CoMSES Net maintains cyberinfrastructure to foster FAIR data principles for access to and (re)use of computational models. Model authors can publish their model code in the Computational Model Library with documentation, metadata, and data dependencies and support these FAIR data principles as well as best practices for software citation. Model authors can also request that their model code be peer reviewed to receive a DOI. All users of models published in the library must cite model authors when they use and benefit from their code.
CoMSES Net also maintains a curated database of over 7500 publications of agent-based and individual based models with additional metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
This model was developed to study the combination of electric vehicles (EVs) and intermitten renewable energy sources. The model presents an EV fleet in a fictional area, divided into a residential area, an office area and commercial area. The area has renewable energy sources: wind and PV solar panels. The agents can be encouraged to charge their electric vehicles at times of renewable energy surplus by introducing different policy interventions. Other interesting variables in the model are the installed renewable energy sources, EV fleet composition and available charging infrastructure. Where possible, use emperical data as input for our model. We expand upon previous models by incorporating environmental self-identity and range anxiety as agent variables.
Our aim is to show effects of group living when only low-level cognition is assumed, such as pattern recognition needed for normal functioning, without assuming individuals have knowledge about others around them or warn them actively.
The model is of a group of vigilant foragers staying within a patch, under attack by a predator. The foragers use attentional scanning for predator detection, and flee after detection. This fleeing action constitutes a visual cue to danger, and can be received non-attentionally by others if it occurs within their limited visual field. The focus of this model is on the effectiveness of this non-attentional visual information reception.
A blind angle obstructing cue reception caused by behaviour can exist in front, morphology causes a blind angle in the back. These limitations are represented by two visual field shapes. The scan for predators is all-around, with distance-dependent detection; reception of flight cues is limited by visual field shape.
Initial parameters for instance: group sizes, movement, vision characteristics for predator detection and for cue reception. Captures (failure), number of times the information reached all individuals at the same time (All-fled, success), and several other effects of the visual settings are recorded.
In Western countries, the distribution of relative incomes within marriages tends to be skewed in a remarkable way. Husbands usually do not only earn more than their female partners, but there also is a striking discontinuity in their relative contributions to the household income at the 50/50 point: many wives contribute just a bit less than or as much as their husbands, but few contribute more. Our model makes it possible to study a social mechanism that might create this ‘cliff’: women and men differ in their incomes (even outside marriage) and this may differentially affect their abilities to find similar- or higher-income partners. This may ultimately contribute to inequalities within the households that form. The model and associated files make it possible to assess the merit of this mechanism in 27 European countries.
Trust between farmers and processors is a key factor in developing stable supply chains including “bottom of the pyramid”, small-scale farmers. This simulation studies a case with 10000 farmers.
This is an agent-based model, simulating wolf (Canis Lupus) reappearance in the Netherlands. The model’s purpose is to allow researchers to investigate the reappearance of wolves in the Netherlands and the possible effect of human interference. Wolf behaviour is modelled according to the literature. The suitability of the Dutch landscape for wolf settlement has been determined by Lelieveld (2012)  and is transformed into a colour-coded map of the Netherlands. The colour-coding is the main determinant of wolf settlement. Human involvement is modelled through the public opinion, which varies according to the size, composition and behaviour of the wolf population.
 Lelieveld, G.: Room for wolf comeback in the Netherlands, (2012).
The computer model simulates the development of a social network (i.e. formation of friendships and cliques), the (dyadic) interactions between pupils and the development of similarities and differences in their behavioral profiles.
The CONSERVAT model evaluates the effect of social influence among farmers in the Lake Naivasha basin (Kenya) on the spatiotemporal diffusion pattern of soil conservation effort levels and the resulting reduction in lake sedimentation.
This is a NetLogo version of Buhl et al.’s (2005) model of self-organised digging activity in ant colonies. It was built for a master’s course on self-organisation and its intended use is still educational. The ants’ behavior can easily be changed by toggling switches on the interface, or, for more advanced students, there is R code included allowing the model to be run and analysed through RNetLogo.
The model represents empirically observed recycling behaviour of Chinese citizens, based on the theory of reasoned action (TRA), the theory of planned behaviour (TPB) and the theory of planned behaviour extended with situational factors (TPB+).