Transcribing the Venda tshikona reedpipe dance
- Tracey, Andrew, Gumboreshumba, Laina
- Authors: Tracey, Andrew , Gumboreshumba, Laina
- Date: 2013
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59744 , vital:27644 , http://dx.doi.org/10.21504/amj.v9i3.1909
- Description: Starting with the end result, the above transcription is the conclusion I came to after sitting with Laina Gumboreshumba for many hours, watching the videos she made during her recent doctoral research on the tshikona reedpipe dance of the Venda of Limpopo Province in the extreme north of South Africa. The transcription shown in Figure 2 is a skeleton version of the full pipe sound that contains all the information needed to grasp the structure of the sound and teach it or play it. There are always seven different pipes. A full tshikona group has far more than the seven pipes (nanga) shown, because all seven pipe numbers are doubled in every octave present in a group, so there may be up to four or more Pipe 1s, Pipe 2s, etc, of different sizes. All the Pipe 1s play the same pattern together, all the Pipe 2s etc. There are usually four octaves in all, with an incomplete octave of a few higher pitched pipes at the top (phalana). A popular size for a group according to group leaders (malogwane) is twenty eight pipes, which may include some pitch duplicates. A festive performance can number well over one hundred players. The music is heptatonic as you can see from the transcription, and hear for yourself from CD track 1 accompanying this issue of African Music. A chart showing the tuning is included as Figure 1 1 at the end of this article. This article does not address the pipe names; they are simply numbered Pipes 1 to 7, in the order of entry in Mr Netshivhale’s groups. The pipes are end-blown, closed tubes made of a special bamboo, or increasingly today of electrical or other tubing.
- Full Text:
- Date Issued: 2013
- Authors: Tracey, Andrew , Gumboreshumba, Laina
- Date: 2013
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59744 , vital:27644 , http://dx.doi.org/10.21504/amj.v9i3.1909
- Description: Starting with the end result, the above transcription is the conclusion I came to after sitting with Laina Gumboreshumba for many hours, watching the videos she made during her recent doctoral research on the tshikona reedpipe dance of the Venda of Limpopo Province in the extreme north of South Africa. The transcription shown in Figure 2 is a skeleton version of the full pipe sound that contains all the information needed to grasp the structure of the sound and teach it or play it. There are always seven different pipes. A full tshikona group has far more than the seven pipes (nanga) shown, because all seven pipe numbers are doubled in every octave present in a group, so there may be up to four or more Pipe 1s, Pipe 2s, etc, of different sizes. All the Pipe 1s play the same pattern together, all the Pipe 2s etc. There are usually four octaves in all, with an incomplete octave of a few higher pitched pipes at the top (phalana). A popular size for a group according to group leaders (malogwane) is twenty eight pipes, which may include some pitch duplicates. A festive performance can number well over one hundred players. The music is heptatonic as you can see from the transcription, and hear for yourself from CD track 1 accompanying this issue of African Music. A chart showing the tuning is included as Figure 1 1 at the end of this article. This article does not address the pipe names; they are simply numbered Pipes 1 to 7, in the order of entry in Mr Netshivhale’s groups. The pipes are end-blown, closed tubes made of a special bamboo, or increasingly today of electrical or other tubing.
- Full Text:
- Date Issued: 2013
Understanding the medicines information-seeking behaviour and information needs of South African long-term patients with limited literacy skills:
- Patel, Sonal, Dowse, Roslind
- Authors: Patel, Sonal , Dowse, Roslind
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156676 , vital:40037 , doi: 10.1111/hex.12131
- Description: Although much health information‐seeking behaviour (HISB) research has been reported in patients with good literacy skills, little is known about HISB in patients with limited literacy skills served by under‐resourced health‐care systems. To investigate medicine information‐seeking behaviour and information needs in patients with limited literacy.
- Full Text:
- Date Issued: 2013
- Authors: Patel, Sonal , Dowse, Roslind
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156676 , vital:40037 , doi: 10.1111/hex.12131
- Description: Although much health information‐seeking behaviour (HISB) research has been reported in patients with good literacy skills, little is known about HISB in patients with limited literacy skills served by under‐resourced health‐care systems. To investigate medicine information‐seeking behaviour and information needs in patients with limited literacy.
- Full Text:
- Date Issued: 2013
Where angels fear to tread: online peer-assessment in a large first-year class
- Mostert, Markus, Snowball, Jeanette D
- Authors: Mostert, Markus , Snowball, Jeanette D
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68845 , vital:29330 , https://doi.org/10.1080/02602938.2012.683770
- Description: Publisher version , In the context of widening participation, large classes and increased diversity, assessment of student learning is becoming increasingly problematic in that providing formative feedback aimed at developing student writing proves to be particularly laborious. Although the potential value of peer assessment has been well documented in the literature, the associated administrative burden, also in relation to managing anonymity and intellectual ownership, makes this option less attractive, particularly in large classes. A potential solution involves the use of information and communication technologies to automate the logistics associated with peer assessment in a time-efficient way. However, uptake of such systems in the higher education community is limited, and research in this area is only beginning. This case study reports on the use of the Moodle Workshop module for formative peer assessment of students’ individual work in a first-year introductory macro-economics class of over 800 students. Data were collected through an end-of-course evaluation survey of students. The study found that using the feature-rich Workshop module not only addressed many of the practical challenges associated with paper-based peer assessments, but also provided a range of additional options for enhancing validity and reliability of peer assessments that would not be possible with paper-based systems.
- Full Text: false
- Date Issued: 2013
- Authors: Mostert, Markus , Snowball, Jeanette D
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68845 , vital:29330 , https://doi.org/10.1080/02602938.2012.683770
- Description: Publisher version , In the context of widening participation, large classes and increased diversity, assessment of student learning is becoming increasingly problematic in that providing formative feedback aimed at developing student writing proves to be particularly laborious. Although the potential value of peer assessment has been well documented in the literature, the associated administrative burden, also in relation to managing anonymity and intellectual ownership, makes this option less attractive, particularly in large classes. A potential solution involves the use of information and communication technologies to automate the logistics associated with peer assessment in a time-efficient way. However, uptake of such systems in the higher education community is limited, and research in this area is only beginning. This case study reports on the use of the Moodle Workshop module for formative peer assessment of students’ individual work in a first-year introductory macro-economics class of over 800 students. Data were collected through an end-of-course evaluation survey of students. The study found that using the feature-rich Workshop module not only addressed many of the practical challenges associated with paper-based peer assessments, but also provided a range of additional options for enhancing validity and reliability of peer assessments that would not be possible with paper-based systems.
- Full Text: false
- Date Issued: 2013
‘Growing’ social protection in developing countries: lessons from Brazil and South Africa
- Barrientos, Armando, Moller, Valerie, Saboia, Joao, Lloyd-Sherlock, Peter, Mase, Julia
- Authors: Barrientos, Armando , Moller, Valerie , Saboia, Joao , Lloyd-Sherlock, Peter , Mase, Julia
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67195 , vital:29058 , https://doi.org/10.1080/0376835X.2013.756098
- Description: publisher version , The rapid expansion of social protection in the South provides a rich diversity of experiences and lessons on how best to reduce poverty and ultimately eradicate it. Knowledge on how best to ‘grow’ social assistance, understood as long-term institutions responsible for reducing and preventing poverty, is at a premium. This article examines the expansion of social assistance in Brazil and South Africa, two of the middle income countries widely perceived to have advanced furthest in ‘growing’ social protection. It examines three aspects: the primacy of politics in explaining the expansion of social protection and assistance, the tensions between path-dependence and innovation in terms of institutions and practices, and the poverty and inequality outcomes of social assistance expansion. The article concludes by drawing the main lessons for other developing countries.
- Full Text: false
- Date Issued: 2013
- Authors: Barrientos, Armando , Moller, Valerie , Saboia, Joao , Lloyd-Sherlock, Peter , Mase, Julia
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67195 , vital:29058 , https://doi.org/10.1080/0376835X.2013.756098
- Description: publisher version , The rapid expansion of social protection in the South provides a rich diversity of experiences and lessons on how best to reduce poverty and ultimately eradicate it. Knowledge on how best to ‘grow’ social assistance, understood as long-term institutions responsible for reducing and preventing poverty, is at a premium. This article examines the expansion of social assistance in Brazil and South Africa, two of the middle income countries widely perceived to have advanced furthest in ‘growing’ social protection. It examines three aspects: the primacy of politics in explaining the expansion of social protection and assistance, the tensions between path-dependence and innovation in terms of institutions and practices, and the poverty and inequality outcomes of social assistance expansion. The article concludes by drawing the main lessons for other developing countries.
- Full Text: false
- Date Issued: 2013
A computer network attack taxonomy and ontology
- Van Heerden, Renier P, Irwin, Barry V W, Burke, Ivan D, Leenen, Louise
- Authors: Van Heerden, Renier P , Irwin, Barry V W , Burke, Ivan D , Leenen, Louise
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430064 , vital:72663 , DOI: 10.4018/ijcwt.2012070102
- Description: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification ex-ists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this pa-per. The objective of this ontology is to automate the classifica-tion of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defend-er's point of view. The authors' taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the "Attack Scenario", which can be used to characterize and classify computer network attacks.
- Full Text:
- Date Issued: 2012
- Authors: Van Heerden, Renier P , Irwin, Barry V W , Burke, Ivan D , Leenen, Louise
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430064 , vital:72663 , DOI: 10.4018/ijcwt.2012070102
- Description: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification ex-ists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this pa-per. The objective of this ontology is to automate the classifica-tion of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defend-er's point of view. The authors' taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the "Attack Scenario", which can be used to characterize and classify computer network attacks.
- Full Text:
- Date Issued: 2012
Classifying network attack scenarios using an ontology
- Van Heerden, Renier, Irwin, Barry V W, Burke, I D
- Authors: Van Heerden, Renier , Irwin, Barry V W , Burke, I D
- Date: 2012
- Language: English
- Type: Conference paper
- Identifier: vital:6606 , http://hdl.handle.net/10962/d1009326
- Description: This paper presents a methodology using network attack ontology to classify computer-based attacks. Computer network attacks differ in motivation, execution and end result. Because attacks are diverse, no standard classification exists. If an attack could be classified, it could be mitigated accordingly. A taxonomy of computer network attacks forms the basis of the ontology. Most published taxonomies present an attack from either the attacker's or defender's point of view. This taxonomy presents both views. The main taxonomy classes are: Actor, Actor Location, Aggressor, Attack Goal, Attack Mechanism, Attack Scenario, Automation Level, Effects, Motivation, Phase, Scope and Target. The "Actor" class is the entity executing the attack. The "Actor Location" class is the Actor‟s country of origin. The "Aggressor" class is the group instigating an attack. The "Attack Goal" class specifies the attacker‟s goal. The "Attack Mechanism" class defines the attack methodology. The "Automation Level" class indicates the level of human interaction. The "Effects" class describes the consequences of an attack. The "Motivation" class specifies incentives for an attack. The "Scope" class describes the size and utility of the target. The "Target" class is the physical device or entity targeted by an attack. The "Vulnerability" class describes a target vulnerability used by the attacker. The "Phase" class represents an attack model that subdivides an attack into different phases. The ontology was developed using an "Attack Scenario" class, which draws from other classes and can be used to characterize and classify computer network attacks. An "Attack Scenario" consists of phases, has a scope and is attributed to an actor and aggressor which have a goal. The "Attack Scenario" thus represents different classes of attacks. High profile computer network attacks such as Stuxnet and the Estonia attacks can now be been classified through the “Attack Scenario” class.
- Full Text:
- Date Issued: 2012
- Authors: Van Heerden, Renier , Irwin, Barry V W , Burke, I D
- Date: 2012
- Language: English
- Type: Conference paper
- Identifier: vital:6606 , http://hdl.handle.net/10962/d1009326
- Description: This paper presents a methodology using network attack ontology to classify computer-based attacks. Computer network attacks differ in motivation, execution and end result. Because attacks are diverse, no standard classification exists. If an attack could be classified, it could be mitigated accordingly. A taxonomy of computer network attacks forms the basis of the ontology. Most published taxonomies present an attack from either the attacker's or defender's point of view. This taxonomy presents both views. The main taxonomy classes are: Actor, Actor Location, Aggressor, Attack Goal, Attack Mechanism, Attack Scenario, Automation Level, Effects, Motivation, Phase, Scope and Target. The "Actor" class is the entity executing the attack. The "Actor Location" class is the Actor‟s country of origin. The "Aggressor" class is the group instigating an attack. The "Attack Goal" class specifies the attacker‟s goal. The "Attack Mechanism" class defines the attack methodology. The "Automation Level" class indicates the level of human interaction. The "Effects" class describes the consequences of an attack. The "Motivation" class specifies incentives for an attack. The "Scope" class describes the size and utility of the target. The "Target" class is the physical device or entity targeted by an attack. The "Vulnerability" class describes a target vulnerability used by the attacker. The "Phase" class represents an attack model that subdivides an attack into different phases. The ontology was developed using an "Attack Scenario" class, which draws from other classes and can be used to characterize and classify computer network attacks. An "Attack Scenario" consists of phases, has a scope and is attributed to an actor and aggressor which have a goal. The "Attack Scenario" thus represents different classes of attacks. High profile computer network attacks such as Stuxnet and the Estonia attacks can now be been classified through the “Attack Scenario” class.
- Full Text:
- Date Issued: 2012
Cryptic variation in an ecological indicator organism: mitochondrial and nuclear DNA sequence data confirm distinct lineages of Baetis harrisoni Barnard (Ephemeroptera: Baetidae) in Southern Africa
- Pereira-da-Conceicoa, Lyndall L, Price, Benjamin W, Barber-James, Helen M, Barker, Nigel P, De Moor, Ferdy C, Villet, Martin H
- Authors: Pereira-da-Conceicoa, Lyndall L , Price, Benjamin W , Barber-James, Helen M , Barker, Nigel P , De Moor, Ferdy C , Villet, Martin H
- Date: 2012
- Language: English
- Type: Article
- Identifier: vital:6535 , http://hdl.handle.net/10962/d1005976 , https://dx.doi.org/10.1186/1471-2148-12-26
- Description: Baetis harrisoni Barnard is a mayfly frequently encountered in river studies across Africa, but the external morphological features used for identifying nymphs have been observed to vary subtly between different geographic locations. It has been associated with a wide range of ecological conditions, including pH extremes of pH 2.9–10.0 in polluted waters. We present a molecular study of the genetic variation within B. harrisoni across 21 rivers in its distribution range in southern Africa.
- Full Text:
- Date Issued: 2012
- Authors: Pereira-da-Conceicoa, Lyndall L , Price, Benjamin W , Barber-James, Helen M , Barker, Nigel P , De Moor, Ferdy C , Villet, Martin H
- Date: 2012
- Language: English
- Type: Article
- Identifier: vital:6535 , http://hdl.handle.net/10962/d1005976 , https://dx.doi.org/10.1186/1471-2148-12-26
- Description: Baetis harrisoni Barnard is a mayfly frequently encountered in river studies across Africa, but the external morphological features used for identifying nymphs have been observed to vary subtly between different geographic locations. It has been associated with a wide range of ecological conditions, including pH extremes of pH 2.9–10.0 in polluted waters. We present a molecular study of the genetic variation within B. harrisoni across 21 rivers in its distribution range in southern Africa.
- Full Text:
- Date Issued: 2012
Cryptic variation in an ecological indicator organism: mitochondrial and nuclear DNA sequence data confirm distinct lineages of Baetis harrisoni Barnard (Ephemeroptera: Baetidae) in southern Africa
- Pereira-da-Conceicoa, L L, Price, Benjamin W, Barber-James, Helen M
- Authors: Pereira-da-Conceicoa, L L , Price, Benjamin W , Barber-James, Helen M
- Date: 2012
- Language: English
- Type: text , Article
- Identifier: vital:7151 , http://hdl.handle.net/10962/d1011855
- Description: Baetis harrisoni Barnard is a mayfly frequently encountered in river studies across Africa, but the external morphological features used for identifying nymphs have been observed to vary subtly between different geographic locations. It has been associated with a wide range of ecological conditions, including pH extremes of pH 2.9–10.0 in polluted waters. We present a molecular study of the genetic variation within B. harrisoni across 21 rivers in its distribution range in southern Africa.
- Full Text:
- Date Issued: 2012
- Authors: Pereira-da-Conceicoa, L L , Price, Benjamin W , Barber-James, Helen M
- Date: 2012
- Language: English
- Type: text , Article
- Identifier: vital:7151 , http://hdl.handle.net/10962/d1011855
- Description: Baetis harrisoni Barnard is a mayfly frequently encountered in river studies across Africa, but the external morphological features used for identifying nymphs have been observed to vary subtly between different geographic locations. It has been associated with a wide range of ecological conditions, including pH extremes of pH 2.9–10.0 in polluted waters. We present a molecular study of the genetic variation within B. harrisoni across 21 rivers in its distribution range in southern Africa.
- Full Text:
- Date Issued: 2012
Developing images of self: childhood, youth and family photographs in works by three South African women artists
- Authors: Schmahmann, Brenda
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147571 , vital:38650 , https://doi.org/10.1162/AFAR_a_00024
- Description: In 1996, South African artist Bridget Baker (b. 1971), completed So It Goes (Fig. 1), a work comprising four Vicks Vapour Rub containers which each feature the same photograph. A representation of the artist being taught to swim by her father, who died when she was a child, this is the only shot she possesses that shows them together. The photograph is overlaid with progressively increased amounts of the Vapour Rub until, in the last of the four tins, the image is almost entirely obliterated.
- Full Text:
- Date Issued: 2012
- Authors: Schmahmann, Brenda
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147571 , vital:38650 , https://doi.org/10.1162/AFAR_a_00024
- Description: In 1996, South African artist Bridget Baker (b. 1971), completed So It Goes (Fig. 1), a work comprising four Vicks Vapour Rub containers which each feature the same photograph. A representation of the artist being taught to swim by her father, who died when she was a child, this is the only shot she possesses that shows them together. The photograph is overlaid with progressively increased amounts of the Vapour Rub until, in the last of the four tins, the image is almost entirely obliterated.
- Full Text:
- Date Issued: 2012
Five unpublished coins of Alexander the Great and his successors in the Rhodes University Collection
- Snowball, Jeanette D, Snowball, Warren D
- Authors: Snowball, Jeanette D , Snowball, Warren D
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68489 , vital:29267 , http://dx.doi.org/10.7445/50-0-73
- Description: Publisher version , The article briefly discusses the economic and political significance of the Alexander III (“the Great”) type silver tetradrachm and publishes three of his coins currently held by the Rhodes University Classics Museum. Based on stylistic elements, they are classified as from the Amphipolis and Arados mints and were probably minted during his lifetime. Two further tetradrachms from the empires of Alexander’s successors, Ptolemy II and Seleucus IV, are also published.
- Full Text:
- Date Issued: 2012
Five unpublished coins of Alexander the Great and his successors in the Rhodes University Collection
- Authors: Snowball, Jeanette D , Snowball, Warren D
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68489 , vital:29267 , http://dx.doi.org/10.7445/50-0-73
- Description: Publisher version , The article briefly discusses the economic and political significance of the Alexander III (“the Great”) type silver tetradrachm and publishes three of his coins currently held by the Rhodes University Classics Museum. Based on stylistic elements, they are classified as from the Amphipolis and Arados mints and were probably minted during his lifetime. Two further tetradrachms from the empires of Alexander’s successors, Ptolemy II and Seleucus IV, are also published.
- Full Text:
- Date Issued: 2012
Functional programming and security
- Authors: Motara, Yusuf, M
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428985 , vital:72551 , https://doi.org/10.48550/arXiv.1201.5728
- Description: This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.
- Full Text:
- Date Issued: 2012
- Authors: Motara, Yusuf, M
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428985 , vital:72551 , https://doi.org/10.48550/arXiv.1201.5728
- Description: This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.
- Full Text:
- Date Issued: 2012
Marx, Weber and NGOs:
- Authors: Helliker, Kirk D
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144738 , vital:38375 , DOI: 10.1080/21528586.2007.10419171
- Description: This article offers a sociological understanding of intermediary NGOs in the modern world. In does so by drawing on certain epistemological insights of Marx and Weber, and this entails methodologies of both deconstruction and reconstruction. In arguing against a sociological behaviourism that pervades the NGO literature, the article conceptualises intermediary NGOs as a ‘social form’ embodying contradictory relations. For analytical purposes, the contradiction between ‘the global’ and ‘the local’ is brought to the fore.
- Full Text:
- Date Issued: 2012
- Authors: Helliker, Kirk D
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144738 , vital:38375 , DOI: 10.1080/21528586.2007.10419171
- Description: This article offers a sociological understanding of intermediary NGOs in the modern world. In does so by drawing on certain epistemological insights of Marx and Weber, and this entails methodologies of both deconstruction and reconstruction. In arguing against a sociological behaviourism that pervades the NGO literature, the article conceptualises intermediary NGOs as a ‘social form’ embodying contradictory relations. For analytical purposes, the contradiction between ‘the global’ and ‘the local’ is brought to the fore.
- Full Text:
- Date Issued: 2012
Parameter relationships in high-speed audio networks
- Chigwamba, Nyasha, Foss, Richard, Gurdan, Robby, Klinkradt, Bradley
- Authors: Chigwamba, Nyasha , Foss, Richard , Gurdan, Robby , Klinkradt, Bradley
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427027 , vital:72409 , https://www.aes.org/e-lib/browse.cfm?elib=16211
- Description: When related audio control parameters are distributed in many devices in a high-speed audio network, a means for centralizing remote control and monitoring is required. Changes in one parameter may need to affect other parameters. The XFN protocol enables management of distributed parameters. This paper focuses on how to group related parameters that are physically separated and provides a corresponding implementation using the protocol. A comprehensive grouping theory is presented.
- Full Text:
- Date Issued: 2012
- Authors: Chigwamba, Nyasha , Foss, Richard , Gurdan, Robby , Klinkradt, Bradley
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427027 , vital:72409 , https://www.aes.org/e-lib/browse.cfm?elib=16211
- Description: When related audio control parameters are distributed in many devices in a high-speed audio network, a means for centralizing remote control and monitoring is required. Changes in one parameter may need to affect other parameters. The XFN protocol enables management of distributed parameters. This paper focuses on how to group related parameters that are physically separated and provides a corresponding implementation using the protocol. A comprehensive grouping theory is presented.
- Full Text:
- Date Issued: 2012
Radical thinking in South Africa’s age of retreat
- Helliker, Kirk D, Vale, Peter C J
- Authors: Helliker, Kirk D , Vale, Peter C J
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71214 , vital:29818 , https://doi.org/10.1177/0021909612442654
- Description: This article traces the rise and fall of radical praxis in South Africa and offers a critique of the prevailing practices of former Marxists under post-apartheid conditions. Western Marxism emerged in the 1970s in South Africa and Marxist activists became deeply involved in the liberation movements. With the unravelling of apartheid, the main liberation forces made a social pact with capitalist forces and former Marxists embraced a statist project. In the context of the rise of ‘new’ social movements, radical thinking of a more Libertarian kind is emerging in contemporary South Africa.
- Full Text: false
- Date Issued: 2012
- Authors: Helliker, Kirk D , Vale, Peter C J
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71214 , vital:29818 , https://doi.org/10.1177/0021909612442654
- Description: This article traces the rise and fall of radical praxis in South Africa and offers a critique of the prevailing practices of former Marxists under post-apartheid conditions. Western Marxism emerged in the 1970s in South Africa and Marxist activists became deeply involved in the liberation movements. With the unravelling of apartheid, the main liberation forces made a social pact with capitalist forces and former Marxists embraced a statist project. In the context of the rise of ‘new’ social movements, radical thinking of a more Libertarian kind is emerging in contemporary South Africa.
- Full Text: false
- Date Issued: 2012
Research Testbed Networks: Practical Tools for Service Delivery?
- Wertlen, Ronald R, Siebörger, Ingrid, Tsietsi, Mosiuoa, Shibeshi, Zelalem S, Terzoli, Alfredo
- Authors: Wertlen, Ronald R , Siebörger, Ingrid , Tsietsi, Mosiuoa , Shibeshi, Zelalem S , Terzoli, Alfredo
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429204 , vital:72567 , https://doi.org/10.1002/j.1681-4835.2012.tb00351.x
- Description: The Telkom Centre of Excellence (CoE) at Rhodes University, housed in the Computer Science department was opened in 1997. The CoE's focus on Distributed multimedia service platforms soon showed that the technology being researched could be applied in the disadvantaged peri‐urban communities. The CoE has thus concentrated its research on building a testbed network that delivers real services to real users. In 2007, the testbed was extended to include a marginalised rural area in the Siyakhula Living Lab. The greatest factor in the sustainability of the CoE testbed network has been maintaining usefulness to all the stakeholders over the last 12 years. Industrial funding, University outreach goals and research goals could all be harmonised, while sustaining the delivery of high quality informatics services in the community. This paper presents a brief case study of the communications network testbed and how it was applied to the Development Informatics space. It analyses the roles played by stakeholders in either assisting and sustaining or obstructing the service delivery. It makes key recommendations on best practices for research networks that can also bring informatics to disadvantaged communities. It shows how testbeds for the research of new technologies can be designed so as to allow Development Informatics work to take place on such networks.
- Full Text:
- Date Issued: 2012
- Authors: Wertlen, Ronald R , Siebörger, Ingrid , Tsietsi, Mosiuoa , Shibeshi, Zelalem S , Terzoli, Alfredo
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429204 , vital:72567 , https://doi.org/10.1002/j.1681-4835.2012.tb00351.x
- Description: The Telkom Centre of Excellence (CoE) at Rhodes University, housed in the Computer Science department was opened in 1997. The CoE's focus on Distributed multimedia service platforms soon showed that the technology being researched could be applied in the disadvantaged peri‐urban communities. The CoE has thus concentrated its research on building a testbed network that delivers real services to real users. In 2007, the testbed was extended to include a marginalised rural area in the Siyakhula Living Lab. The greatest factor in the sustainability of the CoE testbed network has been maintaining usefulness to all the stakeholders over the last 12 years. Industrial funding, University outreach goals and research goals could all be harmonised, while sustaining the delivery of high quality informatics services in the community. This paper presents a brief case study of the communications network testbed and how it was applied to the Development Informatics space. It analyses the roles played by stakeholders in either assisting and sustaining or obstructing the service delivery. It makes key recommendations on best practices for research networks that can also bring informatics to disadvantaged communities. It shows how testbeds for the research of new technologies can be designed so as to allow Development Informatics work to take place on such networks.
- Full Text:
- Date Issued: 2012
Teacher education in post-apartheid South Africa: navigating a way through competing state and global imperatives for change
- Schäfer, Marc, Wilmot, P Dianne
- Authors: Schäfer, Marc , Wilmot, P Dianne
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140905 , vital:37928 , DOI: 10.1007/s11125-012-9220-3
- Description: This article focuses on teacher education in post-apartheid South Africa. It argues that the restructuring and reorganization of teacher education is at the nexus of the axes of tension created by national and global imperatives for change. Along with the dismantling of apartheid and the transition to a free and democratic state in 1994 came the urgent need for social reconstruction, democratization, redress, social justice, and equity. At the same time, and as part of a global context, the country needed global competitiveness, human capital development, global skills, international standards, and accountability. These competing modernist discourses have informed the design and orientation of the National Qualifications Framework and national curriculum that took place in parallel with, and simultaneous to, the restructuring and reform of teacher education. This article reviews literature pertinent to understanding the post-apartheid transformation in South African education in general and teacher education in particular. It concludes that policy makers have managed to navigate a way through the axis of tension created by opposed orientations to transformation. A more equitable and improved system of teacher education has been achieved but critical issues of teacher quality and quantity have emerged which urgently need resolution.
- Full Text:
- Date Issued: 2012
- Authors: Schäfer, Marc , Wilmot, P Dianne
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140905 , vital:37928 , DOI: 10.1007/s11125-012-9220-3
- Description: This article focuses on teacher education in post-apartheid South Africa. It argues that the restructuring and reorganization of teacher education is at the nexus of the axes of tension created by national and global imperatives for change. Along with the dismantling of apartheid and the transition to a free and democratic state in 1994 came the urgent need for social reconstruction, democratization, redress, social justice, and equity. At the same time, and as part of a global context, the country needed global competitiveness, human capital development, global skills, international standards, and accountability. These competing modernist discourses have informed the design and orientation of the National Qualifications Framework and national curriculum that took place in parallel with, and simultaneous to, the restructuring and reform of teacher education. This article reviews literature pertinent to understanding the post-apartheid transformation in South African education in general and teacher education in particular. It concludes that policy makers have managed to navigate a way through the axis of tension created by opposed orientations to transformation. A more equitable and improved system of teacher education has been achieved but critical issues of teacher quality and quantity have emerged which urgently need resolution.
- Full Text:
- Date Issued: 2012
Toxic effect of herbicides used for water hyacinth control on two insects released for its biological control in South Africa
- Authors: Hill, Martin P
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/69960 , vital:29601 , https://doi.org/10.1080/09583157.2012.725825
- Description: The integrated control of water hyacinth, Eichhornia crassipes (Martius) Solms-Laubach (Pontederiaceae) has become necessary in South Africa, as biological control alone is perceived to be too slow in controlling the weed. In total, seven insect biological control agents have been released on water hyacinth in South Africa. At the same time, herbicides are applied by the water authorities in areas where the weed continues to be troublesome. This study investigated the assumption that the two control methods are compatible by testing the direct toxicity of a range of herbicide formulations and surfactants on two of the biological control agents released against water hyacinth, the weevil, Neochetina eichhorniae Warner (Coleoptera: Curculionidae) and the water hyacinth mirid,Eccritotarsus catarinensis (Carvalho) (Hemiptera: Miridae). A number of the formulations used resulted in significant mortality of the mirid and the weevil. Products containing 2,4-D amine and diquat as active ingredients caused higher mortality of both agents (up to 80% for the mirid) than formulations containing glyphosate. Furthermore, when surfactants were added to enhance herbicide efficiency, it resulted in increased toxicity to the insects. We recommend that glyphosate formulations should be used in integrated control programmes, and that surfactants be avoided in order to reduce the toxic nature of spray formulations to the insect biological control agents released against water hyacinth.
- Full Text:
- Date Issued: 2012
- Authors: Hill, Martin P
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/69960 , vital:29601 , https://doi.org/10.1080/09583157.2012.725825
- Description: The integrated control of water hyacinth, Eichhornia crassipes (Martius) Solms-Laubach (Pontederiaceae) has become necessary in South Africa, as biological control alone is perceived to be too slow in controlling the weed. In total, seven insect biological control agents have been released on water hyacinth in South Africa. At the same time, herbicides are applied by the water authorities in areas where the weed continues to be troublesome. This study investigated the assumption that the two control methods are compatible by testing the direct toxicity of a range of herbicide formulations and surfactants on two of the biological control agents released against water hyacinth, the weevil, Neochetina eichhorniae Warner (Coleoptera: Curculionidae) and the water hyacinth mirid,Eccritotarsus catarinensis (Carvalho) (Hemiptera: Miridae). A number of the formulations used resulted in significant mortality of the mirid and the weevil. Products containing 2,4-D amine and diquat as active ingredients caused higher mortality of both agents (up to 80% for the mirid) than formulations containing glyphosate. Furthermore, when surfactants were added to enhance herbicide efficiency, it resulted in increased toxicity to the insects. We recommend that glyphosate formulations should be used in integrated control programmes, and that surfactants be avoided in order to reduce the toxic nature of spray formulations to the insect biological control agents released against water hyacinth.
- Full Text:
- Date Issued: 2012
Introduction to Business Management: BEC 121 & 121E
- Puchert, Juliet, Masocha, Reginald, Rungani, Ellen
- Authors: Puchert, Juliet , Masocha, Reginald , Rungani, Ellen
- Date: 2012-01
- Subjects: Management
- Language: English
- Type: Examination paper
- Identifier: vital:17442 , http://hdl.handle.net/10353/d1010253
- Description: Introduction to Business Management: BEC 121 & 121E, Supplementary examination January 2012.
- Full Text: false
- Date Issued: 2012-01
- Authors: Puchert, Juliet , Masocha, Reginald , Rungani, Ellen
- Date: 2012-01
- Subjects: Management
- Language: English
- Type: Examination paper
- Identifier: vital:17442 , http://hdl.handle.net/10353/d1010253
- Description: Introduction to Business Management: BEC 121 & 121E, Supplementary examination January 2012.
- Full Text: false
- Date Issued: 2012-01
English Method: MEN 411
- Botha, E K, Moodley, Visvaganthie
- Authors: Botha, E K , Moodley, Visvaganthie
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:18312 , http://hdl.handle.net/10353/d1011422
- Description: English Method: MEN 411, final examination June 2011.
- Full Text: false
- Date Issued: 2011-06
- Authors: Botha, E K , Moodley, Visvaganthie
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:18312 , http://hdl.handle.net/10353/d1011422
- Description: English Method: MEN 411, final examination June 2011.
- Full Text: false
- Date Issued: 2011-06
Hierarchical spatial organization and prioritization of wetlands: a conceptual model for wetland rehabilitation in South Africa
- Sieben, E J J, Ellery, William F N, Kotze, Donovan C, Rountree, M
- Authors: Sieben, E J J , Ellery, William F N , Kotze, Donovan C , Rountree, M
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144399 , vital:38342 , DOI: 10.1007/s11273-011-9212-8
- Description: Wetland rehabilitation planning needs to take into account many different aspects of the wetland and its context. In South Africa, much emphasis is placed on the delivery of ecosystem services, poverty relief and skills development for those involved in labour-intensive rehabilitation measures. A framework is presented that facilitates decision-making with regards to wetland rehabilitation planning. This starts with prioritizing which wetlands need attention within a catchment. This is followed by decisions regarding which rehabilitation measures would be effective in improving certain ecosystem services based upon the aims of rehabilitation and the social context of the surrounding catchment.
- Full Text:
- Date Issued: 2011
- Authors: Sieben, E J J , Ellery, William F N , Kotze, Donovan C , Rountree, M
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144399 , vital:38342 , DOI: 10.1007/s11273-011-9212-8
- Description: Wetland rehabilitation planning needs to take into account many different aspects of the wetland and its context. In South Africa, much emphasis is placed on the delivery of ecosystem services, poverty relief and skills development for those involved in labour-intensive rehabilitation measures. A framework is presented that facilitates decision-making with regards to wetland rehabilitation planning. This starts with prioritizing which wetlands need attention within a catchment. This is followed by decisions regarding which rehabilitation measures would be effective in improving certain ecosystem services based upon the aims of rehabilitation and the social context of the surrounding catchment.
- Full Text:
- Date Issued: 2011