Computational Model Library

Displaying 10 of 525 results for "Jingjing Cai" clear search

The model explores the emergence of inequality in cognitive and socio-emotional skills at the societal level within and across generations that results from differences in parental investment behavior during childhood and adolescence.

Objective of our model is to simulate the emergence and operation of a technological niches (TN) in terms of actors’ interaction. A TN can be conceived as protected socio-economic space where radical innovations are developed and tested

We demonstrate how Repast Simphony statecharts can efficiently encapsulate the deep classification hierarchy of the U.S. Air Force for manpower life cycle costing.

Transitions between homophilic and heterophilic modes of cooperation

Genki Ichinose | Published Sunday, June 14, 2015 | Last modified Sunday, November 14, 2021

In our model, individual agents are distributed over a two-dimensional square lattice. The agents play the prisoner’s dilemma game with their neighbors, imitate the highest strategy, and then migrate to empty sites based on their tag preference.

HomininSpace

Fulco Scherjon | Published Friday, November 25, 2016 | Last modified Tuesday, October 06, 2020

A modelling system to simulate Neanderthal demography and distribution in a reconstructed Western Europe for the late Middle Paleolithic.

This generic model simulates climate change adaptation in the form of resistance, accommodation, and retreat in coastal regions vulnerable to sea level rise and flooding. It tracks how population changes as households retreat to higher ground.

RaMDry - Rangeland Model in Drylands

Pascal Fust Eva Schlecht | Published Friday, January 05, 2018 | Last modified Friday, April 01, 2022

RaMDry allows to study the dynamic use of forage ressources by herbivores in semi-arid savanna with an emphasis on effects of change of climate and management. Seasonal dynamics affects the amount and the nutritional values of the available forage.

We develop an IBM that predicts how interactions between elephants, poachers, and law enforcement affect poaching levels within a virtual protected area. The model is theoretical at this stage and is not meant to provide a realistic depiction of poaching, but instead to demonstrate how IBMs can expand upon the existing modelling work done in this field, and to provide a framework for future research. The model could be further developed into a useful management support tool to predict the outcomes of various poaching mitigation strategies at real-world locations. The model was implemented in NetLogo version 6.1.0.

We first compared a scenario in which poachers have prescribed, non-adaptive decision-making and move randomly across the landscape, to one in which poachers adaptively respond to their memories of elephant locations and where other poachers have been caught by law enforcement. We then compare a situation in which ranger effort is distributed unevenly across the protected area to one in which rangers patrol by adaptively following elephant matriarchal herds.

Digital divide and opinion formation

Dongwon Lim | Published Friday, November 02, 2012 | Last modified Monday, May 20, 2013

This model extends the bounded confidence model of Deffuant and Weisbuch. It introduces online contexts in which a person can deliver his or her opinion to several other persons. There are 2 additional parameters accessibility and connectivity.

This model was designed to study resilience in organizations. Inspired by ethnographic work, it follows the simple goal to understand whether team structure affects the way in which tasks are performed. In so doing, it compares the ‘hybrid’ data-inspired structure with three more traditional structures (i.e. hierarchy, flexible/relaxed hierarchy, and anarchy/disorganization).

Displaying 10 of 525 results for "Jingjing Cai" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept