
Agroforestry systems, particularly the coffee agroforestry system (CAS), represent a promising approach to achieving sustainable development and promoting a green economy in Indonesia. Our research aims to explore the potential of CAS to provide ecosystem services and socio-economic benefits and address environmental risks in Indonesia. To critically analyze the current state of CAS in Indonesia, its potential for sustainable development, and the challenges that should be addressed to increase its uptake, we conducted a systematic review of published academic literature. Our findings suggest that CAS has the potential to turn a profit in the future thanks to rising global and domestic market demand as well as environmental benefits like reducing carbon emissions and improving resource efficiency. However, several challenges should be addressed to improve coffee quality and sustain green economy activities, including product certification, collaboration with NGOs and business entities, and coordination of government policies at the site level. Overall, this study highlights the importance of CAS as a green economy approach in Indonesia and suggests policy recommendations to support its promotion and adoption. By addressing the challenges and promoting the potential of CAS, sustainable development and green economic growth can be achieved in Indonesia.
Citation: Nur Arifatul Ulya, Alfonsus Hasudungan Harianja, Apri Laila Sayekti, Astrina Yulianti, Deden Djaenudin, Edwin Martin, Hariyadi Hariyadi, Julian Witjaksono, Leo Rio Ependi Malau, Muhammad Rifqi Tirta Mudhofir, Satria Astana. Coffee agroforestry as an alternative to the implementation of green economy practices in Indonesia: A systematic review[J]. AIMS Agriculture and Food, 2023, 8(3): 762-788. doi: 10.3934/agrfood.2023041
[1] | Mohd. Rehan Ghazi, N. S. Raghava . Securing cloud-enabled smart cities by detecting intrusion using spark-based stacking ensemble of machine learning algorithms. Electronic Research Archive, 2024, 32(2): 1268-1307. doi: 10.3934/era.2024060 |
[2] | Kai Huang, Chang Jiang, Pei Li, Ali Shan, Jian Wan, Wenhu Qin . A systematic framework for urban smart transportation towards traffic management and parking. Electronic Research Archive, 2022, 30(11): 4191-4208. doi: 10.3934/era.2022212 |
[3] | Majed Alowaidi, Sunil Kumar Sharma, Abdullah AlEnizi, Shivam Bhardwaj . Integrating artificial intelligence in cyber security for cyber-physical systems. Electronic Research Archive, 2023, 31(4): 1876-1896. doi: 10.3934/era.2023097 |
[4] | Ruyu Yan, Jiafei Jin, Kun Han . Reinforcement learning for deep portfolio optimization. Electronic Research Archive, 2024, 32(9): 5176-5200. doi: 10.3934/era.2024239 |
[5] | Suhua Wang, Zhen Huang, Hongjie Ji, Huinan Zhao, Guoyan Zhou, Xiaoxin Sun . PM2.5 hourly concentration prediction based on graph capsule networks. Electronic Research Archive, 2023, 31(1): 509-529. doi: 10.3934/era.2023025 |
[6] | Asima Razzaque, Abdul Razaq, Sheikh Muhammad Farooq, Ibtisam Masmali, Muhammad Iftikhar Faraz . An efficient S-box design scheme for image encryption based on the combination of a coset graph and a matrix transformer. Electronic Research Archive, 2023, 31(5): 2708-2732. doi: 10.3934/era.2023137 |
[7] | Xite Yang, Ankang Zou, Jidi Cao, Yongzeng Lai, Jilin Zhang . Systemic risk prediction based on Savitzky-Golay smoothing and temporal convolutional networks. Electronic Research Archive, 2023, 31(5): 2667-2688. doi: 10.3934/era.2023135 |
[8] | Xiaojie Huang, Gaoke Liao . Identifying driving factors of urban digital financial network—based on machine learning methods. Electronic Research Archive, 2022, 30(12): 4716-4739. doi: 10.3934/era.2022239 |
[9] | Jie Zheng, Yijun Li . Machine learning model of tax arrears prediction based on knowledge graph. Electronic Research Archive, 2023, 31(7): 4057-4076. doi: 10.3934/era.2023206 |
[10] | Jiaqi Chang, Xuhan Xu . Network structure of urban digital financial technology and its impact on the risk of commercial banks. Electronic Research Archive, 2022, 30(12): 4740-4762. doi: 10.3934/era.2022240 |
Agroforestry systems, particularly the coffee agroforestry system (CAS), represent a promising approach to achieving sustainable development and promoting a green economy in Indonesia. Our research aims to explore the potential of CAS to provide ecosystem services and socio-economic benefits and address environmental risks in Indonesia. To critically analyze the current state of CAS in Indonesia, its potential for sustainable development, and the challenges that should be addressed to increase its uptake, we conducted a systematic review of published academic literature. Our findings suggest that CAS has the potential to turn a profit in the future thanks to rising global and domestic market demand as well as environmental benefits like reducing carbon emissions and improving resource efficiency. However, several challenges should be addressed to improve coffee quality and sustain green economy activities, including product certification, collaboration with NGOs and business entities, and coordination of government policies at the site level. Overall, this study highlights the importance of CAS as a green economy approach in Indonesia and suggests policy recommendations to support its promotion and adoption. By addressing the challenges and promoting the potential of CAS, sustainable development and green economic growth can be achieved in Indonesia.
The Internet of Things is an extended network based on the Internet. As an important infrastructure of the Internet, the inter-domain routing system is closely related to the security and stability of the Internet of Things. The inter-domain routing system is a dynamic system composed of multiple autonomous systems. Its main function is to exchange routing information between autonomous systems and ensure that the data requested by users can be transmitted stably between autonomous systems. The border gateway protocol (BGP) is a routing protocol for inter-domain routing systems to exchange routing information. When users accessing the Internet send data requests, the BGP can realize the optimal routing path selection of data transmission so that data can be transmitted between routers quickly and effectively. Ideally, the inter-domain routing system will not be affected, so everything can run smoothly and all data requests of users can be easily met.
However, the reality always backfires. Based on the security defects of BGP, a failure or malicious attack on the BGP router can affect the whole inter-domain routing system. The spread of Code Red II and Nimda worms led to the continuous shock of the routing system of the global Internet in 2001 [1]. Due to a BGP routing error of CenturyLink, the Internet had a cascade reaction in 2020 [2]. As a result, many services connected to the Internet were paralyzed, such as Steam, AWS, Discord and other services. In 2021, BGP route leakage occurred in India's autonomous network (AS55410), resulting in a 13-fold surge in traffic on the wrong path. More than 20,000 autonomous networks around the world were affected by the event because of cascading. As shown in the above security events, cascading failures occur frequently in the inter-domain routing system. If maliciously exploited by attackers, cascading failures will have wider impacts on the inter-domain routing system. Therefore, studying the possible damage strategies of attackers against inter-domain routing systems is crucial for defending against threats.
Think of a BGP router as a node; the damage strategy refers to a group of attack node sequences. At present, damage strategies for complex networks are mainly based on the assumption of no cost. No cost means that all nodes are considered to be the same without considering the attack cost. The damage strategy without considering the cost only considers the damage to the network, which belongs to a single objective optimization problem. The common method to solve the single objective optimization problem is to evaluate the important nodes in the network and give the importance value of each node. The sequence obtained by sorting nodes according to their importance is the group of attack node sequences. In the past, the identification methods of important nodes in the network mostly depended on a single indicator [3,4]. Recent studies have assessed the importance of nodes using indicators that are closely related to the node, including the weak connection attribute of nodes [5], the connection ability of edges [6], the substitutability of nodes [7] and so on. In practice, the cost of attacking the router nodes of the inter-domain routing system varies widely. Therefore, the attack cost of damage strategy based on node importance ranking is higher. At this time, it is particularly important to find a group of important nodes through the damage strategy based on cascading failures, and by considering the cost in the inter-domain routing system. A group of important nodes is not of high importance individually, but the combination has the advantages of low attack cost and great damage to the coupled inter-domain routing system [8]. Our work studies the damage strategy considering attack cost, which is a multi-objective optimization problem.
For the strategy considering attack cost, researchers mainly focus on three aspects. The first is the definition of attack cost. To facilitate the calculation, Zhang et al. [9] did not consider the attack cost of each node separately, but defined the total number of attack nodes as the attack cost. Qin et al. [10] considered the attack cost of each node and defined it as the attack cost related to degree of linearity. The second area of concern is the impact of cascading failures in the network. In the existing research, the cascading failures process is only considered in general complex networks [11,12,13,14]. However, there are few studies on inter-domain routing networks based on BGP because of the complexity of cascading failures. The third concern is the optimization effect. Wang et al. [15] defined three indicators to measure the criticality of each node and used an exhaustive method to find the optimal solution. To improve efficiency, the researchers propose a method based on search space reduction [16]. After that, the researchers introduce heuristic algorithms to solve the problem and generate low-cost and high-yield damage strategies as much as possible [17]. Although the existing research results are abundant, the following problems still exist:
1) The definition of attack cost in existing methods is vague. For example, the number of attack nodes is the attack cost, which cannot distinguish the difference in attack cost between different nodes, nor can it reflect the real situation of attacking key nodes and non-key nodes.
2) The existing methods do not consider the cascading failures mechanism in the inter-domain routing system.
3) The double objective optimization effect of the existing methods is not obvious, and the cost is still high.
Based on the above problems, we propose a method to generate damage strategies for inter-domain routing systems based on multi-objective optimization (PMT). We transform the damage strategy problem into a double-objective optimization problem. The main work is as follows:
1) We transform the damage strategy problem into a double objective optimization problem and propose the attack cost related to degree of nonlinearity.
2) We propose an initialization strategy based on network partition. First, partition the network, and then generate the initial population based on the partitioned network. It enriches the diversity of the initial population and makes the population evenly distributed in the network.
3) We propose a node replacement strategy based on partition search, which can accelerate the convergence speed and improve accuracy.
4) In two real inter-domain routing networks, we compared PMT with five common damage strategy algorithms. The experimental results verified the effectiveness and accuracy of PMT.
The follow-up arrangement of the article is as follows. Section 2 gives the related work and preliminaries, including the cascading failures principle and NSGA-II. In Section 3, the damage strategy problem based on cascading failures is transformed into a multi-objective optimization problem. Section 4 introduces the PMT proposed in detail. Section 5 presents the experimental results and analysis. The last is the conclusion.
The increasing scale of networks has prompted scholars to increase their enthusiasm for the study of cascading failures. Zhao et al.[18] proposed a cascading failures model based on cellular automata for road networks. It introduces the time characteristics of load distribution and node recovery ability into the previous cascading failure model. Finally, they analyze the vulnerability of road networks through the use of improved maximum connectivity and the node failure rate based on node degree.
Huang et al.[19] developed a model to analyze the cascading failures of multistate loading-dependent systems. The model depicts the cascading failures phenomenon after load overload. Zhou et al.[20] proposed a resilient network recovery framework against cascading failures with deep graph learning. It can obtain network topology in real time and prioritize the maintenance of failed nodes based on customer preferences. Zhou et al.[21] optimized the resiliency-based recovery method for cascading failures in the network. Different restoration prioritization strategies are applied to network systems subject to cascading failures that take into account system dependencies.
For the cascading failures model of complex networks, we have proposed the CFM-RFM [22] in our previous work and verified the effectiveness of the model. Therefore, the work of this article directly refers to the CFM-RFM.
Evolutionary algorithms are used to solve complex problems. Based on the MSIQDE algorithm, Deng et al.[23] proposed an enhanced MSIQDE (EMMSIQDE) algorithm based on mixing multiple strategies. EMMSIQDE introduces a new differential mutation strategy of a difference vector and a new multi-population mutation evolution mechanism, which can effectively solve complex optimization problems. To effectively dispatch railway trains, Song et al.[24] designed an evolutionary algorithm with a dynamic hybrid mechanism comprised of a quantum evolutionary algorithm and genetic algorithm (QGDEC). QGDEC innovates the quantum variable decomposition strategy and the increment mutation method. In order to solve problems of premature convergence and local optimization, Deng et al.[25] proposed an adaptive differential evolution algorithm based on belief space and generalized opposition-based learning for resource allocation.
A multi-strategy particle swarm and ant colony optimization algorithm were proposed for airport taxiway planning [26]. It designs a new pheromone allocation mechanism and develops a pheromone update strategy based on the principle of wolf predation, which can effectively solve the traveling salesman problem. In addition, deep learning methods [27] are also used to solve complex problems.
A method of damage strategy considering the cost needs to optimize not only the degree of damage to the network, but also the attack cost, which is a multi-objective optimization problem. For complex networks, the cost is seldom considered in the existing damage strategy methods. Wang et al.[11] studied how to efficiently allocate limited resources to minimize network damage when complex networks face various damage strategies. They found that, under the premise of considering the cost, the network has an optimal allocation scheme of defense resources, which can maximize the protection of the network. The optimal defense scheme is related to the basic parameters of the network. The experimental results show that the network with sparse connections is more conducive to protecting the network.
Tan et al.[12] analyzed the effectiveness of the attack strategy considering the cost and proposed two new evaluation indicators: the compactness coefficient of closeness and the compactness coefficient of betweenness. The experiment shows that the degree attack strategy is the worst for the same network. Under the same average degree, the attack strategy with a smaller closeness compactness coefficient or betweenness compactness coefficient performs better.
Ye and Jun[13] proposed a cost constraint model to solve the problem of an attack strategy in complex networks. The model thinks that the nodes with a higher degree will be attacked preferentially when the constraints are lower. The nodes with the smaller degree will be attacked preferentially when the constraints are higher. In addition, it was found that there is a cost evaluation threshold. If the cost of the attacked node is less than this threshold, the node with the lower degree will be attacked first. Hong et al.[28] mainly studied the robustness of complex networks when they are attacked under the premise of considering the cost. The relationship between node attack and edge attack is not clearly explained.
Wang et al.[14] proposed a complex network edge attack strategy considering the attack cost based on existing research. In this strategy, the weight of the edge is defined as the attack cost of the edge, and the average path length and maximum connected subgraph are used to evaluate the damage degree of the network. In ordinary scale-free networks and exponentially adjustable scale-free networks, the edge attack strategy with adjustable weight parameters is simulated. The experimental results show that the attack effect is not affected when the parameters of edge weight are different. It shows that the edge weight parameter is not an important influential condition. When the attack cost is small, the edge attack with a larger weight is better.
Zhang et al.[9] solved the damage decision-making problem from the perspective of multi-objective optimization, and they proposed a cascading key node detection algorithm (MO-BCVND) based on multi-objective optimization for complex networks. Based on an NSGA-II framework, MO-BCVND improves the search strategy and speeds up convergence. In 12 complex networks, the effectiveness of MO-BCVND is proved by simulation attacks. At the same time, MO-BCVND can generate different levels of attack node groups, which can provide a basis for network vulnerability analysis. MO-BCVND is a cascade key node detection algorithm that considers both the cost and the effect of the attack. However, the attack cost is relatively simple and it cannot reflect the difference between attacking critical nodes and non-critical nodes. The application scenario is only for general complex networks. For the special network of inter-domain routing systems, the initialization strategy needs to be improved.
In view of the problems in the existing methods, we proposed a method for generating damage strategies based on multi-objective optimization (PMT). It can not only approximate the attack cost of nodes, but it can also consider the cascading failures mechanism in inter-domain routing systems. The experimental results show that PMT is effective.
The analysis of the failure principle can be divided into two parts. As shown in Figure 1, there are the failure causes of nodes and links and the causes of cascading failures.
1) Failure causes of nodes and links.
Data plane load and control plane load cannot be confused in inter-domain routing systems. Data plane load refers to the data load forwarded by routing nodes. Control plane load refers to the load used to maintain the connection relationship between inter-domain routes, such as UPDATE messages. A node failure occurs when a large number of UPDATE messages arrives at the control plane at the same time, resulting in node CPU, memory and other resources being exhausted. A link failure is caused by the surge and overload of the data plane load that needs to be forwarded in a short time.
2) Causes of cascading failures.
When a node fails, it is temporarily removed from the network and its neighbors send UPDATE messages to notify other nodes on the network. This process is the propagation of UPDATE messages. When the link fails, the forwarding task of the data load is completed by other working links. This process is called load redistribution, which redistributes the load of the failed link to other working links. The propagation process of UPDATE messages and load redistribution are the main causes of cascading failures.
A multi-objective optimization algorithm refers to an algorithm used to solve multi-objective optimization problems. Schaffer[29] proposed an algorithm based on vector evaluation to solve related multi-objective optimization problems, which is the first time that an evolutionary algorithm has been applied to the field of multi-objective optimization. Then, more and more researchers became able to solve the multi-objective optimization problem based on evolutionary algorithms.
The concept of Pareto ranking was proposed by Goldberg[30]. It points out that the distribution should be maintained in the algorithm, which provides important support for the mainstream algorithms studied later [31]. NSGA-II, proposed by Deb et al.[32], was the most representative. PMT is based on the NSGA-II framework, and NSGA-II is introduced in detail below.
NSGA-II is an improved version of NSGA. Compared with NSGA, NSGA-II has the following advantages.
1) A fast non-dominated sorting strategy is designed in NSGA-II. The algorithm complexity is reduced from O(mN3) to O(mN2), which greatly improves the running speed of NSGA-II.
2) NSGA-II proposes an evaluation method of crowding distance to judge the advantages and disadvantages of individuals on the same front, which can ensure the accuracy of population evolution.
3) To maintain the quality of the population and avoid the loss of excellent individuals in the process of evolution, NSGA-II adopts the elite retention mechanism. That is, the individuals with good performance in the parent generation are retained and merged to participate in the new generation process of the next generation.
Figure 2 shows the basic flow of NSGA-II. The evolutionary process consists of three steps. For the process of evolution from generation t to generation t+1:
Step 1: First, the parent population P(T) generates the offspring population Q(T) through the cross and mutation strategy. According to the elite retention strategy, the parent population P(T) is put into the offspring population Q(T) to form a mixed population.
Step 2: By using the fast non-dominated sorting strategy to sort the mixed population, we can get the front serial number of all individuals.
Step 3: The last is the environmental selection, which selects the new population with the number N from the mixed population with the number 2N. As shown in Figure 2, the number of individuals selected for the first three fronts exceeds N, so the individuals in the third front can only select a part. At this time, the individuals in the third front are sorted through the crowding distance strategy, and the individuals satisfying the total number n are selected. The third front part of the unselected individuals, the fourth front and the fifth front of all individuals were eliminated. The loop continues until the algorithm reaches a preset termination condition.
For the damage strategy of cascading failures, most previous studies have transformed this problem into a single objective optimization problem. Specifically, they rank the importance of nodes according to various attributes of the network from the perspective of the attacker. Only the damage degree of the network is taken as the objective function, so attacking the nodes with the highest importance ranking can cause the maximum damage to the network. This kind of research does not consider the cost of nodes. By default, the attack cost of nodes is the same. This is not reasonable in reality. Nodes with higher importance are more difficult to attack. To get closer to reality and find low-cost and high-yield damage strategies, we transform the damage strategy problem based on cascading failures into a multi-objective optimization problem, that is, minimizing the attack cost and maximizing the attack effect simultaneously.
The damage strategy problem for inter-domain routing systems based on cascading failures is expressed as follows:
Minimize T(P)=(C(P),−F(P))Ts.t.P∈PS,C(P)∈[0,1],F(P)∈[0,1], | (3.1) |
where, T(P) is an objective function vector, P denotes the initial attack node group and PS denotes the collection of all attack node groups. C(P) denotes the normalized cost of the initial attack node group. F(P) denotes the degree of network damage after failure caused by the attack, which is expressed by the failure rate in this paper. To minimize the whole, F(P) takes the opposite number. From Eq (3.1), we can see that the objective of optimization in this paper is to attack the node group with the lowest cost as much as possible while causing maximum damage to the network.
Due to the limited attack resources, we must pay attention to the attack cost. Qin et al. [10] defined that the attack cost is related to the degree, which has low complexity and can reflect the importance of nodes to a certain extent. It is considered that this definition is reasonable. In real attack scenarios, the attack cost of a node is equivalent to the strength of node defense resource deployment. From the perspective of the defender, the deployment of defense resources of nodes with a high degree is usually several times or more powerful than that of nodes with a low degree. Therefore, the attack cost related to the degree of nonlinearity is defined in this paper. The attack cost after an attack on the network can be expressed as follows:
C(P)=∑u∈P(d(u)+δd(u)γ)∑v∈V(d(v)+δd(v)γ), | (3.2) |
where d(u) is the degree of u and V is the set of all nodes in the network. C(P) is the normalized cost. For the convenience of calculation, set δ = 1, γ = 2.
After cascading failures, both nodes and links may fail. Therefore, to evaluate the damage degree of the network, both the failed node and the failed link should be considered. To quantify the impact of cascading failures for inter-domain routing networks, the average failure rate is defined as follows:
fFR=NFv+NFeW, | (3.3) |
where NFv denotes the number of failed nodes, NFe denotes the number of failed links and W denotes the total number of initial nodes and links. It is generally believed that the failure rate is directly proportional to the degree of damage to the network.
After the transformation of the previous problem, the next main work is how to find the Pareto optimal solution set in the multi-objective optimization problem. This section proposes an algorithm to generate damage strategies for inter-domain routing systems based on multi-objective optimization (PMT) to find an optimal group of attack nodes.
Based on the basic framework of NSGA-II, we propose PMT, which can better solve the damage strategy problem of cascading failures of inter-domain routing systems.
Algorithm 1 shows the steps of PMT, which mainly includes three processes. The first is population initialization. We propose an initialization strategy based on network partitioning. First, the network is divided into several small regions based on the locations and attributes of nodes in the inter-domain routing systems. Then, the initial attack nodes are selected according to the rules, and a diverse population can be obtained. The second process is population evolution, which first mutates and crosses over to produce offspring. Then, the node replacement strategy based on partition search is used to optimize the offspring. Finally, according to the elite retention strategy, the offspring population and the parent population were combined, and the non-dominated ranking and crowded distance were applied to select individuals and update the population. The third process is to obtain the Pareto optimal solution set from the final population by using an efficient non-dominated sorting algorithm.
Algorithm 1 PMT |
Input: network G; model parameters α, β; population size NPop; binary individual length Nbits; iterations Niter; probability of variation Pm; probability of crossover Pc
Output: non-dominated solutions ParetoPops; non-dominated fitness value ParetoFits 1: Step1: population initialization 2: Pops ← Initpops (G, Nbits, NPop) 3: Fits ← Fitness (Pops) 4: Step2: population evolution 5: while iter ≤ Niter do 6: Chrpops←Crossover (Pops, pc) 7: Chrpops ← Mutate (Chrpops, pm) 8: Chrpops ← PAC (Chrpops) 9: Chrfits ← Fitness (Chrpops) 10: Pops, Fits ← optSelect (Pops, Fits, Chrpops, Chrfits) 11: iter ← iter + 1 12: end while 13: Step3: obtain the non-dominated solutions and fitness value 14: ParetoPops, ParetoFits ← SelectNonDominatedsets (Pops, Fits) |
The core idea of PMT is to divide the network into multiple regions and attack some nodes in each region respectively. "Crush one by one" in all areas so that a small number of nodes can damage the entire network. It can be seen from Algorithm 1 that the initialization strategy based on network partitioning and the node replacement strategy based on partition search are two important parts of PMT.
In multi-objective genetic algorithms, the initial population is generated by randomly initializing the population to meet the generalization ability of the population. In general problems, random initialization of the population has good results. However, for the damage decision problem of inter-domain routing systems, the random initialization population is prone to the clustering of nodes or too large a search space. To ensure the superiority of the algorithm and avoid the above problems, we propose an initialization strategy based on network partitioning.
Algorithm 2 shows the process of partitioning. Partitioning is based on the logical location of nodes. Neighboring nodes are divided into an area as far as possible. First, find the edge-nodes v in the network, that is, the node with degree 1. Then, it takes v as the starting point to find neighbor nodes of j-order. When the number of j-order neighbor nodes <⌈N/K⌉ (the number of nodes in each region), continue to find (j+1)-order neighbor nodes. The search is stopped when the number of (j+r)-order neighbor nodes ≥ ⌈N/K⌉. If the number of nodes exceeds ⌈N/K⌉ and the difference is d, then the d nodes with the largest degree are removed from the neighbors of (j+r)-order. This can make the number of nodes in each region meet the requirements, and v forms a region with the neighbors of (j+r)-order and removes it from the network. This loop continues until the network is divided into K regions. Figure 3(a) is a simple network, and Figure 3(b) is the result of partitioning. It can be seen that the nodes in the network are orderly divided into five regions, A, B, C, D and E. The nodes in the regions are closely connected. When a few nodes are attacked, cascading failures are likely to occur in the region. Therefore, network partitioning is conducive to generating the strategy.
Algorithm 2 Network partitioning |
Input: network G; number of nodes N; number of partitions K
Output: node group after partition PartitionSet 1: Step1: find the set of edge-nodes NodeDgreeOneSet 2: for node ∈ G do 3: if G.degree (node) = 1 then 4: NodeDgreeOneSet.add (node) 5: end if 6: end for 7: Step2: get PartitionSet 8: for i ← 1 to ⌈N/K⌉ do 9: node ← Random (NodeDgreeOneSet, 1) 10: temp.add (node) 11: for j ← 1 to ∞ do 12: NeigborsNodeSet ← Getneigbors (G, node, j) 13: temp.add (NeigborsNodeSet) 14: if len (temp) ≥⌈N/K⌉ then 15: d ← len (temp) - ⌈N/K⌉ 16: if d = 0 then 17: PartitionSet.add (temp) 18: Update (G, NodeDgreeOneSet) 19: break; 20: else 21: RemSet ← SelectMaxDegree (NeigborsNodeSet, d) 22: temp.delete (RemSet) 23: PartitionSet.add (temp) 24: Update (G, NodeDgreeOneSet) 25: break; 26: end if 27: end if 28: end for 29: end for |
PMT uses binary encoding to represent individuals pop = (p1, p2, ..., pi, ..., pn), which indicates the attack node group. The parameter pi indicates the state of the node. pi = 1, indicating that node i is the invalid state after being attacked. pi = 0 indicates that node i is not attacked and is working properly. For example, pop = {1, 0, 0, 1, 0, 1, 0, 0} indicates that the attacked node is {1, 4, 6}. Since binary coding is used, PMT uses uniform crossover and bitwise mutation.
Algorithm 3 Initialization strategies |
Input: network G; number of nodes N; number of partitions K; population size NPop; binary individual length Nbits; node group after partition PartitionSet
Output: initial population Pops 1: Step1: remove edge-nodes 2: for node ∈ G do 3: if G.degree (node) = 1 then 4: G.ndoe.delete (node) 5: end if 6: end for 7: N ← Len (G.ndoe) 8: Step2: select the initial attack node according to the partition 9: for i ← K to nPop do 10: TempIndividual ← [0] * Nbits 11: for z ← 1 to i + 1 do 12: z ← z % K 13: Index ← RandomNodeIndex (Partitionset, ⌈N/K⌉, z) 14: TempIndividual [Index] ← 1 15: end for 16: Pops.add (TempIndividual) 17: end for |
After the network is divided into several regions, the population can be initialized. Algorithm 3 gives the initialization process.
In the inter-domain routing network, there is a large number of edge-nodes and they only have small traffic requests, which is not enough to pose a threat to other nodes. Therefore, edge-nodes are removed from the range of initially selected attack nodes to improve the probability of selecting "strong" nodes. Then, select the initial attack node according to the partition. Set K to the minimum number of nodes that allows individual attacks to ensure that pop attacks at least one node in each region. For pop, it is necessary to determine the number of attack nodes and then select attack nodes at random in each region of the network. Considering the diversity of the population, the number of attack nodes of pop is different, which can ensure the diversity of the attack cost. It can be seen that the initialization strategy based on network partitioning can ensure that the attack nodes of pop are spread all over the network, which can damage the network to the greatest extent.
For PMT, although the evolution of the population can be realized through the crossover process and mutation process, this kind of universal evolution mode is not stable. For the damage strategy of inter-domain routing systems, the convergence speed is limited. Therefore, we propose a node replacement strategy based on partition search to realize population evolution. Node replacement is based on the principle of priority of the node damage conversion rate (DCR). This can not only improve the convergence speed, but it can also accurately search and reduce unnecessary search actions.
DCR refers to the ratio of failure rate to attack cost. It is defined as
DCR(P)=fFRC(P). | (4.1) |
It can be seen that the DCR is proportional to fFR and inversely proportional to C(P). When the DCR of pop is higher, it indicates that the attack cost performance of pop is higher.
Algorithm 4 shows the implementation of this strategy. It includes three stages: calculating the DCR of nodes, deleting nodes and adding nodes. Specifically, first calculate the DCR of attack nodes in pop. In the stage of deleting nodes, delete the node v with the lowest DCR in pop. Then, pop becomes popa. In the stage of adding nodes, calculate the region P where the deleted v is located, and find the node w with the largest DCR in region P. If w is not in popa, add it to popa and change it to popd. If w is in popa, delete the w in region P. Continue searching for the node in region P with the largest DCR until w is not in popa to end the search. Finally, if DCR (w) > DCR (v), popd is output as the evolved individual. The strategy only searches in the region where nodes are deleted, which can not only complete the search quickly, but it can also accurately improve the DCR of pop.
Take the simple network in Figure 3(b). There is pop containing node 4 of region B that assumes that node 4 has the lowest DCR. Step 1: Calculate the DCR of nodes in region B, assuming that the order from largest to smallest is {1, 3, 2, 6, 7, 5, 4}. Step 2: Remove node 4 from pop. Step 3: Since node 1 has the largest DCR, it waits to be added to pop. If node 1 is not in pop, it is added to pop to evolve into a new pop′. If node 1 is in pop, the search continues until the search node is not in pop or the search space is empty to stop the search.
Algorithm 4 Node replacement strategies based on partition search |
Input: network G; number of nodes N; number of partitions K; population size NPop; pop
Output: evolutionary individuals pop′ 1: Step1: calculate the DCR value of the node 2: DCR (v) ← GetPopDCR (pop) 3: Step2: remove node 4: v ←argminv∈pop′ (DCR (v)) 5: popa← Remove (pop, v) 6: Step3: add node 7: for P ← PartitionSet (0) to PartitionSet (⌈N/K⌉) do 8: if v ∈ P then 9: popd←popa 10: while popa = popd do 11: DCR (w) ← GetPopDCR (pop) 12: w ←argminv∈pop′ (DCR (w)) 13: if w ∉popa then 14: popd← Add (popd, w) 15: else 16: P.remove (w) 17: end if 18: end while 19: end if 20: end for 21: if DCR (w) > DCR (v) then 22: pop′←popd 23: else 24: pop′←pop 25: end if |
Topological structures of the UK and Canada were selected from the AS-Relationships dataset of the CAIDA project [33] to establish the basic network of the experiment, including the connection relationship and business relationship between nodes. The CFM-RFM model proposed in the previous work [22] can accurately simulate the cascading failures of inter-domain routing systems after verification. Therefore, to ensure the accuracy and authenticity of the comparative experiment, the experiment was run on the CFM-RFM model. Network and simulation-related parameters are shown in Table 1.
UK | Canada | |
V | 1191 | 1523 |
E | 2946 | 2508 |
α | 1 | 1 |
β | 0.3 | 0.3 |
R | 120 | 150 |
In this section, PMT is compared and analyzed against five existing algorithms of damage strategies to verify its effectiveness. The comparison algorithm includes two algorithms based on single objective optimization, AIPR[34] and SD-KNI[35], which do not consider the attack cost. The other three are based on multi-objective optimization algorithms NSGA-II[32], MO-BCVND[9] and DSCT[36].
AIPR is an autonomous systems importance attack policy based on preferred routes. The policy considers that the more valid paths passing through a node, the higher the priority of the node being attacked.
SD-KNI is an attack strategy for inter-domain routing systems based on propagation dynamics. Although the dynamic process is considered, it is based on the premise of no cost assumption.
DSCT has two indicators: the load of the link connected to the node and the number of reachable nodes of neighbor nodes. Then, it introduces the attack cost related to degree of nonlinearity and finally calculates a group of node attack sequences through the use of TOPSIS.
NSGA-II is a classical multi-objective optimization genetic algorithm. Our proposed PMT is similar to the NSGA-II framework, and the comparison results are persuasive.
MO-BCVND is a cascade critical node detection algorithm based on multi-objective optimization in complex networks. In MO-BCVND, an initialization strategy based on cost reduction is proposed to increase the diversity of the population. To improve the convergence rate of the population, an adaptive local search strategy is proposed.
PMT and all comparison algorithms were implemented in Python. All of the experiments were completed under the conditions of a Windows 10 operating system; the computer was configured with an i7-10700 processor and 16GB RAM. For PMT, the population size was set to 100, the mutation probability to 0.01, the crossover probability to 0.6 and the total number of iterations to 100. All comparison algorithms apply the parameters suggested in the paper.
This section shows the comparison results between PMT and the other five algorithms on two real inter-domain routing networks. The effectiveness of PMT is verified by the failure rate, and the attack cost performance of PMT is evaluated by the DCR.
1) Verification of failure rate
Each method was applied to calculate the respective solution, that is, the optimal node attack set with different attack costs. In two networks, the network is attacked according to the node attack set of each method. The relationship between attack cost and failure rate is shown in Figures 4 and 5. The attack cost of abscissa is the result of normalization.
As can be seen in Figures 4 and 5, the effects of PMT, DSCT, NSGA-II and MO-BCVND based on multi-objective optimization are much better than those of AIPR and SD-KNI based on single objective optimization in the two networks. When the attack cost is small, it has an obvious attack effect. Therefore, the abscissa magnitude of Figure 5(a)–(c) is small. The optimization ability of the algorithm in Figure 5(d)–(f) is general. When the attack cost of the abscissa is large, there is an obvious attack effect. Only by increasing the attack cost of the abscissa can we see the attack effect in the plot. This is also the reason for the large difference in the abscissa orders of magnitude in Figure 4.
It can be found that the results of PMT, NSGA-II and MO-BCVND are seriously divided. The node attack set with low cost and a high failure rate accounted for the majority, and the sets with intermediate values were few. This phenomenon is mainly caused by multi-objective optimization. In Canada's network, the best non-dominated solution of PMT among the four multi-objective optimization algorithms can paralyze the network. That is, the failure rate is 0.95, and the cost is only 0.149. However, the non-dominated solution of NSGA-II and MO-BCVND maximally increases the network failure rate to about 0.9, and the attack cost is larger than that of PMT under the same condition.
2) Evaluation of DCR
As can be seen in Figures 4 and 5, the orders of magnitude of PMT, NSGA-II and MO-BCVND are close. To further analyze the attack cost performance of PMT, the DCRs of PMT, NSGA-II and MO-BCVND were calculated and compared for the two inter-domain routing networks. Figure 6 shows the relationship between the failure rate and the DCR of the network caused by different methods. Since the failure rate of the final solution obtained by each method is not consistent, the failure rate of the abscissa is reflected by the interval, and the DCR is the average of the corresponding interval.
Figure 6(a) shows that, when the failure rate is between 0.7–0.8, the DCRs of NSGA-II and MO-BCVND are slightly higher than that of PMT in Canada. However, when the failure rate is between 0.8–0.85, PMT and MO-BCVND have similar cost performance, which is higher than NSGA-II. When the failure rate is greater than 0.85, it can be seen that the DCRs of NSGA-II and MO-BCVND decrease significantly. At this time, PMT is undoubtedly the most cost-effective attack algorithm. As can be seen in Figure 6(b), the DCR of PMT in the UK is better than the other two algorithms, and it is the preferred algorithm for damage strategies. In general, PMT has the advantage of high-cost performance compared with common damage strategies algorithms. It can generate low-cost and high-yield damage strategies and provide decision-makers with different levels of damage strategies.
As an important infrastructure of the Internet, inter-domain routing systems play a significant role in supporting the stable operation of the Internet. To better analyze the vulnerability of inter-domain routing systems, we have proposed a method for generating damage strategies in inter-domain routing systems based on multi-objective optimization (PMT). The damage strategy based on cascading failures is transformed into a multi-objective optimization problem, that is, the attack cost and attack effect of nodes are optimized simultaneously. We define the attack cost related to the degree of nonlinearity, and the attack effect is the failure rate of the network after cascading failures. For PMT, we propose an initialization strategy based on network partitioning and a node replacement strategy based on partition search. In the experimental part, PMT was compared with five common damage strategies methods, and the experimental results verify the effectiveness and accuracy of PMT. Our algorithm can output node sets of low cost and high yield, which can meet the needs of attackers. And, it can provide multi-angle information for the defender and make it possible to predict an unknown attack.
Thanks for the experimental environment provided by the School of Electronic Engineering, National University of Defense Technology.
The authors declare that there is no conflict of interest.
[1] |
Barbier EB (2012) The green economy post Rio+20. Science 338: 887–888. https://doi.org/10.1126/science.1227360 doi: 10.1126/science.1227360
![]() |
[2] |
Loiseau E, Saikku L, Antikainen R, et al. (2016) Green economy and related concepts: An overview. J Cleaner Prod 139: 361–371. https://doi.org/10.1016/j.jclepro.2016.08.024 doi: 10.1016/j.jclepro.2016.08.024
![]() |
[3] | United Nations Environment Programme (UNEP) (2011) Towards a Green Economy Pathways to Sustainable Development and Poverty Eradication. |
[4] |
Pearce D (1992) Green economics. Environ Values 1: 3–13. https://doi.org/10.1177/096327199200100114 doi: 10.1177/096327199200100114
![]() |
[5] | Ocampo JA (2012) The transition to a green economy: Benefits, challenges and risks from a sustainable development perspective. |
[6] |
Amato DD, Korhonen J (2021) Integrating the green economy, circular economy and bioeconomy in a strategic sustainability framework. Ecol Econ 188: 107143. https://doi.org/10.1016/j.ecolecon.2021.107143 doi: 10.1016/j.ecolecon.2021.107143
![]() |
[7] |
Merino-Saum A, Baldi MG, Gunderson I, et al. (2018) Articulating natural resources and sustainable development goals through green economy indicators: A systematic analysis. Resour, Conserv Recycl 139: 90–103. https://doi.org/10.1016/j.resconrec.2018.07.007 doi: 10.1016/j.resconrec.2018.07.007
![]() |
[8] | Gibbs D (2019) Green Economy. In: Kobayashi A (Ed.), International Encyclopedia of Human Geography (Second Edition), Elsevier, 267–274. https://doi.org/10.1016/B978-0-08-102295-5.10792-9 |
[9] |
Ollikainen M (2014) Forestry in bioeconomy—smart green growth for the humankind. Scand J For Res 29: 360–366. https://doi.org/10.1080/02827581.2014.926392 doi: 10.1080/02827581.2014.926392
![]() |
[10] |
Dandabathula G, Chintala SR, Ghosh S, et al. (2021) Exploring the nexus between Indian forestry and the Sustainable Development Goals. Reg Sustainability 2: 308–323. https://doi.org/10.1016/j.regsus.2022.01.002 doi: 10.1016/j.regsus.2022.01.002
![]() |
[11] |
Endale BJ, Zerihun K, Ermias M (2020) Analysis of socio-economic contribution of agroforestry systems to smallholder farmers around Jimma town, Southwestern Ethiopia. Int J Biodiversity Conserv 12: 48–58. https://doi.org/10.5897/IJBC2018.1237 doi: 10.5897/IJBC2018.1237
![]() |
[12] |
Jaza Folefack AJ, Darr D (2021) Promoting cocoa agroforestry under conditions of separated ownership of land and trees: Strengthening customary tenure institutions in Cameroon. Land Use Policy 108: 105524. https://doi.org/10.1016/j.landusepol.2021.105524 doi: 10.1016/j.landusepol.2021.105524
![]() |
[13] |
Phondani PC, Maikhuri RK, Rawat LS, et al. (2020) Assessing farmers' perception on criteria and indicators for sustainable management of indigenous agroforestry systems in Uttarakhand, India. Environ Sustainability Indic 5: 100018. https://doi.org/10.1016/j.indic.2019.100018 doi: 10.1016/j.indic.2019.100018
![]() |
[14] |
Hernandez-Aguilera JN, Conrad JM, Gómez MI, et al. (2019) The Economics and ecology of shade-grown coffee: A model to incentivize shade and bird conservation. Ecol Econ 159: 110–121. https://doi.org/10.1016/j.ecolecon.2019.01.015 doi: 10.1016/j.ecolecon.2019.01.015
![]() |
[15] |
De Leijster V, Santos MJ, Wassen MW, et al. (2021) Ecosystem services trajectories in coffee agroforestry in Colombia over 40 years. Ecosyst Serv 48: 101246. https://doi.org/10.1016/j.ecoser.2021.101246 doi: 10.1016/j.ecoser.2021.101246
![]() |
[16] |
Costanza R, D'Arge R, Groot Rd, et al. (1997) The value of the world's ecosystem services and natural capital. Nature 387: 253–260. https://doi.org/10.1038/387253a0 doi: 10.1038/387253a0
![]() |
[17] |
Ulya NA, Nurlia A, Kunarso A, et al. (2019) Valuation of goods and services derived from plantation forest in peat swamp forest area: The case of South Sumatra Province. IOP Conf Ser: Earth Environ Sci 308: 012047. https://doi.org/10.1088/1755-1315/308/1/012047 doi: 10.1088/1755-1315/308/1/012047
![]() |
[18] |
Rakatama A, Pandit R (2020) Reviewing social forestry schemes in Indonesia: Opportunities and challenges. For Policy Econ 111: 102052. https://doi.org/10.1016/j.forpol.2019.102052 doi: 10.1016/j.forpol.2019.102052
![]() |
[19] | Buttoud G (2013) Advancing agroforestry on the policy agenda—A guide for decision-makers. |
[20] | Butarbutar T (2011) Agroforestri untuk adaptasi dan mitigasi perubahan iklim. Jurnal Analisis Kebijakan Kehutanan 9: 1–10. |
[21] | Newaj R, Chaturvedi OP, Handa AK (2016) Recent development in agroforestry research and its role in climate change adaptation and mitigation. Indian J Agrofor 18: 1–9. |
[22] |
Stavi I, Lal R (2013) Agroforestry and biochar to offset climate change: a review. Agron Sustainable Develop 33: 81–96. https://doi.org/10.1007/s13593-012-0081-1 doi: 10.1007/s13593-012-0081-1
![]() |
[23] |
Hidayat A, Dharmawan AH, Pramudita D (2017) Kelayakan usaha budidaya kopi cibulao dalam program pengelolaan hutan bersama masyarakat. Risalah Kebijakan Pertanian dan Lingkungan 4: 85–95. https://doi.org/10.29244/jkebijakan.v4i2.22028 doi: 10.29244/jkebijakan.v4i2.22028
![]() |
[24] |
Sunderlin WD, Angelsen A, Belcher B, et al. (2005) Livelihoods, forests, and conservation in developing countries : An overview. World Develop 33: 1383–1402. https://doi.org/10.1016/j.worlddev.2004.10.004 doi: 10.1016/j.worlddev.2004.10.004
![]() |
[25] | International Coffee Organization (ICO) (2022) Historical data on the global coffee trade. |
[26] | Badan Pusat Statistik (BPS) (2022) Statistik kopi Indonesia 2021. Jakarta: Badan Pusat Statistik. |
[27] |
Martin E, Herdiana N, Nurlia A, et al. (2020) Kebun-Ghepang: Ecological and institutional reference for social forestry at highlands of Sumatra. IOP Conf Ser: Earth and Environ Sci 533: 012023. https://doi.org/10.1088/1755-1315/533/1/012023 doi: 10.1088/1755-1315/533/1/012023
![]() |
[28] |
Iskandar BS, Iskandar J, Partasasmita R, et al. (2018) Planting coffee and take care of forest: A case study on coffee cultivation in the forest carried out among people of Palintang, highland of Bandung, west Java, Indonesia. Biodiversitas 19: 2183–2195. https://doi.org/10.13057/biodiv/d190626 doi: 10.13057/biodiv/d190626
![]() |
[29] | Prasmatiwi Erry FISA (2010) Analisis keberlanjutan usahatani kopi di kawasan hutan kabupaten Lampung Barat dengan pendekatan nilai ekonomi lingkungan. Pelita Perkebunan 26: 57–69. |
[30] |
Octavia D, Suharti S, Murniati M, et al. (2022) Mainstreaming smart agroforestry for social forestry implementation to support Sustainable Development Goals in Indonesia: A Review. Sustainability (Switzerland) 14: 9313. https://doi.org/10.3390/su14159313 doi: 10.3390/su14159313
![]() |
[31] | Sanudin S, Widiyanto A, Palmolina M, et al. (2021) Kelembagaan petani kopi di desa Sukamanah, Sindangkasih, kabupaten Ciamis. J Agrofor Indones 4: 81–90. |
[32] |
Nelson RH (2013) Multiple-use forest management versus ecosystem forest management: A religious question? For Policy Econ 35: 9–20. https://doi.org/10.1016/j.forpol.2013.06.003 doi: 10.1016/j.forpol.2013.06.003
![]() |
[33] |
Mahmud MS, Zahid A, Das AK, et al. (2021) A systematic literature review on deep learning applications for precision cattle farming. Comput Electron Agric 187: 106313. https://doi.org/10.1016/j.compag.2021.106313 doi: 10.1016/j.compag.2021.106313
![]() |
[34] |
Siddaway AP, Wood AM, Hedges LV (2018) How to do a systematic review: A best practice guide for conducting and reporting narrative reviews, meta-analyses, and meta-syntheses. Ann Rev Psychol 70: 747–770. https://doi.org/10.1146/annurev-psych-010418-102803 doi: 10.1146/annurev-psych-010418-102803
![]() |
[35] | Kitchenham B, Charters S (2017) Guidelines for Systematic Literature Reviews in Software Engineering. Keele University and Durham University Joint Report, 1–44. |
[36] |
Georgeson L, Maslin M, Poessinouw M (2017) The global green economy: A review of concepts, definitions, measurement methodologies and their interactions. Geo Environ 4: e00036. https://doi.org/10.1002/geo2.36 doi: 10.1002/geo2.36
![]() |
[37] |
Bina O (2013) The green economy and sustainable development: An uneasy balance? Environ Plann C: Gov Policy 31: 1023–1047. https://doi.org/10.1068/c1310j doi: 10.1068/c1310j
![]() |
[38] | United Nations Environment Programme (UNEP) (2014) Trade and green economy: A Handbook. |
[39] |
Kaztelan A (2017) Green growth, green economy and sustainable development: Terminological and relational discourse. Prague Econ Pap 26: 487–499. https://doi.org/10.18267/j.pep.626 doi: 10.18267/j.pep.626
![]() |
[40] |
Adamowicz M (2022) Green deal, green growth and green economy as a means of support for attaining the Sustainable Development Goals. Sustainability (Switzerland) 14: 5901. https://doi.org/10.3390/su14105901 doi: 10.3390/su14105901
![]() |
[41] | Platform for Accelerating the Circular Economy (2021) Capital Equipment. Platform for Accelerating the Circular Economy (PACE). |
[42] | United Nations Environment Programme (UNEP) (2022) For people and planet The United Nations Environment Programme strategy for tackling climate change, biodiversity and nature loss, and pollution and waste from 2022—2025. |
[43] |
Nair PKR (2005) Agroforestry. Appropriate Technol: 2005: 35–44. https://doi.org/10.1016/B0-12-348530-4/00244-7 doi: 10.1016/B0-12-348530-4/00244-7
![]() |
[44] |
Torquebiau EF (2000) A renewed perspective on agroforestry concepts. C R de l'Académie des Sci-Ser Ⅲ-Sci de la Vie 323: 1009–1017. https://doi.org/10.1016/S0764-4469(00)01239-7 doi: 10.1016/S0764-4469(00)01239-7
![]() |
[45] |
Kay S, Graves A, Palma JHN, et al. (2019) Agroforestry is paying off—Economic evaluation of ecosystem services in European landscapes with and without agroforestry systems. Ecosyst Serv 36: 100896. https://doi.org/10.1016/j.ecoser.2019.100896 doi: 10.1016/j.ecoser.2019.100896
![]() |
[46] |
Ovando P, Campos P, Oviedo JL, et al. (2016) Ecosystem accounting for measuring total income in private and public agroforestry farms. For Policy Econ 71: 43–51. https://doi.org/10.1016/j.forpol.2016.06.031 doi: 10.1016/j.forpol.2016.06.031
![]() |
[47] |
Brand U (2012) Green Economy—the Next Oxymoron? GAIA-Ecol Perspect Sci Soc 21: 28–32. https://doi.org/10.14512/gaia.21.1.9 doi: 10.14512/gaia.21.1.9
![]() |
[48] |
Borel-Saladin JM, Turok IN (2013) The green economy: Incremental change or transformation? Environ Policy Governance 23: 209–220. https://doi.org/10.1002/eet.1614 doi: 10.1002/eet.1614
![]() |
[49] |
Dianjaya AR, Epira P (2020) Indonesia green economy implementation readiness of greenhouse gas emissions reduction. J Contemp Governance Public Policy 1: 27–40. https://doi.org/10.46507/jcgpp.v1i1.5 doi: 10.46507/jcgpp.v1i1.5
![]() |
[50] |
Akter R, Kamrul M, Kabir KH, et al. (2022) Agroforestry systems and their impact on livelihood improvement of tribal farmers in a tropical moist deciduous forest in Bangladesh. Trees, For People 9: 100315. https://doi.org/10.1016/j.tfp.2022.100315 doi: 10.1016/j.tfp.2022.100315
![]() |
[51] |
Aryal K, Maraseni T, Apan A (2023) Transforming agroforestry in contested landscapes : A win-win solution to trade-offs in ecosystem services in Nepal. Sci Total Environ 857: 159301. https://doi.org/10.1016/j.scitotenv.2022.159301 doi: 10.1016/j.scitotenv.2022.159301
![]() |
[52] |
Wilson MH, Lovell ST (2016) Agroforestry—The next step in sustainable and resilient agriculture. Sustainability (Switzerland) 8: 574. https://doi.org/10.1016/j.scitotenv.2022.159301 doi: 10.1016/j.scitotenv.2022.159301
![]() |
[53] |
Paudel S, Baral H, Rojario A, et al. (2022) Agroforestry : Opportunities and challenges in Timor-Leste. Forests 13: 41. https://doi.org/10.3390/f13010041 doi: 10.3390/f13010041
![]() |
[54] |
Fitch A, Rowe RL, McNamara NP, et al. (2022) The coffee compromise: Is agricultural expansion into tree plantations a sustainable option? Sustainability (Switzerland) 14: 3019. https://doi.org/10.3390/su14053019 doi: 10.3390/su14053019
![]() |
[55] |
Liu W, Yao S, Wang J, et al. (2019) Trends and features of agroforestry research based on bibliometric analysis. Sustainability (Switzerland) 11: 3473. https://doi.org/10.3390/su11123473 doi: 10.3390/su11123473
![]() |
[56] |
Susanti A, Marhaento H, Permadi DB, et al. (2020) Smallholder farmers' perception on oil palm agroforestry. IOP Conf Ser: Earth Environ Sci 449: 012056. https://doi.org/10.1088/1755-1315/449/1/012056 doi: 10.1088/1755-1315/449/1/012056
![]() |
[57] |
Vazquez-Delfin P, Casas A, Vallejo M (2022) Adaptation and biocultural conservation of traditional agroforestry systems in the Tehuac an Valley: Access to resources and livelihoods strategies. Heliyon 8: e09805. https://doi.org/10.1016/j.heliyon.2022.e09805 doi: 10.1016/j.heliyon.2022.e09805
![]() |
[58] |
Zada M, Zada S, Ali M, et al. (2022) Contribution of small-scale agroforestry to local economic development and livelihood resilience: Evidence from Khyber Pakhtunkhwa Province (KPK), Pakistan. Land 11: 71. https://doi.org/10.3390/land11010071 doi: 10.3390/land11010071
![]() |
[59] |
Parodi A, Villamonte-Cuneo G, Loboguerrero AM, et al. (2022) Embedding circularity into the transition towards sustainable agroforestry systems in Peru. Sci Total Environ 838: 156376. https://doi.org/10.1016/j.scitotenv.2022.156376 doi: 10.1016/j.scitotenv.2022.156376
![]() |
[60] |
Insusanty E, Ikhwan M, Ervayenri E, et al. (2020) Mitigation climate change: Strengthening agroforestry at the District XⅢ Koto Kampar, Riau. Indonesia. IOP Conf Ser: Earth Environ Sci 469: 012015. https://doi.org/10.1088/1755-1315/469/1/012015 doi: 10.1088/1755-1315/469/1/012015
![]() |
[61] |
Suyanto S, Pandu Permana R, Khususiyah N, et al. (2005) Land tenure, agroforestry adoption, and reduction of fire hazard in a forest zone: A case study from Lampung, Sumatra, Indonesia. Agrofor Syst 65: 1–11. https://doi.org/10.1007/s10457-004-1413-1 doi: 10.1007/s10457-004-1413-1
![]() |
[62] |
Apriandana F, Safe'i R, Febryano IG, et al. (2021) Pengelolaan hutan desa di KPH wilayah VⅢ Semendo dari perspektif kinerja kelembagaan. J Penelitian Sosial dan Ekon Kehutanan 18: 185–204. https://doi.org/10.20886/jpsek.2021.18.3.185-204 doi: 10.20886/jpsek.2021.18.3.185-204
![]() |
[63] |
Verbist B, Putra AED, Budidarsono S (2005) Factors driving land use change: Effects on watershed functions in a coffee agroforestry system in Lampung, Sumatra. Agric Syst 85: 254–270. https://doi.org/10.1016/j.agsy.2005.06.010 doi: 10.1016/j.agsy.2005.06.010
![]() |
[64] |
Supriadi H, Pranowo D (2015) Some statistical aspects of partitioning genotype-environmental components of variability. Perspektif 14: 135–150. https://doi.org/10.21082/p.v14n2.2015.135-150 doi: 10.21082/p.v14n2.2015.135-150
![]() |
[65] | United Nations Office for REDD Coordination in Indonesia (UNORCID) (2015) Forest Ecosystem Valuation Study: Indonesia. |
[66] |
Amaruzaman S, Leimona B, van Noordwijk M, et al. (2017) Discourses on the performance gap of agriculture in a green economy: A Q-methodology study in Indonesia. Int J Biodiversity Sci, Ecosyst Serv Manag 13: 233–247. https://doi.org/10.1080/21513732.2017.1331264 doi: 10.1080/21513732.2017.1331264
![]() |
[67] |
Swainson L, Mahanty S (2018) Green economy meets political economy: Lessons from the "Aceh Green" initiative, Indonesia. Global Environ Change 53: 286–295. https://doi.org/10.1016/j.gloenvcha.2018.10.009 doi: 10.1016/j.gloenvcha.2018.10.009
![]() |
[68] |
Anderson ZR, Kusters K, McCarthy J, et al. (2016) Green growth rhetoric versus reality: Insights from Indonesia. Global Environ Change 38: 30–40. https://doi.org/10.1016/j.gloenvcha.2016.02.008 doi: 10.1016/j.gloenvcha.2016.02.008
![]() |
[69] |
Endriana L, Hartono D, Irawan T (2016) Green economy priority sectors in Indonesia: A SAM approach. Environ Econ Policy Stud 18: 115–135. https://doi.org/10.1007/s10018-015-0114-5 doi: 10.1007/s10018-015-0114-5
![]() |
[70] |
David W, Ardiansyah A (2016) Organic agriculture in Indonesia: Challenges and opportunities. Org Agric 7: 329–338. https://doi.org/10.1007/s13165-016-0160-8 doi: 10.1007/s13165-016-0160-8
![]() |
[71] |
Machmuddin N, Kusnadi N, Syaukat Y (2017) Analisis efisiensi ekonomi usahatani padi organik dan konvensional di kabupaten Tasikmalaya. Forum Agribisnis 6: 145–160. https://doi.org/10.29244/fagb.6.2.145-160 doi: 10.29244/fagb.6.2.145-160
![]() |
[72] |
Mayrowani H (2012) Pengembangan pertanian organik di Indonesia. Forum Penelitian Agro Ekonomi 30: 91–108. https://doi.org/10.21082/fae.v30n2.2012.91-108 doi: 10.21082/fae.v30n2.2012.91-108
![]() |
[73] |
Ginting YA, Malau LRE (2021) Analisis pendapatan dan faktor-faktor yang mempengaruhi penerapan System Rice of Intensification (SRI) di desa Trasan, kecamatan Bandongan, kabupaten Magelang. J Manajemen Agribisnis (Journal of Agribusiness Management) 9: 303–314. https://doi.org/10.24843/JMA.2021.v09.i01.p07 doi: 10.24843/JMA.2021.v09.i01.p07
![]() |
[74] |
Gultom L, Winandi R, Jahroh S (2014) Analisis efisiensi teknis usahatani padi semi organik di kecamatan Cigombong, Bogor. Inf Pertanian 23: 7–18. https://doi.org/10.21082/ip.v23n1.2014.p7-18 doi: 10.21082/ip.v23n1.2014.p7-18
![]() |
[75] |
Murniati K, Mulyo JH, Irham I, et al. (2017) Efisiensi teknis usaha tani padi organik lahan sawah tadah hujan di kabupaten Tanggamus provinsi Lampung. J Penelitian Pertanian Ter 14: 31–38. https://doi.org/10.25181/jppt.v14i1.139 doi: 10.25181/jppt.v14i1.139
![]() |
[76] |
Permatasari P, Anantanyu S, Dewi WS (2018) Pengaruh tingkat adopsi budidaya padi organik terhadap keberlanjutan budidaya padi organik di kabupaten Boyolali. Carakatani: J Sustainable Agric 33: 153–168. https://doi.org/10.20961/carakatani.v33i2.22296 doi: 10.20961/carakatani.v33i2.22296
![]() |
[77] |
Arsanti IW, Böhme MH (2018) Organic vegetable production in java—Challenge for the chili growers. IOP Conf Ser: Earth Environ Sci 215: 012035. https://doi.org/10.1088/1755-1315/215/1/012035 doi: 10.1088/1755-1315/215/1/012035
![]() |
[78] |
Leksono AS, Mustafa I, Gama ZP, et al. (2021) Organic farming system of cocoa plantations in South Malang, Indonesia. IOP Conf Ser: Earth Environ Sci 743: 012030. https://doi.org/10.1088/1755-1315/743/1/012030 doi: 10.1088/1755-1315/743/1/012030
![]() |
[79] |
Utami TW, Irham I, Abdurofi I (2022) The sustainability level of semi organic shallot farming based on farmers perception: A case study in Bantul district, Daerah Istimewa Yogyakarta, Indonesia. IOP Conf Ser: Earth Environ Sci 1005: 012029. https://doi.org/10.1088/1755-1315/1005/1/012029 doi: 10.1088/1755-1315/1005/1/012029
![]() |
[80] |
Saroja RA-Z, Karyani T (2021) Komparasi pendapatan petani kopi organik dan Konvensional (Suatu kasus di desa Margamulya, kecamatan Pangalengan, kabupaten Bandung, Jawa Barat). Mimbar Agribisnis: J Pemikiran Masyarakat Ilmiah Berwawasan Agribisnis 7: 25–25. https://doi.org/10.25157/ma.v7i1.3822 doi: 10.25157/ma.v7i1.3822
![]() |
[81] |
Marindra G, Arifin B, Indriani Y (2018) Analisis keberlanjutan usahatani kopi sertifikasi Common Code For The Coffee Community (4C) di Kabupaten Tanggamus Provinsi Lampung. J Ilmu-Ilmu Agribisnis 6: 367–383. https://doi.org/10.23960/jiia.v6i4.376-383 doi: 10.23960/jiia.v6i4.376-383
![]() |
[82] |
Santoso AB (2017) Analisis pendapatan terhadap karakteristik usahtani integrasi tanaman perkebunan-sapi: Kasus di Desa Mesa, kabupaten Maluku Tengah. J Ilmu Pertanian Indonesia 22: 108–114. https://doi.org/10.18343/jipi.22.2.108 doi: 10.18343/jipi.22.2.108
![]() |
[83] |
Bamualim AM, Madarisa F, Pendra Y, et al. (2015) Kajian inovasi integrasi tanaman-ternak melalui pemanfaatan hasil ikutan tanaman sawit untuk meningkatkan produksi sapi lokal Sumatera Barat. J Peternakan Indonesia (Indonesian Journal of Animal Science) 17: 83–93. https://doi.org/10.25077/jpi.17.2.83-93.2015 doi: 10.25077/jpi.17.2.83-93.2015
![]() |
[84] |
Sari M, Silalahi FRL (2022) Analisis usahatani integrasi sapi-sawit di kabupaten Deli Serdang, provinsi Sumatera Utara, Indonesia. Agro Bali: Agric J 5: 144–155. https://doi.org/10.37637/ab.v5i1.879 doi: 10.37637/ab.v5i1.879
![]() |
[85] |
Ermiati E, Pribadi ER, Wahyudi A (2015) Pengkajian usahatani integrasi seraiwangi-ternak sapi. Buletin Penelitian Tanaman Rempah dan Obat 26: 133–142. https://doi.org/10.21082/bullittro.v26n2.2015.133-142 doi: 10.21082/bullittro.v26n2.2015.133-142
![]() |
[86] |
Parulian L, Munthe KPSM, Haloho RD (2019) Pengaruh integrasi tanaman dan ternak sapi terhadap peningkatan pendapatan dan produktivitas petani (Studi kasus: petani kentang di kecamatan Harian, kabupaten Samosir). Agrimor: J Agribisnis Lahan Kering 4: 22–25. https://doi.org/10.32938/ag.v4i2.694 doi: 10.32938/ag.v4i2.694
![]() |
[87] |
Suwarto S, Aryanto AT, Efendi I (2015) Perancangan model pertanian terpadu tanaman-ternak dan tanaman-ikan di perkampungan teknologi Telo, Riau. J Agron 43: 168–177. https://doi.org/10.24831/jai.v43i2.10424 doi: 10.24831/jai.v43i2.10424
![]() |
[88] |
Rahmat M, Premono BT, Ulya NA, et al. (2019) Management of swamp buffalo farms in forest areas to preserve forest ecosystem and sustainability of community livelihoods. IOP Conf Ser: Earth Environ Sci 298: 012038. https://doi.org/10.1088/1755-1315/298/1/012038 doi: 10.1088/1755-1315/298/1/012038
![]() |
[89] | Tata HL (2019) Mixed farming systems on peatlands in Jambi and Central Kalimantan provinces, Indonesia: Should they be describe as paludiculture? Mires Peat 25: 1–17. |
[90] | Tata HL, Susmianto A (2016) Prospek Ekosistem Gambut Indonesia. Bogor: FORDA Press. |
[91] |
Yuwati TW, Rachmanadi D, Qirom MA, et al. (2021) The performance of paludiculture commodities at different peat depths in Central Kalimantan. IOP Conf Ser: Earth Environ Sci 914: 012047. https://doi.org/10.1088/1755-1315/914/1/012047 doi: 10.1088/1755-1315/914/1/012047
![]() |
[92] |
Budiman I, Bastoni B, Sari ENN, et al. (2020) Progress of paludiculture projects in supporting peatland ecosystem restoration in Indonesia. Global Ecol Conserv 23: e01084. https://doi.org/10.1016/j.gecco.2020.e01084 doi: 10.1016/j.gecco.2020.e01084
![]() |
[93] |
Achmad B, Siarudin M, Widiyanto A, et al. (2022) Traditional subsistence farming of smallholder agroforestry systems in Indonesia: A Review. Sustainability (Switzerland) 14: 8631. https://doi.org/10.3390/su14148631 doi: 10.3390/su14148631
![]() |
[94] |
Purnomo D, Budiastuti MTS, Setyaningrum D (2022) The role of soybean agroforestry in mitigating climate change in Indonesia. IOP Conf Ser: Earth Environ Sci 1016: 012024. https://doi.org/10.1088/1755-1315/1016/1/012024 doi: 10.1088/1755-1315/1016/1/012024
![]() |
[95] | Rachman LM, Hidayat Y, Tarigan SD, et al. (2020) The effect of agroforestry system on reducing soil erosion in upstream Ciliwung watershed. IOP Conf Ser: Earth Environ Sci 556: 012010. |
[96] |
Rahmani TA, Nurrochmat DR, Hero Y, et al. (2021) Evaluating the feasibility of oil palm agroforestry in harapan rainforest, Jambi, Indonesia. For Soc 5: 458–477. https://doi.org/10.24259/fs.v5i2.10375 doi: 10.24259/fs.v5i2.10375
![]() |
[97] | Hidayat NK, Offermans A, Glasbergen P (2016) On the profitability of sustainability certification. J Econ Sustainable Develop 7: 45–62. |
[98] |
Hutabarat S, Slingerland M, Rietberg P, et al. (2018) Costs and benefits of certification of independent oil palm smallholders in Indonesia. Int Food Agribusiness Manag Rev 21: 681–700. https://doi.org/10.22434/IFAMR2016.0162 doi: 10.22434/IFAMR2016.0162
![]() |
[99] |
Ibnu M (2019) Determinan Partisipasi Petani Kopi dalam Standar dan Sertifikasi Berkelanjutan Common Code for Coffee Community (4C). J Tanaman Industri dan Penyegar 6: 135–144. https://doi.org/10.21082/jtidp.v6n3.2019.p135-144 doi: 10.21082/jtidp.v6n3.2019.p135-144
![]() |
[100] | Oktami N, Prasmatiwi FE, Rosanti N (2014) Manfaat sertifikasi Rainforest Alliance (RA) dalam mengembangkan usahatani kopi yang berkelanjutan di kecamatan Pulau Panggung, kabupaten Tanggamus. Jurnal Ilmu Ilmu Agribisnis 2: 337–347. |
[101] |
Sinaga SV, Harianto H, Suharno S (2019) Analisis propensity score matching dampak ekonomi sertifikasi C.A.F.E Practises pada usahatani kopi lintong Sumatera Utara. J AGRISEP: Kajian Masalah Sosial Ekonomi Pertanian dan Agribisnis 18: 139–152. https://doi.org/10.31186/jagrisep.18.1.139-152 doi: 10.31186/jagrisep.18.1.139-152
![]() |
[102] | Sudirman H, Nurmalina R, Suprehatin S (2021) Dampak standar keberlanjutan terhadap pendapatan usahatani kopi: Kasus program CAFE Practises di Kabupaten Enrekang. J Agro Ekon 39: 131–153. |
[103] |
Cahyono ED, Fairuzzana S, Willianto D, et al. (2020) Agroforestry innovation through planned farmer behavior: Trimming in pine-coffee systems. Land 9: 363. https://doi.org/10.3390/land9100363 doi: 10.3390/land9100363
![]() |
[104] |
Fitriani, Arifin B, Zakaria WA, et al. (2018) Coffee agroforestry for sustainability of Upper Sekampung Watershed management. IOP Conf Ser: Earth Environ Sci 141: 012006. https://doi.org/10.1088/1755-1315/141/1/012006 doi: 10.1088/1755-1315/141/1/012006
![]() |
[105] |
Hayyun DA, Megantara EN, Parikesit P (2018) Kajian layanan ekosistem pada sistem agroforestri berbasis kopi di Desa Cisero, Garut. J Pengelolaan Lingkungan Berkelanjutan (Journal of Environmental Sustainability Management) 2: 200–219. https://doi.org/10.36813/jplb.2.3.200-219 doi: 10.36813/jplb.2.3.200-219
![]() |
[106] |
Nandini R (2018) Analisis keuntungan usaha Tani agroforestry kemiri, coklat, kopi dan pisang di Hutan Kemasyarakatan Sesaot, Lombok Barat. J Penelitian Kehutanan Faloak 2: 1–12. https://doi.org/10.20886/jpkf.2018.2.1.1-12 doi: 10.20886/jpkf.2018.2.1.1-12
![]() |
[107] |
Pratiwi AM, Kaskoyo H, Herwanti S (2019) Efisiensi pemasaran agroforestri berbasis kopi berdasarkan keragaan pasar : Studi kasus di Pekon Air Kubang, Tanggamus. J Sylva Lestari 7: 299–308. https://doi.org/10.23960/jsl37299-308 doi: 10.23960/jsl37299-308
![]() |
[108] | Agustiningsih R, Suhartoyo H, Suharto E (2022) Pengaruh naungan terhadap kualitas bubuk kopi pada lahan agroforestri. J of Global For Environ Sci 2: 56–60. |
[109] |
Kissinger K, Pitri RMN (2017) Bioekologi agroforestry kopi: Tutupan vegetasi dan pola tumbuhan penyusun agroforestry kopi (coffea sp.) di kecamatan Pengaron, kabupaten Banjar, Kalimantan Selatan. EnviroScienteae 13: 150–156. https://doi.org/10.20527/es.v13i2.3917 doi: 10.20527/es.v13i2.3917
![]() |
[110] |
Martin E, Suharjito D, Darusman D, et al. (2016) Etika subsistensi petani kopi: Memahami dinamika pengembangan agroforestri di Dataran Tinggi Sumatera Selatan. Sodality: J Sosiologi Pedesaan 4: 155–166. https://doi.org/10.22500/sodality.v4i1.14410 doi: 10.22500/sodality.v4i1.14410
![]() |
[111] |
Rimbawan R, Hafizianor H, Pujawati ED (2021) Pengelolaan agroforestri pinus-kopi dan kontribusinya bagi masyarakat desa Babadan pada kawasan hutan pinus perutani KPH Malang Jawa Timur. J Sylva Scienteae 4: 591–598. https://doi.org/10.20527/jss.v4i4.3933 doi: 10.20527/jss.v4i4.3933
![]() |
[112] |
Godoy R, Bennett C (1989) Diversification among coffee smallholders in the highlands of South Sumatra, Indonesia. Hum Ecol 16: 397–420. https://doi.org/10.1007/BF00891650 doi: 10.1007/BF00891650
![]() |
[113] | Kerr J, Pender J, Suyanto (2006) Property rights and environmental services in Lampung Province, Indonesia. Survival of the Commons: Mounting Challenges and New Realities The Eleventh Conference of the International Association for the Study of Common Property, 1–30. |
[114] |
Levang P, Sitorus S, Gaveau D, et al. (2012) Landless farmers, sly opportunists, and manipulated voters: The squatters of the Bukit Barisan Selatan National Park (Indonesia). Conserv Soc 10: 243–255. https://doi.org/10.4103/0972-4923.101838 doi: 10.4103/0972-4923.101838
![]() |
[115] |
Putraditama A, Kim Y-s, Baral H (2021) Where to put community-based forestry?: Reconciling conservation and livelihood in Lampung, Indonesia. Trees, For People 4: 100062. https://doi.org/10.1016/j.tfp.2021.100062 doi: 10.1016/j.tfp.2021.100062
![]() |
[116] |
Octavia D, Rachmat HH (2020) Promoting agroforestry model in increasing land cover to sustain community livelihood in Paru Village Forest. IOP Conf Ser: Earth Environ Sci 449: 012011. https://doi.org/10.1088/1755-1315/449/1/012011 doi: 10.1088/1755-1315/449/1/012011
![]() |
[117] |
Wahyu A, Suharjito D, Darusman D, et al. (2020) The development of community-based forest management in Indonesia and its contribution to community welfare and forest condition. IOP Conf Ser: Earth Environ Sci 528: 012037. https://doi.org/10.1088/1755-1315/528/1/012037 doi: 10.1088/1755-1315/528/1/012037
![]() |
[118] | Capaian Perhutanan Sosial Sampai Dengan 1 Oktober 2022. http://pskl.menlhk.go.id/berita/437-capaian-perhutanan-sosial-sampai-dengan-1-oktober-2022.html?showall = 1 & limitstart = |
[119] |
Fisher MR, Moeliono M, Mulyana A, et al. (2018) Assessing the new social forestry project in Indonesia: Recognition, livelihood and conservation? Int For Rev 20: 346–361. https://doi.org/10.1505/146554818824063014 doi: 10.1505/146554818824063014
![]() |
[120] |
Kaskoyo H, Mohammed AJ, Inoue M (2017) Impact of community forest program in protection forest on livelihood outcomes: A case study of Lampung Province, Indonesia. J Sustainable For 36: 250–263. https://doi.org/10.1080/10549811.2017.1296774 doi: 10.1080/10549811.2017.1296774
![]() |
[121] |
Rowe RL, Prayogo C, Oakley S, et al. (2022) Improved coffee management by farmers in state forest plantations in Indonesia: An experimental platform. Land 11: 671. https://doi.org/10.3390/land11050671 doi: 10.3390/land11050671
![]() |
[122] | Djajanti D (2006) Managing forest with community (PHBM) in Central Java: Promoting equity in access to NTFPs. In: Mahanty S, Fox J, Nurse M, et al. (Eds.), East-West Center and RECOFTC, 63–82. |
[123] |
Maryudi A (2012) Restoring state control over forest resources through administrative procedures: Evidence from a community forestry programme in Central Java, Indonesia. Indonesia ASEAS-Austrian J South-East Asian Stud 5: 229–242. https://doi.org/10.5539/jsd.v5n2p43 doi: 10.5539/jsd.v5n2p43
![]() |
[124] |
Veriasa TO, Rustiadi E, Kinseng RA (2020) The impact of joint community forest management (PHBM) on local community income in upstream of Ciliwung watershed, Bogor Regency-Indonesia. IOP Conf Ser: Earth Environ Sci 556: 012009. https://doi.org/10.1088/1755-1315/556/1/012009 doi: 10.1088/1755-1315/556/1/012009
![]() |
[125] |
Yokota Y, Harada K, Rohman, et al. (2014) Contributions of company-community forestry partnerships (PHBM) to the livelihoods of participants in Java, Indonesia: A case study in Madiun, East Java. Jpn Agric Res Q: JARQ 48: 363–377. https://doi.org/10.6090/jarq.48.363 doi: 10.6090/jarq.48.363
![]() |
[126] |
Iskandar BS, Iskandar J, Irawan B, et al. (2019) The development of coffee cultivation in the traditional agroforestry of mixed-garden (Dukuh lembur) to provide social-economic benefit for the outer baduy community, South Banten, Indonesia. Biodiversitas 20: 2958–2969. https://doi.org/10.13057/biodiv/d201026 doi: 10.13057/biodiv/d201026
![]() |
[127] |
Sodik M, Pudyatmoko S, Yuwono PSH, et al. (2020) Forest conflict mitigation through coffee-based agroforestry provide secure habitat for Javan Slow Lorise in a lowland fragmented forest in Central Java, Indonesia. IOP Conf Ser: Earth Environ Sci 449: 012050. https://doi.org/10.1088/1755-1315/449/1/012050 doi: 10.1088/1755-1315/449/1/012050
![]() |
[128] |
Zahro M, Subekti S, Widjayanthi L (2017) Perubahan sosial ekonomi petani agroforestri berbasis kopi di kabupaten Jember, Jawa Timur. J Kebijakan dan Manajemen Publik 5: 159–168. https://doi.org/10.21070/jkmp.v5i2.1313 doi: 10.21070/jkmp.v5i2.1313
![]() |
[129] |
Winarni S, Budi Yuwono S, Herwanti S (2016) Struktur pendapatan, tingkat kesejahteraan dan faktor produksi agroforestri kopi pada Kesatuan Pengelolaan Hutan Lindung Batutegi (Studi di Gabungan Kelompok Tani Karya Tani Mandiri). J Sylva Lestari 4: 1–10. https://doi.org/10.23960/jsl141-10 doi: 10.23960/jsl141-10
![]() |
[130] |
Fitriani, Arifin B, Zakaria WA, et al. (2018) Kinerja usahatani kopi di hulu DAS Sekampung, Tanggamus, Lampung. J Penelitian Pertanian Terapan 18: 165–174. https://doi.org/10.25181/jppt.v18i3.1503 doi: 10.25181/jppt.v18i3.1503
![]() |
[131] |
Wulandari C, Kurniasih H (2019) Community preferences for social forestry facilitation programming in lampung, Indonesia. For Soc 3: 114–132. https://doi.org/10.24259/fs.v3i1.6026 doi: 10.24259/fs.v3i1.6026
![]() |
[132] |
Ahenkan A, Osei J, Owusu EH (2018) Mainstreaming green economy: An assessment of private sector led initiatives in climate change adaptation in Ghana. J Sustainable Develop 11: 77–87. https://doi.org/10.5539/jsd.v11n2p77 doi: 10.5539/jsd.v11n2p77
![]() |
[133] | Rawanda R, Mutama R, Surya MH, et al. (2021) Pengaruh pengelolaan kopi robusta terhadap kondisi sosial ekonomi masyarakat di HKM Binawana Register 45B Desa Tri Budisukur, Kecamatan Kebun Tebu, Lampung Barat, Lampung. J People, For Environ 1: 1–10. |
[134] |
Suyanto S, Khususiyah N, Leimona B (2007) Poverty and environmental services case study in way Besai Watershed, Lampung Province, Indonesia. Ecol Soc 12: 13. https://doi.org/10.5751/ES-02070-120213 doi: 10.5751/ES-02070-120213
![]() |
[135] |
Ismono H, Arifin B, Tanaka K, et al. (2022) Impacts of coffee agroforestry and sustainability certification on farmers' livelihood in Sumatra-Indonesia. Sustainability Sci Resour 2: 77–95. https://doi.org/10.55168/ssr2809-6029.2022.2005 doi: 10.55168/ssr2809-6029.2022.2005
![]() |
[136] | Harianja AH (2013) Analisis Ekonomi Pengelolaan Hutan Rakyat di Sub DAS Arun. |
[137] |
Dassir M, Sadapotto A, Arsyad U, et al. (2019) Adaptive agroforestry model to improve livelihood and to support the management of Minraleng Watershed in Maros Regency. IOP Conf Ser: Earth Environ Sci 270: 012011. https://doi.org/10.1088/1755-1315/270/1/012011 doi: 10.1088/1755-1315/270/1/012011
![]() |
[138] |
Hakim L (2021) Coffee: Ethnobotany, tourism and biodiversity conservation in East Java. IOP Conf Ser: Earth Environ Sci 743: 012063. https://doi.org/10.1088/1755-1315/743/1/012063 doi: 10.1088/1755-1315/743/1/012063
![]() |
[139] |
Jafaruddin N, Noor TI, Karyani T (2020) Variables influencing the potency of community based coffee agro-tourism in Mount Galunggung, Tasikmalaya, Indonesia. Pelita Perkebunan 36: 267–276. https://doi.org/10.22302/iccri.jur.pelitaperkebunan.v36i3.454 doi: 10.22302/iccri.jur.pelitaperkebunan.v36i3.454
![]() |
[140] |
Imron MA, Campera M, Bihad DA, et al. (2022) Bird assemblages in coffee agroforestry systems and other human modified habitats in Indonesia. Biology 11: 310. https://doi.org/10.3390/biology11020310 doi: 10.3390/biology11020310
![]() |
[141] |
Arifin MZ, Khoir M, Purwanto BE (2020) Community attitudes towards biogas as an alternative energy and environmental quality improvement. J Phys: Conf Ser 1517: 012043. https://doi.org/10.1088/1742-6596/1517/1/012043 doi: 10.1088/1742-6596/1517/1/012043
![]() |
[142] |
Anhar A, Rasyid UHA, Muslih AM, et al. (2020) Sustainable arabica coffee development strategies in Aceh, Indonesia. IOP Conf Ser: Earth Environ Sci 667: 012106. https://doi.org/10.1088/1755-1315/667/1/012106 doi: 10.1088/1755-1315/667/1/012106
![]() |
[143] |
Gomes LC, Bianchi FJJA, Cardoso IM, et al. (2020) Agroforestry systems can mitigate the impacts of climate change on coffee production: A spatially explicit assessment in Brazil. Agric, Ecosystems Environ 294: 106858. https://doi.org/10.1016/j.agee.2020.106858 doi: 10.1016/j.agee.2020.106858
![]() |
[144] |
Moreira SLS, Pires CV, Marcatti GE, et al. (2018) Intercropping of coffee with the palm tree, macauba, can mitigate climate change effects. Agric For Meteorol 256-257: 379–390. https://doi.org/10.1016/j.agrformet.2018.03.026 doi: 10.1016/j.agrformet.2018.03.026
![]() |
[145] |
Rachman I, Umar S, Malik A, et al. (2021) Community readiness on managing agroforestry of candlenut and coffee. IOP Conf Ser: Earth Environ Sci 807: 032008. https://doi.org/10.1088/1755-1315/807/3/032008 doi: 10.1088/1755-1315/807/3/032008
![]() |
[146] |
Lelamo LL (2021) A review on the indigenous multipurpose agroforestry tree species in Ethiopia: management, their productive and service roles and constraints. Heliyon 7: e07874. https://doi.org/10.1016/j.heliyon.2021.e07874 doi: 10.1016/j.heliyon.2021.e07874
![]() |
[147] |
Rosiana N (2020) Dinamika pola pemasaran kopi pada wilayah sentra produksi utama di Indonesia. J Agrosains dan Teknologi 5: 1-10. https://doi.org/10.24853/jat.5.1.1-10 doi: 10.24853/jat.5.1.1-10
![]() |
UK | Canada | |
V | 1191 | 1523 |
E | 2946 | 2508 |
α | 1 | 1 |
β | 0.3 | 0.3 |
R | 120 | 150 |