Computational Model Library

Displaying 10 of 1039 results for "Joan A Barceló" clear search

The western honey bee Apis mellifera is the most important pollinator in the world. The biggest threat to managed honey bees is the ectoparasitic mite Varroa destructor and the viruses DWV (Deformed Wing Virus) and APV (Acute Paralysis Virus) it transmits. Untreated honey bee colonies are expected to die within one to three years. This led to the development of strategies for beekeepers to control the Varroa mite in honey bee colonies and ensure the health and survival of their bee colonies, so called Good Beekeeping Practice. The aim of the extension of BEEHAVE was to represent the Good Beekeeping Practice of Varroa control in Germany. The relevant measures within the Varroa control strategies are drone brood removal as a Varroa trap and the treatment of bee colonies with organic acaricides (formic and oxalic acid) to kill the mites. This extension improves BEEHAVE and builds a bridge between beekeepers in practice and in the modelling world. It vastly contributes to the future use of BEEHAVE in beekeeping education in Germany.

Hybrid attacks coordinate the exploitation of vulnerabilities across domains to undermine trust in authorities and cause social unrest. Whilst such attacks have primarily been seen in active conflict zones, there is growing concern about the potential harm that can be caused by hybrid attacks more generally and a desire to discover how better to identify and react to them. In addressing such threats, it is important to be able to identify and understand an adversary’s behaviour. Game theory is the approach predominantly used in security and defence literature for this purpose. However, the underlying rationality assumption, the equilibrium concept of game theory, as well as the need to make simplifying assumptions can limit its use in the study of emerging threats. To study hybrid threats, we present a novel agent-based model in which, for the first time, agents use reinforcement learning to inform their decisions. This model allows us to investigate the behavioural strategies of threat agents with hybrid attack capabilities as well as their broader impact on the behaviours and opinions of other agents.

An Agent-Based Simulation of Continuous-Time Public Goods Games

Tuong Vu | Published Thursday, May 17, 2018 | Last modified Tuesday, April 02, 2019

To our knowledge, this is the first agent-based simulation of continuous-time PGGs (where participants can change contributions at any time) which are much harder to realise within both laboratory and simulation environments.

Work related to this simulation has been published in the following journal article:
Vu, Tuong Manh, Wagner, Christian and Siebers, Peer-Olaf (2019) ‘ABOOMS: Overcoming the Hurdles of Continuous-Time Public Goods Games with a Simulation-Based Approach’ Journal of Artificial Societies and Social Simulation 22 (2) 7 http://jasss.soc.surrey.ac.uk/22/2/7.html. doi: 10.18564/jasss.3995

Abstract:

Peer Review Model

Flaminio Squazzoni Claudio Gandelli | Published Wednesday, September 05, 2012 | Last modified Saturday, April 27, 2013

This model looks at implications of author/referee interaction for quality and efficiency of peer review. It allows to investigate the importance of various reciprocity motives to ensure cooperation. Peer review is modelled as a process based on knowledge asymmetries and subject to evaluation bias. The model includes various simulation scenarios to test different interaction conditions and author and referee behaviour and various indexes that measure quality and efficiency of evaluation […]

An agent-based model to study the effects of trust in coalition formation

Luis Nardin | Published Wednesday, August 31, 2011 | Last modified Saturday, April 27, 2013

This model is an agent-based simulation that consists of agents who play the spatial prisioner’s dilemma game with coalition formation. The coalition dynamics are mainly influenced by how much the agents trust their leaders. The main objective is provide a simulation model to enable the analysis of the impacts that the use of trust may cause in coalition formation.

Agent-based model of intergroup conflict in divided communities.

Diffusion of Innovations on Social Networks

Hang Xiong | Published Saturday, April 16, 2016

This is model that simulates how multiple kinds of peer effects shape the diffusion of innovations through different types of social relationships.

Tiebout sorting

Marco Janssen | Published Thursday, January 24, 2019

This Netlogo replication of Kollman, K., J.H. Miller and S.E. Page (1997) Political Institutions and Sorting in a Tiebout Model, American Economic Review 87(5): 977-992. The model consists of of citizens who can vote for partie and move to other jurisdictions if they expect their preferences are better served. Parties adjust their positions to increase their share in the elections.

Parallel trading systems

Marcin Czupryna | Published Friday, June 26, 2020

The model simulates agents behaviour in wine market parallel trading systems: auctions, OTC and Liv-ex. Models are written in JAVA and use MASON framework. To run a simulation download source files with additional src folder with sobol.csv file. In WineSimulation.java set RESULTS_FOLDER parameter. Uses following external libraries mason19..jar, opencsv.jar, commons-lang3-3.5.jar and commons-math3-3.6.1.jar.

Geographic Expansion Model (GEM)

Sean Bergin | Published Friday, February 28, 2020

The purpose of this model is to explore the importance of geographic factors to the settlement choices of early Neolithic agriculturalists. In the model, each agriculturalist spreads to one of the best locations within a modeler specified radius. The best location is determined by choosing either one factor such as elevation or slope; or by ranking geographic factors in order of importance.

Displaying 10 of 1039 results for "Joan A Barceló" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept