Computational Model Library

Displaying 10 of 23 results survival clear

Criminal organizations operate in complex changing environments. Being flexible and dynamic allows criminal networks not only to exploit new illicit opportunities but also to react to law enforcement attempts at disruption, enhancing the persistence of these networks over time. Most studies investigating network disruption have examined organizational structures before and after the arrests of some actors but have disregarded groups’ adaptation strategies.
MADTOR simulates drug trafficking and dealing activities by organized criminal groups and their reactions to law enforcement attempts at disruption. The simulation relied on information retrieved from a detailed court order against a large-scale Italian drug trafficking organization (DTO) and from the literature.
The results showed that the higher the proportion of members arrested, the greater the challenges for DTOs, with higher rates of disrupted organizations and long-term consequences for surviving DTOs. Second, targeting members performing specific tasks had different impacts on DTO resilience: targeting traffickers resulted in the highest rates of DTO disruption, while targeting actors in charge of more redundant tasks (e.g., retailers) had smaller but significant impacts. Third, the model examined the resistance and resilience of DTOs adopting different strategies in the security/efficiency trade-off. Efficient DTOs were more resilient, outperforming secure DTOs in terms of reactions to a single, equal attempt at disruption. Conversely, secure DTOs were more resistant, displaying higher survival rates than efficient DTOs when considering the differentiated frequency and effectiveness of law enforcement interventions on DTOs having different focuses in the security/efficiency trade-off.
Overall, the model demonstrated that law enforcement interventions are often critical events for DTOs, with high rates of both first intention (i.e., DTOs directly disrupted by the intervention) and second intention (i.e., DTOs terminating their activities due to the unsustainability of the intervention’s short-term consequences) culminating in dismantlement. However, surviving DTOs always displayed a high level of resilience, with effective strategies in place to react to threatening events and to continue drug trafficking and dealing.

Peer reviewed Credit and debt market of low-income families

Márton Gosztonyi | Published Tuesday, December 12, 2023 | Last modified Friday, January 19, 2024

The purpose of the Credit and debt market of low-income families model is to help the user examine how the financial market of low-income families works.

The model is calibrated based on real-time data which was collected in a small disadvantaged village in Hungary it contains 159 households’ social network and attributes data.
The simulation models the households’ money liquidity, expenses and revenue structures as well as the formal and informal loan institutions based on their network connections. The model forms an intertwined system integrated in the families’ local socioeconomic context through which families handle financial crises and overcome their livelihood challenges from one month to another.
The simulation-based on the abstract model of low-income families’ financial survival system at the bottom of the pyramid, which was described in following the papers:

The western honey bee Apis mellifera is the most important pollinator in the world. The biggest threat to managed honey bees is the ectoparasitic mite Varroa destructor and the viruses DWV (Deformed Wing Virus) and APV (Acute Paralysis Virus) it transmits. Untreated honey bee colonies are expected to die within one to three years. This led to the development of strategies for beekeepers to control the Varroa mite in honey bee colonies and ensure the health and survival of their bee colonies, so called Good Beekeeping Practice. The aim of the extension of BEEHAVE was to represent the Good Beekeeping Practice of Varroa control in Germany. The relevant measures within the Varroa control strategies are drone brood removal as a Varroa trap and the treatment of bee colonies with organic acaricides (formic and oxalic acid) to kill the mites. This extension improves BEEHAVE and builds a bridge between beekeepers in practice and in the modelling world. It vastly contributes to the future use of BEEHAVE in beekeeping education in Germany.

This model is intended to support oak tree management by representing the dynamics of oaks in multiple life stages and their competitors and consumers. This is implemented using a differential equation-based theoretical model representing three life stages of oaks: seedlings, juveniles, and adults. It includes the population dynamics of seedlings transitioning to juveniles, juveniles to adults, and adults producing new seedlings, as well as survival rates for each of the stages. It also includes a model of competition for light and water within seedlings and between seedlings and annual grasses. Finally, there is a predation term representing herbivores eating seedlings and grasses, using a Holling Type II (satiating) response with interference for predators and a death rate which depends on the resource extraction rate.

This is the full repository to run the survival analysis (in R) and run the population viability model and its analysis (NetLogo + R) of the Northern Bald Ibis (NBI) presented in the study

On the road to self-sustainability: Reintroduced migratory European Northern Bald Ibises (Geronticus eremita) still need management interventions for population viability

by Sinah Drenske, Viktoriia Radchuk, Cédric Scherer, Corinna Esterer, Ingo Kowarik, Johannes Fritz, Stephanie Kramer-Schadt

Retail Competition Agent-based Model

Jiaxin Zhang Derek Robinson | Published Sunday, January 03, 2021 | Last modified Wednesday, November 10, 2021

The Retail Competition Agent-based Model (RC-ABM) is designed to simulate the retail competition system in the Region of Waterloo, Ontario, Canada, which which explicitly represents store competition behaviour. Through the RC-ABM, we aim to answer 4 research questions: 1) What is the level of correspondence between market share and revenue acquisition for an agent-based approach compared to a traditional location-allocation-based approach? 2) To what degree can the observed store spatial pattern be reproduced by competition? 3) To what degree are their path dependent patterns of retail success? 4) What is the relationship between retail survival and the endogenous geographic characteristics of stores and consumer expenditures?

The purpose of the model is to explore the influence of the design of circular business models (CBMs) on CBM viability. The model represents an Industrial Symbiosis Network (ISN) in which a processor uses the organic waste from suppliers to produce biogas and nutrient rich digestate for local reuse. CBM viability is expressed as value captured (e.g., cash flow/tonne waste/agent) and the survival of the network over time (shown in the interface).

In the model, the value captured is calculated relative to the initial state, using incineration costs as a benchmark. Moderating variables are interactions with the waste incinerator and actor behaviour factors. Actors may leave the network when the waste supply for local production is too low, or when personal economic benefits are too low. When the processor decides to leave, the network fails. Theory of planned behaviour can be used to include agent behaviour in the simulations.

Peer reviewed Industrial Symbiosis Network implementation ABM

Kasper Pieter Hendrik Lange Gijsbert Korevaar Igor Nikolic Paulien Herder | Published Tuesday, December 01, 2020 | Last modified Wednesday, June 16, 2021

The purpose of the model is to explore the influence of actor behaviour, combined with environment and business model design, on the survival rates of Industrial Symbiosis Networks (ISN), and the cash flows of the agents. We define an ISN to be robust, when it is able to run for 10 years, without falling apart due to leaving agents.

The model simulates the implementation of local waste exchange collaborations for compost production, through the ISN implementation stages of awareness, planning, negotiation, implementation, and evaluation.

One central firm plays the role of waste processor in a local composting initiative. This firm negotiates with other firms to become a supplier of their organic residual streams. The waste suppliers in the model can decide to join the initiative, or to have the waste brought to the external waste incinerator. The focal point of the model are the company-level interactions during the implementation or ending of synergies.

Change and Senescence

André Martins | Published Tuesday, November 10, 2020

Agers and non-agers agent compete over a spatial landscape. When two agents occupy the same grid, who will survive is decided by a random draw where chances of survival are proportional to fitness. Agents have offspring each time step who are born at a distance b from the parent agent and the offpring inherits their genetic fitness plus a random term. Genetic fitness decreases with time, representing environmental change but effective non-inheritable fitness can increase as animals learn and get bigger.

Our aim is to show effects of group living when only low-level cognition is assumed, such as pattern recognition needed for normal functioning, without assuming individuals have knowledge about others around them or warn them actively.
The model is of a group of vigilant foragers staying within a patch, under attack by a predator. The foragers use attentional scanning for predator detection, and flee after detection. This fleeing action constitutes a visual cue to danger, and can be received non-attentionally by others if it occurs within their limited visual field. The focus of this model is on the effectiveness of this non-attentional visual information reception.
A blind angle obstructing cue reception caused by behaviour can exist in front, morphology causes a blind angle in the back. These limitations are represented by two visual field shapes. The scan for predators is all-around, with distance-dependent detection; reception of flight cues is limited by visual field shape.
Initial parameters for instance: group sizes, movement, vision characteristics for predator detection and for cue reception. Captures (failure), number of times the information reached all individuals at the same time (All-fled, success), and several other effects of the visual settings are recorded.

Displaying 10 of 23 results survival clear

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept