An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligenceaReport as inadecuate




An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea - Download this document for free, or read online. Document in PDF available to download.

Security Informatics

, 1:23

First Online: 23 December 2012Received: 04 July 2012Accepted: 21 November 2012

Abstract

AbstractPublic safety has been a great concern in recent years as terrorism occurs everywhere. When a public event is held in an urban environment like Olympic games or soccer games, it is important to keep the public safe and at the same time, to have a specific plan to control and rescue the public in the case of a terrorist attack. In order to better position public safety in communities against potential threats, it is of utmost importance to identify existing gaps, define priorities and focus on developing approaches to address those.

In this paper, we present a system which aims at providing a decision support, threats response planning and risk assessment. Threats can be in the form of Chemical, Biological, Radiological, Nuclear and Explosive CBRNE weapons and technologies. In order to assess and manage possible risks of such attacks, we have developed a computational framework of simulating terrorist attacks, crowd behaviors, and police or safety guards’ rescue missions. The characteristics of crowd behaviors are modeled based on social science research findings and our own virtual environment experiments with real human participants. Based on gender and age, a person has a different behavioral characteristic. Our framework is based on swarm intelligence and agent-based modeling, which allows us to create a large number of people with specific behavioral characteristics. Different test scenarios can be created by importing or creating 3D urban environments and putting certain terrorist attacks such as bombs or toxic gas on specific locations and time-lines.

Electronic supplementary materialThe online version of this article doi:10.1186-2190-8532-1-23 contains supplementary material, which is available to authorized users.

Download fulltext PDF



Author: Andrew J Park - Herbert H Tsang - Mengting Sun - Uwe Glässer

Source: https://link.springer.com/







Related documents