CoMSES Net maintains cyberinfrastructure to foster FAIR data principles for access to and (re)use of computational models. Model authors can publish their model code in the Computational Model Library with documentation, metadata, and data dependencies and support these FAIR data principles as well as best practices for software citation. Model authors can also request that their model code be peer reviewed to receive a DOI. All users of models published in the library must cite model authors when they use and benefit from their code.
CoMSES Net also maintains a curated database of over 7500 publications of agent-based and individual based models with additional metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
The purpose of the model is to explore how processes associated with compliance across different fishery actors’ social groups interplay with their acceptance of a fishery intervention, herein periodic closures of a small-scale octopus fishery. The model agents, entities and processes are designed based on stylized facts from literature and expert workshops on periodic closures in the Western Indian Ocean region, as well as fieldwork from Zanzibari villages that have implemented periodic octopus closures. The model is designed for scientists and decision-makers that are interested in understanding the complex interplay between fishers from different social groups, herein foot fisher men, foot fisher women and male skin divers or free divers within the periodic closure of an octopus species. Including various actions resulting from the restrictions, that is - opportunities that may be presented from restricting fishing in certain areas and during certain times. We are soon publishing an updated model with individual octopuses and their movement behaviors.
We develop an IBM that predicts how interactions between elephants, poachers, and law enforcement affect poaching levels within a virtual protected area. The model is theoretical at this stage and is not meant to provide a realistic depiction of poaching, but instead to demonstrate how IBMs can expand upon the existing modelling work done in this field, and to provide a framework for future research. The model could be further developed into a useful management support tool to predict the outcomes of various poaching mitigation strategies at real-world locations. The model was implemented in NetLogo version 6.1.0.
We first compared a scenario in which poachers have prescribed, non-adaptive decision-making and move randomly across the landscape, to one in which poachers adaptively respond to their memories of elephant locations and where other poachers have been caught by law enforcement. We then compare a situation in which ranger effort is distributed unevenly across the protected area to one in which rangers patrol by adaptively following elephant matriarchal herds.