Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1068 results for "J A Cuesta" clear search
Model of a very serious conflict about the relevance of a dam to impede its construction, between the client, the prime contractor, State, legalist opponents and activist opponents.
This model simulates networking mechanisms of an empirical social network. It correlates event determinants with place-based geography and social capital production.
The application of a smartphone application to register physical encounters between individuals is considered by public health authorities, as a means to reduce the number of infections in the 2020 COVID-19 pandemic. The general idea is that continuous registration of all other smartphones in the vicinity of an individual’s smartphone potentially enables early warning of the owners of the other smartphones, in case the individual is tested positive as infected. Those other individuals can then go into isolation and be considered for testing. The purpose of the present simulation is to explore the potential effects of this application on frequencies of infection, isolation, and positive and negative infection test results.
NetPlop is a presentation editor built entirely in NetLogo, an agent-based modelling environment. The NetPlop Editor includes a variety of tools to design slide decks, and the Viewer allows these decks to be dis-played to an enraptured audience. A key feature of NetPlop is the ability to embed agent-based models. NetPlop was developed for SIGBOVIK 2021.
Simulations based on the Axelrod model and extensions to inspect the volatility of the features over time (AXELROD MODEL & Agreement threshold & two model variations based on the Social identity approach)
The Axelrod model is used to predict the number of changes per feature in comparison to the datasets and is used to compare different model variations and their performance.
Input: Real data
…
Riparian forests are one of the most vulnerable ecosystems to the development of biological invasions, therefore limiting their spread is one of the main challenges for conservation. The main factors that explain plant invasions in these ecosystems are the capacity for both short- and long-distance seed dispersion, and the occurrence of suitable habitats that facilitate the establishment of the invasive species. Large floods constitute an abiotic filter for invasion.
This model simulates the spatio-temporal spread of the woody invader Gleditsia. triacanthos in the riparian forest of the National Park Esteros de Farrapos e Islas del Río Uruguay, a riparian system in the coast of the Uruguay river (South America). In this model, we represent different environmental conditions for the development of G. triacanthos, long- and short-distance spread of its fruits, and large floods as the main factor of mortality for fruit and early stages.
Field results show that the distribution pattern of this invasive species is limited by establishment, i.e. it spreads locally through the expansion of small areas, and remotely through new invasion foci. This model recreates this dispersion pattern. We use this model to derive management implications to control the spread of G. triacanthos
This code simulates individual-level, longitudinal substance use patterns that can be used to understand how cross-sectional U-shaped distributions of population substance use emerge. Each independent computational object transitions between two states: using a substance (State 1), or not using a substance (State 2). The simulation has two core components. Component 1: each object is assigned a unique risk factor transition probability and unique protective factor transition probability. Component 2: each object’s current decision to use or not use the substance is influenced by the object’s history of decisions (i.e., “path dependence”).
The TERROIR agent-based model was built for the multi-level analysis of biomass and nutrient flows within agro-sylvo-pastoral villages in West Africa. It explicitly takes into account both human organization and spatial extension of such flows.
Three policy scenarios for urban expansion under the influences of the behaviours and decision modes of four agents and their interactions have been applied to predict the future development patterns of the Guangzhou metropolitan region.
The fight against poverty is an urgent global challenge. Microinsurance is promoted as a valuable instrument for buffering income losses due to health or climate-related risks of low-income households in developing countries. However, apart from direct positive effects they can have unintended side effects when insured households lower their contribution to traditional arrangements where risk is shared through private monetary support.
RiskNetABM is an agent-based model that captures dynamics between income losses, insurance payments and informal risk-sharing. The model explicitly includes decisions about informal transfers. It can be used to assess the impact of insurance products and informal risk-sharing arrangements on the resilience of smallholders. Specifically, it allows to analyze whether and how economic needs (i.e. level of living costs) and characteristics of extreme events (i.e. frequency, intensity and type of shock) influence the ability of insurance and informal risk-sharing to buffer income shocks. Two types of behavior with regard to private monetary transfers are explicitly distinguished: (1) all households provide transfers whenever they can afford it and (2) insured households do not show solidarity with their uninsured peers.
The model is stylized and is not used to analyze a particular case study, but represents conditions from several regions with different risk contexts where informal risk-sharing networks between smallholder farmers are prevalent.
…
Displaying 10 of 1068 results for "J A Cuesta" clear search