Skip to main content
Figure 2 | Security Informatics

Figure 2

From: An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea

Figure 2

Initial setup and plots of a typical run. The figures which are showing (a) the setup of Scenario A (without rescue personnel), (b) the graph which plots the number of escapees over time in Scenario A (without rescue personnel), (c) the setup of Scenario B (with rescue personnel), (d) the graph which plots the number of escapees over time in Scenario B (with rescue personnel).

Back to article page