Computational Model Library

Displaying 10 of 903 results for "M Van Den Hoven" clear search

WeDiG Sim

Reza Shamsaee | Published Monday, May 14, 2012 | Last modified Saturday, April 27, 2013

WeDiG Sim- Weighted Directed Graph Simulator - is an open source application that serves to simulate complex systems. WeDiG Sim reflects the behaviors of those complex systems that put stress on scale-free, weightedness, and directedness. It has been implemented based on “WeDiG model” that is newly presented in this domain. The WeDiG model can be seen as a generalized version of “Barabási-Albert (BA) model”. WeDiG not only deals with weighed directed systems, but also it can handle the […]

Our aim is to show effects of group living when only low-level cognition is assumed, such as pattern recognition needed for normal functioning, without assuming individuals have knowledge about others around them or warn them actively.
The model is of a group of vigilant foragers staying within a patch, under attack by a predator. The foragers use attentional scanning for predator detection, and flee after detection. This fleeing action constitutes a visual cue to danger, and can be received non-attentionally by others if it occurs within their limited visual field. The focus of this model is on the effectiveness of this non-attentional visual information reception.
A blind angle obstructing cue reception caused by behaviour can exist in front, morphology causes a blind angle in the back. These limitations are represented by two visual field shapes. The scan for predators is all-around, with distance-dependent detection; reception of flight cues is limited by visual field shape.
Initial parameters for instance: group sizes, movement, vision characteristics for predator detection and for cue reception. Captures (failure), number of times the information reached all individuals at the same time (All-fled, success), and several other effects of the visual settings are recorded.

We compare three model estimates for the time and treatment requirements to eliminate HCV among HIV-positive MSM in Victoria, Australia: a compartmental model; an ABM parametrized by surveillance data; and an ABM with a more heterogeneous population.

Peer reviewed Strategy with Externalities

J Applegate Glenn Hoetker | Published Thursday, December 21, 2017

The SWE models firms search behaviour as the performance landscape shifts. The shift represents society’s pricing of negative externalities, and the performance landscape is an NK structure. The model is written in NetLogo.

Peer reviewed Empathy & Power

J Applegate Ned Wellman | Published Monday, November 13, 2017 | Last modified Thursday, December 21, 2017

The purpose of this model is to explore the effects of different power structures on a cross-functional team’s prosocial decision making. Are certain power distributions more conducive to the team making prosocial decisions?

The purpose of the model is to simulate the future growth of human settlements in the Nile river valley in Egypt. The model contains processes to mimic spatial patterns found in the case study region.

Simulation model for compliance behaviour

Esther Van Asselt Sjoukje A Osinga | Published Friday, October 03, 2014 | Last modified Tuesday, December 08, 2015

This model can be used to optimize intervention strategies for inspection services.

Sorghum supply development in Meru County, Kenya

Tim Verwaart Coen Van Wagenberg | Published Wednesday, September 06, 2017 | Last modified Thursday, May 30, 2019

Trust between farmers and processors is a key factor in developing stable supply chains including “bottom of the pyramid”, small-scale farmers. This simulation studies a case with 10000 farmers.

This is an Agent Based Model of a generic food chain network consisting of stylized individuals representing producers, traders, and consumers. It is developed to: 1/ to describe the dynamically changing disaggregated flows of crop items between these agents, and 2/ to be able to explicitly consider agent behavior. The agents have implicit personal objectives for trading. Resilience and efficiency are quantified using the ascendency concept by linking these to the fraction of fulfillment of the overall explicit objective to have all consumers meet their food requirement. Different types of network structures in combination with different agent interaction types under different types of stylized shocks can be simulated.

The Friendship Field

Eva Timmer Chrisja van de Kieft | Published Thursday, May 26, 2022 | Last modified Tuesday, August 30, 2022

The Friendship Field model aims at modelling friendship formation based on three factors: Extraversion, Resemblance and Status, where social interaction is motivated by the Social Battery. Social Battery is one’s energy and motivation to engage in social contact. Since social contact is crucial for friendship formation, the model included Social Battery to affect social interactions. To our best knowledge, Social Battery is a yet unintroduced concept in research while it is a dynamic factor influencing the social interaction besides one’s characteristics. Extraverts’ Social Batteries charge while interacting and exhaust while being alone. Introverts’ Social Batteries charge while being alone and exhaust while interacting. The aim of the model is to illustrate the concept of Social Battery. Moreover, the Friendship Field shows patterns regarding Extraversion, Resemblance and Status including the mere-exposure effect and friendship by similarity. For the implementation of Status, Kemper’s status-power theory is used. The concept of Social Battery is also linked to Kemper’s theory on the organism as reference group. By running the model for a year (3 interactions moments per day), the friendship dynamics over time can be studied.

We presented the model at the Social Simulation Conference 2022.

Displaying 10 of 903 results for "M Van Den Hoven" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept