Isolation, identification and genetic characterisation of a microsporidium isolated from carob moth, Ectomyelois ceratoniae (Zeller) (Lepidoptera: Pyralidae)
- Authors: Lloyd, Melissa , Knox, Caroline M , Hill, Martin P , Moore, Sean D
- Date: 2017
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59874 , vital:27674 , https://doi.org/10.4001/003.025.0529
- Description: 'Microsporidia' is a term used for organisms belonging to the phylum Microspora, which contains approximately 187 genera and 1500 species (Corradi 2015). They are obligate intracellular parasites with no active metabolic stages of the life cycle occurring outside of the host cells (Franzen & Muller 1999; Garcia 2002; Tsai et al. 2003; Huang et al. 2004). They exhibit eukaryotic characteristics such as a membrane-bound nucleus, an intracytoplasmic membrane system, and chromosome separation occurs on mitotic spindles. However, they also exhibit prokaryotic characteristics such as possession of a 70S ribosome, lack of true mitochondria and peroxisomes, a simple version of the Golgi apparatus, and a small genome which is much less complex than those of most eukaryotes (Franzen & Muller 1999; Garcia 2002). Microspo- ridia are parasitic in all major groups of animals, both vertebrates and invertebrates (Sprague 1977; Franzen & Muller 1999). Microsporidia were first recognised as pathogens in silkworms by Nageli (1857), and now have been found to infect many hosts such as humans, insects, fish and mammals (Stentiford et al. 2016).
- Full Text:
- Date Issued: 2017
Roundtable review: cold case: the elusive story of Julie Ward's murder
- Authors: Spencer, Lynda G
- Date: 2017
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/138894 , vital:37683 , https://doi.org/10.1080/23277408.2017.1362199
- Description: A Death Retold in Truth and Rumour: Kenya, Britain and the Julie Ward Murder by Grace Ahingila Musila is an extraordinary, captivating, thought-provoking and chilling account of the unsolved murder of Julie Ward. Musila points out that this book does not set out to reveal who murdered Julie Ward. Instead, as an academic, she is interested in examining the intertextual process between the rumours around this cold case and the evidence available in various published accounts, such as books, newspapers and court judgements.
- Full Text:
- Date Issued: 2017
A Geopolitics of knowledge and the value of discomfort:
- Authors: Simbao, Ruth K
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/146444 , vital:38526 , https://www.ru.ac.za/fineart/latestnews/alutacontinuadoingitfordaddytenyearson.html
- Description: In 2006, the short essay ‘Doing it for Daddy’ by visual artist Sharlene Khan caused controversy when it expressed the opinion that since 1994, ‘transformation’ in the visual arts field in South Africa seemed to have halted at the point of White women replacing White men in positions of power. It questioned this new position of dominance in institutions that remained colonially and racially untransformed. On the 16 and 17th of September 2016, the School of Fine Art at Rhodes University will host a one-day symposium ‘A luta Continua: Doing it for Daddy - Ten years on…’ which seeks to both commemorate that article and those who ‘speak up’, but also, fundamentally, to continue looking at the ways in which various social oppressions intersect in the fields of art history and visual arts in South Africa. Presenters include Khwezi Gule, Nontobeko Ntombela, Nomusa Makhubu, Same Mdluli, Fouad Asfour, Ruth Simbao, Sharlene Khan, students from Wits School of Arts and Rhodes Art History and Visual Culture, as well as a performance by visual artist Sikhumbuzo Makandula.
- Full Text:
- Date Issued: 2016
A multi-threading approach to secure VERIFYPIN
- Authors: Frieslaar, Ibraheem , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429244 , vital:72570 , https://ieeexplore.ieee.org/abstract/document/7802952
- Description: This research investigates the use of a multi-threaded framework as a software countermeasure mechanism to prevent attacks on the verifypin process in a pin-acceptance program. The implementation comprises of using various mathematical operations along side a pin-acceptance program in a multi-threaded environment. These threads are inserted randomly on each execution of the program to create confusion for the attacker. Moreover, the research proposes a more improved version of the pin-acceptance program by segmenting the pro-gram. The conventional approach is to check each character one at a time. This research takes the verifying process and separates each character check into its individual thread. Furthermore, the order of each verified thread is randomised. This further assists in the obfuscation of the process where the system checks for a correct character. Finally, the research demonstrates it is able to be more secure than the conventional countermeasures of random time delays and insertion of dummy code.
- Full Text:
- Date Issued: 2016
Improving Fidelity in Internet Simulation through Packet Injection
- Authors: Koorn, Craig , Irwin, Barry V W , Herbert, Alan
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427786 , vital:72462 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622877_Improving_Fidelity_in_Internet_Simulation_through_Packet_Injection/links/5b9a1a47458515310583fd8a/Improving-Fidelity-in-Internet-Simulation-through-Packet-Injection.pdf
- Description: This paper describes the of extension implemented to the NKM Internet simulation system, which allows for the improved of injection of packet traffic at arbitrary nodes, and the replay of previously recorded streams. The latter function allows for the relatively easy implementation of Internet Background Radiation (IBR) within the simulated portion of the Internet. This feature thereby enhances the degree of realism of the simulation, and allows for certain pre-determined traffic, such as scanning activity, to be injected and observed by client systems connected to the simulator.
- Full Text:
- Date Issued: 2016
Spotlight on the Art of Darkness: The Kin Artstudio
- Authors: Tshilumba Mukendi, J S
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/146434 , vital:38525 , https://artafricamagazine.org/magazine-archive/?v=e4dd286dc7d7
- Description: Issue December 2016. What Really Matters.
- Full Text:
- Date Issued: 2016
The effect of land-use on small mammal diversity inside and outside the Great Fish River Nature Reserve, Eastern Cape, South Africa
- Authors: Thondhlana, Gladman , Lagesse, Juliette V
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67823 , vital:29150 , https://doi.org/10.1016/j.jaridenv.2016.03.006
- Description: Publisher version , This study investigated small mammal species diversity at 10 paired contrast sites along a fence line inside and outside the Great Fish River Nature Reserve (GFRNR), Eastern Cape, South Africa. The sites outside the GFRNR are used for subsistence land-based activities including livestock production and fuelwood harvesting. From 145 live captures, a total of 114 unique individuals of five small mammal species (four rodents and one elephant shrew) were recorded over 1170 trap nights. Average small mammal species diversity and abundance were significantly higher inside the reserve than outside. Human activities such as livestock grazing seemed to explain low levels of small mammal diversity and abundance at the communal sites. Vegetation variables showed a complex interplay with small mammal diversity. In general, high vegetation diversity had a positive influence on small mammal diversity though the influence of some environmental variables was species-dependent. We conclude that the GFRNR is effective in protecting small mammals but the findings raise questions around the influence of land use practices such as livestock grazing on biodiversity, especially given that local communities in South Africa are continuously seeking greater access to reserves for livestock grazing and other provisioning services.
- Full Text: false
- Date Issued: 2016
The influence of photoperiod on the reproductive physiology of the greater red musk shrew: Crocidura flavescens
- Authors: Hoole, C , McKechnie, Andrew E , Parker, Daniel M , Bennett, Nigel C
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70136 , vital:29624 , https://doi.org/10.1139/cjz-2015-0128
- Description: Photoperiodism involves the use of both absolute measures of day length and the direction in which day length is changing as a cue for regulating seasonal changes in physiology and behaviour so that birth and lactation coincide with optimal resource availability, increasing offspring survival. Induced ovulation and opportunistic breeding is often found in species that are predominantly solitary and territorial. In this study, the photoperiodic reproductive responses of male greater red musk shrews (Crocidura flavescens (I. Geoffroy Saint-Hilaire, 1827)) were investigated in the laboratory. The presence of spermatozoa regardless of the light cycle, suggest that although the shrews are photoresponsive, they may be capable of breeding throughout the year. Significantly greater testicular volume and eminiferous tubule diameter following exposure to a short day-light cycle suggests that these animals may have breeding peaks that correspond to short days. The presence of epidermal spines on the penis indicates that the shrew is likely also an induced ovulator. Flexible breeding patterns combined with induced ovulation affords this solitary species the greatest chance of reproductive success.
- Full Text: false
- Date Issued: 2016
The influence of photoperiod on the reproductive physiology of the greater red musk shrew: Crocidura flavescens
- Authors: Hoole, C , McKechnie, Andrew E , Parker, Daniel M , Bennett, Nigel C
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70157 , vital:29626 , https://doi.org/10.1139/cjz-2015-0128
- Description: Photoperiodism involves the use of both absolute measures of day length and the direction in which day length is changing as a cue for regulating seasonal changes in physiology and behaviour so that birth and lactation coincide with optimal resource availability, increasing offspring survival. Induced ovulation and opportunistic breeding is often found in species that are predominantly solitary and territorial. In this study, the photoperiodic reproductive responses of male greater red musk shrews (Crocidura flavescens (I. Geoffroy Saint-Hilaire, 1827)) were investigated in the laboratory. The presence of spermatozoa regardless of the light cycle, suggest that although the shrews are photoresponsive, they may be capable of breeding throughout the year. Significantly greater testicular volume and eminiferous tubule diameter following exposure to a short day-light cycle suggests that these animals may have breeding peaks that correspond to short days. The presence of epidermal spines on the penis indicates that the shrew is likely also an induced ovulator. Flexible breeding patterns combined with induced ovulation affords this solitary species the greatest chance of reproductive success.
- Full Text:
- Date Issued: 2016
Towards malicious network activity mitigation through subnet reputation analysis
- Authors: Herbert, Alan , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427799 , vital:72463 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622788_Towards_Malicious_Network_Activity_Mitigation_through_Subnet_Reputation_Analysis/links/5b9a1a88458515310583fda6/Towards-Malicious-Network-Activity-Mitigation-through-Subnet-Reputation-Analysis.pdf
- Description: Analysis technologies that focus on partial packet rather than full packet analysis have shown promise in detection of malicious activity on net-works. NetFlow is one such emergent protocol that is used to log net-work flows through summarizing key features of them. These logs can then be exported to external NetFlow sinks and proper configuration can see effective bandwidth bottleneck mitigation occurring on net-works. Furthermore, each NetFlow source node is configurable with its own unique ID number. This feature enables a system that knows where a NetFlow source node ID number resides physically to say which network flows are occurring from which physical locations irre-spective of the IP addresses involved in these network flows.
- Full Text:
- Date Issued: 2016
A quantitative analysis of microplastic pollution along the south-eastern coastline of South Africa
- Authors: Nel, Holly A , Froneman, P William
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68032 , vital:29187 , https://doi.org/10.1016/j.marpolbul.2015.09.043
- Description: Publisher version , The extent of microplastic pollution (< 5 mm) in the southern hemisphere, particularly southern Africa, is largely unknown. This study aimed to evaluate microplastic pollution along the south-eastern coastline of South Africa, looking at whether bays are characterised by higher microplastic densities than open stretches of coastline in both beach sediment and surf-zone water. Microplastic (mean ± standard error) densities in the beach sediment ranged between 688.9 ± 348.2 and 3308 ± 1449 particles·m− 2, while those in the water column varied between 257.9 ± 53.36 and 1215 ± 276.7 particles·m− 3. With few exceptions there were no significant spatial patterns in either the sediment or water column microplastic densities; with little differences in density between bays and the open coast (P > 0.05). These data indicate that the presence of microplastics were not associated with proximity to land-based sources or population density, but rather is governed by water circulation.
- Full Text: false
- Date Issued: 2015
Enhancing cloud connectivity among NRENs in the SADC region through a novel institution cloud infrastructure framework
- Authors: Suresh, Nalina , Mbale, Jameson , Terzoli, Alfredo , Mufeti, Tulimevava K
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430592 , vital:72702 , 10.1109/ETNCC.2015.7184830
- Description: It is increasingly being recognized that faster socioeconomic develop-ment in Africa is dependent upon the development of Information and Communication Technology (ICT) Infrastructure for the dissemination of data and educational services. The scalability and flexibility provided by Cloud services in terms of resource management, service provisioning and virtualization makes it an attractive system for use with educational and ICT services. The flexibility of pay-as-you-go models combined with the ability to scale computing, storage and/or networking resources makes Cloud computing an ideal candidate for use with education, re-search and scientific infrastructures. Notwithstanding its benefits, transi-tioning from a traditional IT infrastructure to a Cloud computing para-digm raises security concerns with respect to data storage, data trans-mission and user privacy. This paper presents on-going research for the development of Science, Technology and Innovation (STI) infra-structure for the distribution of Information Communication technologies (ICT) services in the African context. The Inter-Cloud Infrastructure Framework (ICIF) proposed, is conceived as a Cloud computing framework suitable for use with National Research and Education Net-works (NRENs) in the SADC region. The ICIF system is used to create an Inter-Cloud infrastructure, and helps NRENs transition from tradi-tional IT infrastructure systems to the Cloud computing paradigm. It also provides new functional/operational components and Cloud services to support the interconnection and/or interoperability among SADC NRENs through the ICIF infrastructure.
- Full Text:
- Date Issued: 2015
Plasmodium falciparum Hop: detailed analysis on complex formation with Hsp70 and Hsp90
- Authors: Hatherley, Rowan , Clitheroe, Crystal-Leigh , Faya, Ngonidzashe , Tastan Bishop, Özlem
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/125708 , vital:35810 , https://doi.10.1016/j.bbrc.2014.11.103
- Description: The heat shock organizing protein (Hop) is important in modulating the activity and co-interaction of two chaperones: heat shock protein 70 and 90 (Hsp70 and Hsp90). Recent research suggested that Plasmodium falciparum Hop (PfHop), PfHsp70 and PfHsp90 form a complex in the trophozoite infective stage. However, there has been little computational research on the malarial Hop protein in complex with other malarial Hsps. Using in silico characterization of the protein, this work showed that individual domains of Hop are evolving at different rates within the protein. Differences between human Hop (HsHop) and PfHop were identified by motif analysis. Homology modeling of PfHop and HsHop in complex with their own cytosolic Hsp90 and Hsp70 C-terminal peptide partners indicated excellent conservation of the Hop concave TPR sites bound to the C-terminal motifs of partner proteins. Further, we analyzed additional binding sites between Hop and Hsp90, and showed, for the first time, that they are distinctly less conserved between human and malaria parasite. These sites are located on the convex surface of Hop TPR2, and involved in interactions with the Hsp90 middle domain. Since the convex sites are less conserved than the concave sites, it makes their potential for malarial inhibitor design extremely attractive (as opposed to the concave sites which have been the focus of previous efforts).
- Full Text:
- Date Issued: 2015
Interactive efficacies of Elephantorrhiza elephantina and Pentanisia prunelloides extracts and isolated compounds against gastrointestinal bacteria
- Authors: Mpofu, Smart J , Olivier, D K , Krause, Rui W M , Ndinteh, Derek T , Van Vuuren, S
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124122 , vital:35552 , https://doi.org/10.1016/j.sajb.2014.07.002
- Description: Elephantorrhiza elephantina (Burch.) Skeels (Fabaceae) and Pentanisia prunelloides (Klotzsch ex Eckl. & Zeyh.) Walp. (Rubiaceae) are two medicinal plants used extensively in southern Africa to treat various ailments. Often, decoctions and infusions from these two plants are used in combination specifically for stomach ailments. The antimicrobial activities of the methanol and aqueous extracts of the rhizomes of the two plants, as well as the two active ingredients from the plants [(−)-epicatechin and palmitic acid] have been determined apart and in combination against Enterococcus faecalis (ATCC 29212), Escherichia coli (ATCC 8739) and Bacillus cereus (ATCC 11778). The minimum inhibitory concentration (MIC) values for the aqueous (0.50–16.00 mg/mL) and methanol (0.20–16.00 mg/mL) extracts independently demonstrated varied efficacies depending on the pathogen of study. When the two plants were combined in 1:1 ratios, synergistic to additive interactions (ΣFIC values 0.19–1.00) were noted. Efficacy for the two major compounds ranged between 0.13–0.63 mg/mL and mainly synergistic interactions were noted against E. faecalis and E. coli. The predominantly synergistic interactions noted between E. elephantina and P. prunelloides and major compounds, when tested in various ratios against these pathogens, provide some validation as to the traditional use of these two plants to treat bacterial gastrointestinal infections.
- Full Text:
- Date Issued: 2014
Real-time monitoring of 3T3-L1 preadipocyte differentiation using a commercially available electric cell-substrate impedance sensor system:
- Authors: Kramer, Adam H , Joos-Vandewalle, Julia , Edkins, Adrienne L , Frost, Carminita L , Prinsloo, Earl
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/164830 , vital:41176 , DOI: 10.1016/j.bbrc.2013.12.123
- Description: Real-time analysis offers multiple benefits over traditional end point assays. Here, we present a method of monitoring the optimisation of the growth and differentiation of murine 3T3-L1 preadipocytes to adipocytes using the commercially available ACEA xCELLigence Real-Time Cell Analyser Single Plate (RTCA SP) system. Our findings indicate that the ACEA xCELLigence RTCA SP can reproducibly monitor the primary morphological changes in pre- and post-confluent 3T3-L1 fibroblasts induced to differentiate using insulin, dexamethasone, 3-isobutyl-1-methylxanthine and rosiglitazone; and may be a viable primary method of screening compounds for adipogenic factors.
- Full Text:
- Date Issued: 2014
Sanitation policy and prevention of environmental contamination in South Africa
- Authors: Hoossein, Shafick , Whittington-Jones, Kevin J , Tandlich, Roman
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76834 , vital:30628 , DOI:10.30638/eemj.2014.141
- Description: Prior to 1994, 21 million people were without access to sanitation in South Africa. Progress towards the backlog elimination started after 1994, but was slow-paced. From 1994 until 2011, the sanitation backlog has been decreased by between 29.8 and 79.2 % from the 1994 levels, depending on the province. Mechanisms were created for implementation of sanitation projects, but this was marginally successful and risk of environmental pollution from sanitation persisted. The period between 2009 and present day seemed to have brought on a significant fast-tracking of sanitation project around South Africa. This coincides with the transfer of oversight and partial implementation responsibility to the Department of Human Settlement and the launch of the Rural Household Infrastructure Programme. It also originated from the integrated programmes which drew in input from all stakeholders at the national and local government levels. Limitations still exist in maintenance and sanitation skills’ portfolio of some local municipalities, mainly in the Eastern Cape and Limpopo Province. However, the present status is still in partial conflict with government aims, legislation and policies. Novel tools such as the Technology Assessment and the Environmental Technology Assessment will have to be implemented in the sanitation decision-making and the novel strategies for skills development will have to be devised. If sufficient maintenance skills are developed in a local municipal area, then this will prevent negative environmental effects and results in lowered sanitation-related environmental contamination. Improvement in can be expected from the new national Department of Water Affairs and Sanitation.
- Full Text: false
- Date Issued: 2014
Testing antivirus engines to determine their effectiveness as a security layer
- Authors: Haffejee, Jameel , Irwin, Barry V W
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429673 , vital:72631 , 10.1109/ISSA.2014.6950496
- Description: This research has been undertaken to empirically test the assumption that it is trivial to bypass an antivirus application and to gauge the effectiveness of antivirus engines when faced with a number of known evasion techniques. A known malicious binary was combined with evasion techniques and deployed against several antivirus engines to test their detection ability. The research also documents the process of setting up an environment for testing antivirus engines as well as building the evasion techniques used in the tests. This environment facilitated the empirical testing that was needed to determine if the assumption that antivirus security controls could easily be bypassed. The results of the empirical tests are also presented in this research and demonstrate that it is indeed within reason that an attacker can evade multiple antivirus engines without much effort. As such while an antivirus application is useful for protecting against known threats, it does not work as effectively against unknown threats.
- Full Text:
- Date Issued: 2014
The diet of the calanoid copepod, Pseudodiaptomus hessei, in a permanently open southern African estuary inferred from fatty acid analyses
- Authors: Noyon, Margaux , Froneman, P William
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70901 , vital:29758 , https://doi.org/10.1093/plankt/fbu037
- Description: The fatty acid (FA) composition of Pseudodiaptomus hessei, one of the most abundant copepod species in southern African estuaries and lakes, reveals potential food selectivity and the importance of flagellate prey in their diets. Differences in FA profiles between males and females were recorded; however, none of these patterns matched the reproductive activities of the copepod. Our findings stress the importance of improving our knowledge of FA biosynthesis pathways to employ fatty acids as trophic markers in feeding studies of zooplankton in temperate environments.
- Full Text:
- Date Issued: 2014
Towards a platform to visualize the state of South Africa's information security
- Authors: Swart, Ignus , Irwin, Barry V W , Grobler, Marthie
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429688 , vital:72632 , 10.1109/ISSA.2014.6950511
- Description: Attacks via the Internet infrastructure is increasingly becoming a daily occurrence and South Africa is no exception. In response, certain governments have published strategies pertaining to information security on a national level. These policies aim to ensure that critical infrastructure is protected, and that there is a move towards a greater state of information security readiness. This is also the case for South Africa where a variety of policy initiatives have started to gain momentum. While establishing strategy and policy is essential, ensuring its implementation is often difficult and dependent on the availability of resources. This is even more so in the case of information security since virtually all standardized security improvement processes start off with specifying that a proper inventory is required of all hardware, software, people and processes. While this may be possible to achieve at an organizational level, it is far more challenging on a national level. In this paper, the authors examine the possibility of making use of available data sources to achieve inventory of infrastructure on a national level and to visualize the state of a country's information security in at least a partial manner.
- Full Text:
- Date Issued: 2014
A kernel-driven framework for high performance internet routing simulation
- Authors: Herbert, Alan , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429585 , vital:72624 , 10.1109/ISSA.2013.6641048
- Description: The ability to provide the simulation of packets traversing an internet path is an integral part of providing realistic simulations for network training, and cyber defence exercises. This paper builds on previous work, and considers an in-kernel approach to solving the routing simulation problem. The inkernel approach is anticipated to allow the framework to be able to achieve throughput rates of 1GB/s or higher using commodity hardware. Processes that run outside the context of the kernel of most operating system require context switching to access hardware and kernel modules. This leads to considerable delays in the processes, such as network simulators, that frequently access hardware such as hard disk accesses and network packet handling. To mitigate this problem, as experienced with earlier implementations, this research looks towards implementing a kernel module to handle network routing and simulation within a UNIX based system. This would remove delays incurred from context switching and allows for direct access to the hardware components of the host.
- Full Text:
- Date Issued: 2013