Computational Model Library

Displaying 10 of 164 results for "Jennifer Fewell" clear search

Developed as a part of a project in the University of Augsburg, Institute of Geography, it simulates the traffic in an intersection or junction which uses either regular traffic lights or traffic lights with a countdown timer. The model tracks the average speed of cars before and after traffic lights as well as the throughput.

Intra-Organizational Bandwagon

Davide Secchi | Published Sunday, October 18, 2015

The model simulates the process of widespread diffusion of something due to popularity (i.e., bandwagon) within an organization.

Package for simulating the behavior of experts in a scientific-forecasting competition, where the outcome of experiments itself depends on expert consensus. We pay special attention to the interplay between expert bias and trust in the reward algorithm. The package allows the user to reproduce results presented in arXiv:2305.04814, as well as testing of other different scenarios.

Hybrid attacks coordinate the exploitation of vulnerabilities across domains to undermine trust in authorities and cause social unrest. Whilst such attacks have primarily been seen in active conflict zones, there is growing concern about the potential harm that can be caused by hybrid attacks more generally and a desire to discover how better to identify and react to them. In addressing such threats, it is important to be able to identify and understand an adversary’s behaviour. Game theory is the approach predominantly used in security and defence literature for this purpose. However, the underlying rationality assumption, the equilibrium concept of game theory, as well as the need to make simplifying assumptions can limit its use in the study of emerging threats. To study hybrid threats, we present a novel agent-based model in which, for the first time, agents use reinforcement learning to inform their decisions. This model allows us to investigate the behavioural strategies of threat agents with hybrid attack capabilities as well as their broader impact on the behaviours and opinions of other agents.

Objective is to simulate policy interventions in an integrated demand-supply model. The underlying demand function links both sides. Diffusion proceeds if interactions distribute awareness (Epidemic effect) and rivalry reduces the market price (Probit effect). Endogeneity is given due to the fact that consumer awareness as well as their willingness-to-pay drives supply-side rivalry. Firm´s entry and exit decisions as well as quantity and price settings are driven by Cournot competition.

Policy Formulation for Public Administration - Innovation

Bashar Ourabi | Published Tuesday, August 29, 2017 | Last modified Tuesday, August 29, 2017

Innovation a byproduct of the intellectual capital, requires a new paradigm for the production constituents. Human Capital HC,Structural capital SC and relational capital RC become key for intellectual capital and consequently for innovation.

Agent-based Simulation of Time Management

Hang Xiong | Published Thursday, March 24, 2016 | Last modified Friday, March 25, 2016

This model simulates how the strategy one manages time affect the well-being that he/she can obtain.

Consumer diets and values ABM

Natalie Davis | Published Thursday, December 22, 2022

An agent-based model of individual consumers making choices between five possible diets: omnivore, flexitarian, pescatarian, vegetarian, or vegan. Each consumer makes decisions based on personal constraints and values, and their perceptions of how well each diet matches with those values. Consumers can also be influenced by each other’s perceptions via interaction across three social networks: household members, friends, and acquaintances.

Social Nets Emergence Model

Di Wang | Published Wednesday, March 21, 2012 | Last modified Saturday, April 27, 2013

This model simulates the interactions and dynamic trust changes between people which results in social group emergence and evolution.

This is code repository for the paper “Homophily as a process generating social networks: insights from Social Distance Attachment model”.
It provides all information, code and data necessary to replicate all the simulations and analyses presented in the paper.
This document contains the overall instruction as well as description of the content of the repository.
Details regarding particular stages are documented within source files as comments.

Displaying 10 of 164 results for "Jennifer Fewell" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept