Approaches to end-to-end ecosystem models

被引:296
|
作者
Fulton, Elizabeth A. [1 ]
机构
[1] CSIRO Marine Res, GPO Box 1538, Hobart, Tas 7001, Australia
关键词
End-to-end models; Ecosystem models; Marine models; INDIVIDUAL-BASED MODEL; PHYTOPLANKTON-ZOOPLANKTON MODEL; POPULATION-DYNAMICS MODEL; TROPHIC LEVEL MODEL; PORT PHILLIP BAY; FISH COMMUNITY; MANAGEMENT STRATEGIES; EXPLOITED ECOSYSTEMS; MATHEMATICAL-MODELS; SPATIALLY EXPLICIT;
D O I
10.1016/j.jmarsys.2009.12.012
中图分类号
P [天文学、地球科学];
学科分类号
07 ;
摘要
Ever growing understanding of general ecological, biogeochemical and climatic processes is allowing for the construction of a growing list of end-to-end models. While many of these are taking the form of generic modelling frameworks, no one approach defines end-to-end ecosystem modelling. There is a wide range of scales, resolutions, forcings, components and represented processes. Examples drawn from existing models can be used to give guidance on best practice approaches for creating end-to-end models. In particular, it is clear that defaulting to the finest resolution and greatest complexity in all the dimensions (e.g. spatial, temporal, taxonomic, process detail) is not beneficial. There is also a lot of value, during model development and implementation, in trying different model types, assumptions and formulations; there is no one "best" model. Maintaining a diversity of approaches is important given that end-to-end models are most effective when used as strategic tools, to address questions that are at scales where there is still a lot of uncertainty about how systems function. There are still many challenges facing the end-to-end modelling field, particularly when long simulation periods are called for, but perhaps the greatest ones are: non-stationarity introduced by shifting climate, biodiversity and evolution; representing human responses; and handling uncertainty. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:171 / 183
页数:13
相关论文
共 50 条
  • [31] A Comparison of Hybrid and End-to-End Models for Syllable Recognition
    Bayerl, Sebastian P.
    Riedhammer, Korbinian
    [J]. TEXT, SPEECH, AND DIALOGUE (TSD 2019), 2019, 11697 : 352 - 360
  • [32] Combination of end-to-end and hybrid models for speech recognition
    Wong, Jeremy H. M.
    Gaur, Yashesh
    Zhao, Rui
    Lu, Liang
    Sun, Eric
    Li, Jinyu
    Gong, Yifan
    [J]. INTERSPEECH 2020, 2020, : 1783 - 1787
  • [33] Assessing Versatility of a Generic End-to-End Platform for IoT Ecosystem Applications
    Berta, Riccardo
    Bellotti, Francesco
    De Gloria, Alessandro
    Lazzaroni, Luca
    [J]. SENSORS, 2022, 22 (03)
  • [34] Exploring Two Approaches for an End-to-End Scientific Analysis Workflow
    Dodelson, Scott
    Kent, Steve
    Kowalkowski, Jim
    Paterno, Marc
    Sehrish, Saba
    [J]. 21ST INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP2015), PARTS 1-9, 2015, 664
  • [35] Learning Diverse Models for End-to-End Ensemble Tracking
    Wang, Ning
    Zhou, Wengang
    Li, Houqiang
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2021, 30 : 2220 - 2231
  • [36] Models for calculating end-to-end delay in packet networks
    Osterbo, O
    [J]. PROVIDING QUALITY OF SERVICE IN HETEROGENEOUS ENVIRONMENTS, VOLS 5A AND 5B, 2003, 5A-B : 1231 - 1240
  • [37] AN INVESTIGATION OF END-TO-END MODELS FOR ROBUST SPEECH RECOGNITION
    Prasad, Archiki
    Jyothi, Preethi
    Velmurugan, Rajbabu
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 6893 - 6897
  • [38] SDWN for End-to-End QoS Path Selection in a Wireless Network Ecosystem
    Semenciuc, Eugeniu
    Pastrav, Andra
    Palade, Tudor
    Puschita, Emanuel
    [J]. FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, FABULOUS 2017, 2018, 241 : 134 - 140
  • [39] Target Confusion in End-to-end Speaker Extraction: Analysis and Approaches
    Zhao, Zifeng
    Yang, Dongchao
    Gu, Rongzhi
    Zhang, Haoran
    Zou, Yuexian
    [J]. INTERSPEECH 2022, 2022, : 5333 - 5337
  • [40] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79