Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 5 of 975 results for "J Van Der Beek" clear search
Simulation to replicate and extend an analytical model (Konrad & Skaperdas, 2010) of the provision of security as a collective good. We simulate bandits preying upon peasants in an anarchy condition.
Digital social networks facilitate the opinion dynamics and idea flow and also provide reliable data to understand these dynamics. Public opinion and cooperation behavior are the key factors to determine the capacity of a successful and effective public policy. In particular, during the crises, such as the Corona virus pandemic, it is necessary to understand the people’s opinion toward a policy and the performance of the governance institutions. The problem of the mathematical explanation of the human behaviors is to simplify and bypass some of the essential process. To tackle this problem, we adopted a data-driven strategy to extract opinion and behavioral patterns from social media content to reflect the dynamics of society’s average beliefs toward different topics. We extracted important subtopics from social media contents and analyze the sentiments of users at each subtopic. Subsequently, we structured a Bayesian belief network to demonstrate the macro patters of the beliefs, opinions, information and emotions which trigger the response toward a prospective policy. We aim to understand the factors and latent factors which influence the opinion formation in the society. Our goal is to enhance the reality of the simulations. To capture the dynamics of opinions at an artificial society we apply agent-based opinion dynamics modeling. We intended to investigate practical implementation scenarios of this framework for policy analysis during Corona Virus Pandemic Crisis. The implemented modular modeling approach could be used as a flexible data-driven policy making tools to investigate public opinion in social media. The core idea is to put the opinion dynamics in the wider contexts of the collective decision-making, data-driven policy-modeling and digital democracy. We intended to use data-driven agent-based modeling as a comprehensive analysis tools to understand the collective opinion dynamics and decision making process on the social networks and uses this knowledge to utilize network-enabled policy modeling and collective intelligence platforms.
Criminal organizations operate in complex changing environments. Being flexible and dynamic allows criminal networks not only to exploit new illicit opportunities but also to react to law enforcement attempts at disruption, enhancing the persistence of these networks over time. Most studies investigating network disruption have examined organizational structures before and after the arrests of some actors but have disregarded groups’ adaptation strategies.
MADTOR simulates drug trafficking and dealing activities by organized criminal groups and their reactions to law enforcement attempts at disruption. The simulation relied on information retrieved from a detailed court order against a large-scale Italian drug trafficking organization (DTO) and from the literature.
The results showed that the higher the proportion of members arrested, the greater the challenges for DTOs, with higher rates of disrupted organizations and long-term consequences for surviving DTOs. Second, targeting members performing specific tasks had different impacts on DTO resilience: targeting traffickers resulted in the highest rates of DTO disruption, while targeting actors in charge of more redundant tasks (e.g., retailers) had smaller but significant impacts. Third, the model examined the resistance and resilience of DTOs adopting different strategies in the security/efficiency trade-off. Efficient DTOs were more resilient, outperforming secure DTOs in terms of reactions to a single, equal attempt at disruption. Conversely, secure DTOs were more resistant, displaying higher survival rates than efficient DTOs when considering the differentiated frequency and effectiveness of law enforcement interventions on DTOs having different focuses in the security/efficiency trade-off.
Overall, the model demonstrated that law enforcement interventions are often critical events for DTOs, with high rates of both first intention (i.e., DTOs directly disrupted by the intervention) and second intention (i.e., DTOs terminating their activities due to the unsustainability of the intervention’s short-term consequences) culminating in dismantlement. However, surviving DTOs always displayed a high level of resilience, with effective strategies in place to react to threatening events and to continue drug trafficking and dealing.
The model measures drivers of effectiveness of risk assessments in risk workshops where a calculative culture of quantitative skepticism is present. We model the limits to information transfer, incomplete discussions, group characteristics, and interaction patterns and investigate their effect on risk assessment in risk workshops, in order to contrast results to a previous model focused on a calculative culture of quantitative enthusiasm.
The model simulates a discussion in the context of a risk workshop with 9 participants. The participants use constraint satisfaction networks to assess a given risk individually and as a group.
This is the code for the model described in an article in the International Journal of Microsimulation. Lawson (2013) ‘Modelling Household Spending Using a Random Assignment Scheme’, International Journal of Microsimulation, 6(2) Autumn 2013, 56-75.
Displaying 5 of 975 results for "J Van Der Beek" clear search