A case study of the cost and causes of the Tongaat mall accident in Durban
- Authors: Van Eeden, Leonarda
- Date: 2017
- Subjects: Construction industry -- Accidents -- South Africa -- Durban Construction industry -- Safety regulations -- South Africa -- KwaZulu-Natal , Building sites -- Risk assessment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/45464 , vital:38619
- Description: The literature shows that building collapses occur due to either management or operational failure. This Dissertation presents the causes of building collapse linked to management and operational lapses. A case study research on the Tongaat mall collapse in November 2013 forms the basis for the research. Through data collection that entails content analysis of official inquiry into the collapse and subsequent semi-structured face-to-face interviews among the participants in the collapsed building, major failures were identified. Salient findings show that the regulatory functions on the building project were compromised, and the inability to ensure that the project fulfils all enforcement and compliance requirements significantly enhances the existence of a work environment that led to two fatalities and 29 injuries. This study corroborates past findings that have flagged implementation as the weak link of H&S management in terms of construction regulations in South Africa. In other words, the benefits of adequate policies on paper can only emerge through applications on construction sites.
- Full Text:
- Date Issued: 2017
- Authors: Van Eeden, Leonarda
- Date: 2017
- Subjects: Construction industry -- Accidents -- South Africa -- Durban Construction industry -- Safety regulations -- South Africa -- KwaZulu-Natal , Building sites -- Risk assessment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/45464 , vital:38619
- Description: The literature shows that building collapses occur due to either management or operational failure. This Dissertation presents the causes of building collapse linked to management and operational lapses. A case study research on the Tongaat mall collapse in November 2013 forms the basis for the research. Through data collection that entails content analysis of official inquiry into the collapse and subsequent semi-structured face-to-face interviews among the participants in the collapsed building, major failures were identified. Salient findings show that the regulatory functions on the building project were compromised, and the inability to ensure that the project fulfils all enforcement and compliance requirements significantly enhances the existence of a work environment that led to two fatalities and 29 injuries. This study corroborates past findings that have flagged implementation as the weak link of H&S management in terms of construction regulations in South Africa. In other words, the benefits of adequate policies on paper can only emerge through applications on construction sites.
- Full Text:
- Date Issued: 2017
A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A model for assessing and reporting network performance measurement in SANReN
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
A model to address factors that could influence the information security behaviour of computing graduates
- Mabece, Thandolwethu, Thomson, Kerry-Lynn
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
A scenario-based ICT risk assessment approach in local government
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
Analysis of factors affecting performance of a low-temperature Organic Rankine Cycle heat engine
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
Analysis of the reliability for the 132/66/22 KV distribution network within ESKOM’s Eastern Cape operating unit
- Authors: Pantshwa, Athini
- Date: 2017
- Subjects: Electric power distribution Electricity -- Supply -- Engineering , Smart power grids
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19750 , vital:28953
- Description: A stable and reliable electrical power supply system is an inevitable pre-requisite for the technological and economic growth of any nation. Due to this, utilities must strive and ensure that the customer’s reliability requirements are met and that the regulators requirements are satisfied at the lowest possible cost. It is known fact around the world that 90% of the customer service interruptions are caused due to failure in distribution system. Therefore, it is worth considering reliability assessments as it provides an opportunity to incorporate the cost or losses incurred by the utilities customer as a result of power failure. This must be considered in the planning and operating practices. The system modelling and simulation study is carried out on one of the district’s distribution system which consists of 132 kV, 66 kV and 22 kV network in Aliwal North Sector ECOU. The reliability assessment is done on the 22, 66 and 132 kV system to assess the performance of the present system and also predictive reliability analysis for the future system considering load growth and system expansion. The alternative which gives low SAIDI, SAIFI and minimum breakeven costs is being assessed and considered. The reliability of 132 kV system could be further improved by constructing a new 132 kV line from a different source of supply and connecting with line coming from another district (reserve) at reasonable break even cost. The decision base could be further improved by having Aliwal North Sector context interruption cost. However, the historical data which may be used in Aliwal North Sector to acquire interruption costs from the customers are being proposed. The focus should be on improving the power quality on constrained networks first, then the reliability. Therefore for the Aliwal North power system network it is imperative that Eskom invest on the reliability of this network. This dissertation also analysed load reflected economic benefit versus performance expectations that should be optimized through achieving a balance between network performance (SAIDI) improvement, and total life cycle cost (to Eskom as well as the economy). Reliability analysis conducted in this dissertation used Aliwal North power system network as a case study; the results proved that the system is vulnerable to faults, planned and unplanned outages. Reliability evaluation studies were conducted on the system using DigSilent software in conjunction with FME. These two models gave accurate results with acceptable variance in most indices except for the ENS where the variance was quite significant. It can be concluded that DigSilent results are the most accurate results in all three reliability evaluation scenarios for the Aliwal North Power System, best interpretation being that of DigSilent.
- Full Text:
- Date Issued: 2017
- Authors: Pantshwa, Athini
- Date: 2017
- Subjects: Electric power distribution Electricity -- Supply -- Engineering , Smart power grids
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19750 , vital:28953
- Description: A stable and reliable electrical power supply system is an inevitable pre-requisite for the technological and economic growth of any nation. Due to this, utilities must strive and ensure that the customer’s reliability requirements are met and that the regulators requirements are satisfied at the lowest possible cost. It is known fact around the world that 90% of the customer service interruptions are caused due to failure in distribution system. Therefore, it is worth considering reliability assessments as it provides an opportunity to incorporate the cost or losses incurred by the utilities customer as a result of power failure. This must be considered in the planning and operating practices. The system modelling and simulation study is carried out on one of the district’s distribution system which consists of 132 kV, 66 kV and 22 kV network in Aliwal North Sector ECOU. The reliability assessment is done on the 22, 66 and 132 kV system to assess the performance of the present system and also predictive reliability analysis for the future system considering load growth and system expansion. The alternative which gives low SAIDI, SAIFI and minimum breakeven costs is being assessed and considered. The reliability of 132 kV system could be further improved by constructing a new 132 kV line from a different source of supply and connecting with line coming from another district (reserve) at reasonable break even cost. The decision base could be further improved by having Aliwal North Sector context interruption cost. However, the historical data which may be used in Aliwal North Sector to acquire interruption costs from the customers are being proposed. The focus should be on improving the power quality on constrained networks first, then the reliability. Therefore for the Aliwal North power system network it is imperative that Eskom invest on the reliability of this network. This dissertation also analysed load reflected economic benefit versus performance expectations that should be optimized through achieving a balance between network performance (SAIDI) improvement, and total life cycle cost (to Eskom as well as the economy). Reliability analysis conducted in this dissertation used Aliwal North power system network as a case study; the results proved that the system is vulnerable to faults, planned and unplanned outages. Reliability evaluation studies were conducted on the system using DigSilent software in conjunction with FME. These two models gave accurate results with acceptable variance in most indices except for the ENS where the variance was quite significant. It can be concluded that DigSilent results are the most accurate results in all three reliability evaluation scenarios for the Aliwal North Power System, best interpretation being that of DigSilent.
- Full Text:
- Date Issued: 2017
Anti-fetishism: parodying the depiction of the female body as fetish
- Authors: Pirie, René Alexis
- Date: 2017
- Subjects: Body image -- Social aspects Fashion -- Social aspects
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/20377 , vital:29272
- Description: sexual objectification of women is widespread in contemporary lifestyle and fashion magazines. Models used for advertising purposes often set a standard of beauty and youth that is unrealistic and limiting. This standard has damaging effects on women’s sense of self and their societal behaviour. Such images not only sexualise as well as fetishise women’s bodies, but also encourage self-surveillance. This research study examines Cindy Sherman, Sarah Lucas, Louise Bourgeois and Ángela Burón’s artistic responses to fetishized images of women, in order to assess what artistic strategies could be used to oppose such images in magazine advertisements. It aims to identify what anti-fetishism involves in theory and practice and to use this information to formulate an anti-fetish strategy which informs a series of anti-fetish artworks. The purpose of this series of works is to oppose the fetishization of women, particularly in magazine advertisements of high-end consumer products. The study contributes to the discourse of anti-fetishism and addresses a knowledge gap since research on anti-fetishism has much room for development. It is a Qualitative research study which adhered to a Practice-based research method. The key findings of this study are that anti-fetishism and female fetishism are approaches that differ from one another yet also overlap. Furthermore, Anti-fetishism involves the use of parodic mockery, while female fetishism is concerned mostly with undecidability as a strategy. From the examination of the artists, the anti-fetishistic strategy of parody, largely influenced the practical component of this research study. Parody offers a clear opposition to the still widespread fetishization of women in magazines both in South Africa and other Westernized countries across the world.
- Full Text:
- Date Issued: 2017
- Authors: Pirie, René Alexis
- Date: 2017
- Subjects: Body image -- Social aspects Fashion -- Social aspects
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/20377 , vital:29272
- Description: sexual objectification of women is widespread in contemporary lifestyle and fashion magazines. Models used for advertising purposes often set a standard of beauty and youth that is unrealistic and limiting. This standard has damaging effects on women’s sense of self and their societal behaviour. Such images not only sexualise as well as fetishise women’s bodies, but also encourage self-surveillance. This research study examines Cindy Sherman, Sarah Lucas, Louise Bourgeois and Ángela Burón’s artistic responses to fetishized images of women, in order to assess what artistic strategies could be used to oppose such images in magazine advertisements. It aims to identify what anti-fetishism involves in theory and practice and to use this information to formulate an anti-fetish strategy which informs a series of anti-fetish artworks. The purpose of this series of works is to oppose the fetishization of women, particularly in magazine advertisements of high-end consumer products. The study contributes to the discourse of anti-fetishism and addresses a knowledge gap since research on anti-fetishism has much room for development. It is a Qualitative research study which adhered to a Practice-based research method. The key findings of this study are that anti-fetishism and female fetishism are approaches that differ from one another yet also overlap. Furthermore, Anti-fetishism involves the use of parodic mockery, while female fetishism is concerned mostly with undecidability as a strategy. From the examination of the artists, the anti-fetishistic strategy of parody, largely influenced the practical component of this research study. Parody offers a clear opposition to the still widespread fetishization of women in magazines both in South Africa and other Westernized countries across the world.
- Full Text:
- Date Issued: 2017
Antimicrobial activity of selected plants and their combined preparations against pathogens causing respiratory infections
- Authors: Onyebuchi, Ukwuoma Collins
- Date: 2017
- Subjects: Anti-infective agents , Respiratory infections -- Alternative treatment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/21197 , vital:29455
- Description: Bacterial infection of the respiratory system is one of the leading causes of death in the world’s population, killing over four million people annually. Treatment of respiratory infections is usually by antibiotics administration. The emergence of multi-drug-resistant pathogens has led to the search for more effective therapeutic agents especially from medicinal plants, as compounds from plants have been shown to possess some therapeutic potential. The aim of this study is to determine the antimicrobial activity of three plants, Tetradenia riparia, Leonotis leonurus and Salvia africana-lutea and the activity of their various combined preparations against 27 pathogens usually associated with respiratory ailments. Various solvents were used for extraction of the dried powdered plant materials. The agar disc diffusion antimicrobial assay and the micro-dilution assay methods were used to determine the inhibitory activity and the minimum inhibitory concentration of the plant extracts. The nature of phytochemicals present in the extracts was determined by thin layer chromatography. The results obtained in this study, showed that ethanol produced the highest average extract yield in both the individual and combined plant preparations. A two-way analysis of variance for the disc diffusion assay showed no significant difference in the inhibition zones (Appendix 1 and 2). MIC of 0.8 mg/ml was obtained with S. africana-lutea against S. pneumoniae ATCC 49619 and B. cereus ATCC 10976 strains, indicating a strong antibacterial activity. Synergistic interaction (FIC index ranging from 0.20 – 0.50) and a strong antimicrobial activity (MIC values ranging from 0.4 – 0.8 mg/ml), was obtained with the acetone extract of the 1:1 combination of L. leonurus with S. africana-lutea. The XEA and CEF solvent systems eluted the most number of compound spots and produced the best separations. The results obtained in this study validate the traditional use of these plants and their combinations for the treatment of respiratory ailments.
- Full Text:
- Date Issued: 2017
- Authors: Onyebuchi, Ukwuoma Collins
- Date: 2017
- Subjects: Anti-infective agents , Respiratory infections -- Alternative treatment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/21197 , vital:29455
- Description: Bacterial infection of the respiratory system is one of the leading causes of death in the world’s population, killing over four million people annually. Treatment of respiratory infections is usually by antibiotics administration. The emergence of multi-drug-resistant pathogens has led to the search for more effective therapeutic agents especially from medicinal plants, as compounds from plants have been shown to possess some therapeutic potential. The aim of this study is to determine the antimicrobial activity of three plants, Tetradenia riparia, Leonotis leonurus and Salvia africana-lutea and the activity of their various combined preparations against 27 pathogens usually associated with respiratory ailments. Various solvents were used for extraction of the dried powdered plant materials. The agar disc diffusion antimicrobial assay and the micro-dilution assay methods were used to determine the inhibitory activity and the minimum inhibitory concentration of the plant extracts. The nature of phytochemicals present in the extracts was determined by thin layer chromatography. The results obtained in this study, showed that ethanol produced the highest average extract yield in both the individual and combined plant preparations. A two-way analysis of variance for the disc diffusion assay showed no significant difference in the inhibition zones (Appendix 1 and 2). MIC of 0.8 mg/ml was obtained with S. africana-lutea against S. pneumoniae ATCC 49619 and B. cereus ATCC 10976 strains, indicating a strong antibacterial activity. Synergistic interaction (FIC index ranging from 0.20 – 0.50) and a strong antimicrobial activity (MIC values ranging from 0.4 – 0.8 mg/ml), was obtained with the acetone extract of the 1:1 combination of L. leonurus with S. africana-lutea. The XEA and CEF solvent systems eluted the most number of compound spots and produced the best separations. The results obtained in this study validate the traditional use of these plants and their combinations for the treatment of respiratory ailments.
- Full Text:
- Date Issued: 2017
Concrete work decision analysis in Bloemfontein
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
Craftsmanship in contemporary art: an exposition of selected artists’ practical non-involvement
- Van der Walt, Jonathan Petra
- Authors: Van der Walt, Jonathan Petra
- Date: 2017
- Subjects: Art, Modern -- 21st century Sculpture -- South Africa -- Technique , Art and technology -- 21st century
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/21285 , vital:29471
- Description: Craftsmanship in contemporary art production is the main area of focus for this visual arts based research. An exploration into the artistic production processes of selected contemporary artists’ work, reveals a tendency of physical non-involvement on the part of the artist, who takes up the role of art director. The research enquiry attempts to provide an answer as to whether credit should be given to the craftsman as well as to the artist in this artist/craftsman relationship. The use of a practice-led research strategy allows the researcher’s art-making practice to become an integral part of the cycles of research, as the development of the researcher’s practical understanding, techniques and execution are crucial in the practical component, but also conceptually as a stance in opposition to the selected artists’ lack of practical involvement. The researcher has identified and analysed the following five factors that have contributed to this current state of art production in contemporary art: Kitsch as an influence on the subject matter and content of art, Marcel Duchamp and his idea of the ‘readymade’ and issues of authorship, Andy Warhol and his ideas on art and business, the Conceptual Art movement and, the act and product of craft being perceived as being inferior to the fine arts In addition, an exploration of the production processes involved in the creation of the artworks of Jeff Koons, Damien Hirst, Maurizio Cattelan and Takashi Murakami highlights the craftspeople, fabricators and foundries that are responsible for these artists’ highly crafted aesthetics. As practice is crucial in developing a new understanding and meaning in visual-arts based research, the practical component describes the researcher’s core practical themes as being the following:the creation of naturalistic figurative small-scale sculptures in resin and bronze, placing the characters explored in the theoretical component as the subject matter.The advantages and disadvantages of the collaborative experience with Sculpture Casting Services (fine art foundry) and eNtsa (a Technology Innovation agency), especially the implementation of 3D technologies in both experiences; and the technical development and understanding in order to improve the researcher’s artistic practice Collaboration is an important underlying theme throughout this research undertaking. It is crucial in the production of most contemporary art, and assists in identifying the artist’s role within the production of his/her work. Finally, it relates to the researcher’s collaborative experience expanded upon in the practical component and its benefits as a production method. In concluding, the researcher finds that craftspeople do receive credit for the work they do in the form of money, business and marketing. They provide a service that a great number of artists generously support. Foundries and fabricators also place a mark on the work they do, much like the artist’s signature, as a symbol of pride and recognition. It is ultimately the artist’s technical abilities, workload and artist identity or brand that will determine the extent to which he or she will contribute to the collaboration, whether that be a simple idea, a sketch, a maquette or a large-scale sculpture ready for installation. However, in a rapidly advancing technological society, it is the idea of the artist as craftsman, both thinker and maker, that demands more respect.
- Full Text:
- Date Issued: 2017
- Authors: Van der Walt, Jonathan Petra
- Date: 2017
- Subjects: Art, Modern -- 21st century Sculpture -- South Africa -- Technique , Art and technology -- 21st century
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/21285 , vital:29471
- Description: Craftsmanship in contemporary art production is the main area of focus for this visual arts based research. An exploration into the artistic production processes of selected contemporary artists’ work, reveals a tendency of physical non-involvement on the part of the artist, who takes up the role of art director. The research enquiry attempts to provide an answer as to whether credit should be given to the craftsman as well as to the artist in this artist/craftsman relationship. The use of a practice-led research strategy allows the researcher’s art-making practice to become an integral part of the cycles of research, as the development of the researcher’s practical understanding, techniques and execution are crucial in the practical component, but also conceptually as a stance in opposition to the selected artists’ lack of practical involvement. The researcher has identified and analysed the following five factors that have contributed to this current state of art production in contemporary art: Kitsch as an influence on the subject matter and content of art, Marcel Duchamp and his idea of the ‘readymade’ and issues of authorship, Andy Warhol and his ideas on art and business, the Conceptual Art movement and, the act and product of craft being perceived as being inferior to the fine arts In addition, an exploration of the production processes involved in the creation of the artworks of Jeff Koons, Damien Hirst, Maurizio Cattelan and Takashi Murakami highlights the craftspeople, fabricators and foundries that are responsible for these artists’ highly crafted aesthetics. As practice is crucial in developing a new understanding and meaning in visual-arts based research, the practical component describes the researcher’s core practical themes as being the following:the creation of naturalistic figurative small-scale sculptures in resin and bronze, placing the characters explored in the theoretical component as the subject matter.The advantages and disadvantages of the collaborative experience with Sculpture Casting Services (fine art foundry) and eNtsa (a Technology Innovation agency), especially the implementation of 3D technologies in both experiences; and the technical development and understanding in order to improve the researcher’s artistic practice Collaboration is an important underlying theme throughout this research undertaking. It is crucial in the production of most contemporary art, and assists in identifying the artist’s role within the production of his/her work. Finally, it relates to the researcher’s collaborative experience expanded upon in the practical component and its benefits as a production method. In concluding, the researcher finds that craftspeople do receive credit for the work they do in the form of money, business and marketing. They provide a service that a great number of artists generously support. Foundries and fabricators also place a mark on the work they do, much like the artist’s signature, as a symbol of pride and recognition. It is ultimately the artist’s technical abilities, workload and artist identity or brand that will determine the extent to which he or she will contribute to the collaboration, whether that be a simple idea, a sketch, a maquette or a large-scale sculpture ready for installation. However, in a rapidly advancing technological society, it is the idea of the artist as craftsman, both thinker and maker, that demands more respect.
- Full Text:
- Date Issued: 2017
Earth stewardship in prepress:a model for Nelson Mandela Metropolitan University graphic design lectures
- Authors: Lottering,John Barry
- Date: 2017
- Subjects: Curriculum planning--South Africa-- Port Elizabeth Graphic arts--Study and teaching--South africa-- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/44471 , vital:37842
- Description: A lack of prepress understanding is responsible for a great deal of wasted resources in the graphic design and printing industries in Nelson Mandela Bay. As the term “prepress” extends to such a vast range of design activities, it is quite difficult to ascertain where prepress begins or ends. Asking the question “What is prepress?” is like asking “How long is a piece of string?” Defining the scope of prepress can present a formidable challenge for any graphic design lecturer hoping to equip students with the necessary prepress understanding and skills required by the graphic design industry. Also, even if the academic has a sound knowledge of prepress theory and practice, how does one guarantee that all of the required knowledge is covered during the course of the student’s graphic design education, and that it is done so in a manner that meets the needs of the graphic design industry? Added to this, educators have a responsibility to consider the environmental consequences of sending graduating designers, without industry required prepress knowledge, into the design industry, an industry that has grown accustomed to training junior designers in prepress practice through trial and error. Such trial and error equates to mistakes and wasted resources, as a result this learning curve comes at the expense of the environment. The intention of this research is to provide an accessible resource for graphic design lecturers, by way of a list of prepress best practice topics, required for inclusion in the graphic design syllabus at NMMU, such that earth stewardship and sustainable design-for-print are an implicit component. This list of topics is a product of research which drew on local industry experts in Nelson Mandela Bay.
- Full Text:
- Date Issued: 2017
- Authors: Lottering,John Barry
- Date: 2017
- Subjects: Curriculum planning--South Africa-- Port Elizabeth Graphic arts--Study and teaching--South africa-- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/44471 , vital:37842
- Description: A lack of prepress understanding is responsible for a great deal of wasted resources in the graphic design and printing industries in Nelson Mandela Bay. As the term “prepress” extends to such a vast range of design activities, it is quite difficult to ascertain where prepress begins or ends. Asking the question “What is prepress?” is like asking “How long is a piece of string?” Defining the scope of prepress can present a formidable challenge for any graphic design lecturer hoping to equip students with the necessary prepress understanding and skills required by the graphic design industry. Also, even if the academic has a sound knowledge of prepress theory and practice, how does one guarantee that all of the required knowledge is covered during the course of the student’s graphic design education, and that it is done so in a manner that meets the needs of the graphic design industry? Added to this, educators have a responsibility to consider the environmental consequences of sending graduating designers, without industry required prepress knowledge, into the design industry, an industry that has grown accustomed to training junior designers in prepress practice through trial and error. Such trial and error equates to mistakes and wasted resources, as a result this learning curve comes at the expense of the environment. The intention of this research is to provide an accessible resource for graphic design lecturers, by way of a list of prepress best practice topics, required for inclusion in the graphic design syllabus at NMMU, such that earth stewardship and sustainable design-for-print are an implicit component. This list of topics is a product of research which drew on local industry experts in Nelson Mandela Bay.
- Full Text:
- Date Issued: 2017
Experiences of analogue-trained radiographers utilising digital imaging in projection radiography
- Authors: Campbell, Sydney
- Date: 2017
- Subjects: Radiography, Medical -- Digital techniques Angiography , Image processing -- Digital techniques Radiography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14796 , vital:27851
- Description: The professional work of a radiographer encompasses both patient care and the use of technology. The technology employed could either be analogue or digital technology. Since 1973, the analogue imaging system has slowly been replaced by digital radiography imaging systems. Despite the many advantages of digital imaging it does present the radiographer with added responsibilities. Furthermore, analogue-trained radiographers have found adjusting to digital imaging especially challenging. The aim of the study was to explore and describe the experiences of analogue-trained radiographers utilising digital imaging in projection radiography with the intention of developing guidelines to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. The researcher used Schlossberg’s Transition Theory as a lens to look at the experiences of analogue-trained radiographers using digital imaging to produce radiographs. The research study used a qualitative design which was explorative, descriptive and contextual in nature. The target population included all diagnostic radiographers (public and private) in the local municipality who were registered with the Health Professions Council of South Africa. Purposive sampling was employed to select the radiographers that represented all radiographers in the Nelson Mandela Bay Health District. The sample included all radiographers who fulfilled the identified selection criteria. The selected participants were recruited to take part in in-depth, semi-structured individual interviews. The data was analysed using a computer-aided qualitative data analysis software package, ATLAS.ti. The trustworthiness of this study was ensured by applying Guba’s model of trustworthiness that includes credibility, transferability, dependability and confirmability. The ethical principles of respect for persons, beneficence and justice, as espoused by the Belmont Report, were adhered to in order to ensure that the study was conducted in an ethical manner. Two themes emanated from the data, namely the evolution of the radiographer when faced with the advances in technology as well the role that the work environment played in the manner that the participants experienced the change. The experiences of the participants were described using direct quotations from the interviews and a literature control was used to verify the participants’ experiences. Evidence was found of radiographer indifference towards exposure selection, dose optimisation and placement of anatomical side markers when utilising digital imaging. Finally, guidelines were developed to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. In addition, the guidelines will assist all other radiographers to better utilise digital imaging.
- Full Text:
- Date Issued: 2017
- Authors: Campbell, Sydney
- Date: 2017
- Subjects: Radiography, Medical -- Digital techniques Angiography , Image processing -- Digital techniques Radiography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14796 , vital:27851
- Description: The professional work of a radiographer encompasses both patient care and the use of technology. The technology employed could either be analogue or digital technology. Since 1973, the analogue imaging system has slowly been replaced by digital radiography imaging systems. Despite the many advantages of digital imaging it does present the radiographer with added responsibilities. Furthermore, analogue-trained radiographers have found adjusting to digital imaging especially challenging. The aim of the study was to explore and describe the experiences of analogue-trained radiographers utilising digital imaging in projection radiography with the intention of developing guidelines to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. The researcher used Schlossberg’s Transition Theory as a lens to look at the experiences of analogue-trained radiographers using digital imaging to produce radiographs. The research study used a qualitative design which was explorative, descriptive and contextual in nature. The target population included all diagnostic radiographers (public and private) in the local municipality who were registered with the Health Professions Council of South Africa. Purposive sampling was employed to select the radiographers that represented all radiographers in the Nelson Mandela Bay Health District. The sample included all radiographers who fulfilled the identified selection criteria. The selected participants were recruited to take part in in-depth, semi-structured individual interviews. The data was analysed using a computer-aided qualitative data analysis software package, ATLAS.ti. The trustworthiness of this study was ensured by applying Guba’s model of trustworthiness that includes credibility, transferability, dependability and confirmability. The ethical principles of respect for persons, beneficence and justice, as espoused by the Belmont Report, were adhered to in order to ensure that the study was conducted in an ethical manner. Two themes emanated from the data, namely the evolution of the radiographer when faced with the advances in technology as well the role that the work environment played in the manner that the participants experienced the change. The experiences of the participants were described using direct quotations from the interviews and a literature control was used to verify the participants’ experiences. Evidence was found of radiographer indifference towards exposure selection, dose optimisation and placement of anatomical side markers when utilising digital imaging. Finally, guidelines were developed to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. In addition, the guidelines will assist all other radiographers to better utilise digital imaging.
- Full Text:
- Date Issued: 2017
Farmers’ perception on factors influencing small-scale vegetable production at Tsengiwe village, South Africa
- Authors: Gqibityala, Akhona
- Date: 2017
- Subjects: Farmers -- South Africa -- Eastern Cape Farms, Small -- South Africa -- Eastern Cape , Vegetable gardening -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15281 , vital:28210
- Description: Food security and self-sufficiency in the rural areas has been and remains a major concern for the South African government. The study aimed to investigate farmer’s perception of factors influencing small-scale vegetable production in Tsengiwe village in the Eastern Cape. The research focus was on the following aspects that may have an influence on small-scale vegetable production: socio-economic factors, production and resource deficiencies and the impact of indigenous leafy vegetables. The researcher conducted several demonstration workshops during the field work. The pilot studies and community engagements were essential to extract knowledge systems embedded in the cultural traditions of indigenous or local communities. The action research was part of the reflective process of broadminded problem solving led by researcher and community. The research approach used a triangulation research method to extract information, whereby both quantitative and qualitative research was used to ensure greater accuracy. The main data collection was obtained from interviews with small-scale farming households in the Tsengiwe area. The study revealed that households were dependent on elderly female pensioners to source food and water. These women received most of their income from social grants and were mainly responsible for all farming activities in the households. Most households attempted to produce vegetables, although food security and self-sufficiency through own production was rarely achieved.Other perceived farming challenges included: lack of market accessibility, irrigation infrastructure, drought, financial limitations and soil degradation. Indigenous leafy vegetables were found to play a nutritional role in times of food shortage and not as much for their medicinal value. The study recommended the following interventions: Support for the elderly women in development and production practices, interventions to address factors affecting vegetable production, improving soil structure, working towards food self-sufficiency, moving away from dependence on mechanisation in rural farming.
- Full Text:
- Date Issued: 2017
- Authors: Gqibityala, Akhona
- Date: 2017
- Subjects: Farmers -- South Africa -- Eastern Cape Farms, Small -- South Africa -- Eastern Cape , Vegetable gardening -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15281 , vital:28210
- Description: Food security and self-sufficiency in the rural areas has been and remains a major concern for the South African government. The study aimed to investigate farmer’s perception of factors influencing small-scale vegetable production in Tsengiwe village in the Eastern Cape. The research focus was on the following aspects that may have an influence on small-scale vegetable production: socio-economic factors, production and resource deficiencies and the impact of indigenous leafy vegetables. The researcher conducted several demonstration workshops during the field work. The pilot studies and community engagements were essential to extract knowledge systems embedded in the cultural traditions of indigenous or local communities. The action research was part of the reflective process of broadminded problem solving led by researcher and community. The research approach used a triangulation research method to extract information, whereby both quantitative and qualitative research was used to ensure greater accuracy. The main data collection was obtained from interviews with small-scale farming households in the Tsengiwe area. The study revealed that households were dependent on elderly female pensioners to source food and water. These women received most of their income from social grants and were mainly responsible for all farming activities in the households. Most households attempted to produce vegetables, although food security and self-sufficiency through own production was rarely achieved.Other perceived farming challenges included: lack of market accessibility, irrigation infrastructure, drought, financial limitations and soil degradation. Indigenous leafy vegetables were found to play a nutritional role in times of food shortage and not as much for their medicinal value. The study recommended the following interventions: Support for the elderly women in development and production practices, interventions to address factors affecting vegetable production, improving soil structure, working towards food self-sufficiency, moving away from dependence on mechanisation in rural farming.
- Full Text:
- Date Issued: 2017
Governing information security within the context of "bring your own device" in small, medium and micro enterprises
- Authors: Fani, Noluvuyo
- Date: 2017
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7626 , vital:22114
- Description: Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof.
- Full Text:
- Date Issued: 2017
- Authors: Fani, Noluvuyo
- Date: 2017
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7626 , vital:22114
- Description: Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof.
- Full Text:
- Date Issued: 2017
Guidelines for secure cloud-based personal health records
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
ICT readiness for business continuity in local government
- Authors: Koen, Ruan
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy , Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7025 , vital:21192
- Description: Information and Communication Technology (ICT) has evolved into a pervasive commodity in modern enterprises. ICT enables enterprises, regardless of sector, to achieve their strategic objectives. Similarly, ICT is regarded as a critical enabler in South African municipalities to reach their objectives and ultimately deliver sustainable services to their communities. This dependence on ICT, therefore, necessitates a resilient ICT environment where minimal disruption to ICT is a primary goal. Unfortunately, as reported by the Auditor-General of South Africa, the majority of South African municipalities are neglecting to address the continuity of their ICT services. Failing to implement adequate ICT continuity controls restrict these municipalities from achieving their strategic goals and, as a result, fulfilling their constitutional mandate of service delivery. It is, therefore, the objective of this study to devise a method, consisting of a theoretical foundation and a supporting tool-set, to assist municipalities in addressing a real-world ICT continuity problem. This method aims to be scalable and usable within different municipalities, and be simplistic and comprehensible enough to implement. The theoretical foundation will introduce the concept of ICT Readiness for Business Continuity, based on the recommendations of international best practices and standards, for example, the ISO 27031 (2011) standard. Furthermore, by considering various challenges within local government, the tool-set will ultimately help municipalities to help themselves in this regard.
- Full Text:
- Date Issued: 2017
- Authors: Koen, Ruan
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy , Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7025 , vital:21192
- Description: Information and Communication Technology (ICT) has evolved into a pervasive commodity in modern enterprises. ICT enables enterprises, regardless of sector, to achieve their strategic objectives. Similarly, ICT is regarded as a critical enabler in South African municipalities to reach their objectives and ultimately deliver sustainable services to their communities. This dependence on ICT, therefore, necessitates a resilient ICT environment where minimal disruption to ICT is a primary goal. Unfortunately, as reported by the Auditor-General of South Africa, the majority of South African municipalities are neglecting to address the continuity of their ICT services. Failing to implement adequate ICT continuity controls restrict these municipalities from achieving their strategic goals and, as a result, fulfilling their constitutional mandate of service delivery. It is, therefore, the objective of this study to devise a method, consisting of a theoretical foundation and a supporting tool-set, to assist municipalities in addressing a real-world ICT continuity problem. This method aims to be scalable and usable within different municipalities, and be simplistic and comprehensible enough to implement. The theoretical foundation will introduce the concept of ICT Readiness for Business Continuity, based on the recommendations of international best practices and standards, for example, the ISO 27031 (2011) standard. Furthermore, by considering various challenges within local government, the tool-set will ultimately help municipalities to help themselves in this regard.
- Full Text:
- Date Issued: 2017
Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control
- Zata, Ngonidzashe Munyaradzi, Fernandes, John Manuel
- Authors: Zata, Ngonidzashe Munyaradzi , Fernandes, John Manuel
- Date: 2017
- Subjects: Mechatronics -- Students Engineering students User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13349 , vital:27177
- Description: Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control.
- Full Text:
- Date Issued: 2017
- Authors: Zata, Ngonidzashe Munyaradzi , Fernandes, John Manuel
- Date: 2017
- Subjects: Mechatronics -- Students Engineering students User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13349 , vital:27177
- Description: Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control.
- Full Text:
- Date Issued: 2017