Skip to main content
Figure 3 | Security Informatics

Figure 3

From: An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea

Figure 3

Initial setup and plots of a typical run in Scenario B. These figures are showing (a) the setup of Scenario B (without rescue personnel), (b) the graph which plots the number of escapees over time in Scenario B (without rescue personnel), (c) the setup of Scenario B (with rescue personnel), (d) the graph which plots the number of escapees over time in Scenario B (with rescue personnel), (e) the graph of Scenario B (with 6 rescue personnel), (f) the graph of Scenario B (with 2 rescue personnel).

Back to article page