Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 19 results conflict clear search
Hybrid attacks coordinate the exploitation of vulnerabilities across domains to undermine trust in authorities and cause social unrest. Whilst such attacks have primarily been seen in active conflict zones, there is growing concern about the potential harm that can be caused by hybrid attacks more generally and a desire to discover how better to identify and react to them. In addressing such threats, it is important to be able to identify and understand an adversary’s behaviour. Game theory is the approach predominantly used in security and defence literature for this purpose. However, the underlying rationality assumption, the equilibrium concept of game theory, as well as the need to make simplifying assumptions can limit its use in the study of emerging threats. To study hybrid threats, we present a novel agent-based model in which, for the first time, agents use reinforcement learning to inform their decisions. This model allows us to investigate the behavioural strategies of threat agents with hybrid attack capabilities as well as their broader impact on the behaviours and opinions of other agents.
SeaROOTS ABM is a quite generic agent-based modeling system, for simulating and evaluating potential terrestrial and maritime mobility of artificial hominin groups, configured by available archaeological data and hypotheses. Necessary bathymetric, geomorphological and paleoenvironmental data are combined in order to reconstruct paleoshorelines for the study area and produce an archaeologically significant agent environment. Paleoclimatic and archaeological data are incorporated in the ABM in order to simulate maritime crossings and assess the emergent patterns of interaction between human agency and the sea.
SeaROOTS agent-based system includes completely autonomous, utility-based agents (Chliaoutakis & Chalkiadakis 2016), representing artificial hominin groups, with partial knowledge of their environment, for simulating their evolution and potential maritime mobility, utilizing alternative Least Cost Path analysis modeling techniques (Gustas & Supernant 2017, Gravel-Miguel & Wren 2021). Two groups of hominins, Neanderthals and Homo sapiens, are chosen in order to study the challenges and actions employed as a response to the fluctuating sea-levels, as well as probability scenarios with respect to sea-crossings via buoyant vessels (rafting) or the human body itself (swimming). SeaROOTS ABM aims to simulate various scenarios and investigate the degree climatic fluctuations influenced such activities and interactions in the Middle Paleolithic period.
The model focuses on simulating potential terrestrial and maritime routes, explore the interactions and relations between autonomous agents and their environment, as well as to test specific research questions; for example, when and under what conditions would Middle Paleolithic hominins be more likely to attempt a crossing and successfully reach the islands? By which agent type (Sapiens or Neanderthals) and how (e.g. swimming or by sea-vessels) could such short sea crossings be (mostly) attempted, and which (sea) routes were usually considered by the agents? When does a sea-crossing become a choice and when is it a result of forced migration, i.e. disaster- or conflict-induced displacement? Results show that the dynamic marine environment of the Inner Ionian, our case study in this work, played an important role in their decision-making process.
ViSA 2.0.0 is an updated version of ViSA 1.0.0 aiming at integrating empirical data of a new use case that is much smaller than in the first version to include field scale analysis. Further, the code of the model is simplified to make the model easier and faster. Some features from the previous version have been removed.
It simulates decision behaviors of different stakeholders showing demands for ecosystem services (ESS) in agricultural landscape. It investigates conditions and scenarios that can increase the supply of ecosystem services while keeping the viability of the social system by suggesting different mixes of initial unit utilities and decision rules.
ViSA simulates the decision behaviors of different stakeholders showing demands for ecosystem services (ESS) in agricultural landscape. The lack of sufficient supply of ESSs triggers stakeholders to apply different management options to increase their supply. However, while attempting to reduce the supply-demand gap, conflicts arise among stakeholders due to the tradeoff nature of some ESS. ViSA investigates conditions and scenarios that can minimize such supply-demand gap while reducing the risk of conflicts by suggesting different mixes of management options and decision rules.
Scholars have written extensively about hierarchical international order, on the one hand, and war on the other, but surprisingly little work systematically explores the connection between the two. This disconnect is all the more striking given that empirical studies have found a strong relationship between the two. We provide a generative computational network model that explains hierarchy and war as two elements of a larger recursive process: The threat of war drives the formation of hierarchy, which in turn shapes states’ incentives for war. Grounded in canonical theories of hierarchy and war, the model explains an array of known regularities about hierarchical order and conflict. Surprisingly, we also find that many traditional results of the IR literature—including institutional persistence, balancing behavior, and systemic self-regulation—emerge from the interplay between hierarchy and war.
This model represents an agent-based social simulation for citizenship competences. In this model people interact by solving different conflicts and a conflict is solved or not considering two possible escenarios: when individual citizenship competences are considered and when not. In both cases the TKI conflict resolution styles are considered. Each conflict has associated a competence and the information about the conflicts and their competences is retrieved from an ontology which was developed in Protégé. To do so, a NetLogo extension was developed using the Java programming language and the JENA API (to make queries over the ontology).
This model examines how financial and social top-down interventions interplay with the internal self-organizing dynamics of a fishing community. The aim is to transform from hierarchical fishbuyer-fisher relationship into fishing cooperatives.
This model was developed to test the usability of evolutionary computing and reinforcement learning by extending a well known agent-based model. Sugarscape (Epstein & Axtell, 1996) has been used to demonstrate migration, trade, wealth inequality, disease processes, sex, culture, and conflict. It is on conflict that this model is focused to demonstrate how machine learning methodologies could be applied.
The code is based on the Sugarscape 2 Constant Growback model, availble in the NetLogo models library. New code was added into the existing model while removing code that was not needed and modifying existing code to support the changes. Support for the original movement rule was retained while evolutionary computing, Q-Learning, and SARSA Learning were added.
System Narrative
How do rebel groups control territory and engage with the local economy during civil war? Charles Tilly’s seminal War and State Making as Organized Crime (1985) posits that the process of waging war and providing governance resembles that of a protection racket, in which aspiring governing groups will extort local populations in order to gain power, and civilians or businesses will pay in order to ensure their own protection. As civil war research increasingly probes the mechanisms that fuel local disputes and the origination of violence, we develop an agent-based simulation model to explore the economic relationship of rebel groups with local populations, using extortion racket interactions to explain the dynamics of rebel fighting, their impact on the economy, and the importance of their economic base of support. This analysis provides insights for understanding the causes and byproducts of rebel competition in present-day conflicts, such as the cases of South Sudan, Afghanistan, and Somalia.
Model Description
The model defines two object types: RebelGroup and Enterprise. A RebelGroup is a group that competes for power in a system of anarchy, in which there is effectively no government control. An Enterprise is a local civilian-level actor that conducts business in this environment, whose objective is to make a profit. In this system, a RebelGroup may choose to extort money from Enterprises in order to support its fighting efforts. It can extract payments from an Enterprise, which fears for its safety if it does not pay. This adds some amount of money to the RebelGroup’s resources, and they can return to extort the same Enterprise again. The RebelGroup can also choose to loot the Enterprise instead. This results in gaining all of the Enterprise wealth, but prompts the individual Enterprise to flee, or leave the model. This reduces the available pool of Enterprises available to the RebelGroup for extortion. Following these interactions the RebelGroup can choose to AllocateWealth, or pay its rebel fighters. Depending on the value of its available resources, it can add more rebels or expel some of those which it already has, changing its size. It can also choose to expand over new territory, or effectively increase its number of potential extorting Enterprises. As a response to these dynamics, an Enterprise can choose to Report expansion to another RebelGroup, which results in fighting between the two groups. This system shows how, faced with economic choices, RebelGroups and Enterprises make decisions in war that impact conflict and violence outcomes.
This study investigates a possible nexus between inter-group competition and intra-group cooperation, which may be called “tribalism.” Building upon previous studies demonstrating a relationship between the environment and social relations, the present research incorporates a social-ecological model as a mediating factor connecting both individuals and communities to the environment. Cyclical and non-cyclical fluctuation in a simple, two-resource ecology drive agents to adopt either “go-it-alone” or group-based survival strategies via evolutionary selection. Novelly, this simulation employs a multilevel selection model allowing group-level dynamics to exert downward selective pressures on individuals’ propensity to cooperate within groups. Results suggest that cooperation and inter-group conflict are co-evolved in a triadic relationship with the environment. Resource scarcity increases inter-group competition, especially when resources are clustered as opposed to widely distributed. Moreover, the tactical advantage of cooperation in the securing of clustered resources enhanced selective pressure on cooperation, even if that implies increased individual mortality for the most altruistic warriors. Troubling, these results suggest that extreme weather, possibly as a result of climate change, could exacerbate conflict in sensitive, weather-dependent social-ecologies—especially places like the Horn of Africa where ecologically sensitive economic modalities overlap with high-levels of diversity and the wide-availability of small arms. As well, global development and foreign aid strategists should consider how plans may increase the value of particular locations where community resources are built or aid is distributed, potentially instigating tribal conflict. In sum, these factors, interacting with pre-existing social dynamics dynamics, may heighten inter-ethnic or tribal conflict in pluralistic but otherwise peaceful communities.
For special issue submission in JASSS.
Displaying 10 of 19 results conflict clear search