New Unity Movement Presidential Address
- Date: 2011-12
- Subjects: Government, Resistance to -- South Africa , South Africa -- History -- 20th century , South Africa -- Politics and government
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10948/32466 , vital:32107 , Bulk File 7
- Description: Presidential Addresses were delivered at each Annual conference of the New Unity Movement. This collection, though incomplete, has 18 items ranging from 1989 to 2013.
- Full Text: false
- Date Issued: 2011-12
- Date: 2011-12
- Subjects: Government, Resistance to -- South Africa , South Africa -- History -- 20th century , South Africa -- Politics and government
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10948/32466 , vital:32107 , Bulk File 7
- Description: Presidential Addresses were delivered at each Annual conference of the New Unity Movement. This collection, though incomplete, has 18 items ranging from 1989 to 2013.
- Full Text: false
- Date Issued: 2011-12
Scoring an own goal? The Construction Workers 2010 World Cup Strike
- Authors: Cottle, Eddie
- Date: 2011-10-04
- Subjects: Labour disputes -- South Africa , Strikes and lockouts -- South Africa , Industrial relations -- South Africa
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/60018 , vital:27722
- Description: The nationwide strike by 70 000 construction workers between 8 and 15 July 2009 was unprecedented and significant in several respects. This was the first national strike on 2010 World Cup sites by South African construction workers and was therefore an historic event. A second key feature of the strike was the unity displayed by workers and trade unions within a sector organised by several trade unions. Engineering and building workers came out on strike, with the Building Construction & Allied Workers Union (BCAWU) and the National Union of Mineworkers (NUM) standing together as their representative organisations. A third feature of the strike was the widespread sympathy for it by the South African public and media. This was despite it potentially setting back progress with World Cup projects. Fourthly, the pressure placed upon the trade unions' negotiating team by the Ministry of Labour and the FIFA Local Organising Committee (LOC) proved lethal in undermining their, assisting in causing them to dilute their trade union demands and demobilising the national strike.
- Full Text:
- Date Issued: 2011-10-04
- Authors: Cottle, Eddie
- Date: 2011-10-04
- Subjects: Labour disputes -- South Africa , Strikes and lockouts -- South Africa , Industrial relations -- South Africa
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/60018 , vital:27722
- Description: The nationwide strike by 70 000 construction workers between 8 and 15 July 2009 was unprecedented and significant in several respects. This was the first national strike on 2010 World Cup sites by South African construction workers and was therefore an historic event. A second key feature of the strike was the unity displayed by workers and trade unions within a sector organised by several trade unions. Engineering and building workers came out on strike, with the Building Construction & Allied Workers Union (BCAWU) and the National Union of Mineworkers (NUM) standing together as their representative organisations. A third feature of the strike was the widespread sympathy for it by the South African public and media. This was despite it potentially setting back progress with World Cup projects. Fourthly, the pressure placed upon the trade unions' negotiating team by the Ministry of Labour and the FIFA Local Organising Committee (LOC) proved lethal in undermining their, assisting in causing them to dilute their trade union demands and demobilising the national strike.
- Full Text:
- Date Issued: 2011-10-04
New Unity Movement Bulletin
- Date: 2011-08
- Subjects: Government, Resistance to -- South Africa , South Africa -- History -- 20th century , South Africa -- Politics and government
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10948/31766 , vital:31746 , Bulk File 7
- Description: The Bulletin was the official newsletter of the New Unity Movement. It was published about twice a year and contained articles reflecting the organisation's views on resistance to the Apartheid government.
- Full Text: false
- Date Issued: 2011-08
- Date: 2011-08
- Subjects: Government, Resistance to -- South Africa , South Africa -- History -- 20th century , South Africa -- Politics and government
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10948/31766 , vital:31746 , Bulk File 7
- Description: The Bulletin was the official newsletter of the New Unity Movement. It was published about twice a year and contained articles reflecting the organisation's views on resistance to the Apartheid government.
- Full Text: false
- Date Issued: 2011-08
New Unity Movement Bulletin
- Date: 2011-03
- Subjects: Government, Resistance to -- South Africa , South Africa -- History -- 20th century , South Africa -- Politics and government
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10948/31929 , vital:31863 , Bulk File 7
- Description: The Bulletin was the official newsletter of the New Unity Movement. It was published about twice a year and contained articles reflecting the organisation's views on resistance to the Apartheid government.
- Full Text: false
- Date Issued: 2011-03
- Date: 2011-03
- Subjects: Government, Resistance to -- South Africa , South Africa -- History -- 20th century , South Africa -- Politics and government
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10948/31929 , vital:31863 , Bulk File 7
- Description: The Bulletin was the official newsletter of the New Unity Movement. It was published about twice a year and contained articles reflecting the organisation's views on resistance to the Apartheid government.
- Full Text: false
- Date Issued: 2011-03
'Amanuensis' and 'Steatopygia': the complexity of 'Telling the Tale 'in Zoë Wicomb's David's Story
- Authors: Dass, Minesh
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142599 , vital:38094 , http://dx.doi.org/10.4314/eia.v38i2.3
- Description: Two words, 'amanuensis' and 'steatopygia,' each burdened with its own history, appear in Zoë Wicomb's David's Story with a frequency that commands further consideration. This study shows that these two words are in fact narratives which reveal the tension, inherent in all historical narratives, between that which is denotative or factual and that which is connotative or fictional. Similarly, the words also form the shifting horizon from which we may see history as a narrative of the past that is always also a narrative of the present. The link between these words will ultimately show the complex, compromised role of the narrator and, perhaps, of all historians.
- Full Text:
- Date Issued: 2011
- Authors: Dass, Minesh
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142599 , vital:38094 , http://dx.doi.org/10.4314/eia.v38i2.3
- Description: Two words, 'amanuensis' and 'steatopygia,' each burdened with its own history, appear in Zoë Wicomb's David's Story with a frequency that commands further consideration. This study shows that these two words are in fact narratives which reveal the tension, inherent in all historical narratives, between that which is denotative or factual and that which is connotative or fictional. Similarly, the words also form the shifting horizon from which we may see history as a narrative of the past that is always also a narrative of the present. The link between these words will ultimately show the complex, compromised role of the narrator and, perhaps, of all historians.
- Full Text:
- Date Issued: 2011
'Iron on iron': modernism engaging apartheid in some South African railway poems
- Authors: Wright, Laurence
- Date: 2011
- Language: English
- Type: text , article
- Identifier: vital:7068 , http://hdl.handle.net/10962/d1007459 , https://doi.org/10.1080/00138398.2011.626177
- Description: preprint , Modernism tends to be criticised, internationally, as politically conservative. The objection is often valid, although the charge says little about the quality of artistic achievement involved. This article argues that the alliance between Modernism and political conservatism is by no means a necessary one, and that there are instances where modernist vision has been used to convey substantive political insight, effective social critique and solid resistance. To illustrate the contrast,the article juxtaposes the abstract Modernism associated with Ben Nicholson and World War 2, with a neglected strain of South African railway poetry which uses modernist techniques to effect a powerful critique of South Africa’s apartheid dispensation. The article sustains a distinction between universalising modernist art that requires ethical work from its audiences to achieve artistic completion, and art in which modernist vision performs the requisite ethical work within its own formal constraints. Four very different South African railway poems, by Dennis Brutus, John Hendrickse, Alan Paton, and Leonard Koza, are examined and contextualised to demonstrate ways in which a modernist vision has been used to portray the social disruptions caused by apartheid. Modernist techniques are used to turn railway experience into a metonym for massive social disruption,without betraying the social reality of the transport technology involved.
- Full Text:
- Date Issued: 2011
- Authors: Wright, Laurence
- Date: 2011
- Language: English
- Type: text , article
- Identifier: vital:7068 , http://hdl.handle.net/10962/d1007459 , https://doi.org/10.1080/00138398.2011.626177
- Description: preprint , Modernism tends to be criticised, internationally, as politically conservative. The objection is often valid, although the charge says little about the quality of artistic achievement involved. This article argues that the alliance between Modernism and political conservatism is by no means a necessary one, and that there are instances where modernist vision has been used to convey substantive political insight, effective social critique and solid resistance. To illustrate the contrast,the article juxtaposes the abstract Modernism associated with Ben Nicholson and World War 2, with a neglected strain of South African railway poetry which uses modernist techniques to effect a powerful critique of South Africa’s apartheid dispensation. The article sustains a distinction between universalising modernist art that requires ethical work from its audiences to achieve artistic completion, and art in which modernist vision performs the requisite ethical work within its own formal constraints. Four very different South African railway poems, by Dennis Brutus, John Hendrickse, Alan Paton, and Leonard Koza, are examined and contextualised to demonstrate ways in which a modernist vision has been used to portray the social disruptions caused by apartheid. Modernist techniques are used to turn railway experience into a metonym for massive social disruption,without betraying the social reality of the transport technology involved.
- Full Text:
- Date Issued: 2011
A Baseline Numeric Analysis of Network Telescope Data for Network Incident Discovery
- Cowie, Bradley, Irwin, Barry V W
- Authors: Cowie, Bradley , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427971 , vital:72477 , https://www.researchgate.net/profile/Barry-Ir-win/publication/326225071_An_Evaluation_of_Trading_Bands_as_Indicators_for_Network_Telescope_Datasets/links/5b3f231a4585150d2309e1c0/An-Evaluation-of-Trading-Bands-as-Indicators-for-Network-Telescope-Datasets.pdf
- Description: This paper investigates the value of Network Telescope data as a mechanism for network incident discovery by considering data summa-rization, simple heuristic identification and deviations from previously observed traffic distributions. It is important to note that the traffic ob-served is obtained from a Network Telescope and thus does not expe-rience the same fluctuations or vagaries experienced by normal traffic. The datasets used for this analysis were obtained from a Network Tele-scope for the time period August 2005 to September 2009 which had been allocated a Class-C network address block at Rhodes University. The nature of the datasets were considered in terms of simple statistical measures obtained through data summarization which greatly reduced the processing and observation required to determine whether an inci-dent had occurred. However, this raised issues relating to the time in-terval used for identification of an incident. A brief discussion into statis-tical summaries of Network Telescope data as" good" security metrics is provided. The summaries derived were then used to seek for signs of anomalous network activity. Anomalous activity detected was then rec-onciled by considering incidents that had occurred in the same or simi-lar time interval. Incidents identified included Conficker, Win32. RinBot, DDoS and Norton Netware vulnerabilities. Detection techniques includ-ed identification of rapid growth in packet count, packet size deviations, changes in the composition of the traffic expressed as a ratio of its constituents and changes in the modality of the data. Discussion into the appropriateness of this sort of manual analysis is provided and suggestions towards an automated solution are discussed.
- Full Text:
- Date Issued: 2011
- Authors: Cowie, Bradley , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427971 , vital:72477 , https://www.researchgate.net/profile/Barry-Ir-win/publication/326225071_An_Evaluation_of_Trading_Bands_as_Indicators_for_Network_Telescope_Datasets/links/5b3f231a4585150d2309e1c0/An-Evaluation-of-Trading-Bands-as-Indicators-for-Network-Telescope-Datasets.pdf
- Description: This paper investigates the value of Network Telescope data as a mechanism for network incident discovery by considering data summa-rization, simple heuristic identification and deviations from previously observed traffic distributions. It is important to note that the traffic ob-served is obtained from a Network Telescope and thus does not expe-rience the same fluctuations or vagaries experienced by normal traffic. The datasets used for this analysis were obtained from a Network Tele-scope for the time period August 2005 to September 2009 which had been allocated a Class-C network address block at Rhodes University. The nature of the datasets were considered in terms of simple statistical measures obtained through data summarization which greatly reduced the processing and observation required to determine whether an inci-dent had occurred. However, this raised issues relating to the time in-terval used for identification of an incident. A brief discussion into statis-tical summaries of Network Telescope data as" good" security metrics is provided. The summaries derived were then used to seek for signs of anomalous network activity. Anomalous activity detected was then rec-onciled by considering incidents that had occurred in the same or simi-lar time interval. Incidents identified included Conficker, Win32. RinBot, DDoS and Norton Netware vulnerabilities. Detection techniques includ-ed identification of rapid growth in packet count, packet size deviations, changes in the composition of the traffic expressed as a ratio of its constituents and changes in the modality of the data. Discussion into the appropriateness of this sort of manual analysis is provided and suggestions towards an automated solution are discussed.
- Full Text:
- Date Issued: 2011
A comparison of three techniques for fluorochrome marking of juvenile Clarias gariepinus otoliths
- Wartenberg, Reece, Booth, Anthony J, Weyl, Olaf L F
- Authors: Wartenberg, Reece , Booth, Anthony J , Weyl, Olaf L F
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123520 , vital:35450 , https://doi.10.3377/004.046.0119
- Description: African sharptooth catfish, Clarias gariepinus (Burchell 1822), is widely distributed with a natural range that extends from southern Turkey to the Orange River, South Africa (Skelton 2001). In addition to translocations within its southerly range (Cambray 2003), Cambray (2005) noted that as a result of poor aquaculture practices and introductions from a number of unknown sources, C. gariepinus has now invaded South America, Europe, Asia, and Australia. Its life history characteristics include a fast growth rate to a maximum length of 1300mmtotal length (TL) (Bruton 1976), a high fecundity, an omnivorous diet and the ability to breathe air (de Moor & Bruton 1988; Cambray 2003). Understanding the biology and population dynamics of this invader would assist in its management and possibly eradication.
- Full Text:
- Date Issued: 2011
- Authors: Wartenberg, Reece , Booth, Anthony J , Weyl, Olaf L F
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123520 , vital:35450 , https://doi.10.3377/004.046.0119
- Description: African sharptooth catfish, Clarias gariepinus (Burchell 1822), is widely distributed with a natural range that extends from southern Turkey to the Orange River, South Africa (Skelton 2001). In addition to translocations within its southerly range (Cambray 2003), Cambray (2005) noted that as a result of poor aquaculture practices and introductions from a number of unknown sources, C. gariepinus has now invaded South America, Europe, Asia, and Australia. Its life history characteristics include a fast growth rate to a maximum length of 1300mmtotal length (TL) (Bruton 1976), a high fecundity, an omnivorous diet and the ability to breathe air (de Moor & Bruton 1988; Cambray 2003). Understanding the biology and population dynamics of this invader would assist in its management and possibly eradication.
- Full Text:
- Date Issued: 2011
A framework for DNS based detection and mitigation of malware infections on a network
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
A Framework for DNS Based Detection of Botnets at the ISP Level
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427984 , vital:72478 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622932_A_Framework_for_DNS_Based_Detection_of_Botnets_at_the_ISP_Level/links/5b9a14e1458515310583fc19/A-Framework-for-DNS-Based-Detection-of-Botnets-at-the-ISP-Level.pdf
- Description: The rapid expansion of networks and increase in internet connected devices has lead to a large number of hosts susceptible to virus infec-tion. Infected hosts are controlled by attackers and form so called bot-nets. These botnets are used to steal data, mask malicious activity and perform distributed denial of service attacks. Traditional protection mechanisms rely on host based detection of viruses. These systems are failing due to the rapid increase in the number of vulnerable hosts and attacks that easily bypass detection mechanisms. This paper pro-poses moving protection from the individual hosts to the Internet Ser-vice Provider (ISP), allowing for the detection and prevention of botnet traffic. DNS traffic inspection allows for the development of a lightweight and accurate classifier that has little or no effect on network perfor-mance. By preventing botnet activity at the ISP level, it is hoped that the threat of botnets can largely be mitigated.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427984 , vital:72478 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622932_A_Framework_for_DNS_Based_Detection_of_Botnets_at_the_ISP_Level/links/5b9a14e1458515310583fc19/A-Framework-for-DNS-Based-Detection-of-Botnets-at-the-ISP-Level.pdf
- Description: The rapid expansion of networks and increase in internet connected devices has lead to a large number of hosts susceptible to virus infec-tion. Infected hosts are controlled by attackers and form so called bot-nets. These botnets are used to steal data, mask malicious activity and perform distributed denial of service attacks. Traditional protection mechanisms rely on host based detection of viruses. These systems are failing due to the rapid increase in the number of vulnerable hosts and attacks that easily bypass detection mechanisms. This paper pro-poses moving protection from the individual hosts to the Internet Ser-vice Provider (ISP), allowing for the detection and prevention of botnet traffic. DNS traffic inspection allows for the development of a lightweight and accurate classifier that has little or no effect on network perfor-mance. By preventing botnet activity at the ISP level, it is hoped that the threat of botnets can largely be mitigated.
- Full Text:
- Date Issued: 2011
A Framework for the Management of Operator Policies and User Preferences for Service Compositions in the IP Multimedia Subsystem
- Tsietsi, Mosiuoa, Terzoli, Alfredo, Wells, George C
- Authors: Tsietsi, Mosiuoa , Terzoli, Alfredo , Wells, George C
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430680 , vital:72708 , https://ieeexplore.ieee.org/abstract/document/6032212
- Description: The IP Multimedia Subsystem (IMS) is a telecommunication middleware platform with robust service features that enables the delivery of a wide range of services to mobile network subscribers. Network operators are encouraged to develop services from service building blocks in order to avoid redundancies by re-using existing functionality. In this environ-ment, operators must be able to control the service execution chain in order to prevent undesirable interactions from occurring between indi-vidual building blocks. It is also in their interests to provide subscribers with personalisation options so that they can modify service composi-tions and define their own preferences for how they would like their ser-vices to behave during live sessions. This paper describes a solution for these challenges that involves the storage of service information in an XDMS and allows operator staff and subscribers to manage this in-formation using the XCAP protocol. The ETSI-defined XCAP applica-tion usage named simservs was chosen to demonstrate an application usage that can be used to create service compositions in XML format. A prototype is described that uses components of the open source Mo-bicents project to verify the suitability of the design. This work is part of a larger effort aimed at modeling interaction management in the IMS through the use of a service broker that is part of an extended IMS ser-vice layer (EISL). The service broker's functional and structural architec-ture have not yet been standardised.
- Full Text:
- Date Issued: 2011
- Authors: Tsietsi, Mosiuoa , Terzoli, Alfredo , Wells, George C
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430680 , vital:72708 , https://ieeexplore.ieee.org/abstract/document/6032212
- Description: The IP Multimedia Subsystem (IMS) is a telecommunication middleware platform with robust service features that enables the delivery of a wide range of services to mobile network subscribers. Network operators are encouraged to develop services from service building blocks in order to avoid redundancies by re-using existing functionality. In this environ-ment, operators must be able to control the service execution chain in order to prevent undesirable interactions from occurring between indi-vidual building blocks. It is also in their interests to provide subscribers with personalisation options so that they can modify service composi-tions and define their own preferences for how they would like their ser-vices to behave during live sessions. This paper describes a solution for these challenges that involves the storage of service information in an XDMS and allows operator staff and subscribers to manage this in-formation using the XCAP protocol. The ETSI-defined XCAP applica-tion usage named simservs was chosen to demonstrate an application usage that can be used to create service compositions in XML format. A prototype is described that uses components of the open source Mo-bicents project to verify the suitability of the design. This work is part of a larger effort aimed at modeling interaction management in the IMS through the use of a service broker that is part of an extended IMS ser-vice layer (EISL). The service broker's functional and structural architec-ture have not yet been standardised.
- Full Text:
- Date Issued: 2011
A fuzz testing framework for evaluating and securing network applications
- Zeisberger, Sascha, Irwin, Barry V W
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428000 , vital:72479 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622655_A_Fuzz_Testing_Framework_for_Evaluating_and_Securing_Network_Applications/links/5b9a153b92851c4ba8181b0d/A-Fuzz-Testing-Framework-for-Evaluating-and-Securing-Network-Applications.pdf
- Description: Research has shown that fuzz-testing is an effective means of increasing the quality and security of software and systems. This project proposes the im-plementation of a testing framework based on numerous fuzz-testing tech-niques. The framework will allow a user to detect errors in applications and locate critical areas in the applications that are responsible for the detected errors. The aim is to provide an all-encompassing testing framework that will allow a developer to quickly and effectively deploy fuzz tests on an applica-tion and ensure a higher level of quality control before deployment.
- Full Text:
- Date Issued: 2011
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428000 , vital:72479 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622655_A_Fuzz_Testing_Framework_for_Evaluating_and_Securing_Network_Applications/links/5b9a153b92851c4ba8181b0d/A-Fuzz-Testing-Framework-for-Evaluating-and-Securing-Network-Applications.pdf
- Description: Research has shown that fuzz-testing is an effective means of increasing the quality and security of software and systems. This project proposes the im-plementation of a testing framework based on numerous fuzz-testing tech-niques. The framework will allow a user to detect errors in applications and locate critical areas in the applications that are responsible for the detected errors. The aim is to provide an all-encompassing testing framework that will allow a developer to quickly and effectively deploy fuzz tests on an applica-tion and ensure a higher level of quality control before deployment.
- Full Text:
- Date Issued: 2011
A research tool for analysing and monitoring the Extent to which Environmental issues are integrated into teachers’ lessons
- Authors: Nsubuga, Yvonne
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/386447 , vital:68142 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122246"
- Description: South Africa enjoys strong policy support for the integration of environmental issues into school curricula. However, much doubt exists over the extent to which this has been converted into appropriate classroom practice at the majority of under-resourced rural schools in the country. This article reports on a study which piloted a research tool which can be used to analyse teachers’ lessons, with the aim of gaining insight into the extent to which they integrate natural resource management issues. The research tool was based on Bernstein’s concept of classification and consisted of five indicators of natural resource management integration into Life Sciences lessons. The study contributes to the design of research tools that can be used to analyse and monitor the integration of environmental issues into teachers’ lessons. It also provides some insight into the environmental content of a sample of Grade 10 Life Sciences lessons at four rural underresourced schools in the Eastern Cape.
- Full Text:
- Date Issued: 2011
- Authors: Nsubuga, Yvonne
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/386447 , vital:68142 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122246"
- Description: South Africa enjoys strong policy support for the integration of environmental issues into school curricula. However, much doubt exists over the extent to which this has been converted into appropriate classroom practice at the majority of under-resourced rural schools in the country. This article reports on a study which piloted a research tool which can be used to analyse teachers’ lessons, with the aim of gaining insight into the extent to which they integrate natural resource management issues. The research tool was based on Bernstein’s concept of classification and consisted of five indicators of natural resource management integration into Life Sciences lessons. The study contributes to the design of research tools that can be used to analyse and monitor the integration of environmental issues into teachers’ lessons. It also provides some insight into the environmental content of a sample of Grade 10 Life Sciences lessons at four rural underresourced schools in the Eastern Cape.
- Full Text:
- Date Issued: 2011
A Search for Conjunctions at a Time of Direction-setting Review and Synthesis
- Authors: O'Donoghue, Rob
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/387134 , vital:68209 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122240"
- Description: This journal reflects a diversity of environment and sustainability education research and viewpoints alongside two synthesis papers. Read as a whole and within a widely held ideal that diversity reflects resilience, the environment and education for sustainable development landscape in Africa might be said to be healthy and proliferating. But read against the pressure to produce tangible evidence of change on an African landscape of persistent climate variation and poverty, along with a widening gap between rich and poor, the picture remains challenging. These contrasting readings are notable at a time when we are looking towards the Association for the Development of Education in Africa (ADEA) Triennial in February, 2012, the Rio+20 Earth Summit in June 2012 and our own EEASA +30 conference in September 2012. The UN Decade of Education for Sustainable Development is characterised by a proliferation of education imperatives. These emerged as modern education in response to the issues of the day and now a modernity in deepening crisis.
- Full Text:
- Date Issued: 2011
- Authors: O'Donoghue, Rob
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/387134 , vital:68209 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122240"
- Description: This journal reflects a diversity of environment and sustainability education research and viewpoints alongside two synthesis papers. Read as a whole and within a widely held ideal that diversity reflects resilience, the environment and education for sustainable development landscape in Africa might be said to be healthy and proliferating. But read against the pressure to produce tangible evidence of change on an African landscape of persistent climate variation and poverty, along with a widening gap between rich and poor, the picture remains challenging. These contrasting readings are notable at a time when we are looking towards the Association for the Development of Education in Africa (ADEA) Triennial in February, 2012, the Rio+20 Earth Summit in June 2012 and our own EEASA +30 conference in September 2012. The UN Decade of Education for Sustainable Development is characterised by a proliferation of education imperatives. These emerged as modern education in response to the issues of the day and now a modernity in deepening crisis.
- Full Text:
- Date Issued: 2011
A white man in exile
- Authors: Krueger, Anton
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/229459 , vital:49677 , xlink:href="https://doi.org/10.1080/10137548.2011.636974"
- Description: This article explores intersections between understandings of masculinity and nationalism. Etymologically, ‘patriotism’ refers to a love for a fatherland and a patriarchal order; it includes notions of loyalty, honour and a range of qualities often associated with conceptions of masculinity. But if gender remains fixed to these normative constructions, what happens to one’s sense of masculine identity when the national state changes? My interest lies in exploring how white South African men have been repositioned in terms of a shift in their gendered identification, with a reflection on the possibly tragic consequences of maintaining an overly rigid gender role identification. As long as masculinity is embedded within nationalism, it will be caught up within a defensive reactive mode which can turn self-destructive. In order to explore these ideas the article employs as its central metaphor the character of Dawid Olivier, who is the protagonist of Athol Fugard’s Sorrows and Rejoicings (2002).
- Full Text:
- Date Issued: 2011
- Authors: Krueger, Anton
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/229459 , vital:49677 , xlink:href="https://doi.org/10.1080/10137548.2011.636974"
- Description: This article explores intersections between understandings of masculinity and nationalism. Etymologically, ‘patriotism’ refers to a love for a fatherland and a patriarchal order; it includes notions of loyalty, honour and a range of qualities often associated with conceptions of masculinity. But if gender remains fixed to these normative constructions, what happens to one’s sense of masculine identity when the national state changes? My interest lies in exploring how white South African men have been repositioned in terms of a shift in their gendered identification, with a reflection on the possibly tragic consequences of maintaining an overly rigid gender role identification. As long as masculinity is embedded within nationalism, it will be caught up within a defensive reactive mode which can turn self-destructive. In order to explore these ideas the article employs as its central metaphor the character of Dawid Olivier, who is the protagonist of Athol Fugard’s Sorrows and Rejoicings (2002).
- Full Text:
- Date Issued: 2011
A “place in which to cry”: the place for race and a home for shame in Zoë Wicomb's Playing in the Light
- Authors: Dass, Minesh
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142588 , vital:38093 , DOI: 10.1080/1013929X.2011.602910
- Description: In Zoë Wicomb's Playing in the Light, the main character's troubled sense of identity (brought about by her parents' shameful decision to ‘play white’) is viscerally symbolised by her discomfort in her own and others' homes. In her Cape Town apartment she has nightmares about other houses. Her visits to her family home, where her elderly father lives alone, are similarly burdened by presences and memories she finds unwelcoming. And, her extended vacation to the UK, once she has discovered her family's secret, is a choice of “a place in which to cry” (Wicomb 2006: 191).
- Full Text:
- Date Issued: 2011
- Authors: Dass, Minesh
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142588 , vital:38093 , DOI: 10.1080/1013929X.2011.602910
- Description: In Zoë Wicomb's Playing in the Light, the main character's troubled sense of identity (brought about by her parents' shameful decision to ‘play white’) is viscerally symbolised by her discomfort in her own and others' homes. In her Cape Town apartment she has nightmares about other houses. Her visits to her family home, where her elderly father lives alone, are similarly burdened by presences and memories she finds unwelcoming. And, her extended vacation to the UK, once she has discovered her family's secret, is a choice of “a place in which to cry” (Wicomb 2006: 191).
- Full Text:
- Date Issued: 2011
Adoption, use and perception of Australian acacias around the world
- Kull, Christian A, Shackleton, Charlie M, Cunningham, Peter J, Ducatillon, Catherine, Dufour-Dror, Jean-Mark, Esler, Karen J, Friday, James B, Gouveia, António C, Griffin, A R, Marchante, Elizabete, Midgley, Steven J, Pauchard, Aníbal, Rangan, Haripriya, Richardson, David M, Rinaudo, Tony, Tassin, Jacques, Urgenson, Lauren S, van Maltitz, Graham P, Zenni, Rafael D, Zylstra, Matthew J
- Authors: Kull, Christian A , Shackleton, Charlie M , Cunningham, Peter J , Ducatillon, Catherine , Dufour-Dror, Jean-Mark , Esler, Karen J , Friday, James B , Gouveia, António C , Griffin, A R , Marchante, Elizabete , Midgley, Steven J , Pauchard, Aníbal , Rangan, Haripriya , Richardson, David M , Rinaudo, Tony , Tassin, Jacques , Urgenson, Lauren S , van Maltitz, Graham P , Zenni, Rafael D , Zylstra, Matthew J
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/182149 , vital:43804 , xlink:href="https://doi.org/10.1111/j.1472-4642.2011.00783.x"
- Description: To examine the different uses and perceptions of introduced Australian acacias (wattles; Acacia subgenus Phyllodineae) by rural households and communities. Eighteen landscape-scale case studies around the world, in Vietnam, India, Réunion, Madagascar, South Africa, Congo, Niger, Ethiopia, Israel, France, Portugal, Brazil, Chile, Dominican Republic and Hawai‘i. Qualitative comparison of case studies, based on questionnaire sent to network of acacia researchers. Information based on individual knowledge of local experts, published and unpublished sources. We propose a conceptual model to explain current uses and perceptions of introduced acacias. It highlights historically and geographically contingent processes, including economic development, environmental discourses, political context, and local or regional needs. Four main groupings of case studies were united by similar patterns: (1) poor communities benefiting from targeted agroforestry projects; (2) places where residents, generally poor, take advantage of a valuable resource already present in their landscape via plantation and/or invasion; (3) regions of small and mid-scale tree farmers participating in the forestry industry; and (4) a number of high-income communities dealing with the legacies of former or niche use of introduced acacia in a context of increased concern over biodiversity and ecosystem services. Economic conditions play a key role shaping acacia use. Poorer communities rely strongly on acacias (often in, or escaped from, formal plantations) for household needs and, sometimes, for income. Middle-income regions more typically host private farm investments in acacia woodlots for commercialization. Efforts at control of invasive acacias must take care to not adversely impact poor dependent communities.
- Full Text:
- Date Issued: 2011
- Authors: Kull, Christian A , Shackleton, Charlie M , Cunningham, Peter J , Ducatillon, Catherine , Dufour-Dror, Jean-Mark , Esler, Karen J , Friday, James B , Gouveia, António C , Griffin, A R , Marchante, Elizabete , Midgley, Steven J , Pauchard, Aníbal , Rangan, Haripriya , Richardson, David M , Rinaudo, Tony , Tassin, Jacques , Urgenson, Lauren S , van Maltitz, Graham P , Zenni, Rafael D , Zylstra, Matthew J
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/182149 , vital:43804 , xlink:href="https://doi.org/10.1111/j.1472-4642.2011.00783.x"
- Description: To examine the different uses and perceptions of introduced Australian acacias (wattles; Acacia subgenus Phyllodineae) by rural households and communities. Eighteen landscape-scale case studies around the world, in Vietnam, India, Réunion, Madagascar, South Africa, Congo, Niger, Ethiopia, Israel, France, Portugal, Brazil, Chile, Dominican Republic and Hawai‘i. Qualitative comparison of case studies, based on questionnaire sent to network of acacia researchers. Information based on individual knowledge of local experts, published and unpublished sources. We propose a conceptual model to explain current uses and perceptions of introduced acacias. It highlights historically and geographically contingent processes, including economic development, environmental discourses, political context, and local or regional needs. Four main groupings of case studies were united by similar patterns: (1) poor communities benefiting from targeted agroforestry projects; (2) places where residents, generally poor, take advantage of a valuable resource already present in their landscape via plantation and/or invasion; (3) regions of small and mid-scale tree farmers participating in the forestry industry; and (4) a number of high-income communities dealing with the legacies of former or niche use of introduced acacia in a context of increased concern over biodiversity and ecosystem services. Economic conditions play a key role shaping acacia use. Poorer communities rely strongly on acacias (often in, or escaped from, formal plantations) for household needs and, sometimes, for income. Middle-income regions more typically host private farm investments in acacia woodlots for commercialization. Efforts at control of invasive acacias must take care to not adversely impact poor dependent communities.
- Full Text:
- Date Issued: 2011
Africa: unity, sovereignty and sorrow A book review
- Authors: Matthews, Sally
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142387 , vital:38075 , DOI: 10.1080/02589001.2011.562007
- Description: This ambitious book begins with the statement ‘By and large, the states of sub-Saharan Africa are failures’ (p. 1) and then sets out to explain state failure in Africa and to provide some ‘rational policy fantasies’ in response to this failure. The book builds on the work of scholars like Robert Jackson, William Reno and Jeffrey Herbst, with the particular focus of Englebert's book being on the domestic implications of the unconditional recognition of the sovereignty of African states. African states are internationally recognised despite lacking the features and not being able to perform the functions typically associated with statehood. Englebert's interest is to examine some of the domestic effects of this unconditional international recognition.
- Full Text:
- Date Issued: 2011
- Authors: Matthews, Sally
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142387 , vital:38075 , DOI: 10.1080/02589001.2011.562007
- Description: This ambitious book begins with the statement ‘By and large, the states of sub-Saharan Africa are failures’ (p. 1) and then sets out to explain state failure in Africa and to provide some ‘rational policy fantasies’ in response to this failure. The book builds on the work of scholars like Robert Jackson, William Reno and Jeffrey Herbst, with the particular focus of Englebert's book being on the domestic implications of the unconditional recognition of the sovereignty of African states. African states are internationally recognised despite lacking the features and not being able to perform the functions typically associated with statehood. Englebert's interest is to examine some of the domestic effects of this unconditional international recognition.
- Full Text:
- Date Issued: 2011
African Languages And ICT Education
- Dalvit, Lorenzo, Murray, Sarah, Terzoli, Alfredo
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
Age validation, growth, mortality, and demographic modeling of spotted gully shark (Triakis megalopterus) from the southeast coast of South Africa
- Booth, Anthony J, Foulis, Alan J, Smale, Malcolm J
- Authors: Booth, Anthony J , Foulis, Alan J , Smale, Malcolm J
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123630 , vital:35466 , https://spo.nmfs.noaa.gov/sites/default/files/pdf-content/2011/1091/booth.pdf
- Description: This study documents validation of vertebral band-pair formation in spotted gully shark (Triakis megalopterus) with the use of f luorochrome injection and tagging of captive and wild sharks over a 21-year period. Growth and mortality rates of T. megalopterus were also estimated and a demographic analysis of the species was conducted. Of the 23 OTC (oxytetracycline) -marked vertebrae examined (12 from captive and 11 from wild sharks), seven vertebrae (three from captive and four from wild sharks) exhibited chelation of the OTC and f luoresced under ultraviolet light. It was concluded that a single opaque and translucent band pair was deposited annually up to at least 25 years of age, the maximum age recorded. Reader precision was assessed by using an index of average percent error calculated at 5%. No significant differences were found between male and female growth patterns (P>0.05), and von Bertalanffy growth model parameters for combined sexes were estimated to be L∞=1711.07 mm TL, k=0.11/yr and t0= –2.43 yr (n=86). Natural mortality was estimated at 0.17/yr. Age at maturity was estimated at 11 years for males and 15 years for females. Results of the demographic analysis showed that the population, in the absence of fishing mortality, was stable and not significantly different from zero and particularly sensitive to overfishing. At the current age at first capture and natural mortality rate, the fishing mortality rate required to result in negative population growth was low at F>0.004/ yr. Elasticity analysis revealed that juvenile survival was the principal factor in explaining variability in population growth rate.
- Full Text:
- Date Issued: 2011
- Authors: Booth, Anthony J , Foulis, Alan J , Smale, Malcolm J
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123630 , vital:35466 , https://spo.nmfs.noaa.gov/sites/default/files/pdf-content/2011/1091/booth.pdf
- Description: This study documents validation of vertebral band-pair formation in spotted gully shark (Triakis megalopterus) with the use of f luorochrome injection and tagging of captive and wild sharks over a 21-year period. Growth and mortality rates of T. megalopterus were also estimated and a demographic analysis of the species was conducted. Of the 23 OTC (oxytetracycline) -marked vertebrae examined (12 from captive and 11 from wild sharks), seven vertebrae (three from captive and four from wild sharks) exhibited chelation of the OTC and f luoresced under ultraviolet light. It was concluded that a single opaque and translucent band pair was deposited annually up to at least 25 years of age, the maximum age recorded. Reader precision was assessed by using an index of average percent error calculated at 5%. No significant differences were found between male and female growth patterns (P>0.05), and von Bertalanffy growth model parameters for combined sexes were estimated to be L∞=1711.07 mm TL, k=0.11/yr and t0= –2.43 yr (n=86). Natural mortality was estimated at 0.17/yr. Age at maturity was estimated at 11 years for males and 15 years for females. Results of the demographic analysis showed that the population, in the absence of fishing mortality, was stable and not significantly different from zero and particularly sensitive to overfishing. At the current age at first capture and natural mortality rate, the fishing mortality rate required to result in negative population growth was low at F>0.004/ yr. Elasticity analysis revealed that juvenile survival was the principal factor in explaining variability in population growth rate.
- Full Text:
- Date Issued: 2011