The PINIT domain of PIAS3: structure-function analysis of its interaction with STAT3
- Mautsa, Nicodemus, Prinsloo, Earl, Tastan Bishop, Özlem, Blatch, Gregory L
- Authors: Mautsa, Nicodemus , Prinsloo, Earl , Tastan Bishop, Özlem , Blatch, Gregory L
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/148082 , vital:38708 , DOI: 10.1002/jmr.1111
- Description: The protein inhibitor of activated signal transducer and activator of transcription 3 (PIAS3) regulates the transcriptional activity of signal transducer and activator of transcription 3 (STAT3) which regulates transcription of genes involved in cell growth, proliferation and apoptosis. The conserved proline, isoleucine, asparagine, isoleucine, threonine (PINIT) domain of PIAS3 is thought to promote STAT3–PIAS3 interaction.
- Full Text:
- Date Issued: 2011
- Authors: Mautsa, Nicodemus , Prinsloo, Earl , Tastan Bishop, Özlem , Blatch, Gregory L
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/148082 , vital:38708 , DOI: 10.1002/jmr.1111
- Description: The protein inhibitor of activated signal transducer and activator of transcription 3 (PIAS3) regulates the transcriptional activity of signal transducer and activator of transcription 3 (STAT3) which regulates transcription of genes involved in cell growth, proliferation and apoptosis. The conserved proline, isoleucine, asparagine, isoleucine, threonine (PINIT) domain of PIAS3 is thought to promote STAT3–PIAS3 interaction.
- Full Text:
- Date Issued: 2011
The xfn connection management and control protocol
- Foss, Richard, Gurdan, Robby, Klinkradt, Bradley, Chigwamba, Nyasha
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427137 , vital:72417 , https://www.aes.org/e-lib/browse.cfm?elib=16143
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, enables the streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper describes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the functional layout of the device.
- Full Text:
- Date Issued: 2011
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427137 , vital:72417 , https://www.aes.org/e-lib/browse.cfm?elib=16143
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, enables the streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper describes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the functional layout of the device.
- Full Text:
- Date Issued: 2011
Towards a standard model for networked audio devices
- Eales, Andrew, Foss, Richard
- Authors: Eales, Andrew , Foss, Richard
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427151 , vital:72418 , https://www.aes.org/e-lib/online/browse.cfm?elib=16144
- Description: Different control protocols for networked audio devices typically emphasize particular aspects of a device, such as the representation of parameter data, or a representation of the functional structure of a device. A sophisticated device model must represent parameter data, device structure and the visual presentation of controls. Parameter data should be related to the device structure, while also being represented within a flexible, logical hierarchy. The development of a standard device model is proposed and discussed with reference to the OSC, IEC62379, ACN and X170 control protocols. This abstract model is independent of any specific control protocol, and provides support for interoperability between control protocols. The proposed model is also discussed within the context of an object-based approach to service enumeration and control using an associative, shared memory model.
- Full Text:
- Date Issued: 2011
- Authors: Eales, Andrew , Foss, Richard
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427151 , vital:72418 , https://www.aes.org/e-lib/online/browse.cfm?elib=16144
- Description: Different control protocols for networked audio devices typically emphasize particular aspects of a device, such as the representation of parameter data, or a representation of the functional structure of a device. A sophisticated device model must represent parameter data, device structure and the visual presentation of controls. Parameter data should be related to the device structure, while also being represented within a flexible, logical hierarchy. The development of a standard device model is proposed and discussed with reference to the OSC, IEC62379, ACN and X170 control protocols. This abstract model is independent of any specific control protocol, and provides support for interoperability between control protocols. The proposed model is also discussed within the context of an object-based approach to service enumeration and control using an associative, shared memory model.
- Full Text:
- Date Issued: 2011
When breast is not best: young women and breast reduction surgery
- Lamb, Tessa, Vincent, Louise
- Authors: Lamb, Tessa , Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141832 , vital:38008 , DOI: 10.1080/10130950.2011.610978
- Description: Most cosmetic surgery patients in South Africa are younger than 21, and in this focus we examine narrative accounts from young South African women who have chosen to undergo cosmetic breast reduction surgery. Feminist debates on cosmetic surgery have focused on the question of whether to regard women who modify their bodies in this way as active agents engaged in liberatory ‘body projects’, or whether such projects are evidence of their subjection to oppressive stereotypes and beauty norms. The latter perspective is challenged here by the participants’ characterisation of breast reduction surgery as profoundly ‘freeing’. The article deals in particular with the conscious choice of participants to knowingly risk not being able to breastfeed children in future in order to achieve a body type which conforms to their understanding of youthful beauty and sexuality.
- Full Text:
- Date Issued: 2011
- Authors: Lamb, Tessa , Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141832 , vital:38008 , DOI: 10.1080/10130950.2011.610978
- Description: Most cosmetic surgery patients in South Africa are younger than 21, and in this focus we examine narrative accounts from young South African women who have chosen to undergo cosmetic breast reduction surgery. Feminist debates on cosmetic surgery have focused on the question of whether to regard women who modify their bodies in this way as active agents engaged in liberatory ‘body projects’, or whether such projects are evidence of their subjection to oppressive stereotypes and beauty norms. The latter perspective is challenged here by the participants’ characterisation of breast reduction surgery as profoundly ‘freeing’. The article deals in particular with the conscious choice of participants to knowingly risk not being able to breastfeed children in future in order to achieve a body type which conforms to their understanding of youthful beauty and sexuality.
- Full Text:
- Date Issued: 2011
A histological description of ovarian recrudescence in two Labeo victorianus populations
- Booth, Anthony J, Hecht, Thomas
- Authors: Booth, Anthony J , Hecht, Thomas
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123564 , vital:35455 , https://doi.org/10.2989/16085910409503813
- Description: The ovaries of Labeo victorianus are paired organs situated in the peritoneal cavity and suspended on either side of the midline by a mesovarium. A capsule, composed of dense, regularly-arranged collagen and elastic fibres mixed with a few smooth muscle cells, enclosed the ovaries and gave off connective tissue septa, forming the ovigerous lamellae, which contained germ and follicle cells. Eight discrete stages of recrudescence were identified: oogonia, chromatin nucleolar oocytes, perinucleolar oocytes, primary yolk vesicle oocytes, secondary yolk vesicle oocytes, tertiary yolk vesicle oocytes, post-ovulatory follicles and atretic oocytes. Ovulation seemed to be synchronised with the onset of rainfall, with some deviations in the Sio River population. Gonadosomatic index variation followed a bimodal pattern, with maxima between January–February and between September–October for both populations. The same pattern was exhibited for both rainfall and water levels at the two study sites. Successful ovulation was followed by the formation of post-ovulatory follicles and Type I atresia, while failed spawning was characterised by Type II atresia. Clearance of post-ovulatory follicles was by phagocytosis and formation of melanomacrophage centres. There were variations in post-ovulatory changes between the two populations. Reproductive patterns in the Kagera River population conformed to the ‘norm’ in African labeines of the synchronisation of spawning with rainfall. Slight deviations from this pattern were, however, observed in the Sio River population where spawning occurred prior to the onset of rainfall.
- Full Text:
- Date Issued: 2010
- Authors: Booth, Anthony J , Hecht, Thomas
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123564 , vital:35455 , https://doi.org/10.2989/16085910409503813
- Description: The ovaries of Labeo victorianus are paired organs situated in the peritoneal cavity and suspended on either side of the midline by a mesovarium. A capsule, composed of dense, regularly-arranged collagen and elastic fibres mixed with a few smooth muscle cells, enclosed the ovaries and gave off connective tissue septa, forming the ovigerous lamellae, which contained germ and follicle cells. Eight discrete stages of recrudescence were identified: oogonia, chromatin nucleolar oocytes, perinucleolar oocytes, primary yolk vesicle oocytes, secondary yolk vesicle oocytes, tertiary yolk vesicle oocytes, post-ovulatory follicles and atretic oocytes. Ovulation seemed to be synchronised with the onset of rainfall, with some deviations in the Sio River population. Gonadosomatic index variation followed a bimodal pattern, with maxima between January–February and between September–October for both populations. The same pattern was exhibited for both rainfall and water levels at the two study sites. Successful ovulation was followed by the formation of post-ovulatory follicles and Type I atresia, while failed spawning was characterised by Type II atresia. Clearance of post-ovulatory follicles was by phagocytosis and formation of melanomacrophage centres. There were variations in post-ovulatory changes between the two populations. Reproductive patterns in the Kagera River population conformed to the ‘norm’ in African labeines of the synchronisation of spawning with rainfall. Slight deviations from this pattern were, however, observed in the Sio River population where spawning occurred prior to the onset of rainfall.
- Full Text:
- Date Issued: 2010
A Proxy Approach for Interoperability and Common Control of Networked Digital Audio Devices
- Igumbor, Osedum P, Foss, Richard
- Authors: Igumbor, Osedum P , Foss, Richard
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427099 , vital:72414 , https://www.aes.org/e-lib/browse.cfm?elib=15338
- Description: This paper highlights the challenge that results from the availability of a large number of control protocols within the context of digital audio networks. Devices that conform to different protocols are unable to communicate with one another, even though they might be utilizing the same networking technology (Ethernet, IEEE 1394 serial bus, USB). This paper describes the use of a proxy that allows for high-level device interaction (by sending protocol messages) between networked devices. Furthermore, the proxy allows for a common controller to control the disparate networked devices.
- Full Text:
- Date Issued: 2010
- Authors: Igumbor, Osedum P , Foss, Richard
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427099 , vital:72414 , https://www.aes.org/e-lib/browse.cfm?elib=15338
- Description: This paper highlights the challenge that results from the availability of a large number of control protocols within the context of digital audio networks. Devices that conform to different protocols are unable to communicate with one another, even though they might be utilizing the same networking technology (Ethernet, IEEE 1394 serial bus, USB). This paper describes the use of a proxy that allows for high-level device interaction (by sending protocol messages) between networked devices. Furthermore, the proxy allows for a common controller to control the disparate networked devices.
- Full Text:
- Date Issued: 2010
Does reservoir trophic status influence the feeding and growth of the sharptooth catfish, Clarias gariepinus (Teleostei: Clariidae)?
- Potts, Warren M, Hecht, Thomas, Andrew, Timothy G
- Authors: Potts, Warren M , Hecht, Thomas , Andrew, Timothy G
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124309 , vital:35591 , https://doi.org/10.2989/A JAS.2008.33.2.6.503
- Description: The diet and growth of sharptooth catfish, Clarias gariepinus, in an oligotrophic system (Kat River Reservoir, Eastern Cape, South Africa) were compared to those in a eutrophic system (Laing Reservoir, Eastern Cape) to determine if the trophic status of a waterbody had an effect on the growth rate of the species. In order of importance, the diet of catfish in Kat River Reservoir consisted of fish, insects, zooplankton, plant material and other items, while the diet of catfish in Laing Reservoir consisted of fish, plant material, zooplankton, other vertebrates and insects. The diets of catfish in the two reservoirs had a similarity index of 68.1% and there was no significant difference in their nutritional value. Fish prey was the most important dietary component in both reservoirs. Temperature regime and zooplankton and zoobenthos density were similar in both systems. However, fish prey density was significantly higher in the eutrophic Laing Reservoir and catfish grew significantly faster in that system. The slower growth rate in Kat River Reservoir was attributed to the higher energy costs associated with the capture of fish prey, which was less abundant than in Laing Reservoir. Trophic status therefore had an indirect effect on catfish growth by influencing the availability of fish prey.
- Full Text:
- Date Issued: 2010
- Authors: Potts, Warren M , Hecht, Thomas , Andrew, Timothy G
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124309 , vital:35591 , https://doi.org/10.2989/A JAS.2008.33.2.6.503
- Description: The diet and growth of sharptooth catfish, Clarias gariepinus, in an oligotrophic system (Kat River Reservoir, Eastern Cape, South Africa) were compared to those in a eutrophic system (Laing Reservoir, Eastern Cape) to determine if the trophic status of a waterbody had an effect on the growth rate of the species. In order of importance, the diet of catfish in Kat River Reservoir consisted of fish, insects, zooplankton, plant material and other items, while the diet of catfish in Laing Reservoir consisted of fish, plant material, zooplankton, other vertebrates and insects. The diets of catfish in the two reservoirs had a similarity index of 68.1% and there was no significant difference in their nutritional value. Fish prey was the most important dietary component in both reservoirs. Temperature regime and zooplankton and zoobenthos density were similar in both systems. However, fish prey density was significantly higher in the eutrophic Laing Reservoir and catfish grew significantly faster in that system. The slower growth rate in Kat River Reservoir was attributed to the higher energy costs associated with the capture of fish prey, which was less abundant than in Laing Reservoir. Trophic status therefore had an indirect effect on catfish growth by influencing the availability of fish prey.
- Full Text:
- Date Issued: 2010
Factors affecting recapture rates of raggedtooth sharks Carcharias taurus tagged off the east coast of South Africa
- Dicken, Matthew L, Booth, Anthony J, Smale, Malcolm J
- Authors: Dicken, Matthew L , Booth, Anthony J , Smale, Malcolm J
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124493 , vital:35618 , https://doi.10.2989/AJMS.2009.31.3.9.997
- Description: Understanding differences in the recapture rate between different tags (A-, B- and C-types), capture methods (rock-and-surf anglers, scientific divers and Natal Sharks Board protection nets) and life-history stages (juvenile and adult) is critical in evaluating the results obtained from cooperative tagging programmes (CTPs). A generalised linear modelling approach, using a log-linear model, was used to determine significant differences in the probability of recapture between these various factors using data from the Oceanographic Research Institute and Port Elizabeth Museum CTPs. Between 1984 and 2004, a total of 3 385 raggedtooth sharks Carcharias taurus was tagged by volunteers from both programmes along the east coast of South Africa. A likelihood ratio test indicated significant differences in the probability of recapture between A- and C-type and B- and C-type tags (p < 0.01), between different capture methods (p < 0.05) and between juvenile and adult sharks (p < 0.01). A comparison of recapture rates between members of the CTPs also indicated a marked variability in the performance of individual taggers. The study highlights important data-quality issues inherent in large CTPs.
- Full Text:
- Date Issued: 2010
- Authors: Dicken, Matthew L , Booth, Anthony J , Smale, Malcolm J
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124493 , vital:35618 , https://doi.10.2989/AJMS.2009.31.3.9.997
- Description: Understanding differences in the recapture rate between different tags (A-, B- and C-types), capture methods (rock-and-surf anglers, scientific divers and Natal Sharks Board protection nets) and life-history stages (juvenile and adult) is critical in evaluating the results obtained from cooperative tagging programmes (CTPs). A generalised linear modelling approach, using a log-linear model, was used to determine significant differences in the probability of recapture between these various factors using data from the Oceanographic Research Institute and Port Elizabeth Museum CTPs. Between 1984 and 2004, a total of 3 385 raggedtooth sharks Carcharias taurus was tagged by volunteers from both programmes along the east coast of South Africa. A likelihood ratio test indicated significant differences in the probability of recapture between A- and C-type and B- and C-type tags (p < 0.01), between different capture methods (p < 0.05) and between juvenile and adult sharks (p < 0.01). A comparison of recapture rates between members of the CTPs also indicated a marked variability in the performance of individual taggers. The study highlights important data-quality issues inherent in large CTPs.
- Full Text:
- Date Issued: 2010
Growth, reproduction and population structure of Diplotaxodon limnothrissa in the southeast arm of Lake Malawi
- Kanyerere, Geoffrey Z, Weyl, Olaf L F, Booth, Anthony J
- Authors: Kanyerere, Geoffrey Z , Weyl, Olaf L F , Booth, Anthony J
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124583 , vital:35633 , https://doi.org/10.2989/16085910509503832
- Description: With a surface area of ca 28 800km2, Lake Malawi (9°30’S–14°30’S) is the second largest of the African Rift Valley lakes, supporting at least 500, and possibly 2 000, fish species (Turner 1995). The ichthyofauna is dominated by haplochomine cichlids, most of which are confined to the demersal and littoral zones. As a result of over-fishing, the abundance of many of these species has declined (Turner 1994a, 1995, Bulirani et al. 1999, Allison et al. 2002). In contrast, the lake’s offshore fish stocks are considered to be unexploited or only lightly exploited (Thompson and Allison 1997, Turner et al. 2000) and the redirection of fishing effort to these stocks is a high priority (Thompson and Allison 1997, Turner et al. 2000, Allison et al. 2002). Consequently, the Malawi government is currently collaborating with the African Development Bank to develop the deepwater/ offshore fishery in order to increase yields by an estimated 11 000 tons (MC Banda, National Research co-ordinator, pers. comm.). The most abundant cichlid species in the pelagic zone is the small (<210mm TL) zooplanktivorous Diplotaxodon limnothrissa (Turner 1994, Thompson and Allison 1997). It has been recorded throughout the lake at depths ranging from 20 metres down to the anoxic zone at ca 220 metres (Turner 1994b, Thompson et al. 1996, Duponchelle et al. 2000a) and it makes up ca 52% to the total fish biomass (Thompson and Allison 1997). Diplotaxodon limnothrissa will therefore be a major target species in the pelagic fishery, and already comprises in excess of 50% of the mid-water trawl fishery in the southeast arm (SEA) of the lake (Turner 1996).
- Full Text:
- Date Issued: 2010
- Authors: Kanyerere, Geoffrey Z , Weyl, Olaf L F , Booth, Anthony J
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124583 , vital:35633 , https://doi.org/10.2989/16085910509503832
- Description: With a surface area of ca 28 800km2, Lake Malawi (9°30’S–14°30’S) is the second largest of the African Rift Valley lakes, supporting at least 500, and possibly 2 000, fish species (Turner 1995). The ichthyofauna is dominated by haplochomine cichlids, most of which are confined to the demersal and littoral zones. As a result of over-fishing, the abundance of many of these species has declined (Turner 1994a, 1995, Bulirani et al. 1999, Allison et al. 2002). In contrast, the lake’s offshore fish stocks are considered to be unexploited or only lightly exploited (Thompson and Allison 1997, Turner et al. 2000) and the redirection of fishing effort to these stocks is a high priority (Thompson and Allison 1997, Turner et al. 2000, Allison et al. 2002). Consequently, the Malawi government is currently collaborating with the African Development Bank to develop the deepwater/ offshore fishery in order to increase yields by an estimated 11 000 tons (MC Banda, National Research co-ordinator, pers. comm.). The most abundant cichlid species in the pelagic zone is the small (<210mm TL) zooplanktivorous Diplotaxodon limnothrissa (Turner 1994, Thompson and Allison 1997). It has been recorded throughout the lake at depths ranging from 20 metres down to the anoxic zone at ca 220 metres (Turner 1994b, Thompson et al. 1996, Duponchelle et al. 2000a) and it makes up ca 52% to the total fish biomass (Thompson and Allison 1997). Diplotaxodon limnothrissa will therefore be a major target species in the pelagic fishery, and already comprises in excess of 50% of the mid-water trawl fishery in the southeast arm (SEA) of the lake (Turner 1996).
- Full Text:
- Date Issued: 2010
Parallel packet classification using GPU co-processors
- Nottingham, Alistair, Irwin, Barry V W
- Authors: Nottingham, Alistair , Irwin, Barry V W
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430250 , vital:72677 , https://doi.org/10.1145/1899503.1899529
- Description: In the domain of network security, packet filtering for classification pur-poses is of significant interest. Packet classification provides a mecha-nism for understanding the composition of packet streams arriving at distinct network interfaces, and is useful in diagnosing threats and un-covering vulnerabilities so as to maximise data integrity and system se-curity. Traditional packet classifiers, such as PCAP, have utilised Con-trol Flow Graphs (CFGs) in representing filter sets, due to both their amenability to optimisation, and their inherent structural applicability to the metaphor of decision-based classification. Unfortunately, CFGs do not map well to cooperative processing implementations, and single-threaded CPU-based implementations have proven too slow for real-time classification against multiple arbitrary filters on next generation networks. In this paper, we consider a novel multithreaded classification algorithm, optimised for execution on GPU co-processors, intended to accelerate classification throughput and maximise processing efficien-cy in a highly parallel execution context.
- Full Text:
- Date Issued: 2010
- Authors: Nottingham, Alistair , Irwin, Barry V W
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430250 , vital:72677 , https://doi.org/10.1145/1899503.1899529
- Description: In the domain of network security, packet filtering for classification pur-poses is of significant interest. Packet classification provides a mecha-nism for understanding the composition of packet streams arriving at distinct network interfaces, and is useful in diagnosing threats and un-covering vulnerabilities so as to maximise data integrity and system se-curity. Traditional packet classifiers, such as PCAP, have utilised Con-trol Flow Graphs (CFGs) in representing filter sets, due to both their amenability to optimisation, and their inherent structural applicability to the metaphor of decision-based classification. Unfortunately, CFGs do not map well to cooperative processing implementations, and single-threaded CPU-based implementations have proven too slow for real-time classification against multiple arbitrary filters on next generation networks. In this paper, we consider a novel multithreaded classification algorithm, optimised for execution on GPU co-processors, intended to accelerate classification throughput and maximise processing efficien-cy in a highly parallel execution context.
- Full Text:
- Date Issued: 2010
Vice-Chancellor's welcoming address 2010
- Authors: Badat, Saleem
- Date: 2010
- Language: English
- Type: text
- Identifier: vital:7590 , http://hdl.handle.net/10962/d1006581
- Description: From introduction: Rhodes University, which means, you and I and academics and support staff, exists to serve three purposes. The first is to produce knowledge, so that we can advance understanding of our natural and social worlds and enrich our accumulated scientific and cultural heritage. As a university our second purpose is to disseminate knowledge and to cultivate minds. Our goal is to ensure that you can think imaginatively, “effectively and critically”; that you “achieve depth in some field of knowledge”; that you can critique and construct alternatives, that you can communicate cogently, orally and in writing, and that you have a “critical appreciation of the ways in which we gain knowledge and understanding of the universe, of society, and of ourselves” Our final purpose as a university is to undertake community engagement. On the one hand this involves your voluntary participation in community projects undertaken thorough our Community Engagement office. On the other hand, it involves service-learning, in which through your academic courses you take part “in activities where both the community” and you benefit, “and where the goals are to provide a service to the community and, equally, to enhance (your) learning through rendering this service”
- Full Text:
- Date Issued: 2010
- Authors: Badat, Saleem
- Date: 2010
- Language: English
- Type: text
- Identifier: vital:7590 , http://hdl.handle.net/10962/d1006581
- Description: From introduction: Rhodes University, which means, you and I and academics and support staff, exists to serve three purposes. The first is to produce knowledge, so that we can advance understanding of our natural and social worlds and enrich our accumulated scientific and cultural heritage. As a university our second purpose is to disseminate knowledge and to cultivate minds. Our goal is to ensure that you can think imaginatively, “effectively and critically”; that you “achieve depth in some field of knowledge”; that you can critique and construct alternatives, that you can communicate cogently, orally and in writing, and that you have a “critical appreciation of the ways in which we gain knowledge and understanding of the universe, of society, and of ourselves” Our final purpose as a university is to undertake community engagement. On the one hand this involves your voluntary participation in community projects undertaken thorough our Community Engagement office. On the other hand, it involves service-learning, in which through your academic courses you take part “in activities where both the community” and you benefit, “and where the goals are to provide a service to the community and, equally, to enhance (your) learning through rendering this service”
- Full Text:
- Date Issued: 2010
Visual technology for the autonomous learning of mathematics:
- Linneweber-Lammerskitten, Helmut, Schäfer, Marc, Samson, Duncan
- Authors: Linneweber-Lammerskitten, Helmut , Schäfer, Marc , Samson, Duncan
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140949 , vital:37931 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20930
- Description: This paper describes a collaborative research and development project between the University of Applied Sciences Northwestern Switzerland and Rhodes University in South Africa. The project seeks to establish, disseminate and research the efficacy and use of short video clips designed specifically for the autonomous learning of mathematics. Specific to the South African context is our interest in capitalising on the ubiquity of cellphone technology and the autonomous affordances offered by mobile learning. This paper engages with a number of theoretical and pedagogical issues relating to the design, production and use of these video clips. Although the focus is specific to the contexts of South Africa and Switzerland, the discussion is of broad applicability.
- Full Text:
- Date Issued: 2010
- Authors: Linneweber-Lammerskitten, Helmut , Schäfer, Marc , Samson, Duncan
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140949 , vital:37931 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20930
- Description: This paper describes a collaborative research and development project between the University of Applied Sciences Northwestern Switzerland and Rhodes University in South Africa. The project seeks to establish, disseminate and research the efficacy and use of short video clips designed specifically for the autonomous learning of mathematics. Specific to the South African context is our interest in capitalising on the ubiquity of cellphone technology and the autonomous affordances offered by mobile learning. This paper engages with a number of theoretical and pedagogical issues relating to the design, production and use of these video clips. Although the focus is specific to the contexts of South Africa and Switzerland, the discussion is of broad applicability.
- Full Text:
- Date Issued: 2010
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems
- Barnett, Richard J, Irwin, Barry V W
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
An Integrated Connection Management and Control Protocol for Audio Networks
- Foss, Richard, Gurdan, Robby, Klinkradt, Bradley, Chigwamba, Nyasha
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427111 , vital:72415 , https://www.aes.org/e-lib/browse.cfm?elib=15135
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, allows for streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper proposes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the natural layout of the device.
- Full Text:
- Date Issued: 2009
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427111 , vital:72415 , https://www.aes.org/e-lib/browse.cfm?elib=15135
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, allows for streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper proposes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the natural layout of the device.
- Full Text:
- Date Issued: 2009
Evaluating text preprocessing to improve compression on maillogs
- Otten, Fred, Irwin, Barry V W, Thinyane, Hannah
- Authors: Otten, Fred , Irwin, Barry V W , Thinyane, Hannah
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430138 , vital:72668 , https://doi.org/10.1145/1632149.1632157
- Description: Maillogs contain important information about mail which has been sent or received. This information can be used for statistical purposes, to help prevent viruses or to help prevent SPAM. In order to satisfy regula-tions and follow good security practices, maillogs need to be monitored and archived. Since there is a large quantity of data, some form of data reduction is necessary. Data compression programs such as gzip and bzip2 are commonly used to reduce the quantity of data. Text preprocessing can be used to aid the compression of English text files. This paper evaluates whether text preprocessing, particularly word replacement, can be used to improve the compression of maillogs. It presents an algorithm for constructing a dictionary for word replacement and provides the results of experiments conducted using the ppmd, gzip, bzip2 and 7zip programs. These tests show that text prepro-cessing improves data compression on maillogs. Improvements of up to 56 percent in compression time and up to 32 percent in compression ratio are achieved. It also shows that a dictionary may be generated and used on other maillogs to yield reductions within half a percent of the results achieved for the maillog used to generate the dictionary.
- Full Text:
- Date Issued: 2009
- Authors: Otten, Fred , Irwin, Barry V W , Thinyane, Hannah
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430138 , vital:72668 , https://doi.org/10.1145/1632149.1632157
- Description: Maillogs contain important information about mail which has been sent or received. This information can be used for statistical purposes, to help prevent viruses or to help prevent SPAM. In order to satisfy regula-tions and follow good security practices, maillogs need to be monitored and archived. Since there is a large quantity of data, some form of data reduction is necessary. Data compression programs such as gzip and bzip2 are commonly used to reduce the quantity of data. Text preprocessing can be used to aid the compression of English text files. This paper evaluates whether text preprocessing, particularly word replacement, can be used to improve the compression of maillogs. It presents an algorithm for constructing a dictionary for word replacement and provides the results of experiments conducted using the ppmd, gzip, bzip2 and 7zip programs. These tests show that text prepro-cessing improves data compression on maillogs. Improvements of up to 56 percent in compression time and up to 32 percent in compression ratio are achieved. It also shows that a dictionary may be generated and used on other maillogs to yield reductions within half a percent of the results achieved for the maillog used to generate the dictionary.
- Full Text:
- Date Issued: 2009
Extending the NFComms: framework for bulk data transfers
- Nottingham, Alastair, Irwin, Barry V W
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430164 , vital:72670 , https://doi.org/10.1145/1632149.1632170
- Description: Packet analysis is an important aspect of network security, which typi-cally relies on a flexible packet filtering system to extrapolate important packet information from each processed packet. Packet analysis is a computationally intensive, highly parallelisable task, and as such, clas-sification of large packet sets, such as those collected by a network tel-escope, can require significant processing time. We wish to improve upon this, through parallel classification on a GPU. In this paper, we first consider the OpenCL architecture and its applicability to packet analy-sis. We then introduce a number of packet demultiplexing and routing algorithms, and finally present a discussion on how some of these techniques may be leveraged within a GPGPU context to improve packet classification speeds.
- Full Text:
- Date Issued: 2009
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430164 , vital:72670 , https://doi.org/10.1145/1632149.1632170
- Description: Packet analysis is an important aspect of network security, which typi-cally relies on a flexible packet filtering system to extrapolate important packet information from each processed packet. Packet analysis is a computationally intensive, highly parallelisable task, and as such, clas-sification of large packet sets, such as those collected by a network tel-escope, can require significant processing time. We wish to improve upon this, through parallel classification on a GPU. In this paper, we first consider the OpenCL architecture and its applicability to packet analy-sis. We then introduce a number of packet demultiplexing and routing algorithms, and finally present a discussion on how some of these techniques may be leveraged within a GPGPU context to improve packet classification speeds.
- Full Text:
- Date Issued: 2009
Management, Processing and Analysis of Cryptographic Network Protocols
- Cowie, Bradley, Irwin, Barry V W, Barnett, Richard J
- Authors: Cowie, Bradley , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428687 , vital:72529 , https://d1wqtxts1xzle7.cloudfront.net/30968790/ISSA2009Proceedings-libre.pdf?1393060231=andresponse-content-disposi-tion=inline%3B+filename%3DAN_ANALYSIS_OF_AUTHENTICATION_FOR_PASSIV.pdfandExpires=1714732172andSignature=Ei8RhR2pCSUNGCNE40DugEyFamcyTxPuuRq9gslD~WGlNqPEgG3FL7VFRQCKXhZBWyAfGRjMtBmNDJ7Sjsgex12WxW9Fj8XdpB7Bfz23FuLc-t2YRM-2joKOHJQLxWJlfZiOzxDvVGZeM3zCHj~f3NUeY1~n6PtVtLzNdL8glIg5dzDTTIE6ms2YlxmnO6JvlzQwOWdHaUbHsZzMGOV19UPtBk-UJzHSq3NRyPe4-XNZQLNK-mEEcMGsLk6nkyXIsW2QJ7gtKW1nNkr6EMkAGSOnDai~pSqzb2imspMnlPRigAPPISrNHO79rP51H9bu1WvbRZv1KVkGvM~sRmfl28A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=499
- Description: The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both en-cryption and authentication to data transfer, has become increasingly popular. However, we note that it is rather difficult to perform legitimate analysis, intrusion detection and debugging on cryptographic protocols, as the data that passes through is encrypted. In this paper we assume that we have legitimate access to the data and that we have the private key used in transactions and thus we will be able decrypt the data. The objective is to produce a suitable application framework that allows for easy recovery and secure storage of cryptographic keys; including ap-propriate tools to decapsulate traffic and to decrypt live packet streams or precaptured traffic contained in PCAP files. The resultant processing will then be able to provide a clear-text stream which can be used for further analysis.
- Full Text:
- Date Issued: 2009
- Authors: Cowie, Bradley , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428687 , vital:72529 , https://d1wqtxts1xzle7.cloudfront.net/30968790/ISSA2009Proceedings-libre.pdf?1393060231=andresponse-content-disposi-tion=inline%3B+filename%3DAN_ANALYSIS_OF_AUTHENTICATION_FOR_PASSIV.pdfandExpires=1714732172andSignature=Ei8RhR2pCSUNGCNE40DugEyFamcyTxPuuRq9gslD~WGlNqPEgG3FL7VFRQCKXhZBWyAfGRjMtBmNDJ7Sjsgex12WxW9Fj8XdpB7Bfz23FuLc-t2YRM-2joKOHJQLxWJlfZiOzxDvVGZeM3zCHj~f3NUeY1~n6PtVtLzNdL8glIg5dzDTTIE6ms2YlxmnO6JvlzQwOWdHaUbHsZzMGOV19UPtBk-UJzHSq3NRyPe4-XNZQLNK-mEEcMGsLk6nkyXIsW2QJ7gtKW1nNkr6EMkAGSOnDai~pSqzb2imspMnlPRigAPPISrNHO79rP51H9bu1WvbRZv1KVkGvM~sRmfl28A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=499
- Description: The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both en-cryption and authentication to data transfer, has become increasingly popular. However, we note that it is rather difficult to perform legitimate analysis, intrusion detection and debugging on cryptographic protocols, as the data that passes through is encrypted. In this paper we assume that we have legitimate access to the data and that we have the private key used in transactions and thus we will be able decrypt the data. The objective is to produce a suitable application framework that allows for easy recovery and secure storage of cryptographic keys; including ap-propriate tools to decapsulate traffic and to decrypt live packet streams or precaptured traffic contained in PCAP files. The resultant processing will then be able to provide a clear-text stream which can be used for further analysis.
- Full Text:
- Date Issued: 2009
NGOs and rural movements in contemporary South Africa
- Authors: Helliker, Kirk D
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71252 , vital:29823 , https://doi.org/10.1080/02533952.2013.806415
- Description: This article provides a critical examination of relationships between non-governmental organisations (NGOs) and rural movements in post-apartheid South Africa, particularly with regard to the possible subordination of movements to NGOs. In discussing NGOs as a particular organisational form, and in reviewing some arguments pertaining to NGOs and rural movements globally, I explore whether NGOs in South Africa have a progressive role to play in agrarian transformation.
- Full Text:
- Date Issued: 2009
- Authors: Helliker, Kirk D
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71252 , vital:29823 , https://doi.org/10.1080/02533952.2013.806415
- Description: This article provides a critical examination of relationships between non-governmental organisations (NGOs) and rural movements in post-apartheid South Africa, particularly with regard to the possible subordination of movements to NGOs. In discussing NGOs as a particular organisational form, and in reviewing some arguments pertaining to NGOs and rural movements globally, I explore whether NGOs in South Africa have a progressive role to play in agrarian transformation.
- Full Text:
- Date Issued: 2009
Rhodes University Library Annual Report 2009: Library Director’s Review
- Authors: Thomas, G M E
- Date: 2009
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/59941 , vital:27713
- Description: [From the Introduction] As you read through this annual overview of the work carried out by the staff of the Rhodes University Library Services Division, I am sure you will be impressed by their achievements during a year marked by major building construction and a demanding institutional review of our services and staffing structures.
- Full Text:
- Date Issued: 2009
- Authors: Thomas, G M E
- Date: 2009
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/59941 , vital:27713
- Description: [From the Introduction] As you read through this annual overview of the work carried out by the staff of the Rhodes University Library Services Division, I am sure you will be impressed by their achievements during a year marked by major building construction and a demanding institutional review of our services and staffing structures.
- Full Text:
- Date Issued: 2009
A Grid-Based Approach to the Remote Control and Recall of the Properties of IEEE1394 Audio Devices
- Foss, Richard, Foulkes, Phillip
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427212 , vital:72422 , https://www.aes.org/e-lib/browse.cfm?elib=14453
- Description: Typically, the configuration of audio hardware and software is not integrated. This paper discusses a software system that has been developed to remotely control and recall the properties of IEEE1394 (FireWire) audio devices via a series of graphical routing matrices. The software presents sound engineers with a graphical routing matrix that shows, along its axes, the available FireWire audio devices on a FireWire network. Inter device connection management may be performed by selecting the cross points on the grid, and intra device control may be performed via device editors that are displayed via the axes of the matrix. The software application may be hosted by a compatible Digital Audio Workstation (DAW) application to allow for the storing and recalling of the various properties associated with the devices.
- Full Text:
- Date Issued: 2008
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427212 , vital:72422 , https://www.aes.org/e-lib/browse.cfm?elib=14453
- Description: Typically, the configuration of audio hardware and software is not integrated. This paper discusses a software system that has been developed to remotely control and recall the properties of IEEE1394 (FireWire) audio devices via a series of graphical routing matrices. The software presents sound engineers with a graphical routing matrix that shows, along its axes, the available FireWire audio devices on a FireWire network. Inter device connection management may be performed by selecting the cross points on the grid, and intra device control may be performed via device editors that are displayed via the axes of the matrix. The software application may be hosted by a compatible Digital Audio Workstation (DAW) application to allow for the storing and recalling of the various properties associated with the devices.
- Full Text:
- Date Issued: 2008