Bodies that belong: race and space in Elleke Boehmer's Nile Baby
- Authors: Marais, Mike
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144094 , vital:38310 , DOI: 10.1080/00138398.2010.488337
- Description: South African literature has never been particularly perceptive in addressing the question of race. While this is especially true of writing of the apartheid period, not much has changed in the postapartheid years. Only rarely does one encounter a literary treatment of race that is aware of its performative, rather than essential, nature. Rarer still are works that are conscious of the ways in which we gain a sense of belonging by shaping our environments to affirm our raced subjectives.
- Full Text:
- Date Issued: 2010
- Authors: Marais, Mike
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144094 , vital:38310 , DOI: 10.1080/00138398.2010.488337
- Description: South African literature has never been particularly perceptive in addressing the question of race. While this is especially true of writing of the apartheid period, not much has changed in the postapartheid years. Only rarely does one encounter a literary treatment of race that is aware of its performative, rather than essential, nature. Rarer still are works that are conscious of the ways in which we gain a sense of belonging by shaping our environments to affirm our raced subjectives.
- Full Text:
- Date Issued: 2010
Cyber security: Challenges and the way forward
- Ayofe, Azeez N, Irwin, Barry V W
- Authors: Ayofe, Azeez N , Irwin, Barry V W
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428613 , vital:72524 , https://d1wqtxts1xzle7.cloudfront.net/62565276/171920200330-53981-1mqgyr5.pdf?1585592737=andresponse-content-disposi-tion=inline%3B+filename%3DCYBER_SECURITY_CHALLENGES_AND_THE_WAY_FO.pdfandExpires=1714729368andSignature=dPUCAd1sMUF-gyDTkBFb2lzDvkVNpfp0sk1z-CdAeHH6O759dBiO-M158drmJsOo1XtOJBY4tNd8Um2gi11zw4U8yEzHO-bGUJGJTJcooTXaKwZLT-wPqS779Qo2oeiQOIiuAx6zSdcfSGjbDfFOL1YWV9UeKvhtcnGJ3p-CjJAhiPWJorGn1-z8mO6oouWzyJYc0hV0-Po8yywJD60eC2S6llQmfNRpX4otgq4fgZwZu4TEcMUWPfBzGPFPNYcCLfiQVK0YLV~XdTCWrhTlYPSMzVSs~DhQk9QPBU7IGmzQkGZo3UXnNu1slCVLb9Dqm~9DSbmttIXIDGYXEjP9l4w__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: The high level of insecurity on the internet is becoming worrisome so much so that transaction on the web has become a thing of doubt. Cy-bercrime is becoming ever more serious and prevalent. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international per-spective on fighting Cybercrime. This work seeks to define the concept of cyber-crime, explain tools being used by the criminals to perpetrate their evil handiworks, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involve-ment, we would look at how best to detect a criminal mail and in conclu-sion, proffer recommendations that would help in checking the increas-ing rate of cyber-crimes and criminals.
- Full Text:
- Date Issued: 2010
- Authors: Ayofe, Azeez N , Irwin, Barry V W
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428613 , vital:72524 , https://d1wqtxts1xzle7.cloudfront.net/62565276/171920200330-53981-1mqgyr5.pdf?1585592737=andresponse-content-disposi-tion=inline%3B+filename%3DCYBER_SECURITY_CHALLENGES_AND_THE_WAY_FO.pdfandExpires=1714729368andSignature=dPUCAd1sMUF-gyDTkBFb2lzDvkVNpfp0sk1z-CdAeHH6O759dBiO-M158drmJsOo1XtOJBY4tNd8Um2gi11zw4U8yEzHO-bGUJGJTJcooTXaKwZLT-wPqS779Qo2oeiQOIiuAx6zSdcfSGjbDfFOL1YWV9UeKvhtcnGJ3p-CjJAhiPWJorGn1-z8mO6oouWzyJYc0hV0-Po8yywJD60eC2S6llQmfNRpX4otgq4fgZwZu4TEcMUWPfBzGPFPNYcCLfiQVK0YLV~XdTCWrhTlYPSMzVSs~DhQk9QPBU7IGmzQkGZo3UXnNu1slCVLb9Dqm~9DSbmttIXIDGYXEjP9l4w__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: The high level of insecurity on the internet is becoming worrisome so much so that transaction on the web has become a thing of doubt. Cy-bercrime is becoming ever more serious and prevalent. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international per-spective on fighting Cybercrime. This work seeks to define the concept of cyber-crime, explain tools being used by the criminals to perpetrate their evil handiworks, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involve-ment, we would look at how best to detect a criminal mail and in conclu-sion, proffer recommendations that would help in checking the increas-ing rate of cyber-crimes and criminals.
- Full Text:
- Date Issued: 2010
Localisation of Theiler's murine encephalomyelitis virus protein 2C to the golgi apparatus using antibodies generated against a peptide region:
- Jauka, Tembisa, Mutsvunguma, Lorraine Z, Boshoff, Aileen, Edkins, Adrienne L, Knox, Caroline M
- Authors: Jauka, Tembisa , Mutsvunguma, Lorraine Z , Boshoff, Aileen , Edkins, Adrienne L , Knox, Caroline M
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165074 , vital:41206 , DOI: 10.1016/j.jviromet.2010.05.009
- Description: The picornavirus 2C protein is highly conserved and indispensible for virus replication. Polyclonal antibodies against Theiler's murine encephalomyelitis virus (TMEV) 2C protein were generated by immunisation of rabbits with a peptide comprising amino acids 31–210 of the protein. Antibodies were used to investigate the localisation of 2C in infected cells by indirect immunofluorescence and confocal microscopy. Analysis of infected cells revealed that the distribution of 2C changed during infection.
- Full Text:
- Date Issued: 2010
- Authors: Jauka, Tembisa , Mutsvunguma, Lorraine Z , Boshoff, Aileen , Edkins, Adrienne L , Knox, Caroline M
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165074 , vital:41206 , DOI: 10.1016/j.jviromet.2010.05.009
- Description: The picornavirus 2C protein is highly conserved and indispensible for virus replication. Polyclonal antibodies against Theiler's murine encephalomyelitis virus (TMEV) 2C protein were generated by immunisation of rabbits with a peptide comprising amino acids 31–210 of the protein. Antibodies were used to investigate the localisation of 2C in infected cells by indirect immunofluorescence and confocal microscopy. Analysis of infected cells revealed that the distribution of 2C changed during infection.
- Full Text:
- Date Issued: 2010
A tuple space web service for distributed programming-Simplifying distributed web services applications
- Wells, George C, Mueller, Barbara, Schulé, Lo¨ıc
- Authors: Wells, George C , Mueller, Barbara , Schulé, Lo¨ıc
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430437 , vital:72691 , https://www.scitepress.org/PublishedPapers/2008/15170/15170.pdf
- Description: This paper describes a new tuple space web service for coordination and communication in distributed web applications. This web service is based on the Linda programming model. Linda is a coordination lan-guage for parallel and distributed processing, providing a communica-tion mechanism based on a logically shared memory space. The origi-nal Linda model has been extended through the provision of a pro-grammable mechanism, providing additional flexibility and improved performance. The implementation of the web service is discussed, to-gether with the details of the programmable matching mechanism. Some results from the implementation of a location-based mobile appli-cation, using the tuple space web service are presented, demonstrating the benefits of our system.
- Full Text:
- Date Issued: 2008
- Authors: Wells, George C , Mueller, Barbara , Schulé, Lo¨ıc
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430437 , vital:72691 , https://www.scitepress.org/PublishedPapers/2008/15170/15170.pdf
- Description: This paper describes a new tuple space web service for coordination and communication in distributed web applications. This web service is based on the Linda programming model. Linda is a coordination lan-guage for parallel and distributed processing, providing a communica-tion mechanism based on a logically shared memory space. The origi-nal Linda model has been extended through the provision of a pro-grammable mechanism, providing additional flexibility and improved performance. The implementation of the web service is discussed, to-gether with the details of the programmable matching mechanism. Some results from the implementation of a location-based mobile appli-cation, using the tuple space web service are presented, demonstrating the benefits of our system.
- Full Text:
- Date Issued: 2008
Automating the creation of 3D animation from annotated fiction text
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432639 , vital:72889 , https://www.iadisportal.org/digital-library/automating-the-creation-of-3d-animation-from-annotated-fiction-text
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2008
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432639 , vital:72889 , https://www.iadisportal.org/digital-library/automating-the-creation-of-3d-animation-from-annotated-fiction-text
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2008
The relationship between emergence of the shortest path and information value using ant-like agents
- Chibaya, Colin, Bangay, Shaun D
- Authors: Chibaya, Colin , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433318 , vital:72961 , https://doi.org/10.1145/1456659.1456663
- Description: Ant-like agents forage between two points. These agents' probabilistic movements are based on the use of two pheromones; one marking trails towards the goal and another marking trails back to the starting point. Path selection decisions are influenced by the relative levels of attractive and repulsive pheromone in each agent's local environment. Our work in [5] evaluates three pheromone perception strategies, investigating path formation speed, quality, directionality, robustness and adaptability under different parameter settings(degree of randomness, pheromone evaporation rate and pheromone diffusion rate).
- Full Text:
- Date Issued: 2008
- Authors: Chibaya, Colin , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433318 , vital:72961 , https://doi.org/10.1145/1456659.1456663
- Description: Ant-like agents forage between two points. These agents' probabilistic movements are based on the use of two pheromones; one marking trails towards the goal and another marking trails back to the starting point. Path selection decisions are influenced by the relative levels of attractive and repulsive pheromone in each agent's local environment. Our work in [5] evaluates three pheromone perception strategies, investigating path formation speed, quality, directionality, robustness and adaptability under different parameter settings(degree of randomness, pheromone evaporation rate and pheromone diffusion rate).
- Full Text:
- Date Issued: 2008
Viewpoint: reading conference recommendations in a wider context of social change
- Authors: Lotz-Sisitka, Heila
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67411 , vital:29085 , https://www.ajol.info/index.php/sajee/article/view/122783
- Description: publisher version , This short Viewpoint paper considers the role and value of conference recommendations in shaping the field of environmental education. It explores the social politics, and often contested nature, of conference recommendations and their institutional histories, arguing that the act of producing conference recommendations forms part of the practices of new social movements. The paper recommends historicising conference recommendations and OEcross readings‚ to consider changing discourses and new developments in the field. Accompanying the short Viewpoint paper, are two sets of recently produced conference recommendations, one from the 4th International Environmental Education Conference held in Ahmedabad, India, and the other from the 1st International Conference on Mainstreaming Environment and Sustainability in African Universities held in Nairobi, Kenya.
- Full Text:
- Date Issued: 2008
- Authors: Lotz-Sisitka, Heila
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67411 , vital:29085 , https://www.ajol.info/index.php/sajee/article/view/122783
- Description: publisher version , This short Viewpoint paper considers the role and value of conference recommendations in shaping the field of environmental education. It explores the social politics, and often contested nature, of conference recommendations and their institutional histories, arguing that the act of producing conference recommendations forms part of the practices of new social movements. The paper recommends historicising conference recommendations and OEcross readings‚ to consider changing discourses and new developments in the field. Accompanying the short Viewpoint paper, are two sets of recently produced conference recommendations, one from the 4th International Environmental Education Conference held in Ahmedabad, India, and the other from the 1st International Conference on Mainstreaming Environment and Sustainability in African Universities held in Nairobi, Kenya.
- Full Text:
- Date Issued: 2008
Women’s rights get a dressing down: mini skirt attacks in South Africa
- Authors: Vincent, Louise
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141888 , vital:38013 , DOI: 10.18848/1447-9508/cgp/v06i06/42462
- Description: On Sunday the 17th of February 2008 25-year old Nwabisa Ngcukana was stripped, paraded naked while more than 100 onlookers jeered and laughed, doused in alcohol and sexually assaulted by taxi drivers and hawkers at the Noord Street taxi rank in Johannesburg1 (The Star 2008: 2). She was the fourth woman to be assaulted in this way at the rank on that evening. Three other women were stripped and sexually assaulted at the same taxi rank on the previous day. In each of these cases the fact that the women were wearing mini skirts was cited as the reason for the attack.
- Full Text:
- Date Issued: 2008
- Authors: Vincent, Louise
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141888 , vital:38013 , DOI: 10.18848/1447-9508/cgp/v06i06/42462
- Description: On Sunday the 17th of February 2008 25-year old Nwabisa Ngcukana was stripped, paraded naked while more than 100 onlookers jeered and laughed, doused in alcohol and sexually assaulted by taxi drivers and hawkers at the Noord Street taxi rank in Johannesburg1 (The Star 2008: 2). She was the fourth woman to be assaulted in this way at the rank on that evening. Three other women were stripped and sexually assaulted at the same taxi rank on the previous day. In each of these cases the fact that the women were wearing mini skirts was cited as the reason for the attack.
- Full Text:
- Date Issued: 2008
An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society
- Thinyane, Mamello, Dalvit, Lorenzo, Slay, Hannah, Mapi, Thandeka, Terzoli, Alfredo
- Authors: Thinyane, Mamello , Dalvit, Lorenzo , Slay, Hannah , Mapi, Thandeka , Terzoli, Alfredo
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431218 , vital:72755 , https://doi.org/10.1145/1292491.1292508
- Description: With the information revolution that promises to shape the 21st century, knowledge has become the prime commodity, very much like land, means of production and capital have been at different times in the past. Access to information, made instantly available by the growth of the Internet, determines access to economic resources, social participa-tion and better quality of life. For this reason, the knowledge stored on the Web and the advantages offered by the spread of Information and Communication Technology (ICT) are equally important for rich socie-ties to prosper and for poor ones to develop. The only difference is that marginalised communities do not have access to the tools and have little control over the content found in the domain of ICTs. In this paper we describe an intervention to develop the potential of a typical rural community in South Africa through ICTs. This involves providing Inter-net connectivity and deploying a platform to support e-commerce, e-learning, e-government and e-health. The core of the platform is an on-tology-based model designed to integrate and respond to Indigenous Knowledge Systems. This has been achieved by combining a deep understanding of local knowledge and social networks with the use of authoring, communication and ontology-management tools. The prima-ry goal of this new approach is to find a way to make ICT solutions more sensitive to the local context, and therefore more effective. Sec-ondly, we hope to foster a sense of ownership of the project among the community, by capitalising on local knowledge and resources.
- Full Text:
- Date Issued: 2007
- Authors: Thinyane, Mamello , Dalvit, Lorenzo , Slay, Hannah , Mapi, Thandeka , Terzoli, Alfredo
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431218 , vital:72755 , https://doi.org/10.1145/1292491.1292508
- Description: With the information revolution that promises to shape the 21st century, knowledge has become the prime commodity, very much like land, means of production and capital have been at different times in the past. Access to information, made instantly available by the growth of the Internet, determines access to economic resources, social participa-tion and better quality of life. For this reason, the knowledge stored on the Web and the advantages offered by the spread of Information and Communication Technology (ICT) are equally important for rich socie-ties to prosper and for poor ones to develop. The only difference is that marginalised communities do not have access to the tools and have little control over the content found in the domain of ICTs. In this paper we describe an intervention to develop the potential of a typical rural community in South Africa through ICTs. This involves providing Inter-net connectivity and deploying a platform to support e-commerce, e-learning, e-government and e-health. The core of the platform is an on-tology-based model designed to integrate and respond to Indigenous Knowledge Systems. This has been achieved by combining a deep understanding of local knowledge and social networks with the use of authoring, communication and ontology-management tools. The prima-ry goal of this new approach is to find a way to make ICT solutions more sensitive to the local context, and therefore more effective. Sec-ondly, we hope to foster a sense of ownership of the project among the community, by capitalising on local knowledge and resources.
- Full Text:
- Date Issued: 2007
Animated feather coats using field lines
- Authors: Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433338 , vital:72963 , https://doi.org/10.1145/1294685.1294713
- Description: The tedious task of manually placing feathers on computer animated ob-jects involves aligning feathers, ensuring that they do not insect each other or penetrate the surface, deforming every feather to match the local surface features, and ensuring that the feather coat is consistent when the underly-ing object is animated. We present a technique for generating a feather coat over an object. Feather orientation is specified quickly and easily, feathers are deformed while ensuring collision prevention, and the coat can be ani-mated. We create a vector field in the space surrounding the body object and deform feathers to align with the field lines. The non-intersection proper-ty of the field lines ensures that feather intersections are avoided. We pro-vide a formulation of a suitable vector field and demonstrate that it is capa-ble of producing realistic feather coats. The process can easily be integrated into the work-flow of standard modelling and animation processes. We show examples of feather coat creation on a range of objects, proving that field line based placement of feather coats provides the desired functionality for feather modelling and animation.
- Full Text:
- Date Issued: 2007
- Authors: Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433338 , vital:72963 , https://doi.org/10.1145/1294685.1294713
- Description: The tedious task of manually placing feathers on computer animated ob-jects involves aligning feathers, ensuring that they do not insect each other or penetrate the surface, deforming every feather to match the local surface features, and ensuring that the feather coat is consistent when the underly-ing object is animated. We present a technique for generating a feather coat over an object. Feather orientation is specified quickly and easily, feathers are deformed while ensuring collision prevention, and the coat can be ani-mated. We create a vector field in the space surrounding the body object and deform feathers to align with the field lines. The non-intersection proper-ty of the field lines ensures that feather intersections are avoided. We pro-vide a formulation of a suitable vector field and demonstrate that it is capa-ble of producing realistic feather coats. The process can easily be integrated into the work-flow of standard modelling and animation processes. We show examples of feather coat creation on a range of objects, proving that field line based placement of feather coats provides the desired functionality for feather modelling and animation.
- Full Text:
- Date Issued: 2007
Does 'African mathematics' facilitate access to mathematics?: towards an ongoing critical analysis of ethnomathematics in a South African context
- Horsthemke, Kai, Schäfer, Marc
- Authors: Horsthemke, Kai , Schäfer, Marc
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141004 , vital:37936 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20885
- Description: Mosibudi Mangena, the Minister of Science and Technology, said in an address to the Annual Congress of the South African Mathematical Society at the University of the Potchefstroom, November 2, 2004: "There is one thing we need to address before anything else. We need to increase the number of young people, particularly blacks and women, who are able to successfully complete the first course in Mathematics at our universities." How is this to be achieved? A popular trend involves a call for the introduction and incorporation of so-called ethnomathematics, and more particularly 'African mathematics', into secondary and tertiary curricula. Although acknowledging the obvious benefits of so-called ethnomathematics, this paper critically analyses three aspects of ethnomathematics that have been neglected in past critiques. Our focus is not on the relationship as such between ethnomathematics and mathematics education. Our critique involves (1) epistemological and logical misgivings, (2) a new look at practices and skills, (3) concerns about embracing 'African mathematics' as valid and valuable - just because it is African.
- Full Text:
- Date Issued: 2007
- Authors: Horsthemke, Kai , Schäfer, Marc
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141004 , vital:37936 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20885
- Description: Mosibudi Mangena, the Minister of Science and Technology, said in an address to the Annual Congress of the South African Mathematical Society at the University of the Potchefstroom, November 2, 2004: "There is one thing we need to address before anything else. We need to increase the number of young people, particularly blacks and women, who are able to successfully complete the first course in Mathematics at our universities." How is this to be achieved? A popular trend involves a call for the introduction and incorporation of so-called ethnomathematics, and more particularly 'African mathematics', into secondary and tertiary curricula. Although acknowledging the obvious benefits of so-called ethnomathematics, this paper critically analyses three aspects of ethnomathematics that have been neglected in past critiques. Our focus is not on the relationship as such between ethnomathematics and mathematics education. Our critique involves (1) epistemological and logical misgivings, (2) a new look at practices and skills, (3) concerns about embracing 'African mathematics' as valid and valuable - just because it is African.
- Full Text:
- Date Issued: 2007
Language policy and planning: general constraints and pressures
- Authors: Wright, Laurence
- Date: 2007
- Language: English
- Type: text , article
- Identifier: vital:7043 , http://hdl.handle.net/10962/d1007385
- Description: preprint , The general idea of language policy and planning is easily expressed. Christopher Brumfit, for one, defines language planning as “The attempt to control the use, status, and structure of a language through a language policy developed by a government or other authority” (see the Oxford Companion to the English Language). The Random House Dictionary of the English Language concurs, but adds some detail: language planning is “the development of policies or programmes designed to direct or change language use, as through the establishment of an official language, the standardization or modernization of a language, or the development or alteration of a writing system”. Such definitions could easily be multiplied, and they differ only slightly in nuance and depth.Language Policy is the formal, often legally entrenched, expression of language planning.
- Full Text:
- Date Issued: 2007
- Authors: Wright, Laurence
- Date: 2007
- Language: English
- Type: text , article
- Identifier: vital:7043 , http://hdl.handle.net/10962/d1007385
- Description: preprint , The general idea of language policy and planning is easily expressed. Christopher Brumfit, for one, defines language planning as “The attempt to control the use, status, and structure of a language through a language policy developed by a government or other authority” (see the Oxford Companion to the English Language). The Random House Dictionary of the English Language concurs, but adds some detail: language planning is “the development of policies or programmes designed to direct or change language use, as through the establishment of an official language, the standardization or modernization of a language, or the development or alteration of a writing system”. Such definitions could easily be multiplied, and they differ only slightly in nuance and depth.Language Policy is the formal, often legally entrenched, expression of language planning.
- Full Text:
- Date Issued: 2007
Spatial and seasonal distribution patterns of juvenile and adult raggedtooth sharks (Carcharias taurus) tagged off the east coast of South Africa
- Dicken, Matthew L, Booth, Anthony J, Smale, Malcolm J, Cliff, G
- Authors: Dicken, Matthew L , Booth, Anthony J , Smale, Malcolm J , Cliff, G
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/126997 , vital:35942 , https://doi.10.1071/MF06018
- Description: Crucial to effective fisheries management is a thorough understanding of the stock structure of a population. Understanding the spatial and seasonal distribution patterns of a species is necessary to define habitat use and evaluate the potential effects of exploitation and anthropogenic activities. This is particularly important for a species such as the raggedtooth shark (Carcharias Taurus Rafinesque, 1810), whose life-history characteristics make it particularly susceptible to over-exploitation (Pollard et al. 1996; Smith et al. 1998; Compagno 2001). Exploitation, even at low levels for a slow-growing, late-maturing species that only produces two pups every other year, could reduce the population growth rate, could reduce the population growth rate to values of λ<1.0, resulting in severe population declines in a very short time period (Baum et al. 2003).
- Full Text:
- Date Issued: 2007
- Authors: Dicken, Matthew L , Booth, Anthony J , Smale, Malcolm J , Cliff, G
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/126997 , vital:35942 , https://doi.10.1071/MF06018
- Description: Crucial to effective fisheries management is a thorough understanding of the stock structure of a population. Understanding the spatial and seasonal distribution patterns of a species is necessary to define habitat use and evaluate the potential effects of exploitation and anthropogenic activities. This is particularly important for a species such as the raggedtooth shark (Carcharias Taurus Rafinesque, 1810), whose life-history characteristics make it particularly susceptible to over-exploitation (Pollard et al. 1996; Smith et al. 1998; Compagno 2001). Exploitation, even at low levels for a slow-growing, late-maturing species that only produces two pups every other year, could reduce the population growth rate, could reduce the population growth rate to values of λ<1.0, resulting in severe population declines in a very short time period (Baum et al. 2003).
- Full Text:
- Date Issued: 2007
Submerged membrane bioreactor and secondary digestion for the treatment of wine distillery wastewater: Part I: Raw wine distillery wastewater digestion
- Melamane, Xolisa L, Tandlich, Roman, Burgess, Jo E
- Authors: Melamane, Xolisa L , Tandlich, Roman , Burgess, Jo E
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76139 , vital:30511 , https://www.prt-parlar.de/download_feb_2007/
- Description: A combination of a submerged membrane bioreactor (SMBR) and a secondary digester was tested for the treatment of wine distillery wastewater (WDW). The experimental system, consisting of four individual reactors, was tested during a 30-days study. Buffering of pH was achieved by mixing the feed stream of the system with 1000 mg/l of CaCO3 and K2HPO4 for the initial 10 days of the bioreactor system operation, and with 8000 mg/l of CaCO3 and 4000 mg/l of K2HPO4 for the remainder of the study. Buffering proved to be significant for optimum performance of the system in removal of soluble chemical oxygen demand (CODS), and volatile fatty acids (VFAs). Different batches of WDW used for feeding the reactor had variable compositions with respect to concentrations of nitrates, ammonium and the total concentration of phenolic compounds. Am-monium accumulated in the secondary digester after 14 days of treatment system operation, indicating the time required for the establishment of anaerobic conditions in the system. An additional step would be required for removal of phosphates from the effluent of the bioreactor, e.g., reverse osmosis, if the effluent is to be reused in production or other applications.
- Full Text:
- Date Issued: 2007
- Authors: Melamane, Xolisa L , Tandlich, Roman , Burgess, Jo E
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76139 , vital:30511 , https://www.prt-parlar.de/download_feb_2007/
- Description: A combination of a submerged membrane bioreactor (SMBR) and a secondary digester was tested for the treatment of wine distillery wastewater (WDW). The experimental system, consisting of four individual reactors, was tested during a 30-days study. Buffering of pH was achieved by mixing the feed stream of the system with 1000 mg/l of CaCO3 and K2HPO4 for the initial 10 days of the bioreactor system operation, and with 8000 mg/l of CaCO3 and 4000 mg/l of K2HPO4 for the remainder of the study. Buffering proved to be significant for optimum performance of the system in removal of soluble chemical oxygen demand (CODS), and volatile fatty acids (VFAs). Different batches of WDW used for feeding the reactor had variable compositions with respect to concentrations of nitrates, ammonium and the total concentration of phenolic compounds. Am-monium accumulated in the secondary digester after 14 days of treatment system operation, indicating the time required for the establishment of anaerobic conditions in the system. An additional step would be required for removal of phosphates from the effluent of the bioreactor, e.g., reverse osmosis, if the effluent is to be reused in production or other applications.
- Full Text:
- Date Issued: 2007
Cognitive pharmaceutical services and the community pharmacist: are South African patients receiving them and are they willing to pay?
- Hill, Peter W, Dowse, Roslind
- Authors: Hill, Peter W , Dowse, Roslind
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156829 , vital:40054 , DOI 10.1211/ijpp.15.2.0007
- Description: The objectives of this study were to ascertain the opinions of randomly selected South African medical aid members regarding the provision by community pharmacists of patient counselling and information; member satisfaction with pharmacist services; their rating of pharmacist accessibility; and if pharmacists should be reimbursed for providing cognitive pharmaceutical services. Setting A South African private healthcare insurance company.
- Full Text:
- Date Issued: 2006
- Authors: Hill, Peter W , Dowse, Roslind
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156829 , vital:40054 , DOI 10.1211/ijpp.15.2.0007
- Description: The objectives of this study were to ascertain the opinions of randomly selected South African medical aid members regarding the provision by community pharmacists of patient counselling and information; member satisfaction with pharmacist services; their rating of pharmacist accessibility; and if pharmacists should be reimbursed for providing cognitive pharmaceutical services. Setting A South African private healthcare insurance company.
- Full Text:
- Date Issued: 2006
Duplicating road patterns in south african informal settlements using procedural techniques
- Glass, Kevin R, Morkel, Chantelle, Bangay, Shaun D
- Authors: Glass, Kevin R , Morkel, Chantelle , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432875 , vital:72909 , https://doi.org/10.1145/1108590.1108616
- Description: The formation of informal settlements in and around urban complexes has largely been ignored in the context of procedural city modeling. However, many cities in South Africa and globally can attest to the presence of such settlements. This paper analyses the phenomenon of informal settlements from a procedural modeling perspective. Aerial photography from two South African urban complexes, namely Johannesburg and Cape Town is used as a basis for the extraction of various features that distinguish different types of settlements. In particular, the road patterns which have formed within such settlements are analysed, and various procedural techniques proposed (including Voronoi diagrams, subdivision and L-systems) to replicate the identified features. A qualitative assessment of the procedural techniques is provided, and the most suitable combination of techniques identified for unstructured and structured settlements. In particular it is found that a combination of Voronoi diagrams and subdivision provides the closest match to unstructured informal settlements. A combination of L-systems, Voronoi diagrams and subdivision is found to produce the closest pattern to a structured informal settlement.
- Full Text:
- Date Issued: 2006
- Authors: Glass, Kevin R , Morkel, Chantelle , Bangay, Shaun D
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432875 , vital:72909 , https://doi.org/10.1145/1108590.1108616
- Description: The formation of informal settlements in and around urban complexes has largely been ignored in the context of procedural city modeling. However, many cities in South Africa and globally can attest to the presence of such settlements. This paper analyses the phenomenon of informal settlements from a procedural modeling perspective. Aerial photography from two South African urban complexes, namely Johannesburg and Cape Town is used as a basis for the extraction of various features that distinguish different types of settlements. In particular, the road patterns which have formed within such settlements are analysed, and various procedural techniques proposed (including Voronoi diagrams, subdivision and L-systems) to replicate the identified features. A qualitative assessment of the procedural techniques is provided, and the most suitable combination of techniques identified for unstructured and structured settlements. In particular it is found that a combination of Voronoi diagrams and subdivision provides the closest match to unstructured informal settlements. A combination of L-systems, Voronoi diagrams and subdivision is found to produce the closest pattern to a structured informal settlement.
- Full Text:
- Date Issued: 2006
Managing South Africa's trawl bycatch
- Walmsley, Sarah A, Leslie, Rob W, Sauer, Warwick H H
- Authors: Walmsley, Sarah A , Leslie, Rob W , Sauer, Warwick H H
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124954 , vital:35713 , https://doi.10.1093/icesjms/fsl022
- Description: Over the past few decades, it has become widely recognized that the management strategies of world fisheries must ensure sustainability of bycatch as well as of target species. South Africa implemented a pilot observer programme from 1995 to 2000 to collect data on the levels and patterns of bycatch and discards in the demersal trawl fishery. Here, the results of that programme are used in conjunction with information on bycatch value and compliance to assess the issues and problems regarding bycatch and discarding in the fishery. In general, bycatch components can be placed into one of three categories (discarded bycatch, retained bycatch, and processing waste), each of which present different management problems and require different management approaches. The results were used to formulate a bycatch management plan for the demersal trawl fishery in South Africa. Given the need to continue monitoring bycatch, the performance of the pilot observer programme is reviewed, and the levels of sampling effort required for a national programme are discussed.
- Full Text:
- Date Issued: 2006
- Authors: Walmsley, Sarah A , Leslie, Rob W , Sauer, Warwick H H
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124954 , vital:35713 , https://doi.10.1093/icesjms/fsl022
- Description: Over the past few decades, it has become widely recognized that the management strategies of world fisheries must ensure sustainability of bycatch as well as of target species. South Africa implemented a pilot observer programme from 1995 to 2000 to collect data on the levels and patterns of bycatch and discards in the demersal trawl fishery. Here, the results of that programme are used in conjunction with information on bycatch value and compliance to assess the issues and problems regarding bycatch and discarding in the fishery. In general, bycatch components can be placed into one of three categories (discarded bycatch, retained bycatch, and processing waste), each of which present different management problems and require different management approaches. The results were used to formulate a bycatch management plan for the demersal trawl fishery in South Africa. Given the need to continue monitoring bycatch, the performance of the pilot observer programme is reviewed, and the levels of sampling effort required for a national programme are discussed.
- Full Text:
- Date Issued: 2006
Wireless Security Tools
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
- Date Issued: 2006
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
- Date Issued: 2006
Evaluating parts-of-speech taggers for use in a text-to-scene conversion system
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2005
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432654 , vital:72890 , https://www.cs.ru.ac.za/research/groups/vrsig/currentprojects/053texttoscene/paper01.pdf
- Description: This paper presents parts-of-speech tagging as a first step towards an autonomous text-to-scene conversion system. It categorizes some freely available taggers, according to the techniques used by each in order to automatically identify word-classes. In addition, the performance of each identified tagger is verified experimentally. The SUSANNE corpus is used for testing and reveals the complexity of working with different tagsets, resulting in substantially lower accuracies in our tests than in those reported by the developers of each tagger. The taggers are then grouped to form a voting system to attempt to raise accuracies, but in no cases do the combined results improve upon the individual accuracies. Additionally a new metric, agreement, is tentatively proposed as an indication of confidence in the output of a group of taggers where such output cannot be validated.
- Full Text:
- Date Issued: 2005
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2005
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432654 , vital:72890 , https://www.cs.ru.ac.za/research/groups/vrsig/currentprojects/053texttoscene/paper01.pdf
- Description: This paper presents parts-of-speech tagging as a first step towards an autonomous text-to-scene conversion system. It categorizes some freely available taggers, according to the techniques used by each in order to automatically identify word-classes. In addition, the performance of each identified tagger is verified experimentally. The SUSANNE corpus is used for testing and reveals the complexity of working with different tagsets, resulting in substantially lower accuracies in our tests than in those reported by the developers of each tagger. The taggers are then grouped to form a voting system to attempt to raise accuracies, but in no cases do the combined results improve upon the individual accuracies. Additionally a new metric, agreement, is tentatively proposed as an indication of confidence in the output of a group of taggers where such output cannot be validated.
- Full Text:
- Date Issued: 2005
Competition for attachment of aquaculture candidate probiotic and pathogenic bacteria on fish intestinal mucus:
- Vine, Niall G, Leukes, W D, Kaiser, Horst, Daya, Santylal, Baxter, Jeremy, Hecht, Thomas
- Authors: Vine, Niall G , Leukes, W D , Kaiser, Horst , Daya, Santylal , Baxter, Jeremy , Hecht, Thomas
- Date: 2004
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142819 , vital:38120 , DOI: 10.1111/j.1365-2761.2004.00542.x
- Description: Probiotics for aquaculture are generally only selected by their ability to produce antimicrobial metabolites; however, attachment to intestinal mucus is important in order to remain within the gut of its host. Five candidate probiotics (AP1–AP5), isolated from the clownfish, Amphiprion percula (Lacepéde), were examined for their ability to attach to fish intestinal mucus and compete with two pathogens, Aeromonas hydrophila and Vibrio alginolyticus. Two different radioactive isotopes were used to quantify competition between pathogens and probionts. Attachment of the pathogens was enhanced by the presence of the candidate probiotics. However, the addition of the candidate probiotics after the pathogens resulted in reduced pathogen attachment.
- Full Text:
- Date Issued: 2004
- Authors: Vine, Niall G , Leukes, W D , Kaiser, Horst , Daya, Santylal , Baxter, Jeremy , Hecht, Thomas
- Date: 2004
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142819 , vital:38120 , DOI: 10.1111/j.1365-2761.2004.00542.x
- Description: Probiotics for aquaculture are generally only selected by their ability to produce antimicrobial metabolites; however, attachment to intestinal mucus is important in order to remain within the gut of its host. Five candidate probiotics (AP1–AP5), isolated from the clownfish, Amphiprion percula (Lacepéde), were examined for their ability to attach to fish intestinal mucus and compete with two pathogens, Aeromonas hydrophila and Vibrio alginolyticus. Two different radioactive isotopes were used to quantify competition between pathogens and probionts. Attachment of the pathogens was enhanced by the presence of the candidate probiotics. However, the addition of the candidate probiotics after the pathogens resulted in reduced pathogen attachment.
- Full Text:
- Date Issued: 2004