Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/5334
Title: | The spread of a biological invasion in space and time: Modelling active and passive surveillance | Contributor(s): | Hester, Susan (author); Cacho, Oscar Jose (author) | Publication Date: | 2009 | Handle Link: | https://hdl.handle.net/1959.11/5334 | Abstract: | Invasive species are an important threat to global biodiversity and cause considerable economic losses. Modelling the spread of invaders can assist in mitigating the impacts of biological invasions by allowing us to identify strategies that are most likely to be effective in slowing or reversing their spread. In many situations, the main constraint to controlling or eradicating invaders is finding them rather than eliminating them after they are located. Once an invasion is found it can be treated and killed with a high probability of success. Searching large areas actively is expensive and therefore enlisting the help of the public through 'passive surveillance' is increasingly being used by pest-management agencies. The roles of active and passive surveillance and their interaction are investigated here using a spatially-explicit simulation model of the spread of an invasive species. The landscape is represented as a raster map consisting of square cells. Each cell in the landscape is characterised by various attributes, including habitat suitability and ownership type (private or public). The probability that a given site will be invaded depends on both habitat suitability and the number of propagules landing on it. Dispersal of propagules across the landscape is assumed to follow a Cauchy kernel. Long-distance dispersal may also occur independently, such as when propagules are transported by road or water. An invasion may be detected as a result of a report from the public or through active searching by a pest-control agency. Over time, the pest control agency uses passive detections, repeat searches and information about cell attributes to undertake additional searches in an attempt to eradicate the invader. The model is applied to a hypothetical invasion. Measures of success, such as cost and probability of eradication, are incorporated as fitness measures within an evolutionary algorithm that identifies optimal search and control strategies. Strategies are defined in terms of search effort applied per cell, the size of the neighbouring radius that is searched when an infestation is discovered, and the number of repeat visits to previously treated sites. Results demonstrate that increases in passive detection can reduce eradication costs and increased the probability of eradication. Although it is impossible to ensure that the global optimum is identified for a given scenario, the evolutionary algorithm helps identify quasi-optimal solutions that may be difficult to find through trial and error. | Publication Type: | Conference Publication | Conference Details: | IMACS/MODSIM09: 18th World IMACS Congress and MODSIM09 International Congress on Modelling and Simulation, Cairns, Australia, 13th -17th July, 2009 | Source of Publication: | Interfacing modelling and simulation with mathematical and computational sciences: Proceedings of the 18th IMACS / MODSIM World Congress, p. 4298-4304 | Publisher: | Modelling and Simulation Society of Australia and New Zealand (MSSANZ) | Place of Publication: | Australia | Fields of Research (FoR) 2008: | 050103 Invasive Species Ecology 140205 Environment and Resource Economics |
Socio-Economic Objective (SEO) 2008: | 960699 Environmental and Natural Resource Evaluation not elsewhere classified 910299 Microeconomics not elsewhere classified |
Peer Reviewed: | Yes | HERDC Category Description: | E1 Refereed Scholarly Conference Publication | Publisher/associated links: | http://www.mssanz.org.au/modsim09/ http://trove.nla.gov.au/work/28281505 |
---|---|
Appears in Collections: | Conference Publication |
Files in This Item:
File | Description | Size | Format |
---|
Page view(s)
1,126
checked on Mar 8, 2023
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.