Identifying annotations for adventure game generation from fiction text
- Berkland, Ross, Bangay, Shaun D
- Authors: Berkland, Ross , Bangay, Shaun D
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433366 , vital:72965 , https://doi.org/10.1145/1899503.1899506
- Description: Recent advancements in Text-to-Scene research have lead to the devel-opment of systems which automatically extract key concepts from the text of a fiction book and generate computer animated movies depicting the sto-ry. Extracting such annotations from raw fiction text is a laborious process and so in this work we evaluate appropriate candidates to serve as the basis for the required annotations for generating interactive virtual worlds. We val-idate our choice by generating adventure games: interactive virtual worlds which create a stylized representation of the environment described in the text, populate it with characters related to the story and define game goals related to the plot of the fiction story. Our prototype produces a fully playa-ble game, making use of an existing open-source game engine. The pro-cess is evaluated using user tests in which participants are asked to meas-ure the accuracy with which the game represents the events, characters and goals described in the story. The response indicates that the chosen an-notation set is sufficient to define a game that is a plausibly acceptable rep-resentation of the text.
- Full Text:
- Date Issued: 2010
- Authors: Berkland, Ross , Bangay, Shaun D
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433366 , vital:72965 , https://doi.org/10.1145/1899503.1899506
- Description: Recent advancements in Text-to-Scene research have lead to the devel-opment of systems which automatically extract key concepts from the text of a fiction book and generate computer animated movies depicting the sto-ry. Extracting such annotations from raw fiction text is a laborious process and so in this work we evaluate appropriate candidates to serve as the basis for the required annotations for generating interactive virtual worlds. We val-idate our choice by generating adventure games: interactive virtual worlds which create a stylized representation of the environment described in the text, populate it with characters related to the story and define game goals related to the plot of the fiction story. Our prototype produces a fully playa-ble game, making use of an existing open-source game engine. The pro-cess is evaluated using user tests in which participants are asked to meas-ure the accuracy with which the game represents the events, characters and goals described in the story. The response indicates that the chosen an-notation set is sufficient to define a game that is a plausibly acceptable rep-resentation of the text.
- Full Text:
- Date Issued: 2010
Minimum spanning trees for valley and ridge characterization in digital elevation maps
- Bangay, Shaun D, de Bruyn, David, Glass, Kevin R
- Authors: Bangay, Shaun D , de Bruyn, David , Glass, Kevin R
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433247 , vital:72955 , https://doi.org/10.1145/1811158.1811171
- Description: Texture synthesis employs neighbourhood matching to generate appropriate new content. Terrain synthesis has the added constraint that new content must be geographically plausible. The profile recognition and polygon breaking algorithm (PPA) [Chang et al. 1998] provides a robust mechanism for characterizing terrain as systems of valley and ridge lines in digital elevation maps. We exploit this to create a terrain characterization metric that is robust, efficient to compute and is sensitive to terrain properties.
- Full Text:
- Date Issued: 2010
- Authors: Bangay, Shaun D , de Bruyn, David , Glass, Kevin R
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433247 , vital:72955 , https://doi.org/10.1145/1811158.1811171
- Description: Texture synthesis employs neighbourhood matching to generate appropriate new content. Terrain synthesis has the added constraint that new content must be geographically plausible. The profile recognition and polygon breaking algorithm (PPA) [Chang et al. 1998] provides a robust mechanism for characterizing terrain as systems of valley and ridge lines in digital elevation maps. We exploit this to create a terrain characterization metric that is robust, efficient to compute and is sensitive to terrain properties.
- Full Text:
- Date Issued: 2010
Parallel packet classification using GPU co-processors
- Nottingham, Alistair, Irwin, Barry V W
- Authors: Nottingham, Alistair , Irwin, Barry V W
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430250 , vital:72677 , https://doi.org/10.1145/1899503.1899529
- Description: In the domain of network security, packet filtering for classification pur-poses is of significant interest. Packet classification provides a mecha-nism for understanding the composition of packet streams arriving at distinct network interfaces, and is useful in diagnosing threats and un-covering vulnerabilities so as to maximise data integrity and system se-curity. Traditional packet classifiers, such as PCAP, have utilised Con-trol Flow Graphs (CFGs) in representing filter sets, due to both their amenability to optimisation, and their inherent structural applicability to the metaphor of decision-based classification. Unfortunately, CFGs do not map well to cooperative processing implementations, and single-threaded CPU-based implementations have proven too slow for real-time classification against multiple arbitrary filters on next generation networks. In this paper, we consider a novel multithreaded classification algorithm, optimised for execution on GPU co-processors, intended to accelerate classification throughput and maximise processing efficien-cy in a highly parallel execution context.
- Full Text:
- Date Issued: 2010
- Authors: Nottingham, Alistair , Irwin, Barry V W
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430250 , vital:72677 , https://doi.org/10.1145/1899503.1899529
- Description: In the domain of network security, packet filtering for classification pur-poses is of significant interest. Packet classification provides a mecha-nism for understanding the composition of packet streams arriving at distinct network interfaces, and is useful in diagnosing threats and un-covering vulnerabilities so as to maximise data integrity and system se-curity. Traditional packet classifiers, such as PCAP, have utilised Con-trol Flow Graphs (CFGs) in representing filter sets, due to both their amenability to optimisation, and their inherent structural applicability to the metaphor of decision-based classification. Unfortunately, CFGs do not map well to cooperative processing implementations, and single-threaded CPU-based implementations have proven too slow for real-time classification against multiple arbitrary filters on next generation networks. In this paper, we consider a novel multithreaded classification algorithm, optimised for execution on GPU co-processors, intended to accelerate classification throughput and maximise processing efficien-cy in a highly parallel execution context.
- Full Text:
- Date Issued: 2010
The death of the animal in South African history
- Authors: Wylie, Dan
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/450096 , vital:74882 , https://www.scielo.org.za/pdf/hist/v55n2/v55n2a21.pdf
- Description: Matthew Calarco in his contribution to Paola Cavalieri's collection, The Death of the Animal (2009). Running through the conversations comprising this book is a thread of dissention at the Socratic, rationalistic approach taken by analytic philosophy to the question of rights for animals.
- Full Text:
- Date Issued: 2010
- Authors: Wylie, Dan
- Date: 2010
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/450096 , vital:74882 , https://www.scielo.org.za/pdf/hist/v55n2/v55n2a21.pdf
- Description: Matthew Calarco in his contribution to Paola Cavalieri's collection, The Death of the Animal (2009). Running through the conversations comprising this book is a thread of dissention at the Socratic, rationalistic approach taken by analytic philosophy to the question of rights for animals.
- Full Text:
- Date Issued: 2010
Vice-Chancellor's welcoming address 2010
- Authors: Badat, Saleem
- Date: 2010
- Language: English
- Type: text
- Identifier: vital:7590 , http://hdl.handle.net/10962/d1006581
- Description: From introduction: Rhodes University, which means, you and I and academics and support staff, exists to serve three purposes. The first is to produce knowledge, so that we can advance understanding of our natural and social worlds and enrich our accumulated scientific and cultural heritage. As a university our second purpose is to disseminate knowledge and to cultivate minds. Our goal is to ensure that you can think imaginatively, “effectively and critically”; that you “achieve depth in some field of knowledge”; that you can critique and construct alternatives, that you can communicate cogently, orally and in writing, and that you have a “critical appreciation of the ways in which we gain knowledge and understanding of the universe, of society, and of ourselves” Our final purpose as a university is to undertake community engagement. On the one hand this involves your voluntary participation in community projects undertaken thorough our Community Engagement office. On the other hand, it involves service-learning, in which through your academic courses you take part “in activities where both the community” and you benefit, “and where the goals are to provide a service to the community and, equally, to enhance (your) learning through rendering this service”
- Full Text:
- Date Issued: 2010
- Authors: Badat, Saleem
- Date: 2010
- Language: English
- Type: text
- Identifier: vital:7590 , http://hdl.handle.net/10962/d1006581
- Description: From introduction: Rhodes University, which means, you and I and academics and support staff, exists to serve three purposes. The first is to produce knowledge, so that we can advance understanding of our natural and social worlds and enrich our accumulated scientific and cultural heritage. As a university our second purpose is to disseminate knowledge and to cultivate minds. Our goal is to ensure that you can think imaginatively, “effectively and critically”; that you “achieve depth in some field of knowledge”; that you can critique and construct alternatives, that you can communicate cogently, orally and in writing, and that you have a “critical appreciation of the ways in which we gain knowledge and understanding of the universe, of society, and of ourselves” Our final purpose as a university is to undertake community engagement. On the one hand this involves your voluntary participation in community projects undertaken thorough our Community Engagement office. On the other hand, it involves service-learning, in which through your academic courses you take part “in activities where both the community” and you benefit, “and where the goals are to provide a service to the community and, equally, to enhance (your) learning through rendering this service”
- Full Text:
- Date Issued: 2010
Visual technology for the autonomous learning of mathematics:
- Linneweber-Lammerskitten, Helmut, Schäfer, Marc, Samson, Duncan
- Authors: Linneweber-Lammerskitten, Helmut , Schäfer, Marc , Samson, Duncan
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140949 , vital:37931 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20930
- Description: This paper describes a collaborative research and development project between the University of Applied Sciences Northwestern Switzerland and Rhodes University in South Africa. The project seeks to establish, disseminate and research the efficacy and use of short video clips designed specifically for the autonomous learning of mathematics. Specific to the South African context is our interest in capitalising on the ubiquity of cellphone technology and the autonomous affordances offered by mobile learning. This paper engages with a number of theoretical and pedagogical issues relating to the design, production and use of these video clips. Although the focus is specific to the contexts of South Africa and Switzerland, the discussion is of broad applicability.
- Full Text:
- Date Issued: 2010
- Authors: Linneweber-Lammerskitten, Helmut , Schäfer, Marc , Samson, Duncan
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140949 , vital:37931 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20930
- Description: This paper describes a collaborative research and development project between the University of Applied Sciences Northwestern Switzerland and Rhodes University in South Africa. The project seeks to establish, disseminate and research the efficacy and use of short video clips designed specifically for the autonomous learning of mathematics. Specific to the South African context is our interest in capitalising on the ubiquity of cellphone technology and the autonomous affordances offered by mobile learning. This paper engages with a number of theoretical and pedagogical issues relating to the design, production and use of these video clips. Although the focus is specific to the contexts of South Africa and Switzerland, the discussion is of broad applicability.
- Full Text:
- Date Issued: 2010
Business Management: BEC 121 & BEC 121E
- Masocha, Reginald, Rungani, Ellen, Puchert, Juliet
- Authors: Masocha, Reginald , Rungani, Ellen , Puchert, Juliet
- Date: 2010-01
- Subjects: Industrial management
- Language: English
- Type: Examination paper
- Identifier: vital:17434 , http://hdl.handle.net/10353/d1010244
- Description: Business Management BEC 121 & BEC 121E, supplementary examination January 2010.
- Full Text: false
- Date Issued: 2010-01
- Authors: Masocha, Reginald , Rungani, Ellen , Puchert, Juliet
- Date: 2010-01
- Subjects: Industrial management
- Language: English
- Type: Examination paper
- Identifier: vital:17434 , http://hdl.handle.net/10353/d1010244
- Description: Business Management BEC 121 & BEC 121E, supplementary examination January 2010.
- Full Text: false
- Date Issued: 2010-01
Communication and Life Skills: CLS 121F
- Authors: Formson, C , Scott, R
- Date: 2010-01
- Subjects: Life skills
- Language: English
- Type: Examination paper
- Identifier: vital:17948 , http://hdl.handle.net/10353/d1010519
- Description: Communication and Life Skills: CLS 121F, supplementary examination Jan/Feb 2010.
- Full Text: false
- Date Issued: 2010-01
- Authors: Formson, C , Scott, R
- Date: 2010-01
- Subjects: Life skills
- Language: English
- Type: Examination paper
- Identifier: vital:17948 , http://hdl.handle.net/10353/d1010519
- Description: Communication and Life Skills: CLS 121F, supplementary examination Jan/Feb 2010.
- Full Text: false
- Date Issued: 2010-01
Business Management: BEC 121 & 121E
- Ramoscha, Reginald, Rungani, Ellen, Puchert, Juliet
- Authors: Ramoscha, Reginald , Rungani, Ellen , Puchert, Juliet
- Date: 2009-11
- Subjects: Business enterprises -- Finance
- Language: English
- Type: Examination paper
- Identifier: vital:17449 , http://hdl.handle.net/10353/d1010262
- Description: Examination on Business Management: BEC 121 & 121E, November 2009.
- Full Text: false
- Date Issued: 2009-11
- Authors: Ramoscha, Reginald , Rungani, Ellen , Puchert, Juliet
- Date: 2009-11
- Subjects: Business enterprises -- Finance
- Language: English
- Type: Examination paper
- Identifier: vital:17449 , http://hdl.handle.net/10353/d1010262
- Description: Examination on Business Management: BEC 121 & 121E, November 2009.
- Full Text: false
- Date Issued: 2009-11
Business Management: BEC 312 / 312E
- Fatoki, O O, Rowles, M, Tait, M
- Authors: Fatoki, O O , Rowles, M , Tait, M
- Date: 2009-06
- Subjects: Business management
- Language: English
- Type: Examination paper
- Identifier: vital:17444 , http://hdl.handle.net/10353/d1010256
- Description: Business Management: BEC 312 / 312E, June 2009, Supplementary examination, Selected topics on financial management.
- Full Text: false
- Date Issued: 2009-06
- Authors: Fatoki, O O , Rowles, M , Tait, M
- Date: 2009-06
- Subjects: Business management
- Language: English
- Type: Examination paper
- Identifier: vital:17444 , http://hdl.handle.net/10353/d1010256
- Description: Business Management: BEC 312 / 312E, June 2009, Supplementary examination, Selected topics on financial management.
- Full Text: false
- Date Issued: 2009-06
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems
- Barnett, Richard J, Irwin, Barry V W
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
An Integrated Connection Management and Control Protocol for Audio Networks
- Foss, Richard, Gurdan, Robby, Klinkradt, Bradley, Chigwamba, Nyasha
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427111 , vital:72415 , https://www.aes.org/e-lib/browse.cfm?elib=15135
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, allows for streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper proposes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the natural layout of the device.
- Full Text:
- Date Issued: 2009
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427111 , vital:72415 , https://www.aes.org/e-lib/browse.cfm?elib=15135
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, allows for streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper proposes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the natural layout of the device.
- Full Text:
- Date Issued: 2009
Evaluating text preprocessing to improve compression on maillogs
- Otten, Fred, Irwin, Barry V W, Thinyane, Hannah
- Authors: Otten, Fred , Irwin, Barry V W , Thinyane, Hannah
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430138 , vital:72668 , https://doi.org/10.1145/1632149.1632157
- Description: Maillogs contain important information about mail which has been sent or received. This information can be used for statistical purposes, to help prevent viruses or to help prevent SPAM. In order to satisfy regula-tions and follow good security practices, maillogs need to be monitored and archived. Since there is a large quantity of data, some form of data reduction is necessary. Data compression programs such as gzip and bzip2 are commonly used to reduce the quantity of data. Text preprocessing can be used to aid the compression of English text files. This paper evaluates whether text preprocessing, particularly word replacement, can be used to improve the compression of maillogs. It presents an algorithm for constructing a dictionary for word replacement and provides the results of experiments conducted using the ppmd, gzip, bzip2 and 7zip programs. These tests show that text prepro-cessing improves data compression on maillogs. Improvements of up to 56 percent in compression time and up to 32 percent in compression ratio are achieved. It also shows that a dictionary may be generated and used on other maillogs to yield reductions within half a percent of the results achieved for the maillog used to generate the dictionary.
- Full Text:
- Date Issued: 2009
- Authors: Otten, Fred , Irwin, Barry V W , Thinyane, Hannah
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430138 , vital:72668 , https://doi.org/10.1145/1632149.1632157
- Description: Maillogs contain important information about mail which has been sent or received. This information can be used for statistical purposes, to help prevent viruses or to help prevent SPAM. In order to satisfy regula-tions and follow good security practices, maillogs need to be monitored and archived. Since there is a large quantity of data, some form of data reduction is necessary. Data compression programs such as gzip and bzip2 are commonly used to reduce the quantity of data. Text preprocessing can be used to aid the compression of English text files. This paper evaluates whether text preprocessing, particularly word replacement, can be used to improve the compression of maillogs. It presents an algorithm for constructing a dictionary for word replacement and provides the results of experiments conducted using the ppmd, gzip, bzip2 and 7zip programs. These tests show that text prepro-cessing improves data compression on maillogs. Improvements of up to 56 percent in compression time and up to 32 percent in compression ratio are achieved. It also shows that a dictionary may be generated and used on other maillogs to yield reductions within half a percent of the results achieved for the maillog used to generate the dictionary.
- Full Text:
- Date Issued: 2009
Extending the NFComms: framework for bulk data transfers
- Nottingham, Alastair, Irwin, Barry V W
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430164 , vital:72670 , https://doi.org/10.1145/1632149.1632170
- Description: Packet analysis is an important aspect of network security, which typi-cally relies on a flexible packet filtering system to extrapolate important packet information from each processed packet. Packet analysis is a computationally intensive, highly parallelisable task, and as such, clas-sification of large packet sets, such as those collected by a network tel-escope, can require significant processing time. We wish to improve upon this, through parallel classification on a GPU. In this paper, we first consider the OpenCL architecture and its applicability to packet analy-sis. We then introduce a number of packet demultiplexing and routing algorithms, and finally present a discussion on how some of these techniques may be leveraged within a GPGPU context to improve packet classification speeds.
- Full Text:
- Date Issued: 2009
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430164 , vital:72670 , https://doi.org/10.1145/1632149.1632170
- Description: Packet analysis is an important aspect of network security, which typi-cally relies on a flexible packet filtering system to extrapolate important packet information from each processed packet. Packet analysis is a computationally intensive, highly parallelisable task, and as such, clas-sification of large packet sets, such as those collected by a network tel-escope, can require significant processing time. We wish to improve upon this, through parallel classification on a GPU. In this paper, we first consider the OpenCL architecture and its applicability to packet analy-sis. We then introduce a number of packet demultiplexing and routing algorithms, and finally present a discussion on how some of these techniques may be leveraged within a GPGPU context to improve packet classification speeds.
- Full Text:
- Date Issued: 2009
Flies in the ointment a morphological and molecular comparison of Lucilia cuprina and Lucilia sericata (Diptera: Calliphoridae) in South Africa
- Tourle, Robyn, Downie, Douglas A, Villet, Martin H
- Authors: Tourle, Robyn , Downie, Douglas A , Villet, Martin H
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/442156 , vital:73963 , https://doi.org/10.1111/j.1365-2915.2008.00765.x
- Description: Complementary nuclear (28S rRNA) and mitochondrial (COI) genes were sequenced from blowflies that phenotypically resembled Lucilia cuprina (W.), Lucilia sericata (Meigen) or exhibited characters of both species. The aim was to test a long‐held hypothesis that these species hybridize under natural conditions in South Africa (Ullyett, 1945). Blowflies were obtained predominantly from the Cape Town metropolitan area, but reference samples were acquired for L. sericata from Pretoria. Several L. cuprina‐like flies were shown to possess a conflicting combination of nuclear and mitochondrial genes that has also been seen in Hawaiian specimens. Homoplasy, sampling of pseudogenes, hybridization and incomplete lineage sorting are discussed as possible hypotheses for the pattern and the latter is concluded to represent the most likely explanation.
- Full Text:
- Date Issued: 2009
- Authors: Tourle, Robyn , Downie, Douglas A , Villet, Martin H
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/442156 , vital:73963 , https://doi.org/10.1111/j.1365-2915.2008.00765.x
- Description: Complementary nuclear (28S rRNA) and mitochondrial (COI) genes were sequenced from blowflies that phenotypically resembled Lucilia cuprina (W.), Lucilia sericata (Meigen) or exhibited characters of both species. The aim was to test a long‐held hypothesis that these species hybridize under natural conditions in South Africa (Ullyett, 1945). Blowflies were obtained predominantly from the Cape Town metropolitan area, but reference samples were acquired for L. sericata from Pretoria. Several L. cuprina‐like flies were shown to possess a conflicting combination of nuclear and mitochondrial genes that has also been seen in Hawaiian specimens. Homoplasy, sampling of pseudogenes, hybridization and incomplete lineage sorting are discussed as possible hypotheses for the pattern and the latter is concluded to represent the most likely explanation.
- Full Text:
- Date Issued: 2009
Management, Processing and Analysis of Cryptographic Network Protocols
- Cowie, Bradley, Irwin, Barry V W, Barnett, Richard J
- Authors: Cowie, Bradley , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428687 , vital:72529 , https://d1wqtxts1xzle7.cloudfront.net/30968790/ISSA2009Proceedings-libre.pdf?1393060231=andresponse-content-disposi-tion=inline%3B+filename%3DAN_ANALYSIS_OF_AUTHENTICATION_FOR_PASSIV.pdfandExpires=1714732172andSignature=Ei8RhR2pCSUNGCNE40DugEyFamcyTxPuuRq9gslD~WGlNqPEgG3FL7VFRQCKXhZBWyAfGRjMtBmNDJ7Sjsgex12WxW9Fj8XdpB7Bfz23FuLc-t2YRM-2joKOHJQLxWJlfZiOzxDvVGZeM3zCHj~f3NUeY1~n6PtVtLzNdL8glIg5dzDTTIE6ms2YlxmnO6JvlzQwOWdHaUbHsZzMGOV19UPtBk-UJzHSq3NRyPe4-XNZQLNK-mEEcMGsLk6nkyXIsW2QJ7gtKW1nNkr6EMkAGSOnDai~pSqzb2imspMnlPRigAPPISrNHO79rP51H9bu1WvbRZv1KVkGvM~sRmfl28A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=499
- Description: The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both en-cryption and authentication to data transfer, has become increasingly popular. However, we note that it is rather difficult to perform legitimate analysis, intrusion detection and debugging on cryptographic protocols, as the data that passes through is encrypted. In this paper we assume that we have legitimate access to the data and that we have the private key used in transactions and thus we will be able decrypt the data. The objective is to produce a suitable application framework that allows for easy recovery and secure storage of cryptographic keys; including ap-propriate tools to decapsulate traffic and to decrypt live packet streams or precaptured traffic contained in PCAP files. The resultant processing will then be able to provide a clear-text stream which can be used for further analysis.
- Full Text:
- Date Issued: 2009
- Authors: Cowie, Bradley , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428687 , vital:72529 , https://d1wqtxts1xzle7.cloudfront.net/30968790/ISSA2009Proceedings-libre.pdf?1393060231=andresponse-content-disposi-tion=inline%3B+filename%3DAN_ANALYSIS_OF_AUTHENTICATION_FOR_PASSIV.pdfandExpires=1714732172andSignature=Ei8RhR2pCSUNGCNE40DugEyFamcyTxPuuRq9gslD~WGlNqPEgG3FL7VFRQCKXhZBWyAfGRjMtBmNDJ7Sjsgex12WxW9Fj8XdpB7Bfz23FuLc-t2YRM-2joKOHJQLxWJlfZiOzxDvVGZeM3zCHj~f3NUeY1~n6PtVtLzNdL8glIg5dzDTTIE6ms2YlxmnO6JvlzQwOWdHaUbHsZzMGOV19UPtBk-UJzHSq3NRyPe4-XNZQLNK-mEEcMGsLk6nkyXIsW2QJ7gtKW1nNkr6EMkAGSOnDai~pSqzb2imspMnlPRigAPPISrNHO79rP51H9bu1WvbRZv1KVkGvM~sRmfl28A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=499
- Description: The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both en-cryption and authentication to data transfer, has become increasingly popular. However, we note that it is rather difficult to perform legitimate analysis, intrusion detection and debugging on cryptographic protocols, as the data that passes through is encrypted. In this paper we assume that we have legitimate access to the data and that we have the private key used in transactions and thus we will be able decrypt the data. The objective is to produce a suitable application framework that allows for easy recovery and secure storage of cryptographic keys; including ap-propriate tools to decapsulate traffic and to decrypt live packet streams or precaptured traffic contained in PCAP files. The resultant processing will then be able to provide a clear-text stream which can be used for further analysis.
- Full Text:
- Date Issued: 2009
NGOs and rural movements in contemporary South Africa
- Authors: Helliker, Kirk D
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71252 , vital:29823 , https://doi.org/10.1080/02533952.2013.806415
- Description: This article provides a critical examination of relationships between non-governmental organisations (NGOs) and rural movements in post-apartheid South Africa, particularly with regard to the possible subordination of movements to NGOs. In discussing NGOs as a particular organisational form, and in reviewing some arguments pertaining to NGOs and rural movements globally, I explore whether NGOs in South Africa have a progressive role to play in agrarian transformation.
- Full Text:
- Date Issued: 2009
- Authors: Helliker, Kirk D
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71252 , vital:29823 , https://doi.org/10.1080/02533952.2013.806415
- Description: This article provides a critical examination of relationships between non-governmental organisations (NGOs) and rural movements in post-apartheid South Africa, particularly with regard to the possible subordination of movements to NGOs. In discussing NGOs as a particular organisational form, and in reviewing some arguments pertaining to NGOs and rural movements globally, I explore whether NGOs in South Africa have a progressive role to play in agrarian transformation.
- Full Text:
- Date Issued: 2009
Quantity and significance of wild meat off-take by a rural community in the Eastern Cape, South Africa
- Kaschula, Sarah A H, Shackleton, Charlie M
- Authors: Kaschula, Sarah A H , Shackleton, Charlie M
- Date: 2009
- Language: English
- Type: Article
- Identifier: vital:6638 , http://hdl.handle.net/10962/d1006864
- Description: When compared to tropical forest zones in west and central Africa, off-take of wild meat from savannah and grassland biomes by local rural communities has not been well assessed. This case study of wild meat collection activities within a rural community in the Mount Frere region of the Eastern Cape (South Africa) uses last-catch records derived from 50 wild meat gatherers to calculate average off-take of taxa, species and fresh mass of wild meat per collection event. When per-event off take is overlaid onto household hunting frequency data, annual off-take would be 268.6 kg km−2 yr−1 or 3 kg person−1 yr−1 presuming constant off-take over an annual period. Monetary value of off-take would be South African R 307 (US$ 39) per household annually. For some species, off-take weight per km2 shows similar values to data from tropical forest zones, but high human population densities tend to dilute off-takes to less nutritionally significant amounts at the per person scale. However, unlike many tropical zones, none of the species harvested can be considered high-priority conservation species. Even densely populated and heavily harvested communal lands appear to offer high wild meat off-takes from low conservation priority species.
- Full Text:
- Date Issued: 2009
- Authors: Kaschula, Sarah A H , Shackleton, Charlie M
- Date: 2009
- Language: English
- Type: Article
- Identifier: vital:6638 , http://hdl.handle.net/10962/d1006864
- Description: When compared to tropical forest zones in west and central Africa, off-take of wild meat from savannah and grassland biomes by local rural communities has not been well assessed. This case study of wild meat collection activities within a rural community in the Mount Frere region of the Eastern Cape (South Africa) uses last-catch records derived from 50 wild meat gatherers to calculate average off-take of taxa, species and fresh mass of wild meat per collection event. When per-event off take is overlaid onto household hunting frequency data, annual off-take would be 268.6 kg km−2 yr−1 or 3 kg person−1 yr−1 presuming constant off-take over an annual period. Monetary value of off-take would be South African R 307 (US$ 39) per household annually. For some species, off-take weight per km2 shows similar values to data from tropical forest zones, but high human population densities tend to dilute off-takes to less nutritionally significant amounts at the per person scale. However, unlike many tropical zones, none of the species harvested can be considered high-priority conservation species. Even densely populated and heavily harvested communal lands appear to offer high wild meat off-takes from low conservation priority species.
- Full Text:
- Date Issued: 2009
Rhodes University Library Annual Report 2009: Library Director’s Review
- Authors: Thomas, G M E
- Date: 2009
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/59941 , vital:27713
- Description: [From the Introduction] As you read through this annual overview of the work carried out by the staff of the Rhodes University Library Services Division, I am sure you will be impressed by their achievements during a year marked by major building construction and a demanding institutional review of our services and staffing structures.
- Full Text:
- Date Issued: 2009
- Authors: Thomas, G M E
- Date: 2009
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/59941 , vital:27713
- Description: [From the Introduction] As you read through this annual overview of the work carried out by the staff of the Rhodes University Library Services Division, I am sure you will be impressed by their achievements during a year marked by major building construction and a demanding institutional review of our services and staffing structures.
- Full Text:
- Date Issued: 2009
South Africa: Applied competence as the guiding framework for environmental and sustainability education
- Lotz-Sisitka, Heila, Raven, Glenda
- Authors: Lotz-Sisitka, Heila , Raven, Glenda
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , book chapter
- Identifier: http://hdl.handle.net/10962/437395 , vital:73375 , ISBN 978-1-4020-8194-1 , https://doi.org/10.1007/978-1-4020-8194-1_22
- Description: Following the demise of apartheid rule in South Africa in 1994, the new government adopted the South African Qualifications Act (RSA, 1995a) which established the South African Qualifications Authority (SAQA). The SAQA was tasked with the responsibility for developing and im-plementing a national qualifications framework (NQF) based on princi-ples of quality, equity and redress. A primary objective of the NQF was to establish a portable and responsive model for lifelong learning and one which could recognize prior learning according to an outcomes-based education and training framework. In addition to this mandate and amongst other responsibilities, SAQA has had a responsibility to design and develop qualifications that respond to the environmental rights and sustainable development clauses of the Constitution and as-sociated national policies. Through this, environment and sustainability education was placed on the national education and training agenda (see Lotz-Sisitka and Olvitt in this volume).
- Full Text:
- Date Issued: 2009
- Authors: Lotz-Sisitka, Heila , Raven, Glenda
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , book chapter
- Identifier: http://hdl.handle.net/10962/437395 , vital:73375 , ISBN 978-1-4020-8194-1 , https://doi.org/10.1007/978-1-4020-8194-1_22
- Description: Following the demise of apartheid rule in South Africa in 1994, the new government adopted the South African Qualifications Act (RSA, 1995a) which established the South African Qualifications Authority (SAQA). The SAQA was tasked with the responsibility for developing and im-plementing a national qualifications framework (NQF) based on princi-ples of quality, equity and redress. A primary objective of the NQF was to establish a portable and responsive model for lifelong learning and one which could recognize prior learning according to an outcomes-based education and training framework. In addition to this mandate and amongst other responsibilities, SAQA has had a responsibility to design and develop qualifications that respond to the environmental rights and sustainable development clauses of the Constitution and as-sociated national policies. Through this, environment and sustainability education was placed on the national education and training agenda (see Lotz-Sisitka and Olvitt in this volume).
- Full Text:
- Date Issued: 2009