Safe Scale: A Fire Risk Assessment Mobile
DOI:
https://doi.org/10.61841/shwj1576Keywords:
Fire Risk Assessment, Risk Management, Fire Protection Systems.Abstract
Fire Risk Assessment is a systematic procedure done to evaluate and determine potential hazards in the case of a fire and the consequences of it. Methods that are done to carry out this procedure can be qualitative, quantitative or a mixture of both. Fire Risk Assessment are done to ensure fire prevention systems in buildings. During Fire Risk Assessments, only a visual inspection is done and through testing is done only if necessary. These assessments are also a legal requirement in most countries which ensure safety of the building’s occupants. Legislations give high priorities to Fire Risk Assessment as they help prevent the risk of fire and minimise the damage cause from a fire by enforcing law to complete Fire Risk Assessment regularly. Currently, the Fire Risk Assessments are done manually by filling up forms, guides and surveys, Guidelines are provided by the respective authorities in each country which is not standardised. Therefore, this research aims to propose a mobile application to conduct and assist the Fire Risk Assessment procedures.
Downloads
References
[1] Jobral, S. (2017). Fire Safety Systems in Buildings-Problems and Concerns beyond the Project. MOJ Civil
Engineering, 2(5).
[2] Redboxfire.co.uk. (2019). The 5 most common Fire Risk Assessment Failures. [online] Available
at:https://www.redboxfire.co.uk/news/The_5_most_common_Fire_Risk_Assessment_Failures_and_how_to_
avoid_them.html [Accessed 9 Jan. 2019].
[3] OthumanMydin, M., Sani, N., Abas, N. and Khaw, Y. (2014). Evaluation of Fire Hazard and Safety
Management of Heritage Buildings in Georgetown, Penang. MATEC Web of Conferences, 10, p.06003.
[4] Zhao, C., Lo, S., Lu, J. and Fang, Z. (2004). A simulation approach for ranking of fire safety attributes of
existing buildings. Fire Safety Journal, 39(7), pp.557-579.
[5] SGS (2014). How Can You Effectively Manage Your Fire Risk Responsibilities? United Kingdom: SGS
Group Management.
[6] Government of UK (2019). Fire safety in the workplace. [online] GOV.UK. Available at:
https://www.gov.uk/workplace-fire-safety-your-responsibilities/fire-risk-assessments [Accessed 9 Jan. 2019].
[7] Singapore Civil Defence Force (2019). Fire Certificate. [online] Scdf.gov.sg. Available at:
https://www.scdf.gov.sg/home/fire-safety/permits-and-certifications/fire-certificate [Accessed 9 Jan. 2019].
[8] Chow, W. (2002). Proposed Fire Safety Ranking System EB-FSRS for Existing High-Rise Non-residential
Buildings in Hong Kong. Journal of Architectural Engineering, 8(4), pp.116-124.
[9] Ibrahim, M., Abdul-Hamid, K., Ibrahim, M., Mohd-Din, A., Yunus, R. and Yahya, M. (2011). The
Development of Fire Risk Assessment Method for Heritage Building. Procedia Engineering, 20, pp.317-324.
[10] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760.
[11] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The
Empirical Economics Letters, Vol.18; No. 3, March 2019.
[12] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International
Journal of Business Intelligence Research, - Volume 5, Issue 1, April-2014.
[13] P. Mary Jeyanthi, “Industry 4.O: The combination of the Internet of Things (IoT) and the Internet of People
(IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018.
[14] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An
Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN Online:
2350-1111 (Online).
[15] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in Financial
Institutions”, VIVEKANANDA JOURNAL OF RESEARCH Vol. 7, Special Issue 1, May 2018, Page no:
159-164
[16] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear Optimization Approach”,
International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.
[17] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision
Making”, International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-2013.
[18] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic
Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and
Communication Engineering, Volume 3, Issue 3, March-2014.
[19] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical
Study”, International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.
[20] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud
Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)
[21] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment generation
in the field of UPVC widows” (ICSMS2019).
[22] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across
emerging countries”, International Conference on Sustainability Management and Strategy” (ICSMS2018).
[23] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International
Conference on Business Management and Information Systems” (ICBMIS2015).
[24] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International
Conference on Mathematics in Engineering & Business Management (ICMEB 2012).
[25] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear
Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering
& Business Management (ICMEB 2012).
[26] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision
Making ”, 2011 IEEE International Conference on Computational Intelligence and Computing Research
(2011 IEEE ICCIC).
[27] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome the
Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing
Research (2011 IEEE ICCIC).
[28] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing
and Communication Technologies. (SCCT-2015)
[29] Dr.P.Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm for
Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019
[30] Dr.P.Mary Jeyanthi , “Customer Value Management (CVM) – Thinking Inside the box” – ISBN : 978-93-
87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.
[31] Jeyanthi, P. M., & Shrivastava, S. K. (2019). The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.