Computational Model Library

Displaying 10 of 175 results for "Mark R Kramer" clear search

HOW IT WORKS

This model consists of three agents, and each agent type operates per business theories as below.
a. New technologies(Tech): It evolves per sustaining or disruptive technology trajectory with the constraint of project management triangle (Scope, Time, Quality, and Cost).
b. Entrepreneurs(Entre): It builds up the solution by combining Tech components per its own strategy (Exploration, Exploitation, or Ambidex).
c. Consumer(Consumer): It selects the solution per its own preference due to Diffusion of innovation theory (Innovators, Early Adopters, Early Majority, Late Majority, Laggards)

Riparian forests are one of the most vulnerable ecosystems to the development of biological invasions, therefore limiting their spread is one of the main challenges for conservation. The main factors that explain plant invasions in these ecosystems are the capacity for both short- and long-distance seed dispersion, and the occurrence of suitable habitats that facilitate the establishment of the invasive species. Large floods constitute an abiotic filter for invasion.

This model simulates the spatio-temporal spread of the woody invader Gleditsia. triacanthos in the riparian forest of the National Park Esteros de Farrapos e Islas del Río Uruguay, a riparian system in the coast of the Uruguay river (South America). In this model, we represent different environmental conditions for the development of G. triacanthos, long- and short-distance spread of its fruits, and large floods as the main factor of mortality for fruit and early stages.

Field results show that the distribution pattern of this invasive species is limited by establishment, i.e. it spreads locally through the expansion of small areas, and remotely through new invasion foci. This model recreates this dispersion pattern. We use this model to derive management implications to control the spread of G. triacanthos

I model a forest and a community of loggers. Agents follow different kinds of rules in order to log. I compare the impact of endogenous and of exogenous institutions on the state of the forest and on the profit of the users, representing different scenarios of participatory conservation projects.

This is a generic sub-model of animal territory formation. It is meant to be a reusable building block, but not in the plug-and-play sense, as amendments are likely to be needed depending on the species and region. The sub-model comprises a grid of cells, reprenting the landscape. Each cell has a “quality” value, which quantifies the amount of resources provided for a territory owner, for example a tiger. “Quality” could be prey density, shelter, or just space. Animals are located randomly in the landscape and add grid cells to their intial cell until the sum of the quality of all their cells meets their needs. If a potential new cell to be added is owned by another animal, competition takes place. The quality values are static, and the model does not include demography, i.e. mortality, mating, reproduction. Also, movement within a territory is not represented.

Adoption of conservation practices

Irem Daloglu | Published Monday, October 21, 2013

This model is designed to investigate the impact of alternative policy approaches and changing land tenure dynamics on farmer adoption of conservation practices intended to increase the water quality.

This is an agent-based model that simulates the structural evolution in food supply chain.

The purpose of this model is to understand the role of trade networks and their interaction with different fish resources, for fish provision. The model is developed based on a multi-methods approach, combining agent-based modeling, network analysis and qualitative data based on a small-scale fisheries study case. The model can be used to investigate both how trade network structures are embedded in a social-ecological context and the trade processes that occur within them, to analyze how they lead to emergent outcomes related to the resilience of fish provision. The model processes are informed by qualitative data analysis, and the social network analysis of an empirical fish trade network. The network analysis can be used to investigate diverse network structures to perform model experiments, and their influence on model outcomes.

The main outcomes we study are 1) the overexploitation of fish resources and 2) the availability and variability of fish provision to satisfy different market demands, and 3) individual traders’ fish supply at the micro-level. The model has two types of trader agents, seller and dealer. The model reveals that the characteristics of the trade networks, linked to different trader types (that have different roles in those networks), can affect the resilience of fish provision.

Frotembo

Christophe Le Page Kadiri Serge Bobo | Published Thursday, October 16, 2014

A stylized scale model to codesign with villagers an agent-based model of bushmeat hunting in the periphery of Korup National Park (Cameroon)

This repository contains: (1) a model calibration procedure that identifies a set of diverse, plausible models; and (2) an ABM of smallholder agriculture, which is used as a case study application for the calibration method. By identifying a set of diverse models, the calibration method attends to the issue of “equifinality” prevalent in complex systems, which is a situation where multiple plausible process descriptions exist for a single outcome.

A Simulation of Entrepreneurial Spawning

Mark Bagley | Published Wednesday, June 08, 2016 | Last modified Friday, June 30, 2017

Industrial clustering patterns are the result of an entrepreneurial process where spinoffs inherit the ideas and attributes of their parent firms. This computational model maps these patterns using abstract methodologies.

Displaying 10 of 175 results for "Mark R Kramer" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept