Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
スポンサーリンク
概要
- 論文の詳細を見る
The major causes of deforestation and degradation of natural resources in the Belete-Gera Forest of Ethiopia are coffee production activities and encroachment into forestland to expand farmland and pasture. Population growth, and the government's land-reform and re-settlement programs have caused local residents to lose harmony with the land. Forest management in this area hasn't yet been fully developed. The objectives of this study are to identify the extent of deforestation and natural resource degradation, in preparation for a sound management plan. Encroachment of farmland and pasture into natural forest during the past four years has been identified through interviews and aerial photo interpretation. The encroachment rate is 1.45% per year. Encroachment occurred mostly on areas with gentle slopes adjacent to populated villages and along roads and footpaths. The extent and impact of coffee production activities were examined through agency documents, forest survey data and vegetation survey. It is estimated that up to 49% of the accessible natural forest is under the influence of coffee production activities, among which collecting of naturally grown coffee beans has the least and the coffee plantations has the most impact on the natural forest. Coffee plantations in natural forest have reduced the forest density and species diversity. Age structure of the trees is limited to mature and old classes only, which eventually endangers their function as shade for coffee plantations.
- 一般社団法人日本森林学会の論文
- 1998-11-16
著者
-
Cheng S
Lakehead Univ. Ontario Can
-
IMAI Hideki
University of Tokyo
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Naito Mitsuru
Japan Forest Civil Engineering Consultants
-
Cheng Sheauchi
Japan Forest Civil Engineering Consultants
-
Hiwatashi Yukio
Japan Forest Civil Engineering Consultants
-
Imai Hideki
Japan Forest Civil Engineering Consultants
-
Numata Tatsuka
Japan Forest Civil Engineering Consultants
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- On Strictly Geometrically Uniform Codes: Construction and New Codes
- How to Protect Peer-to-Peer Online Games from Cheats
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Multilevel Coded 16-QAM Modulation with Multistage Decoding and Unequal Error Protection
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
- A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
- Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems(Wireless Communication Technology)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- New Short Signature Scheme without Random Oracles
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)
- Study of Osteo-/Chondropenia Caused by Impaired Chemokine Receptor and for Progressive/ Idiopathic Condylar Resorption
- Study of Osteo-/Chondropenia Caused by Impaired Chemokine Receptor and for Progressive/Idiopathic Condylar Resorption