Skip to content

lseiter/threshold-model

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

threshold-model

We use a threshold model to drive our simulated network analysis testing public support for candidates in invisible primaries. We assign voter thresholds for candidates and vary number of voters, attachment to candidates and decay. Results of the algorithm show effects of size of lead, an unwavering base of support, and information loss.

Keywords: Network analysis; Threshold model, Invisible Primary, Campaigns and Elections, Presidency

Elizabeth A. Stiles, John Carroll University
Colin D. Swearingen, John Carroll University
Linda Seiter, John Carroll University
Brendan Foreman, KeyBank

About

Threshold Model Voting Simulation

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages