Computational Model Library

The model is designed to analyse the effects of mitigation measures on the European brown hare (Lepus europaeus), which is directly affected by ongoing land use change and has experienced widespread decline throughout Europe since the 1960s. As an input, we use two 4×4 km large model landscapes, which were generated by a landscape generator based on real field sizes and crop proportions and differed in average field size and crop composition. The crops grown annually are evaluated in terms of forage suitability, breeding suitability and crop richness for the hare. Six mitigation scenarios are implemented, defined by a 10 % increase in: (1) mixed silphie, (2) miscanthus, (3) grass-clover ley, (4) alfalfa, (5) set-aside, and (6) general crop richness. The model shows that that both landscape configuration and composition have a significant effect on hare population development, which responds particularly strongly to compositional changes.

This model simulates different seeding strategies for information diffusion in a social network adjusted to a case study area in rural Zambia. It systematically evaluates different criteria for seed selection (centrality measures and hierarchy), number of seeds, and interaction effects between seed selection criteria and set size.

Last Mile Commuter Behavior Model

Moira Zellner Dean Massey Yoram Shiftan Jonathan Levine Maria Arquero | Published Fri Nov 7 19:47:59 2014 | Last modified Fri Nov 7 19:53:35 2014

We represent commuters and their preferences for transportation cost, time and safety. Agents assess their options via their preferences, their environment, and the modes available. The model has policy levers to test impact on last-mile problem.

Vulnerability of Cooperation Due to Limited Vision

Marco Janssen | Published Thu Dec 2 23:00:56 2010 | Last modified Sat Apr 27 20:18:53 2013

This model describes the consequences of limited vision of agents in harvesting a common resource. We show the vulnerability of cooperation due to reduced visibility of the resource and other agents.

We provide a full description of the model following the ODD protocol (Grimm et al. 2010) in the attached document. The model is developed in NetLogo 5.0 (Wilenski 1999).

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.