Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 133 results Java clear
Emulation is one of the simplest and most common mechanisms of social interaction. In this paper we introduce a descriptive computational model that attempts to capture the underlying dynamics of social processes led by emulation.
We study three obstacles of the expansion of contract rice farming in the Mekong Delta (MKD) region. The failure of buyers in building trust-based relationship with small-holder farmers, unattractive offered prices from the contract farming scheme, and limited rice processing capacity have constrained contractors from participating in the large-scale paddy field program. We present an agent-based model to examine the viability of contract farming in the region from the contractor perspective.
The model focuses on financial incentives and trust, which affect the decision of relevant parties on whether to participate and honor a contract. The model is also designed in the context of the MKD’s rice supply chain with two contractors engaging in the contract rice farming scheme alongside an open market, in which both parties can renege on the agreement. We then evaluate the contractors’ performances with different combinations of scenarios related to the three obstacles.
Our results firstly show that a fully-equipped contractor who opportunistically exploits a relatively small proportion (less than 10%) of the contracted farmers in most instances can outperform spot market-based contractors in terms of average profit achieved for each crop. Secondly, a committed contractor who offers lower purchasing prices than the most typical rate can obtain better earnings per ton of rice as well as higher profit per crop. However, those contractors in both cases could not enlarge their contract farming scheme, since either farmers’ trust toward them decreases gradually or their offers are unable to compete with the benefits from a competitor or the spot market. Thirdly, the results are also in agreement with the existing literature that the contract farming scheme is not a cost-effective method for buyers with limited rice processing capacity, which is a common situation among the contractors in the MKD region.
We propose an agent-based model leading to a decrease or an increase of hostility between agents after a major cultural threat such as a terrorist attack. The model is inspired from the Terror Management Theory and the Social Judgement Theory. An agent has a cultural identity defined through its acceptance segments about each of three different cultural worldviews (i.e., Atheist, Muslim, Christian) of the considered society. An agent’s acceptance segment is composed from its acceptable positions toward a cultural worldview, including its most acceptable position. An agent forms an attitude about another agent depending on the similarity between their cultural identities. When a terrorist attack is perpetrated in the name of an extreme cultural identity, the negatively perceived agents from this extreme cultural identity point of view tend to decrease the width of their acceptance segments in order to differentiate themselves more from the threatening cultural identity
The purpose of the OMOLAND-CA is to investigate the adaptive capacity of rural households in the South Omo zone of Ethiopia with respect to variation in climate, socioeconomic factors, and land-use at the local level.
Model explains both the final state and the dynamics of the development process of the wine sector in the Małopolska region in Poland. Model admits heterogeneous agents (regular farms,large and small vineyards).
The model represents a set of social actors engaged into a collegiate (composed of representants of civil society and public sector) to manage the Southern Rural Territory of Sergipe (SRTS), created by two territorial public policies, the National Program for the Sustainable Development of Rural Territories (PRONAT) and the Program Territories of Citizenship (PTC) which aim at balancing power relations between social actors of Rural Territories. The main gola of these public policies is to empower the civil society engaged in the territory to enable them to negotiate with the traditional power (mainly majors). It was designed two models of the SRTS, one that represents the situation in 2012, and other that represents the social interdependencies in 2017. For each period it is possible to measure the capability and power of each modeled social actor and see whether it is observed the empowerment of the civil society or not.
Model of a very serious conflict about the relevance of a dam to impede its construction, between the client, the prime contractor, State, legalist opponents and activist opponents.
This model uses preference rankings w.r.t. ethnic group compositions (e.g. at companies) and assigns ethnic agents to groups based on their rankings.
A Repast Simphony model of interactions (conflict and cooperation) between states
Bayesian network is used to modelling the behavior of an individual level and multi-agent system is used to simulate the meme diffusion through the whole network.
Displaying 10 of 133 results Java clear