Cognitive pharmaceutical services and the community pharmacist: are South African patients receiving them and are they willing to pay?
- Hill, Peter W, Dowse, Roslind
- Authors: Hill, Peter W , Dowse, Roslind
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156829 , vital:40054 , DOI 10.1211/ijpp.15.2.0007
- Description: The objectives of this study were to ascertain the opinions of randomly selected South African medical aid members regarding the provision by community pharmacists of patient counselling and information; member satisfaction with pharmacist services; their rating of pharmacist accessibility; and if pharmacists should be reimbursed for providing cognitive pharmaceutical services. Setting A South African private healthcare insurance company.
- Full Text:
- Authors: Hill, Peter W , Dowse, Roslind
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156829 , vital:40054 , DOI 10.1211/ijpp.15.2.0007
- Description: The objectives of this study were to ascertain the opinions of randomly selected South African medical aid members regarding the provision by community pharmacists of patient counselling and information; member satisfaction with pharmacist services; their rating of pharmacist accessibility; and if pharmacists should be reimbursed for providing cognitive pharmaceutical services. Setting A South African private healthcare insurance company.
- Full Text:
Duplicating road patterns in south african informal settlements using procedural techniques
- Glass, Kevin R, Morkel, Chantelle, Bangay, Shaun D
- Authors: Glass, Kevin R , Morkel, Chantelle , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432875 , vital:72909 , https://doi.org/10.1145/1108590.1108616
- Description: The formation of informal settlements in and around urban complexes has largely been ignored in the context of procedural city modeling. However, many cities in South Africa and globally can attest to the presence of such settlements. This paper analyses the phenomenon of informal settlements from a procedural modeling perspective. Aerial photography from two South African urban complexes, namely Johannesburg and Cape Town is used as a basis for the extraction of various features that distinguish different types of settlements. In particular, the road patterns which have formed within such settlements are analysed, and various procedural techniques proposed (including Voronoi diagrams, subdivision and L-systems) to replicate the identified features. A qualitative assessment of the procedural techniques is provided, and the most suitable combination of techniques identified for unstructured and structured settlements. In particular it is found that a combination of Voronoi diagrams and subdivision provides the closest match to unstructured informal settlements. A combination of L-systems, Voronoi diagrams and subdivision is found to produce the closest pattern to a structured informal settlement.
- Full Text:
- Authors: Glass, Kevin R , Morkel, Chantelle , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432875 , vital:72909 , https://doi.org/10.1145/1108590.1108616
- Description: The formation of informal settlements in and around urban complexes has largely been ignored in the context of procedural city modeling. However, many cities in South Africa and globally can attest to the presence of such settlements. This paper analyses the phenomenon of informal settlements from a procedural modeling perspective. Aerial photography from two South African urban complexes, namely Johannesburg and Cape Town is used as a basis for the extraction of various features that distinguish different types of settlements. In particular, the road patterns which have formed within such settlements are analysed, and various procedural techniques proposed (including Voronoi diagrams, subdivision and L-systems) to replicate the identified features. A qualitative assessment of the procedural techniques is provided, and the most suitable combination of techniques identified for unstructured and structured settlements. In particular it is found that a combination of Voronoi diagrams and subdivision provides the closest match to unstructured informal settlements. A combination of L-systems, Voronoi diagrams and subdivision is found to produce the closest pattern to a structured informal settlement.
- Full Text:
Managing South Africa's trawl bycatch
- Walmsley, Sarah A, Leslie, Rob W, Sauer, Warwick H H
- Authors: Walmsley, Sarah A , Leslie, Rob W , Sauer, Warwick H H
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124954 , vital:35713 , https://doi.10.1093/icesjms/fsl022
- Description: Over the past few decades, it has become widely recognized that the management strategies of world fisheries must ensure sustainability of bycatch as well as of target species. South Africa implemented a pilot observer programme from 1995 to 2000 to collect data on the levels and patterns of bycatch and discards in the demersal trawl fishery. Here, the results of that programme are used in conjunction with information on bycatch value and compliance to assess the issues and problems regarding bycatch and discarding in the fishery. In general, bycatch components can be placed into one of three categories (discarded bycatch, retained bycatch, and processing waste), each of which present different management problems and require different management approaches. The results were used to formulate a bycatch management plan for the demersal trawl fishery in South Africa. Given the need to continue monitoring bycatch, the performance of the pilot observer programme is reviewed, and the levels of sampling effort required for a national programme are discussed.
- Full Text:
- Authors: Walmsley, Sarah A , Leslie, Rob W , Sauer, Warwick H H
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124954 , vital:35713 , https://doi.10.1093/icesjms/fsl022
- Description: Over the past few decades, it has become widely recognized that the management strategies of world fisheries must ensure sustainability of bycatch as well as of target species. South Africa implemented a pilot observer programme from 1995 to 2000 to collect data on the levels and patterns of bycatch and discards in the demersal trawl fishery. Here, the results of that programme are used in conjunction with information on bycatch value and compliance to assess the issues and problems regarding bycatch and discarding in the fishery. In general, bycatch components can be placed into one of three categories (discarded bycatch, retained bycatch, and processing waste), each of which present different management problems and require different management approaches. The results were used to formulate a bycatch management plan for the demersal trawl fishery in South Africa. Given the need to continue monitoring bycatch, the performance of the pilot observer programme is reviewed, and the levels of sampling effort required for a national programme are discussed.
- Full Text:
Nestmate recognition and genetic variability among individuals from nests of the queenless ponerine ant, Streblognathus aethiopicus Smith (Hymenoptera: Formicidae)
- Schluns, E A, Neumann, Peter, Schluns, H, Hepburn, H Randall, Moritz, Robin F A
- Authors: Schluns, E A , Neumann, Peter , Schluns, H , Hepburn, H Randall , Moritz, Robin F A
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/452000 , vital:75094 , https://hdl.handle.net/10520/EJC32667
- Description: Nestmate recognition in the queenless ponerine ant, Streblognathus aethiopicus, was evaluated with a behavioural bioassay. Ten pairs of nests were randomly chosen from an aggregation of 74 nests. While nestmates never showed aggression towards each other, the behaviour towards non-nestmates was either aggressive or non-aggressive, demonstrating the ability to recognize nestmates. Also, the nests in this aggregation were evenly spaced, further supporting the notion of territoriality in this species. To evaluate the relative importance of environment and genetics on the observed variation in nestmate recognition, we measured the spatial and genetic distances between nests. Workers of 13 nests were genotyped with the AFLP technique. Multiple regression analysis revealed no significant impact of spatial and genetic distance on aggressive behaviour. Thus, further studies are necessary to reveal the actual mechanisms underlying nestmate recognition in this species. Two distinct groups of nests with genetically homogeneous and heterogeneous workers were found, which may indicate gamergate replacement or colony fission.
- Full Text:
- Authors: Schluns, E A , Neumann, Peter , Schluns, H , Hepburn, H Randall , Moritz, Robin F A
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/452000 , vital:75094 , https://hdl.handle.net/10520/EJC32667
- Description: Nestmate recognition in the queenless ponerine ant, Streblognathus aethiopicus, was evaluated with a behavioural bioassay. Ten pairs of nests were randomly chosen from an aggregation of 74 nests. While nestmates never showed aggression towards each other, the behaviour towards non-nestmates was either aggressive or non-aggressive, demonstrating the ability to recognize nestmates. Also, the nests in this aggregation were evenly spaced, further supporting the notion of territoriality in this species. To evaluate the relative importance of environment and genetics on the observed variation in nestmate recognition, we measured the spatial and genetic distances between nests. Workers of 13 nests were genotyped with the AFLP technique. Multiple regression analysis revealed no significant impact of spatial and genetic distance on aggressive behaviour. Thus, further studies are necessary to reveal the actual mechanisms underlying nestmate recognition in this species. Two distinct groups of nests with genetically homogeneous and heterogeneous workers were found, which may indicate gamergate replacement or colony fission.
- Full Text:
Wireless Security Tools
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
- «
- ‹
- 1
- ›
- »