Author:Oberholster, Paul J; Madlala, Tebogo E; Blettler, MCM; Amsler, ML; Eberle, EG; Botha, ADate:Mar 2018The eutrophication of waterways has become an endemic global problem. Nutrient enrichment from agriculture activities and waste water treatment plants are major drivers, but it remains unclear how lowland sandy rivers respond to eutrophication. ...Read more
Author:Steyn, DJ; Toerien, DF; Visser, JHDate:Apr 1976The purpose of this study was to determine the present eutrophication levels of the Vaal dam, to determine how it might be affected by increased discharged of secondary treated sewage effluentsRead more
Author:De Koker, EDate:Jul 2003Large numbers of South African mineworkers incur noise-induced hearing loss (NIHL), which is recognized as a compensable disease by COIDA (Compensation for
Occupational Injuries and Diseases, 1993 (Act 130 of 1993)). The prevalence of NIHL ...Read more
Author:Bredenkamp, IE; Kritzinger, E; Herselman, Martha EDate:Nov 2022As a developing country, South Africa (SA) seems to lack a balance between trust consumers place in organizations with whom they share their personal information to obtain goods and services and the degree to which that consumer confidence ...Read more
Author:Herselman, Martha E; Botha, Adèle; Maremi, Keneilwe JDate:Jul 2019The purpose of this paper is to evaluate a specific mobile technology rural schools project known as ICT4E in South Africa to determine if it complies to be regarded as an innovative educational ecosystem. The criteria that were used were ...Read more
Author:Hlela, S; Coetzee, S; Cooper, Antony KDate:Sep 2016Spatial data infrastructure (SDI) facilitates the collection and sharing of geographic information developed by different organisations. As a result, SDI initiatives are occurring in different countries. Various government departments are ...Read more
Author:Abu-Mahfouz, Adnan MI; Hancke, GPDate:Sep 2013Most of the proposed localisation algorithms studied the problem of location discovery in a non-adversarial environment. Although these types of algorithm are vulnerable to several types of security attack, less work has been done to implement ...Read more
Author:Herselman, Martha E; Botha, AdèleDate:Sep 2015In this paper, we describe the iterative evaluation of an artifact developed through the application of Design Science Research (DSR) methodology in a resource constrained environment. In the DSR process the aspect of evaluation is often done ...Read more
Author:Greeff, M; Coetzee, L; Alberts, R; Easton, HDate:Nov 2008Access to information empowers people when making decisions in their every day life. In South Africa, one of the most prominent problems that persons with disabilities face, is access to disability-related information. The South African ...Read more
Author:Semelane, Maphumzane S; Nwulu, N; Kambule, N; Tazvinga, HDate:Aug 2021The global energy transition may have unintended consequences for businesses that provide services to the coal sector. Businesses operating in coal regions like Steve Tshwete Local Municipality (STLM) might be left stranded due to the coal ...Read more
Author:Dzivhani, Mulalo; Soganile, N; Bembe, MncedisiDate:Sep 2016Long Term Evolution Advanced (LTE-Advanced) networks enables the use of new and wider radio frequency spectrum and other new technologies that facilitates high data rates and lower latency. Furthermore, LTE-Advanced adopt the use of small ...Read more
Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Jul 2011In many ways, the internet and cyber world is a dangerous place where innocent users can inadvertently fall prey to shrewd cyber criminals. These dangers, combined with a large portion of the South African population that has not had regular ...Read more
Author:Funke, Nicola S; Roux, DDate:2009The conservation of South Africa’s inland water biodiversity has until recently only been incidental to the formal protection of terrestrial ecosystems. As a result, only 50% of the main rivers contained in South Africa’s protected areas are ...Read more
Author:MacPhail, C; Campbell, CDate:Dec 1999HIV continues to spread unabated in many developing countries. Here the interventions that are currently in place are considered and the methods that are being used to evaluate them as reported in the published literature are critically ...Read more
Author:Ngcobo, P; Herselman, Martha EDate:Jun 2007The main focus of this paper is to evaluate the provision of ICT in three rural communities in Kwa-Zulu Natal (KZN) in South Africa to determine how the needs of these communities can be addressed. Both qualitative and quantitative research ...Read more
Author:Chipangura, B; Van Biljon, J; Botha, AdèleDate:Nov 2013Against the background of the global drive towards equal access to learning opportunities Open Distance Learning (ODL) institutions are challenged to optimize the use of technologies that provide usable, scalable and sustainable access. The ...Read more
Author:Chipangura, B; van Biljon, JA; Botha, AdèleDate:Jul 2015This study examined the mobile centric readiness of Computer Science students at an Open and Distance Learning (ODL) university in South Africa. Quantitative data was captured through a survey and a total of 129 students responded to the ...Read more