Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1180 results
Investigate spatial adaptive behaviors of narco-trafficking networks in response to various counterdrug interdiction strategies within the cocaine transit zone of Central America and associated maritime areas. Through the novel application of the ‘complex adaptive systems’ paradigm, we implement a potentially transformative coupled agent-based and interdiction optimization modeling approach to compellingly demonstrate: (a) how current efforts to disrupt narco-trafficking networks are in fact making them more widespread, resilient, and economically powerful; (b) the potential for alternative interdiction approaches to weaken and contain traffickers.
An economic agent-based model of Coupled Housing and Land Markets (CHALMS) simulates the location choices, insurance purchasing decisions, and risk perceptions of coastal residents, and how coastal risks are capitalized (or not) into coastal housing and land markets.
The purpose of the simulation is to evaluate alternative interventions by a value chain development program, aiming to improve rural livelihood and food and nutrition security. In northern Ghana, where distrust between the partners can be a problem in the functioning of value chains, the program supports the incorporation of smallholder farmers in soy clusters or agriculture APEX organization (farmers’ co-operatives) with a fair business environment. The goal is to to include the smallholder farmers in a strong value chain and reduce distrust.
We develop a spatial, evolutionary model of the endogenous formation and dissolution of groups using a renewable common pool resource. We use this foundation to measure the evolutionary pressures at different organizational levels.
The Inspection Model represents a basic food safety system where inspectors, consumers and stores interact. The purpose of the model is to provide insight into an optimal level of inspectors in a food system by comparing three search strategies.
We develop an IBM that predicts how interactions between elephants, poachers, and law enforcement affect poaching levels within a virtual protected area. The model is theoretical at this stage and is not meant to provide a realistic depiction of poaching, but instead to demonstrate how IBMs can expand upon the existing modelling work done in this field, and to provide a framework for future research. The model could be further developed into a useful management support tool to predict the outcomes of various poaching mitigation strategies at real-world locations. The model was implemented in NetLogo version 6.1.0.
We first compared a scenario in which poachers have prescribed, non-adaptive decision-making and move randomly across the landscape, to one in which poachers adaptively respond to their memories of elephant locations and where other poachers have been caught by law enforcement. We then compare a situation in which ranger effort is distributed unevenly across the protected area to one in which rangers patrol by adaptively following elephant matriarchal herds.
We establish a double-layer network for China’s financial system, consisting of an interbank lending network and a cross-shareholding network. The loss of diffusion in an interbank lending channel independently, a cross-shareholding channel independently and a double-layer contagion channel after one of the financial institutions goes bankrupt with an initial shock are simulated to explore the nonlinear evolution mechanism of financial risk and impact factors of financial systemic risk in China.
PowerGen-ABM is an optimisation model for power plant expansions from 2010 to 2025 with Indonesian electricity systems as the case study. PowerGen-ABM integrates three approaches: techno-economic analysis (TEA), linear programming (LP), and input-output analysis (IOA) and environmental analysis. TEA is based on the revenue requirement (RR) formula by UCDavis (2016), and the environmental analysis accounts for resource consumption (i.e., steel, concrete, aluminium, and energy) and carbon dioxide equivalent (CO2e) emissions during the construction and operational stages of power plants.
Simulation Software for Random-Subset Voting with Borda, approval, plurality and Condorcet.
This software simulates the Random-Subset Voting method for Borda, plurality, approval and Condorcet.
Displaying 10 of 1180 results