Computational Model Library

Displaying 10 of 129 results evolution clear search

The Regional Security Game is a iterated public goods game with punishement based on based on life sciences work by Boyd et al. (2003 ) and Hintze & Adami (2015 ), with modifications appropriate for an international relations setting. The game models a closed regional system in which states compete over the distribution of common security benefits. Drawing on recent work applying cultural evolutionary paradigms in the social sciences, states learn through imitation of successful strategies rather than making instrumentally rational choices. The model includes the option to fit empirical data to the model, with two case studies included: Europe in 1933 on the verge of war and south-east Asia in 2013.

Potato late blight model

Francine Pacilly | Published Friday, April 13, 2018

The purpose of the model is to simulate the spatial dynamics of potato late blight to analyse whether resistant varieties can be used effectively for sustainable disease control. The model represents an agricultural landscape with potato fields and data of a Dutch agricultural region is used as input for the model. We simulated potato production, disease spread and pathogen evolution during the growing season (April to September) for 36 years. Since late blight development and crop growth is weather dependent, measured weather data is used as model input. A susceptible and late blight resistant potato variety are distinguished. The resistant variety has a potentially lower yield but cannot get infected with the disease. However, during the growing season virulent spores can emerge as a result of mutations during spore production. This new virulent strain is able to infect the resistant fields, resulting in resistance breakdown. The model shows how disease severity, resistance durability and potato yield are affected by the fraction of fields across a landscape with a disease-resistant potato variety.

Peer reviewed Population Genetics

Kristin Crouse | Published Thursday, February 08, 2018 | Last modified Wednesday, September 09, 2020

This model simulates the mechanisms of evolution, or how allele frequencies change in a population over time.

Peer reviewed Dawkins Weasel

Kristin Crouse | Published Thursday, February 08, 2018 | Last modified Tuesday, February 04, 2020

Dawkins’ Weasel is a NetLogo model that illustrates the principle of evolution by natural selection. It is inspired by a thought experiment presented by Richard Dawkins in his book The Blind Watchmaker (1996).

Simulating the evolution of the human family

Paul Smaldino | Published Wednesday, November 29, 2017

The (cultural) evolution of cooperative breeding in harsh environments.

ACT: Agent-based model of Critical Transitions

Igor Nikolic Oscar Kraan Steven Dalderop Gert Jan Kramer | Published Wednesday, October 18, 2017 | Last modified Monday, August 27, 2018

ACT is an ABM based on an existing conceptualisation of the concept of critical transitions applied to the energy transition. With the model we departed from the mean-field approach simulated relevant actor behaviour in the energy transition.

Our societal belief systems are pruned by evolution, informing our unsustainable economies. This is one of a series of models exploring the dynamics of sustainable economics – PSoup, ModEco, EiLab, OamLab, MppLab, TpLab, CmLab.

00 PSoup V1.22 – Primordial Soup

Garvin Boyle | Published Thursday, April 13, 2017

PSoup is an educational program in which evolution is demonstrated, on the desk-top, as you watch. Blind bugs evolve sophisticated heuristic search algorithms to be the best at finding food fast.

This is an agent-based model that simulates the structural evolution in food supply chain.

A spatial prisoner’s dilemma model with mobile agents, de-coupled birth-death events, and harsh environments.

Displaying 10 of 129 results evolution clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept