Periglacial landforms of the Ahlmannryggen and Jutulsessen areas of western Dronning Maud land, Antarctica
- Authors: Wilmot, Nicola Frances
- Date: 2018
- Subjects: Periglacial processes Antarctica Queen Maud Land , Geomorphology Antarctica Queen Maud Land , Permafrost Antarctica Queen Maud Land , Freezes (Meteorology) Antarctica Queen Maud Land , Thawing Antarctica Queen Maud Land
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/61535 , vital:28034
- Description: Periglacial landforms are a common occurrence in Ahlmannryggen and Jutulsessen areas of western Dronning Maud land (WDML). Classification and formation of these landforms were disputed in literature. In Antarctica information on periglacial landforms is limited or confined to a specific landform. Thus a holistic approach was taken when investigating the periglacial landforms found in WDML. An overview of the existing knowledge base on periglacial landforms in WDML was given which was coupled with the analysis of archival data. The landforms found in this area were patterned ground, openwork block deposits (OBD), rock glaciers, terraces, a pronival rampart and lake ice blisters. With patterned ground being the common periglacial landform in WDML, heave monitoring was used where time-lapse videos were used to investigate the formation processes in patterned ground. From consolidating existing knowledge as well as adding new knowledge on the formation of periglacial landforms, it is clear that the landforms in Antarctica should not be compared to other examples, especially examples from the northern hemisphere. Further research in the formation of periglacial landforms is needed and can be further enhanced with more extensive use of the heave monitoring method in future research.
- Full Text:
- Authors: Wilmot, Nicola Frances
- Date: 2018
- Subjects: Periglacial processes Antarctica Queen Maud Land , Geomorphology Antarctica Queen Maud Land , Permafrost Antarctica Queen Maud Land , Freezes (Meteorology) Antarctica Queen Maud Land , Thawing Antarctica Queen Maud Land
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/61535 , vital:28034
- Description: Periglacial landforms are a common occurrence in Ahlmannryggen and Jutulsessen areas of western Dronning Maud land (WDML). Classification and formation of these landforms were disputed in literature. In Antarctica information on periglacial landforms is limited or confined to a specific landform. Thus a holistic approach was taken when investigating the periglacial landforms found in WDML. An overview of the existing knowledge base on periglacial landforms in WDML was given which was coupled with the analysis of archival data. The landforms found in this area were patterned ground, openwork block deposits (OBD), rock glaciers, terraces, a pronival rampart and lake ice blisters. With patterned ground being the common periglacial landform in WDML, heave monitoring was used where time-lapse videos were used to investigate the formation processes in patterned ground. From consolidating existing knowledge as well as adding new knowledge on the formation of periglacial landforms, it is clear that the landforms in Antarctica should not be compared to other examples, especially examples from the northern hemisphere. Further research in the formation of periglacial landforms is needed and can be further enhanced with more extensive use of the heave monitoring method in future research.
- Full Text:
Practical application of distributed ledger technology in support of digital evidence integrity verification processes
- Authors: Weilbach, William Thomas
- Date: 2018
- Subjects: Digital forensic science , Blockchains (Databases) , Bitcoin , Distributed databases , Computer systems Verification
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/61872 , vital:28070
- Description: After its birth in cryptocurrencies, distributed ledger (blockchain) technology rapidly grew in popularity in other technology domains. Alternative applications of this technology range from digitizing the bank guarantees process for commercial property leases (Anz and IBM, 2017) to tracking the provenance of high-value physical goods (Everledger Ltd., 2017). As a whole, distributed ledger technology has acted as a catalyst to the rise of many innovative alternative solutions to existing problems, mostly associated with trust and integrity. In this research, a niche application of this technology is proposed for use in digital forensics by providing a mechanism for the transparent and irrefutable verification of digital evidence, ensuring its integrity as established blockchains serve as an ideal mechanism to store and validate arbitrary data against. Evaluation and identification of candidate technologies in this domain is based on a set of requirements derived from previous work in this field (Weilbach, 2014). OpenTimestamps (Todd, 2016b) is chosen as the foundation of further work for its robust architecture, transparent nature and multi-platform support. A robust evaluation and discussion of OpenTimestamps is performed to reinforce why it can be trusted as an implementation and protocol. An implementation of OpenTimestamps is designed for the popular open source forensic tool, Autopsy, and an Autopsy module is subsequently developed and released to the public. OpenTimestamps is tested at scale and found to have insignificant error rates for the verification of timestamps. Through practical implementation and extensive testing, it is shown that OpenTimestamps has the potential to significantly advance the practice of digital evidence integrity verification. A conclusion is reached by discussing some of the limitations of OpenTimestamps in terms of accuracy and error rates. It is shown that although OpenTimestamps has very specific timing claims in the attestation, with a near zero error rate, the actual attestation is truly accurate to within a day. This is followed by proposing potential avenues for future work.
- Full Text:
- Authors: Weilbach, William Thomas
- Date: 2018
- Subjects: Digital forensic science , Blockchains (Databases) , Bitcoin , Distributed databases , Computer systems Verification
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/61872 , vital:28070
- Description: After its birth in cryptocurrencies, distributed ledger (blockchain) technology rapidly grew in popularity in other technology domains. Alternative applications of this technology range from digitizing the bank guarantees process for commercial property leases (Anz and IBM, 2017) to tracking the provenance of high-value physical goods (Everledger Ltd., 2017). As a whole, distributed ledger technology has acted as a catalyst to the rise of many innovative alternative solutions to existing problems, mostly associated with trust and integrity. In this research, a niche application of this technology is proposed for use in digital forensics by providing a mechanism for the transparent and irrefutable verification of digital evidence, ensuring its integrity as established blockchains serve as an ideal mechanism to store and validate arbitrary data against. Evaluation and identification of candidate technologies in this domain is based on a set of requirements derived from previous work in this field (Weilbach, 2014). OpenTimestamps (Todd, 2016b) is chosen as the foundation of further work for its robust architecture, transparent nature and multi-platform support. A robust evaluation and discussion of OpenTimestamps is performed to reinforce why it can be trusted as an implementation and protocol. An implementation of OpenTimestamps is designed for the popular open source forensic tool, Autopsy, and an Autopsy module is subsequently developed and released to the public. OpenTimestamps is tested at scale and found to have insignificant error rates for the verification of timestamps. Through practical implementation and extensive testing, it is shown that OpenTimestamps has the potential to significantly advance the practice of digital evidence integrity verification. A conclusion is reached by discussing some of the limitations of OpenTimestamps in terms of accuracy and error rates. It is shown that although OpenTimestamps has very specific timing claims in the attestation, with a near zero error rate, the actual attestation is truly accurate to within a day. This is followed by proposing potential avenues for future work.
- Full Text:
Development and optimisation of a novel Plasmodium falciparum Hsp90-Hop interaction assay
- Authors: Wambua, Lynn
- Date: 2018
- Subjects: Plasmodium falciparum , Molecular chaperones , Heat shock proteins , Protein-protein interactions , Antimalarials
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/62626 , vital:28216
- Description: Protein-protein interactions are involved in a range of disease processes and thus have become the focus of many drug discovery programs. Widespread drug resistance to all currently used antimalarial drugs drives the search for alternative drug targets with novel mechanisms of action that offer new therapeutic options. Molecular chaperones such as heat shock proteins facilitate protein folding, play a role in protein trafficking and prevent protein misfolding in cells under stress. Heat shock protein 90 (Hsp90) is a well-studied chaperone that has been the focus of cancer drug development with moderate success. In Plasmodium falciparum (P. falciparum), heat shock proteins are thought to play a vital role in parasite survival of the physiologically diverse habitats of the parasite lifecycle and because Hsp90 is prominently expressed in P. falciparum, the chaperone is considered a potentially ideal drug target. Hsp90 function in cells is regulated by interactions with co-chaperones, which includes Heat shock protein 70-Heat shock protein 90 organising protein (Hop). As opposed to directly inhibiting Hsp90 activity, targeting Hsp90 interaction with Hop has recently been suggested as an alternative method of Hsp90 inhibition that has not been explored in P. falciparum. The aim of this research project was to demonstrate PfHsp90 and PfHop robustly interact in vitro and to facilitate high-throughput screening of PfHsp90-PfHop inhibitors by developing and optimising a novel plate capture Hsp90-Hop interaction assay. To establish the assay, the respective domains of the proteins that mediate Hsp90-Hop interaction were used (Hsp90 C- terminal domain and Hop TPR2A domain). The human Hsp90 C-terminal domain and glutathione-S-transferase (GST) coding sequences were cloned into pET-28a(+) and murine and P. falciparum TPR2A sequences into pGEX-4T-1 plasmids to enable expression of histidine-tagged and GST fusion proteins, respectively, in Escherichia coli. The P. falciparum Hsp90 C-terminal domain sequence cloned into pET-28a(+) was supplied by GenScript. The constructs were transformed into T7 Express lysYcompetent E. coli cells and subsequent small- scale expression studies showed the recombinant proteins were expressed in a soluble form allowing for subsequent protein purification. Purification of the recombinant proteins was achieved using nickel-NTA and glutathione affinity chromatography for the His-tagged (Hsp90 C-terminal domains and GST) and GST fusion proteins (TPR2A domains), respectively. The purified proteins were used to establish and optimise mammalian and P. falciparum Hsp90- Hop interaction assays on nickel-coated plates by immobilising the His-tagged C-terminal domains on the plates and detecting the binding of the GST-TPR2A domains using a colorimetric GST enzyme assay. Z’-factor values above 0.5 were observed for both assays indicating good separation between the protein interaction signals and negative control background signals, although relatively high background signals were observed for the mammalian interaction due to non-specific binding of murine TPR2A to the plate. Designed human and P. falciparum TPR peptides were observed to be effective inhibitors of the mammalian and P. falciparum interactions, demonstrating the assay’s ability to respond to inhibitor compounds. Comparison of assay performance using GST assay kit reagents and lab- prepared reagents showed the assay was more efficient using lab-prepared reagents, however, lower GST signals were observed when comparing assay performance using a custom prepared Ni-NTA plate to a purchased Ni-NTA plate. The Hsp90-Hop interaction assays were also performed using an alternative assay format in which the GST-TPR2A fusion proteins were immobilised on glutathione-coated plates and binding of the His-tagged C-terminal domains detected with a nickel-horseradish peroxidase (HRP) conjugate and a colorimetric HRP substrate. The assay showed higher interaction signals for the P. falciparum proteins but comparatively low signals for the mammalian proteins. Z’-factor values for the assay were above 0.8 for both protein sets, suggesting this assay format is superior to the GST assay. However, further optimisation of this assay format is required. This study demonstrated direct binding of PfHsp90-PfHop in vitro and established a novel and robust PfHsp90-PfHop interaction assay format that can be used in future screening campaigns.
- Full Text:
- Authors: Wambua, Lynn
- Date: 2018
- Subjects: Plasmodium falciparum , Molecular chaperones , Heat shock proteins , Protein-protein interactions , Antimalarials
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/62626 , vital:28216
- Description: Protein-protein interactions are involved in a range of disease processes and thus have become the focus of many drug discovery programs. Widespread drug resistance to all currently used antimalarial drugs drives the search for alternative drug targets with novel mechanisms of action that offer new therapeutic options. Molecular chaperones such as heat shock proteins facilitate protein folding, play a role in protein trafficking and prevent protein misfolding in cells under stress. Heat shock protein 90 (Hsp90) is a well-studied chaperone that has been the focus of cancer drug development with moderate success. In Plasmodium falciparum (P. falciparum), heat shock proteins are thought to play a vital role in parasite survival of the physiologically diverse habitats of the parasite lifecycle and because Hsp90 is prominently expressed in P. falciparum, the chaperone is considered a potentially ideal drug target. Hsp90 function in cells is regulated by interactions with co-chaperones, which includes Heat shock protein 70-Heat shock protein 90 organising protein (Hop). As opposed to directly inhibiting Hsp90 activity, targeting Hsp90 interaction with Hop has recently been suggested as an alternative method of Hsp90 inhibition that has not been explored in P. falciparum. The aim of this research project was to demonstrate PfHsp90 and PfHop robustly interact in vitro and to facilitate high-throughput screening of PfHsp90-PfHop inhibitors by developing and optimising a novel plate capture Hsp90-Hop interaction assay. To establish the assay, the respective domains of the proteins that mediate Hsp90-Hop interaction were used (Hsp90 C- terminal domain and Hop TPR2A domain). The human Hsp90 C-terminal domain and glutathione-S-transferase (GST) coding sequences were cloned into pET-28a(+) and murine and P. falciparum TPR2A sequences into pGEX-4T-1 plasmids to enable expression of histidine-tagged and GST fusion proteins, respectively, in Escherichia coli. The P. falciparum Hsp90 C-terminal domain sequence cloned into pET-28a(+) was supplied by GenScript. The constructs were transformed into T7 Express lysYcompetent E. coli cells and subsequent small- scale expression studies showed the recombinant proteins were expressed in a soluble form allowing for subsequent protein purification. Purification of the recombinant proteins was achieved using nickel-NTA and glutathione affinity chromatography for the His-tagged (Hsp90 C-terminal domains and GST) and GST fusion proteins (TPR2A domains), respectively. The purified proteins were used to establish and optimise mammalian and P. falciparum Hsp90- Hop interaction assays on nickel-coated plates by immobilising the His-tagged C-terminal domains on the plates and detecting the binding of the GST-TPR2A domains using a colorimetric GST enzyme assay. Z’-factor values above 0.5 were observed for both assays indicating good separation between the protein interaction signals and negative control background signals, although relatively high background signals were observed for the mammalian interaction due to non-specific binding of murine TPR2A to the plate. Designed human and P. falciparum TPR peptides were observed to be effective inhibitors of the mammalian and P. falciparum interactions, demonstrating the assay’s ability to respond to inhibitor compounds. Comparison of assay performance using GST assay kit reagents and lab- prepared reagents showed the assay was more efficient using lab-prepared reagents, however, lower GST signals were observed when comparing assay performance using a custom prepared Ni-NTA plate to a purchased Ni-NTA plate. The Hsp90-Hop interaction assays were also performed using an alternative assay format in which the GST-TPR2A fusion proteins were immobilised on glutathione-coated plates and binding of the His-tagged C-terminal domains detected with a nickel-horseradish peroxidase (HRP) conjugate and a colorimetric HRP substrate. The assay showed higher interaction signals for the P. falciparum proteins but comparatively low signals for the mammalian proteins. Z’-factor values for the assay were above 0.8 for both protein sets, suggesting this assay format is superior to the GST assay. However, further optimisation of this assay format is required. This study demonstrated direct binding of PfHsp90-PfHop in vitro and established a novel and robust PfHsp90-PfHop interaction assay format that can be used in future screening campaigns.
- Full Text:
An analysis of fusing advanced malware email protection logs, malware intelligence and active directory attributes as an instrument for threat intelligence
- Authors: Vermeulen, Japie
- Date: 2018
- Subjects: Malware (Computer software) , Computer networks Security measures , Data mining , Phishing , Data logging , Quantitative research
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63922 , vital:28506
- Description: After more than four decades email is still the most widely used electronic communication medium today. This electronic communication medium has evolved into an electronic weapon of choice for cyber criminals ranging from the novice to the elite. As cyber criminals evolve with tools, tactics and procedures, so too are technology vendors coming forward with a variety of advanced malware protection systems. However, even if an organization adopts such a system, there is still the daily challenge of interpreting the log data and understanding the type of malicious email attack, including who the target was and what the payload was. This research examines a six month data set obtained from an advanced malware email protection system from a bank in South Africa. Extensive data fusion techniques are used to provide deeper insight into the data by blending these with malware intelligence and business context. The primary data set is fused with malware intelligence to identify the different malware families associated with the samples. Active Directory attributes such as the business cluster, department and job title of users targeted by malware are also fused into the combined data. This study provides insight into malware attacks experienced in the South African financial services sector. For example, most of the malware samples identified belonged to different types of ransomware families distributed by known botnets. However, indicators of targeted attacks were observed based on particular employees targeted with exploit code and specific strains of malware. Furthermore, a short time span between newly discovered vulnerabilities and the use of malicious code to exploit such vulnerabilities through email were observed in this study. The fused data set provided the context to answer the “who”, “what”, “where” and “when”. The proposed methodology can be applied to any organization to provide insight into the malware threats identified by advanced malware email protection systems. In addition, the fused data set provides threat intelligence that could be used to strengthen the cyber defences of an organization against cyber threats.
- Full Text:
- Authors: Vermeulen, Japie
- Date: 2018
- Subjects: Malware (Computer software) , Computer networks Security measures , Data mining , Phishing , Data logging , Quantitative research
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63922 , vital:28506
- Description: After more than four decades email is still the most widely used electronic communication medium today. This electronic communication medium has evolved into an electronic weapon of choice for cyber criminals ranging from the novice to the elite. As cyber criminals evolve with tools, tactics and procedures, so too are technology vendors coming forward with a variety of advanced malware protection systems. However, even if an organization adopts such a system, there is still the daily challenge of interpreting the log data and understanding the type of malicious email attack, including who the target was and what the payload was. This research examines a six month data set obtained from an advanced malware email protection system from a bank in South Africa. Extensive data fusion techniques are used to provide deeper insight into the data by blending these with malware intelligence and business context. The primary data set is fused with malware intelligence to identify the different malware families associated with the samples. Active Directory attributes such as the business cluster, department and job title of users targeted by malware are also fused into the combined data. This study provides insight into malware attacks experienced in the South African financial services sector. For example, most of the malware samples identified belonged to different types of ransomware families distributed by known botnets. However, indicators of targeted attacks were observed based on particular employees targeted with exploit code and specific strains of malware. Furthermore, a short time span between newly discovered vulnerabilities and the use of malicious code to exploit such vulnerabilities through email were observed in this study. The fused data set provided the context to answer the “who”, “what”, “where” and “when”. The proposed methodology can be applied to any organization to provide insight into the malware threats identified by advanced malware email protection systems. In addition, the fused data set provides threat intelligence that could be used to strengthen the cyber defences of an organization against cyber threats.
- Full Text:
Graphite: origin, deposits and economics : an exploration study of the Orom Graphite project
- Van den Berg, Jacobus Petrus
- Authors: Van den Berg, Jacobus Petrus
- Date: 2018
- Subjects: Graphite , Ore deposits , Geophysics , Graphite mines and mining Economic aspects Africa, East , Trenches , Project management
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63786 , vital:28489
- Description: Developing exploration projects successfully requires that the Reasonable Prospects for Eventual Economic Extraction (RPEEE) be confirmed and based on the global market perception and trend. The exploration methods applied in the attempt to establish this RPEEE must be based on a key management framework that assures the results, and eventually the conclusion, are obtained with best practical and technical approaches whilst managing the risks and capitalizing on each result. The Orom Graphite project is located within the East African Orogenic belt, a suture zone between the Congo craton and the SLAMIN shield, formed during the formation of Gondwana during the late Proterozoic to early-Phanerozoic era. The closing of the Mozambique ocean, and the eventual collision between the craton and shield, occurred along the paleo-earths equator and migrated towards lower latitudes. This, along with the period’s biodiversity boom, provided the perfect deposition environment for carbonaceous sediments which were later metamorphosed to amphibolite and granulites grade metamorphism, resulting in the carbonization and the eventual graphitization of these carbonaceous sediments. The project is located within a poorly developed part of Uganda with the closest port situated some 1 500 km to the east in Kenya. The poorly developed infrastructure along with probable high logistical cost assigns a low competitivity index if compared to the economic costs of peer projects. However, the potential resources of the Orom Graphite project suggest that the Life of Mine (LOM) can rival the largest resource currently reported within the market. The current market conditions suggest that a possible oversupply of graphite concentrate will dominate the market within the next 4 to 10 years. This suggests that new graphite projects such as the Orom Graphite project are likely to develop into the production phase once the global supply and demand stabilize. This requires the Orom Graphite project to develop from its current scoping study level to a project development study level associated with a definitive feasibility study. To date, the project developed through mapping, reconnaissance drilling, geophysical survey and trenching programs increasing the Net Present Value (NPV) considerably based upon a Cost-Based Valuation approach using Prospectivity Enhancement Multiplier (PEM). The metallurgical studies could however not produce a graphite concentrate product within industrial grade standards. The risk associated with developing the project further into the Mineral Resource Estimation (MRE) phase was quantified and risk was evaluated by implementing a point decision tree and calculating the Expected Monetary Value (EMV). Due to the unfavourable metallurgical results obtained to date, the risk associated with undertaking an additional metallurgical test is considerable with a slight chance of producing a negative project value estimated at 65%. JP van den Berg Rhodes University Overall, the Orom Graphite project contains favourable geological formations with a potential large resource. Market trends indicate that a considerable resource is currently being developed and can supply the global market for the next 4 to 10 years. The project’s location within a landlocked country decreases its economic competitiveness with peer project and the unfavourable, but not conclusive, metallurgical results obtained during the scoping phase do not instil confidence that the project will develop into a productive mine soon. Managing the project development with future graphite demand in mind is the key to determining whether the project still has future value.
- Full Text:
- Authors: Van den Berg, Jacobus Petrus
- Date: 2018
- Subjects: Graphite , Ore deposits , Geophysics , Graphite mines and mining Economic aspects Africa, East , Trenches , Project management
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63786 , vital:28489
- Description: Developing exploration projects successfully requires that the Reasonable Prospects for Eventual Economic Extraction (RPEEE) be confirmed and based on the global market perception and trend. The exploration methods applied in the attempt to establish this RPEEE must be based on a key management framework that assures the results, and eventually the conclusion, are obtained with best practical and technical approaches whilst managing the risks and capitalizing on each result. The Orom Graphite project is located within the East African Orogenic belt, a suture zone between the Congo craton and the SLAMIN shield, formed during the formation of Gondwana during the late Proterozoic to early-Phanerozoic era. The closing of the Mozambique ocean, and the eventual collision between the craton and shield, occurred along the paleo-earths equator and migrated towards lower latitudes. This, along with the period’s biodiversity boom, provided the perfect deposition environment for carbonaceous sediments which were later metamorphosed to amphibolite and granulites grade metamorphism, resulting in the carbonization and the eventual graphitization of these carbonaceous sediments. The project is located within a poorly developed part of Uganda with the closest port situated some 1 500 km to the east in Kenya. The poorly developed infrastructure along with probable high logistical cost assigns a low competitivity index if compared to the economic costs of peer projects. However, the potential resources of the Orom Graphite project suggest that the Life of Mine (LOM) can rival the largest resource currently reported within the market. The current market conditions suggest that a possible oversupply of graphite concentrate will dominate the market within the next 4 to 10 years. This suggests that new graphite projects such as the Orom Graphite project are likely to develop into the production phase once the global supply and demand stabilize. This requires the Orom Graphite project to develop from its current scoping study level to a project development study level associated with a definitive feasibility study. To date, the project developed through mapping, reconnaissance drilling, geophysical survey and trenching programs increasing the Net Present Value (NPV) considerably based upon a Cost-Based Valuation approach using Prospectivity Enhancement Multiplier (PEM). The metallurgical studies could however not produce a graphite concentrate product within industrial grade standards. The risk associated with developing the project further into the Mineral Resource Estimation (MRE) phase was quantified and risk was evaluated by implementing a point decision tree and calculating the Expected Monetary Value (EMV). Due to the unfavourable metallurgical results obtained to date, the risk associated with undertaking an additional metallurgical test is considerable with a slight chance of producing a negative project value estimated at 65%. JP van den Berg Rhodes University Overall, the Orom Graphite project contains favourable geological formations with a potential large resource. Market trends indicate that a considerable resource is currently being developed and can supply the global market for the next 4 to 10 years. The project’s location within a landlocked country decreases its economic competitiveness with peer project and the unfavourable, but not conclusive, metallurgical results obtained during the scoping phase do not instil confidence that the project will develop into a productive mine soon. Managing the project development with future graphite demand in mind is the key to determining whether the project still has future value.
- Full Text:
A comparison of the legal environmental sustainability requirements of those engaging in the mining cycle, with actual practice in the Carolina X11B quaternary catchment, Mpumalanga, South Africa
- Authors: Thomson, Gareth Peter
- Date: 2018
- Subjects: Mineral industries Environmental aspects South Africa Mpumalanga , Acid mine drainage , Mineral industries Safety measures , Watersheds South Africa , South Africa. National Environmental Management Act, 1998 , Water-supply Law and legislation South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63481 , vital:28417
- Description: Mining is one of the most contentious water users. The mining sector has assumed that promises of economic growth and job creation will enable environmental concerns to be bypassed with as little interference as possible. More recently, the reality of legacy issues related to the inappropriate sign-off of mining sites has become increasingly clear, with acid mine drainage (AMD) being a prime example. There are also increasing concerns regarding uncontrolled prospecting. Climate change is one of the major issues faced in the 21st century, with predictions of heightened water stress for the Southern African region. This, coupled with increased population growth is putting a massive strain on the water resources currently available, making it vital to better protect and ensure the longevity of our water resources. The Carolina Crisis of 2012 highlighted the importance of protecting our water resources, and how easily they can be contaminated to a point where water is not usable. The Carolina crisis provided researchers with a suitable study site to better understand the role mining operations have in a catchment that has experienced a major pollution incident, and what changes have occurred since. In order to understand coal mining practice in relation to regulatory provisions, this project critically explored the processes involved within the mining sector, from ‘cradle-to-grave’, which is known as the coal mining life cycle. In addition, the composite suite of requirements of all the legislative provisions involved in the industry were investigated and the relationship between coal mining practice and environmental protection was explored. These elements were researched in the Upper Komati River Catchment specifically for catchment X11B, using Cultural Historical Activity Theory (CHAT), which gives a holistic understanding of mining as a human activity system. CHAT also sheds light on the issues, gaps and overlaps currently being experienced in the coal mining sector. The Thesis refers to case studies of where mining issues have caused environmental degradation. A complete mining lifecycle in terms of regulatory provisions was compiled, and major issues were uncovered with current legislation in the mining sector that can contribute to the degradation of water resources in South Africa. An integrated water resource quality management plan is needed in order to streamline conservation mandates, identify and reduce duplication of effort and specify roles and responsibilities of authorities involved with decision making process. A Decision Support System (DSS) has been proposed, which would involve adaptive, participatory and inclusive management.
- Full Text:
- Authors: Thomson, Gareth Peter
- Date: 2018
- Subjects: Mineral industries Environmental aspects South Africa Mpumalanga , Acid mine drainage , Mineral industries Safety measures , Watersheds South Africa , South Africa. National Environmental Management Act, 1998 , Water-supply Law and legislation South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63481 , vital:28417
- Description: Mining is one of the most contentious water users. The mining sector has assumed that promises of economic growth and job creation will enable environmental concerns to be bypassed with as little interference as possible. More recently, the reality of legacy issues related to the inappropriate sign-off of mining sites has become increasingly clear, with acid mine drainage (AMD) being a prime example. There are also increasing concerns regarding uncontrolled prospecting. Climate change is one of the major issues faced in the 21st century, with predictions of heightened water stress for the Southern African region. This, coupled with increased population growth is putting a massive strain on the water resources currently available, making it vital to better protect and ensure the longevity of our water resources. The Carolina Crisis of 2012 highlighted the importance of protecting our water resources, and how easily they can be contaminated to a point where water is not usable. The Carolina crisis provided researchers with a suitable study site to better understand the role mining operations have in a catchment that has experienced a major pollution incident, and what changes have occurred since. In order to understand coal mining practice in relation to regulatory provisions, this project critically explored the processes involved within the mining sector, from ‘cradle-to-grave’, which is known as the coal mining life cycle. In addition, the composite suite of requirements of all the legislative provisions involved in the industry were investigated and the relationship between coal mining practice and environmental protection was explored. These elements were researched in the Upper Komati River Catchment specifically for catchment X11B, using Cultural Historical Activity Theory (CHAT), which gives a holistic understanding of mining as a human activity system. CHAT also sheds light on the issues, gaps and overlaps currently being experienced in the coal mining sector. The Thesis refers to case studies of where mining issues have caused environmental degradation. A complete mining lifecycle in terms of regulatory provisions was compiled, and major issues were uncovered with current legislation in the mining sector that can contribute to the degradation of water resources in South Africa. An integrated water resource quality management plan is needed in order to streamline conservation mandates, identify and reduce duplication of effort and specify roles and responsibilities of authorities involved with decision making process. A Decision Support System (DSS) has been proposed, which would involve adaptive, participatory and inclusive management.
- Full Text:
Quantification of pre-competitive sleep/wake behaviour in a sample of South African cyclists
- Authors: Steenekamp, Travis
- Date: 2018
- Subjects: Sleep deprivation , Cyclists Health and hygiene South Africa , Sleep Physiological aspects , Performance , Performance anxiety
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59015 , vital:27408
- Description: The quantification of athlete pre-competitive sleep behaviour is of interest owing to the possibility that sleep loss may have a negative effect on health and performance. The purpose of this study was to monitor and quantify the sleep/wake patterns of South African cyclists prior to competitive races. A total of 336 cyclists, male and female and of differing competition levels, cycling in either the 2015 Tsogo Sun Amashova or the 2016 Telkom 94.7 Cycle Challenge completed an altered version of the Competitive Sports and Sleep Questionnaire. The questionnaire asked cyclists to report on precompetitive sleep over the past year. A subset of 92 cyclists also recorded a Core Consensus Sleep Diary for the three nights leading up to the races. The questionnaire showed that 67% of the cyclists reported worsened sleep at least once prior to competition within the past 12 months. The sleep diary found that the cyclists’ average sleep duration the night before the races was 6h19min (±1h38min), which was significantly less than two and three nights prior to the races. Sleep quality was also shown to deteriorate significantly the night before the races. The contributing factors leading to worsened pre-competitive sleep were the time the cyclists had to wake-up as well as perceived increases in sleep latency and awakenings after sleep onset. Anxiety was found to be the major cause of sleep disturbances. While females were found to be significantly more likely to report having experienced poorer sleep before competition in the past year, the sleep diary showed no difference in sleep the night before the races between the sexes. Females were significantly more likely to report instances of unpleasant dreams and waking up during the night. Again, the sleep diary data did not corroborate these findings. Females were also found to report significantly more accounts of nervousness or thoughts about competition as being the cause of sleep problems. There was no difference in sleep loss the night before competition when comparing competition-level groups. The only significant difference was that recreational cyclists were more likely to report sleeping in foreign environments as a cause of sleep disturbances. Despite a large percentage of cyclists experiencing pre-competitive sleep loss, over half (55%) perceived sleep loss to have no impact on their performance. Analysis of pre-sleep behaviour also revealed that the cyclists engaged in several practices that may have a negative effect on subsequent sleep. The vast majority of the cyclists (61%) indicated having no specific strategy to help them sleep the night before competition. Fifteen percent of cyclists reporting using media devices to help them fall asleep, a practice that has been shown to disrupt sleep. In conclusion, most cyclists, regardless of sex and level of competition experience precompetitive sleep loss attributed largely to anxiety but with the perception that this loss in sleep does not negatively impact their performance.
- Full Text:
- Authors: Steenekamp, Travis
- Date: 2018
- Subjects: Sleep deprivation , Cyclists Health and hygiene South Africa , Sleep Physiological aspects , Performance , Performance anxiety
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59015 , vital:27408
- Description: The quantification of athlete pre-competitive sleep behaviour is of interest owing to the possibility that sleep loss may have a negative effect on health and performance. The purpose of this study was to monitor and quantify the sleep/wake patterns of South African cyclists prior to competitive races. A total of 336 cyclists, male and female and of differing competition levels, cycling in either the 2015 Tsogo Sun Amashova or the 2016 Telkom 94.7 Cycle Challenge completed an altered version of the Competitive Sports and Sleep Questionnaire. The questionnaire asked cyclists to report on precompetitive sleep over the past year. A subset of 92 cyclists also recorded a Core Consensus Sleep Diary for the three nights leading up to the races. The questionnaire showed that 67% of the cyclists reported worsened sleep at least once prior to competition within the past 12 months. The sleep diary found that the cyclists’ average sleep duration the night before the races was 6h19min (±1h38min), which was significantly less than two and three nights prior to the races. Sleep quality was also shown to deteriorate significantly the night before the races. The contributing factors leading to worsened pre-competitive sleep were the time the cyclists had to wake-up as well as perceived increases in sleep latency and awakenings after sleep onset. Anxiety was found to be the major cause of sleep disturbances. While females were found to be significantly more likely to report having experienced poorer sleep before competition in the past year, the sleep diary showed no difference in sleep the night before the races between the sexes. Females were significantly more likely to report instances of unpleasant dreams and waking up during the night. Again, the sleep diary data did not corroborate these findings. Females were also found to report significantly more accounts of nervousness or thoughts about competition as being the cause of sleep problems. There was no difference in sleep loss the night before competition when comparing competition-level groups. The only significant difference was that recreational cyclists were more likely to report sleeping in foreign environments as a cause of sleep disturbances. Despite a large percentage of cyclists experiencing pre-competitive sleep loss, over half (55%) perceived sleep loss to have no impact on their performance. Analysis of pre-sleep behaviour also revealed that the cyclists engaged in several practices that may have a negative effect on subsequent sleep. The vast majority of the cyclists (61%) indicated having no specific strategy to help them sleep the night before competition. Fifteen percent of cyclists reporting using media devices to help them fall asleep, a practice that has been shown to disrupt sleep. In conclusion, most cyclists, regardless of sex and level of competition experience precompetitive sleep loss attributed largely to anxiety but with the perception that this loss in sleep does not negatively impact their performance.
- Full Text:
Bayesian hierarchical modelling with application in spatial epidemiology
- Authors: Southey, Richard Robert
- Date: 2018
- Subjects: Bayesian statistical decision theory , Spatial analysis (Statistics) , Medical mapping , Pericarditis , Mortality Statistics
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59489 , vital:27617
- Description: Disease mapping and spatial statistics have become an important part of modern day statistics and have increased in popularity as the methods and techniques have evolved. The application of disease mapping is not only confined to the analysis of diseases as other applications of disease mapping can be found in Econometric and financial disciplines. This thesis will consider two data sets. These are the Georgia oral cancer 2004 data set and the South African acute pericarditis 2014 data set. The Georgia data set will be used to assess the hyperprior sensitivity of the precision for the uncorrelated heterogeneity and correlated heterogeneity components in a convolution model. The correlated heterogeneity will be modelled by a conditional autoregressive prior distribution and the uncorrelated heterogeneity will be modelled with a zero mean Gaussian prior distribution. The sensitivity analysis will be performed using three models with conjugate, Jeffreys' and a fixed parameter prior for the hyperprior distribution of the precision for the uncorrelated heterogeneity component. A simulation study will be done to compare four prior distributions which will be the conjugate, Jeffreys', probability matching and divergence priors. The three models will be fitted in WinBUGS® using a Bayesian approach. The results of the three models will be in the form of disease maps, figures and tables. The results show that the hyperprior of the precision for the uncorrelated heterogeneity and correlated heterogeneity components are sensitive to changes and will result in different results depending on the specification of the hyperprior distribution of the precision for the two components in the model. The South African data set will be used to examine whether there is a difference between the proper conditional autoregressive prior and intrinsic conditional autoregressive prior for the correlated heterogeneity component in a convolution model. Two models will be fitted in WinBUGS® for this comparison. Both the hyperpriors of the precision for the uncorrelated heterogeneity and correlated heterogeneity components will be modelled using a Jeffreys' prior distribution. The results show that there is no significant difference between the results of the model with a proper conditional autoregressive prior and intrinsic conditional autoregressive prior for the South African data, although there are a few disadvantages of using a proper conditional autoregressive prior for the correlated heterogeneity which will be stated in the conclusion.
- Full Text:
- Authors: Southey, Richard Robert
- Date: 2018
- Subjects: Bayesian statistical decision theory , Spatial analysis (Statistics) , Medical mapping , Pericarditis , Mortality Statistics
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59489 , vital:27617
- Description: Disease mapping and spatial statistics have become an important part of modern day statistics and have increased in popularity as the methods and techniques have evolved. The application of disease mapping is not only confined to the analysis of diseases as other applications of disease mapping can be found in Econometric and financial disciplines. This thesis will consider two data sets. These are the Georgia oral cancer 2004 data set and the South African acute pericarditis 2014 data set. The Georgia data set will be used to assess the hyperprior sensitivity of the precision for the uncorrelated heterogeneity and correlated heterogeneity components in a convolution model. The correlated heterogeneity will be modelled by a conditional autoregressive prior distribution and the uncorrelated heterogeneity will be modelled with a zero mean Gaussian prior distribution. The sensitivity analysis will be performed using three models with conjugate, Jeffreys' and a fixed parameter prior for the hyperprior distribution of the precision for the uncorrelated heterogeneity component. A simulation study will be done to compare four prior distributions which will be the conjugate, Jeffreys', probability matching and divergence priors. The three models will be fitted in WinBUGS® using a Bayesian approach. The results of the three models will be in the form of disease maps, figures and tables. The results show that the hyperprior of the precision for the uncorrelated heterogeneity and correlated heterogeneity components are sensitive to changes and will result in different results depending on the specification of the hyperprior distribution of the precision for the two components in the model. The South African data set will be used to examine whether there is a difference between the proper conditional autoregressive prior and intrinsic conditional autoregressive prior for the correlated heterogeneity component in a convolution model. Two models will be fitted in WinBUGS® for this comparison. Both the hyperpriors of the precision for the uncorrelated heterogeneity and correlated heterogeneity components will be modelled using a Jeffreys' prior distribution. The results show that there is no significant difference between the results of the model with a proper conditional autoregressive prior and intrinsic conditional autoregressive prior for the South African data, although there are a few disadvantages of using a proper conditional autoregressive prior for the correlated heterogeneity which will be stated in the conclusion.
- Full Text:
Geometry of deformed special relativity
- Authors: Sixaba, Vuyile
- Date: 2018
- Subjects: Special relativity (Physics) , Quantum gravity , Quantum theory , Geometry , Heisenberg uncertainty principle
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59478 , vital:27615
- Description: We undertake a study of the classical regime in which Planck's constant and Newton's gravitational constant are negligible, but not their ratio, the Planck mass, in hopes that this could possibly lead to testable quantum gravity (QG) effects in a classical regime. In this quest for QG phenomenology we consider modifications of the standard dispersion relation of a free particle known as deformed special relativity (DSR). We try to geometrize DSR to find the geometric origin of the spacetime and momentum space. In particular, we adopt the framework of Hamilton geometry which is set up on phase space, as the cotangent bundle of configuration space in order to derive a purely phase space formulation of DSR. This is necessary when one wants to understand potential links of DSR with modifications of quantum mechanics such as Generalised Uncertainty Principles. It is subsequently observed that space-time and momentum space emerge naturally as curved and intertwined spaces. In conclusion we mention examples and applications of this framework as well as potential future developments.
- Full Text:
- Authors: Sixaba, Vuyile
- Date: 2018
- Subjects: Special relativity (Physics) , Quantum gravity , Quantum theory , Geometry , Heisenberg uncertainty principle
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59478 , vital:27615
- Description: We undertake a study of the classical regime in which Planck's constant and Newton's gravitational constant are negligible, but not their ratio, the Planck mass, in hopes that this could possibly lead to testable quantum gravity (QG) effects in a classical regime. In this quest for QG phenomenology we consider modifications of the standard dispersion relation of a free particle known as deformed special relativity (DSR). We try to geometrize DSR to find the geometric origin of the spacetime and momentum space. In particular, we adopt the framework of Hamilton geometry which is set up on phase space, as the cotangent bundle of configuration space in order to derive a purely phase space formulation of DSR. This is necessary when one wants to understand potential links of DSR with modifications of quantum mechanics such as Generalised Uncertainty Principles. It is subsequently observed that space-time and momentum space emerge naturally as curved and intertwined spaces. In conclusion we mention examples and applications of this framework as well as potential future developments.
- Full Text:
Morphological and genetic variation of Gymnothorax undulatus (Anguilliformes: Muraenidae) in the Western Indian Ocean
- Authors: Sithole, Yonela
- Date: 2018
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63722 , vital:28476
- Description: Expected release date-April 2019
- Full Text:
- Authors: Sithole, Yonela
- Date: 2018
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63722 , vital:28476
- Description: Expected release date-April 2019
- Full Text:
Generalized linear models, with applications in fisheries research
- Authors: Sidumo, Bonelwa
- Date: 2018
- Subjects: Western mosquitofish , Analysis of variance , Fisheries Catch effort South Africa Sundays River (Eastern Cape) , Linear models (Statistics) , Multilevel models (Statistics) , Experimental design
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/61102 , vital:27975
- Description: Gambusia affinis (G. affinis) is an invasive fish species found in the Sundays River Valley of the Eastern Cape, South Africa, The relative abundance and population dynamics of G. affinis were quantified in five interconnected impoundments within the Sundays River Valley, This study utilised a G. affinis data set to demonstrate various, classical ANOVA models. Generalized linear models were used to standardize catch per unit effort (CPUE) estimates and to determine environmental variables which influenced the CPUE, Based on the generalized linear model results dam age, mean temperature, Oreochromis mossambicus abundance and Glossogobius callidus abundance had a significant effect on the G. affinis CPUE. The Albany Angling Association collected data during fishing tag and release events. These data were utilized to demonstrate repeated measures designs. Mixed-effects models provided a powerful and flexible tool for analyzing clustered data such as repeated measures data and nested data, lienee it has become tremendously popular as a framework for the analysis of bio-behavioral experiments. The results show that the mixed-effects methods proposed in this study are more efficient than those based on generalized linear models. These data were better modeled with mixed-effects models due to their flexibility in handling missing data.
- Full Text:
- Authors: Sidumo, Bonelwa
- Date: 2018
- Subjects: Western mosquitofish , Analysis of variance , Fisheries Catch effort South Africa Sundays River (Eastern Cape) , Linear models (Statistics) , Multilevel models (Statistics) , Experimental design
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/61102 , vital:27975
- Description: Gambusia affinis (G. affinis) is an invasive fish species found in the Sundays River Valley of the Eastern Cape, South Africa, The relative abundance and population dynamics of G. affinis were quantified in five interconnected impoundments within the Sundays River Valley, This study utilised a G. affinis data set to demonstrate various, classical ANOVA models. Generalized linear models were used to standardize catch per unit effort (CPUE) estimates and to determine environmental variables which influenced the CPUE, Based on the generalized linear model results dam age, mean temperature, Oreochromis mossambicus abundance and Glossogobius callidus abundance had a significant effect on the G. affinis CPUE. The Albany Angling Association collected data during fishing tag and release events. These data were utilized to demonstrate repeated measures designs. Mixed-effects models provided a powerful and flexible tool for analyzing clustered data such as repeated measures data and nested data, lienee it has become tremendously popular as a framework for the analysis of bio-behavioral experiments. The results show that the mixed-effects methods proposed in this study are more efficient than those based on generalized linear models. These data were better modeled with mixed-effects models due to their flexibility in handling missing data.
- Full Text:
A convenient approach to the deterministic routing of MIDI messages
- Authors: Shaw, Brent Roy
- Date: 2018
- Subjects: MIDI (Standard) , Microcontrollers , XMOS Limited , Computer architecture , Embedded computer systems
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63256 , vital:28387
- Description: This research investigates the design and development of a Wireless MIDI Connection Management solution in order to create a deterministic MIDI transmission system. A investigation of the MIDI protocol show it to have certain limitation that can be overcome through the use of transmission solutions. These solutions can be used to improve on the versatility of MIDI while overcoming the MIDI's notorious cable length limitation. XMOS's deterministic XS1 microcontrollers are used to enable the design of a real-time system. The MIDINet system is investigated to identify both the strengths and weaknesses of such a connection management system, while other systems for network transmission of MIDI messages are reviewed. These investigations lead to a design concept for a new network MIDI transmission system that allows for the remote management of connections. The design and subsequent implementation of both the transmission system and the connection management system are then detailed. A testing methodology is then devised to allow for the newly created connection management system to be compared to the MIDINet system. The findings show the deterministic system to have lower latency than that of the MIDINet system, while utilising more compact and power efficient hardware.
- Full Text:
- Authors: Shaw, Brent Roy
- Date: 2018
- Subjects: MIDI (Standard) , Microcontrollers , XMOS Limited , Computer architecture , Embedded computer systems
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63256 , vital:28387
- Description: This research investigates the design and development of a Wireless MIDI Connection Management solution in order to create a deterministic MIDI transmission system. A investigation of the MIDI protocol show it to have certain limitation that can be overcome through the use of transmission solutions. These solutions can be used to improve on the versatility of MIDI while overcoming the MIDI's notorious cable length limitation. XMOS's deterministic XS1 microcontrollers are used to enable the design of a real-time system. The MIDINet system is investigated to identify both the strengths and weaknesses of such a connection management system, while other systems for network transmission of MIDI messages are reviewed. These investigations lead to a design concept for a new network MIDI transmission system that allows for the remote management of connections. The design and subsequent implementation of both the transmission system and the connection management system are then detailed. A testing methodology is then devised to allow for the newly created connection management system to be compared to the MIDINet system. The findings show the deterministic system to have lower latency than that of the MIDINet system, while utilising more compact and power efficient hardware.
- Full Text:
Towards a collection of cost-effective technologies in support of the NIST cybersecurity framework
- Shackleton, Bruce Michael Stuart
- Authors: Shackleton, Bruce Michael Stuart
- Date: 2018
- Subjects: National Institute of Standards and Technology (U.S.) , Computer security , Computer networks Security measures , Small business Information technology Cost effectiveness , Open source software
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/62494 , vital:28199
- Description: The NIST Cybersecurity Framework (CSF) is a specific risk and cybersecurity framework. It provides guidance on controls that can be implemented to help improve an organisation’s cybersecurity risk posture. The CSF Functions consist of Identify, Protect, Detect, Respond, and Recover. Like most Information Technology (IT) frameworks, there are elements of people, processes, and technology. The same elements are required to successfully implement the NIST CSF. This research specifically focuses on the technology element. While there are many commercial technologies available for a small to medium sized business, the costs can be prohibitively expensive. Therefore, this research investigates cost-effective technologies and assesses their alignment to the NIST CSF. The assessment was made against the NIST CSF subcategories. Each subcategory was analysed to identify where a technology would likely be required. The framework provides a list of Informative References. These Informative References were used to create high- level technology categories, as well as identify the technical controls against which the technologies were measured. The technologies tested were either open source or proprietary. All open source technologies tested were free to use, or have a free community edition. Proprietary technologies would be free to use, or considered generally available to most organisations, such as components contained within Microsoft platforms. The results from the experimentation demonstrated that there are multiple cost-effective technologies that can support the NIST CSF. Once all technologies were tested, the NIST CSF was extended. Two new columns were added, namely high-level technology category, and tested technology. The columns were populated with output from the research. This extended framework begins an initial collection of cost-effective technologies in support of the NIST CSF.
- Full Text:
- Authors: Shackleton, Bruce Michael Stuart
- Date: 2018
- Subjects: National Institute of Standards and Technology (U.S.) , Computer security , Computer networks Security measures , Small business Information technology Cost effectiveness , Open source software
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/62494 , vital:28199
- Description: The NIST Cybersecurity Framework (CSF) is a specific risk and cybersecurity framework. It provides guidance on controls that can be implemented to help improve an organisation’s cybersecurity risk posture. The CSF Functions consist of Identify, Protect, Detect, Respond, and Recover. Like most Information Technology (IT) frameworks, there are elements of people, processes, and technology. The same elements are required to successfully implement the NIST CSF. This research specifically focuses on the technology element. While there are many commercial technologies available for a small to medium sized business, the costs can be prohibitively expensive. Therefore, this research investigates cost-effective technologies and assesses their alignment to the NIST CSF. The assessment was made against the NIST CSF subcategories. Each subcategory was analysed to identify where a technology would likely be required. The framework provides a list of Informative References. These Informative References were used to create high- level technology categories, as well as identify the technical controls against which the technologies were measured. The technologies tested were either open source or proprietary. All open source technologies tested were free to use, or have a free community edition. Proprietary technologies would be free to use, or considered generally available to most organisations, such as components contained within Microsoft platforms. The results from the experimentation demonstrated that there are multiple cost-effective technologies that can support the NIST CSF. Once all technologies were tested, the NIST CSF was extended. Two new columns were added, namely high-level technology category, and tested technology. The columns were populated with output from the research. This extended framework begins an initial collection of cost-effective technologies in support of the NIST CSF.
- Full Text:
Spatial variation in modelled hydrodynamic characteristics associated with valley confinement in the Krom River wetland: implications for the initiation of erosional gullies
- Authors: Schlegel, Philippa Kirsten
- Date: 2018
- Subjects: Soil erosion South Africa Eastern Cape , Wetland management South Africa Kromme River (Eastern Cape) , Wetland conservation South Africa Kromme River (Eastern Cape)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/58684 , vital:27356
- Description: Gully erosion is a significant and widespread feature of southern African wetlands, including the wetlands of the Krom River, Eastern Cape. Gully erosion in wetlands is consistently being viewed as a major contributing factor to wetland degradation and eventual collapse. Many gullies exist in the Krom River and Working for Wetlands has spent large sums of money to stabilise head-cuts with the expectation that further erosion would be halted and possibly avoided altogether. Observations in the Krom River wetlands have revealed that most gullies in the wetland are initiated where the width of the trunk valley has been reduced as a consequence of deposition by tributary alluvial fans that impinge on the trunk valley and reduce its width. The aim of this study was to examine variation in hydrodynamic characteristics for a range of discharges, as flow in the broad Kompanjiesdrif basin (~250 meters wide) is confined in a downstream direction to a width of less than 50 meters by a combination of a large impinging left bank tributary alluvial fan that coincides with a resistant bedrock lithology. The study was done by collecting topographical survey data using a Differential Global Positioning System in order to create a Digital Terrain Model with a suitable resolution. Flow was recorded using a Marsh-McBirney Model 2000 Flo-Mate as well as recording the flood extent for each flow condition; this was used in the calibration process of the model. Vegetation measurements were conducted in order to calculate a roughness value across the valley floor. A two-dimensional raster based flood inundation model, CAESAR-Lisflood and a one-dimensional hydraulic analysis model, HEC-RAS, were then used to simulate different parameters associated with variation in discharge, including flow velocity, water depth and stream power, thereby creating a better understanding of the hydraulic characteristics that may promote the formation of gullies in the wetland. Based on these hydraulic analyses it is evident that the effect of impinging alluvial fans on hydraulic characteristics such as flow velocity, water depth and stream power, may lead to the initiation of gullies within the Krom River wetland. This work improves understanding of the collapse of palmiet wetlands in steep-sided valleys within the Cape Fold Mountains of South Africa, and can aid in wetland management.
- Full Text:
- Authors: Schlegel, Philippa Kirsten
- Date: 2018
- Subjects: Soil erosion South Africa Eastern Cape , Wetland management South Africa Kromme River (Eastern Cape) , Wetland conservation South Africa Kromme River (Eastern Cape)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/58684 , vital:27356
- Description: Gully erosion is a significant and widespread feature of southern African wetlands, including the wetlands of the Krom River, Eastern Cape. Gully erosion in wetlands is consistently being viewed as a major contributing factor to wetland degradation and eventual collapse. Many gullies exist in the Krom River and Working for Wetlands has spent large sums of money to stabilise head-cuts with the expectation that further erosion would be halted and possibly avoided altogether. Observations in the Krom River wetlands have revealed that most gullies in the wetland are initiated where the width of the trunk valley has been reduced as a consequence of deposition by tributary alluvial fans that impinge on the trunk valley and reduce its width. The aim of this study was to examine variation in hydrodynamic characteristics for a range of discharges, as flow in the broad Kompanjiesdrif basin (~250 meters wide) is confined in a downstream direction to a width of less than 50 meters by a combination of a large impinging left bank tributary alluvial fan that coincides with a resistant bedrock lithology. The study was done by collecting topographical survey data using a Differential Global Positioning System in order to create a Digital Terrain Model with a suitable resolution. Flow was recorded using a Marsh-McBirney Model 2000 Flo-Mate as well as recording the flood extent for each flow condition; this was used in the calibration process of the model. Vegetation measurements were conducted in order to calculate a roughness value across the valley floor. A two-dimensional raster based flood inundation model, CAESAR-Lisflood and a one-dimensional hydraulic analysis model, HEC-RAS, were then used to simulate different parameters associated with variation in discharge, including flow velocity, water depth and stream power, thereby creating a better understanding of the hydraulic characteristics that may promote the formation of gullies in the wetland. Based on these hydraulic analyses it is evident that the effect of impinging alluvial fans on hydraulic characteristics such as flow velocity, water depth and stream power, may lead to the initiation of gullies within the Krom River wetland. This work improves understanding of the collapse of palmiet wetlands in steep-sided valleys within the Cape Fold Mountains of South Africa, and can aid in wetland management.
- Full Text:
NetwIOC: a framework for the automated generation of network-based IOCS for malware information sharing and defence
- Authors: Rudman, Lauren Lynne
- Date: 2018
- Subjects: Malware (Computer software) , Computer networks Security measures , Computer security , Python (Computer program language)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/60639 , vital:27809
- Description: With the substantial number of new malware variants found each day, it is useful to have an efficient way to retrieve Indicators of Compromise (IOCs) from the malware in a format suitable for sharing and detection. In the past, these indicators were manually created after inspection of binary samples and network traffic. The Cuckoo Sandbox, is an existing dynamic malware analysis system which meets the requirements for the proposed framework and was extended by adding a few custom modules. This research explored a way to automate the generation of detailed network-based IOCs in a popular format which can be used for sharing. This was done through careful filtering and analysis of the PCAP hie generated by the sandbox, and placing these values into the correct type of STIX objects using Python, Through several evaluations, analysis of what type of network traffic can be expected for the creation of IOCs was conducted, including a brief ease study that examined the effect of analysis time on the number of IOCs created. Using the automatically generated IOCs to create defence and detection mechanisms for the network was evaluated and proved successful, A proof of concept sharing platform developed for the STIX IOCs is showcased at the end of the research.
- Full Text:
- Authors: Rudman, Lauren Lynne
- Date: 2018
- Subjects: Malware (Computer software) , Computer networks Security measures , Computer security , Python (Computer program language)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/60639 , vital:27809
- Description: With the substantial number of new malware variants found each day, it is useful to have an efficient way to retrieve Indicators of Compromise (IOCs) from the malware in a format suitable for sharing and detection. In the past, these indicators were manually created after inspection of binary samples and network traffic. The Cuckoo Sandbox, is an existing dynamic malware analysis system which meets the requirements for the proposed framework and was extended by adding a few custom modules. This research explored a way to automate the generation of detailed network-based IOCs in a popular format which can be used for sharing. This was done through careful filtering and analysis of the PCAP hie generated by the sandbox, and placing these values into the correct type of STIX objects using Python, Through several evaluations, analysis of what type of network traffic can be expected for the creation of IOCs was conducted, including a brief ease study that examined the effect of analysis time on the number of IOCs created. Using the automatically generated IOCs to create defence and detection mechanisms for the network was evaluated and proved successful, A proof of concept sharing platform developed for the STIX IOCs is showcased at the end of the research.
- Full Text:
Strength and conditioning practices of high school rugby coaches: a South African context
- Authors: Robinson, Bradley Charles
- Date: 2018
- Subjects: Rugby football coaches South Africa , Rugby football Coaching , Rugby football Physiological aspects , Rugby football Training , High school students Social conditions
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63459 , vital:28413
- Description: Although the sport of rugby union is well established, the strength and conditioning practices of high school level players are not well known. Therefore, the purpose of this study was to examine the current strength and conditioning practices that coaches implement at South African high school level rugby. A secondary purpose was to compare practices between different types of schooling systems available in South Africa. An online survey or in person interview (depending on the school), adapted from previous strength and conditioning questionnaires, was conducted with 43 responses; including 28 schools among the top 100 rugby schools in South Africa for 2016 and 15 no-fee paying public schools in the Eastern Cape Province of South Africa. Results indicated that the top 100 rugby schools implement conditioning practices similar to the best-known international practices compared to no-fee paying schools who lacked the knowledge and skills in various strength and conditioning principles. It was found that all no-fee paying school coaches had insufficient qualifications to administer the correct training techniques. Coaches at all schools lacked the appropriate knowledge on injury prevention and scientifically based training programmes. It was concluded that education and skills around the best strength and conditioning practices for school level coaches needs to be improved and particularly in less privileged schools. The main goal being to reduce the risk of injury and improve performance across all sectors of the rugby playing population within the country. This was deemed crucial to the transformation goals set out by the South African Rugby Union, which would benefit from player development in lower socioeconomic schools.
- Full Text:
- Authors: Robinson, Bradley Charles
- Date: 2018
- Subjects: Rugby football coaches South Africa , Rugby football Coaching , Rugby football Physiological aspects , Rugby football Training , High school students Social conditions
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63459 , vital:28413
- Description: Although the sport of rugby union is well established, the strength and conditioning practices of high school level players are not well known. Therefore, the purpose of this study was to examine the current strength and conditioning practices that coaches implement at South African high school level rugby. A secondary purpose was to compare practices between different types of schooling systems available in South Africa. An online survey or in person interview (depending on the school), adapted from previous strength and conditioning questionnaires, was conducted with 43 responses; including 28 schools among the top 100 rugby schools in South Africa for 2016 and 15 no-fee paying public schools in the Eastern Cape Province of South Africa. Results indicated that the top 100 rugby schools implement conditioning practices similar to the best-known international practices compared to no-fee paying schools who lacked the knowledge and skills in various strength and conditioning principles. It was found that all no-fee paying school coaches had insufficient qualifications to administer the correct training techniques. Coaches at all schools lacked the appropriate knowledge on injury prevention and scientifically based training programmes. It was concluded that education and skills around the best strength and conditioning practices for school level coaches needs to be improved and particularly in less privileged schools. The main goal being to reduce the risk of injury and improve performance across all sectors of the rugby playing population within the country. This was deemed crucial to the transformation goals set out by the South African Rugby Union, which would benefit from player development in lower socioeconomic schools.
- Full Text:
Occurrence of mugilid and sparid fishes in Zostera capensis and bare sediment habitats of the Knysna Estuary
- Authors: Pollard, Melissa
- Date: 2018
- Subjects: Gray mullets South Africa Knysna Lagoon , Sparidae South Africa Knysna Lagoon , Seagrasses South Africa Knysna Lagoon , Eelgrass South Africa Knysna Lagoon , Gray mullets Habitat South Africa Knysna Lagoon , Sparidae Habitat South Africa Knysna Lagoon , Underwater videography in wildlife monitoring , Seining , Zostera capensis Setchel
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/54979 , vital:26641
- Description: Seagrass meadows are regarded as one of the most unique and valuable ecosystems in the biosphere, primarily because of the variety of services that they provide. Seagrass meadows serve as nursery grounds for many species and often play an important role in the juvenile stages of economically and recreationally important fish. Zostera capensis Setchell is one of the most dominant submerged macrophytes and the most common seagrass in South African estuaries and is often referred to as eelgrass. Zostera capensis meadows occupy a large area within the Knysna Estuary but little is known about their importance to associated fish assemblages. With Z. capensis meadows being under increased pressure from anthropogenic influences, it is important to establish which fish species and families utilize these habitats and what role they play in the ecology of fish assemblages within the Knysna Estuary. The primary objective of this study was to compare the use of Z. capensis and adjacent bare sediment areas by mainly large juvenile and subadult sparids and mugilids using different techniques. The two main hypotheses were as follows; 1) Mugilidae are likely to be more dominant in the unvegetated areas of the estuary littoral and Sparidae are likely to predominate within the Z. capensis bed areas of the estuary littoral. 2) The non-destructive underwater video monitoring method would yield similar fish composition data to seine netting sampling of the identical sites. Both hypotheses were assessed using data collected during this study and the analysis of historical unpublished data. Overall, Mugilidae were more abundant at bare unvegetated areas where they did most of their foraging. Sparidae were more abundant in the Z. capensis beds, which was also the habitat where they primarily foraged. With regards to the comparison of two different sampling methods, namely underwater video monitoring and seine netting, similar patterns arose with regards to the fish species observed in camera footage and those captured in the seine net, although the abundances were not always comparable.
- Full Text:
- Authors: Pollard, Melissa
- Date: 2018
- Subjects: Gray mullets South Africa Knysna Lagoon , Sparidae South Africa Knysna Lagoon , Seagrasses South Africa Knysna Lagoon , Eelgrass South Africa Knysna Lagoon , Gray mullets Habitat South Africa Knysna Lagoon , Sparidae Habitat South Africa Knysna Lagoon , Underwater videography in wildlife monitoring , Seining , Zostera capensis Setchel
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/54979 , vital:26641
- Description: Seagrass meadows are regarded as one of the most unique and valuable ecosystems in the biosphere, primarily because of the variety of services that they provide. Seagrass meadows serve as nursery grounds for many species and often play an important role in the juvenile stages of economically and recreationally important fish. Zostera capensis Setchell is one of the most dominant submerged macrophytes and the most common seagrass in South African estuaries and is often referred to as eelgrass. Zostera capensis meadows occupy a large area within the Knysna Estuary but little is known about their importance to associated fish assemblages. With Z. capensis meadows being under increased pressure from anthropogenic influences, it is important to establish which fish species and families utilize these habitats and what role they play in the ecology of fish assemblages within the Knysna Estuary. The primary objective of this study was to compare the use of Z. capensis and adjacent bare sediment areas by mainly large juvenile and subadult sparids and mugilids using different techniques. The two main hypotheses were as follows; 1) Mugilidae are likely to be more dominant in the unvegetated areas of the estuary littoral and Sparidae are likely to predominate within the Z. capensis bed areas of the estuary littoral. 2) The non-destructive underwater video monitoring method would yield similar fish composition data to seine netting sampling of the identical sites. Both hypotheses were assessed using data collected during this study and the analysis of historical unpublished data. Overall, Mugilidae were more abundant at bare unvegetated areas where they did most of their foraging. Sparidae were more abundant in the Z. capensis beds, which was also the habitat where they primarily foraged. With regards to the comparison of two different sampling methods, namely underwater video monitoring and seine netting, similar patterns arose with regards to the fish species observed in camera footage and those captured in the seine net, although the abundances were not always comparable.
- Full Text:
Primary controls on iron and manganese distribution in sphalerite of the Gams Formation, Gamsberg zinc deposit, Namaqualand, South Africa
- Authors: Poignant-Molina, Léo
- Date: 2018
- Subjects: Sphalerite , Sphalerite South Africa Gamsberg , Manganese South Africa Gamsberg , Zinc mines and mining South Africa Gamsberg , Geochemistry South Africa Gamsberg , Metamorphism (Geology) , Electron probe microanalysis
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63775 , vital:28488
- Description: The Gamsberg deposit is a 200 Mt zinc reserve belonging to the world class base metalrich Aggeneys-Gamsberg mining district. A rifting environment permitted the development of four proximal SEDEX-type deposits whereby Gamsberg is localized in the eastern side of the district and characterised by a peculiar enrichment in manganese. This study investigates the geochemistry of sphalerite in the Gams Formation holding the economic units of the deposit. Microscopic petrography revealed that most of primary textures have been overprinted by recrystallization, alteration, replacement and deformational textures produced during the polyphase metamorphism of the Namaquan Orogeny. Therefore, EPMA analysis provided the bulk of information to define the geochemical distribution of sphalerite. A lateral variation was noticed throughout the Gams Formation, whereby the North orebody presents Zn-rich and Fe+Mn-poor sphalerite while the West and East orebodies contain Zn-poor and Fe-Mn-rich sphalerite. This feature has been interpreted as the association of a chemocline and a variation in the basin topography defining deep Mn+Fe-rich zones and shallow Mn+Fe-poor zones in the primitive basin. It is suggested that mineralized hot brines mixed with seawater developed the chemocline. The uneven topography shaped the geochemical variation between the actual orebodies.
- Full Text:
- Authors: Poignant-Molina, Léo
- Date: 2018
- Subjects: Sphalerite , Sphalerite South Africa Gamsberg , Manganese South Africa Gamsberg , Zinc mines and mining South Africa Gamsberg , Geochemistry South Africa Gamsberg , Metamorphism (Geology) , Electron probe microanalysis
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63775 , vital:28488
- Description: The Gamsberg deposit is a 200 Mt zinc reserve belonging to the world class base metalrich Aggeneys-Gamsberg mining district. A rifting environment permitted the development of four proximal SEDEX-type deposits whereby Gamsberg is localized in the eastern side of the district and characterised by a peculiar enrichment in manganese. This study investigates the geochemistry of sphalerite in the Gams Formation holding the economic units of the deposit. Microscopic petrography revealed that most of primary textures have been overprinted by recrystallization, alteration, replacement and deformational textures produced during the polyphase metamorphism of the Namaquan Orogeny. Therefore, EPMA analysis provided the bulk of information to define the geochemical distribution of sphalerite. A lateral variation was noticed throughout the Gams Formation, whereby the North orebody presents Zn-rich and Fe+Mn-poor sphalerite while the West and East orebodies contain Zn-poor and Fe-Mn-rich sphalerite. This feature has been interpreted as the association of a chemocline and a variation in the basin topography defining deep Mn+Fe-rich zones and shallow Mn+Fe-poor zones in the primitive basin. It is suggested that mineralized hot brines mixed with seawater developed the chemocline. The uneven topography shaped the geochemical variation between the actual orebodies.
- Full Text:
Interactions between three biological control agents of water hyacinth, Eichhornia crassipes (Mart.) Solms (Pontederiaceae) in South Africa
- Authors: Petela, Nomvume
- Date: 2018
- Subjects: Water hyacinth -- South Africa , Water hyacinth -- Biological control -- South Africa , Aquatic weeds -- Biological control -- South Africa , Curculionidae , Delphacidae , Miridae , Neochetina eichhorniae Warner , Megamelus scutellaris Berg , Eccritotarsus eichhorniae Henry
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/60676 , vital:27814
- Description: Water hyacinth, Eichhomia crassipes (Mart.) Solms (Pontederiaceae) is a free-floating perennial weed that is regarded as the worst aquatic weed in the world because of its negative impacts on aquatic ecosystems. It is native to the Amazon Basin of South America, but since the late 1800s has spread throughout the world. The first record of the weed in South Africa was noted in 1908 on the Cape Flats and in KwaZulu-Natal, but it is now dispersed throughout the country. Mechanical and chemical control methods have been used against the weed, but biological control is considered the most cost-effective, sustainable and environmentally friendly intervention. Currently, nine biological control agents have been released against water hyacinth in South Africa, and Neochetina eichhorniae Warner (Coleoptera: Curculionidae) is used most widely to control it. However, in some sites, water hyacinth mats have still not been brought under control because of eutrophic waters and cool temperatures. It was therefore necessary to release new biological control agents to complement the impact of N. eichhorniae. Megamelus scutellaris Berg (Hemiptera: Delphacidae) was released in 2013, but little is known about how it interacts with other agents already present in South Africa. It is likely to compete with the established biological control agent, Eccritotarsus eichhorniae Henry (Heteroptera: Miridae), because they are both sap suckers. On the other hand, N. eichhorniae is the most widespread and thus the most important biological control agent for water hyacinth. The aim of this study, then, was to determine the interactions between the two sap-sucking agents in South Africa that presumably occupy similar niches on the plant, and the interaction between M. scutellerais and N. eichhorniae, the most widely distributed and abundant agent in South Africa. Three experiments were conducted at the Waainek Research Facility at Rhodes University, Grahamstown, Eastern Cape, South Africa. Plants were grown for two weeks and insect species were inoculated singly or in combination. Water hyacinth, plant growth parameters and insect parameters were measured every 14 days for a period of 12 weeks. The results of the study showed that feeding by either E. eichhorniae or M. scutellaris had no effect on the feeding of the other agent. Both agents reduced all the measured plant growth parameters equally, either singly or in combination (i.e. E. eichhorniae or M. scutellaris alone or together). The interaction between the two agents appears neutral and agents are likely to complement each other in the field. Prior feeding by E. eichhorniae or M. scutellaris on water hyacinth did not affect the subsequent feeding by either agent. Megamelus scutellaris prefers healthy fresh water hyacinth plants. In addition, planthoppers performed best in combination with the weevil, especially on plants with new weevil feeding scars. The results of the study showed that M. scutellaris is compatible with other biological control agents of water hyacinth that are already established in South Africa. Therefore, the introduction of M. scutellaris may enhance the biological control of water hyacinth in South Africa.
- Full Text:
- Authors: Petela, Nomvume
- Date: 2018
- Subjects: Water hyacinth -- South Africa , Water hyacinth -- Biological control -- South Africa , Aquatic weeds -- Biological control -- South Africa , Curculionidae , Delphacidae , Miridae , Neochetina eichhorniae Warner , Megamelus scutellaris Berg , Eccritotarsus eichhorniae Henry
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/60676 , vital:27814
- Description: Water hyacinth, Eichhomia crassipes (Mart.) Solms (Pontederiaceae) is a free-floating perennial weed that is regarded as the worst aquatic weed in the world because of its negative impacts on aquatic ecosystems. It is native to the Amazon Basin of South America, but since the late 1800s has spread throughout the world. The first record of the weed in South Africa was noted in 1908 on the Cape Flats and in KwaZulu-Natal, but it is now dispersed throughout the country. Mechanical and chemical control methods have been used against the weed, but biological control is considered the most cost-effective, sustainable and environmentally friendly intervention. Currently, nine biological control agents have been released against water hyacinth in South Africa, and Neochetina eichhorniae Warner (Coleoptera: Curculionidae) is used most widely to control it. However, in some sites, water hyacinth mats have still not been brought under control because of eutrophic waters and cool temperatures. It was therefore necessary to release new biological control agents to complement the impact of N. eichhorniae. Megamelus scutellaris Berg (Hemiptera: Delphacidae) was released in 2013, but little is known about how it interacts with other agents already present in South Africa. It is likely to compete with the established biological control agent, Eccritotarsus eichhorniae Henry (Heteroptera: Miridae), because they are both sap suckers. On the other hand, N. eichhorniae is the most widespread and thus the most important biological control agent for water hyacinth. The aim of this study, then, was to determine the interactions between the two sap-sucking agents in South Africa that presumably occupy similar niches on the plant, and the interaction between M. scutellerais and N. eichhorniae, the most widely distributed and abundant agent in South Africa. Three experiments were conducted at the Waainek Research Facility at Rhodes University, Grahamstown, Eastern Cape, South Africa. Plants were grown for two weeks and insect species were inoculated singly or in combination. Water hyacinth, plant growth parameters and insect parameters were measured every 14 days for a period of 12 weeks. The results of the study showed that feeding by either E. eichhorniae or M. scutellaris had no effect on the feeding of the other agent. Both agents reduced all the measured plant growth parameters equally, either singly or in combination (i.e. E. eichhorniae or M. scutellaris alone or together). The interaction between the two agents appears neutral and agents are likely to complement each other in the field. Prior feeding by E. eichhorniae or M. scutellaris on water hyacinth did not affect the subsequent feeding by either agent. Megamelus scutellaris prefers healthy fresh water hyacinth plants. In addition, planthoppers performed best in combination with the weevil, especially on plants with new weevil feeding scars. The results of the study showed that M. scutellaris is compatible with other biological control agents of water hyacinth that are already established in South Africa. Therefore, the introduction of M. scutellaris may enhance the biological control of water hyacinth in South Africa.
- Full Text:
Development and assessment of gastroretentive sustained release captopril micro-balloons
- Authors: Oridota, Omoyosola Omolola
- Date: 2018
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63491 , vital:28419
- Description: Expected release date-April 2020
- Full Text:
- Authors: Oridota, Omoyosola Omolola
- Date: 2018
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63491 , vital:28419
- Description: Expected release date-April 2020
- Full Text: