Computational Model Library

Displaying 10 of 962 results for "Rolf Anker Ims" clear search

The purpose of this curricular model is to teach students the basics of modeling complex systems using agent-based modeling. It is a simple SIR model that simulates how a disease spreads through a population as its members change from susceptible to infected to recovered and then back to susceptible. The dynamics of the model are such that there are multiple emergent outcomes depending on the parameter settings, initial conditions, and chance.

The curricular model can be used with the chapter Agent-Based Modeling in Mixed Methods Research (Moritz et al. 2022) in the Handbook of Teaching Qualitative & Mixed Methods (Ruth et al. 2022).

The instructional videos can be accessed on YouTube: Video 1 (https://youtu.be/32_JIfBodWs); Video 2 (https://youtu.be/0PK_zVKNcp8); and Video 3 (https://youtu.be/0bT0_mYSAJ8).

Human Resource Management Parameter Experimentation Tool

Carmen Iasiello | Published Thursday, May 07, 2020 | Last modified Thursday, February 25, 2021

The agent based model presented here is an explicit instantiation of the Two-Factor Theory (Herzberg et al., 1959) of worker satisfaction and dissatisfaction. By utilizing agent-based modeling, it allows users to test the empirically found variations on the Two-Factor Theory to test its application to specific industries or organizations.

Iasiello, C., Crooks, A.T. and Wittman, S. (2020), The Human Resource Management Parameter Experimentation Tool, 2020 International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation, Washington DC.

Thermostat II

María Pereda Jesús M Zamarreño | Published Thursday, June 12, 2014 | Last modified Monday, June 16, 2014

A thermostat is a device that allows to have the temperature in a room near a desire value.

Lewis' Signaling Chains

Giorgio Gosti | Published Wednesday, January 14, 2015 | Last modified Friday, April 03, 2015

Signaling chains are a special case of Lewis’ signaling games on networks. In a signaling chain, a sender tries to send a single unit of information to a receiver through a chain of players that do not share a common signaling system.

We develop an IBM that predicts how interactions between elephants, poachers, and law enforcement affect poaching levels within a virtual protected area. The model is theoretical at this stage and is not meant to provide a realistic depiction of poaching, but instead to demonstrate how IBMs can expand upon the existing modelling work done in this field, and to provide a framework for future research. The model could be further developed into a useful management support tool to predict the outcomes of various poaching mitigation strategies at real-world locations. The model was implemented in NetLogo version 6.1.0.

We first compared a scenario in which poachers have prescribed, non-adaptive decision-making and move randomly across the landscape, to one in which poachers adaptively respond to their memories of elephant locations and where other poachers have been caught by law enforcement. We then compare a situation in which ranger effort is distributed unevenly across the protected area to one in which rangers patrol by adaptively following elephant matriarchal herds.

Hybrid attacks coordinate the exploitation of vulnerabilities across domains to undermine trust in authorities and cause social unrest. Whilst such attacks have primarily been seen in active conflict zones, there is growing concern about the potential harm that can be caused by hybrid attacks more generally and a desire to discover how better to identify and react to them. In addressing such threats, it is important to be able to identify and understand an adversary’s behaviour. Game theory is the approach predominantly used in security and defence literature for this purpose. However, the underlying rationality assumption, the equilibrium concept of game theory, as well as the need to make simplifying assumptions can limit its use in the study of emerging threats. To study hybrid threats, we present a novel agent-based model in which, for the first time, agents use reinforcement learning to inform their decisions. This model allows us to investigate the behavioural strategies of threat agents with hybrid attack capabilities as well as their broader impact on the behaviours and opinions of other agents.

Absorption of particulate matter by leafs

Georg Jäger Chiara Letter | Published Monday, November 12, 2018 | Last modified Monday, November 12, 2018

This model aims to understand the interaction between particulate matter and leaves of trees. The particles collide with the leaf and can either be absorbed with a certain probability, otherwise they bounce off it. The absorptions are detected in a counter.
The movement of the particles depends mainly on the strength and direction of the wind and the air temperature. They also show a certain random movement, but the proportion is negligible.
In a collision with the leaf, the particles are absorbed with a certain probability (absorption-probability), otherwise repelled.

The model aims at reproducing the evolution of the land-use in an agricultural territory at the plot scale. It enables to simulate the affectation of land-use, the crop rotation and technical operations for each plot of the different farms of the territory. It allows as well for crop farms to simulate the daily state of plots (sowed, plowed, harvested, biomass indicator). The model is used as an input for the water pollution model allowing to determine the flow of nitrate, phosphorus and suspended matter in the territory according to the landscape configuration.

The BASAR model aims to investigate different approaches to describe small-scale farmers’ decision-making in the context of diversified agroforestry adoption in rural Rwanda. Thereby, it compares random behaviour with perfect rationality (non-discounted and discounted utility maximization), bounded rationality (satisficing and fast and frugal decision tree heuristics), Theory of Planned Behaviour, and a probabilistic regression-based approach. It is aimed at policy-makers, extension agents, and cooperatives to better understand how rural farmers decide about implementing innovative agricultural practices such as agroforestry and at modelers to support them in selecting an approach to represent human decision-making in ABMs of Social-Ecological Systems. The overall objective is to identify a suitable approach to describe human decision-making and therefore improve forecasts of adoption rates and support the development and implementation of interventions that aim to raise low adoption rates.

Peer reviewed A Computational Simulation for Task Allocation Influencing Performance in the Team System

Shaoni Wang | Published Friday, November 11, 2022 | Last modified Thursday, April 06, 2023

This model system aims to simulate the whole process of task allocation, task execution and evaluation in the team system through a feasible method. On the basis of Complex Adaptive Systems (CAS) theory and Agent-based Modelling (ABM) technologies and tools, this simulation system attempts to abstract real-world teams into MAS models. The author designs various task allocation strategies according to different perspectives, and the interaction among members is concerned during the task-performing process. Additionally, knowledge can be acquired by such an interaction process if members encounter tasks they cannot handle directly. An artificial computational team is constructed through ABM in this simulation system, to replace real teams and carry out computational experiments. In all, this model system has great potential for studying team dynamics, and model explorers are encouraged to expand on this to develop richer models for research.

Displaying 10 of 962 results for "Rolf Anker Ims" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept