CoMSES Net maintains cyberinfrastructure to foster FAIR data principles for access to and (re)use of computational models. Model authors can publish their model code in the Computational Model Library with documentation, metadata, and data dependencies and support these FAIR data principles as well as best practices for software citation. Model authors can also request that their model code be peer reviewed to receive a DOI. All users of models published in the library must cite model authors when they use and benefit from their code.
CoMSES Net also maintains a curated database of over 7500 publications of agent-based and individual based models with additional metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
El modelo a continuación, fue desarrollado para el DATA CHALLENGE 2022. Es un análisis de la información descargada del Portal de datos abiertos de Ecuador. Dentro del modelo podemos realizar una breve exploración de la información así como una simulación respecto al proceso de vacunación en Ecuador.
Risk assessments are designed to measure cumulative risk and promotive factors for delinquency and recidivism, and are used by criminal and juvenile justice systems to inform sanctions and interventions. Yet, these risk assessments tend to focus on individual risk and often fail to capture each individual’s environmental risk. This agent-based model (ABM) explores the interaction of individual and environmental risk on the youth. The ABM is based on an interactional theory of delinquency and moves beyond more traditional statistical approaches used to study delinquency that tend to rely on point-in-time measures, and to focus on exploring the dynamics and processes that evolve from interactions between agents (i.e., youths) and their environments. Our ABM simulates a youth’s day, where they spend time in schools, their neighborhoods, and families. The youth has proclivities for engaging in prosocial or antisocial behaviors, and their environments have likelihoods of presenting prosocial or antisocial opportunities.
EMMIT is an end-user developed agent-based simulation of malaria transmission. The simulation’s development is a case study demonstrating an approach for non-technical investigators to easily develop useful simulations of complex public health problems. We focused on malaria transmission, a major global public health problem, and insecticide resistance (IR), a major problem affecting malaria control. Insecticides are used to reduce transmission of malaria caused by the Plasmodium parasite that is spread by the Anopheles mosquito. However, the emergence and spread of IR in a mosquito population can diminish the insecticide’s effectiveness. IR results from mutations that produce behavioral changes or biochemical changes (such as detoxification enhancement, target site alterations) in the mosquito population that provide resistance to the insecticide. Evolutionary selection for the IR traits reduces the effectiveness of an insecticide favoring the resistant mosquito population. It has been suggested that biopesticides, and specifically those that are Late Life Acting (LLA), could address this problem. LLA insecticides exploit Plasmodium’s approximate 10-day extrinsic incubation period in the mosquito vector, a delay that limits malaria transmission to older infected mosquitoes. Since the proposed LLA insecticide delays mosquito death until after the exposed mosquito has a chance to produce several broods of offspring, reducing the selective pressure for resistance, it delays IR development and gives the insecticide longer effectivity. Such insecticides are designed to slow the evolution of IR thus maintaining their effectiveness for malaria control. For the IR problem, EMMIT shows that an LLA insecticide could work as intended, but its operational characteristics are critical, primarily the mean-time-to-death after exposure and the associated standard deviation. We also demonstrate the simulation’s extensibility to other malaria control measures, including larval source control and policies to mitigate the spread of IR. The simulation was developed using NetLogo as a case study of a simple but useful approach to public health research.
This generic agent-based model simulates the evolution of agent’s opinions through their exchange of arguments.
The idea behind this model is to explicitly represent the process of mental deliberation of agents from arguments to an opinion, through the use of Dung’s argumentation framework complemented by a structured description of arguments. An application of the model on the diffusion of vegetarian diets is proposed.
PopComp by Andre Costopoulos 2020
Licence: DWYWWI (Do whatever you want with it)
I use Netlogo to build a simple environmental change and population expansion and diffusion model. Patches have a carrying capacity and can host two kinds of populations (APop and BPop). Each time step, the carrying capacity of each patch has a given probability of increasing or decreasing up to a maximum proportion.
Modeling an economy with stable macro signals, that works as a benchmark for studying the effects of the agent activities, e.g. extortion, at the service of the elaboration of public policies..
This model implements a Bayesian belief revision model that contrasts an ideal agent in possesion of true likelihoods, an agent using a fixed estimate of trusting its source of information, and an agent updating its trust estimate.
The General Housing Model demonstrates a basic housing market with bank lending, renters, owners and landlords. This model was developed as a base to which students contributed additional functions during Arizona State University’s 2020 Winter School: Agent-Based Modeling of Social-Ecological Systems.
This model is programmed in Python 3.6. We model how different consensus protocols and trade network topologies affect the performance of a blockchain system. The model consists of multiple trader and miner agents (Trader.py and Tx.py), and one system agent (System.py). We investigated three consensus protocols, namely proof-of-work (PoW), proof-of-stake (PoS), and delegated proof-of-stake (DPoS). We also examined three common trade network topologies: random, small-world, and scale-free. To reproduce our results, you may need to create some databases using, e.g., MySQL; or read and write some CSV files as model configurations.
Consumer agents make choices which products to choose using the consumat approach. In this approach agents will make choices using deliberation, repetition, imitation or social comparison dependent on the level of need satisfaction and uncertainty.
The model is discussed in Introduction to Agent-Based Modeling by Marco Janssen. For more information see https://intro2abm.com/