Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1188 results for "Aad Kessler" clear search
Consumer agents make choices which products to choose using the consumat approach. In this approach agents will make choices using deliberation, repetition, imitation or social comparison dependent on the level of need satisfaction and uncertainty.
The model is discussed in Introduction to Agent-Based Modeling by Marco Janssen. For more information see https://intro2abm.com/
Developed as a part of a project in the University of Augsburg, Institute of Geography, it simulates the traffic in an intersection or junction which uses either regular traffic lights or traffic lights with a countdown timer. The model tracks the average speed of cars before and after traffic lights as well as the throughput.
Local scale mobility, namely foraging, leads to global population dispersal. Agents acquire information about their environment in two ways, one individual and one social. See also http://www.openabm.org/model/3846/
This code can be used to analyze the sensitivity of the Deffuant model to different measurement errors. Specifically to:
- Intrinsic stochastic error
- Binning of the measurement scale
- Random measurement noise
- Psychometric distortions
…
This is a basic Susceptible, Infected, Recovered (SIR) model. This model explores the spread of disease in a space. In particular, it explores how changing assumptions about the number of susceptible people, starting number of infected people, as well as the disease’s infection probability, and average duration of infection. The model shows that the interactions of agents can drastically affect the results of the model.
We used it in our course on COVID-19: https://www.csats.psu.edu/science-of-covid19
3.8 with Unis
The model simulates the spread of a virus through a synthetic network with a degree distribution calibrated on close-range contact data. The model is used to study the macroscopic consequences of cross-individual variability in close-range contact frequencies and to assess whether this variability can be exploited for effective intervention targeting high-contact nodes.
NetPlop is a presentation editor built entirely in NetLogo, an agent-based modelling environment. The NetPlop Editor includes a variety of tools to design slide decks, and the Viewer allows these decks to be dis-played to an enraptured audience. A key feature of NetPlop is the ability to embed agent-based models. NetPlop was developed for SIGBOVIK 2021.
If you have any questions about the model run, please send me an email and I will respond as soon as possible.
Under complex system perspectives, we build the multi-agent system to back-calculate this unification process of the Warring State period, from 32 states in 475 BC to 1 state (Qin) in 221 BC.
Inspired by the European project called GLODERS that thoroughly analyzed the dynamics of extortive systems, Bottom-up Adaptive Macroeconomics with Extortion (BAMERS) is a model to study the effect of extortion on macroeconomic aggregates through simulation. This methodology is adequate to cope with the scarce data associated to the hidden nature of extortion, which difficults analytical approaches. As a first approximation, a generic economy with healthy macroeconomics signals is modeled and validated, i.e., moderate inflation, as well as a reasonable unemployment rate are warranteed. Such economy is used to study the effect of extortion in such signals. It is worth mentioning that, as far as is known, there is no work that analyzes the effects of extortion on macroeconomic indicators from an agent-based perspective. Our results show that there is significant effects on some macroeconomics indicators, in particular, propensity to consume has a direct linear relationship with extortion, indicating that people become poorer, which impacts both the Gini Index and inflation. The GDP shows a marked contraction with the slightest presence of extortion in the economic system.
Displaying 10 of 1188 results for "Aad Kessler" clear search