Research Article

Modeling Road Network Vulnerability for Evacuees and First Responders in No-Notice Evacuation

Figure 2

The procedure of searching for the IEV of anchor node A: (a) when the region includes five nodes, the ratio reaches its maximum and node A’s IEV is derived; (b) the relationship between node A’s inbound vulnerability ratio and the number of nodes in the search region.
(a)
(b)