Computational Model Library

Displaying 10 of 133 results Java clear

A simple emulation-based computational model

Carlos Fernández-Márquez Francisco J Vázquez | Published Tuesday, May 21, 2013 | Last modified Tuesday, February 05, 2019

Emulation is one of the simplest and most common mechanisms of social interaction. In this paper we introduce a descriptive computational model that attempts to capture the underlying dynamics of social processes led by emulation.

We study three obstacles of the expansion of contract rice farming in the Mekong Delta (MKD) region. The failure of buyers in building trust-based relationship with small-holder farmers, unattractive offered prices from the contract farming scheme, and limited rice processing capacity have constrained contractors from participating in the large-scale paddy field program. We present an agent-based model to examine the viability of contract farming in the region from the contractor perspective.

The model focuses on financial incentives and trust, which affect the decision of relevant parties on whether to participate and honor a contract. The model is also designed in the context of the MKD’s rice supply chain with two contractors engaging in the contract rice farming scheme alongside an open market, in which both parties can renege on the agreement. We then evaluate the contractors’ performances with different combinations of scenarios related to the three obstacles.

Our results firstly show that a fully-equipped contractor who opportunistically exploits a relatively small proportion (less than 10%) of the contracted farmers in most instances can outperform spot market-based contractors in terms of average profit achieved for each crop. Secondly, a committed contractor who offers lower purchasing prices than the most typical rate can obtain better earnings per ton of rice as well as higher profit per crop. However, those contractors in both cases could not enlarge their contract farming scheme, since either farmers’ trust toward them decreases gradually or their offers are unable to compete with the benefits from a competitor or the spot market. Thirdly, the results are also in agreement with the existing literature that the contract farming scheme is not a cost-effective method for buyers with limited rice processing capacity, which is a common situation among the contractors in the MKD region.

Resisting hostility

Sylvie Huet | Published Thursday, December 20, 2018

We propose an agent-based model leading to a decrease or an increase of hostility between agents after a major cultural threat such as a terrorist attack. The model is inspired from the Terror Management Theory and the Social Judgement Theory. An agent has a cultural identity defined through its acceptance segments about each of three different cultural worldviews (i.e., Atheist, Muslim, Christian) of the considered society. An agent’s acceptance segment is composed from its acceptable positions toward a cultural worldview, including its most acceptable position. An agent forms an attitude about another agent depending on the similarity between their cultural identities. When a terrorist attack is perpetrated in the name of an extreme cultural identity, the negatively perceived agents from this extreme cultural identity point of view tend to decrease the width of their acceptance segments in order to differentiate themselves more from the threatening cultural identity

The purpose of the OMOLAND-CA is to investigate the adaptive capacity of rural households in the South Omo zone of Ethiopia with respect to variation in climate, socioeconomic factors, and land-use at the local level.

Model explains both the final state and the dynamics of the development process of the wine sector in the Małopolska region in Poland. Model admits heterogeneous agents (regular farms,large and small vineyards).

The model represents a set of social actors engaged into a collegiate (composed of representants of civil society and public sector) to manage the Southern Rural Territory of Sergipe (SRTS), created by two territorial public policies, the National Program for the Sustainable Development of Rural Territories (PRONAT) and the Program Territories of Citizenship (PTC) which aim at balancing power relations between social actors of Rural Territories. The main gola of these public policies is to empower the civil society engaged in the territory to enable them to negotiate with the traditional power (mainly majors). It was designed two models of the SRTS, one that represents the situation in 2012, and other that represents the social interdependencies in 2017. For each period it is possible to measure the capability and power of each modeled social actor and see whether it is observed the empowerment of the civil society or not.

Interplay of actors about the construction of a dam

Christophe Sibertin-Blanc | Published Monday, December 05, 2016 | Last modified Wednesday, May 09, 2018

Model of a very serious conflict about the relevance of a dam to impede its construction, between the client, the prime contractor, State, legalist opponents and activist opponents.

Group assortment with preference rankings

Fredrik Jansson | Published Thursday, July 14, 2016 | Last modified Monday, April 09, 2018

This model uses preference rankings w.r.t. ethnic group compositions (e.g. at companies) and assigns ethnic agents to groups based on their rankings.

Cyberworld 1

Dmitry Brizhinev Nathan Ryan Roger Bradbury | Published Thursday, April 23, 2015 | Last modified Sunday, February 25, 2018

A Repast Simphony model of interactions (conflict and cooperation) between states

BN intervention model

Di Wang | Published Wednesday, July 13, 2011 | Last modified Saturday, April 27, 2013

Bayesian network is used to modelling the behavior of an individual level and multi-agent system is used to simulate the meme diffusion through the whole network.

Displaying 10 of 133 results Java clear

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept