‘Who? what?’: an uninducted view of towards a new psychology of women from post-Apartheid South Africa
- Authors: Macleod, Catriona I
- Date: 2008
- Language: English
- Type: Article
- Identifier: vital:6251 , http://hdl.handle.net/10962/d1007869 , http://journals.sagepub.com/doi/abs/10.1177/0959353508092088
- Description: From the text: Towards a New Psychology of Women (TPNW) promises a new psychology of “women”. On the cover of the second edition, the Toronto Globe and Mail is cited as acclaiming the book as “nothing short of revolutionary” as it “set out to recognize, re-define and understand the day-to-day experience of women”. But when we take a closer look at these “women” we discover that they are in fact “white”, (for the most part) middle-class women living in heterosexual relationships in a liberal democracy. This kind of exclusionary inclusion, in which the use of the generic term “woman” disguises the normative assumptions made about the race, class, sexual orientation and location of women, replicates the phallocentrism evidenced in the normalising masculinist terms “mankind” or “Man”. By now, of course, these kinds of critiques of “white” Western feminism by African American writers (e.g. Collins, 1999) postcolonial feminists (e.g. Mohanty, 1991), African feminists (e.g. Ogundipe-Leslie, 1994; Mangena, 2003), and queer theorists (e.g. Jackson, 1999) are well known.
- Full Text:
- Date Issued: 2008
- Authors: Macleod, Catriona I
- Date: 2008
- Language: English
- Type: Article
- Identifier: vital:6251 , http://hdl.handle.net/10962/d1007869 , http://journals.sagepub.com/doi/abs/10.1177/0959353508092088
- Description: From the text: Towards a New Psychology of Women (TPNW) promises a new psychology of “women”. On the cover of the second edition, the Toronto Globe and Mail is cited as acclaiming the book as “nothing short of revolutionary” as it “set out to recognize, re-define and understand the day-to-day experience of women”. But when we take a closer look at these “women” we discover that they are in fact “white”, (for the most part) middle-class women living in heterosexual relationships in a liberal democracy. This kind of exclusionary inclusion, in which the use of the generic term “woman” disguises the normative assumptions made about the race, class, sexual orientation and location of women, replicates the phallocentrism evidenced in the normalising masculinist terms “mankind” or “Man”. By now, of course, these kinds of critiques of “white” Western feminism by African American writers (e.g. Collins, 1999) postcolonial feminists (e.g. Mohanty, 1991), African feminists (e.g. Ogundipe-Leslie, 1994; Mangena, 2003), and queer theorists (e.g. Jackson, 1999) are well known.
- Full Text:
- Date Issued: 2008
Xylem as well as phloem sustains severe damage due to feeding by the Russian wheat aphid
- Saheed, S A, Liu, Lin, Jonsson, Lisbeth M V, Botha, Christiaan E J
- Authors: Saheed, S A , Liu, Lin , Jonsson, Lisbeth M V , Botha, Christiaan E J
- Date: 2007
- Language: English
- Type: Article
- Identifier: vital:6541 , http://hdl.handle.net/10962/d1005983
- Description: Investigation of comparative effects of feeding damage by the Russian wheat aphid (RWA, biotype SA1, Diuraphis noxia Mordvilko) on leaf blades of susceptible and resistant wheat cultivars (Triticum aestivum L. var Betta and Betta-Dn1 respectively) were carried out to establish the level of ultrastructural damage caused by this aphid and the possible limitation of damage induced which could be ascribed to the resistance gene Dn1 over the susceptible cultivar. Ultrastructurally, Betta-Dn1 sustained less damage to the vascular tissue as well as to the mesophyll during the experimental period. Both inter- and intracellular probes resulted in considerable saliva deposition as the aphids probed for suitable feeding sites. Salivary tracks were observed between and within mesophyll, bundle sheath cells as well as the vascular tissue, including the xylem. Disruption of organelles and cytoplasm resulted from cell probing and sheath deposition. Cell and organelle damage was more evident in the non-resistant Betta cultivar. The aphids probed for and fed from thin-walled sieve tubes preferentially. Few thick-walled sieve tubes showed evidence of either aphid probing or feeding-related damage. Saliva was deposited when the aphids probed inter- and intracellularly for feeding sites. The aphids appeared preferentially to probe for and feed from thin-walled sieve tubes, as few thick-walled sieve tubes showed evidence of damage. Vessels, apparently probed for water, contained watery saliva that encased the secondary walls and sealed pit membranes between probed vessels and xylem parenchyma. The xylem probed by the RWA was rendered non-functional, probably contributing to symptoms of leaf roll, chlorosis and necrosis, which were observed within two weeks of infestation in the susceptible Betta cultivar. This damage was limited in the resistant Betta-Dn1 cultivar during the same time frame.
- Full Text:
- Date Issued: 2007
- Authors: Saheed, S A , Liu, Lin , Jonsson, Lisbeth M V , Botha, Christiaan E J
- Date: 2007
- Language: English
- Type: Article
- Identifier: vital:6541 , http://hdl.handle.net/10962/d1005983
- Description: Investigation of comparative effects of feeding damage by the Russian wheat aphid (RWA, biotype SA1, Diuraphis noxia Mordvilko) on leaf blades of susceptible and resistant wheat cultivars (Triticum aestivum L. var Betta and Betta-Dn1 respectively) were carried out to establish the level of ultrastructural damage caused by this aphid and the possible limitation of damage induced which could be ascribed to the resistance gene Dn1 over the susceptible cultivar. Ultrastructurally, Betta-Dn1 sustained less damage to the vascular tissue as well as to the mesophyll during the experimental period. Both inter- and intracellular probes resulted in considerable saliva deposition as the aphids probed for suitable feeding sites. Salivary tracks were observed between and within mesophyll, bundle sheath cells as well as the vascular tissue, including the xylem. Disruption of organelles and cytoplasm resulted from cell probing and sheath deposition. Cell and organelle damage was more evident in the non-resistant Betta cultivar. The aphids probed for and fed from thin-walled sieve tubes preferentially. Few thick-walled sieve tubes showed evidence of either aphid probing or feeding-related damage. Saliva was deposited when the aphids probed inter- and intracellularly for feeding sites. The aphids appeared preferentially to probe for and feed from thin-walled sieve tubes, as few thick-walled sieve tubes showed evidence of damage. Vessels, apparently probed for water, contained watery saliva that encased the secondary walls and sealed pit membranes between probed vessels and xylem parenchyma. The xylem probed by the RWA was rendered non-functional, probably contributing to symptoms of leaf roll, chlorosis and necrosis, which were observed within two weeks of infestation in the susceptible Betta cultivar. This damage was limited in the resistant Betta-Dn1 cultivar during the same time frame.
- Full Text:
- Date Issued: 2007
XML digital signature and RDF
- Cloran, Russell, Irwin, Barry V W
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428874 , vital:72542 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/026_Article.pdf
- Description: The XML Signature working group focuses on the canonicalisation of XML, and the syntax used to sign an XML document. This process focuses on the semantics intro-duced by the XML language itself, but ignores semantics which a particular applica-tion of XML may add. The Resource Description Framework (RDF) is a language for representing information about resources on the Web. RDF has a number of possi-ble serialisations, including an XML serialisation (RDF/XML), popularly used as the format for exchanging RDF data. In general, the order of statements in RDF is not important, and thus the order in which XML tags occur in RDF/XML can vary greatly whilst still preserving semantics. This paper examines some of the issues surround-ing the canonicalisation of RDF/XML and the signing of it, discussing nesting, node identifiers and the ordering of nodes. Existing RDF serialisation formats are consid-ered as case studies of partially canonical RDF formats.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428874 , vital:72542 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/026_Article.pdf
- Description: The XML Signature working group focuses on the canonicalisation of XML, and the syntax used to sign an XML document. This process focuses on the semantics intro-duced by the XML language itself, but ignores semantics which a particular applica-tion of XML may add. The Resource Description Framework (RDF) is a language for representing information about resources on the Web. RDF has a number of possi-ble serialisations, including an XML serialisation (RDF/XML), popularly used as the format for exchanging RDF data. In general, the order of statements in RDF is not important, and thus the order in which XML tags occur in RDF/XML can vary greatly whilst still preserving semantics. This paper examines some of the issues surround-ing the canonicalisation of RDF/XML and the signing of it, discussing nesting, node identifiers and the ordering of nodes. Existing RDF serialisation formats are consid-ered as case studies of partially canonical RDF formats.
- Full Text:
- Date Issued: 2005
When breast is not best: young women and breast reduction surgery
- Lamb, Tessa, Vincent, Louise
- Authors: Lamb, Tessa , Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141832 , vital:38008 , DOI: 10.1080/10130950.2011.610978
- Description: Most cosmetic surgery patients in South Africa are younger than 21, and in this focus we examine narrative accounts from young South African women who have chosen to undergo cosmetic breast reduction surgery. Feminist debates on cosmetic surgery have focused on the question of whether to regard women who modify their bodies in this way as active agents engaged in liberatory ‘body projects’, or whether such projects are evidence of their subjection to oppressive stereotypes and beauty norms. The latter perspective is challenged here by the participants’ characterisation of breast reduction surgery as profoundly ‘freeing’. The article deals in particular with the conscious choice of participants to knowingly risk not being able to breastfeed children in future in order to achieve a body type which conforms to their understanding of youthful beauty and sexuality.
- Full Text:
- Date Issued: 2011
- Authors: Lamb, Tessa , Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141832 , vital:38008 , DOI: 10.1080/10130950.2011.610978
- Description: Most cosmetic surgery patients in South Africa are younger than 21, and in this focus we examine narrative accounts from young South African women who have chosen to undergo cosmetic breast reduction surgery. Feminist debates on cosmetic surgery have focused on the question of whether to regard women who modify their bodies in this way as active agents engaged in liberatory ‘body projects’, or whether such projects are evidence of their subjection to oppressive stereotypes and beauty norms. The latter perspective is challenged here by the participants’ characterisation of breast reduction surgery as profoundly ‘freeing’. The article deals in particular with the conscious choice of participants to knowingly risk not being able to breastfeed children in future in order to achieve a body type which conforms to their understanding of youthful beauty and sexuality.
- Full Text:
- Date Issued: 2011
Wheelchair users, access and exclusion in South Africa higher education
- Chiwandire, Desire, Vincent, Louise
- Authors: Chiwandire, Desire , Vincent, Louise
- Date: 2017
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59984 , vital:27717 , doi: 10.4102/ajod.v6i0.353
- Description: Background: South Africa’s Constitution guarantees everyone, including persons with disabilities, the right to education. A variety of laws are in place obliging higher education institutions to provide appropriate physical access to education sites for all. In practice, however, many buildings remain inaccessible to people with physical disabilities. Objectives: To describe what measures South African universities are taking to make their built environments more accessible to students with diverse types of disabilities, and to assess the adequacy of such measures. Method: We conducted semi-structured in-depth face-to-face interviews with disability unit staff members (DUSMs) based at 10 different public universities in South Africa. Results: Challenges with promoting higher education accessibility for wheelchair users include the preservation and heritage justification for failing to modify older buildings, ad hoc approaches to creating accessible environments and failure to address access to toilets, libraries and transport facilities for wheelchair users. Conclusion: South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.
- Full Text:
- Date Issued: 2017
- Authors: Chiwandire, Desire , Vincent, Louise
- Date: 2017
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59984 , vital:27717 , doi: 10.4102/ajod.v6i0.353
- Description: Background: South Africa’s Constitution guarantees everyone, including persons with disabilities, the right to education. A variety of laws are in place obliging higher education institutions to provide appropriate physical access to education sites for all. In practice, however, many buildings remain inaccessible to people with physical disabilities. Objectives: To describe what measures South African universities are taking to make their built environments more accessible to students with diverse types of disabilities, and to assess the adequacy of such measures. Method: We conducted semi-structured in-depth face-to-face interviews with disability unit staff members (DUSMs) based at 10 different public universities in South Africa. Results: Challenges with promoting higher education accessibility for wheelchair users include the preservation and heritage justification for failing to modify older buildings, ad hoc approaches to creating accessible environments and failure to address access to toilets, libraries and transport facilities for wheelchair users. Conclusion: South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.
- Full Text:
- Date Issued: 2017
Wand plant architecture in the Fynbos: Testing the rodent herbivory hypothesis
- Bailey, Lauren A, Potts, A J, Cowling, R M, Whitfield, Maxine C, Smit, Ben
- Authors: Bailey, Lauren A , Potts, A J , Cowling, R M , Whitfield, Maxine C , Smit, Ben
- Date: 2019
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/440583 , vital:73795 , https://doi.org/10.1016/j.sajb.2019.03.035
- Description: Throughout the Cape Floristic Region, in a range of local environments, can be found a distinctive growth form: “wand” plants. This curious plant architecture comprises perennial plants which have slender (wand-like) stems that extend high above the matrix vegetation. We explore whether the evolution of wand-plants may have been driven by plant–herbivore interactions with rodents, where such architecture reduces access to nutrient rich flowers and seeds. To test this idea, we determined if (i) wand-plants were more flexible than non-wand congeners, and (ii) a stabilised wand plant was favoured for climbing (by laboratory mice) over a free-standing wand plant in a laboratory setting. Under a phylogenetic independent contrast framework, wand-plants were not more flexible (across a range of diameters) than non-wand congeners.
- Full Text:
- Date Issued: 2019
- Authors: Bailey, Lauren A , Potts, A J , Cowling, R M , Whitfield, Maxine C , Smit, Ben
- Date: 2019
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/440583 , vital:73795 , https://doi.org/10.1016/j.sajb.2019.03.035
- Description: Throughout the Cape Floristic Region, in a range of local environments, can be found a distinctive growth form: “wand” plants. This curious plant architecture comprises perennial plants which have slender (wand-like) stems that extend high above the matrix vegetation. We explore whether the evolution of wand-plants may have been driven by plant–herbivore interactions with rodents, where such architecture reduces access to nutrient rich flowers and seeds. To test this idea, we determined if (i) wand-plants were more flexible than non-wand congeners, and (ii) a stabilised wand plant was favoured for climbing (by laboratory mice) over a free-standing wand plant in a laboratory setting. Under a phylogenetic independent contrast framework, wand-plants were not more flexible (across a range of diameters) than non-wand congeners.
- Full Text:
- Date Issued: 2019
Visual technology for the autonomous learning of mathematics:
- Linneweber-Lammerskitten, Helmut, Schäfer, Marc, Samson, Duncan
- Authors: Linneweber-Lammerskitten, Helmut , Schäfer, Marc , Samson, Duncan
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140949 , vital:37931 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20930
- Description: This paper describes a collaborative research and development project between the University of Applied Sciences Northwestern Switzerland and Rhodes University in South Africa. The project seeks to establish, disseminate and research the efficacy and use of short video clips designed specifically for the autonomous learning of mathematics. Specific to the South African context is our interest in capitalising on the ubiquity of cellphone technology and the autonomous affordances offered by mobile learning. This paper engages with a number of theoretical and pedagogical issues relating to the design, production and use of these video clips. Although the focus is specific to the contexts of South Africa and Switzerland, the discussion is of broad applicability.
- Full Text:
- Date Issued: 2010
- Authors: Linneweber-Lammerskitten, Helmut , Schäfer, Marc , Samson, Duncan
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140949 , vital:37931 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20930
- Description: This paper describes a collaborative research and development project between the University of Applied Sciences Northwestern Switzerland and Rhodes University in South Africa. The project seeks to establish, disseminate and research the efficacy and use of short video clips designed specifically for the autonomous learning of mathematics. Specific to the South African context is our interest in capitalising on the ubiquity of cellphone technology and the autonomous affordances offered by mobile learning. This paper engages with a number of theoretical and pedagogical issues relating to the design, production and use of these video clips. Although the focus is specific to the contexts of South Africa and Switzerland, the discussion is of broad applicability.
- Full Text:
- Date Issued: 2010
Visiview: a system for the visualization of multidimensional data
- Authors: Bangay, Shaun D
- Date: 1998
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433466 , vital:72972 , https://doi.org/10.1117/12.309530
- Description: Results generated by simulation of computer systems are often presented as a multi-dimensional data set, where the number of dimensions may be greater than 4 if sufficient system parameters are modelled. This paper describes a visualization system intended to assist in understanding the relationship between, and effect upon system behavior of, the different values of the system parameters. The system is applied to data that cannot be represented using a mesh or isosurface representation, and in general can only be represented as a cloud of points. The use of stereoscopic rendering and rapid interaction with the data are compared with regard to their value in providing insight into the nature of the data. A number of techniques are implemented for displaying projections of the data set with up to 7 dimensions, and for allowing intuitive manipulation of the remaining dimensions. In this way the effect of changes in one variable in the presence of a number of others can be explored. The use of these techniques, when applied to data from computer system simulation, results in an intuitive understanding of the effects of the system parameters on system behavior.
- Full Text:
- Date Issued: 1998
- Authors: Bangay, Shaun D
- Date: 1998
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433466 , vital:72972 , https://doi.org/10.1117/12.309530
- Description: Results generated by simulation of computer systems are often presented as a multi-dimensional data set, where the number of dimensions may be greater than 4 if sufficient system parameters are modelled. This paper describes a visualization system intended to assist in understanding the relationship between, and effect upon system behavior of, the different values of the system parameters. The system is applied to data that cannot be represented using a mesh or isosurface representation, and in general can only be represented as a cloud of points. The use of stereoscopic rendering and rapid interaction with the data are compared with regard to their value in providing insight into the nature of the data. A number of techniques are implemented for displaying projections of the data set with up to 7 dimensions, and for allowing intuitive manipulation of the remaining dimensions. In this way the effect of changes in one variable in the presence of a number of others can be explored. The use of these techniques, when applied to data from computer system simulation, results in an intuitive understanding of the effects of the system parameters on system behavior.
- Full Text:
- Date Issued: 1998
Vice-Chancellor's welcoming address 2010
- Authors: Badat, Saleem
- Date: 2010
- Language: English
- Type: text
- Identifier: vital:7590 , http://hdl.handle.net/10962/d1006581
- Description: From introduction: Rhodes University, which means, you and I and academics and support staff, exists to serve three purposes. The first is to produce knowledge, so that we can advance understanding of our natural and social worlds and enrich our accumulated scientific and cultural heritage. As a university our second purpose is to disseminate knowledge and to cultivate minds. Our goal is to ensure that you can think imaginatively, “effectively and critically”; that you “achieve depth in some field of knowledge”; that you can critique and construct alternatives, that you can communicate cogently, orally and in writing, and that you have a “critical appreciation of the ways in which we gain knowledge and understanding of the universe, of society, and of ourselves” Our final purpose as a university is to undertake community engagement. On the one hand this involves your voluntary participation in community projects undertaken thorough our Community Engagement office. On the other hand, it involves service-learning, in which through your academic courses you take part “in activities where both the community” and you benefit, “and where the goals are to provide a service to the community and, equally, to enhance (your) learning through rendering this service”
- Full Text:
- Date Issued: 2010
- Authors: Badat, Saleem
- Date: 2010
- Language: English
- Type: text
- Identifier: vital:7590 , http://hdl.handle.net/10962/d1006581
- Description: From introduction: Rhodes University, which means, you and I and academics and support staff, exists to serve three purposes. The first is to produce knowledge, so that we can advance understanding of our natural and social worlds and enrich our accumulated scientific and cultural heritage. As a university our second purpose is to disseminate knowledge and to cultivate minds. Our goal is to ensure that you can think imaginatively, “effectively and critically”; that you “achieve depth in some field of knowledge”; that you can critique and construct alternatives, that you can communicate cogently, orally and in writing, and that you have a “critical appreciation of the ways in which we gain knowledge and understanding of the universe, of society, and of ourselves” Our final purpose as a university is to undertake community engagement. On the one hand this involves your voluntary participation in community projects undertaken thorough our Community Engagement office. On the other hand, it involves service-learning, in which through your academic courses you take part “in activities where both the community” and you benefit, “and where the goals are to provide a service to the community and, equally, to enhance (your) learning through rendering this service”
- Full Text:
- Date Issued: 2010
Vice Chancellor's Address to new students, 1987
- Authors: Henderson, Derek Scott
- Date: 1987
- Language: English
- Type: text
- Identifier: vital:7554 , http://hdl.handle.net/10962/d1018431
- Full Text:
- Date Issued: 1987
- Authors: Henderson, Derek Scott
- Date: 1987
- Language: English
- Type: text
- Identifier: vital:7554 , http://hdl.handle.net/10962/d1018431
- Full Text:
- Date Issued: 1987
Vertebrate Biostratigraphy of the Witteberg Group and the Devonian-Carboniferous boundary in South Africa
- Authors: Gess, Robert W
- Date: 2016
- Language: English
- Type: text , boook chapter
- Identifier: http://hdl.handle.net/10962/73987 , vital:30248 , https://doi.org/10.1007/978-3-319-40859-0_13
- Description: Witteberg Group rocks are Late Devonian to Early Carboniferous in age. Comparison with Laurasian sea-level curves has correlated the earliest Carboniferous Tournasian transgression, with the argillaceous Kweekvlei Formation, overlying the arenaceous Witpoort Formation. The Devonian/Carboniferous boundary is globally characterised by a Mass Extinction which extinguished the entire grade of placoderm fish and radically reduced sarcopterygian and acanthodian diversity, preluding an Early Carboniferous radiation of actinopterygians. Analysis of Cape Supergroup biostratigraphy reveals that a fauna preservationally dominated by placoderms, sharks, and gyracanthid acanthodians may be traced from the Upper Bokkeveld Group through the Wagondrift Formation (Witteberg Group) to the Witpoort Formation, wherein it displays an increased diversity of placoderms, as well as sarcopterygians. Overlying strata contain no placoderms or sarcopterygians, but present are some relict sharks and acanthodians, and an increasing abundance of actinopterygians. This congruence confirms sea-level curve based age estimates of the Witteberg Group and the position of the Devonian/Carboniferous boundary.
- Full Text: false
- Date Issued: 2016
- Authors: Gess, Robert W
- Date: 2016
- Language: English
- Type: text , boook chapter
- Identifier: http://hdl.handle.net/10962/73987 , vital:30248 , https://doi.org/10.1007/978-3-319-40859-0_13
- Description: Witteberg Group rocks are Late Devonian to Early Carboniferous in age. Comparison with Laurasian sea-level curves has correlated the earliest Carboniferous Tournasian transgression, with the argillaceous Kweekvlei Formation, overlying the arenaceous Witpoort Formation. The Devonian/Carboniferous boundary is globally characterised by a Mass Extinction which extinguished the entire grade of placoderm fish and radically reduced sarcopterygian and acanthodian diversity, preluding an Early Carboniferous radiation of actinopterygians. Analysis of Cape Supergroup biostratigraphy reveals that a fauna preservationally dominated by placoderms, sharks, and gyracanthid acanthodians may be traced from the Upper Bokkeveld Group through the Wagondrift Formation (Witteberg Group) to the Witpoort Formation, wherein it displays an increased diversity of placoderms, as well as sarcopterygians. Overlying strata contain no placoderms or sarcopterygians, but present are some relict sharks and acanthodians, and an increasing abundance of actinopterygians. This congruence confirms sea-level curve based age estimates of the Witteberg Group and the position of the Devonian/Carboniferous boundary.
- Full Text: false
- Date Issued: 2016
Variability in the fractionation of stable isotopes during degradation of two intertidal red algae
- Hill, Jaclyn M, McQuaid, Christopher D
- Authors: Hill, Jaclyn M , McQuaid, Christopher D
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/444649 , vital:74257 , https://doi.org/10.1016/j.ecss.2009.02.001
- Description: Macroalgae contribute to intertidal food webs primarily as detritus, with unclear implications for food web studies using stable isotope analysis. We examined differences in the thallus parts of two South African rhodophytes (Gelidium pristoides and Hypnea spicifera) and changes in overall δ13C, δ15N signatures and C:N ratios during degradation in both the field and laboratory. We hypothesized that both degrading macroalgal tissue and macroalgal-derived suspended particulate material (SPM) would show negligible changes in δ13C, but enriched δ15N signatures and lower C:N ratios relative to healthy plants. Only C:N laboratory ratios conformed to predictions, with both species of macroalgae showing decomposition related changes in δ13C and significant depletions in δ15N in both the field and laboratory. In the laboratory, algal tissue and SPM from each species behaved similarly (though some effects were non-significant) but with differing strengths. Gelidium pristoides δ13C increased and C:N ratios decreased over time in tissue and SPM; δ15N became depleted only in SPM. Hypnea spicifera, δ13C, δ15N and C:N ratios all decreased during degradation in both SPM and algae.
- Full Text:
- Date Issued: 2009
- Authors: Hill, Jaclyn M , McQuaid, Christopher D
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/444649 , vital:74257 , https://doi.org/10.1016/j.ecss.2009.02.001
- Description: Macroalgae contribute to intertidal food webs primarily as detritus, with unclear implications for food web studies using stable isotope analysis. We examined differences in the thallus parts of two South African rhodophytes (Gelidium pristoides and Hypnea spicifera) and changes in overall δ13C, δ15N signatures and C:N ratios during degradation in both the field and laboratory. We hypothesized that both degrading macroalgal tissue and macroalgal-derived suspended particulate material (SPM) would show negligible changes in δ13C, but enriched δ15N signatures and lower C:N ratios relative to healthy plants. Only C:N laboratory ratios conformed to predictions, with both species of macroalgae showing decomposition related changes in δ13C and significant depletions in δ15N in both the field and laboratory. In the laboratory, algal tissue and SPM from each species behaved similarly (though some effects were non-significant) but with differing strengths. Gelidium pristoides δ13C increased and C:N ratios decreased over time in tissue and SPM; δ15N became depleted only in SPM. Hypnea spicifera, δ13C, δ15N and C:N ratios all decreased during degradation in both SPM and algae.
- Full Text:
- Date Issued: 2009
Utopia, dystopia, neo-utopia: three Generations of contemporary Artists in Angola. Atlantico: Contemporary Art in Angola and its diaspora today
- Authors: Siegert, Nadine
- Date: 2019
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/146332 , vital:38516 , ISBN 9789892088105
- Description: Book abstract. The book Atlantica: Contemporary Art from Angola and its Diaspora marks the start of publisher Hangar Books, specialising in publications within the context of contemporary arts, with particular incidence on southern epistemology.
- Full Text:
- Date Issued: 2019
- Authors: Siegert, Nadine
- Date: 2019
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/146332 , vital:38516 , ISBN 9789892088105
- Description: Book abstract. The book Atlantica: Contemporary Art from Angola and its Diaspora marks the start of publisher Hangar Books, specialising in publications within the context of contemporary arts, with particular incidence on southern epistemology.
- Full Text:
- Date Issued: 2019
Using Network Technology to Share Music Studio Resources
- Foss, Richard, Welks, Anthony, Mosala, Thabo
- Authors: Foss, Richard , Welks, Anthony , Mosala, Thabo
- Date: 1994
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427471 , vital:72441 , https://www.aes.org/e-lib/online/browse.cfm?elib=6206
- Description: A network has been created that allows shared access to the various resources of a MIDI-based music studio. Ethernet is used to transmit requests from the workstations to a server residing in a central studio area. These requests relate to booking resources, MIDI patching, audio patching and mixing, and multitrack recorder control. The server has MIDI control over custom-built MIDI patchers, and audio patcher/mixers. A PC-based unit, the MIDINot, has been developed to allow for MIDI transmission on the Ethernet.
- Full Text:
- Date Issued: 1994
- Authors: Foss, Richard , Welks, Anthony , Mosala, Thabo
- Date: 1994
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427471 , vital:72441 , https://www.aes.org/e-lib/online/browse.cfm?elib=6206
- Description: A network has been created that allows shared access to the various resources of a MIDI-based music studio. Ethernet is used to transmit requests from the workstations to a server residing in a central studio area. These requests relate to booking resources, MIDI patching, audio patching and mixing, and multitrack recorder control. The server has MIDI control over custom-built MIDI patchers, and audio patcher/mixers. A PC-based unit, the MIDINot, has been developed to allow for MIDI transmission on the Ethernet.
- Full Text:
- Date Issued: 1994
Use a humanizing pedagogy to assist students
- Authors: Alfred H. Makura
- Date: 2011-11
- Language: English
- Type: Newsletter
- Identifier: vital:12225 , http://hdl.handle.net/10353/d1016143
- Description: Teaching and Learning Centre Newsletter November 2011
- Full Text: false
- Date Issued: 2011-11
- Authors: Alfred H. Makura
- Date: 2011-11
- Language: English
- Type: Newsletter
- Identifier: vital:12225 , http://hdl.handle.net/10353/d1016143
- Description: Teaching and Learning Centre Newsletter November 2011
- Full Text: false
- Date Issued: 2011-11
Unlocking the armour: enabling intrusion detection and analysis of encrypted traffic streams
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Date Issued: 2005
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Date Issued: 2005
Trust on the Web
- Cloran, Russell, Irwin, Barry V W
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428900 , vital:72544 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Full/025_Article.pdf
- Description: This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the au-thority of information found on the web. We use a case study of a suspected phish-ing scam in South Africa to examine the methods an advanced user may use to veri-fy the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner in which information is presented and the failure to use es-tablished industry best practices. We discuss a number of ways in which doubt may have been eliminated. We then discuss how a distributed trust system, as favoured by many researchers in trust on the semantic web, may have been implemented in this case to prove the authenticity of the site without the traditional means involv-ing the high cost of a digital certificate from a recognised Certificate Authority.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428900 , vital:72544 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Full/025_Article.pdf
- Description: This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the au-thority of information found on the web. We use a case study of a suspected phish-ing scam in South Africa to examine the methods an advanced user may use to veri-fy the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner in which information is presented and the failure to use es-tablished industry best practices. We discuss a number of ways in which doubt may have been eliminated. We then discuss how a distributed trust system, as favoured by many researchers in trust on the semantic web, may have been implemented in this case to prove the authenticity of the site without the traditional means involv-ing the high cost of a digital certificate from a recognised Certificate Authority.
- Full Text:
- Date Issued: 2005
Trade Union Education training and development institute
- COSATU
- Authors: COSATU
- Date: 1995
- Subjects: COSATU
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/118706 , vital:34660
- Description: There is acceptance within Cosatu that a Trade Union Education Institute should be urgently set up to assist in the building of Cosatu and affiliate capacity and skills in our new situation. It is recognised that there is a need for a more systematic.ongoing,professional education and development service winch such an Institute could provide. However, the form,status, control programme of this Institute is not yet agreed upon. Cosatu is in danger of losing control of this project,as other bodies set up and acquire funds to train trade unionists.
- Full Text:
- Date Issued: 1995
- Authors: COSATU
- Date: 1995
- Subjects: COSATU
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/118706 , vital:34660
- Description: There is acceptance within Cosatu that a Trade Union Education Institute should be urgently set up to assist in the building of Cosatu and affiliate capacity and skills in our new situation. It is recognised that there is a need for a more systematic.ongoing,professional education and development service winch such an Institute could provide. However, the form,status, control programme of this Institute is not yet agreed upon. Cosatu is in danger of losing control of this project,as other bodies set up and acquire funds to train trade unionists.
- Full Text:
- Date Issued: 1995
Towards empowering learners in a democratic mathematics classroom: to what extent are teachers' listening orientations conducive to and respectful of learners' thinking?
- Mhlolo, Michael K, Schäfer, Marc
- Authors: Mhlolo, Michael K , Schäfer, Marc
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140882 , vital:37926 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC129235
- Description: In an effort to make education accessible, to 'heal the divisions of the past and establish a society based on democratic values', the South African Department of Education claims that a series of mathematics reforms that has so far been introduced is underpinned by the principles of 'social justice, fundamental human rights and inclusivity'. Critics however argue that the system has remained 'undemocratic' in that those groups of learners who were supposed to be 'healed' continue to underperform and hence be disempowered. In this study, we conceptualised a democratic and mathematically empowering classroom as one that is consistent with the principle of inclusivity and in which a hermeneutic listening orientation towards teaching promotes such a democratic and mathematically empowering learning environment. We then worked with three different orientations teachers might have towards listening in the mathematics classroom: evaluative, interpretive and hermeneutic. We then used these orientations to analyse 20 video-recorded lessons with a specific focus on learners' unexpected contributions and how teachers listened and responded to such contributions. The results were consistent with the literature, which shows that teachers tend to dismiss learners' ways of thinking by imposing their own formalised constructions.
- Full Text:
- Date Issued: 2012
- Authors: Mhlolo, Michael K , Schäfer, Marc
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140882 , vital:37926 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC129235
- Description: In an effort to make education accessible, to 'heal the divisions of the past and establish a society based on democratic values', the South African Department of Education claims that a series of mathematics reforms that has so far been introduced is underpinned by the principles of 'social justice, fundamental human rights and inclusivity'. Critics however argue that the system has remained 'undemocratic' in that those groups of learners who were supposed to be 'healed' continue to underperform and hence be disempowered. In this study, we conceptualised a democratic and mathematically empowering classroom as one that is consistent with the principle of inclusivity and in which a hermeneutic listening orientation towards teaching promotes such a democratic and mathematically empowering learning environment. We then worked with three different orientations teachers might have towards listening in the mathematics classroom: evaluative, interpretive and hermeneutic. We then used these orientations to analyse 20 video-recorded lessons with a specific focus on learners' unexpected contributions and how teachers listened and responded to such contributions. The results were consistent with the literature, which shows that teachers tend to dismiss learners' ways of thinking by imposing their own formalised constructions.
- Full Text:
- Date Issued: 2012
Towards a standard model for networked audio devices
- Eales, Andrew, Foss, Richard
- Authors: Eales, Andrew , Foss, Richard
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427151 , vital:72418 , https://www.aes.org/e-lib/online/browse.cfm?elib=16144
- Description: Different control protocols for networked audio devices typically emphasize particular aspects of a device, such as the representation of parameter data, or a representation of the functional structure of a device. A sophisticated device model must represent parameter data, device structure and the visual presentation of controls. Parameter data should be related to the device structure, while also being represented within a flexible, logical hierarchy. The development of a standard device model is proposed and discussed with reference to the OSC, IEC62379, ACN and X170 control protocols. This abstract model is independent of any specific control protocol, and provides support for interoperability between control protocols. The proposed model is also discussed within the context of an object-based approach to service enumeration and control using an associative, shared memory model.
- Full Text:
- Date Issued: 2011
- Authors: Eales, Andrew , Foss, Richard
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427151 , vital:72418 , https://www.aes.org/e-lib/online/browse.cfm?elib=16144
- Description: Different control protocols for networked audio devices typically emphasize particular aspects of a device, such as the representation of parameter data, or a representation of the functional structure of a device. A sophisticated device model must represent parameter data, device structure and the visual presentation of controls. Parameter data should be related to the device structure, while also being represented within a flexible, logical hierarchy. The development of a standard device model is proposed and discussed with reference to the OSC, IEC62379, ACN and X170 control protocols. This abstract model is independent of any specific control protocol, and provides support for interoperability between control protocols. The proposed model is also discussed within the context of an object-based approach to service enumeration and control using an associative, shared memory model.
- Full Text:
- Date Issued: 2011