Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1180 results for "Aad Kessler" clear search
This study presents a System Dynamics (SD) model that explores the “trajectories of homelessness” among youth outside of the formal care system. Unlike traditional approaches that view runaway behavior as a discrete choice, this model reinterprets it as a neurobiological adaptation to chronic resource deprivation and systemic neglect.
The model incorporates key mechanisms such as ‘Allostatic Load’ accumulation, ‘PFC-Amygdala Switching’, and the ‘Iatrogenic Effects’ of shelter policies. It utilizes Monte Carlo simulations to demonstrate how structural factors create a “probabilistic vulnerability,” trapping youth in cycles of survival crime and isolation regardless of individual resilience.
The uploaded code includes a Python implementation of the model to ensure reproducibility of the stochastic analysis presented in the paper.
Using nodes from the 2002 General Social Survey sample, the code establishes a network of ties with a given homophily bias, and simulates Internet adoption rates in that network under three conditions: (i) no network externalities, (ii) general network externalities, where an individual’s reservation price is a function of the overall adoption rate in the network, (iii) specific network externalities, where reservation price is a function of the adoption rate in individual’s personal […]
The purpose of this model is to investigate mechanisms driving the geography of educational inequality and the consequences of these mechanisms for individuals with varying attributes and mobility.
The model reproduces the spread of environmental awareness among agents and the impact of awareness level of the agents on the consumption of a resource, like energy. An agent is a household with a set of available advanced smart metering functions.
The code contains four experiments for well-being based IMRL reward features.
This agent-based model explores the existence of positive feedback loops related to illegal, unregulated, unreported (IUU) fishing; the use of forced labor; and the depletion of fish populations due to commercial fishing.
We employ this spatially explicit agent-based model to begin to examine how time-averaging can affect the spatial scale of cultural similarity in archaeological assemblage data. The model was built to address this question: to what extent does time-averaging affect the scale of local spatial association in the relative frequency of the most prevalent cultural variant in an archaeological landscape?
The model represents migration of the green sea turtle, Chelonia mydas, between foraging and breeding sites in the Southwest Indian Ocean. The purpose of the model is to investigate the impact of local environmental conditions, including the quality of foraging sites and ocean currents, on emerging migratory corridors and reproductive output and to thereby identify conservation priority sites.
Corresponding article to found here: https://onlinelibrary.wiley.com/doi/epdf/10.1002/ece3.5552
This model aims to explore how gambling-like behavior can emerge in loot box spending within gaming communities. A loot box is a purchasable mystery box that randomly awards the player a series of in-game items. Since the contents of the box are largely up to chance, many players can fall into a compulsion loop of purchasing, as the fear of missing out and belief in the gambler’s fallacy allow one to rationalize repeated purchases, especially when one compares their own luck to others. To simulate this behavior, this model generates players in different network structures to observe how factors such as network connectivity, a player’s internal decision making strategy, or even common manipulations games use these days may influence a player’s transactions.
We use an agent-based 3D model to reveal the behavioral dynamics of real-world cases. The target of the simulation is the Peshawar massacre. The previous 2-D model has three main problems which can be solved by our 3-D model. Under the key action rules, our model matches the real target case exactly. Based on the optimal solution, we precisely match the results of the real cases, such as the number of deaths and injuries. We also explore the importance of adding height (constructed as a 3D model) to the model.
Displaying 10 of 1180 results for "Aad Kessler" clear search