Skip to main content

Prioritisation of Simulation Models for Ensuring Safety and Security in Underground Stations on the Basis of a Detailed Requirements Analysis

  • Conference paper
  • 2919 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 318))

Abstract

Simulations in the context of public safety and security are an important mean for generating information and enabling a realistic forecast of upcoming events. But since there are numerous different types of simulations by now the selection of the right model gets more and more difficult. This paper presents a method to support decision makers in prioritising the different types based on a detailed requirements analysis. In this paper the requirements are gathered by identifying stakeholders and personas and therewith conducting blue printing based on a specific scenario in an underground station.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alexander, I.: Stakeholders – Who is Your System for? Computing & Control Engineering 14(1), 22–26 (2003)

    Article  Google Scholar 

  2. Alexander, I., Maiden, N.: Scenarios, Stories, Use Cases Through the Systems Development Life-Cycle. John Wiley & Sons (2004)

    Google Scholar 

  3. Anfossi, D., Tinarelli, G., Trini Castelli, S., Nibart, M., Olry, C., Commanay, J.: A new Lagrangian particle model for the simulation of dense gas dispersion. Atmospheric Environment 44, 753–762 (2010)

    Article  Google Scholar 

  4. Carroll, J.: Scenario-Based Design. John Wiley (1995)

    Google Scholar 

  5. Castro, A.: Pedestrian evacuation simulation. J. Comput. Small Coll. 20(5), 141–142 (2005)

    Google Scholar 

  6. Courage, C., Baxter, K.: Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques. Morgan Kaufmann, San Francisco (2004)

    Google Scholar 

  7. Fließ, S.: Dienstleistungsmanagement – Kundenintegration gestalten und steuern (Service Management – Modelling and Controlling of Customer Integration). Gabler Verlag, Wiesbaden (2009)

    Google Scholar 

  8. Friedman, R.: An international survey of computer models for fire and smoke (1992)

    Google Scholar 

  9. Immers, L.H., Logghe, S.: Traffic flow theory. Verkehrskunde Basis. Katholieke Universiteit Leuven (2002)

    Google Scholar 

  10. Ishikawa, K.: Introduction to quality control. Chapman & Hall, London (1990)

    Google Scholar 

  11. DIN EN ISO 9000: Quality management systems – Fundamentals and vocabulary (2005)

    Google Scholar 

  12. Jahangirian, M., Eldabi, T., Naseer, A., Stergioulas, L.K., Young, T.: Simulation in Manufacturing and Business: A Review. European Journal of Operations Research 203(1), 1–13 (2010)

    Article  Google Scholar 

  13. Johnston, P., Milne, G., Klemitz, D.: Overview of bushfire spread simulation systems. School of Computer Science and Software Engineering. University of Western Australia (2005)

    Google Scholar 

  14. Lindemann, U.: Methodische Entwicklung technischer Produkte – Methoden flexibel und situationsgerecht anwenden (Methodical development of technical products – flexible and appropriate application of methods). Springer, Heidelberg (2005)

    Google Scholar 

  15. Løvås, G.G.: Modelling and simulation of pedestrian traffic flow. Transportation Research B 28, 429–443 (1994)

    Article  Google Scholar 

  16. Masing, W., Pfeifer, T.: Handbuch Qualitätsmanagement (Handbook Quality Management), 5th edn. Hanser Verlag, München (2007)

    Google Scholar 

  17. McGraw, K., Harbison, K.: User-Centered Requirements: The Scenario-Based Engineering Process (1997)

    Google Scholar 

  18. Mitzel, D., Horbert, E., Ess, A., Leibe, B.: Multi-person Tracking with Sparse Detection and Continuous Segmentation. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010, Part I. LNCS, vol. 6311, pp. 397–410. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Ören, T.I., Ghasem-Aghaee, N.: Personality representation processable in fuzzy logic for human behavior simulation. In: Proceedings of the 2003 Summer Computer Simulation Conference, Montreal, pp. 11–18 (2003)

    Google Scholar 

  20. Osman, M.: Controlling uncertainty: A review of human behavior in complex dynamic environments. Psychological Bulletin 136(1), 65–86 (2010)

    Article  Google Scholar 

  21. Pflitsch, A., Brüne, M., Ringeis, J., Killing-Heinze, M.: OrGaMIR – Development of a safety system for reaction to an event with emission of hazardous airborne substances - like a terrorist attack or fire - based on subway climatology. In: 4th International Symposium on Tunnel Safety and Security, Frankfurt, pp. 451–462 (2010)

    Google Scholar 

  22. Pfeifer, T.: Qualitätsmanagement (Quality Management), 3rd edn. Hanser Verlag, München (2001)

    Google Scholar 

  23. Pohl, K.: Requirements Engineering. Grundlagen, Prinzipien, Techniken (Requirements Engineering. Basics, principles, techniques). Dpunkt Verlag (2007)

    Google Scholar 

  24. Pueboobpaphan, R., van Arem, B.: Driver and vehicle characteristics and platoon and traffic flow stability. Journal of Transportation Research Board 2189 (2010)

    Google Scholar 

  25. Qiu, F., Hu, X.: Modeling group structures in pedestrian crowd simulation. Simulation Modelling Practice and Theory 18, 190–205 (2010)

    Article  Google Scholar 

  26. Robertson, S., Robertson, J.: Mastering the requirements process. ACM Press/Addison-Wesley Publishing Co., New York (1999)

    Google Scholar 

  27. Sabeur, E., Denis, G.: Human behavior and social network simulation: Fuzzy sets/logic and agents-based approach. In: Proc. of the 2007 Spring Simulation Multi-Conference, SCS 2007, Norfolk, San Diego, pp. 102–109 (2007)

    Google Scholar 

  28. Schneider, U., Oswald, M., Lebeda, C.: Evakuierung bei Brandereignissen (Evacuation at Fire Incidents). Brandschutzfachtagung (2004)

    Google Scholar 

  29. Sutcliffe, A.: Scenarios, models and the design process in software engineering and interactive systems design. In: Proc. HCII 2003, Crete, Greece (June 2003)

    Google Scholar 

  30. Titzer, B.L., Lee, D.K., Palsberg, J.: Avrora: Scalable Sensor Network Simulation with Precise Timing. In: Proc. of IPSN (2005)

    Google Scholar 

  31. Xiaoping, Z., Tingkuan, Z., Mengting, L.: Modeling crowd evacuation of a building based on seven methodological approaches. Building and Environment 44, 437–445 (2009)

    Article  Google Scholar 

  32. Yoo, C., Kim, S.-B.: Stability of soft ground tunnelling in urban environment – a numerical investigation. In: International Symposium on Underground Excavation and Tunnelling, Bangkok, Thailand, February 2-4 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schneider, S., Friberg, T., Becker, T., Koch, R. (2012). Prioritisation of Simulation Models for Ensuring Safety and Security in Underground Stations on the Basis of a Detailed Requirements Analysis. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33161-9_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33160-2

  • Online ISBN: 978-3-642-33161-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics