Computational Model Library

Hybrid agent-based methodology for testing response protocols (1.0.0)

In recent years we have seen multiple incidents with a large number of people injured and killed by one or more armed attackers. Since this type of violence is difficult to predict, detecting threats as early as possible allows to generate early warnings and reduce response time. In this context, any tool to check and compare different action protocols can be a further step in the direction of saving lives. Our proposal combines features from continuous and discrete models to obtain the best of both worlds in order to simulate large and crowded spaces where complex behavior individuals interact. With this proposal we aim to provide a tool for testing different security protocols under several emergency scenarios, where spaces, hazards, and population can be customized. Finally, we use a proof of concept implementation of this model to test specific security protocols under emergency situations for real spaces. Specifically, we test how providing some users of a university college with an app that informs about the type and characteristics of the ongoing hazard, affects in the safety performance.

Release Notes

This is a multiagent evacuation simulation for NetLogo. It accompanies the paper “Hybrid agent-based methodology for testing response protocols”, and in it you can find a detailed description of its goals, its theoretical foundations, and its basic use.

Is very important to keep the structure of nodes and edges files. And they must be specified in the main screen.

Netlogo will generate the graph by reading this csv files in the set-up step.

Once the graph is created, we can run the simulation.

You can find other utilities in the extras folder, such as a preprocess-file program in python or a tool to play with fuzzy-sets.

Associated Publications

Submitted

Hybrid agent-based methodology for testing response protocols 1.0.0

In recent years we have seen multiple incidents with a large number of people injured and killed by one or more armed attackers. Since this type of violence is difficult to predict, detecting threats as early as possible allows to generate early warnings and reduce response time. In this context, any tool to check and compare different action protocols can be a further step in the direction of saving lives. Our proposal combines features from continuous and discrete models to obtain the best of both worlds in order to simulate large and crowded spaces where complex behavior individuals interact. With this proposal we aim to provide a tool for testing different security protocols under several emergency scenarios, where spaces, hazards, and population can be customized. Finally, we use a proof of concept implementation of this model to test specific security protocols under emergency situations for real spaces. Specifically, we test how providing some users of a university college with an app that informs about the type and characteristics of the ongoing hazard, affects in the safety performance.

Release Notes

This is a multiagent evacuation simulation for NetLogo. It accompanies the paper “Hybrid agent-based methodology for testing response protocols”, and in it you can find a detailed description of its goals, its theoretical foundations, and its basic use.

Is very important to keep the structure of nodes and edges files. And they must be specified in the main screen.

Netlogo will generate the graph by reading this csv files in the set-up step.

Once the graph is created, we can run the simulation.

You can find other utilities in the extras folder, such as a preprocess-file program in python or a tool to play with fuzzy-sets.

Version Submitter First published Last modified Status
1.0.0 Fernando Sancho Caparrini Wed Feb 3 10:25:45 2021 Wed Feb 3 10:25:45 2021 Published

Discussion

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept