首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
王爽  吴亚东 《微机发展》2013,(7):257-261
针对学校大型建筑中人群分布密集的问题,研究了学生群体的紧急疏散仿真。首先分析了紧急情况下的群体行为特点,并根据现实生活中个体差异的统计特征,对逃生人群的不同属性特征进行了分类,然后采用社会力模型实现了学生群体的紧急疏散仿真,解决了传统疏散仿真中人员的无差异性问题。该仿真能够更加真实地反映出现实生活中的人群疏散,达到较好的效果。最后,基于该仿真模型,着重分析了建筑物出口设计对群体疏散的影响,分析结果表明:不同的出口宽度、位置对群体疏散的影响不同,从而可以为大型建筑的出口设计提供有益的参考。  相似文献   

2.
建筑物出口条件对人员疏散的影响分析   总被引:1,自引:0,他引:1  
蒋桂梅 《计算机仿真》2010,27(6):212-215,229
人员疏散是建筑安全性能设计中考虑的关键因素,建筑出口条件又是人员疏散的关键环节.研究人员对疏散问题,采用疏散仿真模型对人群疏散进行了仿真,着重研究了出口条件对疏散时间的影响.为保证安全,对于单出口的建筑物,出口宽度有一个理想临界值d≈0.1w(w为包括出口在内的墙总长),使出口宽度大于临界值,减少了阻塞现象,提高疏散效率.对于双出口分布在同一面墙上的正方形建筑,出口间距S≈0.2w,疏散用时最小,并对于方形建筑的理想临界值S会随着建筑物较短的墙宽度减小而增加.仿真表明,双出口分布在不同墙面上方式比没有双出口分布在同一面墙疏散效率高,为建筑物出口设计提供了参考依据.  相似文献   

3.
人群聚集活动越来越多地出现在各种公共场合,而由此引发的各种安全问题也逐渐受到社会各界的重视.在重要建筑和人群密集场所突发重大恐怖事件时,将人员在较短的时间内紧急疏散至安全地带是恐怖事件紧急救援的首要任务.文中提出一种基于LBM的高效的人群疏散算法及模型,该模型将Lattice Boltzmann Method的D2Q9模型应用于人流疏散的模拟过程.该模f的着重点在于研究人群的疏散过程,从人流整体的运动特点考虑疏散问题.针对大规模人群紧急疏散的模拟,可比较精确地预测人流紧急疏散的过程与现象.  相似文献   

4.
为了提高多出口场馆人群疏散效率,针对低能见度环境下多出口场馆人群疏散问题,在基本的社会力模型上加入了领导者吸引力和能见度范围的限制,建立了低能见度环境下多出口场馆人群疏散仿真模型,研究低能见度条件下人群疏散行为及疏散领导者对疏散结果的影响。在改进的社会力模型中,每个待疏散人员只对能见度范围内的其他个体或墙壁存在心理作用力,并且只有疏散领导者和出口附近的个体能够准确地判断出口位置,而其他个体只能根据能见度范围内的环境信息或疏散领导者的领导进行疏散。仿真结果显示,该模型可以较好地模拟出低能见度环境下多出口场馆人群疏散情形,疏散领导者选择距离最近的出口为疏散方向,普通个体会跟随能见度范围内的大多数个体或疏散领导者进行疏散,且疏散领导者的存在和其初始位置的合理设定能够提高疏散效率。  相似文献   

5.
大型室内场所空间布局较为复杂(如地铁站), 人群的高密度聚集往往存在一些潜在的风险. 本文在分析国内外人群快速疏散研究现状的基础上, 提出了一种基于贪心选择的行人疏散方法. 该方法以地铁站内复杂场景作为研究背景: 首先, 针对地铁站内的行人的行动轨迹难以获取问题, 本文利用地铁站内行人真实出站数据, 基于元胞自动机, 构建了行人疏散轨迹半仿真模型, 并利用实际流量数据优化该半仿真模型; 其次, 基于该轨迹模型, 为了满足高动态场景中的实时性, 采用复杂度较低的贪心选择策略分配最优疏散出口; 最后, 以杭州武林广场地铁站为例, 使用真实出站数据设计对比实验, 验证行人轨迹模型的有效性以及出口分配方法的性能. 结果表明, 本文所提出的行人轨迹模型能够较好的模拟行人的轨迹, 仿真中各出口疏散人数同真实出站数据拟合程度的可决系数R2达到了0.67. 相较于最短路径和最短时间出口分配方法, 本文所提出的方法在整体疏散效率上分别提高了27.2%和16.5%.  相似文献   

6.
随着突发事件的频繁发生,人员疏散任务日益紧迫.针对突发事件下恐慌心理对人员疏散的影响,采用元胞自动机理论对人员疏散进行建模,提出逃生收益的概念,引入动态参数来描述逃生人员的逃生目的性及其周围的逃生环境,并分析了人员恐慌心理对逃生行人流产生的影响及由此形成的一些基本规律,如人群拱形分布、拥塞、间歇性出口人流等.仿真结果表明,运用逃生收益规则对人员紧急疏散的模拟很好地再现了人员紧急疏散过程及疏散状况,其模型更能体现真实的疏散情况.  相似文献   

7.
研究建筑物在不同出口条件设置下人员的安全疏散问题。针对人群仿真中如何计算疏散路径问题,文中采用导航图技术和agent技术来对个体进行疏散路径的规划。同时为表现人群运动过程当中个体之间的相互碰撞问题,结合碰撞规避规则进行穿透矫正。并且采用三维引擎DeltaSD在Vc++9.0环境下进行仿真并搭建了一套三维人群运动模拟平台。最后分别在三种不同出口条件下的虚拟场景中进行仿真。对比仿真结果表明该平台能直观地展现整个人群疏散的运动过程,并能够对建筑物出口安全设计的合理陛提供有效的数据依据。  相似文献   

8.
杨旭东 《信息与电脑》2023,(5):62-66+92
为了对大型场馆疏散过程中出现的人员逆行行为问题进行研究,基于社会力模型建立了人员疏散仿真模型,研究逆行行为对场馆内人群疏散结果的影响。实验结果表明,该模型能够再现疏散过程中人员表现出来的逆行行为。  相似文献   

9.
针对苏州市金鸡湖城市广场在突发情况下的人群疏散问题,建立了基于实时动态的疏散网络路径规划模型,分析了大型公众区域复杂环境对人群疏散效率的影响.同时提出以人群逃离危险区域的终止时间作为权值参数改进Dijkstra算法,并且利用反馈补偿机制合理分配各出口的疏散人数,实现人群疏散的动态调整和路径规划.通过Pathfinder...  相似文献   

10.
在引入元胞自动机理论的基础上,模拟分析了紧急情况下人员生理及心理的不同对疏散过程的影响,通过人员动态调整自身行为,并引入人员竞争力,对人员疏散过程建立模型。在疏散过程中,根据存在着一定程度的外部干扰因素,提出疏散干扰度概念。计算机仿真的结果表明,考虑人员竞争力,以及出口疏散干扰的问题,可以更加真实地模拟人员紧急疏散过程和疏散状况。  相似文献   

11.
2006年2月28日,网络安全及电源管理芯片供应商凹凸科技(O2Micro)向中国用户隆重推介凹凸科技在网络安全领域的独特理念和全新方案.此举标志着凹凸科技已正式进军网络安全领域.特别在ASIC防火墙和SSL VPN技术和产品的竞争中,凹凸科技已经担负了不可或缺的重要角色.而其在模拟与数字集成电路方面拥有的强大设计和制造能力,无疑将为其最终成为全球网络安全领域的主要供应商增加关键筹码.凹凸科技在评述中国安全市场发展趋势的同时,还将携两款最具代表性的成熟产品--ASIC防火墙SifoWorks和SSL VPN产品Succendo一起亮相.  相似文献   

12.
继成功举办2005年Sun JAVA中国开发者大会之后,Sun一年一度全球规模的开发者大会——2006Sun科技日又分别于今年9月23~24日和27~28日相继在中国上海和北京两大都市举行“。Java之父”James Gosling再次来到中国,与中国的开发者讨论软件开发者所关心的问题,讲述Sun的软件发展策略、介绍Solaris10操作系统的独特的特性和新的Java开发工具、展望Java技术发展前景,特别是阐明Sun实施Java技术开源的策略。Sun科技日是Sun公司最重要的全球开发者的大会,它针对Java技术、Solaris10OS、NetBeans、OpenSolaris、开源技术、开发工具和Web…  相似文献   

13.
2006年3月15日,“陕西省第一届国防科工系统内网信息安全建设专题研讨会”在西安市隆重召开。此次会议的议题是,在当前的信息安全形势下,陕西省国防科工系统内网面临的信息安全问题,以及如何采取有效的解决方案进一步提高国家机要部门内部网络的安全保护等级,以适应形势发展的需要。此次会议由陕西省国防科工委主办,陕西省国防科工委信息中心和北京榕基网安科技有限公司、北京理工先河科技发展有限公司、陕西金叶西工大共同承办,国家保密局和陕西省国防科工委的有关领导出席会议并发表了重要讲话。在为期两天的会议中,共有100多名国防科工系…  相似文献   

14.
Abstract In 1988 the eleven West-German Kultusminister , with responsibility for the school systems in their respective Bundeslaender , reached agreement with the Federal Ministry of Education and Science on the broad concept of 'Information and Communications Technology', ITG. After four years of discussion it was agreed that ITG should be introduced into the secondary level of the general schools. In spite of strong disagreements about the ways and speed of implementation, and after several years of experiments, important parts of the concept have become a reality in practically all of the old Bundeslaender. While acknowledging the complexity of the German educational system the paper attempts to outline the development of the concept of Information and Communications Technology and its consequences in teacher education. The development in the eastern part of Germany, the former GDR, has been completely different to that in the western part and this is also commented upon in the paper.  相似文献   

15.
Abstract This paper outlines the consensual approach to the formulation of curriculum policy in general, and in relation to information technology (IT) in particular, in Scotland. It outlines the approaches to IT that have emerged as a result. These are founded on the premises that all children should develop knowledge and understanding about IT and skills in using IT; that IT should influence both content and delivery of the curriculum; and that IT (computing studies in Scotland) should be an elective for secondary school pupils. Against this background, the paper describes the evolution of policy and practice relating to IT in teacher education. It appraises the strategies which institutes are using for developing the professional skills necessary to deliver IT in the Scottish curriculum. It notes significant progress but highlights the need to develop strategies which integrate IT more deeply with other professional studies so that student teachers develop deeper, more reflective approaches to IT.  相似文献   

16.
Abstract This paper charts the developments in information technology (IT) policies in education in Japan over the past decade with particular emphasis on the impacts on teacher education. Beginning with the work of the National Council on Educational Reform in 1985, the Japanese education system initiated a thorough analysis of the role of information technology in all aspects of education from kindergarten through to high school, vocational education and pre- and in-service teacher education. The various approaches culminated in guidelines and statutory requirements relating to both schools' curricula and teacher training, published in the period 1990–1992. More recently other ministries have contributed to developments including the Ministry for International Trade and Industry which has categorized the different types of information engineers and among these is the new Educational Engineer. The paper reports the processes leading to these developments.  相似文献   

17.
Abstract As with many European countries Denmark is experiencing change in teacher education and most notably in the wake of an act of government in 1992 which was designed to set out common aims for teacher education. Prior to that the content and structure of teacher education had been highly specified including, for example, the requirement that student teachers should take a course of 42 hours IT-related lessons. This paper provides a brief history of the background to the changes in teacher education and focuses on the implications that the more flexible aims for teacher education have for the future integration of IT in teacher education.  相似文献   

18.
在网络层实现安全传输通道技术的研究   总被引:3,自引:0,他引:3  
安全传输通道是对传输的原始信息进行加密和协议封装处理,从而实现安全传输的技术,本文在TCP/IP的网络层上提出了实现安全传输通道的技术和解决方案。并对网络层的安全传输通道技术提出了实现机制。  相似文献   

19.
Abstract To understand what is going on in France at the moment in the domain of computers and related communication technologies in teacher training, there are two major developments that have to be kept in mind. Firstly, the ways of becoming a teacher in France underwent major changes in 1991. It is therefore too early to come to general conclusions about the effects of this reform in the field of new information technologies. Secondly, French IT in schools policy has shifted from a large-scale centralized equipment operation, which provided microcomputers in each school from 1985 to 1987, to a more regional management of equipment funding, with less national piloting in the field. This paper describes what happened during the previous period and what is taking place now. With matters still evolving the paper represents a snapshot rather than an exhaustive survey; such a survey remains to be done.  相似文献   

20.
《Ergonomics》2012,55(7):853-865
Ergonomic thought and practice were introduced in ancient China in relation to modern developments in Chinese ergonomics. Despite the ten-year interruption of the 'cultural revolution’ in the late 1960s and 1970s, ergonomics has made great progress in China in the last decade. In this paper some general developments in recent ergonomics’ teaching and in professional organizations are described. Four major areas of ergonomics research are illustrated: (1) Visual displays and signal design; (2) Human-computer interface with Chinese computers; (3) Cognitive strategies and decision support; (4) Mental workload and occupational stress. The main characteristics of Chinese ergonomics are discussed and new directions are highlighted, based on recent developments and progress.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号