A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for m-voting implementation in South Africa
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
A model for assessing and reporting network performance measurement in SANReN
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
A model to address factors that could influence the information security behaviour of computing graduates
- Mabece, Thandolwethu, Thomson, Kerry-Lynn
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
A scenario-based ICT risk assessment approach in local government
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
An ICT strategy to support a patient-centred approach to diabetes care
- Authors: Petratos, Anastasia
- Date: 2017
- Subjects: Medical care -- Technological innovations -- Developing countries Health services administration -- Developing countries -- Data processing , Telecommunication in medicine Diabetes -- Treatment
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14466 , vital:27650
- Description: Factors such as poverty, ethnicity, socio-economic status, poor infrastructure and governance, etc., are some of the reasons that effective and proven prevention and treatment interventions for most of the major causes of mortality and morbidity in the developing world continue to fail. Chronic diseases require complex interventions that these countries simply cannot maintain. Diabetes mellitus (DM) is a chronic disease that is on the rise worldwide. This disease is a lifestyle disease, which means, that it is brought on by poor health habits. Statistics show that 285 million (6.4%) people aged between 20 and 79 years will be affected by Diabetes in 2010 and a staggering 439 million (7.7%) by 2030. This is a projected growth of 69% in developing countries and 20% in developed countries. The findings from studies conducted from 1993 to 2003 in Sub-Saharan Africa, particularly in South Africa, around the health care services for diabetes highlights many challenges. Sadly, the challenges 10 years after that study, are very similar. The conditions of people with Diabetes can be improved through regular monitoring of patients, improvement and monitoring of health care provided, education on healthy lifestyle, as well as education on the importance of adherence to treatment plans for the successful management of the condition. The diabetes endemic in South Africa is exacerbated by the manual functions that are performed in all aspects of monitoring and management of the disease. With the advancements that have been made in ICT and the many apps that already exist for healthcare, it is sensible to state that ICT can assist in the monitoring and management of diabetes. Another factor that is considered is that of patient-centred care. The huge number of people who need acute care and treatment in hospitals and clinics have forced a previously caring environment, to turn into a cold, almost production line affair. The sick wait in long queues and are ushered in and out of the consulting rooms as fast as possible without even as much as a “hallo”. This has left a void in the healthcare delivery to South Africans which should never have been removed in the first place, namely patient-centred care. This means that the patient is at the centre of the treatment and fully involved in the decisions about his/her health. Every patient deserves to be recognised as a human-being and treated with dignity and respect. Treatment plans for long term chronic care patients such as diabetics, should be thoroughly discussed with the patient and they should believe and comit themselves to the treatment plan. These plans are life-long and require dedication and as it is vital that patients are part of decision making and understand fully what they are expected to do. Bearing this in mind, this study has investigated the needs and care plans for people with diabetes. Specialist in the field of diabetes were interviewed and recognised care plans for diabetes such as those from WHO, IDF and SEMSDA were studied. This study also established, that by practising a patient-centred approach the adherence to a treatment plan is likely to be higher. The strategy developed involves the person with diabetes, the healthcare worker and the support structure in the care plan of the diabetic. The use of ICT as part of the solution must consider the patient-centred requirements for using IT so that the people using the strategy are comfortable and not intimidated by the technology. The need to incorporate e-health into governments’ healthcare plans has been growing over the last decade. The GSMA conducted research into mobile health opportunities in South Africa and found that SA now has a penetration of 98% and that this is the ideal medium to address the inaccessibility and inequality of healthcare in SA. The causes identified as playing a major role in the rise in diabetes were identified and it was determined that through the implementation of an ICT strategy for diabetes care, many of these can be addressed. These include the use of technology for, improved monitoring and management, increased diabetes awareness and education, and promotion of healthy lifestyle. The study focuses on the self-management aspect of diabetes and produces a strategy that incorporates various ICT solutions that would assist in the daily aspects of diabetes care, as well as follow a patient-centred approach to diabetes care. This strategy developed in this study does not need any intervention from government as it is driven by the people who have diabetes and their healthcare workers, with the aid of the technology that they currently have on hand.
- Full Text:
- Date Issued: 2017
- Authors: Petratos, Anastasia
- Date: 2017
- Subjects: Medical care -- Technological innovations -- Developing countries Health services administration -- Developing countries -- Data processing , Telecommunication in medicine Diabetes -- Treatment
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14466 , vital:27650
- Description: Factors such as poverty, ethnicity, socio-economic status, poor infrastructure and governance, etc., are some of the reasons that effective and proven prevention and treatment interventions for most of the major causes of mortality and morbidity in the developing world continue to fail. Chronic diseases require complex interventions that these countries simply cannot maintain. Diabetes mellitus (DM) is a chronic disease that is on the rise worldwide. This disease is a lifestyle disease, which means, that it is brought on by poor health habits. Statistics show that 285 million (6.4%) people aged between 20 and 79 years will be affected by Diabetes in 2010 and a staggering 439 million (7.7%) by 2030. This is a projected growth of 69% in developing countries and 20% in developed countries. The findings from studies conducted from 1993 to 2003 in Sub-Saharan Africa, particularly in South Africa, around the health care services for diabetes highlights many challenges. Sadly, the challenges 10 years after that study, are very similar. The conditions of people with Diabetes can be improved through regular monitoring of patients, improvement and monitoring of health care provided, education on healthy lifestyle, as well as education on the importance of adherence to treatment plans for the successful management of the condition. The diabetes endemic in South Africa is exacerbated by the manual functions that are performed in all aspects of monitoring and management of the disease. With the advancements that have been made in ICT and the many apps that already exist for healthcare, it is sensible to state that ICT can assist in the monitoring and management of diabetes. Another factor that is considered is that of patient-centred care. The huge number of people who need acute care and treatment in hospitals and clinics have forced a previously caring environment, to turn into a cold, almost production line affair. The sick wait in long queues and are ushered in and out of the consulting rooms as fast as possible without even as much as a “hallo”. This has left a void in the healthcare delivery to South Africans which should never have been removed in the first place, namely patient-centred care. This means that the patient is at the centre of the treatment and fully involved in the decisions about his/her health. Every patient deserves to be recognised as a human-being and treated with dignity and respect. Treatment plans for long term chronic care patients such as diabetics, should be thoroughly discussed with the patient and they should believe and comit themselves to the treatment plan. These plans are life-long and require dedication and as it is vital that patients are part of decision making and understand fully what they are expected to do. Bearing this in mind, this study has investigated the needs and care plans for people with diabetes. Specialist in the field of diabetes were interviewed and recognised care plans for diabetes such as those from WHO, IDF and SEMSDA were studied. This study also established, that by practising a patient-centred approach the adherence to a treatment plan is likely to be higher. The strategy developed involves the person with diabetes, the healthcare worker and the support structure in the care plan of the diabetic. The use of ICT as part of the solution must consider the patient-centred requirements for using IT so that the people using the strategy are comfortable and not intimidated by the technology. The need to incorporate e-health into governments’ healthcare plans has been growing over the last decade. The GSMA conducted research into mobile health opportunities in South Africa and found that SA now has a penetration of 98% and that this is the ideal medium to address the inaccessibility and inequality of healthcare in SA. The causes identified as playing a major role in the rise in diabetes were identified and it was determined that through the implementation of an ICT strategy for diabetes care, many of these can be addressed. These include the use of technology for, improved monitoring and management, increased diabetes awareness and education, and promotion of healthy lifestyle. The study focuses on the self-management aspect of diabetes and produces a strategy that incorporates various ICT solutions that would assist in the daily aspects of diabetes care, as well as follow a patient-centred approach to diabetes care. This strategy developed in this study does not need any intervention from government as it is driven by the people who have diabetes and their healthcare workers, with the aid of the technology that they currently have on hand.
- Full Text:
- Date Issued: 2017
Analysis of factors affecting performance of a low-temperature Organic Rankine Cycle heat engine
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
Analysis of the reliability for the 132/66/22 KV distribution network within ESKOM’s Eastern Cape operating unit
- Authors: Pantshwa, Athini
- Date: 2017
- Subjects: Electric power distribution Electricity -- Supply -- Engineering , Smart power grids
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19750 , vital:28953
- Description: A stable and reliable electrical power supply system is an inevitable pre-requisite for the technological and economic growth of any nation. Due to this, utilities must strive and ensure that the customer’s reliability requirements are met and that the regulators requirements are satisfied at the lowest possible cost. It is known fact around the world that 90% of the customer service interruptions are caused due to failure in distribution system. Therefore, it is worth considering reliability assessments as it provides an opportunity to incorporate the cost or losses incurred by the utilities customer as a result of power failure. This must be considered in the planning and operating practices. The system modelling and simulation study is carried out on one of the district’s distribution system which consists of 132 kV, 66 kV and 22 kV network in Aliwal North Sector ECOU. The reliability assessment is done on the 22, 66 and 132 kV system to assess the performance of the present system and also predictive reliability analysis for the future system considering load growth and system expansion. The alternative which gives low SAIDI, SAIFI and minimum breakeven costs is being assessed and considered. The reliability of 132 kV system could be further improved by constructing a new 132 kV line from a different source of supply and connecting with line coming from another district (reserve) at reasonable break even cost. The decision base could be further improved by having Aliwal North Sector context interruption cost. However, the historical data which may be used in Aliwal North Sector to acquire interruption costs from the customers are being proposed. The focus should be on improving the power quality on constrained networks first, then the reliability. Therefore for the Aliwal North power system network it is imperative that Eskom invest on the reliability of this network. This dissertation also analysed load reflected economic benefit versus performance expectations that should be optimized through achieving a balance between network performance (SAIDI) improvement, and total life cycle cost (to Eskom as well as the economy). Reliability analysis conducted in this dissertation used Aliwal North power system network as a case study; the results proved that the system is vulnerable to faults, planned and unplanned outages. Reliability evaluation studies were conducted on the system using DigSilent software in conjunction with FME. These two models gave accurate results with acceptable variance in most indices except for the ENS where the variance was quite significant. It can be concluded that DigSilent results are the most accurate results in all three reliability evaluation scenarios for the Aliwal North Power System, best interpretation being that of DigSilent.
- Full Text:
- Date Issued: 2017
- Authors: Pantshwa, Athini
- Date: 2017
- Subjects: Electric power distribution Electricity -- Supply -- Engineering , Smart power grids
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19750 , vital:28953
- Description: A stable and reliable electrical power supply system is an inevitable pre-requisite for the technological and economic growth of any nation. Due to this, utilities must strive and ensure that the customer’s reliability requirements are met and that the regulators requirements are satisfied at the lowest possible cost. It is known fact around the world that 90% of the customer service interruptions are caused due to failure in distribution system. Therefore, it is worth considering reliability assessments as it provides an opportunity to incorporate the cost or losses incurred by the utilities customer as a result of power failure. This must be considered in the planning and operating practices. The system modelling and simulation study is carried out on one of the district’s distribution system which consists of 132 kV, 66 kV and 22 kV network in Aliwal North Sector ECOU. The reliability assessment is done on the 22, 66 and 132 kV system to assess the performance of the present system and also predictive reliability analysis for the future system considering load growth and system expansion. The alternative which gives low SAIDI, SAIFI and minimum breakeven costs is being assessed and considered. The reliability of 132 kV system could be further improved by constructing a new 132 kV line from a different source of supply and connecting with line coming from another district (reserve) at reasonable break even cost. The decision base could be further improved by having Aliwal North Sector context interruption cost. However, the historical data which may be used in Aliwal North Sector to acquire interruption costs from the customers are being proposed. The focus should be on improving the power quality on constrained networks first, then the reliability. Therefore for the Aliwal North power system network it is imperative that Eskom invest on the reliability of this network. This dissertation also analysed load reflected economic benefit versus performance expectations that should be optimized through achieving a balance between network performance (SAIDI) improvement, and total life cycle cost (to Eskom as well as the economy). Reliability analysis conducted in this dissertation used Aliwal North power system network as a case study; the results proved that the system is vulnerable to faults, planned and unplanned outages. Reliability evaluation studies were conducted on the system using DigSilent software in conjunction with FME. These two models gave accurate results with acceptable variance in most indices except for the ENS where the variance was quite significant. It can be concluded that DigSilent results are the most accurate results in all three reliability evaluation scenarios for the Aliwal North Power System, best interpretation being that of DigSilent.
- Full Text:
- Date Issued: 2017
Application of the theory of critical distance technique to predict fracture toughness in friction stir welded Ti-6Al-4V sheet
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
Concrete work decision analysis in Bloemfontein
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
Diamond turning of contact lens polymers
- Authors: Liman, Muhammad Mukhtar
- Date: 2017
- Subjects: Diamond turning Contact lenses , Electrostatic lenses Lenses -- Design and construction Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/19223 , vital:28789
- Description: Contact lens production requires high accuracy and good surface integrity. Surface roughness is generally used to measure the index quality of a turning process. It has been an important response because it has direct influence toward the part performance and the production cost. Hence, choosing optimal cutting parameters will not only improve the quality measure but also the productivity. In this study, an ONSI-56 (Onsifocon A) contact lens buttons were used to investigate the triboelectric phenomena and the effects of turning parameters on surface finish of the lens materials. ONSI-56 specimens are machined by Precitech Nanoform Ultra-grind 250 precision machine and the roughness values of the diamond turned surfaces are measured by Taylor Hopson PGI Profilometer. Electrostatics values were measured using electrostatic voltmeter. An artificial neural network (ANN) and response surface (RS) model were developed to predict surface roughness and electrostatic discharge (ESD) on the turned ONSI-56. In the development of predictive models, turning parameters of cutting speed, feed rate and depth of cut were considered as model variables. The required data for predictive models were obtained by conducting a series of turning test and measuring the surface roughness and ESD data. Good agreement is observed between the predictive models results and the experimental measurements. The ANN and RSM models for ONSI-56 are compared with each other using mean absolute percentage error (MAPE) for accuracy and computational cost.
- Full Text:
- Date Issued: 2017
- Authors: Liman, Muhammad Mukhtar
- Date: 2017
- Subjects: Diamond turning Contact lenses , Electrostatic lenses Lenses -- Design and construction Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/19223 , vital:28789
- Description: Contact lens production requires high accuracy and good surface integrity. Surface roughness is generally used to measure the index quality of a turning process. It has been an important response because it has direct influence toward the part performance and the production cost. Hence, choosing optimal cutting parameters will not only improve the quality measure but also the productivity. In this study, an ONSI-56 (Onsifocon A) contact lens buttons were used to investigate the triboelectric phenomena and the effects of turning parameters on surface finish of the lens materials. ONSI-56 specimens are machined by Precitech Nanoform Ultra-grind 250 precision machine and the roughness values of the diamond turned surfaces are measured by Taylor Hopson PGI Profilometer. Electrostatics values were measured using electrostatic voltmeter. An artificial neural network (ANN) and response surface (RS) model were developed to predict surface roughness and electrostatic discharge (ESD) on the turned ONSI-56. In the development of predictive models, turning parameters of cutting speed, feed rate and depth of cut were considered as model variables. The required data for predictive models were obtained by conducting a series of turning test and measuring the surface roughness and ESD data. Good agreement is observed between the predictive models results and the experimental measurements. The ANN and RSM models for ONSI-56 are compared with each other using mean absolute percentage error (MAPE) for accuracy and computational cost.
- Full Text:
- Date Issued: 2017
Effective communication planning for high-performance civil engineering project teams
- Authors: Rossouw, Jeanne Jacques
- Date: 2017
- Subjects: Communication in engineering -- South Africa Communication of technical information , Communication in management Project management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/19993 , vital:29020
- Description: In the area of project management, it is well understood that effective communication processes impact positively on project performance. Despite this, project teams still struggle to develop effective communication plans that address their project communication needs. The evidence of this is that many project problems are attributed to poor communication. The literature addresses the needs and shortcomings of group communication and communication planning in general; but there is however, a scarcity of literature describing how to plan for the internal communication needs of high-performance civil engineering teams. With the limited literature available on the topic, this study seeks to validate how effective the current communication planning methods are at Aurecon in meeting the communication needs of its project teams. This qualitative research project is a case study of communication planning within the project teams at Aurecon in Port Elizabeth. A semi-structured interview process was followed, addressing specific questions, without limiting the direction of the interviews. Project team members, working on high performance projects, were asked for their thoughts, feelings and suggestions about existing communication practices and project communication planning. Overall, it was found that the existing communication-planning practices at Aurecon did not have any beneficial effect on how team members communicate. It was concluded that project teams would benefit from improved communication-planning processes that are more inclusive of their specific communication needs. Organisations working on high-performance projects will benefit directly from the research, which challenges these organisations to think more broadly about how they plan for communication at a project level. The research provides practical suggestions for improving the way that teams plan their communication processes; and it does so by focusing on the communication needs of the team members. Recommendations are made to professional bodies, tertiary institutions, project organisations – and most importantly – to project team members themselves. The recommendations to project team members include taking ownership of communication practices, asserting their views, as well as making their needs known.
- Full Text:
- Date Issued: 2017
- Authors: Rossouw, Jeanne Jacques
- Date: 2017
- Subjects: Communication in engineering -- South Africa Communication of technical information , Communication in management Project management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/19993 , vital:29020
- Description: In the area of project management, it is well understood that effective communication processes impact positively on project performance. Despite this, project teams still struggle to develop effective communication plans that address their project communication needs. The evidence of this is that many project problems are attributed to poor communication. The literature addresses the needs and shortcomings of group communication and communication planning in general; but there is however, a scarcity of literature describing how to plan for the internal communication needs of high-performance civil engineering teams. With the limited literature available on the topic, this study seeks to validate how effective the current communication planning methods are at Aurecon in meeting the communication needs of its project teams. This qualitative research project is a case study of communication planning within the project teams at Aurecon in Port Elizabeth. A semi-structured interview process was followed, addressing specific questions, without limiting the direction of the interviews. Project team members, working on high performance projects, were asked for their thoughts, feelings and suggestions about existing communication practices and project communication planning. Overall, it was found that the existing communication-planning practices at Aurecon did not have any beneficial effect on how team members communicate. It was concluded that project teams would benefit from improved communication-planning processes that are more inclusive of their specific communication needs. Organisations working on high-performance projects will benefit directly from the research, which challenges these organisations to think more broadly about how they plan for communication at a project level. The research provides practical suggestions for improving the way that teams plan their communication processes; and it does so by focusing on the communication needs of the team members. Recommendations are made to professional bodies, tertiary institutions, project organisations – and most importantly – to project team members themselves. The recommendations to project team members include taking ownership of communication practices, asserting their views, as well as making their needs known.
- Full Text:
- Date Issued: 2017
Friction welding of thin walled zircaloy-4 tubes for the nuclear industry
- Authors: Koloi, Nthatisi Dinah
- Date: 2017
- Subjects: Friction welding Zirconium alloys
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/18794 , vital:28724
- Description: This work reports on the process development of solid state welding as an alternative joining process for assembling Zircaloy-4 fuel rod components for the nuclear industry. A typical fuel rod consists of a thin tube that is blocked at both ends by end-caps. The welding of the thin wall tubes onto the end-caps is currently accomplished by employing fusion techniques. Due to limited thin wall Zircaloy-4 tube supplied, preliminary welding was initially performed with thin wall 316L stainless steel tube for the development of a joint geometry and establishment of an experimental welding and testing setup. A suitable joint geometry that would achieve higher static strength equal or above that of the parent material, as well as complete circumferential bonding was investigated through welding a tube on different volume interface geometries of the end-caps. Higher joint efficiency was obtained from a tube-to-tube joint geometry that allowed sufficient frictional heat input at the interface. Consequently, the successful joint geometry was employed to develop a friction welding process for the joining of thin wall Zircaloy-4 tubes. The influential process parameters, axial force, rotational speed and upset distance were varied during the investigation. The completed weld joints were evaluated by visual, metallurgical and mechanical means. Successful welds showed complete circumferential bonding and high joint efficiency that was above the parent plate material as well as parent tube material. The evaluation of the microstructure showed transformation of grain structure on the heat affected zone (HAZ) and friction weld zone when compared to the parent materials. Even though, this work could not resolve inner flash formation, there is enough evidence that friction welding can be used for assembling fuel rod components in the nuclear industry.
- Full Text:
- Date Issued: 2017
- Authors: Koloi, Nthatisi Dinah
- Date: 2017
- Subjects: Friction welding Zirconium alloys
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/18794 , vital:28724
- Description: This work reports on the process development of solid state welding as an alternative joining process for assembling Zircaloy-4 fuel rod components for the nuclear industry. A typical fuel rod consists of a thin tube that is blocked at both ends by end-caps. The welding of the thin wall tubes onto the end-caps is currently accomplished by employing fusion techniques. Due to limited thin wall Zircaloy-4 tube supplied, preliminary welding was initially performed with thin wall 316L stainless steel tube for the development of a joint geometry and establishment of an experimental welding and testing setup. A suitable joint geometry that would achieve higher static strength equal or above that of the parent material, as well as complete circumferential bonding was investigated through welding a tube on different volume interface geometries of the end-caps. Higher joint efficiency was obtained from a tube-to-tube joint geometry that allowed sufficient frictional heat input at the interface. Consequently, the successful joint geometry was employed to develop a friction welding process for the joining of thin wall Zircaloy-4 tubes. The influential process parameters, axial force, rotational speed and upset distance were varied during the investigation. The completed weld joints were evaluated by visual, metallurgical and mechanical means. Successful welds showed complete circumferential bonding and high joint efficiency that was above the parent plate material as well as parent tube material. The evaluation of the microstructure showed transformation of grain structure on the heat affected zone (HAZ) and friction weld zone when compared to the parent materials. Even though, this work could not resolve inner flash formation, there is enough evidence that friction welding can be used for assembling fuel rod components in the nuclear industry.
- Full Text:
- Date Issued: 2017
Governing information security within the context of "bring your own device" in small, medium and micro enterprises
- Authors: Fani, Noluvuyo
- Date: 2017
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7626 , vital:22114
- Description: Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof.
- Full Text:
- Date Issued: 2017
- Authors: Fani, Noluvuyo
- Date: 2017
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7626 , vital:22114
- Description: Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof.
- Full Text:
- Date Issued: 2017
Guidelines for secure cloud-based personal health records
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
Home ownership in the gap-housing market in South Africa
- Authors: Ludidi, Daniel Dumisa
- Date: 2017
- Subjects: Home ownership -- South Africa Housing -- South Africa , Bond market -- South Africa Real estate investment -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/18299 , vital:28616
- Description: The access to adequate housing is a constitutional right, in terms of Section 26 (1) of the Constitution of the Republic of South Africa, Act 108 of 1996. Access to housing in South Africa is still an ideal and not a reality. The increase in housing prices reduces affordability, which creates a barrier to the housing market for South Africans to fully participate. The South African housing market is divided, based on the affordability of households, with a gap within the property market. The gap-housing market is a market, which does not receive a government subsidy; and furthermore, it does not qualify for bond finance by the private financial institutions. The gap-housing market includes households that earn between R3,500 to R15,000 per month for residential properties valued between R116,703 to R483,481. The problem is a lack of supply in the gap-housing market to meet the demand; and this is also affected by the poor performance of the subsidy-housing market. The gap-housing market is not traded adequately, due to a lack of supply caused by stricter lending criteria from the banks. The study was conducted by means of reviewing the related literature and by an empirical study. A survey was conducted using the quantitative approach through a distribution of research questionnaires to different organizations within the judgement sample population. The objective of the study is to review the gap-housing market and to make recommendations. The descriptive survey was conducted among specialists that are participating in the South African housing market. The findings of the study suggest that there is a relationship between incentive and participation, as well as a relationship between participation – with access, supply and trading in the gap-housing market. This study will contribute to the South African housing market body of knowledge – by addressing the problem of a gap within the housing market.
- Full Text:
- Date Issued: 2017
- Authors: Ludidi, Daniel Dumisa
- Date: 2017
- Subjects: Home ownership -- South Africa Housing -- South Africa , Bond market -- South Africa Real estate investment -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/18299 , vital:28616
- Description: The access to adequate housing is a constitutional right, in terms of Section 26 (1) of the Constitution of the Republic of South Africa, Act 108 of 1996. Access to housing in South Africa is still an ideal and not a reality. The increase in housing prices reduces affordability, which creates a barrier to the housing market for South Africans to fully participate. The South African housing market is divided, based on the affordability of households, with a gap within the property market. The gap-housing market is a market, which does not receive a government subsidy; and furthermore, it does not qualify for bond finance by the private financial institutions. The gap-housing market includes households that earn between R3,500 to R15,000 per month for residential properties valued between R116,703 to R483,481. The problem is a lack of supply in the gap-housing market to meet the demand; and this is also affected by the poor performance of the subsidy-housing market. The gap-housing market is not traded adequately, due to a lack of supply caused by stricter lending criteria from the banks. The study was conducted by means of reviewing the related literature and by an empirical study. A survey was conducted using the quantitative approach through a distribution of research questionnaires to different organizations within the judgement sample population. The objective of the study is to review the gap-housing market and to make recommendations. The descriptive survey was conducted among specialists that are participating in the South African housing market. The findings of the study suggest that there is a relationship between incentive and participation, as well as a relationship between participation – with access, supply and trading in the gap-housing market. This study will contribute to the South African housing market body of knowledge – by addressing the problem of a gap within the housing market.
- Full Text:
- Date Issued: 2017
Hybrid additive manufacturing platform for the production of composite wind turbine blade moulds
- Authors: Momsen, Timothy Benjamin
- Date: 2017
- Subjects: Manufacturing processes -- Automation Production control -- Automation , Production management
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/19091 , vital:28772
- Description: This dissertation discusses the application of additive manufacturing technologies for production of a large-scale rapid prototyping machine, which will be used to produce moulds for prototype composite turbine blades for the emerging renewables energy industry within the Eastern Cape region in South Africa. The conceptualization and design of three complete printer builds resulted in the amalgamation of a final system, following stringent theoretical design, simulation, and feasibility analysis. Following the initial product design cycle stage, construction and performance testing of a large-scale additive manufacturing platform were performed. In-depth statistical analysis of the mechatronic system was undertaken, particularly related to print-head locational accuracy, repeatability, and effects of parameter variation on printer performance. The machine was analysed to assess feasibility for use in the mould-making industry with accuracy and repeatability metrics of 0.121 mm and 0.156 mm rivalling those produced by some of the more accurate fused deposition modellers commercially available. The research data gathered serves to confirm that rapid prototyping is a good alternative manufacturing method for wind turbine blade plug and mould production.
- Full Text:
- Date Issued: 2017
- Authors: Momsen, Timothy Benjamin
- Date: 2017
- Subjects: Manufacturing processes -- Automation Production control -- Automation , Production management
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/19091 , vital:28772
- Description: This dissertation discusses the application of additive manufacturing technologies for production of a large-scale rapid prototyping machine, which will be used to produce moulds for prototype composite turbine blades for the emerging renewables energy industry within the Eastern Cape region in South Africa. The conceptualization and design of three complete printer builds resulted in the amalgamation of a final system, following stringent theoretical design, simulation, and feasibility analysis. Following the initial product design cycle stage, construction and performance testing of a large-scale additive manufacturing platform were performed. In-depth statistical analysis of the mechatronic system was undertaken, particularly related to print-head locational accuracy, repeatability, and effects of parameter variation on printer performance. The machine was analysed to assess feasibility for use in the mould-making industry with accuracy and repeatability metrics of 0.121 mm and 0.156 mm rivalling those produced by some of the more accurate fused deposition modellers commercially available. The research data gathered serves to confirm that rapid prototyping is a good alternative manufacturing method for wind turbine blade plug and mould production.
- Full Text:
- Date Issued: 2017