Computational Model Library

Displaying 10 of 250 results for "David Moore" clear search

Feedback Loop Example: Wildland Fire Spread

James Millington | Published Friday, December 21, 2012 | Last modified Saturday, April 27, 2013

This model is a replication of that described by Peterson (2002) and illustrates the ‘spread’ feedback loop type described in Millington (2013).

Walk This Way

Crooks Andrew Sarah Wise | Published Thursday, August 27, 2015

The purpose of this model is to enhance a basic ABM through a simple set of rules identified using the activity-driven models in order to produce more realistic patterns of pedestrian movement.

This model aims to investigate how different type of learning (social system) and disturbance specific attributes (ecological system) influence adoption of treatment strategies to treat the effects of ecological disturbances.

Toward Market Structure as a Complex System: A Web Based Simulation Assignment Implemented in Netlogo

Timothy Kochanski | Published Monday, February 14, 2011 | Last modified Saturday, April 27, 2013

This is the model for a paper that is based on a simulation model, programmed in Netlogo, that demonstrates changes in market structure that occur as marginal costs, demand, and barriers to entry change. Students predict and observe market structure changes in terms of number of firms, market concentration, market price and quantity, and average marginal costs, profits, and markups across the market as firms innovate. By adjusting the demand growth and barriers to entry, students can […]

Evolution of Conditional Cooperation

Marco Janssen Miles Manning Oyita Udiani | Published Thursday, August 01, 2013 | Last modified Friday, May 13, 2022

Cultural group selection model used to evaluate the conditions for agents to evolve who have other-regarding preferences in making decisions in public good games.

We model the relationship between natural resource user´s individual time preferences and their use of destructive extraction method in the context of small-scale fisheries.

Peer reviewed Least cost path mobility

Claudine Gravel-Miguel Colin Wren | Published Saturday, September 02, 2017 | Last modified Monday, October 04, 2021

This model aims to mimic human movement on a realistic topographical surface. The agent does not have a perfect knowledge of the whole surface, but rather evaluates the best path locally, at each step, thus mimicking imperfect human behavior.

The purpose of the simulation was to explore and better understand the process of bridging between an analysis of qualitative data and the specification of a simulation. This may be developed for more serious processes later but at the moment it is merely an illustration.
This exercise was done by Stephanie Dornschneider (School of Politics and International Relations, University College Dublin) and Bruce Edmonds to inform the discussion at the Lorentz workshop on “Integrating Qualitative and Quantitative Data using Social Simulation” at Leiden in April 2019. The qualitative data was collected and analysed by SD. The model specification was developed as the result of discussion by BE & SD. The model was programmed by BE. This is described in a paper submitted to Social Simulation 2019 and (to some extent) in the slides presented at the workshop.

Peer reviewed Visibility of archaeological social networks

Claudine Gravel-Miguel | Published Sunday, November 26, 2023

The purpose of this model is to explore the impact of combining archaeological palimpsests with different methods of cultural transmission on the visibility of prehistoric social networks. Up until recently, Paleolithic archaeologists have relied on stylistic similarities of artifacts to reconstruct social networks. However, this method - which is successfully applied to more recent ceramic assemblages - may not be applicable to Paleolithic assemblages, as several of those consist of palimpsests of occupations. Therefore, this model was created to study how palimpsests of occupation affect our social network reconstructions.

The model simplifies inter-groups interactions between populations who share cultural traits as they produce artifacts. It creates a proxy archaeological record of artifacts with stylistic traits that can then be used to reconstruct interactions. One can thus use this model to compare the networks reconstructed through stylistic similarities with direct contact.

Resisting hostility

Sylvie Huet | Published Thursday, December 20, 2018

We propose an agent-based model leading to a decrease or an increase of hostility between agents after a major cultural threat such as a terrorist attack. The model is inspired from the Terror Management Theory and the Social Judgement Theory. An agent has a cultural identity defined through its acceptance segments about each of three different cultural worldviews (i.e., Atheist, Muslim, Christian) of the considered society. An agent’s acceptance segment is composed from its acceptable positions toward a cultural worldview, including its most acceptable position. An agent forms an attitude about another agent depending on the similarity between their cultural identities. When a terrorist attack is perpetrated in the name of an extreme cultural identity, the negatively perceived agents from this extreme cultural identity point of view tend to decrease the width of their acceptance segments in order to differentiate themselves more from the threatening cultural identity

Displaying 10 of 250 results for "David Moore" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept