Skip to main content
Figure 5 | Security Informatics

Figure 5

From: An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea

Figure 5

Initial setup and plots of a typical run in Scenario C. These figures are showing (a) the setup of Scenario C, (b) the graphs which plot the number of escapees of young adults over time in Scenario C (drills vs. no drills), (c) the graphs which plot the number of escapees of older adults over time in Scenario C (drills vs. no drills), (d) the graphs which plot the number of escapees of both young and older adults over time in Scenario C (drills), (e) the graphs which plot the number of escapees of both young and older adults over time in Scenario C (no drills).

Back to article page