Computational Model Library

Displaying 10 of 1147 results for "Lee-Ann Sutherland" clear search

Comparing agent-based models on experimental data of irrigation games

Marco Janssen Jacopo A. Baggio | Published Tuesday, July 02, 2013 | Last modified Wednesday, July 03, 2013

Comparing 7 alternative models of human behavior and assess their performance on a high resolution dataset based on individual behavior performance in laboratory experiments.

A first version of a model that describes how coalitions are formed during open, networked innovation

The S-uFUNK Model

Davide Secchi | Published Friday, March 17, 2023

This version 2.1.0 of the uFunk model is about setting a business strategy (the S in the name) for an organization. A team of managers (or executives) meet and discuss various options on the strategy for the firm. There are three aspects that they have to agree on to set the strategic positioning of the organization.
The discussion is on market, stakeholders, and resources. The team (it could be a business strategy task force) considers various aspects of these three elements. The resources they use to develop the discussion can come from a traditional approach to strategy or from non-traditional means (e.g., so-called serious play, creativity and imagination techniques).
The S-uFunk 2.1.0 Model wants to understand to which extent cognitive means triggered by traditional and non-traditional resources affect the making of the strategy process.

The purpose of this curricular model is to teach students the basics of modeling complex systems using agent-based modeling. It is a simple SIR model that simulates how a disease spreads through a population as its members change from susceptible to infected to recovered and then back to susceptible. The dynamics of the model are such that there are multiple emergent outcomes depending on the parameter settings, initial conditions, and chance.

The curricular model can be used with the chapter Agent-Based Modeling in Mixed Methods Research (Moritz et al. 2022) in the Handbook of Teaching Qualitative & Mixed Methods (Ruth et al. 2022).

The instructional videos can be accessed on YouTube: Video 1 (https://youtu.be/32_JIfBodWs); Video 2 (https://youtu.be/0PK_zVKNcp8); and Video 3 (https://youtu.be/0bT0_mYSAJ8).

This model is intended to study the way information is collectively managed (i.e. shared, collected, processed, and stored) in a system and how it performs during a crisis or disaster. Performance is assessed in terms of the system’s ability to provide the information needed to the actors who need it when they need it. There are two main types of actors in the simulation, namely communities and professional responders. Their ability to exchange information is crucial to improve the system’s performance as each of them has direct access to only part of the information they need.

In a nutshell, the following occurs during a simulation. Due to a disaster, a series of randomly occurring disruptive events takes place. The actors in the simulation need to keep track of such events. Specifically, each event generates information needs for the different actors, which increases the information gaps (i.e. the “piles” of unaddressed information needs). In order to reduce the information gaps, the actors need to “discover” the pieces of information they need. The desired behavior or performance of the system is to keep the information gaps as low as possible, which is to address as many information needs as possible as they occur.

In recent years we have seen multiple incidents with a large number of people injured and killed by one or more armed attackers. Since this type of violence is difficult to predict, detecting threats as early as possible allows to generate early warnings and reduce response time. In this context, any tool to check and compare different action protocols can be a further step in the direction of saving lives. Our proposal combines features from continuous and discrete models to obtain the best of both worlds in order to simulate large and crowded spaces where complex behavior individuals interact. With this proposal we aim to provide a tool for testing different security protocols under several emergency scenarios, where spaces, hazards, and population can be customized. Finally, we use a proof of concept implementation of this model to test specific security protocols under emergency situations for real spaces. Specifically, we test how providing some users of a university college with an app that informs about the type and characteristics of the ongoing hazard, affects in the safety performance.

ACT: Agent-based model of Critical Transitions

Igor Nikolic Oscar Kraan Steven Dalderop Gert Jan Kramer | Published Wednesday, October 18, 2017 | Last modified Monday, August 27, 2018

ACT is an ABM based on an existing conceptualisation of the concept of critical transitions applied to the energy transition. With the model we departed from the mean-field approach simulated relevant actor behaviour in the energy transition.

Peer reviewed Garbage can model Excel reconstruction

Smarzhevskiy Ivan | Published Tuesday, August 19, 2014 | Last modified Tuesday, July 30, 2019

Reconstruction of the original code M. Cohen, J. March, and J. Olsen garbage can model, realized by means of Microsoft Office Excel 2010

This model describes and analyses the outcomes of the confrontation of interests, some conflicting, some common, about the management of a small river in SW France

Peer reviewed JuSt-Social COVID-19

Jennifer Badham | Published Thursday, June 18, 2020 | Last modified Monday, March 29, 2021

NetLogo model that allows scenarios concerning general social distancing, shielding of high-risk individuals, and informing contacts when symptomatic. Documentation includes a user manual with some simple scenarios, and technical information including descriptions of key procedures and parameter values.

Displaying 10 of 1147 results for "Lee-Ann Sutherland" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept