Code Monkey home page Code Monkey logo

Aydin Mohseni's Projects

bounded-confidence-model icon bounded-confidence-model

This model explores the question how opinion formation within an interacting group leads to consensus, polarization, or fragmentation.

em-algorithm-for-gaussian-mixtures icon em-algorithm-for-gaussian-mixtures

The estimation maximization algorithm demonstrates an unsupervised, iterative approach to finding maximum likelihood estimates of parameters for a gaussian mixture model, where the model depends on unobserved latent variables.

frequency-dependent-moran-process icon frequency-dependent-moran-process

Computational model of the Moran process for 2x2 symmetric normal form games. Derives the Nash equilibria, evolutionarily stable states, and stochastically stable state of each game, given the size of the population, mutation rate, and intensity of selection. Also, plots the stationary distribution, and allows for the simulation of individual evolving populations.

minority-majority-experiment icon minority-majority-experiment

A decision-making experiment, created in oTree for the MTurk platform. Eight players are divided into (minority and majority) groups, and are randomly matched for 100 rounds to play a simplified Nash bargaining game.

multi-armed-bandit icon multi-armed-bandit

Hierarchical and sequential multi-armed bandit model of scientific inquiry, meant to illustrate the problem of unconceived alternatives.

reporting-and-bias-0 icon reporting-and-bias-0

A model of how news reporting interacts with confirmation bias to produce belief distortion.

reporting-and-bias-alpha icon reporting-and-bias-alpha

This model explore the way that individual confirmation bias along with hyperbole and cherry-picking of events in news media can lead to belief polarization.

self-assembling-networks icon self-assembling-networks

This model explores how a social network might self-assemble from the ritualization of the decisions of individual agents. These models show how inquiry in an evolved social network may be significantly more reliable than the individual inquiry of the agents. They also show how such networks may dramatically lower the epistemic risk faced by each inquirer. We consider both models of both perfect and imperfect communication and compare the evolved behavior of inquirers in each.

truth-and-conformity-on-networks icon truth-and-conformity-on-networks

This simulation models how social networks can influence the flow and reliability of information in inquiry. In the model, heterogeneous agents--driven, to varying degrees, by the competing priorities of accuracy and of conformity to one’s peers--share public opinions. Agents learn, via Bayesian conditionalization, both from private signal from nature, and from the public opinions of other agents.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.