Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 98 results for "Phesi Project" clear search
In this presentation, we use the concept of meme to explore evolution of demand.
In this agent-based model, agents decide to adopt a new product according to a utility function that depends on two kinds of social influences. First, there is a local influence exerted on an agent by her closest neighbors that have already adopted, and also by herself if she feels the product suits her personal needs. Second, there is a global influence which leads agents to adopt when they become aware of emerging trends happening in the system. For this, we endow agents with a reflexive capacity that allows them to recognize a trend, even if they can not perceive a significant change in their neighborhood.
Results reveal the appearance of slowdown periods along the adoption rate curve, in contrast with the classic stylized bell-shaped behavior. Results also show that network structure plays an important role in the effect of reflexivity: while some structures (e.g., scale-free networks) may amplify it, others (e.g., small-world structure) weaken such an effect.
The model explores how corruption may spread endogenously within a closed society by depicting the behavior within a cellular automaton context (CA) between bureaucrats and citizens. Within the model, corruption is characterized as a behavior product dependent upon an individual’s personal disposition towards honesty, rational decisionmaking processes, and neighbors’ behavior.
Inspired by the European project called GLODERS that thoroughly analyzed the dynamics of extortive systems, Bottom-up Adaptive Macroeconomics with Extortion (BAMERS) is a model to study the effect of extortion on macroeconomic aggregates through simulation. This methodology is adequate to cope with the scarce data associated to the hidden nature of extortion, which difficults analytical approaches. As a first approximation, a generic economy with healthy macroeconomics signals is modeled and validated, i.e., moderate inflation, as well as a reasonable unemployment rate are warranteed. Such economy is used to study the effect of extortion in such signals. It is worth mentioning that, as far as is known, there is no work that analyzes the effects of extortion on macroeconomic indicators from an agent-based perspective. Our results show that there is significant effects on some macroeconomics indicators, in particular, propensity to consume has a direct linear relationship with extortion, indicating that people become poorer, which impacts both the Gini Index and inflation. The GDP shows a marked contraction with the slightest presence of extortion in the economic system.
This model consists of three agents, and each agent type operates per business theories as below.
a. New technologies(Tech): It evolves per sustaining or disruptive technology trajectory with the constraint of project management triangle (Scope, Time, Quality, and Cost).
b. Entrepreneurs(Entre): It builds up the solution by combining Tech components per its own strategy (Exploration, Exploitation, or Ambidex).
c. Consumer(Consumer): It selects the solution per its own preference due to Diffusion of innovation theory (Innovators, Early Adopters, Early Majority, Late Majority, Laggards)
…
The purpose of this model is to analyze the dynamics of endogenously created oscillations in housing prices using a system dynamics simulation model, built from the perspective of construction companies.
The various technologies used inside a Dutch greenhouse interact in combination with an external climate, resulting in an emergent internal climate, which contributes to the final productivity of the greenhouse. This model examines how differing technology development styles affects the overall ability of a community of growers to approach the theoretical maximum yield.
This model slowly evolves to become Westeros, with houses fighting for the thrones, and whitewalkers trying to kill all living things. You can download each version to see the evolution of the code, from the Wolf Sheep Predation model to the Game of Thrones model. If you are only interested in the end product, simply download the latest version.
For instructions on each step, see: https://claudinegravelmigu.wixsite.com/got-abm
This model allows for oneshot negotiations in the Colored Trails setting. Two allocator agents simultaneously make an offer to a responder agent, who chooses which of these offers to accept, or to reject both offers. The code allows for allocator allocator agents of different orders of theory of mind reasoning to play against one another.
This model simulates a bank - firm credit network.
Displaying 10 of 98 results for "Phesi Project" clear search