A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
A model for cultivating resistance to social engineering attacks
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
A review of the performance of Botswana citizen building contractors
- Authors: Muche, Freeman Hansungule
- Date: 2011
- Subjects: Contractors , Building -- Botswana , Construction industry -- Botswana
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9685 , http://hdl.handle.net/10948/1336 , Contractors , Building -- Botswana , Construction industry -- Botswana
- Description: Botswana was left underdeveloped in 1966 when it gained its independence from Great Britain. However, with the discovery of diamonds in the late 1970s, the economy of the country changed and two decades later the construction industry had experienced phenomenal growth. A growth propelled by the dominance of foreign contractors and the few citizen contractors available at the time resulted in a competitive environment in the industry. However, citizen contractors were unable to compete on the same level with their foreign counterparts, which was attributable to various factors such as a lack of resources and of business and technical experience. Being a major player in the construction industry, and realising the need to equip and encourage its own base of citizen contractors to actively participate in construction activities, the government of Botswana adopted new measures and policies that were meant to address the imbalances in the construction industry much to the advantage of citizen contractors. The rationale behind this study is to investigate the performance of citizen building contractors following the introduction of preferential procurement policies by the government of Botswana. This research study adopted the descriptive and analytical survey method which entailed the use of questionnaires and a review of the related literature for gathering relevant data. The sample strata included building contractors, consultants, and clients in the Botswana construction industry in Gaborone, Francistown, Selebi-phikwe, Maun, Serowe, and Lobatse. The empirical findings revealed that there is indeed a need to review some of the government assistance programs for citizen contractors in order to avoid the abuse of government resources and to further increase the citizen contractor’s knowledge base, skills, resources and capacity through mentorship and workshops. vi It is therefore incumbent upon government to protect those beneficiaries who genuinely require such assistance by critical assessment of the ineffective policies for the benefit of the whole industry
- Full Text:
- Date Issued: 2011
- Authors: Muche, Freeman Hansungule
- Date: 2011
- Subjects: Contractors , Building -- Botswana , Construction industry -- Botswana
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9685 , http://hdl.handle.net/10948/1336 , Contractors , Building -- Botswana , Construction industry -- Botswana
- Description: Botswana was left underdeveloped in 1966 when it gained its independence from Great Britain. However, with the discovery of diamonds in the late 1970s, the economy of the country changed and two decades later the construction industry had experienced phenomenal growth. A growth propelled by the dominance of foreign contractors and the few citizen contractors available at the time resulted in a competitive environment in the industry. However, citizen contractors were unable to compete on the same level with their foreign counterparts, which was attributable to various factors such as a lack of resources and of business and technical experience. Being a major player in the construction industry, and realising the need to equip and encourage its own base of citizen contractors to actively participate in construction activities, the government of Botswana adopted new measures and policies that were meant to address the imbalances in the construction industry much to the advantage of citizen contractors. The rationale behind this study is to investigate the performance of citizen building contractors following the introduction of preferential procurement policies by the government of Botswana. This research study adopted the descriptive and analytical survey method which entailed the use of questionnaires and a review of the related literature for gathering relevant data. The sample strata included building contractors, consultants, and clients in the Botswana construction industry in Gaborone, Francistown, Selebi-phikwe, Maun, Serowe, and Lobatse. The empirical findings revealed that there is indeed a need to review some of the government assistance programs for citizen contractors in order to avoid the abuse of government resources and to further increase the citizen contractor’s knowledge base, skills, resources and capacity through mentorship and workshops. vi It is therefore incumbent upon government to protect those beneficiaries who genuinely require such assistance by critical assessment of the ineffective policies for the benefit of the whole industry
- Full Text:
- Date Issued: 2011
An analysis of the reliability of the 22kV distribution network of the Nelson Mandela Bay Municipality
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
Applicability of public-private partnership in provision of water infrastructure to central coastal Namibia mines
- Kavela, Lukas Tangeni Taukondjo
- Authors: Kavela, Lukas Tangeni Taukondjo
- Date: 2011
- Subjects: Water-supply -- Namibia , Public-private sector cooperation -- Namibia -- Water-supply
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9701 , http://hdl.handle.net/10948/d1015641
- Description: This study investigated the potential application of Public-Private Partnerships (PPPs) in water supply, taking cognisance of the water demand and supply in the Central Coastal Namibian (CCN) mines. NamWater does not meet demand for the existing and planned mines in the CCN. Primary objective was to investigate and analyse water demand and supply as well as the effectiveness of PPP as a solution by exploring its potential, successes and challenges. In order to obtain relevant information, literature review was used to collect evidence on water demand and supply in the north-central Namibia as well as the application of PPP in provision of water supply. Multi-case studies were carried out on three operational mines, namely; Rio Tinto Rössing Uranium Mine, Langer Heinrich Uranium Mine and Areva Trekkopje Uranium Mine to attain empirical data on water supply requirements. A self-administered questionnaire was used to collect the data supplemented by interviews with NamWater, operational mines within the study area, government institutions, and knowledgeable consultants on water and the mining environment. The key findings included: institutional weaknesses and lack of legislation frameworks to support PPP projects; skills shortage; and financing problems were identified as major challenges. Results further show that these problems could be resolved by effectively implementing a PPP approach, whereby the Special Purpose Vehicle (SPV) enters into a contract with the public authority. The study concludes that there is a need to increase water output to meet current and future supply requirements to these mines. This situation should be addressed by all stakeholders, from government to private sectors. The study recommends that a sea water desalination plant should be developed to increase water capacity supply to the existing operational and prospective mines in the area. The PPP approach is proposed as a possible solution to water supply infrastructure service delivery problem to ensure long-term water security in the CCN mines.
- Full Text:
- Date Issued: 2011
- Authors: Kavela, Lukas Tangeni Taukondjo
- Date: 2011
- Subjects: Water-supply -- Namibia , Public-private sector cooperation -- Namibia -- Water-supply
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9701 , http://hdl.handle.net/10948/d1015641
- Description: This study investigated the potential application of Public-Private Partnerships (PPPs) in water supply, taking cognisance of the water demand and supply in the Central Coastal Namibian (CCN) mines. NamWater does not meet demand for the existing and planned mines in the CCN. Primary objective was to investigate and analyse water demand and supply as well as the effectiveness of PPP as a solution by exploring its potential, successes and challenges. In order to obtain relevant information, literature review was used to collect evidence on water demand and supply in the north-central Namibia as well as the application of PPP in provision of water supply. Multi-case studies were carried out on three operational mines, namely; Rio Tinto Rössing Uranium Mine, Langer Heinrich Uranium Mine and Areva Trekkopje Uranium Mine to attain empirical data on water supply requirements. A self-administered questionnaire was used to collect the data supplemented by interviews with NamWater, operational mines within the study area, government institutions, and knowledgeable consultants on water and the mining environment. The key findings included: institutional weaknesses and lack of legislation frameworks to support PPP projects; skills shortage; and financing problems were identified as major challenges. Results further show that these problems could be resolved by effectively implementing a PPP approach, whereby the Special Purpose Vehicle (SPV) enters into a contract with the public authority. The study concludes that there is a need to increase water output to meet current and future supply requirements to these mines. This situation should be addressed by all stakeholders, from government to private sectors. The study recommends that a sea water desalination plant should be developed to increase water capacity supply to the existing operational and prospective mines in the area. The PPP approach is proposed as a possible solution to water supply infrastructure service delivery problem to ensure long-term water security in the CCN mines.
- Full Text:
- Date Issued: 2011
Constructability effects of green buildings
- Authors: Hurbissoon, Roneesh Mehta
- Date: 2011
- Subjects: Sustainable construction , Architecture and energy conservation , Construction industry
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9722 , http://hdl.handle.net/10948/1379 , Sustainable construction , Architecture and energy conservation , Construction industry
- Description: The Earth's health is deteriorating and will deteriorate even more rapidly unless people adopt eco-friendly policies. Green building has long been a concept but it has not yet been universally applied in practice. The concept of sustainability emerged in the 1970s and can be associated with the energy crisis and environmental pollution concerns. This research is aimed at investigating whether building “green” is more demanding than non-green buildings in terms of cost and the use of green materials against traditional materials; whether professionals in the construction industry are knowledgeable in terms of green buildings; and lastly, to determine whether green buildings are contributing significantly to the environment. The literature reviewed and results of quantitative research amongst professionals from the Island of Mauritius formed the basis of the study. The study revealed that green building is expensive relative to traditional buildings considering. However, the concepts employed (for example: lower energy use, less waste disposal, lower water usage, and sustainable design) provide green buildings with long term savings. Furthermore, the scarcity of natural materials makes it expensive. The study also showed that contractors and professionals have a preference for traditional materials over green materials thus making them more familiar with traditional materials. Contractors and professionals are believed to understand green materials only on a limited basis. This may be attributed to the specific environmental issues involved; however, the research revealed that the professionals are familiar with the basic concepts of green buildings. Lastly, the research showed that green building is still at its infancy but the benefits of green buildings are understood; resulting in green buildings having a good growth potential. The study should be valuable to construction industry professional and clients.
- Full Text:
- Date Issued: 2011
- Authors: Hurbissoon, Roneesh Mehta
- Date: 2011
- Subjects: Sustainable construction , Architecture and energy conservation , Construction industry
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9722 , http://hdl.handle.net/10948/1379 , Sustainable construction , Architecture and energy conservation , Construction industry
- Description: The Earth's health is deteriorating and will deteriorate even more rapidly unless people adopt eco-friendly policies. Green building has long been a concept but it has not yet been universally applied in practice. The concept of sustainability emerged in the 1970s and can be associated with the energy crisis and environmental pollution concerns. This research is aimed at investigating whether building “green” is more demanding than non-green buildings in terms of cost and the use of green materials against traditional materials; whether professionals in the construction industry are knowledgeable in terms of green buildings; and lastly, to determine whether green buildings are contributing significantly to the environment. The literature reviewed and results of quantitative research amongst professionals from the Island of Mauritius formed the basis of the study. The study revealed that green building is expensive relative to traditional buildings considering. However, the concepts employed (for example: lower energy use, less waste disposal, lower water usage, and sustainable design) provide green buildings with long term savings. Furthermore, the scarcity of natural materials makes it expensive. The study also showed that contractors and professionals have a preference for traditional materials over green materials thus making them more familiar with traditional materials. Contractors and professionals are believed to understand green materials only on a limited basis. This may be attributed to the specific environmental issues involved; however, the research revealed that the professionals are familiar with the basic concepts of green buildings. Lastly, the research showed that green building is still at its infancy but the benefits of green buildings are understood; resulting in green buildings having a good growth potential. The study should be valuable to construction industry professional and clients.
- Full Text:
- Date Issued: 2011
Distributing intelligence in the wireless control of a mobile robot using a personal digital assistant
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
Educating users about information security by means of game play
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
From desktop to mobile : a framework for function and content transformation
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
Guidelines for the successful integration of ICT in schools in Cameroon
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
Maintenance of university facilities in developing countries
- Authors: Bowazi, Kenneth Mtunduwatha
- Date: 2011
- Subjects: College facilities -- Developing countries , Educational planning -- Developing countries
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9723 , http://hdl.handle.net/10948/d1008472 , College facilities -- Developing countries , Educational planning -- Developing countries
- Description: Universities in developing countries are deteriorating physically due to lack of planned maintenance, lack of maintenance policies in the institutions, lack of up-to-date security system, and also lack of qualified personnel at decision-making level. Lack of planning leads to reactive maintenance. It also leads to unbudgeted expenditure and has an impact on the amount of money allocated to maintenance which results in unavailability of funds to carry out maintenance duties. Institutions which have no maintenance policy lack guidelines to follow when a maintenance problem arises. Most personnel in charge of maintenance are junior management or at supervisory level as a result they are not part of middle management that strategically directs the organisation. Most of the decisions made at supervisory scale are easily overruled at management level where the maintenance manager is not present during meetings to motivate maintenance cases. Lack of efficient security also allows vandalism to rise which contributes to the deterioration of facilities. Universities lack creativity and cost management skills to raise its own funds to supplement the maintenance budget, which is largely funded by the government. This study recommends employment of built environment professionals in decision-making positions. It also recommends that organizations should have a maintenance policy in place. Investment should be made in good security systems and management of the facilities should include income generating activities that could subsidise the maintenance budget.
- Full Text:
- Date Issued: 2011
- Authors: Bowazi, Kenneth Mtunduwatha
- Date: 2011
- Subjects: College facilities -- Developing countries , Educational planning -- Developing countries
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9723 , http://hdl.handle.net/10948/d1008472 , College facilities -- Developing countries , Educational planning -- Developing countries
- Description: Universities in developing countries are deteriorating physically due to lack of planned maintenance, lack of maintenance policies in the institutions, lack of up-to-date security system, and also lack of qualified personnel at decision-making level. Lack of planning leads to reactive maintenance. It also leads to unbudgeted expenditure and has an impact on the amount of money allocated to maintenance which results in unavailability of funds to carry out maintenance duties. Institutions which have no maintenance policy lack guidelines to follow when a maintenance problem arises. Most personnel in charge of maintenance are junior management or at supervisory level as a result they are not part of middle management that strategically directs the organisation. Most of the decisions made at supervisory scale are easily overruled at management level where the maintenance manager is not present during meetings to motivate maintenance cases. Lack of efficient security also allows vandalism to rise which contributes to the deterioration of facilities. Universities lack creativity and cost management skills to raise its own funds to supplement the maintenance budget, which is largely funded by the government. This study recommends employment of built environment professionals in decision-making positions. It also recommends that organizations should have a maintenance policy in place. Investment should be made in good security systems and management of the facilities should include income generating activities that could subsidise the maintenance budget.
- Full Text:
- Date Issued: 2011
Preconditioning measurement and control system for a combustion engine in a vehicle
- Authors: Homann, Gregor
- Date: 2011
- Subjects: Internal combustion engines , Mechanical engineering
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9649 , http://hdl.handle.net/10948/d1010998 , Internal combustion engines , Mechanical engineering
- Description: Modern vehicles have to ful ll new CO2 emission and additionally customer comfort requirements to stay competitive. A major impact to the fuel consumption of an internal combustion engine (ICE) has the starting period. An ICE equipped with a preconditioning system which heats up the ICE much faster than a common ICE. This procedure of preconditioning is called peak heating. The main benet of preconditioning of an ICE is less fuel consumption. Recently the only way to obtain a fast heating up of an ICE is the injection of a higher amount of fuel during the starting period. This heat up procedure can be changed if a heat reservoir is available to the ICE during the starting period. In this case the additional injection of fuel is redundant and therefore the consumption during the starting period can be reduced. The major advantages of this strategy are achieved in cold ambient conditions. During this project di erent preconditioning strategies and di erent points of interaction in the coolant circuit of an ICE have been investigated. The preconditioning concepts have been evaluated according to their heating up performance and their implementation into the engine compartment. The results obtained by this project highlight that a system layout which enables a preheating of the cylinder block by a heat reservoir located in a bypass-line to the heater core is the most e ective point of interaction. The best results have been achieved with a coolant ow of 10 l/min at a temperature of 90 C. Furthermore, this project points out that the implementation of a preconditioning system into the oil cooler will achieve similar results. This strategy of preconditioning the engine oil reduces the internal frictions of the ICE which leads to a decreasing consumption. This solution is much more energy e cient and technically easier to implement into a modern vehicle with its limited space. An additional side e ect of the preconditioning of the oil is a longer service life of the ICE.
- Full Text:
- Date Issued: 2011
- Authors: Homann, Gregor
- Date: 2011
- Subjects: Internal combustion engines , Mechanical engineering
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9649 , http://hdl.handle.net/10948/d1010998 , Internal combustion engines , Mechanical engineering
- Description: Modern vehicles have to ful ll new CO2 emission and additionally customer comfort requirements to stay competitive. A major impact to the fuel consumption of an internal combustion engine (ICE) has the starting period. An ICE equipped with a preconditioning system which heats up the ICE much faster than a common ICE. This procedure of preconditioning is called peak heating. The main benet of preconditioning of an ICE is less fuel consumption. Recently the only way to obtain a fast heating up of an ICE is the injection of a higher amount of fuel during the starting period. This heat up procedure can be changed if a heat reservoir is available to the ICE during the starting period. In this case the additional injection of fuel is redundant and therefore the consumption during the starting period can be reduced. The major advantages of this strategy are achieved in cold ambient conditions. During this project di erent preconditioning strategies and di erent points of interaction in the coolant circuit of an ICE have been investigated. The preconditioning concepts have been evaluated according to their heating up performance and their implementation into the engine compartment. The results obtained by this project highlight that a system layout which enables a preheating of the cylinder block by a heat reservoir located in a bypass-line to the heater core is the most e ective point of interaction. The best results have been achieved with a coolant ow of 10 l/min at a temperature of 90 C. Furthermore, this project points out that the implementation of a preconditioning system into the oil cooler will achieve similar results. This strategy of preconditioning the engine oil reduces the internal frictions of the ICE which leads to a decreasing consumption. This solution is much more energy e cient and technically easier to implement into a modern vehicle with its limited space. An additional side e ect of the preconditioning of the oil is a longer service life of the ICE.
- Full Text:
- Date Issued: 2011
Slow delivery of low-income housing at munipal level with special reference to the Nelson Mandela Bay Munipality
- Authors: Scheepers, Mario Jacques
- Date: 2011
- Subjects: SLow-income housing -- South Africa -- Port Elizabeth , Municipal services -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9671 , http://hdl.handle.net/10948/d1015968
- Description: The provision of adequate housing is an important part of government's commitment towards providing a better quality of life to the people of South Africa. Housing delivery is, however, not taking place to the extent and speed that will eliminate the backlog in housing delivery. The researcher aims to (i) evaluate and investigate the reasons why housing delivery at municipal level is slow, (ii) discuss the effect of inefficient implementation on delivery, (iii) examine the influence of the lack of infrastructure and the lack of skilled municipal officials and employees of construction organisations and the processes followed to make a success of housing delivery. Chapter 2, Section 26(1), Act 108 0f 1996 of the Constitution of South Africa states that everyone has the right to have access to adequate housing. This places an obligation on government to provide adequate housing to all citizens, within the restriction of available resources. The lack of land hampers the speed at which municipalities can deliver low-income housing. Housing and basic infrastructure (water, sewer and roads) form an integral part of the governments commitment to reduce poverty and improve the quality of life of South Africans. The fact that municipalities do not have capacity to address housing delivery and the fact that most artisans are near retirement age also influence the rate that houses can be delivered. Adequate housing processes are needed for housing delivery to take place, without it government will not succeed in delivering adequate housing. The results of the survey and the literature review confirm that housing delivery at municipality level is slow, that municipal officials need training and more employees to insure that housing delivery improves. The results also show the importance of infrastructure and land, the importance of implementing housing policies and processes adequately.
- Full Text:
- Date Issued: 2011
- Authors: Scheepers, Mario Jacques
- Date: 2011
- Subjects: SLow-income housing -- South Africa -- Port Elizabeth , Municipal services -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9671 , http://hdl.handle.net/10948/d1015968
- Description: The provision of adequate housing is an important part of government's commitment towards providing a better quality of life to the people of South Africa. Housing delivery is, however, not taking place to the extent and speed that will eliminate the backlog in housing delivery. The researcher aims to (i) evaluate and investigate the reasons why housing delivery at municipal level is slow, (ii) discuss the effect of inefficient implementation on delivery, (iii) examine the influence of the lack of infrastructure and the lack of skilled municipal officials and employees of construction organisations and the processes followed to make a success of housing delivery. Chapter 2, Section 26(1), Act 108 0f 1996 of the Constitution of South Africa states that everyone has the right to have access to adequate housing. This places an obligation on government to provide adequate housing to all citizens, within the restriction of available resources. The lack of land hampers the speed at which municipalities can deliver low-income housing. Housing and basic infrastructure (water, sewer and roads) form an integral part of the governments commitment to reduce poverty and improve the quality of life of South Africans. The fact that municipalities do not have capacity to address housing delivery and the fact that most artisans are near retirement age also influence the rate that houses can be delivered. Adequate housing processes are needed for housing delivery to take place, without it government will not succeed in delivering adequate housing. The results of the survey and the literature review confirm that housing delivery at municipality level is slow, that municipal officials need training and more employees to insure that housing delivery improves. The results also show the importance of infrastructure and land, the importance of implementing housing policies and processes adequately.
- Full Text:
- Date Issued: 2011
The simulation of vehicle engine cooling in a climatic chamber
- Authors: Badenhorst, Kenneth Merwin
- Date: 2011
- Subjects: Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9615 , http://hdl.handle.net/10948/1454 , Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Description: The simulation of vehicle engine cooling validation in a Climatic chamber will benefit all vehicle manufacturers that are responsible for the design or the localization of parts used in a vehicle's engine cooling system. The ability to test the vehicle in-house allows testing at any time of the year; it provides repeatable and comparative data, and accelerates component level approval, which in itself reduces program timing and cost. For this dissertation road level testing was conducted in Upington using a TD1200 Superflow towing dynamometer, while the in-house testing was performed on a ROTOTEST chassis dynamometer in a Climatic chamber. All tests were conducted according to GENERAL MOTORS SOUTH AFRICA global testing standards. Statistical analyses of the test data were used to determine the relationship between parameters measured and results obtained. The major contributors to the simulation process was identified and implemented to improve measurement quality and test results. The result was an accurate simulation between road and chamber testing, hence the possibility of moving away from road testing and conduct simulated chamber testing. The presented dissertation is useful for the understanding of basic vehicle cooling testing and the methodology of simulated testing in an environmentally controlled chamber.
- Full Text:
- Date Issued: 2011
- Authors: Badenhorst, Kenneth Merwin
- Date: 2011
- Subjects: Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9615 , http://hdl.handle.net/10948/1454 , Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Description: The simulation of vehicle engine cooling validation in a Climatic chamber will benefit all vehicle manufacturers that are responsible for the design or the localization of parts used in a vehicle's engine cooling system. The ability to test the vehicle in-house allows testing at any time of the year; it provides repeatable and comparative data, and accelerates component level approval, which in itself reduces program timing and cost. For this dissertation road level testing was conducted in Upington using a TD1200 Superflow towing dynamometer, while the in-house testing was performed on a ROTOTEST chassis dynamometer in a Climatic chamber. All tests were conducted according to GENERAL MOTORS SOUTH AFRICA global testing standards. Statistical analyses of the test data were used to determine the relationship between parameters measured and results obtained. The major contributors to the simulation process was identified and implemented to improve measurement quality and test results. The result was an accurate simulation between road and chamber testing, hence the possibility of moving away from road testing and conduct simulated chamber testing. The presented dissertation is useful for the understanding of basic vehicle cooling testing and the methodology of simulated testing in an environmentally controlled chamber.
- Full Text:
- Date Issued: 2011
The value added by facilities management services to an organisation's core business
- Authors: Relu, Lona
- Date: 2011
- Subjects: Facility management , Production management , Operations management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9724 , http://hdl.handle.net/10948/d1012047 , Facility management , Production management , Operations management
- Description: The main objective of the study was to define FM in its broader context and identify ways of exposing its value to the organisation’s core business. The study firstly included defining FM, its scope and nature to provide an in-depth overview and understanding of the discipline. Secondly, the study discussed in detail the level of support of FM by top or senior management. Thirdly, the study discussed the importance of quality management in enhancing the value of FM within an organisation. Lastly, the study discussed how service level agreements can be utilised to enhance the value of FM within the organisation. Questionnaires were distributed via electronic mail and some hand-delivered to private, public organisations and government parastatals to gather their views on how they think FM can add value to their organisations. Questionnaires were sent out to various professionals from various organisations that employ FM services based on the aforementioned objectives. The findings from the survey showed that most organisations understand and have the knowledge about FM but there is no set and defined scope; the scope of FM differs in various organisations; soft services are grouped together and branded as FM services; FM is moderately incorporated throughout and top management still sees FM as adding no value to the organisation’s core business. The results also show that FM needs to adopt strategies such as understanding and working towards the organisation’s goals and objectives; ensuring sustainability in FM services; providing superior quality service and projecting defined and improved levels of service linking service to the organisation’s culture and facilitating organisational change for it to gain support from top management. The majority of respondents incorporating FM in their organisations agree with the benefits afforded by this discipline and have developed and implemented quality management systems that are linked to their business strategies and, by doing so, have enhanced their organisation’s performance levels. Service Level agreements are not being utilised by the majority of the organisations the few organisations that utilise SLA’s, have benefited a great deal from SLAs.
- Full Text:
- Date Issued: 2011
- Authors: Relu, Lona
- Date: 2011
- Subjects: Facility management , Production management , Operations management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9724 , http://hdl.handle.net/10948/d1012047 , Facility management , Production management , Operations management
- Description: The main objective of the study was to define FM in its broader context and identify ways of exposing its value to the organisation’s core business. The study firstly included defining FM, its scope and nature to provide an in-depth overview and understanding of the discipline. Secondly, the study discussed in detail the level of support of FM by top or senior management. Thirdly, the study discussed the importance of quality management in enhancing the value of FM within an organisation. Lastly, the study discussed how service level agreements can be utilised to enhance the value of FM within the organisation. Questionnaires were distributed via electronic mail and some hand-delivered to private, public organisations and government parastatals to gather their views on how they think FM can add value to their organisations. Questionnaires were sent out to various professionals from various organisations that employ FM services based on the aforementioned objectives. The findings from the survey showed that most organisations understand and have the knowledge about FM but there is no set and defined scope; the scope of FM differs in various organisations; soft services are grouped together and branded as FM services; FM is moderately incorporated throughout and top management still sees FM as adding no value to the organisation’s core business. The results also show that FM needs to adopt strategies such as understanding and working towards the organisation’s goals and objectives; ensuring sustainability in FM services; providing superior quality service and projecting defined and improved levels of service linking service to the organisation’s culture and facilitating organisational change for it to gain support from top management. The majority of respondents incorporating FM in their organisations agree with the benefits afforded by this discipline and have developed and implemented quality management systems that are linked to their business strategies and, by doing so, have enhanced their organisation’s performance levels. Service Level agreements are not being utilised by the majority of the organisations the few organisations that utilise SLA’s, have benefited a great deal from SLAs.
- Full Text:
- Date Issued: 2011
User-interface evaluation metrics for a typical M-Learning application
- Authors: Kantore, Adelin
- Date: 2011
- Subjects: User interfaces (Computer systems) , Mobile communication systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9749 , http://hdl.handle.net/10948/1452 , User interfaces (Computer systems) , Mobile communication systems
- Description: Usability is seen as an important aspect for the quality of an M-learning application. Yet very little research has been conducted in this area – particularly in South Africa. Even though the trials of M-learning projects have been witnessed in the country during the last five years, very little is known about the systems that were implemented as regards their usability. Additionally, metrics and measures used in evaluating usability have not been reported. A need exists for relevant metrics to M-learning usability. The primary objective of this work was to propose metrics and measures – for the purpose of evaluating the User-Interfacedesign usability of M-learning application. The research included a literature review of M-learning, as well as the development of metrics and measures based on the Goal Question Metric (GQM) Model. This model has helped provide a reference model and measurements for evaluating the User-InterfaceUsability. A case study was used as a research strategy. An application called Kontax was selected for evaluation by users and expert reviewers. Data-collection methods consisted of User Testing and Heuristics evaluations. Data-gathering instruments included the use of surveys and user- satisfaction questionnaires based on the proposed metrics, task scenarios and expert-reviewed questionnaires based on the proposed metrics; all these instruments were developed. It was found that, although the users thought the system was very interesting, and they wished to hear more about it in the future, the system nevertheless had usability flaws which made it difficult to use. All the users failed to register so that they could use the system; additionally, the system-error messages did not help the users recognize, and recover from an error – leaving the user to simply log out. Help was not adequate, thus making it difficult for first-time users to know what to do when they needed support. The system was also said to have a lot of information presented on its home page, which caused the user to be disoriented. The Kontax application has usability flaws which should be III attended to, in order to improve its usability. The proposed metrics proved to be very useful in evaluating the usability of the tool.
- Full Text:
- Date Issued: 2011
- Authors: Kantore, Adelin
- Date: 2011
- Subjects: User interfaces (Computer systems) , Mobile communication systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9749 , http://hdl.handle.net/10948/1452 , User interfaces (Computer systems) , Mobile communication systems
- Description: Usability is seen as an important aspect for the quality of an M-learning application. Yet very little research has been conducted in this area – particularly in South Africa. Even though the trials of M-learning projects have been witnessed in the country during the last five years, very little is known about the systems that were implemented as regards their usability. Additionally, metrics and measures used in evaluating usability have not been reported. A need exists for relevant metrics to M-learning usability. The primary objective of this work was to propose metrics and measures – for the purpose of evaluating the User-Interfacedesign usability of M-learning application. The research included a literature review of M-learning, as well as the development of metrics and measures based on the Goal Question Metric (GQM) Model. This model has helped provide a reference model and measurements for evaluating the User-InterfaceUsability. A case study was used as a research strategy. An application called Kontax was selected for evaluation by users and expert reviewers. Data-collection methods consisted of User Testing and Heuristics evaluations. Data-gathering instruments included the use of surveys and user- satisfaction questionnaires based on the proposed metrics, task scenarios and expert-reviewed questionnaires based on the proposed metrics; all these instruments were developed. It was found that, although the users thought the system was very interesting, and they wished to hear more about it in the future, the system nevertheless had usability flaws which made it difficult to use. All the users failed to register so that they could use the system; additionally, the system-error messages did not help the users recognize, and recover from an error – leaving the user to simply log out. Help was not adequate, thus making it difficult for first-time users to know what to do when they needed support. The system was also said to have a lot of information presented on its home page, which caused the user to be disoriented. The Kontax application has usability flaws which should be III attended to, in order to improve its usability. The proposed metrics proved to be very useful in evaluating the usability of the tool.
- Full Text:
- Date Issued: 2011
Vision-guided tracking of complex tree-dimensional seams for robotic gas metal arc welding
- Authors: Hamed, Maien
- Date: 2011
- Subjects: Robot vision , Robotics , Gas metal arc welding
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9646 , http://hdl.handle.net/10948/1428 , Robot vision , Robotics , Gas metal arc welding
- Description: Automation of welding systems is often restricted by the requirements of spatial information of the seams to be welded. When this cannot be obtained from the design of the welded parts and maintained using accurate xturing, the use of a seam teaching or tracking system becomes necessary. Optical seam teaching and tracking systems have many advantages compared to systems implemented with other sensor families. Direct vision promises to be a viable strategy for implementing optical seam tracking, which has been mainly done with laser vision. The current work investigated direct vision as a strategy for optical seam teaching and tracking. A robotic vision system has been implemented, consisting of an articulated robot, a hand mounted camera and a control computer. A description of the calibration methods and the seam and feature detection and three-dimensional scene reconstruction is given. The results showed that direct vision is a suitable strategy for seam detection and learning. A discussion of generalizing the method used as an architecture for simultanious system calibration and measurement estimation is provided.
- Full Text:
- Date Issued: 2011
- Authors: Hamed, Maien
- Date: 2011
- Subjects: Robot vision , Robotics , Gas metal arc welding
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9646 , http://hdl.handle.net/10948/1428 , Robot vision , Robotics , Gas metal arc welding
- Description: Automation of welding systems is often restricted by the requirements of spatial information of the seams to be welded. When this cannot be obtained from the design of the welded parts and maintained using accurate xturing, the use of a seam teaching or tracking system becomes necessary. Optical seam teaching and tracking systems have many advantages compared to systems implemented with other sensor families. Direct vision promises to be a viable strategy for implementing optical seam tracking, which has been mainly done with laser vision. The current work investigated direct vision as a strategy for optical seam teaching and tracking. A robotic vision system has been implemented, consisting of an articulated robot, a hand mounted camera and a control computer. A description of the calibration methods and the seam and feature detection and three-dimensional scene reconstruction is given. The results showed that direct vision is a suitable strategy for seam detection and learning. A discussion of generalizing the method used as an architecture for simultanious system calibration and measurement estimation is provided.
- Full Text:
- Date Issued: 2011
Wireless rotational process monitoring system
- Authors: Odendaal, Morné
- Date: 2011
- Subjects: Manufacturing processes -- Automation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9599 , http://hdl.handle.net/10948/1347 , Manufacturing processes -- Automation
- Description: The manufacturing industry is constantly looking for ways to reduce production costs and at the same time to increase productivity. Automation of common manufacturing operations is one of these methods. By automating common manufacturing operations; various machines, robots, control systems and information technologies are used to reduce the overall human input requirement (mental and physical). Recent advances in technology have made it possible to now also automate (or facilitate) the maintenance requirement of these machines and tools. Modern tools and machines, which can estimate when it will fail or when failure is imminent have obvious advantages for predictive maintenance purposes. Another function of this technology is to determine how efficiently a tool or machine operates, or what the quality of the produced goods is. Predictive maintenance can decrease manufacturing plant or machine down times – which have a positive effect on cost-savings – has gained considerable importance over the last two decades.
- Full Text:
- Date Issued: 2011
- Authors: Odendaal, Morné
- Date: 2011
- Subjects: Manufacturing processes -- Automation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9599 , http://hdl.handle.net/10948/1347 , Manufacturing processes -- Automation
- Description: The manufacturing industry is constantly looking for ways to reduce production costs and at the same time to increase productivity. Automation of common manufacturing operations is one of these methods. By automating common manufacturing operations; various machines, robots, control systems and information technologies are used to reduce the overall human input requirement (mental and physical). Recent advances in technology have made it possible to now also automate (or facilitate) the maintenance requirement of these machines and tools. Modern tools and machines, which can estimate when it will fail or when failure is imminent have obvious advantages for predictive maintenance purposes. Another function of this technology is to determine how efficiently a tool or machine operates, or what the quality of the produced goods is. Predictive maintenance can decrease manufacturing plant or machine down times – which have a positive effect on cost-savings – has gained considerable importance over the last two decades.
- Full Text:
- Date Issued: 2011
- «
- ‹
- 1
- ›
- »