Computational Model Library

Displaying 10 of 1136 results for "Aad Kessler" clear search

REHAB has been designed as an ice-breaker in courses dealing with ecosystem management and participatory modelling. It helps introducing the two main tools used by the Companion Modelling approach, namely role-playing games and agent-based models.

This model simulates movements of mobile pastoralists and their impacts on the transmission of foot-and-mouth disease (FMD) in the Far North Region of Cameroon.

This model explores a social mechanism that links the reversal of the gender gap in education with changing patterns in relative divorce risks in 12 European countries.

The objective of the model is to evaluate the impact of seasonal forecasts on a farmer’s net agricultural income when their crop choices have different and variable costs and returns.

This model simulates the spread of anti-vaccine sentiments in cyber and physical space and how it creates emergence of clusters of anti-vacciners, which eventually lead to higher probablity of disease outbreaks.

We study the impact of endogenous creation and destruction of social ties in an artificial society on aggregate outcomes such as generalized trust, willingness to cooperate, social utility and economic performance. To this end we put forward a computational multi-agent model where agents of overlapping generations interact in a dynamically evolving social network. In the model, four distinct dimensions of individuals’ social capital: degree, centrality, heterophilous and homophilous interactions, determine their generalized trust and willingness to cooperate, altogether helping them achieve certain levels of social utility (i.e., utility from social contacts) and economic performance. We find that the stationary state of the simulated social network exhibits realistic small-world topology. We also observe that societies whose social networks are relatively frequently reconfigured, display relatively higher generalized trust, willingness to cooperate, and economic performance – at the cost of lower social utility. Similar outcomes are found for societies where social tie dissolution is relatively weakly linked to family closeness.

This model is an implementation of a predator-prey simulation using NetLogo programming language. It simulates the interaction between fish, lionfish, and zooplankton. Fish and lionfish are both represented as turtles, and they have their own energy level. In this simulation, lionfish eat fish, and fish eat zooplankton. Zooplankton are represented as green patches on the NetLogo world. Lionfish and fish can reproduce and gain energy by eating other turtles or zooplankton.

This model was created to help undergraduate students understand how simulation models might be helpful in addressing complex environmental problems. In this case, students were asked to use this model to make predictions about how the introduction of lionfish (considered an invasive species in some places) might alter the ecosystem.

HOW IT WORKS

This model consists of three agents, and each agent type operates per business theories as below.
a. New technologies(Tech): It evolves per sustaining or disruptive technology trajectory with the constraint of project management triangle (Scope, Time, Quality, and Cost).
b. Entrepreneurs(Entre): It builds up the solution by combining Tech components per its own strategy (Exploration, Exploitation, or Ambidex).
c. Consumer(Consumer): It selects the solution per its own preference due to Diffusion of innovation theory (Innovators, Early Adopters, Early Majority, Late Majority, Laggards)

This paper builds on a basic ABM for a revolution and adds a combination of behaviors to its agents such as military benefits, citizen’s grievances, geographic vision, empathy, personality type and media impact.

Displaying 10 of 1136 results for "Aad Kessler" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept