An XML-Based Approach to Audio Connection Management
- Foss, Richard, Klinkradt, Bradley
- Authors: Foss, Richard , Klinkradt, Bradley
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427253 , vital:72425 , https://www.aes.org/e-lib/browse.cfm?elib=14115
- Description: An XML-based approach to firewire audio connection management has been developed that allows for the creation of connection management applications using a range of implementation tools. The XML connection management requests flow between a client and server, where the client and server can reside on the same or separate workstations. The server maintains the state of the firewire audio device configuration as well as information about potential users. XML is also used to control user access and booking of devices.
- Full Text:
- Date Issued: 2007
- Authors: Foss, Richard , Klinkradt, Bradley
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427253 , vital:72425 , https://www.aes.org/e-lib/browse.cfm?elib=14115
- Description: An XML-based approach to firewire audio connection management has been developed that allows for the creation of connection management applications using a range of implementation tools. The XML connection management requests flow between a client and server, where the client and server can reside on the same or separate workstations. The server maintains the state of the firewire audio device configuration as well as information about potential users. XML is also used to control user access and booking of devices.
- Full Text:
- Date Issued: 2007
Constraint-based conversion of fiction text to a time-based graphical representation
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433141 , vital:72946 , https://doi.org/10.1145/1292491.1292494
- Description: This paper presents a method for converting unrestricted fiction text into a time-based graphical form. Key concepts extracted from the text are used to formulate constraints describing the interaction of entities in a scene. The solution of these constraints over their respective time intervals provides the trajectories for these entities in a graphical representation.
- Full Text:
- Date Issued: 2007
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433141 , vital:72946 , https://doi.org/10.1145/1292491.1292494
- Description: This paper presents a method for converting unrestricted fiction text into a time-based graphical form. Key concepts extracted from the text are used to formulate constraints describing the interaction of entities in a scene. The solution of these constraints over their respective time intervals provides the trajectories for these entities in a graphical representation.
- Full Text:
- Date Issued: 2007
CONSTRUCTION CONFERENCE “DECENT WORK IN THE CONSTRUCTION SECTOR TOWARDS & BEYOND 2010"
- NUM
- Authors: NUM
- Date: 2007
- Subjects: NUM
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/250673 , vital:52037
- Description: The 2010 World Cup is upon us, an event of great socio economic import to South Africa and indeed the African Continent. Not only is South Africa on the pedestal, but so is the African Continent. It is all systems go, so says major role players involved in delivering the 2010 FIFA World Cup to the World. However, we wonder if the same holds true for labour, that we can say it is all systems go, when, on the eve of the infrastructure roll out, we are grappling with issues of how we can stake a claim on behalf of the millions of construction workers that we represent.
- Full Text:
- Date Issued: 2007
- Authors: NUM
- Date: 2007
- Subjects: NUM
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/250673 , vital:52037
- Description: The 2010 World Cup is upon us, an event of great socio economic import to South Africa and indeed the African Continent. Not only is South Africa on the pedestal, but so is the African Continent. It is all systems go, so says major role players involved in delivering the 2010 FIFA World Cup to the World. However, we wonder if the same holds true for labour, that we can say it is all systems go, when, on the eve of the infrastructure roll out, we are grappling with issues of how we can stake a claim on behalf of the millions of construction workers that we represent.
- Full Text:
- Date Issued: 2007
Mechanisms for multimodality: taking fiction to another dimension
- Glass, Kevin R, Bangay, Shaun D, Alcock, Bruce
- Authors: Glass, Kevin R , Bangay, Shaun D , Alcock, Bruce
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433226 , vital:72953 , https://doi.org/10.1145/1294685.1294708
- Description: We present methods for automatically constructing representations of fiction books in a range of modalities: audibly, graphically and as 3D virtual environments. The correspondence between the sequential ordering of events against the order of events presented in the text is used to correctly resolve the dynamic interactions for each representation. Synthesised audio created from the fiction text is used to calibrate the base time-line against which the other forms of media are correctly aligned. The audio stream is based on speech synthesis using the text of the book, and is enhanced using distinct voices for the different characters in a book. Sound effects are included automatically. The graphical representation represents the text (as subtitles), identifies active characters and provides visual feedback of the content of the story. Dynamic virtual environments conform to the constraints implied by the story, and are used as a source of further visual content. These representations are all aligned to a common time-line, and combined using sequencing facilities to provide a multimodal version of the original text.
- Full Text:
- Date Issued: 2007
- Authors: Glass, Kevin R , Bangay, Shaun D , Alcock, Bruce
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433226 , vital:72953 , https://doi.org/10.1145/1294685.1294708
- Description: We present methods for automatically constructing representations of fiction books in a range of modalities: audibly, graphically and as 3D virtual environments. The correspondence between the sequential ordering of events against the order of events presented in the text is used to correctly resolve the dynamic interactions for each representation. Synthesised audio created from the fiction text is used to calibrate the base time-line against which the other forms of media are correctly aligned. The audio stream is based on speech synthesis using the text of the book, and is enhanced using distinct voices for the different characters in a book. Sound effects are included automatically. The graphical representation represents the text (as subtitles), identifies active characters and provides visual feedback of the content of the story. Dynamic virtual environments conform to the constraints implied by the story, and are used as a source of further visual content. These representations are all aligned to a common time-line, and combined using sequencing facilities to provide a multimodal version of the original text.
- Full Text:
- Date Issued: 2007
The deployment of an e-commerce platform and related projects in a rural area in South Africa
- Dalvit, Lorenzo, Muyingi, H Hyppolite, Terzoli, Alfredo, Thinyane, Mamello
- Authors: Dalvit, Lorenzo , Muyingi, H Hyppolite , Terzoli, Alfredo , Thinyane, Mamello
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428545 , vital:72519 , https://nru.uncst.go.ug/bitstream/handle/123456789/6552/Information%20Communica-tion%20Technologies%20%20page%20410.pdf?sequence=1andisAllowed=y#page=256
- Description: In our paper we describe the development and deployment of an ecommerce platform in Dwesa, a rural area in the former homeland of Transkei in South Africa. The system is designed to promote tourism and advertise local arts, crafts and music, and it entails a number of re-lated projects. Deployment of infrastructure, technical support, promo-tion of the initiative and teaching of computer literacy take place during monthly visits of approximately one week, and involve young research-ers from two universities (one previously disadvantaged; the other his-torically privileged). This ensures a synergy between technical exper-tise and understanding of the local context. Findings so far emphasise the importance of contextualising the intervention to suit local needs and adjust to the local context. The platform is currently being extended to include e-government, e-learning and e-health capabilities. If proven successful, this model can be exported to similar areas in South africa and in the rest of Africa. This could open up potential opportunities for the still unexplored market for ICT in rural Africa.
- Full Text:
- Date Issued: 2007
- Authors: Dalvit, Lorenzo , Muyingi, H Hyppolite , Terzoli, Alfredo , Thinyane, Mamello
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428545 , vital:72519 , https://nru.uncst.go.ug/bitstream/handle/123456789/6552/Information%20Communica-tion%20Technologies%20%20page%20410.pdf?sequence=1andisAllowed=y#page=256
- Description: In our paper we describe the development and deployment of an ecommerce platform in Dwesa, a rural area in the former homeland of Transkei in South Africa. The system is designed to promote tourism and advertise local arts, crafts and music, and it entails a number of re-lated projects. Deployment of infrastructure, technical support, promo-tion of the initiative and teaching of computer literacy take place during monthly visits of approximately one week, and involve young research-ers from two universities (one previously disadvantaged; the other his-torically privileged). This ensures a synergy between technical exper-tise and understanding of the local context. Findings so far emphasise the importance of contextualising the intervention to suit local needs and adjust to the local context. The platform is currently being extended to include e-government, e-learning and e-health capabilities. If proven successful, this model can be exported to similar areas in South africa and in the rest of Africa. This could open up potential opportunities for the still unexplored market for ICT in rural Africa.
- Full Text:
- Date Issued: 2007
Flexible, High Speed Audio Networking for Hotels and Convention Centres
- Foss, Richard, Fujimori, J I, Chigwamba, Nyasha, Klinkradt, Bradley, Okai-Tettey, Harold
- Authors: Foss, Richard , Fujimori, J I , Chigwamba, Nyasha , Klinkradt, Bradley , Okai-Tettey, Harold
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427292 , vital:72428 , https://www.aes.org/e-lib/browse.cfm?elib=13472
- Description: This paper describes the use of mLAN (music Local Area Network) to solve the problem of audio routing within hotels and convention centers. mLAN is a Firewire based digital network interface technology that allows professional audio equipment, PCs and electronic instruments to be easily and efficiently interconnected using a single cable. In order to solve this problem, an existing mLAN Connection Management Server, augmented with additional functionality, has been utilized. A graphical client application has been created that displays the various locations within a hotel/convention center, and sends out appropriate routing messages in Extensible Mark-up Language (XML) to an mLAN connection management server. The connection management server, in turn, controls a number of mLAN audio distribution boxes on the firewire network.
- Full Text:
- Date Issued: 2006
- Authors: Foss, Richard , Fujimori, J I , Chigwamba, Nyasha , Klinkradt, Bradley , Okai-Tettey, Harold
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427292 , vital:72428 , https://www.aes.org/e-lib/browse.cfm?elib=13472
- Description: This paper describes the use of mLAN (music Local Area Network) to solve the problem of audio routing within hotels and convention centers. mLAN is a Firewire based digital network interface technology that allows professional audio equipment, PCs and electronic instruments to be easily and efficiently interconnected using a single cable. In order to solve this problem, an existing mLAN Connection Management Server, augmented with additional functionality, has been utilized. A graphical client application has been created that displays the various locations within a hotel/convention center, and sends out appropriate routing messages in Extensible Mark-up Language (XML) to an mLAN connection management server. The connection management server, in turn, controls a number of mLAN audio distribution boxes on the firewire network.
- Full Text:
- Date Issued: 2006
Graph matching with subdivision surfaces for texture synthesis on surfaces
- Bangay, Shaun D, Morkel, Chantelle
- Authors: Bangay, Shaun D , Morkel, Chantelle
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433351 , vital:72964 , https://doi.org/10.1145/1108590.1108601
- Description: Existing texture synthesis-from example strategies for polygon meshes typically make use of three components: a multi-resolution mesh hierarchy that allows the overall nature of the pattern to be reproduced before filling in detail; a matching strategy that extends the synthesized texture using the best fit from a texture sample; and a transfer mechanism that copies the selected portion of the texture sample to the target surface. We introduce novel alternatives for each of these components. Use of √2-subdivision surfaces provides the mesh hierarchy and allows fine control over the surface complexity. Adaptive subdivision is used to create an even vertex distribution over the surface. Use of the graph defined by a surface region for matching, rather than a regular texture neighbourhood, provides for flexible control over the scale of the texture and allows simultaneous matching against multiple levels of an image pyramid created from the texture sample. We use graph cuts for texture transfer, adapting this scheme to the context of surface synthesis. The resulting surface textures are realistic, tolerant of local mesh detail and are comparable to results produced by texture neighbourhood sampling approaches.
- Full Text:
- Date Issued: 2006
- Authors: Bangay, Shaun D , Morkel, Chantelle
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433351 , vital:72964 , https://doi.org/10.1145/1108590.1108601
- Description: Existing texture synthesis-from example strategies for polygon meshes typically make use of three components: a multi-resolution mesh hierarchy that allows the overall nature of the pattern to be reproduced before filling in detail; a matching strategy that extends the synthesized texture using the best fit from a texture sample; and a transfer mechanism that copies the selected portion of the texture sample to the target surface. We introduce novel alternatives for each of these components. Use of √2-subdivision surfaces provides the mesh hierarchy and allows fine control over the surface complexity. Adaptive subdivision is used to create an even vertex distribution over the surface. Use of the graph defined by a surface region for matching, rather than a regular texture neighbourhood, provides for flexible control over the scale of the texture and allows simultaneous matching against multiple levels of an image pyramid created from the texture sample. We use graph cuts for texture transfer, adapting this scheme to the context of surface synthesis. The resulting surface textures are realistic, tolerant of local mesh detail and are comparable to results produced by texture neighbourhood sampling approaches.
- Full Text:
- Date Issued: 2006
Hierarchical rule generalisation for speaker identification in fiction books
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433174 , vital:72949 , https://doi.org/10.1145/1216262.1216266
- Description: This paper presents a hierarchical pattern matching and generalisation technique which is applied to the problem of locating the correct speaker of quoted speech found in fiction books. Patterns from a training set are generalised to create a small number of rules, which can be used to identify items of interest within the text. The pattern matching technique is applied to finding the Speech-Verb, Actor and Speaker of quotes found in fiction books. The technique performs well over the training data, resulting in rule-sets many times smaller than the training set, but providing very high accuracy. While the rule-set generalised from one book is less effective when applied to different books than an approach based on hand coded heuristics, performance is comparable when testing on data closely related to the training set.
- Full Text:
- Date Issued: 2006
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433174 , vital:72949 , https://doi.org/10.1145/1216262.1216266
- Description: This paper presents a hierarchical pattern matching and generalisation technique which is applied to the problem of locating the correct speaker of quoted speech found in fiction books. Patterns from a training set are generalised to create a small number of rules, which can be used to identify items of interest within the text. The pattern matching technique is applied to finding the Speech-Verb, Actor and Speaker of quotes found in fiction books. The technique performs well over the training data, resulting in rule-sets many times smaller than the training set, but providing very high accuracy. While the rule-set generalised from one book is less effective when applied to different books than an approach based on hand coded heuristics, performance is comparable when testing on data closely related to the training set.
- Full Text:
- Date Issued: 2006
Oceanographic environment of the Sodwana Bay coelacanths (Latimeria chalumnae), South Africa
- Roberts, M J, Ribbink, Anthony J, Morris, T
- Authors: Roberts, M J , Ribbink, Anthony J , Morris, T
- Date: 2006
- Language: English
- Type: text , Article
- Identifier: vital:7156 , http://hdl.handle.net/10962/d1011883
- Description: Trimix scuba divers discovered coelacanths in Jesser Canyon at a depth of 104 m on the northern KwaZulu-Natal (KZN) coast (Sodwana Bay) in October 2000. The existence of these animals at such a shallow depth and in the swift and powerful Agulhas Current led to a suggestion that this might be an isolated group swept well away from the main population in the Comoros, where they live at depths of 200–350 m with little current. Subsequent observations from three manned submersible surveys and one remotely operated vehicle expedition together with recreational diver observations indicate that the South African population of coelacanths has at least 26 individuals, mostly occupying the depth range of 104–140 m in canyons. Seventeen CTD sections collected during four cruises in 2002 and 2003 indicate the temperature range in this habitat to be similar to that found in the Comoros Islands (that is, 15–22°C cf. 15–19°C in the Comoros). However, a 2.5-month-long time series of hourly data collected by a thermistor array deployed near a known coelacanth cave in Wright Canyon indicated greater variation than anticipated, with temperature changes between 16°C and 24°C occurring in a day. Dissolved oxygen levels in this depth zone were found to range between 3.0 ml l[superscript (–1)] and 4.8 ml l[superscript (–1)] compared to 3.5 ml l[superscript (–1)] in the Comoros. The low oxygen values along this coast are a result of the shallow oxygen minimum, which becomes shallower in the southwest Indian Ocean, particularly in the Agulhas Current, than in tropical latitudes. Current velocities measured using a ship-borne ADCP in the depth range 100–140 m at Sodwana were considerably higher than those measured in the Comoros habitat (20–60 cm s[superscript (–1)] cf. 3–4 cm s[superscript (–1)]) and may be an important factor explaining the coelacanths’ occupation of the canyons found along the northern KZN shelf-break.
- Full Text:
- Date Issued: 2006
- Authors: Roberts, M J , Ribbink, Anthony J , Morris, T
- Date: 2006
- Language: English
- Type: text , Article
- Identifier: vital:7156 , http://hdl.handle.net/10962/d1011883
- Description: Trimix scuba divers discovered coelacanths in Jesser Canyon at a depth of 104 m on the northern KwaZulu-Natal (KZN) coast (Sodwana Bay) in October 2000. The existence of these animals at such a shallow depth and in the swift and powerful Agulhas Current led to a suggestion that this might be an isolated group swept well away from the main population in the Comoros, where they live at depths of 200–350 m with little current. Subsequent observations from three manned submersible surveys and one remotely operated vehicle expedition together with recreational diver observations indicate that the South African population of coelacanths has at least 26 individuals, mostly occupying the depth range of 104–140 m in canyons. Seventeen CTD sections collected during four cruises in 2002 and 2003 indicate the temperature range in this habitat to be similar to that found in the Comoros Islands (that is, 15–22°C cf. 15–19°C in the Comoros). However, a 2.5-month-long time series of hourly data collected by a thermistor array deployed near a known coelacanth cave in Wright Canyon indicated greater variation than anticipated, with temperature changes between 16°C and 24°C occurring in a day. Dissolved oxygen levels in this depth zone were found to range between 3.0 ml l[superscript (–1)] and 4.8 ml l[superscript (–1)] compared to 3.5 ml l[superscript (–1)] in the Comoros. The low oxygen values along this coast are a result of the shallow oxygen minimum, which becomes shallower in the southwest Indian Ocean, particularly in the Agulhas Current, than in tropical latitudes. Current velocities measured using a ship-borne ADCP in the depth range 100–140 m at Sodwana were considerably higher than those measured in the Comoros habitat (20–60 cm s[superscript (–1)] cf. 3–4 cm s[superscript (–1)]) and may be an important factor explaining the coelacanths’ occupation of the canyons found along the northern KZN shelf-break.
- Full Text:
- Date Issued: 2006
Preliminary observations of tag shedding, tag reporting, tag wounds, and tag biofouling for raggedtooth sharks (Carcharias taurus) tagged off the east coast of South Africa
- Dicken, Matthew Laurence, Booth, Anthony J, Smale, Malcolm John
- Authors: Dicken, Matthew Laurence , Booth, Anthony J , Smale, Malcolm John
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/125774 , vital:35816 , https://doi.10.1016/j.icesjms.2006.06.009
- Description: Mark-recapture models do not distinguish how ‘‘deaths’’ accrue to marked animals in the population. If animals lose their tags, then recaptures will be fewer than expected and estimates of survival will be underestimated (Arnason and Mills, 1981; McDonald et al., 2003). Similarly, if the non-reporting rate is unknown and assumed to be negligible, as is the case in some tagging studies (e.g. Cliff et al., 1996, for white sharks Carcharodon carcharias), the probability of capture can be underestimated. The effects of both these problems, inherent in cooperative tagging programmes, lead to too few tagged fish being recovered, with a positive bias on the estimation of population size. These effects are most pronounced when capture probability is low and fewer tags are available for recapture (McDonald et al., 2003).
- Full Text:
- Date Issued: 2006
- Authors: Dicken, Matthew Laurence , Booth, Anthony J , Smale, Malcolm John
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/125774 , vital:35816 , https://doi.10.1016/j.icesjms.2006.06.009
- Description: Mark-recapture models do not distinguish how ‘‘deaths’’ accrue to marked animals in the population. If animals lose their tags, then recaptures will be fewer than expected and estimates of survival will be underestimated (Arnason and Mills, 1981; McDonald et al., 2003). Similarly, if the non-reporting rate is unknown and assumed to be negligible, as is the case in some tagging studies (e.g. Cliff et al., 1996, for white sharks Carcharodon carcharias), the probability of capture can be underestimated. The effects of both these problems, inherent in cooperative tagging programmes, lead to too few tagged fish being recovered, with a positive bias on the estimation of population size. These effects are most pronounced when capture probability is low and fewer tags are available for recapture (McDonald et al., 2003).
- Full Text:
- Date Issued: 2006
Procedural modeling facilities for hierarchical object generation
- Morkel, Chantelle, Bangay, Shaun D
- Authors: Morkel, Chantelle , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433268 , vital:72958 , https://doi.org/10.1145/1108590.1108614
- Description: We modify a selection of interactive modeling tools for use in a procedural modeling environment. These tools are selection, extrusion, subdivision and curve shaping. We create human models to demonstrate that these tools are appropriate for use on hierarchical objects. Our tools support the main benefits of procedural modeling, which are: the use of parameterisation to control and very a model, varying levels of detail, increased model complexity, base shape independence and database amplification. We demonstrate scripts which provide each of these benefits.
- Full Text:
- Date Issued: 2006
- Authors: Morkel, Chantelle , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433268 , vital:72958 , https://doi.org/10.1145/1108590.1108614
- Description: We modify a selection of interactive modeling tools for use in a procedural modeling environment. These tools are selection, extrusion, subdivision and curve shaping. We create human models to demonstrate that these tools are appropriate for use on hierarchical objects. Our tools support the main benefits of procedural modeling, which are: the use of parameterisation to control and very a model, varying levels of detail, increased model complexity, base shape independence and database amplification. We demonstrate scripts which provide each of these benefits.
- Full Text:
- Date Issued: 2006
The distribution and abundance of the endangered Knysna seahorse Hippocampus capensis (Pisces: Syngnathidae) in South African estuaries
- Lockyear, Jacqueline F, Hecht, Thomas, Kaiser, Horst, Teske, Peter R
- Authors: Lockyear, Jacqueline F , Hecht, Thomas , Kaiser, Horst , Teske, Peter R
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/445714 , vital:74416 , https://doi.org/10.2989/16085910609503897
- Description: The occurrence, distribution and abundance of the endangered Knysna seahorse Hippocampus capensis in 10 estuaries on South Africa's warm temperate south coast, were investigated. Seahorses were found only in the Knysna, Swartvlei and Keurbooms estuaries. Sex ratios were even and, in most cases, more adults were found than juveniles. During the first year of study, seahorse densities were higher in the Swartvlei and Keurbooms estuaries than in the comparatively larger Knysna Estuary but, during the second year, seahorses were absent from the Keurbooms estuary, and the population size in the Swartvlei Estuary had decreased by more than 80%. These results suggest that, although the two smaller estuaries are able to support comparatively high densities of seahorses, population sizes may fluctuate considerably. Population size estimates for the Knysna Estuary were similar to those obtained in a previous study, suggesting that this estuary may represent a more stable environment and may thus be particularly important for the survival and conservation of this species.
- Full Text:
- Date Issued: 2006
- Authors: Lockyear, Jacqueline F , Hecht, Thomas , Kaiser, Horst , Teske, Peter R
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/445714 , vital:74416 , https://doi.org/10.2989/16085910609503897
- Description: The occurrence, distribution and abundance of the endangered Knysna seahorse Hippocampus capensis in 10 estuaries on South Africa's warm temperate south coast, were investigated. Seahorses were found only in the Knysna, Swartvlei and Keurbooms estuaries. Sex ratios were even and, in most cases, more adults were found than juveniles. During the first year of study, seahorse densities were higher in the Swartvlei and Keurbooms estuaries than in the comparatively larger Knysna Estuary but, during the second year, seahorses were absent from the Keurbooms estuary, and the population size in the Swartvlei Estuary had decreased by more than 80%. These results suggest that, although the two smaller estuaries are able to support comparatively high densities of seahorses, population sizes may fluctuate considerably. Population size estimates for the Knysna Estuary were similar to those obtained in a previous study, suggesting that this estuary may represent a more stable environment and may thus be particularly important for the survival and conservation of this species.
- Full Text:
- Date Issued: 2006
The Representation of, and Control over Mixing Desks via a Software-Based Matrix
- Foss, Richard, Foulkes, Phillip
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427306 , vital:72429 , https://www.aes.org/e-lib/browse.cfm?elib=13701
- Description: The control over all the parameters of a mixing desk can be a daunting task. This paper describes a software system that has been created to represent the signal processing and routing functions of MIDI-controllable mixing desks in a conceptually clear manner. Input to output routings are displayed in the form of a matrix, while signal processing functionality can be accessed at the inputs, outputs, and cross-points. XML is used to capture the elements of the mixing desk, and to associate appropriate MIDI control messages with these elements. This enables the same matrix template to be used for many mixing desks. Remote control is enabled by IP-based MIDI routing software known as MIDINet.
- Full Text:
- Date Issued: 2006
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427306 , vital:72429 , https://www.aes.org/e-lib/browse.cfm?elib=13701
- Description: The control over all the parameters of a mixing desk can be a daunting task. This paper describes a software system that has been created to represent the signal processing and routing functions of MIDI-controllable mixing desks in a conceptually clear manner. Input to output routings are displayed in the form of a matrix, while signal processing functionality can be accessed at the inputs, outputs, and cross-points. XML is used to capture the elements of the mixing desk, and to associate appropriate MIDI control messages with these elements. This enables the same matrix template to be used for many mixing desks. Remote control is enabled by IP-based MIDI routing software known as MIDINet.
- Full Text:
- Date Issued: 2006
An investigation into unintentional information leakage through electronic publication
- Forrester, Jock, Irwin, Barry V W
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428814 , vital:72538 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/012_Article.pdf
- Description: Organisations are publishing electronic documents on their websites, via email to clients and potentially un-trusted third parties. This trend can be attributed to the ease of use of desktop publishing/editing soft-ware as well as the increasingly connected environment that employ-ees work in. Advanced document editors have features that enable the use of group editing, version control and multi-user authoring. Unfortu-nately these advanced features also have their disadvantages. Metadata used to enable the collaborative features can unintentionally expose confidential data to unauthorised users once the document has been published.
- Full Text:
- Date Issued: 2005
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428814 , vital:72538 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/012_Article.pdf
- Description: Organisations are publishing electronic documents on their websites, via email to clients and potentially un-trusted third parties. This trend can be attributed to the ease of use of desktop publishing/editing soft-ware as well as the increasingly connected environment that employ-ees work in. Advanced document editors have features that enable the use of group editing, version control and multi-user authoring. Unfortu-nately these advanced features also have their disadvantages. Metadata used to enable the collaborative features can unintentionally expose confidential data to unauthorised users once the document has been published.
- Full Text:
- Date Issued: 2005
An Open Design and Implementation for the Enabler Component of the Plural Node Architecture of Professional Audio Devices
- Foss, Richard, Fujimori, J I, Okai-Tettey, Harold
- Authors: Foss, Richard , Fujimori, J I , Okai-Tettey, Harold
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427225 , vital:72423 , https://www.aes.org/e-lib/browse.cfm?elib=13327
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. An Open Generic Transporter specification has been developed for the Transporter component. This paper details an open design and implementation for the Enabler component that allows for connection management via abstract, mLAN plugs.
- Full Text:
- Date Issued: 2005
- Authors: Foss, Richard , Fujimori, J I , Okai-Tettey, Harold
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427225 , vital:72423 , https://www.aes.org/e-lib/browse.cfm?elib=13327
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. An Open Generic Transporter specification has been developed for the Transporter component. This paper details an open design and implementation for the Enabler component that allows for connection management via abstract, mLAN plugs.
- Full Text:
- Date Issued: 2005
An Open Generic Transporter Specification for the Plural Node Architecture of Professional Audio Devices
- Foss, Richard, Fujimori, J I, Kounosu, Ken, Laubscher, Ron
- Authors: Foss, Richard , Fujimori, J I , Kounosu, Ken , Laubscher, Ron
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427239 , vital:72424 , https://www.aes.org/e-lib/browse.cfm?elib=13191
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The A/M protocol determines how audio and MIDI data are transported over IEEE 1394 (firewire). The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. Low level control of individual Transporters occurs within the “Hardware Abstraction Layer” (HAL) of the Enabler. Device manufacturers write their own plug-ins for the HAL to interact with their Transporters. The Open Generic Transporter specification provides an open interface between the HAL and Transporter for the convenience of device manufacturers.
- Full Text:
- Date Issued: 2005
- Authors: Foss, Richard , Fujimori, J I , Kounosu, Ken , Laubscher, Ron
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427239 , vital:72424 , https://www.aes.org/e-lib/browse.cfm?elib=13191
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The A/M protocol determines how audio and MIDI data are transported over IEEE 1394 (firewire). The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. Low level control of individual Transporters occurs within the “Hardware Abstraction Layer” (HAL) of the Enabler. Device manufacturers write their own plug-ins for the HAL to interact with their Transporters. The Open Generic Transporter specification provides an open interface between the HAL and Transporter for the convenience of device manufacturers.
- Full Text:
- Date Issued: 2005
Computers and African languages in education: an ICT tool for the promotion of multilingualism at a South African university: conversations
- Dalvit, Lorenzo, Murray, Sarah, Mini, Buyiswa, Terzoli, Alfredo, Zhao, Xiaogeng
- Authors: Dalvit, Lorenzo , Murray, Sarah , Mini, Buyiswa , Terzoli, Alfredo , Zhao, Xiaogeng
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428911 , vital:72545 , https://hdl.handle.net/10520/EJC87340
- Description: This article describes a web-based application designed to provide meaningful access to the study of Computer Science to speakers of an African language who have limited experience of using English for ac-ademic purposes. Our research is focused upon students of Computer Skills in the Extended Studies Programme at Rhodes University who have studied English as a second language for the matriculation exam-ination. The intervention involves the cooperative production and shar-ing of multilingual support material in both English and the students' home languages. The article illustrates how the use of computers has the potential to solve some of the problems traditionally associated with the use of African languages as additional media of instruction in ter-tiary education (i.e. lack of terminology and resources in the African languages, stigma attached to their use, etc.). We maintain that learning about computers partly in their stronger language (i.e. their home lan-guage) could give students increased and more meaningful access to an educationally and economically empowering field of study.
- Full Text:
- Date Issued: 2005
- Authors: Dalvit, Lorenzo , Murray, Sarah , Mini, Buyiswa , Terzoli, Alfredo , Zhao, Xiaogeng
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428911 , vital:72545 , https://hdl.handle.net/10520/EJC87340
- Description: This article describes a web-based application designed to provide meaningful access to the study of Computer Science to speakers of an African language who have limited experience of using English for ac-ademic purposes. Our research is focused upon students of Computer Skills in the Extended Studies Programme at Rhodes University who have studied English as a second language for the matriculation exam-ination. The intervention involves the cooperative production and shar-ing of multilingual support material in both English and the students' home languages. The article illustrates how the use of computers has the potential to solve some of the problems traditionally associated with the use of African languages as additional media of instruction in ter-tiary education (i.e. lack of terminology and resources in the African languages, stigma attached to their use, etc.). We maintain that learning about computers partly in their stronger language (i.e. their home lan-guage) could give students increased and more meaningful access to an educationally and economically empowering field of study.
- Full Text:
- Date Issued: 2005
Securing Real-time multimedia: A brief survey
- Cloran, Russell, Irwin, Barry V W, Terzoli, Alfredo
- Authors: Cloran, Russell , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428887 , vital:72543 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Research/020_Article.pdf
- Description: Voice over IP (VoIP) enables cheaper and easier communication but can be less secure than the traditional TDM network. This paper is a guide to securing VoIP networks using current technologies and best practices. Physical and logical segregation of data and multimedia traf-fic is discussed. Current VoIP analysis tools are described with specific reference to their usefulness as a means of evaluating the quality of a secure VoIP system. Protocol enhancements, such as the Secure Re-al-time Transport Protocol and transport layer protection such as of-fered by IPSec, are discussed and evaluated. Finally, various secure VoIP implementation scenarios are discussed, with configurations combining these security solutions presented in the paper.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428887 , vital:72543 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Research/020_Article.pdf
- Description: Voice over IP (VoIP) enables cheaper and easier communication but can be less secure than the traditional TDM network. This paper is a guide to securing VoIP networks using current technologies and best practices. Physical and logical segregation of data and multimedia traf-fic is discussed. Current VoIP analysis tools are described with specific reference to their usefulness as a means of evaluating the quality of a secure VoIP system. Protocol enhancements, such as the Secure Re-al-time Transport Protocol and transport layer protection such as of-fered by IPSec, are discussed and evaluated. Finally, various secure VoIP implementation scenarios are discussed, with configurations combining these security solutions presented in the paper.
- Full Text:
- Date Issued: 2005
Trust on the Web
- Cloran, Russell, Irwin, Barry V W
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428900 , vital:72544 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Full/025_Article.pdf
- Description: This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the au-thority of information found on the web. We use a case study of a suspected phish-ing scam in South Africa to examine the methods an advanced user may use to veri-fy the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner in which information is presented and the failure to use es-tablished industry best practices. We discuss a number of ways in which doubt may have been eliminated. We then discuss how a distributed trust system, as favoured by many researchers in trust on the semantic web, may have been implemented in this case to prove the authenticity of the site without the traditional means involv-ing the high cost of a digital certificate from a recognised Certificate Authority.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428900 , vital:72544 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Full/025_Article.pdf
- Description: This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the au-thority of information found on the web. We use a case study of a suspected phish-ing scam in South Africa to examine the methods an advanced user may use to veri-fy the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner in which information is presented and the failure to use es-tablished industry best practices. We discuss a number of ways in which doubt may have been eliminated. We then discuss how a distributed trust system, as favoured by many researchers in trust on the semantic web, may have been implemented in this case to prove the authenticity of the site without the traditional means involv-ing the high cost of a digital certificate from a recognised Certificate Authority.
- Full Text:
- Date Issued: 2005
Unlocking the armour: enabling intrusion detection and analysis of encrypted traffic streams
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Date Issued: 2005
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Date Issued: 2005