The Korean Demilitarized Zone as a Nature Preserve

Worldview ◽  
1979 ◽  
Vol 22 (3) ◽  
pp. 30-31
Author(s):  
Edward A. Olsen
Pathogens ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 244 ◽  
Author(s):  
SeEun Choe ◽  
Ra Mi Cha ◽  
Dae-Sung Yu ◽  
Ki-Sun Kim ◽  
Sok Song ◽  
...  

There has been a rapid increase in the number of classical swine fever (CSF) sero-positive wild boars captured near the demilitarized zone (DMZ), located the border with North Korea. In 2015–2016, few CSFV-positive antibody boars were detected; however, the number has increased steeply since 2017. Most occurred in the northern region of Gyeonggi before spreading slowly to Gangwon (west to east) in 2018–2019. Multi-distance spatial cluster analysis provided an indirect estimate of the time taken for CSFV to spread among wild boars: 46.7, 2.6, and 2.49 days/km. The average CSF serum neutralization antibody titer was 4–10 (log 2), and CSFV Ab B-ELISA PI values ranged from 65.5 to 111.5, regardless of the age and sex of wild boars. Full genome analysis revealed that 16 CSFV strains isolated from wild boars between 2017 and 2019 were identical to the YC16CS strain (sub-genotype 2.1d) isolated from an outbreak in breeding pigs near the border with North Korea in 2016. The rapid increase in CSF in wild boars may be due to a continuously circulating infection within hub area and increased population density. The distribution pattern of CSFV in Korean wild boars moves from west to southeast, affected by external factors, including small-scale hunting, geographical features and highways.


2016 ◽  
Vol 31 (2) ◽  
pp. 162-187 ◽  
Author(s):  
Eleana J. Kim

Drawing on research in the borderlands of South Korea near the Korean Demilitarized Zone, this essay analyzes the heterogeneous life of landmines in postconflict militarized ecologies. Humanitarian narratives typically frame mines as deadly remnants of war, which aligns with postcolonial critiques viewing them as traces of imperial power and ongoing violence. Given that landmines and other unexploded ordnance can remain live for up to a hundred years, I suggest that mines and minefields become infrastructural when their distributed agency is redistributed over time, bringing into view nonhuman agencies and affordances that might otherwise go undetected in humanitarian or postcolonial critiques. I offer the framework of rogue infrastructure to capture the volatile materiality of mines and their multiple natural, cultural, technical, and political entanglements with the humans who exist alongside them.


1956 ◽  
Vol 8 (3) ◽  
pp. 355-373 ◽  
Author(s):  
R. A. C. Parker

ON March 7, 1936, German troops entered the demilitarized zone of the Rhineland. Germany thus violated Articles 42 and 43 of the Treaty of Versailles and Articles 1 and 2 of the Treaty of Locarno of 1925. Remilitarization moved forward for about one hundred miles the areas of concentration for any German armed attack in the west and advanced the defensive line that could be held by the German army. It severely weakened France and, in consequence, all the other powers concerned to maintain the Paris peace settlements and to preserve the peace of Europe.


2018 ◽  
Vol 80 (5) ◽  
pp. 359-364 ◽  
Author(s):  
McKenzie L. Doup

Children today do not spend as much time outside as they did in previous generations; consequently, they are not building connectedness to nature and are less likely to engage in pro-environmental behaviors. Environmental education is one way to ameliorate this problem. However, teachers are limited by their access to natural habitats, time, and field expertise. To address both of these issues, I present an inquiry-based activity for both Advanced Placement and general high school biology that requires students to spend time in nature, use authentic field methods for collecting data, and apply their findings to pertinent conservation issues. This four-day activity uses a simplified approach, called the meter stick random sampling method, to measure plant biodiversity of different local habitats. Time-efficient and not reliant on species identification, this method is designed so students can repeat this procedure in their backyards or at a local nature preserve. The data can be used to discuss how human disturbance of habitat affects biodiversity, the importance of biodiversity for the stability of ecosystems, and how to restore biodiversity locally.


Castanea ◽  
2008 ◽  
Vol 73 (1) ◽  
pp. 1-15 ◽  
Author(s):  
Loy R. Phillippe ◽  
Daniel T. Busemeyer ◽  
Paul B. Marcum ◽  
Mary Ann Feist ◽  
John E. Ebinger

Rhodora ◽  
2008 ◽  
Vol 110 (942) ◽  
pp. 171-177
Author(s):  
William E. McClain ◽  
John E. Ebinger

2019 ◽  
Vol 9 (1) ◽  
pp. 119-139

This paper presents a case study involving the deployment of a secure environment on the computer network at the City Hall in Palmeira das Missões - RS, throughout the definition of a physical and logical infrastructure, supported at concepts of management of computer networks and information security. Through the creation of Vlans (Virtual Local Areas Networks) and definition of DMZ (Demilitarized Zone) defined to achieve the level of security and network management required by the IT department, as well as provide greater reliability and integrity of information that travel on the network so that the users can perform their tasks more dynamically in a secure and agile environment. The main contribution of this case study was the implementation of a security and management in the computer network at the City Hasll in Palmeira das Missões – RS.


2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


Sign in / Sign up

Export Citation Format

Share Document