Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Iadine Chadès is active.

Publication


Featured researches published by Iadine Chadès.


PLOS ONE | 2007

Optimal conservation of migratory species.

Tara G. Martin; Iadine Chadès; Peter Arcese; Peter P. Marra; Hugh P. Possingham; D. Ryan Norris

Background Migratory animals comprise a significant portion of biodiversity worldwide with annual investment for their conservation exceeding several billion dollars. Designing effective conservation plans presents enormous challenges. Migratory species are influenced by multiple events across land and sea–regions that are often separated by thousands of kilometres and span international borders. To date, conservation strategies for migratory species fail to take into account how migratory animals are spatially connected between different periods of the annual cycle (i.e. migratory connectivity) bringing into question the utility and efficiency of current conservation efforts. Methodology/Principal Findings Here, we report the first framework for determining an optimal conservation strategy for a migratory species. Employing a decision theoretic approach using dynamic optimization, we address the problem of how to allocate resources for habitat conservation for a Neotropical-Nearctic migratory bird, the American redstart Setophaga ruticilla, whose winter habitat is under threat. Our first conservation strategy used the acquisition of winter habitat based on land cost, relative bird density, and the rate of habitat loss to maximize the abundance of birds on the wintering grounds. Our second strategy maximized bird abundance across the entire range of the species by adding the constraint of maintaining a minimum percentage of birds within each breeding region in North America using information on migratory connectivity as estimated from stable-hydrogen isotopes in feathers. We show that failure to take into account migratory connectivity may doom some regional populations to extinction, whereas including information on migratory connectivity results in the protection of the species across its entire range. Conclusions/Significance We demonstrate that conservation strategies for migratory animals depend critically upon two factors: knowledge of migratory connectivity and the correct statement of the conservation problem. Our framework can be used to identify efficient conservation strategies for migratory taxa worldwide, including insects, birds, mammals, and marine organisms.


Proceedings of the National Academy of Sciences of the United States of America | 2008

When to stop managing or surveying cryptic threatened species.

Iadine Chadès; Eve McDonald-Madden; Michael A. McCarthy; Brendan A. Wintle; Matthew Linkie; Hugh P. Possingham

Threatened species become increasingly difficult to detect as their populations decline. Managers of such cryptic threatened species face several dilemmas: if they are not sure the species is present, should they continue to manage for that species or invest the limited resources in surveying? We find optimal solutions to this problem using a Partially Observable Markov Decision Process and rules of thumb derived from an analytical approximation. We discover that managing a protected area for a cryptic threatened species can be optimal even if we are not sure the species is present. The more threatened and valuable the species is, relative to the costs of management, the more likely we are to manage this species without determining its continued persistence by using surveys. If a species remains unseen, our belief in the persistence of the species declines to a point where the optimal strategy is to shift resources from saving the species to surveying for it. Finally, when surveys lead to a sufficiently low belief that the species is extant, we surrender resources to other conservation actions. We illustrate our findings with a case study using parameters based on the critically endangered Sumatran tiger (Panthera tigris sumatrae), and we generate rules of thumb on how to allocate conservation effort for any cryptic species. Using Partially Observable Markov Decision Processes in conservation science, we determine the conditions under which it is better to abandon management for that species because our belief that it continues to exist is too low.


Proceedings of the National Academy of Sciences of the United States of America | 2011

General rules for managing and surveying networks of pests, diseases, and endangered species

Iadine Chadès; Tara G. Martin; Sam Nicol; Mark A. Burgman; Hugh P. Possingham; Yvonne M. Buckley

The efficient management of diseases, pests, or endangered species is an important global issue faced by agencies constrained by limited resources. The management challenge is even greater when organisms are difficult to detect. We show how to prioritize management and survey effort across time and space for networks of susceptible–infected–susceptible subpopulations. We present simple and robust rules of thumb for protecting desirable, or eradicating undesirable, subpopulations connected in typical network patterns (motifs). We further demonstrate that these rules can be generalized to larger networks when motifs are combined in more complex formations. Results show that the best location to manage or survey a pest or a disease on a network is also the best location to protect or survey an endangered species. The optimal starting point in a network is the fastest motif to manage, where line, star, island, and cluster motifs range from fast to slow. Managing the most connected node at the right time and maintaining the same management direction provide advantages over previously recommended outside–in strategies. When a species or disease is not detected and our belief in persistence decreases, our results recommend shifting resources toward management or surveillance of the most connected nodes. Our analytic approximation provides guidance on how long we should manage or survey networks for hard-to-detect organisms. Our rules take into account management success, dispersal, economic cost, and imperfect detection and offer managers a practical basis for managing networks relevant to many significant environmental, biosecurity, and human health issues.


Proceedings of the Royal Society of London B: Biological Sciences | 2013

Migratory connectivity magnifies the consequences of habitat loss from sea-level rise for shorebird populations.

Takuya Iwamura; Hugh P. Possingham; Iadine Chadès; Clive Minton; Nicholas J. Murray; Danny I. Rogers; Eric A. Treml; Richard A. Fuller

Sea-level rise (SLR) will greatly alter littoral ecosystems, causing habitat change and loss for coastal species. Habitat loss is widely used as a measurement of the risk of extinction, but because many coastal species are migratory, the impact of habitat loss will depend not only on its extent, but also on where it occurs. Here, we develop a novel graph-theoretic approach to measure the vulnerability of a migratory network to the impact of habitat loss from SLR based on population flow through the network. We show that reductions in population flow far exceed the proportion of habitat lost for 10 long-distance migrant shorebirds using the East Asian–Australasian Flyway. We estimate that SLR will inundate 23–40% of intertidal habitat area along their migration routes, but cause a reduction in population flow of up to 72 per cent across the taxa. This magnifying effect was particularly strong for taxa whose migration routes contain bottlenecks—sites through which a large fraction of the population travels. We develop the bottleneck index, a new network metric that positively correlates with the predicted impacts of habitat loss on overall population flow. Our results indicate that migratory species are at greater risk than previously realized.


Frontiers in Ecology and the Environment | 2015

Why do we map threats? Linking threat mapping with actions to make better conservation decisions

Vivitskaia J. Tulloch; Ayesha I. T. Tulloch; Piero Visconti; Benjamin S. Halpern; James E. M. Watson; Megan C. Evans; Nancy A. Auerbach; Megan Barnes; Maria Beger; Iadine Chadès; Sylvaine Giakoumi; Eve McDonald-Madden; Nicholas J. Murray; Jeremy Ringma; Hugh P. Possingham

Spatial representations of threatening processes – “threat maps” – can identify where biodiversity is at risk, and are often used to identify priority locations for conservation. In doing so, decision makers are prone to making errors, either by assuming that the level of threat dictates spatial priorities for action or by relying primarily on the location of mapped threats to choose possible actions. We show that threat mapping can be a useful tool when incorporated within a transparent and repeatable structured decision-making (SDM) process. SDM ensures transparent and defendable conservation decisions by linking objectives to biodiversity outcomes, and by considering constraints, consequences of actions, and uncertainty. If used to make conservation decisions, threat maps are best developed with an understanding of how species respond to actions that mitigate threats. This approach will ensure that conservation actions are prioritized where they are most cost-effective or have the greatest impact, rather than where threat levels are highest.


Methods in Ecology and Evolution | 2015

When do we need more data? A primer on calculating the value of information for applied ecologists

Stefano Canessa; Gurutzeta Guillera-Arroita; José J. Lahoz-Monfort; Darren M. Southwell; Doug P. Armstrong; Iadine Chadès; Robert C. Lacy; Sarah J. Converse

Summary Applied ecologists continually advocate further research, under the assumption that obtaining more information will lead to better decisions. Value of information (VoI) analysis can be used to quantify how additional information may improve management outcomes: despite its potential, this method is still underused in environmental decision-making. We provide a primer on how to calculate the VoI and assess whether reducing uncertainty will change a decision. Our aim is to facilitate the application of VoI by managers who are not familiar with decision-analytic principles and notation, by increasing the technical accessibility of the tool. Calculating the VoI requires explicit formulation of management objectives and actions. Uncertainty must be clearly structured and its effects on management outcomes evaluated. We present two measures of the VoI. The expected value of perfect information is a calculation of the expected improvement in management outcomes that would result from access to perfect knowledge. The expected value of sample information calculates the improvement in outcomes expected by collecting a given sample of new data. We guide readers through the calculation of VoI using two case studies: (i) testing for disease when managing a frog species and (ii) learning about demographic rates for the reintroduction of an endangered turtle. We illustrate the use of Bayesian updating to incorporate new information. The VoI depends on our current knowledge, the quality of the information collected and the expected outcomes of the available management actions. Collecting information can require significant investments of resources; VoI analysis assists managers in deciding whether these investments are justified.


Conservation Biology | 2015

Benefits of integrating complementarity into priority threat management.

Iadine Chadès; Sam Nicol; Stephen van Leeuwen; Belinda Walters; Jennifer Firn; Andrew Reeson; Tara G. Martin; Josie Carwardine

Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for


acm symposium on applied computing | 2002

A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problem

Iadine Chadès; Bruno Scherrer; François Charpillet

4.7 million/year over 20 years. Achieving the same result cost almost twice as much (


Conservation Biology | 2012

Setting Realistic Recovery Targets for Two Interacting Endangered Species, Sea Otter and Northern Abalone

Iadine Chadès; Janelle M. R. Curtis; Tara G. Martin

9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches.


Ecological Applications | 2011

Allocating conservation resources between areas where persistence of a species is uncertain.

Eve McDonald-Madden; Iadine Chadès; Michael A. McCarthy; Matthew Linkie; Hugh P. Possingham

Defining the behaviour of a set of situated agents, such that a collaborative problem can be solved is a key issue in multi-agent systems. In this paper, we formulate this problem from the decision theoretic perspective using the framework of Decentralized Partially Observable Markov Decision Processes (DEC-POMDP). Formulating the coordination problem in this way provides a formal foundation for study of cooperation activities. But, as it has been recently shown solving DEC-POMDP is NEXP-complete and thus it is not a realistic approach for the design of agent cooperation policies. However, we demonstrate in this paper that it is not completely desperate. Indeed, we propose an heuristic approach for solving DEC-POMDP when agents are memory-less and when the global reward function can be broken up into a sum of local reward functions. We demonstrate experimentally on an example (the so-called pursuit problem) that this heuristic is efficient within a few iteration steps.

Collaboration


Dive into the Iadine Chadès's collaboration.

Top Co-Authors

Avatar

Sam Nicol

University of Alaska Fairbanks

View shared research outputs
Top Co-Authors

Avatar

Tara G. Martin

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Josie Carwardine

Commonwealth Scientific and Industrial Research Organisation

View shared research outputs
Top Co-Authors

Avatar

Jennifer Firn

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Belinda Walters

Commonwealth Scientific and Industrial Research Organisation

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sam Nicol

University of Alaska Fairbanks

View shared research outputs
Top Co-Authors

Avatar

Andrew Reeson

Commonwealth Scientific and Industrial Research Organisation

View shared research outputs
Researchain Logo
Decentralizing Knowledge