Lecture_21_Exploitation II_23March 2011

Lecture_21_Exploitation II_23March 2011 - ExploitationII

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Exploitation II
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lotka and Volterra models are  deterministic  – which means that the values of  the variables and the initial population sizes determine exactly what will  happen. In real life random events and variation in the environment influence  population dynamics.  Stochastic  models take into account these chance events and variation in the  environment. Compare the output of the Stochastic SimUText model with the controlled  Lotka-Volterra model (page 10/14 versus page 8/14) 
Background image of page 2
Lotka-Volterra predator- prey model - Review Fig 14.17 Be able to recognize the model  distinguish it from their competition model) if you  are shown the equations (for example, in a quiz or  exam).
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Equation for prey (host) dynamics looks like this:  dN h  = r h N h  – pN h N p       dt Equation for predator dynamics looks like this:  dN p   = cpN h N p  – d p N p  
Background image of page 4
Many of the assumptions of the Lotka-Volterra  predator-prey model are not realistic 1 . No  density dependence in growth rates  for either predator  or prey (i.e. no K or term for intra-specific competition)    2. The prey (host) species is the  only food source  for the  predator.   3. The predator is the only  cause of death  for the prey.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Many of the assumptions of the Lotka-Volterra  predator-prey model are not realistic 4. Predators  instantaneously convert prey
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/12/2011 for the course BIO 326 taught by Professor Gehring,c during the Spring '08 term at N. Arizona.

Page1 / 30

Lecture_21_Exploitation II_23March 2011 - ExploitationII

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online