SADSAWU - International workers day
- SADSAWU
- Authors: SADSAWU
- Date: June 2012
- Subjects: SADSAWU
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/117975 , vital:34581
- Description: A year has gone by, after the adoption of International Labour Organisation's (ILO) Convention 189 for Domestic Workers. We have worked so hard for nearly four years, to ensure that our work is recognised as decent work! On 16th June 2011 we made history when Convention 189 was adopted. In this year gone by, only one government has signed the ratification of Convention 189. We set ourselves a goal: We want at least 12 governments to sign, one each month as part of the international 12 to 12 Campaign with the International Trade Union Congress (ITUC) and International Domestic Workers' Network (IDWN). South Africa shcAild be the second government to sign and ratify 189, meaning it becomes labour law, as South Africa was the most supportive and vocal government leading the campaign for Convention 189 at the International Labour Conference.
- Full Text:
- Date Issued: June 2012
- Authors: SADSAWU
- Date: June 2012
- Subjects: SADSAWU
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/117975 , vital:34581
- Description: A year has gone by, after the adoption of International Labour Organisation's (ILO) Convention 189 for Domestic Workers. We have worked so hard for nearly four years, to ensure that our work is recognised as decent work! On 16th June 2011 we made history when Convention 189 was adopted. In this year gone by, only one government has signed the ratification of Convention 189. We set ourselves a goal: We want at least 12 governments to sign, one each month as part of the international 12 to 12 Campaign with the International Trade Union Congress (ITUC) and International Domestic Workers' Network (IDWN). South Africa shcAild be the second government to sign and ratify 189, meaning it becomes labour law, as South Africa was the most supportive and vocal government leading the campaign for Convention 189 at the International Labour Conference.
- Full Text:
- Date Issued: June 2012
Service discovery using open sound control
- Eales, Andrew, Foss, Richard
- Authors: Eales, Andrew , Foss, Richard
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426890 , vital:72398 , https://www.aes.org/e-lib/online/browse.cfm?elib=16432
- Description: The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application. The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application.
- Full Text:
- Date Issued: 2012
- Authors: Eales, Andrew , Foss, Richard
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426890 , vital:72398 , https://www.aes.org/e-lib/online/browse.cfm?elib=16432
- Description: The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application. The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application.
- Full Text:
- Date Issued: 2012
Social recruiting: a next generation social engineering attack
- Schoeman, A H B, Irwin, Barry V W
- Authors: Schoeman, A H B , Irwin, Barry V W
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428600 , vital:72523 , https://www.jstor.org/stable/26486876
- Description: Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.
- Full Text:
- Date Issued: 2012
- Authors: Schoeman, A H B , Irwin, Barry V W
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428600 , vital:72523 , https://www.jstor.org/stable/26486876
- Description: Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.
- Full Text:
- Date Issued: 2012
STAT3 interacts directly with Hsp90:
- Prinsloo, Earl, Kramer, Adam H, Edkins, Adrienne L, Blatch, Gregory L
- Authors: Prinsloo, Earl , Kramer, Adam H , Edkins, Adrienne L , Blatch, Gregory L
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165142 , vital:41212 , DOI: 10.1002/iub.607
- Description: Heat shock protein 90 (Hsp90) functionally modulates signal transduction. The signal transducer and activator of transcription 3 (STAT3) mediates interleukin‐6 family cytokine signaling. Aberrant activation and mutation of STAT3 is associated with oncogenesis and immune disorders, respectively. Hsp90 and STAT3 have previously been shown to colocalize and coimmunoprecipitate in common complexes.
- Full Text:
- Date Issued: 2012
- Authors: Prinsloo, Earl , Kramer, Adam H , Edkins, Adrienne L , Blatch, Gregory L
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165142 , vital:41212 , DOI: 10.1002/iub.607
- Description: Heat shock protein 90 (Hsp90) functionally modulates signal transduction. The signal transducer and activator of transcription 3 (STAT3) mediates interleukin‐6 family cytokine signaling. Aberrant activation and mutation of STAT3 is associated with oncogenesis and immune disorders, respectively. Hsp90 and STAT3 have previously been shown to colocalize and coimmunoprecipitate in common complexes.
- Full Text:
- Date Issued: 2012
Computerized Cataloguing: INF 323
- Chitsamatanga, N, Ondari-Okemwa, E
- Authors: Chitsamatanga, N , Ondari-Okemwa, E
- Date: 2012-01
- Language: English
- Type: Examination paper
- Identifier: vital:18027 , http://hdl.handle.net/10353/d1010611
- Description: Computerized Cataloguing: INF 323, supplementary degree examination January 2012.
- Full Text: false
- Date Issued: 2012-01
- Authors: Chitsamatanga, N , Ondari-Okemwa, E
- Date: 2012-01
- Language: English
- Type: Examination paper
- Identifier: vital:18027 , http://hdl.handle.net/10353/d1010611
- Description: Computerized Cataloguing: INF 323, supplementary degree examination January 2012.
- Full Text: false
- Date Issued: 2012-01
English Method 2: EDL 222
- Authors: Botha, E K , Mdaka, V N
- Date: 2012-01
- Language: English
- Type: Examination paper
- Identifier: vital:18307 , http://hdl.handle.net/10353/d1011416
- Description: English Method 2: EDL 222, supplementary examinations January 2012.
- Full Text: false
- Date Issued: 2012-01
- Authors: Botha, E K , Mdaka, V N
- Date: 2012-01
- Language: English
- Type: Examination paper
- Identifier: vital:18307 , http://hdl.handle.net/10353/d1011416
- Description: English Method 2: EDL 222, supplementary examinations January 2012.
- Full Text: false
- Date Issued: 2012-01
Taxation 3: ATV 321E
- Authors: Stevens, N , Olivier, J
- Date: 2011-11
- Subjects: Taxation
- Language: English
- Type: Examination paper
- Identifier: vital:17429 , http://hdl.handle.net/10353/d1009801
- Description: Taxation 3: ATV 321E, final assessment, November 2011.
- Full Text:
- Date Issued: 2011-11
- Authors: Stevens, N , Olivier, J
- Date: 2011-11
- Subjects: Taxation
- Language: English
- Type: Examination paper
- Identifier: vital:17429 , http://hdl.handle.net/10353/d1009801
- Description: Taxation 3: ATV 321E, final assessment, November 2011.
- Full Text:
- Date Issued: 2011-11
Introduction to Agricultural Economics: AGE 111
- Authors: Mushunje, A , Obi, A
- Date: 2011-08
- Subjects: Agriculture -- Economic aspects
- Language: English
- Type: Examination paper
- Identifier: vital:17648 , http://hdl.handle.net/10353/d1010027
- Description: Introduction to Agricultural Economics: AGE 111, examination August 2011.
- Full Text: false
- Date Issued: 2011-08
- Authors: Mushunje, A , Obi, A
- Date: 2011-08
- Subjects: Agriculture -- Economic aspects
- Language: English
- Type: Examination paper
- Identifier: vital:17648 , http://hdl.handle.net/10353/d1010027
- Description: Introduction to Agricultural Economics: AGE 111, examination August 2011.
- Full Text: false
- Date Issued: 2011-08
Interpreting the Text of the Hebrew Bible: THB 211
- Authors: Adolph, E , Oosthuizen, R
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:18160 , http://hdl.handle.net/10353/d1011089
- Description: Interpreting the Text of the Hebrew Bible: THB 211, degree examination June/July 2011.
- Full Text: false
- Date Issued: 2011-06
- Authors: Adolph, E , Oosthuizen, R
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:18160 , http://hdl.handle.net/10353/d1011089
- Description: Interpreting the Text of the Hebrew Bible: THB 211, degree examination June/July 2011.
- Full Text: false
- Date Issued: 2011-06
Introduction to Agricultural Economics: AGE 111
- Authors: Mushunje, A , Obi, A
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:17665 , http://hdl.handle.net/10353/d1010055
- Description: Introduction to Agricultural Economics: AGE 111, examination June 2011.
- Full Text: false
- Date Issued: 2011-06
- Authors: Mushunje, A , Obi, A
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:17665 , http://hdl.handle.net/10353/d1010055
- Description: Introduction to Agricultural Economics: AGE 111, examination June 2011.
- Full Text: false
- Date Issued: 2011-06
Introduction to Computers and Computing: CLT 111 & 111F
- Authors: Ntlabathi, S , Xazela, W
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:17892 , http://hdl.handle.net/10353/d1011060
- Description: Introduction to Computers & Computing: CLT 111 and 111F, degree examination June 2011.
- Full Text: false
- Date Issued: 2011-06
- Authors: Ntlabathi, S , Xazela, W
- Date: 2011-06
- Language: English
- Type: Examination paper
- Identifier: vital:17892 , http://hdl.handle.net/10353/d1011060
- Description: Introduction to Computers & Computing: CLT 111 and 111F, degree examination June 2011.
- Full Text: false
- Date Issued: 2011-06
Fundamentals of Information Systems: IFS 121 & 121E
- Authors: Boucher, D , Wayi, N
- Date: 2011-02
- Subjects: Information resources management
- Language: English
- Type: Examination paper
- Identifier: vital:17476 , http://hdl.handle.net/10353/d1010344
- Description: Fundamentals of Information Systems: IFS 121 & 121E, Supplementary Examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Boucher, D , Wayi, N
- Date: 2011-02
- Subjects: Information resources management
- Language: English
- Type: Examination paper
- Identifier: vital:17476 , http://hdl.handle.net/10353/d1010344
- Description: Fundamentals of Information Systems: IFS 121 & 121E, Supplementary Examination February 2011.
- Full Text: false
- Date Issued: 2011-02
Physical Chemistry 1: PAC 224
- Authors: Maqanda, V , Sadimenko, A
- Date: 2011-02
- Subjects: Chemistry, Physical
- Language: English
- Type: Examination paper
- Identifier: vital:17804 , http://hdl.handle.net/10353/d1010356
- Description: Physical Chemistry 1: PAC 224, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Maqanda, V , Sadimenko, A
- Date: 2011-02
- Subjects: Chemistry, Physical
- Language: English
- Type: Examination paper
- Identifier: vital:17804 , http://hdl.handle.net/10353/d1010356
- Description: Physical Chemistry 1: PAC 224, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
A framework for DNS based detection and mitigation of malware infections on a network
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
African Languages And ICT Education
- Dalvit, Lorenzo, Murray, Sarah, Terzoli, Alfredo
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
An illustrated leaflet containing antiretroviral information targeted for low-literate readers: development and evaluation
- Dowse, Roslind, Ramela, Thato, Browne, Sara H
- Authors: Dowse, Roslind , Ramela, Thato , Browne, Sara H
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156731 , vital:40043 , https://doi.org/10.1016/j.pec.2011.01.013
- Description: To apply a dual visual/textual modal approach in developing and evaluating a medicine information leaflet with pictograms suitable for low-literate HIV/AIDS patients. To identify and recommend best practices in this type of information design.
- Full Text:
- Date Issued: 2011
- Authors: Dowse, Roslind , Ramela, Thato , Browne, Sara H
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156731 , vital:40043 , https://doi.org/10.1016/j.pec.2011.01.013
- Description: To apply a dual visual/textual modal approach in developing and evaluating a medicine information leaflet with pictograms suitable for low-literate HIV/AIDS patients. To identify and recommend best practices in this type of information design.
- Full Text:
- Date Issued: 2011
Biphenyl sorption to different soil clay minerals
- Tandlich, Roman, Baláž, Štefan
- Authors: Tandlich, Roman , Baláž, Štefan
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76869 , vital:30632 , https://doi.org/10.5897/AJAR10.1012
- Description: Only limited information is available in the literature on the role of soil mineral surfaces in the sorption of hydrophobic organic pollutants. This knowledge gap is addressed through the assessment of biphenyl sorption to kaolinite, illite and bentonite; using the batch equilibration technique with incubations lasting 6 or 21 days at 28 ± 2°C in the dark [RT1]. Sorption of biphenyl onto kaolinite followed the Freundlich sorption isotherm, whereas linear sorption isotherms were observed on illite and bentonite [RT2]. The biphenyl sorption partition coefficient on kaolinite ranged from 0.1 to 9.1 cm3.g-1 after 6 days and no sorption was observed after 21 days. This could have been caused by a completely reversible sorption or a loss of binding capacity after 21 days [RT3]. The respective values of the biphenyl sorption partition coefficient on illite and bentonite ranged from 20.3 ± 0.3 to 120 ± 8 cm3.g-1.Sorption equilibrium on the internal clay surfaces was reached after 6 days, as indicated by the sorption data for illite and bentonite [RT4]. Access of biphenyl molecules to the internal clay surfaces is a function of the ionic strength of soil solution and the soil organic matter is the dominant site for biphenyl sorption after 6 to 21 days.
- Full Text:
- Date Issued: 2011
- Authors: Tandlich, Roman , Baláž, Štefan
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76869 , vital:30632 , https://doi.org/10.5897/AJAR10.1012
- Description: Only limited information is available in the literature on the role of soil mineral surfaces in the sorption of hydrophobic organic pollutants. This knowledge gap is addressed through the assessment of biphenyl sorption to kaolinite, illite and bentonite; using the batch equilibration technique with incubations lasting 6 or 21 days at 28 ± 2°C in the dark [RT1]. Sorption of biphenyl onto kaolinite followed the Freundlich sorption isotherm, whereas linear sorption isotherms were observed on illite and bentonite [RT2]. The biphenyl sorption partition coefficient on kaolinite ranged from 0.1 to 9.1 cm3.g-1 after 6 days and no sorption was observed after 21 days. This could have been caused by a completely reversible sorption or a loss of binding capacity after 21 days [RT3]. The respective values of the biphenyl sorption partition coefficient on illite and bentonite ranged from 20.3 ± 0.3 to 120 ± 8 cm3.g-1.Sorption equilibrium on the internal clay surfaces was reached after 6 days, as indicated by the sorption data for illite and bentonite [RT4]. Access of biphenyl molecules to the internal clay surfaces is a function of the ionic strength of soil solution and the soil organic matter is the dominant site for biphenyl sorption after 6 to 21 days.
- Full Text:
- Date Issued: 2011
Designer ligands : the search for metal ion selectivity
- Authors: Kaye, Perry T
- Date: 2011
- Language: English
- Type: Article
- Identifier: vital:6576 , http://hdl.handle.net/10962/d1004139
- Description: The paper reviews research conducted at Rhodes University towards the development of metal-selective ligands. The research has focused on the rational design, synthesis and evaluation of novel ligands for use in the formation of copper complexes as biomimetic models of the metalloenzyme, tyrosinase, and for the selective extraction of silver, nickel and platinum group metal ions in the presence of contaminating metal ions. Attention has also been given to the development of efficient, metal-selective molecular imprinted polymers.
- Full Text:
- Date Issued: 2011
- Authors: Kaye, Perry T
- Date: 2011
- Language: English
- Type: Article
- Identifier: vital:6576 , http://hdl.handle.net/10962/d1004139
- Description: The paper reviews research conducted at Rhodes University towards the development of metal-selective ligands. The research has focused on the rational design, synthesis and evaluation of novel ligands for use in the formation of copper complexes as biomimetic models of the metalloenzyme, tyrosinase, and for the selective extraction of silver, nickel and platinum group metal ions in the presence of contaminating metal ions. Attention has also been given to the development of efficient, metal-selective molecular imprinted polymers.
- Full Text:
- Date Issued: 2011
Incorporation of Ni(II)-dimethylglyoxime ion-imprinted polymer into electrospun polysulphone nanofibre for the determination of Ni(II) ions from aqueous samples
- Rammika, Modise, Darko, Godfrey, Torto, Nelson
- Authors: Rammika, Modise , Darko, Godfrey , Torto, Nelson
- Date: 2011
- Language: English
- Type: Article
- Identifier: vital:6589 , http://hdl.handle.net/10962/d1004172
- Description: Ni(II)-dimethylglyoxime ion-imprinted polymer (Ni(II)-DMG IIP) was encapsulated in polysulphone and electrospun into nanofibres with diameters ranging from 406 to 854 nm. The structures of the Ni(II)-DMG encapsulated-IIP nanofibre, non-imprinted encapsulated-polymer nanofibre and polysulphone nanofibre mats were observed by scanning electron microscopy and evaluated by infrared spectroscopy. Electrospinning increased the specific surface area of the Ni(II)-DMG encapsulated-IIP nanofibre mats, as was evidenced by the low masses of the Ni(II)-DMG encapsulated-IIP nanofibre mats used. The accuracy of the method was validated by analysing a custom solution of certified reference material (SEP-3); the concentration of Ni(II) obtained was close to the certified one. The limit of detection was found to be 4.0x10-4 μg∙mℓ−1 while the limit of quantification was found to be 1.2x10-3 μg∙mℓ−1. The recovery of Ni(II) achieved using the Ni(II)-DMG imprinted nanofibre mats in water samples was found to range from 83 to 89%, while that of non-imprinted nanofibre mats was found to range from 59 to 65%, and that of polysulphone from 55 to 62%.
- Full Text:
- Date Issued: 2011
- Authors: Rammika, Modise , Darko, Godfrey , Torto, Nelson
- Date: 2011
- Language: English
- Type: Article
- Identifier: vital:6589 , http://hdl.handle.net/10962/d1004172
- Description: Ni(II)-dimethylglyoxime ion-imprinted polymer (Ni(II)-DMG IIP) was encapsulated in polysulphone and electrospun into nanofibres with diameters ranging from 406 to 854 nm. The structures of the Ni(II)-DMG encapsulated-IIP nanofibre, non-imprinted encapsulated-polymer nanofibre and polysulphone nanofibre mats were observed by scanning electron microscopy and evaluated by infrared spectroscopy. Electrospinning increased the specific surface area of the Ni(II)-DMG encapsulated-IIP nanofibre mats, as was evidenced by the low masses of the Ni(II)-DMG encapsulated-IIP nanofibre mats used. The accuracy of the method was validated by analysing a custom solution of certified reference material (SEP-3); the concentration of Ni(II) obtained was close to the certified one. The limit of detection was found to be 4.0x10-4 μg∙mℓ−1 while the limit of quantification was found to be 1.2x10-3 μg∙mℓ−1. The recovery of Ni(II) achieved using the Ni(II)-DMG imprinted nanofibre mats in water samples was found to range from 83 to 89%, while that of non-imprinted nanofibre mats was found to range from 59 to 65%, and that of polysulphone from 55 to 62%.
- Full Text:
- Date Issued: 2011
Invasion of a headwater stream by non-native fishes in the Swartkops River system, South Africa
- Ellender, Bruce R, Weyl, Olaf L F, Swartz, Ernst R
- Authors: Ellender, Bruce R , Weyl, Olaf L F , Swartz, Ernst R
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/446866 , vital:74566 , https://doi.org/10.1080/15627020.2011.11407477
- Description: In South Africa, fishes in headwater streams are increasingly being threatened by non-native fish invasions. These invasions originate primarily from source populations in mainstream rivers and impoundments. In the Blindekloof stream, a Swartkops River headwater tributary, the non-native Micropterus salmoides was eradicated from the stream by conservation authorities in 1989. As a result of this eradication subsequent occurrences of non-native fishes are most likely a result of upstream invasions from the mainstream Swartkops River. The Blindekloof stream therefore provided a unique opportunity to investigate whether M. salmoides would reinvade after its removal in 1989 and if the more recently introduced Clarias gariepinus and Tilapia sparrmanii would invade the Blindekloof stream. During snorkel and electrofishing surveys four non-native species were recorded (M. salmoides, M. dolomieu, T. sparrmanii, C. gariepinus ).
- Full Text:
- Date Issued: 2011
- Authors: Ellender, Bruce R , Weyl, Olaf L F , Swartz, Ernst R
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/446866 , vital:74566 , https://doi.org/10.1080/15627020.2011.11407477
- Description: In South Africa, fishes in headwater streams are increasingly being threatened by non-native fish invasions. These invasions originate primarily from source populations in mainstream rivers and impoundments. In the Blindekloof stream, a Swartkops River headwater tributary, the non-native Micropterus salmoides was eradicated from the stream by conservation authorities in 1989. As a result of this eradication subsequent occurrences of non-native fishes are most likely a result of upstream invasions from the mainstream Swartkops River. The Blindekloof stream therefore provided a unique opportunity to investigate whether M. salmoides would reinvade after its removal in 1989 and if the more recently introduced Clarias gariepinus and Tilapia sparrmanii would invade the Blindekloof stream. During snorkel and electrofishing surveys four non-native species were recorded (M. salmoides, M. dolomieu, T. sparrmanii, C. gariepinus ).
- Full Text:
- Date Issued: 2011