Abstract: The underground shopping mall has the constructional
problem of the fire evacuation. Also, the people sometimes lose their
direction and information of current time in the mall. If the
emergencies such as terrorist explosions or gas explosions are
happened, they have to go out soon. Under such circumstances, inside
of the mall has high risk for life. In this research, the authors propose a
way that he/she can go out from the underground shopping mall
quickly. If the narrow exits are discovered by using active RFID
(Radio Frequency Identification) tags and using cellular phones, they
can evacuate as soon as possible. To verify this hypothesis, the authors
design the model and carry out the agent-based simulation. They treat,
as a case study, the Tenjin mall in Fukuoka Prefecture in Japan. The
result of the simulation is that the case of the pedestrian with using
active RFID tags and cellular phones reduced the amount of time to
spend on the evacuation. Even if the diffusion of RFID tags and
cellular phones was not perfect, they could show the effectiveness of
reducing the time of evacuation.
Abstract: We investigate an asymmetric connections model with a
dynamic network formation process, using an agent based simulation.
We permit heterogeneity of agents- value. Valuable persons seem
to have many links on real social networks. We focus on this
point of view, and examine whether valuable agents change the
structures of the terminal networks. Simulation reveals that valuable
agents diversify the terminal networks. We can not find evidence that
valuable agents increase the possibility that star networks survive the
dynamic process. We find that valuable agents disperse the degrees
of agents in each terminal network on an average.
Abstract: In this research, the authors analyze network stability
using agent-based simulation. Firstly, the authors focus on analyzing
large networks (eight agents) by connecting different two stable small
social networks (A small stable network is consisted on four agents.).
Secondly, the authors analyze the network (eight agents) shape which
is added one agent to a stable network (seven agents). Thirdly, the
authors analyze interpersonal comparison of utility. The “star-network
"was not found on the result of interaction among stable two small
networks. On the other hand, “decentralized network" was formed
from several combination. In case of added one agent to a stable
network (seven agents), if the value of “c"(maintenance cost of per
a link) was larger, the number of patterns of stable network was
also larger. In this case, the authors identified the characteristics of a
large stable network. The authors discovered the cases of decreasing
personal utility under condition increasing total utility.