Skip to main content
. 2021 Nov 30;21(23):8003. doi: 10.3390/s21238003

Figure 2.

Figure 2

Bubble-net hunting attack model consists of two stages: shrinking encircling mechanism (left) and spiral updating position (right), chosen in semi-random order [8]. Reproduced with permission from Elsevier publisher, licence no. 5198660218147.