A Bernsteinian analysis of the integration of natural resource management in the curriculum of a rural disadvantaged school
- Authors: Nsubuga, Yvonne
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/386415 , vital:68139 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122771"
- Description: Knowledge integration is one of the key principles that underpin curriculum reform in post-apartheid South Africa. One form of teacher support that has been adopted in South Africa is to provide schools throughout the country with samples of pedagogic texts such as curriculum documents and examination exemplars to act as guidelines to teachers as they implement this new curriculum requirement. In the isolated and under-resourced rural schools of South Africa, these texts are the main form of curriculum guidance to teachers. Hence the knowledge integration principles and messages conveyed within these texts are of crucial importance. One contributory factor to the lack of information on knowledge integration at rural underresourced schools is the lack of simple and effective research tools by which to analyse and compare the extent of knowledge integration within pedagogic texts and classroom practices. This article reports on a Bernstein informed analysis that was carried out on three different Grade 10 Life Sciences pedagogic texts in order to assess the extent to which they integrate natural resource management (NRM). The study involved the construction of two indicator frameworks as the research tools with which the analysis was conducted. Results from the analysis showed that although the official Grade 10 Life Sciences pedagogic texts contained very high levels of NRM integration, this was not the case for the Grade 10 Life Sciences text that was produced at the school level. The study provides useful insight into curriculum recontextualisation at a rural under-resourced school through the lens of NRM integration within the Grade 10 Life Sciences pedagogic texts. Such insight has the potential to contribute to better curriculum design and implementation strategies to service schools. This will hopefully help to narrow the gap that currently exists between the official and enacted curricula.
- Full Text:
- Date Issued: 2008
- Authors: Nsubuga, Yvonne
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/386415 , vital:68139 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122771"
- Description: Knowledge integration is one of the key principles that underpin curriculum reform in post-apartheid South Africa. One form of teacher support that has been adopted in South Africa is to provide schools throughout the country with samples of pedagogic texts such as curriculum documents and examination exemplars to act as guidelines to teachers as they implement this new curriculum requirement. In the isolated and under-resourced rural schools of South Africa, these texts are the main form of curriculum guidance to teachers. Hence the knowledge integration principles and messages conveyed within these texts are of crucial importance. One contributory factor to the lack of information on knowledge integration at rural underresourced schools is the lack of simple and effective research tools by which to analyse and compare the extent of knowledge integration within pedagogic texts and classroom practices. This article reports on a Bernstein informed analysis that was carried out on three different Grade 10 Life Sciences pedagogic texts in order to assess the extent to which they integrate natural resource management (NRM). The study involved the construction of two indicator frameworks as the research tools with which the analysis was conducted. Results from the analysis showed that although the official Grade 10 Life Sciences pedagogic texts contained very high levels of NRM integration, this was not the case for the Grade 10 Life Sciences text that was produced at the school level. The study provides useful insight into curriculum recontextualisation at a rural under-resourced school through the lens of NRM integration within the Grade 10 Life Sciences pedagogic texts. Such insight has the potential to contribute to better curriculum design and implementation strategies to service schools. This will hopefully help to narrow the gap that currently exists between the official and enacted curricula.
- Full Text:
- Date Issued: 2008
A Canonical Implementation Of The Advanced Encryption Standard On The Graphics Processing Unit
- Pilkington, Nick, Irwin, Barry V W
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430007 , vital:72659 , https://digifors.cs.up.ac.za/issa/2008/Proceedings/Research/47.pdf
- Description: This paper will present an implementation of the Advanced Encryption Standard (AES) on the graphics processing unit (GPU). It investigates the ease of implementation from first principles and the difficulties encountered. It also presents a performance analysis to evaluate if the GPU is a viable option for a cryptographics platform. The AES implementation is found to yield orders of maginitude increased performance when compared to CPU based implementations. Although the implementation introduces complica-tions, these are quickly becoming mitigated by the growing accessibility pro-vided by general programming on graphics processing units (GPGPU) frameworks like NVIDIA’s Compute Uniform Device Architechture (CUDA) and AMD/ATI’s Close to Metal (CTM).
- Full Text:
- Date Issued: 2008
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430007 , vital:72659 , https://digifors.cs.up.ac.za/issa/2008/Proceedings/Research/47.pdf
- Description: This paper will present an implementation of the Advanced Encryption Standard (AES) on the graphics processing unit (GPU). It investigates the ease of implementation from first principles and the difficulties encountered. It also presents a performance analysis to evaluate if the GPU is a viable option for a cryptographics platform. The AES implementation is found to yield orders of maginitude increased performance when compared to CPU based implementations. Although the implementation introduces complica-tions, these are quickly becoming mitigated by the growing accessibility pro-vided by general programming on graphics processing units (GPGPU) frameworks like NVIDIA’s Compute Uniform Device Architechture (CUDA) and AMD/ATI’s Close to Metal (CTM).
- Full Text:
- Date Issued: 2008
A comparison of ethical models for conflict resolution in the African context
- Authors: Mbangu, Muyingi
- Date: 2008
- Subjects: Africa -- Politics and government , Conflict management
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10353/25052 , vital:63948
- Description: Remarkably little research has been done about the potential of ethical models for violent conflict resolution in the African context. I will argue here that ethical models such as Utilitarianism, Deontologism, Virtue ethics, and African ethics can exert influence to help resolve conflict situations peacefully for the sake of African civilians generally and the DRC civilians in particular. This influence firstly becomes visible in the fact that ethical models can guide conflict resolution attempts to bring about conditions of peace, justice and freedom among African civilians in whichever nations state they find themselves. Secondly, ethical models can be established in the resolution of conflict for a lasting peace in the African context, and lastly, ethical models can be proposed as a guideline for all African leaders to lead their countries in peace. The conclusion I draw is that a normative framework of ethical models can be applied in conflict resolution in the African context. This framework draws on all four models, but leans toward deontology because of its strictness or rigour of universal rules or principles in any situation. , Thesis (MA) -- Faculty of Social Sciences and Humanities, 2008
- Full Text:
- Date Issued: 2008
- Authors: Mbangu, Muyingi
- Date: 2008
- Subjects: Africa -- Politics and government , Conflict management
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10353/25052 , vital:63948
- Description: Remarkably little research has been done about the potential of ethical models for violent conflict resolution in the African context. I will argue here that ethical models such as Utilitarianism, Deontologism, Virtue ethics, and African ethics can exert influence to help resolve conflict situations peacefully for the sake of African civilians generally and the DRC civilians in particular. This influence firstly becomes visible in the fact that ethical models can guide conflict resolution attempts to bring about conditions of peace, justice and freedom among African civilians in whichever nations state they find themselves. Secondly, ethical models can be established in the resolution of conflict for a lasting peace in the African context, and lastly, ethical models can be proposed as a guideline for all African leaders to lead their countries in peace. The conclusion I draw is that a normative framework of ethical models can be applied in conflict resolution in the African context. This framework draws on all four models, but leans toward deontology because of its strictness or rigour of universal rules or principles in any situation. , Thesis (MA) -- Faculty of Social Sciences and Humanities, 2008
- Full Text:
- Date Issued: 2008
A global study of forensically significant calliphorids: implications for identification
- Harvey, M L, Gaudieri, S, Villet, Martin H, Dadour, I R
- Authors: Harvey, M L , Gaudieri, S , Villet, Martin H , Dadour, I R
- Date: 2008
- Language: English
- Type: text , Article
- Identifier: vital:6863 , http://hdl.handle.net/10962/d1011156
- Description: A proliferation of molecular studies of the forensically significant Calliphoridae in the last decade has seen molecule-based identification of immature and damaged specimens become a routine complement to traditional morphological identification as a preliminary to the accurate estimation of post-mortem intervals (PMI), which depends on the use of species-specific developmental data. Published molecular studies have tended to focus on generating data for geographically localised communities of species of importance, which has limited the consideration of intraspecific variation in species of global distribution. This study used phylogenetic analysis to assess the species status of 27 forensically important calliphorid species based on 1167 base pairs of the COI gene of 119 specimens from 22 countries, and confirmed the utility of the COI gene in identifying most species. The species Lucilia cuprina, Chrysomya megacephala, Ch. saffranea, Ch. albifrontalis and Calliphora stygia were unable to be monophyletically resolved based on these data. Identification of phylogenetically young species will require a faster-evolving molecular marker, but most species could be unambiguously characterised by sampling relatively few conspecific individuals if they were from distant localities. Intraspecific geographical variation was observed within Ch. rufifacies and L. cuprina, and is discussed with reference to unrecognised species.
- Full Text:
- Date Issued: 2008
- Authors: Harvey, M L , Gaudieri, S , Villet, Martin H , Dadour, I R
- Date: 2008
- Language: English
- Type: text , Article
- Identifier: vital:6863 , http://hdl.handle.net/10962/d1011156
- Description: A proliferation of molecular studies of the forensically significant Calliphoridae in the last decade has seen molecule-based identification of immature and damaged specimens become a routine complement to traditional morphological identification as a preliminary to the accurate estimation of post-mortem intervals (PMI), which depends on the use of species-specific developmental data. Published molecular studies have tended to focus on generating data for geographically localised communities of species of importance, which has limited the consideration of intraspecific variation in species of global distribution. This study used phylogenetic analysis to assess the species status of 27 forensically important calliphorid species based on 1167 base pairs of the COI gene of 119 specimens from 22 countries, and confirmed the utility of the COI gene in identifying most species. The species Lucilia cuprina, Chrysomya megacephala, Ch. saffranea, Ch. albifrontalis and Calliphora stygia were unable to be monophyletically resolved based on these data. Identification of phylogenetically young species will require a faster-evolving molecular marker, but most species could be unambiguously characterised by sampling relatively few conspecific individuals if they were from distant localities. Intraspecific geographical variation was observed within Ch. rufifacies and L. cuprina, and is discussed with reference to unrecognised species.
- Full Text:
- Date Issued: 2008
A Grid-Based Approach to the Remote Control and Recall of the Properties of IEEE1394 Audio Devices
- Foss, Richard, Foulkes, Phillip
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427212 , vital:72422 , https://www.aes.org/e-lib/browse.cfm?elib=14453
- Description: Typically, the configuration of audio hardware and software is not integrated. This paper discusses a software system that has been developed to remotely control and recall the properties of IEEE1394 (FireWire) audio devices via a series of graphical routing matrices. The software presents sound engineers with a graphical routing matrix that shows, along its axes, the available FireWire audio devices on a FireWire network. Inter device connection management may be performed by selecting the cross points on the grid, and intra device control may be performed via device editors that are displayed via the axes of the matrix. The software application may be hosted by a compatible Digital Audio Workstation (DAW) application to allow for the storing and recalling of the various properties associated with the devices.
- Full Text:
- Date Issued: 2008
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427212 , vital:72422 , https://www.aes.org/e-lib/browse.cfm?elib=14453
- Description: Typically, the configuration of audio hardware and software is not integrated. This paper discusses a software system that has been developed to remotely control and recall the properties of IEEE1394 (FireWire) audio devices via a series of graphical routing matrices. The software presents sound engineers with a graphical routing matrix that shows, along its axes, the available FireWire audio devices on a FireWire network. Inter device connection management may be performed by selecting the cross points on the grid, and intra device control may be performed via device editors that are displayed via the axes of the matrix. The software application may be hosted by a compatible Digital Audio Workstation (DAW) application to allow for the storing and recalling of the various properties associated with the devices.
- Full Text:
- Date Issued: 2008
A preliminary survey of the estuaries on the south coast of South Africa, Cape St Blaize, Mossel Bay - Robberg Peninsula, Plettenberg Bay, with particular reference to the fish fauna
- James, Nicola C, Harrison, T D
- Authors: James, Nicola C , Harrison, T D
- Date: 2008
- Language: English
- Type: text , Article
- Identifier: vital:7141 , http://hdl.handle.net/10962/d1011834
- Description: The coastal river systems on the south coast of South Africa from Cape St Blaize to Robberg Peninsula were surveyed during October and November 1994. The ichthyofaunal and physico-chemical characteristics of each system are presented and their suitability as estuarine nursery areas is discussed. Five systems (Rooi, Meul, Grooteiland, Kranshoek and Crooks) are outlets of small coastal streams and probably provide little or no habitat for either resident estuarine or migrant marine fishes owing to their small size. Four systems (Maalgate, Gwaing, Skaapkop and Kaaimans) are located within deeply incised valleys and have a permanent connection with the sea. The amount of marginal and intertidal habitat available to fishes, however, is limited due to their morphology. Six systems (Hartenbos, Groot Brak, Touw, Swartvlei, Goukamma and Noetsie) are intermittently open to the sea. Although the Touw and Swartvlei are connected to coastal lake systems, flow within these estuaries is not sufficient to prevent the build up of a sand barrier at the mouth. The Hartenbos, Groot Brak, Goukamma, and Noetsie are also periodically closed by a sand bar. The construction of a dam in the lower catchment of the Groot Brak has affected the hydrology of the system. The two remaining estuaries (Klein Brak and Knysna) are permanently open. In addition to strong tidal currents, the fixing of the mouth of the Knysna Estuary between rocky headlands also serves to maintain a permanent connection with the sea. Mugilidae and Sparidae were represented by the greatest number of species, and also dominated catches numerically and by mass. The fish fauna of all the estuaries surveyed were dominated by the juveniles of estuarine-dependent marine species and estuarine-resident species were also well represented in catches. The estuaries surveyed provide a vital habitat for both marine migrant species and resident species, most of which are endemic to the region.
- Full Text:
- Date Issued: 2008
- Authors: James, Nicola C , Harrison, T D
- Date: 2008
- Language: English
- Type: text , Article
- Identifier: vital:7141 , http://hdl.handle.net/10962/d1011834
- Description: The coastal river systems on the south coast of South Africa from Cape St Blaize to Robberg Peninsula were surveyed during October and November 1994. The ichthyofaunal and physico-chemical characteristics of each system are presented and their suitability as estuarine nursery areas is discussed. Five systems (Rooi, Meul, Grooteiland, Kranshoek and Crooks) are outlets of small coastal streams and probably provide little or no habitat for either resident estuarine or migrant marine fishes owing to their small size. Four systems (Maalgate, Gwaing, Skaapkop and Kaaimans) are located within deeply incised valleys and have a permanent connection with the sea. The amount of marginal and intertidal habitat available to fishes, however, is limited due to their morphology. Six systems (Hartenbos, Groot Brak, Touw, Swartvlei, Goukamma and Noetsie) are intermittently open to the sea. Although the Touw and Swartvlei are connected to coastal lake systems, flow within these estuaries is not sufficient to prevent the build up of a sand barrier at the mouth. The Hartenbos, Groot Brak, Goukamma, and Noetsie are also periodically closed by a sand bar. The construction of a dam in the lower catchment of the Groot Brak has affected the hydrology of the system. The two remaining estuaries (Klein Brak and Knysna) are permanently open. In addition to strong tidal currents, the fixing of the mouth of the Knysna Estuary between rocky headlands also serves to maintain a permanent connection with the sea. Mugilidae and Sparidae were represented by the greatest number of species, and also dominated catches numerically and by mass. The fish fauna of all the estuaries surveyed were dominated by the juveniles of estuarine-dependent marine species and estuarine-resident species were also well represented in catches. The estuaries surveyed provide a vital habitat for both marine migrant species and resident species, most of which are endemic to the region.
- Full Text:
- Date Issued: 2008
A survey of fruit-feeding insects and their parasitoids occurring on wild olives, Olea europaea ssp. cuspidata, in the Eastern Cape of South Africa
- Mkize, Nolwazi, Hoelmer, Kim A, Villet, Martin H
- Authors: Mkize, Nolwazi , Hoelmer, Kim A , Villet, Martin H
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/441694 , vital:73907 , https://doi.org/10.1080/09583150802450154
- Description: Fruits of wild olives, Olea europaea ssp. cuspidata (Wall. ex G. Don) Cif., were collected in the Eastern Cape, South Africa, during 2003–2005 to quantify levels of fruit-infesting pests and their parasitoids. Two species of Tephritidae, Bactrocera oleae (Rossi) and B. biguttula (Bezzi), were the most abundant insects recovered and were reared from most samples. Fruit infestation rates by the Bactrocera spp. were generally below 8% and over half of the infestations were under 1%. When parasitism occurred in samples with flies, levels ranged from 7 to 83%. Several species of opiine braconid wasps, Psyttalia concolor (Szépligeti), Psyttalia lounsburyi (Silvestri), and Utetes africanus (Szépligeti) and one braconine wasp, Bracon celer Szépligeti, were reared from fruits containing B. oleae and/or B. biguttula. Chalcidoid parasitoids and seed wasps included seven species of Eurytomidae (Eurytoma oleae, Eurytoma sp., and Sycophila sp.), Ormyridae (Ormyrus sp.), Torymidae (Megastigmus sp.), and Eupelmidae (Eupelmus afer and E. spermophilus). One species of moth, Palpita unionalis (Hübner) (Crambidae), was recovered in very low numbers and without parasitoids. The survey results indicate that fruit flies might not become economic pests of the nascent commercial olive industry in the Eastern Cape, and the small numbers present may be controlled to a considerable level by natural enemies.
- Full Text:
- Date Issued: 2008
- Authors: Mkize, Nolwazi , Hoelmer, Kim A , Villet, Martin H
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/441694 , vital:73907 , https://doi.org/10.1080/09583150802450154
- Description: Fruits of wild olives, Olea europaea ssp. cuspidata (Wall. ex G. Don) Cif., were collected in the Eastern Cape, South Africa, during 2003–2005 to quantify levels of fruit-infesting pests and their parasitoids. Two species of Tephritidae, Bactrocera oleae (Rossi) and B. biguttula (Bezzi), were the most abundant insects recovered and were reared from most samples. Fruit infestation rates by the Bactrocera spp. were generally below 8% and over half of the infestations were under 1%. When parasitism occurred in samples with flies, levels ranged from 7 to 83%. Several species of opiine braconid wasps, Psyttalia concolor (Szépligeti), Psyttalia lounsburyi (Silvestri), and Utetes africanus (Szépligeti) and one braconine wasp, Bracon celer Szépligeti, were reared from fruits containing B. oleae and/or B. biguttula. Chalcidoid parasitoids and seed wasps included seven species of Eurytomidae (Eurytoma oleae, Eurytoma sp., and Sycophila sp.), Ormyridae (Ormyrus sp.), Torymidae (Megastigmus sp.), and Eupelmidae (Eupelmus afer and E. spermophilus). One species of moth, Palpita unionalis (Hübner) (Crambidae), was recovered in very low numbers and without parasitoids. The survey results indicate that fruit flies might not become economic pests of the nascent commercial olive industry in the Eastern Cape, and the small numbers present may be controlled to a considerable level by natural enemies.
- Full Text:
- Date Issued: 2008
A symptom that defies analysis: is this simply xenophobia?.
- Authors: Kyazze, Simwogerere
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/159337 , vital:40289 , https://hdl.handle.net/10520/EJC140106
- Description: On 29 January 29 2007 I travelled on an SAA flight from Entebbe International Airport in Uganda to OR Tambo International in Johannesburg. Somehow, I had forgotten, ignored or failed to travel with my Yellow Fever Certificate and an Immigration Officer let me have it.
- Full Text:
- Date Issued: 2008
- Authors: Kyazze, Simwogerere
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/159337 , vital:40289 , https://hdl.handle.net/10520/EJC140106
- Description: On 29 January 29 2007 I travelled on an SAA flight from Entebbe International Airport in Uganda to OR Tambo International in Johannesburg. Somehow, I had forgotten, ignored or failed to travel with my Yellow Fever Certificate and an Immigration Officer let me have it.
- Full Text:
- Date Issued: 2008
A tuple space web service for distributed programming-Simplifying distributed web services applications
- Wells, George C, Mueller, Barbara, Schulé, Lo¨ıc
- Authors: Wells, George C , Mueller, Barbara , Schulé, Lo¨ıc
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430437 , vital:72691 , https://www.scitepress.org/PublishedPapers/2008/15170/15170.pdf
- Description: This paper describes a new tuple space web service for coordination and communication in distributed web applications. This web service is based on the Linda programming model. Linda is a coordination lan-guage for parallel and distributed processing, providing a communica-tion mechanism based on a logically shared memory space. The origi-nal Linda model has been extended through the provision of a pro-grammable mechanism, providing additional flexibility and improved performance. The implementation of the web service is discussed, to-gether with the details of the programmable matching mechanism. Some results from the implementation of a location-based mobile appli-cation, using the tuple space web service are presented, demonstrating the benefits of our system.
- Full Text:
- Date Issued: 2008
- Authors: Wells, George C , Mueller, Barbara , Schulé, Lo¨ıc
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430437 , vital:72691 , https://www.scitepress.org/PublishedPapers/2008/15170/15170.pdf
- Description: This paper describes a new tuple space web service for coordination and communication in distributed web applications. This web service is based on the Linda programming model. Linda is a coordination lan-guage for parallel and distributed processing, providing a communica-tion mechanism based on a logically shared memory space. The origi-nal Linda model has been extended through the provision of a pro-grammable mechanism, providing additional flexibility and improved performance. The implementation of the web service is discussed, to-gether with the details of the programmable matching mechanism. Some results from the implementation of a location-based mobile appli-cation, using the tuple space web service are presented, demonstrating the benefits of our system.
- Full Text:
- Date Issued: 2008
Adoption of ICTs in a marginalised area of South Africa
- Mapi, Thandeka, Dalvit, Lorenzo, Terzoli, Alfredo
- Authors: Mapi, Thandeka , Dalvit, Lorenzo , Terzoli, Alfredo
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431130 , vital:72747 , https://d1wqtxts1xzle7.cloudfront.net/4390301/5-thandeka-libre.pdf?1390837024=response-content-disposi-tion=inline%3B+filename%3DAdoption_of_ICTs_in_a_Marginalised_Area.pdfExpires=1714988863Signature=N683m3iYa8BDSsrNBb-fZpYmsy~pftZZQbiEdNz8ZFJaL2I-Wt32FIJcLEKFnrSjj0AfnYak4RVZjuZhuFVHQZOnkt7tIBBwccqexeEkwq94rCX6r1~aA~GdyL4Z3WzHRK~Xoug17mnu869TGq8VxuSNBf-LmbSr03uZeXlk2dpobbp3ROl06wauhLm02p1th1qBM5n-Bc0q8wYS-zkY-jA9fc7w6ZE~m6hlHE6Amt1xg~db99oRcu1EuXSdHyWDZDw3OsQ9zlMfX7AU6EBhfAtFbxXuVXOlNOEPuXHgiQ1UbFveqfVKGFRg0dmYXzw62MQM0EQQ2g4qXgk2Xc2z0cQ__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: This paper examines how a community in Dwesa, a marginalised area in the Transkei Region of the Eastern Cape, South Africa, adopts Information and Communication Technologies (ICTs). This research is part of the Siyakhula project, which aims at promoting the potential of the area through ICTs. The project is situated in four different schools: Mpume, Nondobo, Mtokwane and Ngwane. Fostering ICT awareness and a sense of owner-ship by the community are seen as crucial factors, and computer literacy education is an integral part of the project. The study focuses on how di-verse groups of people adopt new technologies and approach ICT educa-tion. Qualitative research methods such as Participatory Action Research (PAR) and Participant Observation (PO) were adopted in the study.
- Full Text:
- Date Issued: 2008
- Authors: Mapi, Thandeka , Dalvit, Lorenzo , Terzoli, Alfredo
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431130 , vital:72747 , https://d1wqtxts1xzle7.cloudfront.net/4390301/5-thandeka-libre.pdf?1390837024=response-content-disposi-tion=inline%3B+filename%3DAdoption_of_ICTs_in_a_Marginalised_Area.pdfExpires=1714988863Signature=N683m3iYa8BDSsrNBb-fZpYmsy~pftZZQbiEdNz8ZFJaL2I-Wt32FIJcLEKFnrSjj0AfnYak4RVZjuZhuFVHQZOnkt7tIBBwccqexeEkwq94rCX6r1~aA~GdyL4Z3WzHRK~Xoug17mnu869TGq8VxuSNBf-LmbSr03uZeXlk2dpobbp3ROl06wauhLm02p1th1qBM5n-Bc0q8wYS-zkY-jA9fc7w6ZE~m6hlHE6Amt1xg~db99oRcu1EuXSdHyWDZDw3OsQ9zlMfX7AU6EBhfAtFbxXuVXOlNOEPuXHgiQ1UbFveqfVKGFRg0dmYXzw62MQM0EQQ2g4qXgk2Xc2z0cQ__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: This paper examines how a community in Dwesa, a marginalised area in the Transkei Region of the Eastern Cape, South Africa, adopts Information and Communication Technologies (ICTs). This research is part of the Siyakhula project, which aims at promoting the potential of the area through ICTs. The project is situated in four different schools: Mpume, Nondobo, Mtokwane and Ngwane. Fostering ICT awareness and a sense of owner-ship by the community are seen as crucial factors, and computer literacy education is an integral part of the project. The study focuses on how di-verse groups of people adopt new technologies and approach ICT educa-tion. Qualitative research methods such as Participatory Action Research (PAR) and Participant Observation (PO) were adopted in the study.
- Full Text:
- Date Issued: 2008
Adsorption of 4-nitrophenol onto Amberlite® IRA-900 modified with metallophthalocyanines
- Marais, Eloïse A, Nyokong, Tebello
- Authors: Marais, Eloïse A , Nyokong, Tebello
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/268576 , vital:54211 , xlink:href="https://doi.org/10.1016/j.jhazmat.2007.06.096"
- Description: The adsorption of 4-nitrophenol using commercially available Amberlite® IRA-900 modified with metal phthalocyanines (MPc) was investigated. The metallophthalocyanines immobilised onto the surface of Amberlite® IRA-900 include Fe (FePcS4), Co (CoPcS4) and Ni (NiPcS4) tetrasulphophthalocyanines, and differently sulphonated phthalocyanine mixtures of Fe (FePcSmix), Co (CoPcSmix) and Ni (NiPcSmix). Adsorption rates were fastest for the modified adsorbents at a loading of 1 × 10−3 g MPc/g Amberlite, at pH 9. The highest amount of 4-NP removal was obtained on FePcSmix modified Amberlite® IRA-900 with Qt = 42.9 mmol g−1 and adsorption efficiency of 86%. The recovery efficiency of 4-NP within 150 min was 76%. Using the Langmuir–Hinshelwood kinetic model, the complexes showed an order of 4-nitrophenol adsorption to be as follows: CoPcSmix > NiPcS4 > NiPcSmix > FePcS4 > FePcSmix > CoPcS4. The MPc modified Amberlite® IRA-900 was used repeatedly, following removal of 4-NP by nitric acid, without any significant loss of activity.
- Full Text:
- Date Issued: 2008
- Authors: Marais, Eloïse A , Nyokong, Tebello
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/268576 , vital:54211 , xlink:href="https://doi.org/10.1016/j.jhazmat.2007.06.096"
- Description: The adsorption of 4-nitrophenol using commercially available Amberlite® IRA-900 modified with metal phthalocyanines (MPc) was investigated. The metallophthalocyanines immobilised onto the surface of Amberlite® IRA-900 include Fe (FePcS4), Co (CoPcS4) and Ni (NiPcS4) tetrasulphophthalocyanines, and differently sulphonated phthalocyanine mixtures of Fe (FePcSmix), Co (CoPcSmix) and Ni (NiPcSmix). Adsorption rates were fastest for the modified adsorbents at a loading of 1 × 10−3 g MPc/g Amberlite, at pH 9. The highest amount of 4-NP removal was obtained on FePcSmix modified Amberlite® IRA-900 with Qt = 42.9 mmol g−1 and adsorption efficiency of 86%. The recovery efficiency of 4-NP within 150 min was 76%. Using the Langmuir–Hinshelwood kinetic model, the complexes showed an order of 4-nitrophenol adsorption to be as follows: CoPcSmix > NiPcS4 > NiPcSmix > FePcS4 > FePcSmix > CoPcS4. The MPc modified Amberlite® IRA-900 was used repeatedly, following removal of 4-NP by nitric acid, without any significant loss of activity.
- Full Text:
- Date Issued: 2008
An Analysis of Network Scanning Traffic as it relates to Scan-Detection in Network Intrusion Detection Systems
- Barnett, Richard J, Irwin, Barry V W
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428156 , vital:72490 , https://www.researchgate.net/profile/Barry-Ir-win/publication/326225058_An_Analysis_of_Network_Scanning_Traffic_as_it_relates_to_Scan-Detec-tion_in_Network_Intrusion_Detection_Systems/links/5b3f21eaa6fdcc8506ffe659/An-Analysis-of-Network-Scanning-Traffic-as-it-relates-to-Scan-Detection-in-Network-Intrusion-Detection-Systems.pdf
- Description: Network Intrusion Detection is, in a modern network, a useful tool to de-tect a wide variety of malicious traffic. The ever present prevalence of scanning activity on the Internet is fair justification to warrant scan de-tection as a component of network intrusion detection. Whilst current systems are able to perform scan-detection, the methods they use are often flawed and exhibit an inability to detect scans in an efficient and scalable manner. Existing research by van Riel and Irwin has illustrated a number of flaws present in the open source systems Snort and Bro. This paper builds on this by describing current research at Rhodes Uni-versity in which these flaws are being addressed. In particular, this re-search will address the flaws in the scan-detection engines in Snort and Bro by developing new plug-ins for these systems which take into con-sideration the improvements which are identified over the course of the research.
- Full Text:
- Date Issued: 2008
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428156 , vital:72490 , https://www.researchgate.net/profile/Barry-Ir-win/publication/326225058_An_Analysis_of_Network_Scanning_Traffic_as_it_relates_to_Scan-Detec-tion_in_Network_Intrusion_Detection_Systems/links/5b3f21eaa6fdcc8506ffe659/An-Analysis-of-Network-Scanning-Traffic-as-it-relates-to-Scan-Detection-in-Network-Intrusion-Detection-Systems.pdf
- Description: Network Intrusion Detection is, in a modern network, a useful tool to de-tect a wide variety of malicious traffic. The ever present prevalence of scanning activity on the Internet is fair justification to warrant scan de-tection as a component of network intrusion detection. Whilst current systems are able to perform scan-detection, the methods they use are often flawed and exhibit an inability to detect scans in an efficient and scalable manner. Existing research by van Riel and Irwin has illustrated a number of flaws present in the open source systems Snort and Bro. This paper builds on this by describing current research at Rhodes Uni-versity in which these flaws are being addressed. In particular, this re-search will address the flaws in the scan-detection engines in Snort and Bro by developing new plug-ins for these systems which take into con-sideration the improvements which are identified over the course of the research.
- Full Text:
- Date Issued: 2008
An Evaluation Of Scan-Detection Algorithms In Network Intrusion Detection Systems
- Barnett, Richard J, Irwin, Barry V W
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428701 , vital:72530 , https://digifors.cs.up.ac.za/issa/2008/Proceedings/Research/29.pdf
- Description: Network Intrusion Detection Systems are becoming more prevalent as devices to protect a network. However, the methods they use for some forms of detection are flawed. This paper builds upon existing research by van Riel and Irwin which illustrated these flaws in Snort and Bro's scan-detection engines. Indeed, it has been ascertained that a number of different scanning techniques are not identified by either Snort or Bro. This paper highlights current research into the improvement of these scan detection algorithms and presents insight into how this re-search is being conducted at Rhodes University. This research will im-prove on the scan detection engines in Snort and Bro, permitting them to be used in a production environment without fear of succumbing to the false negative problem which currently exists.
- Full Text:
- Date Issued: 2008
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428701 , vital:72530 , https://digifors.cs.up.ac.za/issa/2008/Proceedings/Research/29.pdf
- Description: Network Intrusion Detection Systems are becoming more prevalent as devices to protect a network. However, the methods they use for some forms of detection are flawed. This paper builds upon existing research by van Riel and Irwin which illustrated these flaws in Snort and Bro's scan-detection engines. Indeed, it has been ascertained that a number of different scanning techniques are not identified by either Snort or Bro. This paper highlights current research into the improvement of these scan detection algorithms and presents insight into how this re-search is being conducted at Rhodes University. This research will im-prove on the scan detection engines in Snort and Bro, permitting them to be used in a production environment without fear of succumbing to the false negative problem which currently exists.
- Full Text:
- Date Issued: 2008
An investigation into electronic-source plagiarism in a first-year essay assignment
- Authors: Ellery, Karen
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70114 , vital:29621 , https://doi.org/10.1080/02602930701772788
- Description: Since the emergence of the electronic era, plagiarism has become an increasingly prevalent problem at tertiary institutions. This study investigated the role electronic sources of information played in influencing plagiarism in an essay assignment in a first-year geography module at the University of KwaZulu-Natal in South Africa. Despite explicit instruction in tutorials on academic writing, referencing and plagiarism, a quarter of students still plagiarised in their essay, with the majority having done so off the Internet. A survey questionnaire and interviews revealed that not only did the school writing experience prepare students poorly for academic writing discourses, but also highlighted that student ignorance with regard to acknowledgement of electronic sources, a pervasive perception of difference between electronic and print sources, as well as the availability of the copy-and-paste facility which reinforces the product view of writing, all contributed towards electronic-source plagiarism. Active instructional engagement with electronic-source material, and open dialogue on ownership of knowledge as well as on moral and ethical issues with students, are recommended as strategies to overcome such plagiarism.
- Full Text:
- Date Issued: 2008
- Authors: Ellery, Karen
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70114 , vital:29621 , https://doi.org/10.1080/02602930701772788
- Description: Since the emergence of the electronic era, plagiarism has become an increasingly prevalent problem at tertiary institutions. This study investigated the role electronic sources of information played in influencing plagiarism in an essay assignment in a first-year geography module at the University of KwaZulu-Natal in South Africa. Despite explicit instruction in tutorials on academic writing, referencing and plagiarism, a quarter of students still plagiarised in their essay, with the majority having done so off the Internet. A survey questionnaire and interviews revealed that not only did the school writing experience prepare students poorly for academic writing discourses, but also highlighted that student ignorance with regard to acknowledgement of electronic sources, a pervasive perception of difference between electronic and print sources, as well as the availability of the copy-and-paste facility which reinforces the product view of writing, all contributed towards electronic-source plagiarism. Active instructional engagement with electronic-source material, and open dialogue on ownership of knowledge as well as on moral and ethical issues with students, are recommended as strategies to overcome such plagiarism.
- Full Text:
- Date Issued: 2008
An Investigation into the Performance of General Sorting on Graphics Processing Units
- Pilkington, Nick, Irwin, Barry V W
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429881 , vital:72648 , https://doi.org/10.1007/978-1-4020-8741-7_65
- Description: Sorting is a fundamental operation in computing and there is a constant need to push the boundaries of performance with different sorting algo-rithms. With the advent of the programmable graphics pipeline, the par-allel nature of graphics processing units has been exposed allowing programmers to take advantage of it. By transforming the way that data is represented and operated on parallel sorting algorithms can be im-plemented on graphics processing units where previously only graphics processing could be performed. This paradigm of programming exhibits potentially large speedups for algorithms.
- Full Text:
- Date Issued: 2008
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429881 , vital:72648 , https://doi.org/10.1007/978-1-4020-8741-7_65
- Description: Sorting is a fundamental operation in computing and there is a constant need to push the boundaries of performance with different sorting algo-rithms. With the advent of the programmable graphics pipeline, the par-allel nature of graphics processing units has been exposed allowing programmers to take advantage of it. By transforming the way that data is represented and operated on parallel sorting algorithms can be im-plemented on graphics processing units where previously only graphics processing could be performed. This paradigm of programming exhibits potentially large speedups for algorithms.
- Full Text:
- Date Issued: 2008
An open service delivery platform for adding value to softswitch-based telephony environments
- Tsietsi, Mosiuoa, Terzoli, Alfredo, Wells, George C
- Authors: Tsietsi, Mosiuoa , Terzoli, Alfredo , Wells, George C
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428450 , vital:72512 , https://www.researchgate.net/profile/Alfredo-Ter-zoli/publication/251923990_An_open_service_delivery_platform_for_adding_value_to_softswitch-based_telephony_environments/links/0c9605298fdf0ef8d3000000/An-open-service-delivery-platform-for-adding-value-to-softswitch-based-telephony-environments.pdf
- Description: Softswitches have played a crucial role in next generation networks (NGNs) not only as the primary agents responsible for controlling the data and media paths between endpoints, but also as hosts of telepho-ny applications such as billing and legal intercept. Even though very useful and flexible application interfaces have been used to program these softswitches, there is much benefit that can be derived from de-coupling the application layer from the switching core. NGN architec-tures such as the IP Multimedia Subsystem (IMS) have borrowed the concept of an application server from the IT domain in order to deliver enhanced services to the network. This paper describes an initial inves-tigation into the development of a service delivery platform (SDP) based on the JAIN Service Logic and Execution Environment (JSLEE) indus-try standard, to provide advanced services that can be deployed over a telephony environment called iLanga, which is based on the open source software PBX named Asterisk.
- Full Text:
- Date Issued: 2008
- Authors: Tsietsi, Mosiuoa , Terzoli, Alfredo , Wells, George C
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428450 , vital:72512 , https://www.researchgate.net/profile/Alfredo-Ter-zoli/publication/251923990_An_open_service_delivery_platform_for_adding_value_to_softswitch-based_telephony_environments/links/0c9605298fdf0ef8d3000000/An-open-service-delivery-platform-for-adding-value-to-softswitch-based-telephony-environments.pdf
- Description: Softswitches have played a crucial role in next generation networks (NGNs) not only as the primary agents responsible for controlling the data and media paths between endpoints, but also as hosts of telepho-ny applications such as billing and legal intercept. Even though very useful and flexible application interfaces have been used to program these softswitches, there is much benefit that can be derived from de-coupling the application layer from the switching core. NGN architec-tures such as the IP Multimedia Subsystem (IMS) have borrowed the concept of an application server from the IT domain in order to deliver enhanced services to the network. This paper describes an initial inves-tigation into the development of a service delivery platform (SDP) based on the JAIN Service Logic and Execution Environment (JSLEE) indus-try standard, to provide advanced services that can be deployed over a telephony environment called iLanga, which is based on the open source software PBX named Asterisk.
- Full Text:
- Date Issued: 2008
Application of satellite-derived rainfall estimates to extend water resource simulation modelling in South Africa
- Sawunyama, Tendai, Hughes, Denis A
- Authors: Sawunyama, Tendai , Hughes, Denis A
- Date: 2008
- Language: English
- Type: text , Article
- Identifier: vital:7089 , http://hdl.handle.net/10962/d1012419
- Description: Spatially interpolated rainfall estimates from rain-gauges are widely used as input to hydrological models, but deriving accurate estimates at appropriate space and time scales remain a major problem. In South Africa there has been a gradual decrease in the number of active rain-gauges over time. Satellite-based estimates of spatial rainfall are becoming more readily available and offer a viable substitute. The paper presents the potential of using Climate Prediction Center African daily precipitation climatology (CPCAPC) satellite-based datasets (2001-2006) to drive a Pitman hydrological model which has been calibrated using gauge-based rainfall data (1920-1990). However, if two sources of rainfall data are to be used together, it is necessary to ensure that they are compatible in terms of their statistical properties. A non-linear frequency of exceedance transformation technique was used to correct the satellite data to be more consistent with historical spatial rainfall estimates. The technique generated simulation results for the 2001 to 2006 period that were greatly improved compared to the direct use of the untransformed satellite data. While there remain some further questions about the use of satellite-derived rainfall data in different parts of the country, they do seem to have the potential to contribute to extending water resource modelling into the future.
- Full Text:
- Date Issued: 2008
- Authors: Sawunyama, Tendai , Hughes, Denis A
- Date: 2008
- Language: English
- Type: text , Article
- Identifier: vital:7089 , http://hdl.handle.net/10962/d1012419
- Description: Spatially interpolated rainfall estimates from rain-gauges are widely used as input to hydrological models, but deriving accurate estimates at appropriate space and time scales remain a major problem. In South Africa there has been a gradual decrease in the number of active rain-gauges over time. Satellite-based estimates of spatial rainfall are becoming more readily available and offer a viable substitute. The paper presents the potential of using Climate Prediction Center African daily precipitation climatology (CPCAPC) satellite-based datasets (2001-2006) to drive a Pitman hydrological model which has been calibrated using gauge-based rainfall data (1920-1990). However, if two sources of rainfall data are to be used together, it is necessary to ensure that they are compatible in terms of their statistical properties. A non-linear frequency of exceedance transformation technique was used to correct the satellite data to be more consistent with historical spatial rainfall estimates. The technique generated simulation results for the 2001 to 2006 period that were greatly improved compared to the direct use of the untransformed satellite data. While there remain some further questions about the use of satellite-derived rainfall data in different parts of the country, they do seem to have the potential to contribute to extending water resource modelling into the future.
- Full Text:
- Date Issued: 2008
Arthropod Fauna of the UAE, Vol. 1, A. van Harten (Ed.): book review
- Authors: Villet, Martin H
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/451612 , vital:75064 , https://hdl.handle.net/10520/EJC32768
- Description: This book is a richly illustrated synthesis and development of knowledge on the wide range of plant-insect associations that has been observed in several collections of Cretaceous megafloras from the Negev of Israel.
- Full Text:
- Date Issued: 2008
- Authors: Villet, Martin H
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/451612 , vital:75064 , https://hdl.handle.net/10520/EJC32768
- Description: This book is a richly illustrated synthesis and development of knowledge on the wide range of plant-insect associations that has been observed in several collections of Cretaceous megafloras from the Negev of Israel.
- Full Text:
- Date Issued: 2008
Authorship and responsibility
- Authors: Villet, Martin H
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/451640 , vital:75066 , https://hdl.handle.net/10520/EJC32765
- Description: Editorial service is a privilege in many senses: editors have a much broader view of disciplinary practices than most of their colleagues; they see work from more institutions; and are privy to manuscripts in all states of fitness for publication.
- Full Text:
- Date Issued: 2008
- Authors: Villet, Martin H
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/451640 , vital:75066 , https://hdl.handle.net/10520/EJC32765
- Description: Editorial service is a privilege in many senses: editors have a much broader view of disciplinary practices than most of their colleagues; they see work from more institutions; and are privy to manuscripts in all states of fitness for publication.
- Full Text:
- Date Issued: 2008
Automating the creation of 3D animation from annotated fiction text
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432639 , vital:72889 , https://www.iadisportal.org/digital-library/automating-the-creation-of-3d-animation-from-annotated-fiction-text
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2008
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432639 , vital:72889 , https://www.iadisportal.org/digital-library/automating-the-creation-of-3d-animation-from-annotated-fiction-text
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2008