The primary goal of this research study is to enhance energy resilience with a focus on cost efficiency. To achieve this objective, two key objectives have been identified: (1) reducing unserved loads, and (2) implementing cost-effective resource allocation strategies. A high-fidelity detailed model of a solar plus storage microgrid is developed to simulate a variety of what-if scenarios. This model is based on the conceptual design of a campus microgrid facility, which is slated for commissioning at UL Lafayette in close collaboration with a local power utility. The study examines the microgrid’s performance under different configurations, including both stationary battery and mobile battery storage options. To ensure the realism of the scenarios, real solar data from specific days following the occurrence of three major hurricanes in Louisiana is utilized. The analysis includes an assessment of unserved loads under various scenarios, as well as an investigation into the resilience impact of investment decisions and the planning and operation of mobile storage systems. The results indicate the proposed planning and operation will improve resilience while staying within the profitable range. The resilience is quantified and compared with other scenarios providing an insightful planning framework for decision-makers.
{"title":"Cost-aware strategies for enhancing energy resilience in microgrids via stationary and mobile resources","authors":"S.M. Safayet Ullah , Kouhyar Sheida , Farzad Ferdowsi , Terrence Chambers","doi":"10.1016/j.jnlssr.2024.10.002","DOIUrl":"10.1016/j.jnlssr.2024.10.002","url":null,"abstract":"<div><div>The primary goal of this research study is to enhance energy resilience with a focus on cost efficiency. To achieve this objective, two key objectives have been identified: (1) reducing unserved loads, and (2) implementing cost-effective resource allocation strategies. A high-fidelity detailed model of a solar plus storage microgrid is developed to simulate a variety of what-if scenarios. This model is based on the conceptual design of a campus microgrid facility, which is slated for commissioning at UL Lafayette in close collaboration with a local power utility. The study examines the microgrid’s performance under different configurations, including both stationary battery and mobile battery storage options. To ensure the realism of the scenarios, real solar data from specific days following the occurrence of three major hurricanes in Louisiana is utilized. The analysis includes an assessment of unserved loads under various scenarios, as well as an investigation into the resilience impact of investment decisions and the planning and operation of mobile storage systems. The results indicate the proposed planning and operation will improve resilience while staying within the profitable range. The resilience is quantified and compared with other scenarios providing an insightful planning framework for decision-makers.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 163-174"},"PeriodicalIF":3.7,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143792727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-18DOI: 10.1016/j.jnlssr.2024.08.002
Muammer Yaman , Cüneyt Kurtay
Fires that occur in assembly buildings cause great loss of life and property. Children's cultural centers included in assembly buildings should also be evaluated within this context. Children create an occupant profile in cultural centers, and the internal environment has an excessive fire load, which poses a great risk of fires. In fire evacuation scenarios for children's cultural centers, it is necessary to create appropriate evacuation conditions. In this work, fire safety was analyzed over total evacuation time within occupant-based fire evacuation simulations of a children's cultural center located in Istanbul. The effect of the children's theatre hall located on the top floor on a building's total evacuation time has been studied. The effectiveness of alternative fire escape routes on evacuation time through different evacuation scenarios has been analyzed, and safe evacuation strategies for children's cultural centers have been revealed. As a result of this study, recommendations were presented within performance-based fire evacuation strategies in the design of children's cultural centers. As the future of the countries, fire safety design criteria have been created in children's cultural centers for children to be able to be safe in educational, cultural, and artistic environments.
{"title":"Analysis of fire evacuation scenarios in children's cultural centers","authors":"Muammer Yaman , Cüneyt Kurtay","doi":"10.1016/j.jnlssr.2024.08.002","DOIUrl":"10.1016/j.jnlssr.2024.08.002","url":null,"abstract":"<div><div>Fires that occur in assembly buildings cause great loss of life and property. Children's cultural centers included in assembly buildings should also be evaluated within this context. Children create an occupant profile in cultural centers, and the internal environment has an excessive fire load, which poses a great risk of fires. In fire evacuation scenarios for children's cultural centers, it is necessary to create appropriate evacuation conditions. In this work, fire safety was analyzed over total evacuation time within occupant-based fire evacuation simulations of a children's cultural center located in Istanbul. The effect of the children's theatre hall located on the top floor on a building's total evacuation time has been studied. The effectiveness of alternative fire escape routes on evacuation time through different evacuation scenarios has been analyzed, and safe evacuation strategies for children's cultural centers have been revealed. As a result of this study, recommendations were presented within performance-based fire evacuation strategies in the design of children's cultural centers. As the future of the countries, fire safety design criteria have been created in children's cultural centers for children to be able to be safe in educational, cultural, and artistic environments.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 114-123"},"PeriodicalIF":3.7,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-16DOI: 10.1016/j.jnlssr.2024.09.003
Mohammad Amin Eshghi Nezami, Hamed Kashani
To decide about investments in appropriate seismic vulnerability reduction and resilience enhancement measures, policymakers need to acquire adequate insight into the value of a statistical life (VSL). The VSL measures the monetary value the public assigns to reducing mortality due to a specific risk (e.g., dying from an earthquake) over a given period. In the absence of appropriate models to estimate the context-specific VSL for a given community, past studies have resorted to approaches such as using the VSL estimated for other purposes (e.g., transportation and environmental safety) or other countries (e.g., the US). This can lead to under- or over-estimation of VSL, misappropriation of the funds for seismic vulnerability reduction programs, and adverse economic, political, and social consequences. This study proposes a methodology that follows the stated preference binary choice approach to estimate the willingness to pay (WTP) to reduce the risk of earthquake-induced mortalities. The proposed method, which is applied to quantify VSL in Iran, involves using a questionnaire to collect the needed information about people's choices when investing in various risk reduction measures. It uses a test containing positivity and proportionality components to check the responses’ consistency. Regression modeling is used to estimate the respondents’ WTP and VSL.
{"title":"The value of a statistical life in assessing seismic resilience enhancement policies: A stated preference binary choice experiment","authors":"Mohammad Amin Eshghi Nezami, Hamed Kashani","doi":"10.1016/j.jnlssr.2024.09.003","DOIUrl":"10.1016/j.jnlssr.2024.09.003","url":null,"abstract":"<div><div>To decide about investments in appropriate seismic vulnerability reduction and resilience enhancement measures, policymakers need to acquire adequate insight into the value of a statistical life (VSL). The VSL measures the monetary value the public assigns to reducing mortality due to a specific risk (e.g., dying from an earthquake) over a given period. In the absence of appropriate models to estimate the context-specific VSL for a given community, past studies have resorted to approaches such as using the VSL estimated for other purposes (e.g., transportation and environmental safety) or other countries (e.g., the US). This can lead to under- or over-estimation of VSL, misappropriation of the funds for seismic vulnerability reduction programs, and adverse economic, political, and social consequences. This study proposes a methodology that follows the stated preference binary choice approach to estimate the willingness to pay (WTP) to reduce the risk of earthquake-induced mortalities. The proposed method, which is applied to quantify VSL in Iran, involves using a questionnaire to collect the needed information about people's choices when investing in various risk reduction measures. It uses a test containing positivity and proportionality components to check the responses’ consistency. Regression modeling is used to estimate the respondents’ WTP and VSL.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 150-162"},"PeriodicalIF":3.7,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143636732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-15DOI: 10.1016/j.jnlssr.2024.09.004
Daffa Tristan Firdaus , Ntivuguruzwa Jean De La Croix , Tohari Ahmad , Didacienne Mukanyiligira , Louis Sibomana
Audio steganography techniques are evaluated using performance metrics such as payload capacity, stego audio file quality, and security (imperceptibility of hidden data). Increasing payload capacity often reduces stego image quality and security. However, maintaining high-quality stego audio with high imperceptibility requires compromising payload capacity. Therefore, achieving a balanced trade-off between payload capacity and stego audio quality has become essential but increasingly challenging. Current methods often lack adaptiveness, potentially compromising both embedding capacity and stego audio quality. To address these limitations, this study offers valuable insights to guide researchers in developing high-performing audio steganography models. The proposed method seeks to improve stego audio quality by implementing a smoothing-based technique and optimizing the sample space through linear interpolation, followed by a multi-layering process. Comprehensive experiments are conducted on common audio datasets to benchmark the method against state-of-the-art techniques. The results demonstrate peak signal-to-noise ratio (PSNR) values ranging from 105.14 to 126.34 dB, indicating substantial fidelity preservation compared to existing methods with PSNR values ranging from 120.55 decibel (dB) for 1 kb to 100.57 dB for 100 kb. These findings confirm the effectiveness of the model in maintaining audio quality while concealing data. Moreover, this study recommends that practitioners in steganography with audio data prioritize data concealment algorithms that enhance security over stego audio quality.
{"title":"Steganographic model to conceal the secret data in audio files utilizing a fourfold paradigm: Interpolation, multi-layering, optimized sample space, and smoothing","authors":"Daffa Tristan Firdaus , Ntivuguruzwa Jean De La Croix , Tohari Ahmad , Didacienne Mukanyiligira , Louis Sibomana","doi":"10.1016/j.jnlssr.2024.09.004","DOIUrl":"10.1016/j.jnlssr.2024.09.004","url":null,"abstract":"<div><div>Audio steganography techniques are evaluated using performance metrics such as payload capacity, stego audio file quality, and security (imperceptibility of hidden data). Increasing payload capacity often reduces stego image quality and security. However, maintaining high-quality stego audio with high imperceptibility requires compromising payload capacity. Therefore, achieving a balanced trade-off between payload capacity and stego audio quality has become essential but increasingly challenging. Current methods often lack adaptiveness, potentially compromising both embedding capacity and stego audio quality. To address these limitations, this study offers valuable insights to guide researchers in developing high-performing audio steganography models. The proposed method seeks to improve stego audio quality by implementing a smoothing-based technique and optimizing the sample space through linear interpolation, followed by a multi-layering process. Comprehensive experiments are conducted on common audio datasets to benchmark the method against state-of-the-art techniques. The results demonstrate peak signal-to-noise ratio (PSNR) values ranging from 105.14 to 126.34 dB, indicating substantial fidelity preservation compared to existing methods with PSNR values ranging from 120.55 decibel (dB) for 1 kb to 100.57 dB for 100 kb. These findings confirm the effectiveness of the model in maintaining audio quality while concealing data. Moreover, this study recommends that practitioners in steganography with audio data prioritize data concealment algorithms that enhance security over stego audio quality.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 138-149"},"PeriodicalIF":3.7,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143609402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-28DOI: 10.1016/j.jnlssr.2024.07.004
Ranpeng Wang , Hang Gao , Yi Liu
Accurate tracking and statistics analysis of pedestrian flow have wide applications in public scenarios. However, the conventional tracking-by-detection approaches are prone to missing individuals in densely populated or poorly lit environments. This study introduces a pedestrian detection and flow statistics method based on data fusion, which effectively tracks pedestrians across varying crowd densities. The proposed method amalgamates object detection strategies with crowd counting technique to determine the locations of all pedestrians. By observing the coordinates of pedestrians' foot points, this approach assesses the interaction dynamics between the movement trajectories of pedestrians and designated spatial areas, thereby enabling the collection of flow statistics. Experimental results indicate that the proposed method identifies 2.7 times more pedestrians than object detection methods alone and decreases false positives by 58% compared to crowd counting techniques in crowded settings. In conclusion, the proposed method exhibits considerable promise for achieving accurate pedestrian detection and flow analysis.
{"title":"A data fusion-based method for pedestrian detection and flow statistics across different crowd densities","authors":"Ranpeng Wang , Hang Gao , Yi Liu","doi":"10.1016/j.jnlssr.2024.07.004","DOIUrl":"10.1016/j.jnlssr.2024.07.004","url":null,"abstract":"<div><div>Accurate tracking and statistics analysis of pedestrian flow have wide applications in public scenarios. However, the conventional tracking-by-detection approaches are prone to missing individuals in densely populated or poorly lit environments. This study introduces a pedestrian detection and flow statistics method based on data fusion, which effectively tracks pedestrians across varying crowd densities. The proposed method amalgamates object detection strategies with crowd counting technique to determine the locations of all pedestrians. By observing the coordinates of pedestrians' foot points, this approach assesses the interaction dynamics between the movement trajectories of pedestrians and designated spatial areas, thereby enabling the collection of flow statistics. Experimental results indicate that the proposed method identifies 2.7 times more pedestrians than object detection methods alone and decreases false positives by 58% compared to crowd counting techniques in crowded settings. In conclusion, the proposed method exhibits considerable promise for achieving accurate pedestrian detection and flow analysis.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 105-113"},"PeriodicalIF":3.7,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143217882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-19DOI: 10.1016/j.jnlssr.2024.06.012
Chao Chen , Jiali Tang , Jie Li , Genserik Reniers , Changjun Li
The rapid industrialization and urbanization in China require a high level of safety management and thus urge the development of safety risk assessment in China. In the past two decades, many safety risk assessment research findings have been published in international journals by Chinese scholars, while it is not clear the development progress and China's contributions to the world in this research field. Therefore, a systematic and thorough literature review is conducted to investigate risk assessment research in China. Firstly, the research publications authored by Chinese scholars are searched from the well-known literature database Web of Science to support the analysis of risk assessment research in China. Secondly, a bibliometric analysis is conducted for the obtained literature related to risk assessment research in China to find out publication trends, research organizations, research authors, research topics, and research methods. Then, a thorough analysis of research topics and research methods is carried out to present the research progress. Finally, possible future research issues in the risk assessment research domain are discussed based on this literature review. According to the discussion, more attention in China should be paid to the risk of digital or autonomous systems, the risk related to extreme events, and the risk in large cities.
{"title":"A systematic review of safety risk assessment research in China","authors":"Chao Chen , Jiali Tang , Jie Li , Genserik Reniers , Changjun Li","doi":"10.1016/j.jnlssr.2024.06.012","DOIUrl":"10.1016/j.jnlssr.2024.06.012","url":null,"abstract":"<div><div>The rapid industrialization and urbanization in China require a high level of safety management and thus urge the development of safety risk assessment in China. In the past two decades, many safety risk assessment research findings have been published in international journals by Chinese scholars, while it is not clear the development progress and China's contributions to the world in this research field. Therefore, a systematic and thorough literature review is conducted to investigate risk assessment research in China. Firstly, the research publications authored by Chinese scholars are searched from the well-known literature database Web of Science to support the analysis of risk assessment research in China. Secondly, a bibliometric analysis is conducted for the obtained literature related to risk assessment research in China to find out publication trends, research organizations, research authors, research topics, and research methods. Then, a thorough analysis of research topics and research methods is carried out to present the research progress. Finally, possible future research issues in the risk assessment research domain are discussed based on this literature review. According to the discussion, more attention in China should be paid to the risk of digital or autonomous systems, the risk related to extreme events, and the risk in large cities.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 58-69"},"PeriodicalIF":3.7,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-19DOI: 10.1016/j.jnlssr.2024.08.001
M. Sinthuja , S. Pravinthraja , B K Dhanalakshmi , H L Gururaj , Vinayakumar Ravi , G Jyothish Lal
The numerous volumes of data generated every day necessitate the deployment of new technologies capable of dealing with massive amounts of data efficiently. This is the case with Association Rules, a tool for unsupervised data mining that extracts information in the form of IF-THEN patterns. Although various approaches for extracting frequent itemset (prior step before mining association rules) in extremely large databases have been presented, the high computational cost and shortage of memory remain key issues to be addressed while processing enormous data. The objective of this research is to discover frequent itemset by using clustering for preprocessing and adopting the linear prefix tree algorithm for mining the maximal frequent itemset. The performance of the proposed CL-LP-MAX-tree was evaluated by comparing it with the existing FP-max algorithm. Experimentation was performed with the three different standard datasets to record evidence to prove that the proposed CL-LP-MAX-tree algorithm outperform the existing FP-max algorithm in terms of runtime and memory consumption.
{"title":"An efficient and resilience linear prefix approach for mining maximal frequent itemset using clustering","authors":"M. Sinthuja , S. Pravinthraja , B K Dhanalakshmi , H L Gururaj , Vinayakumar Ravi , G Jyothish Lal","doi":"10.1016/j.jnlssr.2024.08.001","DOIUrl":"10.1016/j.jnlssr.2024.08.001","url":null,"abstract":"<div><div>The numerous volumes of data generated every day necessitate the deployment of new technologies capable of dealing with massive amounts of data efficiently. This is the case with Association Rules, a tool for unsupervised data mining that extracts information in the form of IF-THEN patterns. Although various approaches for extracting frequent itemset (prior step before mining association rules) in extremely large databases have been presented, the high computational cost and shortage of memory remain key issues to be addressed while processing enormous data. The objective of this research is to discover frequent itemset by using clustering for preprocessing and adopting the linear prefix tree algorithm for mining the maximal frequent itemset. The performance of the proposed CL-LP-MAX-tree was evaluated by comparing it with the existing FP-max algorithm. Experimentation was performed with the three different standard datasets to record evidence to prove that the proposed CL-LP-MAX-tree algorithm outperform the existing FP-max algorithm in terms of runtime and memory consumption.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 93-104"},"PeriodicalIF":3.7,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-25DOI: 10.1016/j.jnlssr.2024.09.001
Runkang Guo, Yong Zhao, Yatai Ji, Mengyu Yan, Zhengqiu Zhu
Locating unknown emission sources in turbulent environments is a challenging yet crucial task, particularly in emergency response scenarios. Existing studies have developed information-theoretic approaches to fuse intermittent information collected by mobile sensors regarding the sources. This fused information is then used to support source-term estimation (STE) in various search algorithms. Among these, the cognitive strategy—a promising information-driven search algorithm—leverages a reward-based action selection mechanism to balance exploration and exploitation during each search step. However, this mechanism is hampered by a high computational load and rigid search trajectories, limiting its application in real-world systems. To address these issues, this paper proposes a novel information-driven search method called Clutaxis, based on a global exploration and exploitation tradeoff principle. Specifically, a particle filter is leveraged to maintain the STE. After projecting the particle filter samples onto a 2D search scene, the density-based spatial clustering of applications with noise (DBSCAN) algorithm is used to extract the density information of the samples, which is then used to construct a belief source area (BSA). By leveraging the uncertainty of the BSA, Clutaxis adopts explorative or exploitative actions with no restrictions on motion direction. Through dedicated simulations, the experimental results demonstrate the robustness of Clutaxis to key parameters and its advantages in computational complexity and search performance compared to two state-of-the-art algorithms (Infotaxis and Entrotaxis) and two Clutaxis variants (Clutaxis_ER and Clutaxis_EI).
{"title":"Clutaxis: An information-driven source search method balancing exploration and exploitation in turbulent environments","authors":"Runkang Guo, Yong Zhao, Yatai Ji, Mengyu Yan, Zhengqiu Zhu","doi":"10.1016/j.jnlssr.2024.09.001","DOIUrl":"10.1016/j.jnlssr.2024.09.001","url":null,"abstract":"<div><div>Locating unknown emission sources in turbulent environments is a challenging yet crucial task, particularly in emergency response scenarios. Existing studies have developed information-theoretic approaches to fuse intermittent information collected by mobile sensors regarding the sources. This fused information is then used to support source-term estimation (STE) in various search algorithms. Among these, the cognitive strategy—a promising information-driven search algorithm—leverages a reward-based action selection mechanism to balance exploration and exploitation during each search step. However, this mechanism is hampered by a high computational load and rigid search trajectories, limiting its application in real-world systems. To address these issues, this paper proposes a novel information-driven search method called Clutaxis, based on a global exploration and exploitation tradeoff principle. Specifically, a particle filter is leveraged to maintain the STE. After projecting the particle filter samples onto a 2D search scene, the density-based spatial clustering of applications with noise (DBSCAN) algorithm is used to extract the density information of the samples, which is then used to construct a belief source area (BSA). By leveraging the uncertainty of the BSA, Clutaxis adopts explorative or exploitative actions with no restrictions on motion direction. Through dedicated simulations, the experimental results demonstrate the robustness of Clutaxis to key parameters and its advantages in computational complexity and search performance compared to two state-of-the-art algorithms (Infotaxis and Entrotaxis) and two Clutaxis variants (Clutaxis_ER and Clutaxis_EI).</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 2","pages":"Pages 125-137"},"PeriodicalIF":3.7,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143578688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-14DOI: 10.1016/j.jnlssr.2024.05.006
Hai Sun , Guorui Han , Xiaowei Zhang , Xuejing Ruan
Major sudden disasters, such as floods, earthquakes, and fires, often cause significant casualties. Emergency evacuation is crucial in mitigating these impacts. Different types of disaster incidents vary significantly in terms of impact scope, suddenness, and urgency. Each type of disaster possesses distinct characteristics, necessitating varying requirements for emergency evacuation. Consequently, we conducted a bibliometric analysis and visual mapping of evacuation processes in major natural disasters from 2004-2023, analyzing 7213 publications from the Web of Science database via VOSviewer and ArcGIS. Our study identified three developmental phases: an initial phase (pre-2011) with 1169 publications, a growth phase (2012-2018) with 2772 publications, and an expansion phase (post-2019) with 3335 publications. This study provides a comprehensive review and classification of emergency evacuation theories and methods in major disaster scenarios. It emphasizes the necessity of assessing the scope and intensity of different types of major emergent disasters, defining and simulating the affected behaviors of the influenced populations, and formulating differentiated emergency evacuation strategies accordingly. Keyword analysis reveals two main trends supporting these findings: an increasing focus on complex evacuation modeling and simulation techniques, manifested in the application of various simulation-optimized microscopic and macroscopic models such as cellular automata, social force models, agent-based models, pedestrian flow, and network flow models, enhancing disaster understanding and prediction capabilities; and the strategic development of tailored evacuation strategies for specific disaster contexts, thereby improving disaster response efficiency. Three key future pathways for safety evacuation research are outlined: refining evacuation behavior models for greater accuracy, improving the coordination of complex, multi-level evacuation procedures, and integrating indoor and outdoor evacuation strategies more seamlessly. It establishes a forward-looking framework for advancing safety evacuation studies in major emergencies.
{"title":"Grasping emergency dynamics: A review of group evacuation techniques and strategies in major emergencies","authors":"Hai Sun , Guorui Han , Xiaowei Zhang , Xuejing Ruan","doi":"10.1016/j.jnlssr.2024.05.006","DOIUrl":"10.1016/j.jnlssr.2024.05.006","url":null,"abstract":"<div><div>Major sudden disasters, such as floods, earthquakes, and fires, often cause significant casualties. Emergency evacuation is crucial in mitigating these impacts. Different types of disaster incidents vary significantly in terms of impact scope, suddenness, and urgency. Each type of disaster possesses distinct characteristics, necessitating varying requirements for emergency evacuation. Consequently, we conducted a bibliometric analysis and visual mapping of evacuation processes in major natural disasters from 2004-2023, analyzing 7213 publications from the Web of Science database via VOSviewer and ArcGIS. Our study identified three developmental phases: an initial phase (pre-2011) with 1169 publications, a growth phase (2012-2018) with 2772 publications, and an expansion phase (post-2019) with 3335 publications. This study provides a comprehensive review and classification of emergency evacuation theories and methods in major disaster scenarios. It emphasizes the necessity of assessing the scope and intensity of different types of major emergent disasters, defining and simulating the affected behaviors of the influenced populations, and formulating differentiated emergency evacuation strategies accordingly. Keyword analysis reveals two main trends supporting these findings: an increasing focus on complex evacuation modeling and simulation techniques, manifested in the application of various simulation-optimized microscopic and macroscopic models such as cellular automata, social force models, agent-based models, pedestrian flow, and network flow models, enhancing disaster understanding and prediction capabilities; and the strategic development of tailored evacuation strategies for specific disaster contexts, thereby improving disaster response efficiency. Three key future pathways for safety evacuation research are outlined: refining evacuation behavior models for greater accuracy, improving the coordination of complex, multi-level evacuation procedures, and integrating indoor and outdoor evacuation strategies more seamlessly. It establishes a forward-looking framework for advancing safety evacuation studies in major emergencies.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 1-20"},"PeriodicalIF":3.7,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-12DOI: 10.1016/j.jnlssr.2024.07.002
Jie Yang , Xiaoxue Yan
This study aimed to investigate the effects of firefighters' protective gloves on physiological responses, psychological responses, and manual performance in a cold environment through human trials. Twelve participants wearing firefighter protective equipment were exposed to a 16 °C environment, while their hands were exposed to a small chamber of 0 °C with (FPG) and without (CON) firefighting protective gloves. During the trials, physiological responses (core temperature (Tc), the mean skin temperature (Tsk), and heart rate (HR)), psychological responses (thermal sensation vote (TSV) and pain sensation vote (PSV)), and manual performance (handgrip strength, manual dexterity, maximum finger flexion, and tactile sensitivity)) were obtained. The results indicated a significant difference (p < 0.05) between FPG and CON regarding Tsk. Furthermore, pain sensation occurred when the mean skin temperature of the hand was between 15 °C and 20 °C. Gloves significantly (p < 0.05) reduced handgrip strength, manual dexterity, and tactile sensitivity in the cold exposure. This study provides fundamental knowledge for cold strain assessment and high-performance protective glove development with the potential to improve firefighters’ safety and health.
{"title":"Effects of firefighters’ protective gloves on physiological responses, psychological responses, and manual performance in a cold environment","authors":"Jie Yang , Xiaoxue Yan","doi":"10.1016/j.jnlssr.2024.07.002","DOIUrl":"10.1016/j.jnlssr.2024.07.002","url":null,"abstract":"<div><div>This study aimed to investigate the effects of firefighters' protective gloves on physiological responses, psychological responses, and manual performance in a cold environment through human trials. Twelve participants wearing firefighter protective equipment were exposed to a 16 °C environment, while their hands were exposed to a small chamber of 0 °C with (FPG) and without (CON) firefighting protective gloves. During the trials, physiological responses (core temperature (T<sub>c</sub>), the mean skin temperature (T<sub>sk</sub>), and heart rate (HR)), psychological responses (thermal sensation vote (TSV) and pain sensation vote (PSV)), and manual performance (handgrip strength, manual dexterity, maximum finger flexion, and tactile sensitivity)) were obtained. The results indicated a significant difference (<em>p</em> < 0.05) between FPG and CON regarding T<sub>sk</sub>. Furthermore, pain sensation occurred when the mean skin temperature of the hand was between 15 °C and 20 °C. Gloves significantly (<em>p</em> < 0.05) reduced handgrip strength, manual dexterity, and tactile sensitivity in the cold exposure. This study provides fundamental knowledge for cold strain assessment and high-performance protective glove development with the potential to improve firefighters’ safety and health.</div></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"6 1","pages":"Pages 48-57"},"PeriodicalIF":3.7,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}