System Dynamics Models

These models and simulations have been tagged “System Dynamics”.

Related tagsSterman

A pest known as a grape-leaf hopper can cause considerable losses in vineyards. Periodically it was found that a natural parasite, anagrus epos, drastically reduced the size of the hopper population. This, in turn, led to a reduction in food (hoppers) available to the parasite and the parasite popul
A pest known as a grape-leaf hopper can cause considerable losses in vineyards. Periodically it was found that a natural parasite, anagrus epos, drastically reduced the size of the hopper population. This, in turn, led to a reduction in food (hoppers) available to the parasite and the parasite population declined until the hopper population increased again. This cycle would repeat.It was found that the parasite, anagrus epos, also feeds on a non-pest leaf hopper which feeds on blackberries. By planting small patches of wild blackberries in the vineyards, the growers were able to maintain a stable parasite population that was large enough to control population explosions of both leaf hoppers.
Based on model discussed by John D. Sterman (p 508) in  All models are wrong: reflections on becoming a systems scientist  (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flo
Based on model discussed by John D. Sterman (p 508) in All models are wrong: reflections on becoming a systems scientist (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flow connection with a connection from Trig. function.  Repeat (A) & (B).
Based on model discussed by John D. Sterman (p 508) in  All models are wrong: reflections on becoming a systems scientist  (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flo
Based on model discussed by John D. Sterman (p 508) in All models are wrong: reflections on becoming a systems scientist (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flow connection with a connection from Trig. function.  Repeat (A) & (B).
Based on model discussed by John D. Sterman (p 508) in  All models are wrong: reflections on becoming a systems scientist  (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flo
Based on model discussed by John D. Sterman (p 508) in All models are wrong: reflections on becoming a systems scientist (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flow connection with a connection from Trig. function.  Repeat (A) & (B).
A System Dymanic Model of a Predator-Prey interactions using the real-life data. The predator on this model is Equatorial Spitting Cobra while the prey is Palawan Mountain Rat
A System Dymanic Model of a Predator-Prey interactions using the real-life data. The predator on this model is Equatorial Spitting Cobra while the prey is Palawan Mountain Rat
Based on model discussed by John D. Sterman (p 508) in  All models are wrong: reflections on becoming a systems scientist  (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flo
Based on model discussed by John D. Sterman (p 508) in All models are wrong: reflections on becoming a systems scientist (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flow connection with a connection from Trig. function.  Repeat (A) & (B).
 Based on a dialogue on the System Dynamics mailing list regarding the current level of acceptance of System Dynamics after it has been promoted for over 70 years I dredged up the following set of influences as a thought exercise. This is an example of a Drifting Goals Archetype.

Based on a dialogue on the System Dynamics mailing list regarding the current level of acceptance of System Dynamics after it has been promoted for over 70 years I dredged up the following set of influences as a thought exercise. This is an example of a Drifting Goals Archetype.

This model represents a repair contract to fix a group of houses with unresolved construction defects.
This model represents a repair contract to fix a group of houses with unresolved construction defects.
 Prey    dx / dt  =  αx  -  βxy   The prey reproduces exponentially ( αx ) unless subject to predation. The rate of predation is the chance  (  βxy)  with which the predators meet and kill the prey.   Predator    dy/dt =    δxy  -   γy   The predator population growth    δxy    depends on successful
Prey
dx/dtαx - βxy
The prey reproduces exponentially (αx) unless subject to predation. The rate of predation is the chance (βxy) with which the predators meet and kill the prey.

Predator

dy/dt = δxy - γy

The predator population growth δxy depends on successful kills and the reproduction rate; however, delta is likely be different from beta. The loss rate, an exponential decay, of the predators {\displaystyle \displaystyle \gamma y}γy represents either natural death or emigration

5 months ago
Overview This model is a working simulation of the competition between the mountain biking tourism industry versus the forestry logging within Derby Tasmania.    How the model works  The left side of the model highlights the mountain bike flow beginning with demand for the forest that leads to incre
Overview
This model is a working simulation of the competition between the mountain biking tourism industry versus the forestry logging within Derby Tasmania.

How the model works
The left side of the model highlights the mountain bike flow beginning with demand for the forest that leads to increased visitors using the forest of mountain biking. Accompanying variables effect the tourism income that flows from use of the bike trails.
On the right side, the forest flow begins with tree growth then a demand for timber leading to the logging production. The sales from the logging then lead to the forestry income.
The model works by identifying how the different variables interact with both mountain biking and logging. As illustrated there are variables that have a shared effect such as scenery and adventure and entertainment.

Variables
The variables are essential in understanding what drives the flow within the model. For example mountain biking demand is dependent on positive word mouth which in turn is dependent on scenery. This is an important factor as logging has a negative impact on how the scenery changes as logging deteriorates the landscape and therefore effects positive word of mouth.
By establishing variables and their relationships with each other, the model highlights exactly how mountain biking and forestry logging effect each other and the income it supports.

Interesting Insights
The model suggests that though there is some impact from logging, tourism still prospers in spite of negative impacts to the scenery with tourism increasing substantially over forestry income. There is also a point at which the visitor population increases exponentially at which most other variables including adventure and entertainment also increase in result. The model suggests that it may be possible for logging and mountain biking to happen simultaneously without negatively impacting on the tourism income.
Based on model discussed by John D. Sterman (p 508) in  All models are wrong: reflections on becoming a systems scientist  (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flo
Based on model discussed by John D. Sterman (p 508) in All models are wrong: reflections on becoming a systems scientist (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flow connection with a connection from Trig. function.  Repeat (A) & (B).
Based on model discussed by John D. Sterman (p 508) in  All models are wrong: reflections on becoming a systems scientist  (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flo
Based on model discussed by John D. Sterman (p 508) in All models are wrong: reflections on becoming a systems scientist (2002). Task: (A) Sketch what you think the resultant graph will be (see directions for drawing in model). (B) Then Run Simulation.  Optional Extension: Replace Graph In/Out Flow connection with a connection from Trig. function.  Repeat (A) & (B).
A Conveyor is an infinite order exponential delay.  This insight illustrates how increasing the order of an exponential delay begins to approximate a conveyor.
A Conveyor is an infinite order exponential delay.  This insight illustrates how increasing the order of an exponential delay begins to approximate a conveyor.
A new archetype, The Tyranny of Small Steps (TYST) has been observed. Explained through a system dynamics perspective, the archetypical behaviour TYST is an unwanted change to a system through a series of small activities that may be independent from one another. These activities are small enough no
A new archetype, The Tyranny of Small Steps (TYST) has been observed. Explained through a system dynamics perspective, the archetypical behaviour TYST is an unwanted change to a system through a series of small activities that may be independent from one another. These activities are small enough not to be detected by the ‘surveillance’ within the system, but significant enough to encroach upon the “tolerance” zone of the system and compromise the integrity of the system. TYST is an unintentional process that is experienced within the system and made possible by the lack of transparency between an overarching level and a local level where the encroachment is taking place.

Reference:

Haraldsson, H. V., Sverdrup, H. U., Belyazid, S., Holmqvist, J. and Gramstad, R. C. J. (2008), The Tyranny of Small Steps: a reoccurring behaviour in management. Syst. Res., 25: 25–43. doi: 10.1002/sres.859