Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1188 results for "Ian M Hamilton" clear search
The model simulates flood damages and its propagation through a cooperative, productive, farming system, characterized as a star-type network, where all elements in the system are connected one to each other through a central element.
The command and control policy in natural resource management, including water resources, is a longstanding established policy that has been theoretically and practically argued from the point of view of social-ecological complex systems. With the intention of making a system ecologically resilient, these days, policymakers apply the top-down policies of controlling communities through regulations. To explore how these policies may work and to understand whether the ecological goal can be achieved via command and control policy, this research uses the capacity of Agent-Based Modeling (ABM) as an experimental platform in the Urmia Lake Basin (ULB) in Iran, which is a social-ecological complex system and has gone through a drought process.
Despite the uncertainty of the restorability capacity of the lake, there has been a consensus on the possibility to artificially restore the lake through the nationally managed Urmia Lake Restoratoin Program (ULRP). To reduce water consumption in the Basin, the ULRP widely targets the agricultural sector and proposes the project of changing crop patterns from high-water-demand (HWD) to low-water-demand (LWD), which includes a component to control water consumption by establishing water-police forces.
Using a wide range of multidisciplinary studies about Urmia Lake at the Basin and sub-basins as well as qualitative information at micro-level as the main conceptual sources for the ABM, the findings under different strategies indicate that targeting crop patterns change by legally limiting farmers’ access to water could force farmers to change their crop patterns for a short period of time as long as the number of police constantly increases. However, it is not a sustainable policy for either changing the crop patterns nor restoring the lake.
Genetic algorithms try to solve a computational problem following some principles of organic evolution. This model has educational purposes; it can give us an answer to the simple arithmetic problem on how to find the highest natural number composed by a given number of digits. We approach the task using a genetic algorithm, where the candidate solutions to the problem are represented by agents, that in logo programming environment are usually known as “turtles”.
The Inspection Model represents a basic food safety system where inspectors, consumers and stores interact. The purpose of the model is to provide insight into an optimal level of inspectors in a food system by comparing three search strategies.
The Inspection Model represents a basic food safety system where inspectors, consumers and stores interact. The purpose of the model is to provide insight into an optimal level of inspectors in a food system by comparing three search strategies.
The Inspection Model represents a basic food safety system where inspectors, consumers and stores interact. The purpose of the model is to provide insight into an optimal level of inspectors in a food system by comparing three search strategies.
We used our model to test how different combinations of dominance interactions present in H. saltator could result in linear, despotic, or shared hierarchies.
The model studies the dynamics of risk-sharing cooperatives among heterogeneous farmers. Based on their knowledge on their risk exposure and the performance of the cooperative farmers choose whether or not to remain in the risk-sharing agreement.
This paper presents an agent-based model to study the dynamics of city-state systems in a constrained environment with limited space and resources. The model comprises three types of agents: city-states, villages, and battalions, where city-states, the primary decision-makers, can build villages for food production and recruit battalions for defense and aggression. In this setting, simulation results, generated through a multi-parameter grid sampling, suggest that risk-seeking strategies are more effective in high-cost scenarios, provided that the production rate is sufficiently high. Also, the model highlights the role of output productivity in defining which strategic preferences are successful in a long-term scenario, with higher outputs supporting more aggressive expansion and military actions, while resource limitations compel more conservative strategies focused on survival and resource conservation. Finally, the results suggest the existence of a non-linear effect of diminishing returns in strategic investments on successful strategies, emphasizing the need for careful resource allocation in a competitive environment.
A-KinGDom simulates the emergence of the social structure in a group of non-human primates. The model includes dominance and affiliative interactions which allow us to define four different attack and affiliative strategies.
Displaying 10 of 1188 results for "Ian M Hamilton" clear search