Computational Model Library

Displaying 10 of 60 results for "Aled Jones" clear search

This model inspects the performance of firms as the product attribute space changes, which evolves as a consequence of firms’ actions. Firms may create new product variants by dragging demand from other existing variants. Firms decide whether to open new product variants, to invade existing ones, or to keep their variant portfolio. At each variant there is a Cournot competition each round. Competition is nested since many firms compete at many variants simultaneously, affecting firm composition at each location (variant).

After the Cournot outcomes, at each round firms decide whether to (i) keep their existing product variant niche, (ii) invade an existing variant, (iii) create a new variant, or (iv) abandon a variant. Firms’ profits across their niche take into consideration the niche-width cost and the cost of opening a new variant.

We build a computational model to investigate, in an evolutionary setting, a series of questions pertaining to happiness.

Our aim is to show effects of group living when only low-level cognition is assumed, such as pattern recognition needed for normal functioning, without assuming individuals have knowledge about others around them or warn them actively.
The model is of a group of vigilant foragers staying within a patch, under attack by a predator. The foragers use attentional scanning for predator detection, and flee after detection. This fleeing action constitutes a visual cue to danger, and can be received non-attentionally by others if it occurs within their limited visual field. The focus of this model is on the effectiveness of this non-attentional visual information reception.
A blind angle obstructing cue reception caused by behaviour can exist in front, morphology causes a blind angle in the back. These limitations are represented by two visual field shapes. The scan for predators is all-around, with distance-dependent detection; reception of flight cues is limited by visual field shape.
Initial parameters for instance: group sizes, movement, vision characteristics for predator detection and for cue reception. Captures (failure), number of times the information reached all individuals at the same time (All-fled, success), and several other effects of the visual settings are recorded.

CHAAHK: a Spatial Simulation of the Maya Elevated Core Region

Alex Kara | Published Tuesday, December 04, 2018 | Last modified Thursday, September 26, 2019

This thesis presents an abstract spatial simulation model of the Maya Central Lowlands coupled human and natural system from 1000 BCE to the present day. It’s name is the Climatically Heightened but Anothropogenically Achieved Historical Kerplunk model (CHAAHK). The simulation features features virtual human groups, population centers, transit routes, local resources, and imported resources. Despite its embryonic state, the model demonstrates how certain anthropogenic characteristics of a landscape can interact with externally induced trauma and result in a prolonged period of relative sociopolitical uncomplexity. Analysis of batch simulation output suggests decreasing empirical uncertainties about ancient wetland modification warrants more investment. This first submission of CHAAHK’s code represents the simulation’s implementation that was featured in the author’s master’s thesis.

Hybrid attacks coordinate the exploitation of vulnerabilities across domains to undermine trust in authorities and cause social unrest. Whilst such attacks have primarily been seen in active conflict zones, there is growing concern about the potential harm that can be caused by hybrid attacks more generally and a desire to discover how better to identify and react to them. In addressing such threats, it is important to be able to identify and understand an adversary’s behaviour. Game theory is the approach predominantly used in security and defence literature for this purpose. However, the underlying rationality assumption, the equilibrium concept of game theory, as well as the need to make simplifying assumptions can limit its use in the study of emerging threats. To study hybrid threats, we present a novel agent-based model in which, for the first time, agents use reinforcement learning to inform their decisions. This model allows us to investigate the behavioural strategies of threat agents with hybrid attack capabilities as well as their broader impact on the behaviours and opinions of other agents.

The western honey bee Apis mellifera is the most important pollinator in the world. The biggest threat to managed honey bees is the ectoparasitic mite Varroa destructor and the viruses DWV (Deformed Wing Virus) and APV (Acute Paralysis Virus) it transmits. Untreated honey bee colonies are expected to die within one to three years. This led to the development of strategies for beekeepers to control the Varroa mite in honey bee colonies and ensure the health and survival of their bee colonies, so called Good Beekeeping Practice. The aim of the extension of BEEHAVE was to represent the Good Beekeeping Practice of Varroa control in Germany. The relevant measures within the Varroa control strategies are drone brood removal as a Varroa trap and the treatment of bee colonies with organic acaricides (formic and oxalic acid) to kill the mites. This extension improves BEEHAVE and builds a bridge between beekeepers in practice and in the modelling world. It vastly contributes to the future use of BEEHAVE in beekeeping education in Germany.

SpeciesWorld

Tony Lawson | Published Friday, March 16, 2012 | Last modified Saturday, April 27, 2013

How can species evolve a cooperative network to keep the environment suitable for life?

Project for the course “Introduction to Agent-Based Modeling”.

The NetLogo model implements an Opinion Dynamics model with different confidence distributions, inspired by the Bounded Confidence model presented by Hegselmann and Krause in 2002. Hegselmann and Krause used a model with uniform distribution of confidence, but one could imagine agents that are more confident in their own opinions than others. Confidence with triangular, semi-circular, and Gaussian distributions are implemented. Moreover, network structure is optional and can be taken into account in the agent’s confidence such that agents assign less confidence the further away from them other agents are.

A simple emulation-based computational model

Carlos M Fernández-Márquez Francisco J Vázquez | Published Tuesday, May 21, 2013 | Last modified Tuesday, February 05, 2019

Emulation is one of the simplest and most common mechanisms of social interaction. In this paper we introduce a descriptive computational model that attempts to capture the underlying dynamics of social processes led by emulation.

Spatial model of the noisy Prisoner's Dilemma with reward shift

Matus Halas | Published Thursday, March 05, 2015 | Last modified Tuesday, May 29, 2018

Interactions of players embedded in a closed square lattice are determined by distance and overall gains and they lead to shifts of reward payoff between temptation and punishment. A new winner balancing against threats is ultimately discovered.

Displaying 10 of 60 results for "Aled Jones" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept