Research Article
Modeling Road Network Vulnerability for Evacuees and First Responders in No-Notice Evacuation
Figure 2
The procedure of searching for the IEV of anchor node A: (a) when the region includes five nodes, the ratio reaches its maximum and node A’s IEV is derived; (b) the relationship between node A’s inbound vulnerability ratio and the number of nodes in the search region.
(a) |
(b) |