Computational Model Library

Displaying 10 of 314 results for "John Nay" clear search

Bicycle encounter model

Gudrun Wallentin | Published Saturday, October 29, 2016 | Last modified Friday, March 29, 2019

This Bicycle encounter model builds on the Salzburg Bicycle model (Wallentin & Loidl, 2015). It simulates cyclist flows and encounters, which are locations of potential accidents between cyclists.

Decision-makers often have to act before critical times to avoid the collapse of ecosystems using knowledge \textcolor{red}{that can be incomplete or biased}. Adaptive management may help managers tackle such issues. However, because the knowledge infrastructure required for adaptive management may be mobilized in several ways, we study the quality and the quantity of knowledge provided by this knowledge infrastructure. In order to analyze the influence of mobilized knowledge, we study how the following typology of knowledge and its use may impact the safe operating space of exploited ecosystems: 1) knowledge of the past based on a time series distorted by measurement errors; 2) knowledge of the current systems’ dynamics based on the representativeness of the decision-makers’ mental models of the exploited ecosystem; 3) knowledge of future events based on decision-makers’ likelihood estimates of extreme events based on modeling infrastructure (models and experts to interpret them) they have at their disposal. We consider different adaptive management strategies of a general regulated exploited ecosystem model and we characterize the robustness of these strategies to biased knowledge. Our results show that even with significant mobilized knowledge and optimal strategies, imperfect knowledge may still shrink the safe operating space of the system leading to the collapse of the system. However, and perhaps more interestingly, we also show that in some cases imperfect knowledge may unexpectedly increase the safe operating space by suggesting cautious strategies.
The code enables to calculate the safe operating spaces of different managers in the case of biased and unbiased knowledge.

Linear Threshold

Kaushik Sarkar | Published Saturday, November 03, 2012 | Last modified Saturday, April 27, 2013

NetLogo implementation of Linear Threshold model of influence propagation.

Universal Darwinism in Dutch Greenhouses

Julia Kasmire | Published Wednesday, May 09, 2012 | Last modified Saturday, April 27, 2013

An ABM, derived from a case study and a series of surveys with greenhouse growers in the Westland, Netherlands. Experiments using this model showshow that the greenhouse horticulture industry displays diversity, adaptive complexity and an uneven distribution, which all suggest that the industry is an evolving system.

Peer reviewed Swidden Farming Version 2.0

C Michael Barton | Published Wednesday, June 12, 2013 | Last modified Wednesday, September 03, 2014

Model of shifting cultivation. All parameters can be controlled by the user or the model can be run in adaptive mode, in which agents innovate and select parameters.

Firm explore-exploit of knowledge

Rosanna Garcia | Published Monday, March 28, 2011 | Last modified Saturday, April 27, 2013

The basic premise of the model is to simulate several ‘agents’ going through build-buy cycles: Build: Factories follow simple rules of strategy in the allocation of resources between making exploration and exploitation type products. Buy: Each of two types of Consumers, early-adopters and late adopters, follow simple purchase decision rules in deciding to purchase a product from one of two randomly chosen factories. Thus, the two working ‘agents’ of the model are ‘factories’ and […]

Cooperation is essential for all domains of life. Yet, ironically, it is intrinsically vulnerable to exploitation by cheats. Hence, an explanatory necessity spurs many evolutionary biologists to search for mechanisms that could support cooperation. In general, cooperation can emerge and be maintained when cooperators are sufficiently interacting with themselves. This communication provides a kind of assortment and reciprocity. The most crucial and common mechanisms to achieve that task are kin selection, spatial structure, and enforcement (punishment). Here, we used agent-based simulation models to investigate these pivotal mechanisms against conditional defector strategies. We concluded that the latter could easily violate the former and take over the population. This surprising outcome may urge us to rethink the evolution of cooperation, as it illustrates that maintaining cooperation may be more difficult than previously thought. Moreover, empirical applications may support these theoretical findings, such as invading the cooperator population of pathogens by genetically engineered conditional defectors, which could be a potential therapy for many incurable diseases.

Market for Protection

Steven Doubleday | Published Monday, July 01, 2013 | Last modified Monday, August 19, 2013

Simulation to replicate and extend an analytical model (Konrad & Skaperdas, 2010) of the provision of security as a collective good. We simulate bandits preying upon peasants in an anarchy condition.

Simulation model for compliance behaviour

Esther Van Asselt Sjoukje A Osinga | Published Friday, October 03, 2014 | Last modified Tuesday, December 08, 2015

This model can be used to optimize intervention strategies for inspection services.

Organisms, Individuals and Organizations face the dilemma of exploration vs. exploitation
Identifying the optimal trade-off between the two is a challenge
Too much exploration (e.g. gaining new knowledge) can be detrimental to day-to-day survival and too much exploitation (applying existing knowledge) could be detrimental to long term survival esp. if conditions change over time

The purpose of the model is to investigate how the amount of resources acquired (wealth/success) is related to persistence with the strategy of local exploration under different resource distributions, availability of resources over time and cost of relocation

Displaying 10 of 314 results for "John Nay" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept