Upton, NY. https://doi.org/10.2172/1376089
[6]
Li, J.-J. and Zhu, H.-Y. (2018) A Risk-Based Model of Evacuation Route Optimization under Fire. Procedia Engineering, 211, 365-371. https://doi.org/10.1016/j.proeng.2017.12.024
[7]
Choi, M. and Chi, S. (2019) Optimal Route Selection Model for Fire Evacuations Based on Hazard Prediction Data. Simulation Modelling Practice and Theory, 94, 321-333. https://doi.org/10.1016/j.simpat.2019.04.002
[8]
Goldberg, A.V. and Harrelson, C. (2005) Computing the Shortest Path: A Search Meets Graph Theory. Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics 3600 University City Science Center Philadelphia, PA, United States, January 2005, 156-165. https://doi/10.5555/1070432.1070455
[9]
Xing, Z. and Tang, Y. (2012) Simulation of Fire and Evacuation in High-Rise Building. Procedia Engineering, 45, 705-709. https://doi.org/10.1016/j.proeng.2012.08.227
[10]
Chen, Y.-Z., Shen, S.-F., Chen, T. and Yang, R. (2014) Path Optimization Study for Vehicles Evacuation Based on Dijkstra Algorithm. Procedia Engineering, 71, 159-165. https://doi.org/10.1016/j.proeng.2014.04.023
[11]
Liu, D., Gu, T. and Xue, J.-P. (2010) Rule Engine Based on Improvement Rete Algorithm. The 2010 International Conference on Apperceiving Computing and Intelligence Analysis Proceeding, Chengdu, 17-19 December 2010, 346-349. https://doi.org/10.1109/ICACIA.2010.5709916
[12]
Zhang, Q., Zhang, W., Li, Y., Wang, J., Zhang, L. and Hou, T. (2012) A Rule-Based Algorithm for Automatic Bond Type Perception. Journal of Cheminformatics, 4, Article No. 26. https://doi.org/10.1186/1758-2946-4-26
[13]
Chen, K., Wang, Z.-H., Lin, M. and Yu, M. (2010) An Improved DV-Hop Localization Algorithm for Wireless Sensor Networks. IET International Conference on Wireless Sensor Network 2010 (IET-WSN 2010). https://doi.org/10.1049/cp.2010.1063
[14]
Golden, B. (1976) Technical Note—Shortest-Path algorithms: A comparison. Operations Research, 24, 1164-1168. https://doi.org/10.1287/opre.24.6.1164
[15]
Walton, W.D., Carpenter, D.J. and Wood, C.B. (2016) Zone Computer Fire Models for Enclosures. In: Hurley, M.J., et al., Eds., SFPE Handbook of Fire Protection Engineering. Springer, New York, 1024-1033. https://doi.org/10.1007/978-1-4939-2565-0_31
[16]
Rein, G., Bar-Ilan, A., Fernandez-Pello, A.C. and Alvares, N. (2006) A Comparison of Three Models for the Simulation of Accidental Fires. Journal of Fire Protection Engineering, 16, 183-209. https://doi.org/10.1177/1042391506056926
[17]
Fonollosa, J., Solórzano, A. and Marco, S. (2018) Chemical Sensor Systems and Associated Algorithms for Fire Detection: A Review. Sensors, 18, 553. https://doi.org/10.3390/s18020553
[18]
UNRC Division of Human Factors Safety (1981) Guidelines for Control Room Design Reviews, Vol. 88. Division of Human Factors Safety, Office of Nuclear Reactor Regulation.
[19]
UNRC (2007) Verification and Validation of Selected Fire Models for Nuclear Power Plant Applications. NUREG-1824 (EPRI 1011999), Washington DC.
[20]
Babrauskas, V. (2003) Ignition Handbook Vol. 318. Fire Science Publishers, Issaquah.
[21]
Purser, D.A., Rowley, J.A., Fardell, P.J. and Bensilum, M. (1999) Fully Enclosed Design Fires for Hazard Assessment in Relation to Yields of Carbon Monoxide and Hydrogen Cyanide. Proceedings of Interflam’99, Interscience Communications, London, 1163-1169.
[22]
UNRC (2012) Nuclear Power Plant Fire Modeling Analysis Guidelines (NPP FIRE MAG). NUREG-1934, Washington DC.
[23]
Afshar, C., Najafi, B., Joglar, F., Li, Y., Henneke, D., Warner, M., et al. (2010) Fire Probabilistic Risk Assessment Methods Enhancements (NUREG/CR-6850 and EPRI 1011989, Supplement 1). EPRI and NRC.
[24]
Ojugo, A., Eboka, A., Okonta, O., Yoro, R. and Aghware, F. (2012) Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS). Journal of Emerging Trends in Computing and Information Sciences, 3, 1182-1194.
[25]
Ray, S., Starobinski, D., Trachtenberg, A. and Ungrangsi, R. (2004) Robust Location Detection with Sensor Networks. IEEE Journal on Selected Areas in Communications, 22, 1016-1025. https://doi.org/10.1109/JSAC.2004.830895
[26]
Xu, T. and Cai, Y. (2008) Exploring Historical Location Data for Anonymity Preservation in Location-Based Services. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, 13-18 April 2008, 547-555. https://doi.org/10.1109/INFOCOM.2007.103
[27]
Li, X., Mao, Y. and Liang, Y. (2008) A Survey on Topology Control in Wireless Sensor Networks. 2008 10th International Conference on Control, Automation, Robotics and Vision, Hanoi, Vietnam, 17-20 December 2008, 251-255.
[28]
Kuo, S.-P., Wu, B.-J., Peng, W.-C. and Tseng, Y.-C. (2007) Cluster-Enhanced Techniques for Pattern-Matching Localization Systems. 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, 8-11 October 2007, 1-9. https://doi.org/10.1109/MOBHOC.2007.4428664
[29]
Stojanović, D. and Stojanović, N. (2014) Indoor Localization and Tracking: Methods, Technologies and Research Challenges. Facta Universitatis, Series: Automatic Control and Robotics, 13, 57-72.
[30]
Barnes, M., Leather, H. and Arvind, D. (2007) Emergency Evacuation Using Wireless Sensor Networks. 32nd IEEE Conference on Local Computer Networks (LCN 2007), Dublin, 15-18 October 2007, 851-857. https://doi.org/10.1109/LCN.2007.48
[31]
Kumar, S. and Lobiyal, D. (2013) An Advanced DV-Hop Localization Algorithm for Wireless Sensor Networks. Wireless Personal Communications, 71, 1365-1385. https://doi.org/10.1007/s11277-012-0880-3
[32]
Kaur, A., Gupta, G.P. and Kumar, P. (2017) A Survey of Recent Developments in DV-Hop Localization Techniques for Wireless Sensor Network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9, 61-71.
[33]
Huang, Y. (2018) Research on the Improvement of Dijkstra Algorithm in the Shortest Path Calculation. In: Proceedings of the 2017 4th International Conference on Machinery, Materials and Computer (MACMC 2017), Atlantis Press, 745-749. https://doi.org/10.2991/macmc-17.2018.141
[34]
Dijkstra, E.W. (1959) A Note on Two Problems in Connexion with Graphs. Numerische Mathematik, 1, 269-271. https://doi.org/10.1007/BF01386390
[35]
Hurley, M.J., Gottuk, D.T., Hall Jr., J.R., Harada, K., Kuligowski, E.D., Puchovsky, M., et al. (2015) SFPE Handbook of Fire Protection Engineering. Springer. https://doi.org/10.1007/978-1-4939-2565-0
[36]
Peacock, R.D., Reneke, P.A. and Forney, G.P. (2017) CFAST-Consolidated Model of Fire Growth and Smoke Transport (Version 7) Volume 2: User’s Guide. NIST Technical Note 1889v2.
[37]
Bonechi, M. (2006) Advanced CANDU Reactor (ACR) Safety Design Approach. Advanced Nuclear Plant Design Options to Cope with External Events, p. 163.