Computational Model Library

Displaying 10 of 1139 results for "Ian M Hamilton" clear search

The simulation is a variant of the “ToRealSim OD variants - base v2.7” base model, which is based on the standard DW opinion dynamics model (but with the differences that rather than one agent per tick randomly influencing another, all agents randomly influence one other per tick - this seems to make no difference to the outcomes other than to scale simulation time). Influence can be made one-way by turning off the two-way? switch

Various additional variations and sources of noise are possible to test robustness of outcomes to these (compared to DW model).
In this version agent opinions change following the empirical data collected in some experiments (Takács et al 2016).

Such an algorithm leaves no role for the uncertainties in other OD models. [Indeed the data from (Takács et al 2016) indicates that there can be influence even when opinion differences are large - which violates a core assumption of these]. However to allow better comparison with other such models there is a with-un? switch which allows uncertainties to come into play. If this is on, then influence (according to above algorithm) is only calculated if the opinion difference is less than the uncertainty. If an agent is influenced uncertainties are modified in the same way as standard DW models.

Hybrid attacks coordinate the exploitation of vulnerabilities across domains to undermine trust in authorities and cause social unrest. Whilst such attacks have primarily been seen in active conflict zones, there is growing concern about the potential harm that can be caused by hybrid attacks more generally and a desire to discover how better to identify and react to them. In addressing such threats, it is important to be able to identify and understand an adversary’s behaviour. Game theory is the approach predominantly used in security and defence literature for this purpose. However, the underlying rationality assumption, the equilibrium concept of game theory, as well as the need to make simplifying assumptions can limit its use in the study of emerging threats. To study hybrid threats, we present a novel agent-based model in which, for the first time, agents use reinforcement learning to inform their decisions. This model allows us to investigate the behavioural strategies of threat agents with hybrid attack capabilities as well as their broader impact on the behaviours and opinions of other agents.

GRASP world

Gert Jan Hofstede | Published Tuesday, April 16, 2019

This agent-based model investigates group longevity in a population in a foundational way, using theory on social relations and culture. It is the first application of the GRASP meta-model for social agents, containing elements of Groups, Rituals, Affiliation, Status, and Power. It can be considered an exercise in artificial sociality: a culture-general, content-free base-line trust model from which to engage in more specific studies. Depending on cultural settings for individualism and power distance, as well as settings for xenophobia and for the increase of trust over group life, the GRASP world model generates a variety of patters. Number of groups ranges from one to many, composition from random to segregated, and pattern genesis from rapid to many hundreds of time steps. This makes GRASP world an instrument that plausibly models some basic elements of social structure in different societies.

HomininSpace

Fulco Scherjon | Published Friday, November 25, 2016 | Last modified Tuesday, October 06, 2020

A modelling system to simulate Neanderthal demography and distribution in a reconstructed Western Europe for the late Middle Paleolithic.

Digital Mobility Model (DMM)

Na (Richard) Jiang Fiammetta Brandajs | Published Thursday, February 01, 2024 | Last modified Friday, February 02, 2024

The purpose of the Digital Mobility Model (DMM) is to explore how a society’s adoption of digital technologies can impact people’s mobilities and immobilities within an urban environment. Thus, the model contains dynamic agents with different levels of digital technology skills, which can affect their ability to access urban services using digital systems (e.g., healthcare or municipal public administration with online appointment systems). In addition, the dynamic agents move within the model and interact with static agents (i.e., places) that represent locations with different levels of digitalization, such as restaurants with online reservation systems that can be considered as a place with a high level of digitalization. This indicates that places with a higher level of digitalization are more digitally accessible and easier to reach by individuals with higher levels of digital skills. The model simulates the interaction between dynamic agents and static agents (i.e., places), which captures how the gap between an individual’s digital skills and a place’s digitalization level can lead to the mobility or immobility of people to access different locations and services.

TeleABM

Yue Dou | Published Tuesday, December 10, 2019 | Last modified Wednesday, April 29, 2020

We construct a new type of agent-based model (ABM) that can simultaneously simulate land-use changes at multiple distant places (namely TeleABM, telecoupled agent-based model). We use soybean trade between Brazil and China as an example, where Brazil is the sending system and China is the receiving system because they are the world’s largest soybean exporter and importer respectively. We select one representative county in each country to calibrate and validate the model with spatio-temporal analysis of historical land-use changes and the empirical analysis of household survey data. The whole model is programmed on RePast Simphony. The most unique features of TeleABM are that it can simulate a telecoupled system and the flows between sending and receiving systems in this telecoupled system.

Modeling financial networks based on interpersonal trust

Michael Roos Anna Klabunde | Published Wednesday, May 29, 2013 | Last modified Thursday, November 28, 2013

We build a stylized model of a network of business angel investors and start-up entrepreneurs. Decisions are based on trust as a decision making tool under true uncertainty.

In recent years we have seen multiple incidents with a large number of people injured and killed by one or more armed attackers. Since this type of violence is difficult to predict, detecting threats as early as possible allows to generate early warnings and reduce response time. In this context, any tool to check and compare different action protocols can be a further step in the direction of saving lives. Our proposal combines features from continuous and discrete models to obtain the best of both worlds in order to simulate large and crowded spaces where complex behavior individuals interact. With this proposal we aim to provide a tool for testing different security protocols under several emergency scenarios, where spaces, hazards, and population can be customized. Finally, we use a proof of concept implementation of this model to test specific security protocols under emergency situations for real spaces. Specifically, we test how providing some users of a university college with an app that informs about the type and characteristics of the ongoing hazard, affects in the safety performance.

Expectation-Based Bayesian Belief Revision

C Merdes Momme Von Sydow Ulrike Hahn | Published Monday, June 19, 2017 | Last modified Monday, August 06, 2018

This model implements a Bayesian belief revision model that contrasts an ideal agent in possesion of true likelihoods, an agent using a fixed estimate of trusting its source of information, and an agent updating its trust estimate.

This theoretical model includes forested polygons and three types of agents: forest landowners, foresters, and peer leaders. Agent rules and characteristics were parameterized from existing literature and an empirical survey of forest landowners.

Displaying 10 of 1139 results for "Ian M Hamilton" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept