Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 134 results making clear search
We develop an IBM that predicts how interactions between elephants, poachers, and law enforcement affect poaching levels within a virtual protected area. The model is theoretical at this stage and is not meant to provide a realistic depiction of poaching, but instead to demonstrate how IBMs can expand upon the existing modelling work done in this field, and to provide a framework for future research. The model could be further developed into a useful management support tool to predict the outcomes of various poaching mitigation strategies at real-world locations. The model was implemented in NetLogo version 6.1.0.
We first compared a scenario in which poachers have prescribed, non-adaptive decision-making and move randomly across the landscape, to one in which poachers adaptively respond to their memories of elephant locations and where other poachers have been caught by law enforcement. We then compare a situation in which ranger effort is distributed unevenly across the protected area to one in which rangers patrol by adaptively following elephant matriarchal herds.
It is NetLogo reconstruction of the original FORTRAN code of the classical M. Cohen, J. March, and J. Olsen “garbage can model” (GCM or CMO) of collective decision-making.
The CHIME ABM explores information distribution networks and agents’ protective decision making in the context of hurricane landfall.
The model aims at estimating household energy consumption and the related greenhouse gas (GHG) emissions reduction based on the behavior of the individual household under different operationalizations of the Theory of Planned Behaviour (TPB).
The original model is developed as a tool to explore households decisions regarding solar panel investments and cumulative consequences of these individual choices (i.e. diffusion of PVs, regional emissions savings, monetary savings). We extend the model to explore a methodological question regarding an interpretation of qualitative concepts from social science theories, specifically Theory of Planned Behaviour in a formal code of quantitative agent-based models (ABMs). We develop 3 versions of the model: one TPB-based ABM designed by the authors and two alternatives inspired by the TPB-ABM of Schwarz and Ernst (2009) and the TPB-ABM of Rai and Robinson (2015). The model is implemented in NetLogo.
This model combines decision making models of individual farmers with a model of the spatial spread between farms of blue tongue virus.
We built an agent-based model to foster the understanding of homeowners’ insulation activity.
Our Hybrid Climate Assessment Model (HCAM) aims to simulate the behaviours of individuals under the influence of climate change and external policy makings. In our proposed solution we use System Dynamics (SD) modelling to represent the physical and economic environments. Agent-Based (AB) modelling is used to represent collections of individuals that can interact with other collections of individuals and the environment. In turn, individual agents are endowed with an internal SD model to track their psychological state used for decision making. In this paper we address the feasibility of such a scalable hybrid approach as a proof-of-concept. This novel approach allows us to reuse existing rigid, but well-established Integrated Assessment Models (IAMs), and adds more flexibility by replacing aggregate stocks with a community of vibrant interacting entities.
Our illustrative example takes the settings of the U.S., a country that contributes to the majority of the global carbon footprints and that is the largest economic power in the world. The model considers the carbon emission dynamics of individual states and its relevant economic impacts on the nation over time.
Please note that the focus of the model is on a methodological advance rather than on applying it for predictive purposes! More details about the HCAM are provided in the forthcoming JASSS paper “An Innovative Approach to Multi-Method Integrated Assessment Modelling of Global Climate Change”, which is available upon request from the authors (contact peer-olaf.siebers@nottingham.ac.uk).
The CONSERVAT model evaluates the effect of social influence among farmers in the Lake Naivasha basin (Kenya) on the spatiotemporal diffusion pattern of soil conservation effort levels and the resulting reduction in lake sedimentation.
The model simulates seven agents engaging in collective action and inter-network social learning. The objective of the model is to demonstrate how mental models of agents can co-evolve through a complex relationship among factors influencing decision-making, such as access to knowledge and personal- and group-level constraints.
The Regional Security Game is a iterated public goods game with punishement based on based on life sciences work by Boyd et al. (2003 ) and Hintze & Adami (2015 ), with modifications appropriate for an international relations setting. The game models a closed regional system in which states compete over the distribution of common security benefits. Drawing on recent work applying cultural evolutionary paradigms in the social sciences, states learn through imitation of successful strategies rather than making instrumentally rational choices. The model includes the option to fit empirical data to the model, with two case studies included: Europe in 1933 on the verge of war and south-east Asia in 2013.
Displaying 10 of 134 results making clear search