Using assessment strategically to gestate a student thesis
- Authors: Grant, Carolyn
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/281164 , vital:55698 , xlink:href="https://hdl.handle.net/10520/EJC153523"
- Description: In the context of higher education in South Africa and drawing on the author's experience as a lecturer in two higher education institutions (HEIs), this article presents her attempts to bring together - and into balance - teaching, supervision and research in an endeavour to offer a transformative learning experience for her post graduate students. It does this by foregrounding student assessment in the Master of Education (MEd) degree in the field of Educational Leadership and Management (ELM) where the development of a half thesis, underpinned by research, stands as the evidence of success. The author suggests that the MEd (ELM) degree be conceptualised differently in order that the half thesis be permitted to gestate over a two-year period. Within this conceptualisation, she argues that inspired teaching and meaningful research is best attained through a community of learning approach which seeks to foreground participatory learning, the advancement of scholarly discourse and the development of student agency. Through the use of a case study, the author provides evidence to suggest that a range of authentic assessment strategies which are purposeful and in alignment with the teaching strategies, the content and the intended outcomes of the qualification being taught are essential. She further argues that well-crafted, formative, recursive and sustainable feedback is an essential part of the gestation process.
- Full Text:
- Date Issued: 2013
- Authors: Grant, Carolyn
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/281164 , vital:55698 , xlink:href="https://hdl.handle.net/10520/EJC153523"
- Description: In the context of higher education in South Africa and drawing on the author's experience as a lecturer in two higher education institutions (HEIs), this article presents her attempts to bring together - and into balance - teaching, supervision and research in an endeavour to offer a transformative learning experience for her post graduate students. It does this by foregrounding student assessment in the Master of Education (MEd) degree in the field of Educational Leadership and Management (ELM) where the development of a half thesis, underpinned by research, stands as the evidence of success. The author suggests that the MEd (ELM) degree be conceptualised differently in order that the half thesis be permitted to gestate over a two-year period. Within this conceptualisation, she argues that inspired teaching and meaningful research is best attained through a community of learning approach which seeks to foreground participatory learning, the advancement of scholarly discourse and the development of student agency. Through the use of a case study, the author provides evidence to suggest that a range of authentic assessment strategies which are purposeful and in alignment with the teaching strategies, the content and the intended outcomes of the qualification being taught are essential. She further argues that well-crafted, formative, recursive and sustainable feedback is an essential part of the gestation process.
- Full Text:
- Date Issued: 2013
Weevil borne microbes contribute as much to the reduction of photosynthesis in water hyacinth as does herbivory
- Venter, Nic, Hill, Martin P, Hutchinson, Sarah-Leigh, Ripley, Brad S
- Authors: Venter, Nic , Hill, Martin P , Hutchinson, Sarah-Leigh , Ripley, Brad S
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/423573 , vital:72073 , xlink:href="https://doi.org/10.1016/j.biocontrol.2012.10.011"
- Description: Arthropods released for weed biocontrol can have effects other than simply removing biomass and frequently decrease photosynthetic rate more than can be attributed to the mere loss of photosynthetic surface area. Some of this effect may result because biological control agents facilitate the transfer and ingress of deleterious microbes into plant tissues on which they feed. We evaluated this facilitation effect using water hyacinth (Eichhornia crassipes) and a weevil (Neochetina eichhorniae) and compared the reductions in photosynthetic rates between leaves subject to herbivory by adult weevils sterilized with 3.5% chlorine bleach, to those that were unsterilized. The results showed that weevils carried both fungi and bacteria, transferred these to leaves on which they fed, and that microbes and biomass removal contributed almost equally to the 37% decrease in photosynthetic productivity. Hence, maximising the effectiveness of using arthropods that damage leaf surfaces for biocontrol requires the presence of microorganisms that are deleterious to plants.
- Full Text:
- Date Issued: 2013
- Authors: Venter, Nic , Hill, Martin P , Hutchinson, Sarah-Leigh , Ripley, Brad S
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/423573 , vital:72073 , xlink:href="https://doi.org/10.1016/j.biocontrol.2012.10.011"
- Description: Arthropods released for weed biocontrol can have effects other than simply removing biomass and frequently decrease photosynthetic rate more than can be attributed to the mere loss of photosynthetic surface area. Some of this effect may result because biological control agents facilitate the transfer and ingress of deleterious microbes into plant tissues on which they feed. We evaluated this facilitation effect using water hyacinth (Eichhornia crassipes) and a weevil (Neochetina eichhorniae) and compared the reductions in photosynthetic rates between leaves subject to herbivory by adult weevils sterilized with 3.5% chlorine bleach, to those that were unsterilized. The results showed that weevils carried both fungi and bacteria, transferred these to leaves on which they fed, and that microbes and biomass removal contributed almost equally to the 37% decrease in photosynthetic productivity. Hence, maximising the effectiveness of using arthropods that damage leaf surfaces for biocontrol requires the presence of microorganisms that are deleterious to plants.
- Full Text:
- Date Issued: 2013
X-ray photoelectron spectroscopy analysis of the effect of alkyl-and arylthio substituents on manganese phthalocyanines for self-assembled monolayer formation on gold
- Coates, Megan, Nyokong, Tebello
- Authors: Coates, Megan , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/190490 , vital:44999 , xlink:href="https://doi.org/10.1016/j.elecom.2013.03.019"
- Description: Self-assembled monolayers of an octa-substituted alkylthio and arylthio manganese phthalocyanines were formed on gold. X-ray photoelectron spectroscopy was used to analyse both of the phthalocyanine layers on gold. Approximately 60% of the sulphur groups in the aryl substituted-SAM surface were bound to gold through the cleavage of the C S bond, as opposed to only 37% for the alkyl substituted-SAM.
- Full Text:
- Date Issued: 2013
- Authors: Coates, Megan , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/190490 , vital:44999 , xlink:href="https://doi.org/10.1016/j.elecom.2013.03.019"
- Description: Self-assembled monolayers of an octa-substituted alkylthio and arylthio manganese phthalocyanines were formed on gold. X-ray photoelectron spectroscopy was used to analyse both of the phthalocyanine layers on gold. Approximately 60% of the sulphur groups in the aryl substituted-SAM surface were bound to gold through the cleavage of the C S bond, as opposed to only 37% for the alkyl substituted-SAM.
- Full Text:
- Date Issued: 2013
Zinc (II) 2, 9, 16, 23-tetrakis [4-(N-methylpyridyloxy)]-phthalocyanine anchored on an electrospun polysulfone polymer fiber: Application for photosensitized conversion of methyl orange
- Zugle, Ruphino, Nyokong, Tebello
- Authors: Zugle, Ruphino , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/232741 , vital:50020 , xlink:href="https://doi.org/10.1016/j.molcata.2012.10.001"
- Description: In this work, a comparative study of photodegradation of methyl orange, an azo dye, in homogeneous aqueous solution of a quarternized cationic zinc phthalocyanine and a heterogeneous catalytic system based on the same phthalocyanine anchored on polysulfone polymer fiber is presented. In both cases, conversion involved the azo bond of the dye with no detectable opening up of the aromatic benzene rings. The reaction kinetics in both cases were consistent with first order with the conversion occurring in the homogeneous system being faster than when the functionalized polymer fiber was used. The reaction products consisted of a coupling product as well as a series of oligopolymeric products.
- Full Text:
- Date Issued: 2013
- Authors: Zugle, Ruphino , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/232741 , vital:50020 , xlink:href="https://doi.org/10.1016/j.molcata.2012.10.001"
- Description: In this work, a comparative study of photodegradation of methyl orange, an azo dye, in homogeneous aqueous solution of a quarternized cationic zinc phthalocyanine and a heterogeneous catalytic system based on the same phthalocyanine anchored on polysulfone polymer fiber is presented. In both cases, conversion involved the azo bond of the dye with no detectable opening up of the aromatic benzene rings. The reaction kinetics in both cases were consistent with first order with the conversion occurring in the homogeneous system being faster than when the functionalized polymer fiber was used. The reaction products consisted of a coupling product as well as a series of oligopolymeric products.
- Full Text:
- Date Issued: 2013
An Analysis and Implementation of Methods for High Speed Lexical Classification of Malicious URLs
- Egan, Shaun P, Irwin, Barry V W
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429757 , vital:72637 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/58_ResearchInProgress.pdf
- Description: Several authors have put forward methods of using Artificial Neural Networks (ANN) to classify URLs as malicious or benign by using lexical features of those URLs. These methods have been compared to other methods of classification, such as blacklisting and spam filtering, and have been found to be as accurate. Early attempts proved to be as highly accurate. Fully featured classifications use lexical features as well as lookups to classify URLs and include (but are not limited to) blacklists, spam filters and reputation services. These classifiers are based on the Online Perceptron Model, using a single neuron as a linear combiner and used lexical features that rely on the presence (or lack thereof) of words belonging to a bag-of-words. Several obfuscation resistant features are also used to increase the positive classification rate of these perceptrons. Examples of these include URL length, number of directory traversals and length of arguments passed to the file within the URL. In this paper we describe how we implement the online perceptron model and methods that we used to try to increase the accuracy of this model through the use of hidden layers and training cost validation. We discuss our results in relation to those of other papers, as well as other analysis performed on the training data and the neural networks themselves to best understand why they are so effective. Also described will be the proposed model for developing these Neural Networks, how to implement them in the real world through the use of browser extensions, proxy plugins and spam filters for mail servers, and our current implementation. Finally, work that is still in progress will be described. This work includes other methods of increasing accuracy through the use of modern training techniques and testing in a real world environment.
- Full Text:
- Date Issued: 2012
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429757 , vital:72637 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/58_ResearchInProgress.pdf
- Description: Several authors have put forward methods of using Artificial Neural Networks (ANN) to classify URLs as malicious or benign by using lexical features of those URLs. These methods have been compared to other methods of classification, such as blacklisting and spam filtering, and have been found to be as accurate. Early attempts proved to be as highly accurate. Fully featured classifications use lexical features as well as lookups to classify URLs and include (but are not limited to) blacklists, spam filters and reputation services. These classifiers are based on the Online Perceptron Model, using a single neuron as a linear combiner and used lexical features that rely on the presence (or lack thereof) of words belonging to a bag-of-words. Several obfuscation resistant features are also used to increase the positive classification rate of these perceptrons. Examples of these include URL length, number of directory traversals and length of arguments passed to the file within the URL. In this paper we describe how we implement the online perceptron model and methods that we used to try to increase the accuracy of this model through the use of hidden layers and training cost validation. We discuss our results in relation to those of other papers, as well as other analysis performed on the training data and the neural networks themselves to best understand why they are so effective. Also described will be the proposed model for developing these Neural Networks, how to implement them in the real world through the use of browser extensions, proxy plugins and spam filters for mail servers, and our current implementation. Finally, work that is still in progress will be described. This work includes other methods of increasing accuracy through the use of modern training techniques and testing in a real world environment.
- Full Text:
- Date Issued: 2012
Building a Graphical Fuzzing Framework
- Zeisberger, Sascha, Irwin, Barry V W
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429772 , vital:72638 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/59_ResearchInProgress.pdf
- Description: Fuzz testing is a robustness testing technique that sends malformed data to an application’s input. This is to test an application’s behaviour when presented with input beyond its specification. The main difference between traditional testing techniques and fuzz testing is that in most traditional techniques an application is tested according to a specification and rated on how well the application conforms to that specification. Fuzz testing tests beyond the scope of a specification by intelligently generating values that may be interpreted by an application in an unintended manner. The use of fuzz testing has been more prevalent in academic and security communities despite showing success in production environments. To measure the effectiveness of fuzz testing, an experiment was conducted where several publicly available applications were fuzzed. In some instances, fuzz testing was able to force an application into an invalid state and it was concluded that fuzz testing is a relevant testing technique that could assist in developing more robust applications. This success prompted a further investigation into fuzz testing in order to compile a list of requirements that makes an effective fuzzer. The aforementioned investigation assisted in the design of a fuzz testing framework, the goal of which is to make the process more accessible to users outside of an academic and security environment. Design methodologies and justifications of said framework are discussed, focusing on the graphical user interface components as this aspect of the framework is used to increase the usability of the framework.
- Full Text:
- Date Issued: 2012
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429772 , vital:72638 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/59_ResearchInProgress.pdf
- Description: Fuzz testing is a robustness testing technique that sends malformed data to an application’s input. This is to test an application’s behaviour when presented with input beyond its specification. The main difference between traditional testing techniques and fuzz testing is that in most traditional techniques an application is tested according to a specification and rated on how well the application conforms to that specification. Fuzz testing tests beyond the scope of a specification by intelligently generating values that may be interpreted by an application in an unintended manner. The use of fuzz testing has been more prevalent in academic and security communities despite showing success in production environments. To measure the effectiveness of fuzz testing, an experiment was conducted where several publicly available applications were fuzzed. In some instances, fuzz testing was able to force an application into an invalid state and it was concluded that fuzz testing is a relevant testing technique that could assist in developing more robust applications. This success prompted a further investigation into fuzz testing in order to compile a list of requirements that makes an effective fuzzer. The aforementioned investigation assisted in the design of a fuzz testing framework, the goal of which is to make the process more accessible to users outside of an academic and security environment. Design methodologies and justifications of said framework are discussed, focusing on the graphical user interface components as this aspect of the framework is used to increase the usability of the framework.
- Full Text:
- Date Issued: 2012