Computational Model Library

If you have any questions about the model run, please send me an email and I will respond as soon as possible.
Under complex system perspectives, we build the multi-agent system to back-calculate this unification process of the Warring State period, from 32 states in 475 BC to 1 state (Qin) in 221 BC.


zhuo zhang | Published Fri May 27 09:10:22 2022 | Last modified Sun May 29 16:24:00 2022

The model of Chinese and Western civilization patterns can help understand how civilizations formed, how they evolved by themselves, and the difference between the unity of China and the disunity of the Western. The previous research had examined historical phenomena about civilization patterns with subjective, static, local, and inductive methods. Therefore, we propose a general model of history dynamics for civilizations pattern, which contains both China and the West, to improve our understanding of civilization formation and the factors influencing the pattern of civilization. And at the same time, the model is used to find the boundary conditions of two different patterns.

Competitive Arousal Agent Based Model

Zoé Chollet | Published Fri May 13 14:10:35 2022

What is it?

This model demonstrates a very simple bidding market where buyers try to acquire a desired item at the best price in a competitive environment


Vinicius Marino Carvalho | Published Mon Apr 25 18:42:03 2022

ThomondSim is a simulation of the political and economic landscape of the medieval kingdom of Thomond, southwestern Ireland, between 1276 and 1318.

Its goal is to analyze how deteriorating environmental and economic conditions caused by the Little Ice Age (LIA), the Great European Famine of 1315-1322, and wars between England and Scotland affected the outcomes of a local war involving Gaelic and English aristocratic lineages.
This ABM attempts to model both the effects of devastation on the human environment and the modus operandi of late-medieval war and diplomacy.

The model is the digital counterpart of the science discovery board game The Triumphs of Turlough. Its procedures closely correspond to the game’s mechanics, to the point that ToT can be considered an interactive, analog version of this ABM.

Space colonization

allagonne | Published Wed Jan 5 18:11:56 2022

Agent-Based-Modeling - space colonization
ask me for the .nlogo model
The goal of this project is to simulate with NetLogo (v6.2) a space colonization of humans, starting from Earth, into the Milky Way.


The three-day participatory workshop organized by the TISSS Lab had 20 participants who were academics in different career stages ranging from university student to professor. For each of the five games, the participants had to move between tables according to some pre-specified rules. After the workshop both the participant’s perception of the games’ complexities and the participants’ satisfaction with the games were recorded.

In order to obtain additional objective measures for the games’ complexities, these games were also simulated using this simulation model here. Therefore, the simulation model is an as-accurate-as-possible reproduction of the workshop games: it has 20 participants moving between 5 different tables. The rules that specify who moves when vary from game to game. Just to get an idea, Game 3 has the rule: “move if you’re sitting next to someone who is waring white or no socks”.

An exact description of the workshop games and the associated simulation models can be found in the paper “The relation between perceived complexity and happiness with decision situations: searching for objective measures in social simulation games”.

In recent years we have seen multiple incidents with a large number of people injured and killed by one or more armed attackers. Since this type of violence is difficult to predict, detecting threats as early as possible allows to generate early warnings and reduce response time. In this context, any tool to check and compare different action protocols can be a further step in the direction of saving lives. Our proposal combines features from continuous and discrete models to obtain the best of both worlds in order to simulate large and crowded spaces where complex behavior individuals interact. With this proposal we aim to provide a tool for testing different security protocols under several emergency scenarios, where spaces, hazards, and population can be customized. Finally, we use a proof of concept implementation of this model to test specific security protocols under emergency situations for real spaces. Specifically, we test how providing some users of a university college with an app that informs about the type and characteristics of the ongoing hazard, affects in the safety performance.

Peer reviewed BAMERS: Macroeconomic effect of extortion

Alejandro Platas López Alejandro Guerra-Hernández | Published Mon Mar 23 16:32:53 2020 | Last modified Sun Jul 26 00:20:45 2020

Inspired by the European project called GLODERS that thoroughly analyzed the dynamics of extortive systems, Bottom-up Adaptive Macroeconomics with Extortion (BAMERS) is a model to study the effect of extortion on macroeconomic aggregates through simulation. This methodology is adequate to cope with the scarce data associated to the hidden nature of extortion, which difficults analytical approaches. As a first approximation, a generic economy with healthy macroeconomics signals is modeled and validated, i.e., moderate inflation, as well as a reasonable unemployment rate are warranteed. Such economy is used to study the effect of extortion in such signals. It is worth mentioning that, as far as is known, there is no work that analyzes the effects of extortion on macroeconomic indicators from an agent-based perspective. Our results show that there is significant effects on some macroeconomics indicators, in particular, propensity to consume has a direct linear relationship with extortion, indicating that people become poorer, which impacts both the Gini Index and inflation. The GDP shows a marked contraction with the slightest presence of extortion in the economic system.

The application of a smartphone application to register physical encounters between individuals is considered by public health authorities, as a means to reduce the number of infections in the 2020 COVID-19 pandemic. The general idea is that continuous registration of all other smartphones in the vicinity of an individual’s smartphone potentially enables early warning of the owners of the other smartphones, in case the individual is tested positive as infected. Those other individuals can then go into isolation and be considered for testing. The purpose of the present simulation is to explore the potential effects of this application on frequencies of infection, isolation, and positive and negative infection test results.

Our aim is to show effects of group living when only low-level cognition is assumed, such as pattern recognition needed for normal functioning, without assuming individuals have knowledge about others around them or warn them actively.
The model is of a group of vigilant foragers staying within a patch, under attack by a predator. The foragers use attentional scanning for predator detection, and flee after detection. This fleeing action constitutes a visual cue to danger, and can be received non-attentionally by others if it occurs within their limited visual field. The focus of this model is on the effectiveness of this non-attentional visual information reception.
A blind angle obstructing cue reception caused by behaviour can exist in front, morphology causes a blind angle in the back. These limitations are represented by two visual field shapes. The scan for predators is all-around, with distance-dependent detection; reception of flight cues is limited by visual field shape.
Initial parameters for instance: group sizes, movement, vision characteristics for predator detection and for cue reception. Captures (failure), number of times the information reached all individuals at the same time (All-fled, success), and several other effects of the visual settings are recorded.

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.