Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1176 results
The Inspection Model represents a basic food safety system where inspectors, consumers and stores interact. The purpose of the model is to provide insight into an optimal level of inspectors in a food system by comparing three search strategies.
We develop an IBM that predicts how interactions between elephants, poachers, and law enforcement affect poaching levels within a virtual protected area. The model is theoretical at this stage and is not meant to provide a realistic depiction of poaching, but instead to demonstrate how IBMs can expand upon the existing modelling work done in this field, and to provide a framework for future research. The model could be further developed into a useful management support tool to predict the outcomes of various poaching mitigation strategies at real-world locations. The model was implemented in NetLogo version 6.1.0.
We first compared a scenario in which poachers have prescribed, non-adaptive decision-making and move randomly across the landscape, to one in which poachers adaptively respond to their memories of elephant locations and where other poachers have been caught by law enforcement. We then compare a situation in which ranger effort is distributed unevenly across the protected area to one in which rangers patrol by adaptively following elephant matriarchal herds.
We establish a double-layer network for China’s financial system, consisting of an interbank lending network and a cross-shareholding network. The loss of diffusion in an interbank lending channel independently, a cross-shareholding channel independently and a double-layer contagion channel after one of the financial institutions goes bankrupt with an initial shock are simulated to explore the nonlinear evolution mechanism of financial risk and impact factors of financial systemic risk in China.
PowerGen-ABM is an optimisation model for power plant expansions from 2010 to 2025 with Indonesian electricity systems as the case study. PowerGen-ABM integrates three approaches: techno-economic analysis (TEA), linear programming (LP), and input-output analysis (IOA) and environmental analysis. TEA is based on the revenue requirement (RR) formula by UCDavis (2016), and the environmental analysis accounts for resource consumption (i.e., steel, concrete, aluminium, and energy) and carbon dioxide equivalent (CO2e) emissions during the construction and operational stages of power plants.
Simulation Software for Random-Subset Voting with Borda, approval, plurality and Condorcet.
This software simulates the Random-Subset Voting method for Borda, plurality, approval and Condorcet.
This model is part of an article that discusses the adoption of a complexity theory approach to study the dynamics of language contact within multilingual communities. The model simulates the dynamics of communication within a community where a minority and a majority group coexist. The individual choice of language for communication is based on a number of simple rules derived from a review of the main literature on the topic of language contact. These rules are then combined with different variables, such as the rate of exogamy of the minority group and the presence of relevant education policies, to estimate the trends of assimilation of the minority group into the majority one. The model is validated using actually observed data from the case of Romansh speakers in the canton of Grisons, Switzerland.
This model converts cleaned up versions of .pgn files (records of real chess games) and conversts them into files that record all of the events and “possible” events within a game of chess. This is intended to be a way to create sets of data that capture event sequences within the relatively complex but finite context of chess games as a proxy or “toy” data set. Although not a perfect correlation, these toy data sets are a first step in analysing complex and dynamic systems of events and possible events that happen in the real world.
We model interpersonal dynamics and study behavior in the classroom in the hypothetical case of a single teacher who defines students’ seating arrangements. The model incorporates the mechanisms of peer influence on study behavior, on attitude formation, and homophilous selection in order to depict the interrelated dynamics of networks, behavior, and attitudes. We compare various seating arrangement scenarios and observe how GPA distribution and level of prejudice changes over time.
we extend the basic simulation model of March by incorporating forgetting and three knowledge management strategies—personalization, codification, and mixed—to explore the impacts of different knowledge management strategies and forgetting on organizational knowledge level.
Displaying 10 of 1176 results