Critical realism, environmental learning and social-ecological change
- Price, Leigh, Lotz-Sisitka, Heila
- Authors: Price, Leigh , Lotz-Sisitka, Heila
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/436952 , vital:73319 , ISBN 9781315660899 , https://www.routledge.com/Critical-Realism-Environmental-Learning-and-Social-Ecological-Change/Price-Lotz-Sistka/p/book/9780367597689
- Description: The contemporary social-ecological condition is characterized by power-ful changes in the way that we relate to each other and to the environ-ment. This has led to increased ecological vulnerability, which is also ac-companied by ongoing, and increased societal vulnerability. Nevertheless there remain opportunities for developing new social-ecological rela-tions, and for social-ecological learning and change. This would seem to require a strong project of recovering ontology, and a challenging and broadening of dominant ways of knowing (Mignolo, 2000) that also tend to commit what Bhaskar describes as the ‘epistemic fallacy’, or the ‘the analysis or reduction of being to knowledge of being’ (Bhaskar, 2010, p. 1). In response, Bhaskar (ibid.) suggests critical realism as an alternative that embodies a ‘compatibility of ontological realism, epistemological relativism and judgmental rationality’. This includes a ‘re-vindication of ontology’ and the possibility of recognizing and accounting for structure, difference and change in the world in ways that escape ontological actu-alism and ontological monovalence or ‘the generation of a purely positive account of reality’ (ibid., p. 15).
- Full Text:
- Authors: Price, Leigh , Lotz-Sisitka, Heila
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/436952 , vital:73319 , ISBN 9781315660899 , https://www.routledge.com/Critical-Realism-Environmental-Learning-and-Social-Ecological-Change/Price-Lotz-Sistka/p/book/9780367597689
- Description: The contemporary social-ecological condition is characterized by power-ful changes in the way that we relate to each other and to the environ-ment. This has led to increased ecological vulnerability, which is also ac-companied by ongoing, and increased societal vulnerability. Nevertheless there remain opportunities for developing new social-ecological rela-tions, and for social-ecological learning and change. This would seem to require a strong project of recovering ontology, and a challenging and broadening of dominant ways of knowing (Mignolo, 2000) that also tend to commit what Bhaskar describes as the ‘epistemic fallacy’, or the ‘the analysis or reduction of being to knowledge of being’ (Bhaskar, 2010, p. 1). In response, Bhaskar (ibid.) suggests critical realism as an alternative that embodies a ‘compatibility of ontological realism, epistemological relativism and judgmental rationality’. This includes a ‘re-vindication of ontology’ and the possibility of recognizing and accounting for structure, difference and change in the world in ways that escape ontological actu-alism and ontological monovalence or ‘the generation of a purely positive account of reality’ (ibid., p. 15).
- Full Text:
Cultural values of natural resources among the San people neighbouring Kgalagadi Transfrontier Park, South Africa
- Thondhlana, Gladman, Shackleton, Sheona E
- Authors: Thondhlana, Gladman , Shackleton, Sheona E
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67699 , vital:29131 , https://doi.org/10.1080/13549839.2013.818950
- Description: Publisher version , Globally, cultural values of natural resources are increasingly recognised as important for local natural resource management and conservation in and beyond parks. The tendency has been to focus on the direct-use rather than the cultural values and importance of natural resources. The cultural values underlying natural resources (directly or indirectly used) and various natural resource-based activities, and the implications for conservation, remain little explored. Drawing from household surveys, in-depth qualitative interviews, observations and secondary data, we explore the cultural significance of natural resources and different land-use practices among the San people bordering Kgalagadi Transfrontier Park in South Africa. Our findings illustrate that though cultural values are inextricably linked to resource use, they are not recognised by all community members. Further, cultural values arise from a diverse and sometimes conflicting array of values that punctuate individuals' lifestyles. A better understanding of context-specific cultural settings and the linkages between the cultural and material dimensions of resource use can lead to the development of interventions that can ensure effective conservation of both natural resources and culture.
- Full Text: false
- Authors: Thondhlana, Gladman , Shackleton, Sheona E
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67699 , vital:29131 , https://doi.org/10.1080/13549839.2013.818950
- Description: Publisher version , Globally, cultural values of natural resources are increasingly recognised as important for local natural resource management and conservation in and beyond parks. The tendency has been to focus on the direct-use rather than the cultural values and importance of natural resources. The cultural values underlying natural resources (directly or indirectly used) and various natural resource-based activities, and the implications for conservation, remain little explored. Drawing from household surveys, in-depth qualitative interviews, observations and secondary data, we explore the cultural significance of natural resources and different land-use practices among the San people bordering Kgalagadi Transfrontier Park in South Africa. Our findings illustrate that though cultural values are inextricably linked to resource use, they are not recognised by all community members. Further, cultural values arise from a diverse and sometimes conflicting array of values that punctuate individuals' lifestyles. A better understanding of context-specific cultural settings and the linkages between the cultural and material dimensions of resource use can lead to the development of interventions that can ensure effective conservation of both natural resources and culture.
- Full Text: false
Current developments in arbuscular mycorrhizal fungi research and its role in salinity stress alleviation a biotechnological perspective
- Kumar, Ashwani, Dames, Joanna F, Gupta, Aditi, Sharma, Satyawati, Gilbert, Jack A, Ahmad, Parvaiz
- Authors: Kumar, Ashwani , Dames, Joanna F , Gupta, Aditi , Sharma, Satyawati , Gilbert, Jack A , Ahmad, Parvaiz
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/443998 , vital:74177 , https://doi.org/10.3109/07388551.2014.899964
- Description: Arbuscular mycorrhizal fungi (AMF) form widespread symbiotic associations with 80% of known land plants. They play a major role in plant nutrition, growth, water absorption, nutrient cycling and protection from pathogens, and as a result, contribute to ecosystem processes. Salinity stress conditions undoubtedly limit plant productivity and, therefore, the role of AMF as a biological tool for improving plant salt stress tolerance, is gaining economic importance worldwide. However, this approach requires a better understanding of how plants and AMF intimately interact with each other in saline environments and how this interaction leads to physiological changes in plants. This knowledge is important to develop sustainable strategies for successful utilization of AMF to improve plant health under a variety of stress conditions. Recent advances in the field of molecular biology, “omics” technology and advanced microscopy can provide new insight about these mechanisms of interaction between AMF and plants, as well as other microbes. This review mainly discusses the effect of salinity on AMF and plants, and role of AMF in alleviation of salinity stress including insight on methods for AMF identification. The focus remains on latest advancements in mycorrhizal research that can potentially offer an integrative understanding of the role of AMF in salinity tolerance and sustainable crop production.
- Full Text:
- Authors: Kumar, Ashwani , Dames, Joanna F , Gupta, Aditi , Sharma, Satyawati , Gilbert, Jack A , Ahmad, Parvaiz
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/443998 , vital:74177 , https://doi.org/10.3109/07388551.2014.899964
- Description: Arbuscular mycorrhizal fungi (AMF) form widespread symbiotic associations with 80% of known land plants. They play a major role in plant nutrition, growth, water absorption, nutrient cycling and protection from pathogens, and as a result, contribute to ecosystem processes. Salinity stress conditions undoubtedly limit plant productivity and, therefore, the role of AMF as a biological tool for improving plant salt stress tolerance, is gaining economic importance worldwide. However, this approach requires a better understanding of how plants and AMF intimately interact with each other in saline environments and how this interaction leads to physiological changes in plants. This knowledge is important to develop sustainable strategies for successful utilization of AMF to improve plant health under a variety of stress conditions. Recent advances in the field of molecular biology, “omics” technology and advanced microscopy can provide new insight about these mechanisms of interaction between AMF and plants, as well as other microbes. This review mainly discusses the effect of salinity on AMF and plants, and role of AMF in alleviation of salinity stress including insight on methods for AMF identification. The focus remains on latest advancements in mycorrhizal research that can potentially offer an integrative understanding of the role of AMF in salinity tolerance and sustainable crop production.
- Full Text:
Cyber Vulnerability Assessment: Case Study of Malawi and Tanzania
- Chindipha, Stones D, Irwin, Barry V W
- Authors: Chindipha, Stones D , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428558 , vital:72520 , https://accconference.mandela.ac.za/ACCConference/media/Store/images/Proceedings-2015.pdf#page=105
- Description: Much as the Internet is beneficial to our daily activities, with each passing day it also brings along with it information security concerns for the users be they at company or national level. Each year the number of Internet users keeps growing, particularly in Africa, and this means only one thing, more cyber-attacks. Governments have become a focal point of this data leakage problem making this a matter of national security. Looking at the current state of affairs, cyber-based incidents are more likely to increase in Africa, mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. A drop in the cost of broadband connection means more people will be able to afford Internet connectivity. With open Source Intelligence (OSINT), this paper aims to perform a vulnerability analysis for states in Eastern Africa building from prior research by Swart et al. which showed that there are vulnerabilities in the information systems, using the case of South Africa as an example. States in East Africa are to be considered as candidates, with the final decision being determined by access to suitable resources, and availability of information. A comparative analysis to assess the factors that affect the degree of security susceptibilities in various states will also be made and information security measures used by various governments to ascertain the extent of their contribution to this vulnerability will be assessed. This pilot study will be extended to other Southern and Eastern African states like Botswana, Kenya, Uganda and Namibia in future work.
- Full Text:
- Authors: Chindipha, Stones D , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428558 , vital:72520 , https://accconference.mandela.ac.za/ACCConference/media/Store/images/Proceedings-2015.pdf#page=105
- Description: Much as the Internet is beneficial to our daily activities, with each passing day it also brings along with it information security concerns for the users be they at company or national level. Each year the number of Internet users keeps growing, particularly in Africa, and this means only one thing, more cyber-attacks. Governments have become a focal point of this data leakage problem making this a matter of national security. Looking at the current state of affairs, cyber-based incidents are more likely to increase in Africa, mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. A drop in the cost of broadband connection means more people will be able to afford Internet connectivity. With open Source Intelligence (OSINT), this paper aims to perform a vulnerability analysis for states in Eastern Africa building from prior research by Swart et al. which showed that there are vulnerabilities in the information systems, using the case of South Africa as an example. States in East Africa are to be considered as candidates, with the final decision being determined by access to suitable resources, and availability of information. A comparative analysis to assess the factors that affect the degree of security susceptibilities in various states will also be made and information security measures used by various governments to ascertain the extent of their contribution to this vulnerability will be assessed. This pilot study will be extended to other Southern and Eastern African states like Botswana, Kenya, Uganda and Namibia in future work.
- Full Text:
Cyber Vulnerability Assessment: Case Study of Malawi and Tanzania
- Chindipha, Stones D, Irwin, Barry V W
- Authors: Chindipha, Stones D , Irwin, Barry V W
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/473773 , vital:77680 , xlink:href="http://accconference.mandela.ac.za/ACCConference/media/Store/images/Proceedings-2015.pdf#page=105"
- Description: Much as the Internet is beneficial to our daily activities, with each passing day it also brings along with it information security concerns for the users be they at company or national level. Each year the number of Internet users keeps growing, particularly in Africa, and this means only one thing, more cyber-attacks. Governments have become a focal point of this data leakage problem making this a matter of national security. Looking at the current state of affairs, cyber-based incidents are more likely to increase in Africa, mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. A drop in the cost of broadband connection means more people will be able to afford Internet connectivity. With open Source Intelligence (OSINT), this paper aims to perform a vulnerability analysis for states in Eastern Africa building from prior research by Swart et al. which showed that there are vulnerabilities in the information systems, using the case of South Africa as an example. States in East Africa are to be considered as candidates, with the final decision being determined by access to suitable resources, and availability of information. A comparative analysis to assess the factors that affect the degree of security susceptibilities in various states will also be made and information security measures used by various governments to ascertain the extent of their contribution to this vulnerability will be assessed. This pilot study will be extended to other Southern and Eastern African states like Botswana, Kenya, Uganda and Namibia in future work.
- Full Text:
- Authors: Chindipha, Stones D , Irwin, Barry V W
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/473773 , vital:77680 , xlink:href="http://accconference.mandela.ac.za/ACCConference/media/Store/images/Proceedings-2015.pdf#page=105"
- Description: Much as the Internet is beneficial to our daily activities, with each passing day it also brings along with it information security concerns for the users be they at company or national level. Each year the number of Internet users keeps growing, particularly in Africa, and this means only one thing, more cyber-attacks. Governments have become a focal point of this data leakage problem making this a matter of national security. Looking at the current state of affairs, cyber-based incidents are more likely to increase in Africa, mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. A drop in the cost of broadband connection means more people will be able to afford Internet connectivity. With open Source Intelligence (OSINT), this paper aims to perform a vulnerability analysis for states in Eastern Africa building from prior research by Swart et al. which showed that there are vulnerabilities in the information systems, using the case of South Africa as an example. States in East Africa are to be considered as candidates, with the final decision being determined by access to suitable resources, and availability of information. A comparative analysis to assess the factors that affect the degree of security susceptibilities in various states will also be made and information security measures used by various governments to ascertain the extent of their contribution to this vulnerability will be assessed. This pilot study will be extended to other Southern and Eastern African states like Botswana, Kenya, Uganda and Namibia in future work.
- Full Text:
Data Centre vulnerabilities physical, logical and trusted entity security
- Swart, Ignus, Grobler, Marthie, Irwin, Barry V W
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427859 , vital:72467 , https://www.researchgate.net/profile/Ignus-Swart/publication/305442546_Data_Centre_vulnerabilities_physical_logical_trusted_entity_security/links/578f38c108aecbca4cada6bf/Data-Centre-vulnerabilities-physical-logical-trusted-entity-security.pdf
- Description: Data centres are often the hub for a significant number of disparate interconnecting systems. With rapid advances in virtualization, the use of data centres have increased significantly and are set to continue growing. Systems hosted typically serve the data needs for a growing number of organizations ranging from private individuals to mammoth governmental departments. Due to this centralized method of operation, data centres have become a prime target for attackers. These attackers are not only after the data contained in the data centre but often the physical infrastructure the systems run on is the target of attack. Down time resulting from such an attack can affect a wide range of entities and can have severe financial implications for the owners of the data centre. To limit liability strict adherence to standards are prescribed. Technology however develops at a far faster pace than standards and our ability to accurately measure information security has significant hidden caveats. This allows for a situation where the defenders dilemma is exacerbated by information overload, a significant increase in attack surface and reporting tools that show only limited views. This paper investigates the logical and physical security components of a data centre and introduces the notion of third party involvement as an increase in attack surface due to the manner in which data centres typically operate.
- Full Text:
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427859 , vital:72467 , https://www.researchgate.net/profile/Ignus-Swart/publication/305442546_Data_Centre_vulnerabilities_physical_logical_trusted_entity_security/links/578f38c108aecbca4cada6bf/Data-Centre-vulnerabilities-physical-logical-trusted-entity-security.pdf
- Description: Data centres are often the hub for a significant number of disparate interconnecting systems. With rapid advances in virtualization, the use of data centres have increased significantly and are set to continue growing. Systems hosted typically serve the data needs for a growing number of organizations ranging from private individuals to mammoth governmental departments. Due to this centralized method of operation, data centres have become a prime target for attackers. These attackers are not only after the data contained in the data centre but often the physical infrastructure the systems run on is the target of attack. Down time resulting from such an attack can affect a wide range of entities and can have severe financial implications for the owners of the data centre. To limit liability strict adherence to standards are prescribed. Technology however develops at a far faster pace than standards and our ability to accurately measure information security has significant hidden caveats. This allows for a situation where the defenders dilemma is exacerbated by information overload, a significant increase in attack surface and reporting tools that show only limited views. This paper investigates the logical and physical security components of a data centre and introduces the notion of third party involvement as an increase in attack surface due to the manner in which data centres typically operate.
- Full Text:
DDoS Attack Mitigation Through Control of Inherent Charge Decay of Memory Implementations
- Herbert, Alan, Irwin, Barry V W, van Heerden, Renier P
- Authors: Herbert, Alan , Irwin, Barry V W , van Heerden, Renier P
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430339 , vital:72684 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: DDoS (Distributed Denial of Service) attacks over recent years have shown to be devastating on the target systems and services made publicly available over the Internet. Furthermore, the backscatter1 caused by DDoS attacks also affects the available bandwidth and responsiveness of many other hosts within the Internet. The unfortunate reality of these attacks is that the targeted party cannot fight back due to the presence of botnets and malware-driven hosts. These hosts that carry out the attack on a target are usually controlled remotely and the owner of the device is unaware of it; for this reason one cannot attack back directly as this will serve little more than to disable an innocent party. A proposed solution to these DDoS attacks is to identify a potential attacking address and ignore communication from that address for a set period of time through time stamping.
- Full Text:
- Authors: Herbert, Alan , Irwin, Barry V W , van Heerden, Renier P
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430339 , vital:72684 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: DDoS (Distributed Denial of Service) attacks over recent years have shown to be devastating on the target systems and services made publicly available over the Internet. Furthermore, the backscatter1 caused by DDoS attacks also affects the available bandwidth and responsiveness of many other hosts within the Internet. The unfortunate reality of these attacks is that the targeted party cannot fight back due to the presence of botnets and malware-driven hosts. These hosts that carry out the attack on a target are usually controlled remotely and the owner of the device is unaware of it; for this reason one cannot attack back directly as this will serve little more than to disable an innocent party. A proposed solution to these DDoS attacks is to identify a potential attacking address and ignore communication from that address for a set period of time through time stamping.
- Full Text:
Dear space dad and other stories
- Authors: Kuit, Henali
- Date: 2015
- Subjects: South African fiction (English) -- 21st century , Short stories, South African -- 21st century , Creative writing (Higher education) , South African fiction -- Study and teaching (Higher)
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:5990 , http://hdl.handle.net/10962/d1017774
- Description: My stories are set around the themes of family, animals and outer space -- which leads to other themes like religion, loneliness, romance, eating animals, growing up and longing for the past. Most of the stories have non-linear structures. Some use gradual shiftings of narrator voice; in others the narrative is flat, lacking plot. I favour repetition over plot-based climaxes to create coherency and narrative flow. I also favour free indirect discourse over dialogue or description as a means to characterize.
- Full Text:
- Authors: Kuit, Henali
- Date: 2015
- Subjects: South African fiction (English) -- 21st century , Short stories, South African -- 21st century , Creative writing (Higher education) , South African fiction -- Study and teaching (Higher)
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:5990 , http://hdl.handle.net/10962/d1017774
- Description: My stories are set around the themes of family, animals and outer space -- which leads to other themes like religion, loneliness, romance, eating animals, growing up and longing for the past. Most of the stories have non-linear structures. Some use gradual shiftings of narrator voice; in others the narrative is flat, lacking plot. I favour repetition over plot-based climaxes to create coherency and narrative flow. I also favour free indirect discourse over dialogue or description as a means to characterize.
- Full Text:
Debating about power
- Authors: Thomas, Cornelius
- Date: 2015
- Type: Image
- Identifier: vital:8049 , http://hdl.handle.net/10962/d1020545
- Description: On Wednesday, 21 October 2015, Rhodes University closed in solidarity with the higher education sector as students and staff embarked on nationwide protest action against the shortage of funding in the South African higher education sector. #FeesMustFall is a national student led protest movement that began in mid-October 2015 in response to proposed increases in fees at South African universities. These images depict the peaceful march and illustrate the extent of solidarity among staff, students and community members who joined in support of the protest.
- Full Text: false
- Authors: Thomas, Cornelius
- Date: 2015
- Type: Image
- Identifier: vital:8049 , http://hdl.handle.net/10962/d1020545
- Description: On Wednesday, 21 October 2015, Rhodes University closed in solidarity with the higher education sector as students and staff embarked on nationwide protest action against the shortage of funding in the South African higher education sector. #FeesMustFall is a national student led protest movement that began in mid-October 2015 in response to proposed increases in fees at South African universities. These images depict the peaceful march and illustrate the extent of solidarity among staff, students and community members who joined in support of the protest.
- Full Text: false
Deconstructing developmental psychology twenty years on : reflections, implications and empirical work
- Callaghan, Jane, Andenæs, Agnes, Macleod, Catriona I
- Authors: Callaghan, Jane , Andenæs, Agnes , Macleod, Catriona I
- Date: 2015
- Language: English
- Type: Article
- Identifier: vital:6315 , http://hdl.handle.net/10962/d1020934 , http://journals.sagepub.com/doi/abs/10.1177/0959353515583702
- Description: Editorial
- Full Text:
- Authors: Callaghan, Jane , Andenæs, Agnes , Macleod, Catriona I
- Date: 2015
- Language: English
- Type: Article
- Identifier: vital:6315 , http://hdl.handle.net/10962/d1020934 , http://journals.sagepub.com/doi/abs/10.1177/0959353515583702
- Description: Editorial
- Full Text:
Deep genetic divergence between geographically isolated populations of the goldie barb (Barbus pallidus) in South Africa: potential taxonomic and conservation implications
- Chakona, Albert, Malherbe, Willem S, Gouws, Gavin, Swartz, Ernst R
- Authors: Chakona, Albert , Malherbe, Willem S , Gouws, Gavin , Swartz, Ernst R
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/443284 , vital:74105 , https://hdl.handle.net/10520/EJC177698
- Description: Barbus pallidus as it is presently defined has a disjunct distribution that is divided between northern and southern populations in South Africa. Sequence data from the cytochrome b gene region showed two distinct lineages that correspond to these geographically distant areas. Divergence between these two lineages was relatively high (5.5-6.5%) and comparable to typical interspecific divergences found between closely related southern African cyprinid fishes. Based on this deep genetic divergence, we conclude that the northern lineage may represent a previously unrecognised species or may belong to a different, but known species or species complex not associated with 'true' B. pallidus. These findings add to a growing body of evidence that freshwater fish diversity in southern Africa requires major revision.
- Full Text:
- Authors: Chakona, Albert , Malherbe, Willem S , Gouws, Gavin , Swartz, Ernst R
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/443284 , vital:74105 , https://hdl.handle.net/10520/EJC177698
- Description: Barbus pallidus as it is presently defined has a disjunct distribution that is divided between northern and southern populations in South Africa. Sequence data from the cytochrome b gene region showed two distinct lineages that correspond to these geographically distant areas. Divergence between these two lineages was relatively high (5.5-6.5%) and comparable to typical interspecific divergences found between closely related southern African cyprinid fishes. Based on this deep genetic divergence, we conclude that the northern lineage may represent a previously unrecognised species or may belong to a different, but known species or species complex not associated with 'true' B. pallidus. These findings add to a growing body of evidence that freshwater fish diversity in southern Africa requires major revision.
- Full Text:
Density and regrowth of a forest restio (Ischyrolepis eleocharis) under harvest and non-harvest treatments in dune forests of Eastern Cape Province, South Africa
- Ruwanza, Sheunesu, Shackleton, Charlie M
- Authors: Ruwanza, Sheunesu , Shackleton, Charlie M
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/180828 , vital:43649 , xlink:href="https://doi.org/10.1007/s12231-015-9306-y"
- Description: Ischyrolepis eleocharis (Mast.) H.P.Linder is a perennial rush or sedge-like herb in the Restionaceae family and has been harvested for various uses from coastal forest dunes of South Africa. Around 2005, a ban on I. eleocharis harvesting in Bathurst coastal forest was instituted by provincial conservation authorities based on their unsubstantiated impression that the species population was decreasing. Here we report on the population density pre and post the harvest ban, as well as further explore the autecology of the species by assessing plant density relative to environmental factors (slope and aspect) and a controlled experiment on regrowth after harvesting at different intensities. The results show that the shoot density of both living and dead I. eleocharis increased significantly over the past eight years. This concurs with results from the harvesting experiment which showed that I. eleocharis recovered rapidly within a year of harvesting. Both aspect and slope play a key role in the distribution of I. eleocharis, with most plants found in open patches in the forest located on the summit and upper slopes of dunes facing the landward side. These results indicate that I. eleocharis is highly abundant and resilient to harvesting.
- Full Text:
- Authors: Ruwanza, Sheunesu , Shackleton, Charlie M
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/180828 , vital:43649 , xlink:href="https://doi.org/10.1007/s12231-015-9306-y"
- Description: Ischyrolepis eleocharis (Mast.) H.P.Linder is a perennial rush or sedge-like herb in the Restionaceae family and has been harvested for various uses from coastal forest dunes of South Africa. Around 2005, a ban on I. eleocharis harvesting in Bathurst coastal forest was instituted by provincial conservation authorities based on their unsubstantiated impression that the species population was decreasing. Here we report on the population density pre and post the harvest ban, as well as further explore the autecology of the species by assessing plant density relative to environmental factors (slope and aspect) and a controlled experiment on regrowth after harvesting at different intensities. The results show that the shoot density of both living and dead I. eleocharis increased significantly over the past eight years. This concurs with results from the harvesting experiment which showed that I. eleocharis recovered rapidly within a year of harvesting. Both aspect and slope play a key role in the distribution of I. eleocharis, with most plants found in open patches in the forest located on the summit and upper slopes of dunes facing the landward side. These results indicate that I. eleocharis is highly abundant and resilient to harvesting.
- Full Text:
Deposition of CdS, CdS/ZnSe and CdS/ZnSe/ZnS shells around CdSeTe alloyed core quantum dots: effects on optical properties
- Adegoke, Oluwasesan, Nyokong, Tebello, Forbes, Patricia B C
- Authors: Adegoke, Oluwasesan , Nyokong, Tebello , Forbes, Patricia B C
- Date: 2015
- Language: English
- Type: Article
- Identifier: vital:7289 , http://hdl.handle.net/10962/d1020342
- Description: In this work, we synthesized water-soluble L-cysteine-capped alloyed CdSeTe core quantum dots (QDs) and investigated the structural and optical properties of deposition of each of CdS, CdS/ZnSe and CdS/ZnSe/ZnS shell layers. Photophysical results showed that the overcoating of a CdS shell around the alloyed CdSeTe core [quantum yield (QY) = 8.4%] resulted in effective confinement of the radiative exciton with an improved QY value of 93.5%. Subsequent deposition of a ZnSe shell around the CdSeTe/CdS surface decreased the QY value to 24.7%, but an increase in the QY value of up to 49.5% was observed when a ZnS shell was overcoated around the CdSeTe/CdS/ZnSe surface. QDs with shell layers showed improved stability relative to the core. Data obtained from time-resolved fluorescence measurements provided useful insight into variations in the photophysical properties of the QDs upon the formation of each shell layer. Our study suggests that the formation of CdSeTe/CdS core/shell QDs meets the requirements of quality QDs in terms of high photoluminescence QY and stability, hence further deposition of additional shells are not necessary in improving the optical properties of the core/shell QDs. Copyright © 2015 John Wiley & Sons, Ltd. , Original publication is available at http://dx.doi.org/10.1002/bio.3013
- Full Text: false
- Authors: Adegoke, Oluwasesan , Nyokong, Tebello , Forbes, Patricia B C
- Date: 2015
- Language: English
- Type: Article
- Identifier: vital:7289 , http://hdl.handle.net/10962/d1020342
- Description: In this work, we synthesized water-soluble L-cysteine-capped alloyed CdSeTe core quantum dots (QDs) and investigated the structural and optical properties of deposition of each of CdS, CdS/ZnSe and CdS/ZnSe/ZnS shell layers. Photophysical results showed that the overcoating of a CdS shell around the alloyed CdSeTe core [quantum yield (QY) = 8.4%] resulted in effective confinement of the radiative exciton with an improved QY value of 93.5%. Subsequent deposition of a ZnSe shell around the CdSeTe/CdS surface decreased the QY value to 24.7%, but an increase in the QY value of up to 49.5% was observed when a ZnS shell was overcoated around the CdSeTe/CdS/ZnSe surface. QDs with shell layers showed improved stability relative to the core. Data obtained from time-resolved fluorescence measurements provided useful insight into variations in the photophysical properties of the QDs upon the formation of each shell layer. Our study suggests that the formation of CdSeTe/CdS core/shell QDs meets the requirements of quality QDs in terms of high photoluminescence QY and stability, hence further deposition of additional shells are not necessary in improving the optical properties of the core/shell QDs. Copyright © 2015 John Wiley & Sons, Ltd. , Original publication is available at http://dx.doi.org/10.1002/bio.3013
- Full Text: false
Design and Fabrication of a Low Cost Traffic Manipulation Hardware Platform
- Pennefather, Sean, Irwin, Barry V W
- Authors: Pennefather, Sean , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427873 , vital:72468 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622941_Design_and_Fabrication_of_a_Low_Cost_Traffic_Manipulation_Hardware/links/5b9a1625458515310583fc8c/Design-and-Fabrication-of-a-Low-Cost-Traffic-Manipulation-Hardware.pdf
- Description: This paper describes the design and fabrication of a dedicated hardware platform for network traffic logging and modification at a production cost of under $300. The context of the device is briefly discussed before characteristics relating to hardware development are explored. The paper concludes with three application examples to show some to the potential functionality of the platform. Testing of the device shows an average TCP throughput of 84.44 MiB/s when using the designed Ethernet modules.
- Full Text:
- Authors: Pennefather, Sean , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427873 , vital:72468 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622941_Design_and_Fabrication_of_a_Low_Cost_Traffic_Manipulation_Hardware/links/5b9a1625458515310583fc8c/Design-and-Fabrication-of-a-Low-Cost-Traffic-Manipulation-Hardware.pdf
- Description: This paper describes the design and fabrication of a dedicated hardware platform for network traffic logging and modification at a production cost of under $300. The context of the device is briefly discussed before characteristics relating to hardware development are explored. The paper concludes with three application examples to show some to the potential functionality of the platform. Testing of the device shows an average TCP throughput of 84.44 MiB/s when using the designed Ethernet modules.
- Full Text:
Design, development and evaluation of novel lead compounds as HIV-1 enzyme inhibitors
- Authors: Sekgota, Khethobole Cassius
- Date: 2015
- Subjects: Enzyme inhibitors , Viruses -- Reproduction , HIV (Viruses)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4546 , http://hdl.handle.net/10962/d1017926
- Description: This project has been concerned with the application of the Baylis-Hillman methodology to the synthesis of medicinally important diketo acid analogues (cinnamate ester-AZT conjugates and 3-hydroxy ester-AZT conjugates) as dual-action HIV-1 IN/RT inhibitors; and on exploratory studies in the preparation of 3-(amidomethyl)-(1H)-2-quinolones as PR inhibitors; and (1H)-2- quinolone-AZT conjugates as dual action IN/RT inhibitors. A series of Baylis-Hillman adducts has been prepared, typically in moderate to excellent yield, by reacting 2-nitrobenzaldehyde with methyl acrylate, ethyl acrylate and methyl vinyl ketone in the presence of 1,4- diazabicyclo[2.2.2]octane (DABCO). Subsequently, various transformations that include conjugate addition of primary and secondary amines to the α,ß-unsaturated moiety to obtain 2- (aminomethyl)-3-hydroxy-3-(2-nitrophenyl)propanoate derivatives, effective SN2´ substitution of the BH ß-hydroxy by a Vilsmeier-Haack in situ-generated chloride to afford Baylis-Hillman allyl chlorides, iron in acetic acid-catalyzed cyclisation to 3-acetoxymethyl-(1H)-2-quinolone derivatives were achieved. Thus, using the Baylis-Hillman methodology, two nuanced classes of diketo acid analogues were constructed. These involved conjugating appropriate propargylamine derivatives with AZT using the „click‟ reaction. In an exploratory study, the quinolone derivative, precisely 3-acetoxymethyl- (1H)-quinol-2-one, was transformed into 3-hydroxymethyl-(1H)-quinol-2-one using potassium carbonate in a mixture of methanol and water (1:1). Following successful hydrolysis, the resulting alcohol was transformed to the corresponding chloride, 3-chloromethyl-(1H)-quinol-2- one, using thionyl chloride. Subsequent nucleophilic substitution afforded 3-(aminomethyl)- (1H)-2-quinolone derivatives which were subsequently transformed to 3-(amidomethyl)-(1H)-2- quinolones; and 3-[(propargylamino)-methyl]-(1H)-quinol-2-one as precursors to quinolone- AZT derivatives. All compounds were characterized by NMR, IR, and where appropriate, high resolution MS
- Full Text:
- Authors: Sekgota, Khethobole Cassius
- Date: 2015
- Subjects: Enzyme inhibitors , Viruses -- Reproduction , HIV (Viruses)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4546 , http://hdl.handle.net/10962/d1017926
- Description: This project has been concerned with the application of the Baylis-Hillman methodology to the synthesis of medicinally important diketo acid analogues (cinnamate ester-AZT conjugates and 3-hydroxy ester-AZT conjugates) as dual-action HIV-1 IN/RT inhibitors; and on exploratory studies in the preparation of 3-(amidomethyl)-(1H)-2-quinolones as PR inhibitors; and (1H)-2- quinolone-AZT conjugates as dual action IN/RT inhibitors. A series of Baylis-Hillman adducts has been prepared, typically in moderate to excellent yield, by reacting 2-nitrobenzaldehyde with methyl acrylate, ethyl acrylate and methyl vinyl ketone in the presence of 1,4- diazabicyclo[2.2.2]octane (DABCO). Subsequently, various transformations that include conjugate addition of primary and secondary amines to the α,ß-unsaturated moiety to obtain 2- (aminomethyl)-3-hydroxy-3-(2-nitrophenyl)propanoate derivatives, effective SN2´ substitution of the BH ß-hydroxy by a Vilsmeier-Haack in situ-generated chloride to afford Baylis-Hillman allyl chlorides, iron in acetic acid-catalyzed cyclisation to 3-acetoxymethyl-(1H)-2-quinolone derivatives were achieved. Thus, using the Baylis-Hillman methodology, two nuanced classes of diketo acid analogues were constructed. These involved conjugating appropriate propargylamine derivatives with AZT using the „click‟ reaction. In an exploratory study, the quinolone derivative, precisely 3-acetoxymethyl- (1H)-quinol-2-one, was transformed into 3-hydroxymethyl-(1H)-quinol-2-one using potassium carbonate in a mixture of methanol and water (1:1). Following successful hydrolysis, the resulting alcohol was transformed to the corresponding chloride, 3-chloromethyl-(1H)-quinol-2- one, using thionyl chloride. Subsequent nucleophilic substitution afforded 3-(aminomethyl)- (1H)-2-quinolone derivatives which were subsequently transformed to 3-(amidomethyl)-(1H)-2- quinolones; and 3-[(propargylamino)-methyl]-(1H)-quinol-2-one as precursors to quinolone- AZT derivatives. All compounds were characterized by NMR, IR, and where appropriate, high resolution MS
- Full Text:
Determinants of student satisfaction with campus residence life at a South African university
- Botha, Ferdi, Snowball, Jeanette D, De Klerk, Vivian A, Radloff, Sarah E
- Authors: Botha, Ferdi , Snowball, Jeanette D , De Klerk, Vivian A , Radloff, Sarah E
- Date: 2015
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/69277 , vital:29475 , https://doi.org/10.1007/978-3-319-15904-1_2
- Description: Factors outside the classroom can contribute to academic success as well as the achievement of important outcomes such as the appreciation of human diversity. Striving towards equality of residence life satisfaction is thus important for academic outcomes and for the development of well-functioning citizens. This study is based on the 2011 Quality of Residence Life (QoRL) Survey, conducted at a South African university, comprising roughly 2,000 respondents. The study investigates the association between satisfaction with QoRL and (i) residence milieu and characteristics, (ii) direct and indirect discrimination, (iii) perceptions of drug and alcohol issues in residence, (iv) safety, and (v) individual student characteristics. One main finding is that there are no significant differences in satisfaction with QoRL across racial and gender groups; suggesting significant progress in university transformation and equity goals. The general atmosphere and characteristics of residences are also important predictors of QoRL satisfaction.
- Full Text: false
- Authors: Botha, Ferdi , Snowball, Jeanette D , De Klerk, Vivian A , Radloff, Sarah E
- Date: 2015
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/69277 , vital:29475 , https://doi.org/10.1007/978-3-319-15904-1_2
- Description: Factors outside the classroom can contribute to academic success as well as the achievement of important outcomes such as the appreciation of human diversity. Striving towards equality of residence life satisfaction is thus important for academic outcomes and for the development of well-functioning citizens. This study is based on the 2011 Quality of Residence Life (QoRL) Survey, conducted at a South African university, comprising roughly 2,000 respondents. The study investigates the association between satisfaction with QoRL and (i) residence milieu and characteristics, (ii) direct and indirect discrimination, (iii) perceptions of drug and alcohol issues in residence, (iv) safety, and (v) individual student characteristics. One main finding is that there are no significant differences in satisfaction with QoRL across racial and gender groups; suggesting significant progress in university transformation and equity goals. The general atmosphere and characteristics of residences are also important predictors of QoRL satisfaction.
- Full Text: false
Determining the competency of children with developmental delays to testify in criminal trials
- Authors: Van Niekerk, Hester Aletta
- Date: 2015
- Subjects: Child witnesses -- South Africa , Developmentally disabled children -- South Africa , Children -- Legal status, laws, etc. -- South Africa , Evidence (Law) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:3722 , http://hdl.handle.net/10962/d1017878
- Description: In South Africa children are required to testify under oath or admonition. The shortcomings of the competency test are of particular relevance to children with developmental disabilities, since courts are not equipped to adequately assess the competency of these children to give evidence. One component of testimonial competency, namely the understanding of the concepts truth and lies, is overemphasised and is examined with questions that are developmentally inappropriate for child witnesses in general. For children with cognitive disabilities, such questions create barriers for participation in the truth-seeking process. Consequently, convictions have been set aside on appeal owing to procedural irregularities found in the implementation of this test. In the literature review on testimonial competency, attention was given to restrictions that specific developmental disabilities impose on the perceptual, cognitive, communication and moral development of children. Two of four components – narrative ability and moral capacity – were studied in a sample of 184 children in middle childhood. Participants’ ability to give coherent and detailed accounts of events, their understanding of the concepts truth, lies, promises and the oath, and the Lyon and Saywitz oath-taking competency test, were investigated. Quantitative and qualitative methods were used for data analysis. Three groups were identified: those children with very limited, average or full testimonial competency. Their capacities were found to be related to maturation of cognitive functions and level of intellectual functioning. Participants were better able to demonstrate their understanding of truth and falsity by responding to the oathtaking test than giving verbal descriptions of these concepts. Whereas 1 percent of participants had a conceptual understanding of an oath, 15 percent understood the concept of a promise. Syncretism and confabulation compromised the narrative accounts of a substantial number of participants. Syncretism relates to immature narrative ability: correct details are combined in an illogical fashion. Confabulation refers to filling memory gaps with fabricated information. Guidelines on the competency determination of children with developmental disabilities were compiled. It is suggested that the competency examination be replaced by a formal, pre-trial competency assessment. The court should also receive expert evidence on how to facilitate meaningful participation when a child with sufficient testimonial competence is the witness.
- Full Text:
- Authors: Van Niekerk, Hester Aletta
- Date: 2015
- Subjects: Child witnesses -- South Africa , Developmentally disabled children -- South Africa , Children -- Legal status, laws, etc. -- South Africa , Evidence (Law) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:3722 , http://hdl.handle.net/10962/d1017878
- Description: In South Africa children are required to testify under oath or admonition. The shortcomings of the competency test are of particular relevance to children with developmental disabilities, since courts are not equipped to adequately assess the competency of these children to give evidence. One component of testimonial competency, namely the understanding of the concepts truth and lies, is overemphasised and is examined with questions that are developmentally inappropriate for child witnesses in general. For children with cognitive disabilities, such questions create barriers for participation in the truth-seeking process. Consequently, convictions have been set aside on appeal owing to procedural irregularities found in the implementation of this test. In the literature review on testimonial competency, attention was given to restrictions that specific developmental disabilities impose on the perceptual, cognitive, communication and moral development of children. Two of four components – narrative ability and moral capacity – were studied in a sample of 184 children in middle childhood. Participants’ ability to give coherent and detailed accounts of events, their understanding of the concepts truth, lies, promises and the oath, and the Lyon and Saywitz oath-taking competency test, were investigated. Quantitative and qualitative methods were used for data analysis. Three groups were identified: those children with very limited, average or full testimonial competency. Their capacities were found to be related to maturation of cognitive functions and level of intellectual functioning. Participants were better able to demonstrate their understanding of truth and falsity by responding to the oathtaking test than giving verbal descriptions of these concepts. Whereas 1 percent of participants had a conceptual understanding of an oath, 15 percent understood the concept of a promise. Syncretism and confabulation compromised the narrative accounts of a substantial number of participants. Syncretism relates to immature narrative ability: correct details are combined in an illogical fashion. Confabulation refers to filling memory gaps with fabricated information. Guidelines on the competency determination of children with developmental disabilities were compiled. It is suggested that the competency examination be replaced by a formal, pre-trial competency assessment. The court should also receive expert evidence on how to facilitate meaningful participation when a child with sufficient testimonial competence is the witness.
- Full Text:
Developed teacher leadership in a township high school : an interpretive case study
- Authors: John, Daisy Mary
- Date: 2015
- Subjects: Educational leadership -- South Africa -- Eastern Cape , School management and organization -- South Africa -- Eastern Cape , Teacher participation in administration -- South Africa -- Eastern Cape , Teacher effectiveness -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:2052 , http://hdl.handle.net/10962/d1018548
- Description: South Africa’s future success depends on a number of national priorities, amongst them the transformation of its education system. Education is the best route to follow to alleviate poverty and many other social ills. One way to overcome some of the complex challenges and crises that we face in South African schools is to pay attention to issues of leading and leadership, including the leadership of teachers. This study is done with the hope that research into teacher leadership will be one of the answers to the crisis in education. It should become a beacon of hope for all educationists who passionately want progress in the youth of South Africa. What better way than to ‘Awaken the Sleeping Giant’ of teacher leadership, borrowing the term from Katzenmeyer and Moller (2009). This study was designed as a case study, the purpose of which was to find out about the enactment of teacher leadership in an Eastern Cape township high school as well as the enhancing and hindering factors to this enactment. This study was done as a replication study of a similar study done by a group of 11Master’s students at the University of KwaZulu-Natal in 2010. Similar to the original study, this case study was located within the interpretive paradigm and drew on school profiling, survey questionnaires, a focus group interview, selfreflective journals and individual interviews for its methods of data collection. The study was framed by distributed leadership while Grant’s (2008; 2012) Model of teacher leadership was adopted as the analytical tool. It emerged from the data that the three teacher leaders, my primary participants, exhibited teacher leadership across all four zones of Grant’s (2008) Model. The first zone was leadership in the classroom where all three teacher leaders showed leadership to varying degrees. Zones Two to Four are about leadership beyond the classroom into the school and beyond. In Zone Two, the zone where teachers work with each other and the learners outside the classroom, substantial levels of leadership were enacted by the three teacher leaders. Zone Three, where leadership is exhibited in whole-school development, the three primary participants showed distinct leadership qualities as well. The fourth zone, which is about interaction with neighbouring schools, also revealed that all three teacher leaders demonstrated active leadership on a regular basis. Findings further revealed that there were only a few inhibiting factors to the leadership of teachers at the case study school, including limited resources and infrastructure as well as insufficient support and acknowledgement from the relevant stakeholders when leadership initiatives were made, either successfully or otherwise. However, the enhancing factors superseded the inhibiting factors. A functional committee culture guided by a shared vision existed in the case study school together with an ethos of trust which enabled the staff to work collaboratively. Though there was certainly room for improvement in leadership practices at this case study school, the enactment of teacher leadership in this school illustrated a strong case of ‘developed’ teacher leadership (Muijs& Harris, 2007) within a dispersed leadership framing (Gunter, 2005)
- Full Text:
- Authors: John, Daisy Mary
- Date: 2015
- Subjects: Educational leadership -- South Africa -- Eastern Cape , School management and organization -- South Africa -- Eastern Cape , Teacher participation in administration -- South Africa -- Eastern Cape , Teacher effectiveness -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:2052 , http://hdl.handle.net/10962/d1018548
- Description: South Africa’s future success depends on a number of national priorities, amongst them the transformation of its education system. Education is the best route to follow to alleviate poverty and many other social ills. One way to overcome some of the complex challenges and crises that we face in South African schools is to pay attention to issues of leading and leadership, including the leadership of teachers. This study is done with the hope that research into teacher leadership will be one of the answers to the crisis in education. It should become a beacon of hope for all educationists who passionately want progress in the youth of South Africa. What better way than to ‘Awaken the Sleeping Giant’ of teacher leadership, borrowing the term from Katzenmeyer and Moller (2009). This study was designed as a case study, the purpose of which was to find out about the enactment of teacher leadership in an Eastern Cape township high school as well as the enhancing and hindering factors to this enactment. This study was done as a replication study of a similar study done by a group of 11Master’s students at the University of KwaZulu-Natal in 2010. Similar to the original study, this case study was located within the interpretive paradigm and drew on school profiling, survey questionnaires, a focus group interview, selfreflective journals and individual interviews for its methods of data collection. The study was framed by distributed leadership while Grant’s (2008; 2012) Model of teacher leadership was adopted as the analytical tool. It emerged from the data that the three teacher leaders, my primary participants, exhibited teacher leadership across all four zones of Grant’s (2008) Model. The first zone was leadership in the classroom where all three teacher leaders showed leadership to varying degrees. Zones Two to Four are about leadership beyond the classroom into the school and beyond. In Zone Two, the zone where teachers work with each other and the learners outside the classroom, substantial levels of leadership were enacted by the three teacher leaders. Zone Three, where leadership is exhibited in whole-school development, the three primary participants showed distinct leadership qualities as well. The fourth zone, which is about interaction with neighbouring schools, also revealed that all three teacher leaders demonstrated active leadership on a regular basis. Findings further revealed that there were only a few inhibiting factors to the leadership of teachers at the case study school, including limited resources and infrastructure as well as insufficient support and acknowledgement from the relevant stakeholders when leadership initiatives were made, either successfully or otherwise. However, the enhancing factors superseded the inhibiting factors. A functional committee culture guided by a shared vision existed in the case study school together with an ethos of trust which enabled the staff to work collaboratively. Though there was certainly room for improvement in leadership practices at this case study school, the enactment of teacher leadership in this school illustrated a strong case of ‘developed’ teacher leadership (Muijs& Harris, 2007) within a dispersed leadership framing (Gunter, 2005)
- Full Text:
Developing a cross platform IMS client using the JAIN SIP applet phone
- Authors: Muswera, Walter Tawanda
- Date: 2015
- Subjects: Internet Protocol multimedia subsystem , Java (Computer program language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4712 , http://hdl.handle.net/10962/d1017934
- Description: Since the introduction of the IP Multimedia Subsystem (IMS) by the Third Generation Partnership Project (3GPP) in 2002, a lot of research has been conducted aimed at designing and implementing IMS capable clients and network elements. Though considerable work has been done in the development of IMS clients, there is no single, free and open source IMS client that provides researchers with all the required functionality needed to test the applications they are developing. For example, several open and closed source SIP/IMS clients are used within the Rhodes University Conver- gence Research Group (RUCRG) to test applications under development, as a result of the fact that the various SIP/IMS clients support different subsets of SIP/IMS features. The lack of a single client and the subsequent use of various clients comes with several problems. Researchers have to know how to deploy, configure, use and at times adapt the various clients to suit their needs. This can be very time consuming and, in fact, contradicts the IMS philosophy (the IMS was proposed to support rapid service creation). This thesis outlines the development of a Java-based, IMS compliant client called RUCRG IMS client, that uses the JAIN SIP Applet Phone (JSAP) as its foundation. JSAP, which originally offered only basic voice calling and instant messaging (IM) capabilities, was modified to be IMS compliant and support video calls, IM and presence using XML Configuration Access Protocol (XCAP).
- Full Text:
- Authors: Muswera, Walter Tawanda
- Date: 2015
- Subjects: Internet Protocol multimedia subsystem , Java (Computer program language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4712 , http://hdl.handle.net/10962/d1017934
- Description: Since the introduction of the IP Multimedia Subsystem (IMS) by the Third Generation Partnership Project (3GPP) in 2002, a lot of research has been conducted aimed at designing and implementing IMS capable clients and network elements. Though considerable work has been done in the development of IMS clients, there is no single, free and open source IMS client that provides researchers with all the required functionality needed to test the applications they are developing. For example, several open and closed source SIP/IMS clients are used within the Rhodes University Conver- gence Research Group (RUCRG) to test applications under development, as a result of the fact that the various SIP/IMS clients support different subsets of SIP/IMS features. The lack of a single client and the subsequent use of various clients comes with several problems. Researchers have to know how to deploy, configure, use and at times adapt the various clients to suit their needs. This can be very time consuming and, in fact, contradicts the IMS philosophy (the IMS was proposed to support rapid service creation). This thesis outlines the development of a Java-based, IMS compliant client called RUCRG IMS client, that uses the JAIN SIP Applet Phone (JSAP) as its foundation. JSAP, which originally offered only basic voice calling and instant messaging (IM) capabilities, was modified to be IMS compliant and support video calls, IM and presence using XML Configuration Access Protocol (XCAP).
- Full Text:
Developing a GIS based method for school site identification in the rural Eastern Cape
- Authors: Swart, Conrad Dirk
- Date: 2015
- Subjects: Geographic information systems -- South Africa -- Eastern Cape , School sites -- South Africa -- Eastern Cape , School sites -- South Africa -- Eastern Cape -- Planning , Rural schools -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4891 , http://hdl.handle.net/10962/d1018939
- Description: Historically, South Africa has not had equal education in terms of funding, curriculum or physical resources and structures. These issues are still present in contemporary South Africa and none more so than the issues surrounding “mud schools”. Recently the Department of Basic Education (DBE) implemented a plan to eradicate inappropriate school structures using the Accelerated Schools Infrastructure Delivery Initiative program (ASIDI). Questions around effective placement of schools are now being asked. Using interviews and analysis of literature, this research developed criteria needed to determine how rural school sites are selected. Geographical Information Systems (GIS) was used to determine if current sites are in the most appropriate areas. The results of the research included a unique set of Eastern Cape criteria as well as an analysis of the current site selection methods used by the DBE. It also revealed that most of the schools are being constructed in acceptable areas. The main result that emerged from the research was that schools will be placed in areas where they are needed. Developing site selection criteria is still needed as South Africa seeks to reduce the education gap between rich and poor schools.
- Full Text:
- Authors: Swart, Conrad Dirk
- Date: 2015
- Subjects: Geographic information systems -- South Africa -- Eastern Cape , School sites -- South Africa -- Eastern Cape , School sites -- South Africa -- Eastern Cape -- Planning , Rural schools -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4891 , http://hdl.handle.net/10962/d1018939
- Description: Historically, South Africa has not had equal education in terms of funding, curriculum or physical resources and structures. These issues are still present in contemporary South Africa and none more so than the issues surrounding “mud schools”. Recently the Department of Basic Education (DBE) implemented a plan to eradicate inappropriate school structures using the Accelerated Schools Infrastructure Delivery Initiative program (ASIDI). Questions around effective placement of schools are now being asked. Using interviews and analysis of literature, this research developed criteria needed to determine how rural school sites are selected. Geographical Information Systems (GIS) was used to determine if current sites are in the most appropriate areas. The results of the research included a unique set of Eastern Cape criteria as well as an analysis of the current site selection methods used by the DBE. It also revealed that most of the schools are being constructed in acceptable areas. The main result that emerged from the research was that schools will be placed in areas where they are needed. Developing site selection criteria is still needed as South Africa seeks to reduce the education gap between rich and poor schools.
- Full Text: