1,008 research outputs found

    Die landboupotensiaal van wes-transvaal en die stimulering van nywerheidsontwikkeling

    Get PDF
    Die landboupotensiaal van ’n gebied is slegs die peil van produksie wat binne die perke van die fisiese faktore soos topografie, grond en klimaat behaal kan word. Die werklike produksie op enige tydstip sal egter afhang van die invloed van eksterne maatreëls of ’n kombinasie van eksterne maatreëls wat baie suksesvol toegepas kan word om die landbouproduksie te stimuleer in ’n bepaalde rigting, is die voorsiening van ’n bestendige mark of afsetmoontlikhede. ’n Vrugte-inmaakfabriek in ’n bepaalde omgewing kan so as prikkel dien om vrugteboerdery in die bepaalde omgewing te bevorder en te bestendig

    Grondkundige navorsing in die hoëveld-streek*

    Get PDF
    Die Landbounavorsingsinstituut van die Hoëveldstreek te Potchefstroom is die sentrum van navorsing vir die Hoëveldstreek, een van die sewe ekologiese landboustreke waarin die Republiek onderverdeel is. Met sy na- genoeg 11,500,000 morg boerdery-oppervlakte is dit die derde kleinste streek en beslaan dit slegs 11.1% van die totale oppervlakte van die Republiek. Die 4,389,881 morg grond onder bewerking verteenwoordig egter 51.8% van die totale bewerkte grond in die Republiek. Behalwe 'n klein gedeelte wat onder besproeiing is, word die grond aangewend vir droëland-boerdery. Dit beteken dat die sukses van die oeste in ’n groot mate afhanklik is van klimaatsomstandighede. Tot dusver het die mens nog nie daarin geslaag om die makro-klimaat in enige mate te beheer om daardeur risiko’s in die boerdery uit te skakel nie. Die grondklimaat kan egter beheer word deur agronomiese praktyke soos bv. deur die daarstelling van ’n „grondkombers” om verdamping te beperk en om so- veel as moontlik vog te bewaar vir plantegroei

    Measuring Information Security Awareness Efforts in Social Networking Sites – A Proactive Approach

    Get PDF
    For Social Network Sites to determine the effectiveness of their Information Security Awareness (ISA) techniques, many measurement and evaluation techniques are now in place to ensure controls are working as intended. While these techniques are inexpensive, they are all incident- driven as they are based on the occurrence of incident(s). Additionally, they do not present a true reflection of ISA since cyber-incidents are hardly reported. They are therefore adjudged to be post-mortem and risk permissive, the limitations that are inacceptable in industries where incident tolerance level is low. This paper aims at employing a non-incident statistic approach to measure ISA efforts. Using an object- oriented programming approach, PhP is employed as the coding language with MySQL database engine at the back-end to develop sOcialistOnline – a Social Network Sites (SNS) fully secured with multiple ISA techniques. Rather than evaluating the effectiveness of ISA efforts by success of attacks or occurrence of an event, password scanning is implemented to proactively measure the effects of ISA techniques in sOcialistOnline. Thus, measurement of ISA efforts is shifted from detective and corrective to preventive and anticipatory paradigms which are the best forms of information security approach

    Developing a secured social networking site using informa on security awareness techniques

    Get PDF
    Background: Ever since social network sites (SNS) became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA) remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it dif cult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has con rmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP) approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it

    Smart slope monitoring through the use of fibre optic sensors

    Get PDF
    Abstract: This study demonstrates the use of fibre optic instrumentation such as an Optical Time-Domain Reflectometer as well as Fibre Bragg Grating sensors on a small-scale physical 1-g model to monitor potential slope movement. The scope is to improve current knowledge in the field of slope monitoring through the im- plementation of optic fibre sensors. Single-mode and multi-mode hetero-core optic fibre displacement sensors were created and directly embedded into layers of coarse-grained soil. By inducing critical slope conditions in the small-scale model through the course of several experiments we were able to identify localised failure zones and quantify signal attenuation. Using a calibrated source, it was possible to indirectly estimate microstrain and investigate spatial resolution of the sensing cable. Laboratory testing of the sensors and the sensing system allowed for further development of sensor integration techniques

    Global Data Breaches Responsible for the Disclosure of Personal Information: 2015 & 2016

    Get PDF
    Proceedings of the 16th European Conference on Cyber Warfare and Security, University College Dublin, Ireland, 29-30 June 2017 eData breaches have gained extensive coverage as businesses and organisations of all sizes become more dependent on digital data, cloud computing and workforce mobility. Companies store sensitive or confidential data on local machines, enterprise databases and cloud servers. To breach a company’s data one needs to gain access to restricted networks. Although this is a difficult task that requires specialised skills, hackers continuously identify vulnerabilities and loopholes to gain access and conduct data breaches. The Privacy Rights Clearinghouse1 recorded 901,010,077 data breaches since 2005, with only 5,220 data breaches made public. In 2015 some of the world’s largest recorded data breaches occurred; yet a total of only 266 data breaches were made public. 2016 still had a number of major data breaches and a total of 472 breaches were made public. When conducting business in the modern era, data protection and management of personal information have become an integral aspect for organisations and individuals. Despite increased focus on personal information and the existence of data protection legislation internationally, data breaches remain a common occurrence resulting in major cost implications. This paper investigates the most significant data breaches in 2015 and 2016 responsible for the leakage of personal information, with the aim of identifying a general trend in terms of data breaches and personal identifiable (PII) leakage.Institute for Corporate Citizenshi

    Calibration artefacts in radio interferometry. I. Ghost sources in WSRT data

    Get PDF
    This work investigates a particular class of artefacts, or ghost sources, in radio interferometric images. Earlier observations with (and simulations of) the Westerbork Synthesis Radio Telescope (WSRT) suggested that these were due to calibration with incomplete sky models. A theoretical framework is derived that validates this suggestion, and provides predictions of ghost formation in a two-source scenario. The predictions are found to accurately match the result of simulations, and qualitatively reproduce the ghosts previously seen in observational data. The theory also provides explanations for many previously puzzling features of these artefacts (regular geometry, PSF-like sidelobes, seeming independence on model flux), and shows that the observed phenomenon of flux suppression affecting unmodelled sources is due to the same mechanism. We demonstrate that this ghost formation mechanism is a fundamental feature of calibration, and exhibits a particularly strong and localized signature due to array redundancy. To some extent this mechanism will affect all observations (including those with non-redundant arrays), though in most cases the ghosts remain hidden below the noise or masked by other instrumental artefacts. The implications of such errors on future deep observations are discussed.Comment: 19 pages, 15 figures, submitted to MNRA
    • …
    corecore