Core user guide updated to reflect changes made down stream.

This commit is contained in:
Archer.Bowen
2024-06-07 14:48:22 +01:00
parent 71e0c4179e
commit 29d42a88dc
3 changed files with 5 additions and 1 deletions

View File

@@ -12,7 +12,7 @@
"\n",
"First, let's load the standard Data Manipulation config file, and see what the red agent does.\n",
"\n",
"*(For a full explanation of the Data Manipulation scenario, check out the notebook Data Manipulation Scearnio notebook)*"
"*(For a full explanation of the scenario, check out the data manipulation scenario notebook)*"
]
},
{

View File

@@ -6,6 +6,8 @@
"source": [
"# Build a simulation using the Python API\n",
"\n",
"© Crown-owned copyright 2024, Defence Science and Technology Laboratory UK\n",
"\n",
"Currently, this notebook manipulates the simulation by directly placing objects inside of the attributes of the network and domain. It should be refactored when proper methods exist for adding these objects.\n"
]
},

View File

@@ -7,6 +7,8 @@
"source": [
"# PrimAITE Router Simulation Demo\n",
"\n",
"© Crown-owned copyright 2024, Defence Science and Technology Laboratory UK\n",
"\n",
"This demo uses a modified version of the ARCD Use Case 2 Network (seen below) to demonstrate the capabilities of the Network simulator in PrimAITE."
]
},