Now showing items 1-7 of 7
Arenas of contestation: policy processes and land tenure reform in post-apartheid South Africa
(University of the Western Cape, 2008)
Summary: This thesis considers different groupings that have come together in their participation in the policy processes relating to tenure reform in post-apartheid South Africa. It is methodologically and theoretically ...
Translating policy into practice: aspects of learner-centred classroom practices in mathematics in Namibia secondary schools
"This study is guided by theories about educational policy implementation and their implications for teaching. These theories underline the notion that educational reform is a progress and it iv comes in cycles. According ...
The ecology of the world's smallest tortoise, homopus signatus signatus: effects of rainfall
Tortoises appear to be successful in arid ecosystems, where they depend on primary production for their predominantly herbivorous diets. The low primary production of arid regions is exacerbated by priodic droughts, so ...
Hydraulic properties of the table mountain group (TMG) aquifers
Research findings in current study provide a new insight into the fractured rock aquifers in the TMG area. Some of the results will have wide implications on the groundwater management and forms a solid basis the further ...
Modelling of reliable service based operations support system (MORSBOSS)
The underlying theme of this thesis is identification, classification, detection and prediction of cellular network faults using state of the art technologies, methods and algorithms.
A case study of the nature of biology practical work in two secondary schools in Namibia
The aim of the study was to investigate the nature of biology practical work and associated discourses in two Namibian secondary schools. The purposive sample consisted of three biology teachers and 36 grade 11 students ...
Digital watermarking methods for data security and authentication
Cryptology is the study of systems that typically originate from a consideration of the ideal circumstances under which secure information exchange is to take place. It involves the study of cryptographic and other processes ...