Investigation and prediction of autoignition during hot start conditions
- Authors: Wodausch, Jens
- Date: 2009
- Subjects: Automobiles -- Ignition
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9621 , http://hdl.handle.net/10948/991 , Automobiles -- Ignition
- Description: This Master’s thesis discusses the investigation of autoignition (knock) of air-fuel mixtures in internal combustion engines (type EA 827; 1.6 and 1.4 l) under hot start conditions. Chapter Three comprehensively reviews literature on fuel characteristics; specifically boiling point, chemistry and the difference between the Research and Motor Octane Number (RON and MON). Furthermore different types of autoignition are discussed with regards to their detection and assessment in the chapter. The subsection on engine management looks at possible methods of altering and eliminating autoignition. Chapter Four details the equipment used to obtain data and measurements, as well as the signal conditioning of the spark and injector signal. Chapter Five discusses the actual results obtained during summer testing of the different methods of altering and eliminating autoignition in an internal combustion engine, as derived from the theories presented in Chapter Three. The summer tests finally verified the new application level and showed that only a reduction in the quantity of fuel injected can eliminate autoignition. However, a slight decrease in heat release does cause an increase in start time. In Chapter Six, based on the test results, a simulation model which calculates the probability of autoignition in a 1.4 l (Econo) engine during hot start conditions in Matlab/Simulink was developed. This simulation model satisfactorily verified test results.
- Full Text:
- Date Issued: 2009
- Authors: Wodausch, Jens
- Date: 2009
- Subjects: Automobiles -- Ignition
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9621 , http://hdl.handle.net/10948/991 , Automobiles -- Ignition
- Description: This Master’s thesis discusses the investigation of autoignition (knock) of air-fuel mixtures in internal combustion engines (type EA 827; 1.6 and 1.4 l) under hot start conditions. Chapter Three comprehensively reviews literature on fuel characteristics; specifically boiling point, chemistry and the difference between the Research and Motor Octane Number (RON and MON). Furthermore different types of autoignition are discussed with regards to their detection and assessment in the chapter. The subsection on engine management looks at possible methods of altering and eliminating autoignition. Chapter Four details the equipment used to obtain data and measurements, as well as the signal conditioning of the spark and injector signal. Chapter Five discusses the actual results obtained during summer testing of the different methods of altering and eliminating autoignition in an internal combustion engine, as derived from the theories presented in Chapter Three. The summer tests finally verified the new application level and showed that only a reduction in the quantity of fuel injected can eliminate autoignition. However, a slight decrease in heat release does cause an increase in start time. In Chapter Six, based on the test results, a simulation model which calculates the probability of autoignition in a 1.4 l (Econo) engine during hot start conditions in Matlab/Simulink was developed. This simulation model satisfactorily verified test results.
- Full Text:
- Date Issued: 2009
Modelling and intelligent control of vehicle climatronic systems
- Sun, Jie
- Authors: Sun, Jie
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9600 , http://hdl.handle.net/10948/1118 , Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Description: The modelling and control method of a vehicle climatronic system, based on MATLAB/SIMULINK, is presented. In order to achieve high modelling accuracy, a developed simulation model library is introduced. The modelling approach is described and the developed models are validated with some of experimental data obtained. The models are nonlinear, independent of fluid type and based on thermo-dynamic principles. Analysis of the cooling circuit modelling and empirical real-time control models are created by using Fuzzy logic controller and Stateflow. Both of control input and output are implemented essentially at original vehicle CAN-Bus system. Feasible digital automatic control strategy basic to fuzzy theory, hardware and software solution are given. The simulation experiment is achieved with the Hardware-in-Loop technology. This control methodology is easily operated and worth applying for any further studies or methods.
- Full Text:
- Date Issued: 2009
- Authors: Sun, Jie
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9600 , http://hdl.handle.net/10948/1118 , Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Description: The modelling and control method of a vehicle climatronic system, based on MATLAB/SIMULINK, is presented. In order to achieve high modelling accuracy, a developed simulation model library is introduced. The modelling approach is described and the developed models are validated with some of experimental data obtained. The models are nonlinear, independent of fluid type and based on thermo-dynamic principles. Analysis of the cooling circuit modelling and empirical real-time control models are created by using Fuzzy logic controller and Stateflow. Both of control input and output are implemented essentially at original vehicle CAN-Bus system. Feasible digital automatic control strategy basic to fuzzy theory, hardware and software solution are given. The simulation experiment is achieved with the Hardware-in-Loop technology. This control methodology is easily operated and worth applying for any further studies or methods.
- Full Text:
- Date Issued: 2009
Precooling strategies for passenger vehicles
- Wachsmuth, Carsten Ulrich Harro
- Authors: Wachsmuth, Carsten Ulrich Harro
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9643 , http://hdl.handle.net/10948/930 , Automobiles -- Air conditioning , Air conditioning
- Description: By ventilating the vehicle’s interior during a soak, the peak cooling load is reduced and therefore the air-conditioning needs less power. This in turn translates to a smaller air-conditioning unit which would consume less power, be lighter and more compact. This solar driven ventilation of the vehicle’s interior during a soak is defined as precooling. During this project the best precooling strategy for passenger vehicles was found by investigating and testing different precooling strategies and evaluating them according to their thermodynamic performance, their potential implementation and their influence on the required cooling performance of the airconditioning cycle. The best performances were achieved by strategies with a high air flow rate and a relatively low air inlet temperature. Two categories of precooling strategies were examined: natural convection and forced convection strategies. Openings in the vehicle’s body that fit to all strategies had to be found; with a big potential concerning their thermodynamic performance and other aspects like prevention against water penetration. The best investigated precooling strategies proved to be the one which used the design outlet as an inlet and the opening of the HVAC as an outlet. With these openings a good air flow through the whole cabin can be guaranteed. In addition to that the strategy only uses existing openings of the body which prevent against water penetration. The required installation space for this strategy already exists and can be considered for the package of next generation vehicles.
- Full Text:
- Date Issued: 2009
- Authors: Wachsmuth, Carsten Ulrich Harro
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9643 , http://hdl.handle.net/10948/930 , Automobiles -- Air conditioning , Air conditioning
- Description: By ventilating the vehicle’s interior during a soak, the peak cooling load is reduced and therefore the air-conditioning needs less power. This in turn translates to a smaller air-conditioning unit which would consume less power, be lighter and more compact. This solar driven ventilation of the vehicle’s interior during a soak is defined as precooling. During this project the best precooling strategy for passenger vehicles was found by investigating and testing different precooling strategies and evaluating them according to their thermodynamic performance, their potential implementation and their influence on the required cooling performance of the airconditioning cycle. The best performances were achieved by strategies with a high air flow rate and a relatively low air inlet temperature. Two categories of precooling strategies were examined: natural convection and forced convection strategies. Openings in the vehicle’s body that fit to all strategies had to be found; with a big potential concerning their thermodynamic performance and other aspects like prevention against water penetration. The best investigated precooling strategies proved to be the one which used the design outlet as an inlet and the opening of the HVAC as an outlet. With these openings a good air flow through the whole cabin can be guaranteed. In addition to that the strategy only uses existing openings of the body which prevent against water penetration. The required installation space for this strategy already exists and can be considered for the package of next generation vehicles.
- Full Text:
- Date Issued: 2009
The capacity of emerging civil engineering construction contractors
- Ramokolo, Bruce Sabelo Mpumelelo
- Authors: Ramokolo, Bruce Sabelo Mpumelelo
- Date: 2009
- Subjects: Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9693 , http://hdl.handle.net/10948/873 , Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Description: Construction management competencies are essential to realise sound practices among and to realise optimum performance by, inter alia, emerging civil engineering contractors. Such competencies enable a clear focus on the business of construction and the management of projects, with increased efficiency and reduced costs as a benefit. The objective of the MSc (Built Environment) treatise study were to determine the current practices and performance of emerging civil engineering construction contractors operating in the Nelson Mandela Bay Metropole. The descriptive method was adopted in the empirical study. The salient findings of the study are: most of the emerging civil engineering construction contracting organisations lack construction management competencies; construction resources are inappropriately managed leading to construction failures; most of the emerging civil engineering construction contracting organisations lack adequate supervision resulting to poor workmanship; there is a shortage of skilled labour amongst emerging civil engineering construction contractors; procurement processes are inappropriate leading to under capacitated emerging civil engineering construction contracting organisations being awarded contracts; most emerging civil engineering construction contracting organisations lack the requisite aptitude for construction; there is a lack of capacity at all management levels of emerging civil engineering construction organisations in managing the business of construction and that of projects; the nine functions of organisations are not comprehensively represented, and self-ratings indicate inadequacy relative to the management function of control, and relative to certain activities of the organising function. Conclusions include that emerging civil engineering construction contracting organisations need to be comprised of technical teams that possess adequate competencies and that use the construction technology to its full use enabling their organisations to stay abreast of their competitors. Recommendations that can contribute towards improving the status quo include: formal civil engineering and construction management education, resources must be present and training should be promoted throughout the industry at all levels of management to ensure proper supervision and correct use of adequately trained labour, skilled or semi-skilled, incapacitated emerging civil engineering construction contractors should be awarded contracts through appropriately and structured procurement procedures, adequate aptitude in construction should be promoted and enhanced in order to realise conceptualisation and visualisation capabilities, comply with legislation, maintain records and communicate using state of the art technology, optimally manage the finances, have the requisite resources and undertake the work efficiently, interact with the respective publics, and market the organisation to ensure sustainability thereof.
- Full Text:
- Date Issued: 2009
- Authors: Ramokolo, Bruce Sabelo Mpumelelo
- Date: 2009
- Subjects: Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9693 , http://hdl.handle.net/10948/873 , Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Description: Construction management competencies are essential to realise sound practices among and to realise optimum performance by, inter alia, emerging civil engineering contractors. Such competencies enable a clear focus on the business of construction and the management of projects, with increased efficiency and reduced costs as a benefit. The objective of the MSc (Built Environment) treatise study were to determine the current practices and performance of emerging civil engineering construction contractors operating in the Nelson Mandela Bay Metropole. The descriptive method was adopted in the empirical study. The salient findings of the study are: most of the emerging civil engineering construction contracting organisations lack construction management competencies; construction resources are inappropriately managed leading to construction failures; most of the emerging civil engineering construction contracting organisations lack adequate supervision resulting to poor workmanship; there is a shortage of skilled labour amongst emerging civil engineering construction contractors; procurement processes are inappropriate leading to under capacitated emerging civil engineering construction contracting organisations being awarded contracts; most emerging civil engineering construction contracting organisations lack the requisite aptitude for construction; there is a lack of capacity at all management levels of emerging civil engineering construction organisations in managing the business of construction and that of projects; the nine functions of organisations are not comprehensively represented, and self-ratings indicate inadequacy relative to the management function of control, and relative to certain activities of the organising function. Conclusions include that emerging civil engineering construction contracting organisations need to be comprised of technical teams that possess adequate competencies and that use the construction technology to its full use enabling their organisations to stay abreast of their competitors. Recommendations that can contribute towards improving the status quo include: formal civil engineering and construction management education, resources must be present and training should be promoted throughout the industry at all levels of management to ensure proper supervision and correct use of adequately trained labour, skilled or semi-skilled, incapacitated emerging civil engineering construction contractors should be awarded contracts through appropriately and structured procurement procedures, adequate aptitude in construction should be promoted and enhanced in order to realise conceptualisation and visualisation capabilities, comply with legislation, maintain records and communicate using state of the art technology, optimally manage the finances, have the requisite resources and undertake the work efficiently, interact with the respective publics, and market the organisation to ensure sustainability thereof.
- Full Text:
- Date Issued: 2009
The impact of construction supply chain management on value on projects
- Authors: Emuze, Fidelis Abumere
- Date: 2009
- Subjects: Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9677 , http://hdl.handle.net/10948/1209 , Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Description: Much research work has assessed the construction process and discovered that the process is ineffective and besieged with problems. Analysis of these problems has shown that a major part of them are related to the state and workings of the supply chains. Prior research justifies that waste and problems in construction supply chains are extensively present and persistent. This anomaly may be ascribed to the nature of the industry. Horizontal integration that is common place in the construction industry tends to fragment the supply chain, resulting in an unstable production environment occasioned by high unpredictability, much rework, low profits and eventual low level of value creation in the process. Therefore, an increased level of integration of interfaces and processes has been canvassed. The purpose of supply chain management is to achieve the expected increased level of integration of the whole supply chain. Supply chain management is a concept that has flourished in the manufacturing industry through Just in Time production and logistics. Supply chain management represents an autonomous managerial tool, though still largely dominated by logistics. Supply chain management has long been advocated as a means of improving the performance of supply chains in construction. This research study reports on an investigation into the impact of supply chain management on value creation in the South African construction industry. The research discovered that collaborative working is already in the industry and contractors consider supply chain management important for project success. Here construction supply chains were approached from the relationship view point. All issues are encouraged to be viewed and resolved in the supply chain from the relationship perspective.
- Full Text:
- Date Issued: 2009
- Authors: Emuze, Fidelis Abumere
- Date: 2009
- Subjects: Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9677 , http://hdl.handle.net/10948/1209 , Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Description: Much research work has assessed the construction process and discovered that the process is ineffective and besieged with problems. Analysis of these problems has shown that a major part of them are related to the state and workings of the supply chains. Prior research justifies that waste and problems in construction supply chains are extensively present and persistent. This anomaly may be ascribed to the nature of the industry. Horizontal integration that is common place in the construction industry tends to fragment the supply chain, resulting in an unstable production environment occasioned by high unpredictability, much rework, low profits and eventual low level of value creation in the process. Therefore, an increased level of integration of interfaces and processes has been canvassed. The purpose of supply chain management is to achieve the expected increased level of integration of the whole supply chain. Supply chain management is a concept that has flourished in the manufacturing industry through Just in Time production and logistics. Supply chain management represents an autonomous managerial tool, though still largely dominated by logistics. Supply chain management has long been advocated as a means of improving the performance of supply chains in construction. This research study reports on an investigation into the impact of supply chain management on value creation in the South African construction industry. The research discovered that collaborative working is already in the industry and contractors consider supply chain management important for project success. Here construction supply chains were approached from the relationship view point. All issues are encouraged to be viewed and resolved in the supply chain from the relationship perspective.
- Full Text:
- Date Issued: 2009
The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective
- Authors: Ngqondi, Tembisa Grace
- Date: 2009
- Subjects: Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9765 , http://hdl.handle.net/10948/1066 , Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Description: Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
- Full Text:
- Date Issued: 2009
- Authors: Ngqondi, Tembisa Grace
- Date: 2009
- Subjects: Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9765 , http://hdl.handle.net/10948/1066 , Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Description: Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
- Full Text:
- Date Issued: 2009
A case study approach to assess the growth towards world class at EH Walton Packaging (Pty) Ltd
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
A facilities management transformation strategy for the public sector
- Authors: Tonono, Erol
- Date: 2008
- Subjects: Facility management -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9666 , http://hdl.handle.net/10948/767 , Facility management -- South Africa
- Description: Facilities Management (FM) has become one of the fastest growing disciplines in the built environment. Factors such as information technology, expectations of employees, the cost of mistakes in building, the cost of building space and global competition have influenced the growth of the discipline. These factors have forced facilities management to move from the basement to the boardroom; from a hidden function entrusted to the sleepy, slow and steady to one performed by increasingly bright-eyed and dynamic facilities managers. The objectives of this research focus on the need for a transformation strategy for FM in the public sector. However, before any transformation is considered, it is essential to understand the perceptions and attitudes of people dealing with FM in this sector. The National Department of Public Works (NDPW) became the focus of the study because it has the largest property portfolio in the southern hemisphere. It should be the leader in FM. The collected primary data (being quantitative) and secondary information provided the necessary basis to understand the application of FM in the NDPW. The study revealed shortcomings which are contributing to the problems outlined: namely, that no senior manager has been appointed to manage the portfolio and assist top management in decision-making; that neither a policy nor a FM framework are in place to guide the FM portfolio; that there is a lack of knowledge about the discipline, particularly by management and that there is no computer-aided FM in the entire department, let alone a FM helpdesk. FM is the coordination of workplace, people, physical infrastructure, processes and technology in order for an organization to meet its objectives. It is a wide field encompassing models that tend to differ considerably from one organization to another as it has to respond to the particular needs of each organization. It recognizes that a workplace’s configuration can have either a positive or negative impact on productivity, depending on the competency of the FM structures in place.
- Full Text:
- Date Issued: 2008
- Authors: Tonono, Erol
- Date: 2008
- Subjects: Facility management -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9666 , http://hdl.handle.net/10948/767 , Facility management -- South Africa
- Description: Facilities Management (FM) has become one of the fastest growing disciplines in the built environment. Factors such as information technology, expectations of employees, the cost of mistakes in building, the cost of building space and global competition have influenced the growth of the discipline. These factors have forced facilities management to move from the basement to the boardroom; from a hidden function entrusted to the sleepy, slow and steady to one performed by increasingly bright-eyed and dynamic facilities managers. The objectives of this research focus on the need for a transformation strategy for FM in the public sector. However, before any transformation is considered, it is essential to understand the perceptions and attitudes of people dealing with FM in this sector. The National Department of Public Works (NDPW) became the focus of the study because it has the largest property portfolio in the southern hemisphere. It should be the leader in FM. The collected primary data (being quantitative) and secondary information provided the necessary basis to understand the application of FM in the NDPW. The study revealed shortcomings which are contributing to the problems outlined: namely, that no senior manager has been appointed to manage the portfolio and assist top management in decision-making; that neither a policy nor a FM framework are in place to guide the FM portfolio; that there is a lack of knowledge about the discipline, particularly by management and that there is no computer-aided FM in the entire department, let alone a FM helpdesk. FM is the coordination of workplace, people, physical infrastructure, processes and technology in order for an organization to meet its objectives. It is a wide field encompassing models that tend to differ considerably from one organization to another as it has to respond to the particular needs of each organization. It recognizes that a workplace’s configuration can have either a positive or negative impact on productivity, depending on the competency of the FM structures in place.
- Full Text:
- Date Issued: 2008
A framework for managing timetable data quality within the NMMU
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
A model for legal compliance in the South African banking sector : an information security perspective
- Maphakela, Madidimalo Rabbie
- Authors: Maphakela, Madidimalo Rabbie
- Date: 2008
- Subjects: Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9783 , http://hdl.handle.net/10948/725 , Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Description: In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be protected from threats such as hackers and fraud, amongst others. In the highly regulated financial sector, the protection of information is not only a best practice, but a legal obligation carrying penalties for non-compliance. From a positive aspect, organisations can identify security controls that can help them to secure their information, with the aid of legal sources. But organisations find themselves burdened by a burgeoning number of legal sources and requirements, which require vast resources and often become unmanageable. This research focuses on finding a solution for South African banks to comply with multiple legal sources, as seen from an information security perspective.
- Full Text:
- Date Issued: 2008
- Authors: Maphakela, Madidimalo Rabbie
- Date: 2008
- Subjects: Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9783 , http://hdl.handle.net/10948/725 , Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Description: In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be protected from threats such as hackers and fraud, amongst others. In the highly regulated financial sector, the protection of information is not only a best practice, but a legal obligation carrying penalties for non-compliance. From a positive aspect, organisations can identify security controls that can help them to secure their information, with the aid of legal sources. But organisations find themselves burdened by a burgeoning number of legal sources and requirements, which require vast resources and often become unmanageable. This research focuses on finding a solution for South African banks to comply with multiple legal sources, as seen from an information security perspective.
- Full Text:
- Date Issued: 2008
A model for role-based security education, training and awareness in the South African healthcare environment
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
A model to improve the effectiveness of the Occupational Health and Safety Inspectorate function relative to South African construction
- Authors: Geminiani, Franco Luciano
- Date: 2008
- Subjects: Construction industry -- Safety measures
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9695 , http://hdl.handle.net/10948/719 , Construction industry -- Safety measures
- Description: Irrespective of all the efforts made by the Department of Labour (DoL) and other relevant stakeholders to improve the performance of Occupational Health and Safety (OH&S) in construction. In the Construction Industry, there is still a very high level of accidents and fatalities in South Africa. Injuries and accidents to workers do not help a community in any nation. The construction industry in South Africa is generally known to be one of the most hazardous and has one of the most dismal OH&S records among all industrial segments with an unacceptably high level of injuries and fatalities resulting in considerable human suffering. A doctoral study was recently conducted with the aim of investigating the effectiveness and performance of the DoL OH&S Inspectorate in South Africa. The empirical study was conducted among a range of stakeholders: civil engineering and building contractors; OH&S consultants; project managers; DoL inspectors; and designers by means of a questionnaire survey. The methodology adopted in this study included the exploratory and descriptive methods, which entails the technique of observation including the use of questionnaires and data analysis. The salient findings of the study are presented and elucidate that the DoL OH&S Inspectorate is not effective in terms of OH&S relative to the construction industry in South Africa. Conclusions and recommendations included expound that the DoL OH&S Inspectorate is not effectively conducting their duties reinforcing the need for a reviewed OH&S Inspectorate model framework. The proposed structured normative model consists of fundamental elements which would improve the effectiveness of the DoL OH&S Inspectorate. The findings of the study with recommendations are included.
- Full Text:
- Date Issued: 2008
- Authors: Geminiani, Franco Luciano
- Date: 2008
- Subjects: Construction industry -- Safety measures
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9695 , http://hdl.handle.net/10948/719 , Construction industry -- Safety measures
- Description: Irrespective of all the efforts made by the Department of Labour (DoL) and other relevant stakeholders to improve the performance of Occupational Health and Safety (OH&S) in construction. In the Construction Industry, there is still a very high level of accidents and fatalities in South Africa. Injuries and accidents to workers do not help a community in any nation. The construction industry in South Africa is generally known to be one of the most hazardous and has one of the most dismal OH&S records among all industrial segments with an unacceptably high level of injuries and fatalities resulting in considerable human suffering. A doctoral study was recently conducted with the aim of investigating the effectiveness and performance of the DoL OH&S Inspectorate in South Africa. The empirical study was conducted among a range of stakeholders: civil engineering and building contractors; OH&S consultants; project managers; DoL inspectors; and designers by means of a questionnaire survey. The methodology adopted in this study included the exploratory and descriptive methods, which entails the technique of observation including the use of questionnaires and data analysis. The salient findings of the study are presented and elucidate that the DoL OH&S Inspectorate is not effective in terms of OH&S relative to the construction industry in South Africa. Conclusions and recommendations included expound that the DoL OH&S Inspectorate is not effectively conducting their duties reinforcing the need for a reviewed OH&S Inspectorate model framework. The proposed structured normative model consists of fundamental elements which would improve the effectiveness of the DoL OH&S Inspectorate. The findings of the study with recommendations are included.
- Full Text:
- Date Issued: 2008
A standards-based security model for health information systems
- Authors: Thomson, Steven Michael
- Date: 2008
- Subjects: Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9786 , http://hdl.handle.net/10948/718 , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Description: In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
- Full Text:
- Date Issued: 2008
- Authors: Thomson, Steven Michael
- Date: 2008
- Subjects: Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9786 , http://hdl.handle.net/10948/718 , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Description: In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
- Full Text:
- Date Issued: 2008
Adoption of business information systems in an automotive manufacturing environment: a case study
- Authors: Dyer, Shirley
- Date: 2008
- Subjects: Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9772 , http://hdl.handle.net/10948/892 , Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Description: Dorbyl Automotive Technologies (DAT) is a manufacturing company that supplies parts and components to the local and international motor vehicle market. The automotive components’ market is very competitive and customers require more from the industry to stay competitive. Customers require full integration throughout the supply chain. DAT and its Information Systems Department have ensured that the necessary business information systems are available to assist the company in staying competitive. One problem, though, is that the users of these systems are not using and adopting the technologies available. This research examines the reasons for this by making use of a technology acceptance model called the UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT), which is an integrated model based on eight different available acceptance models. The aim is to understand which factors influence the use of systems. The research also proposes a way forward by suggesting a model to assist DAT in new system implementations as well as correcting the current situation. The only way DAT will stay competitive is by ensuring that the company becomes lean. Customers demand this as more and more are moving to just-in-time delivery. This implies that the suppliers must react to changes real-time. The use of business information systems will become the main focus area to react to changes quickly and correctly. Effective and accurate systems depend on users making good use of these systems. Remaining competitive will depend on how effectively Information and Communication Technologies (ICT) are used.
- Full Text:
- Date Issued: 2008
- Authors: Dyer, Shirley
- Date: 2008
- Subjects: Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9772 , http://hdl.handle.net/10948/892 , Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Description: Dorbyl Automotive Technologies (DAT) is a manufacturing company that supplies parts and components to the local and international motor vehicle market. The automotive components’ market is very competitive and customers require more from the industry to stay competitive. Customers require full integration throughout the supply chain. DAT and its Information Systems Department have ensured that the necessary business information systems are available to assist the company in staying competitive. One problem, though, is that the users of these systems are not using and adopting the technologies available. This research examines the reasons for this by making use of a technology acceptance model called the UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT), which is an integrated model based on eight different available acceptance models. The aim is to understand which factors influence the use of systems. The research also proposes a way forward by suggesting a model to assist DAT in new system implementations as well as correcting the current situation. The only way DAT will stay competitive is by ensuring that the company becomes lean. Customers demand this as more and more are moving to just-in-time delivery. This implies that the suppliers must react to changes real-time. The use of business information systems will become the main focus area to react to changes quickly and correctly. Effective and accurate systems depend on users making good use of these systems. Remaining competitive will depend on how effectively Information and Communication Technologies (ICT) are used.
- Full Text:
- Date Issued: 2008
An investigation of training and mentoring of emerging contractors in the Eastern Cape
- Authors: Moss, Ian
- Date: 2008
- Subjects: Construction industry -- South Africa , Mentoring
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9680 , http://hdl.handle.net/10948/1630 , Construction industry -- South Africa , Mentoring
- Description: The first democratically elected government in South Africa came into power in 1994 and with this the whole country faced changes and new challenges. The construction industry faced the challenge of incorporating and empowering previously disadvantaged people that were part of the industry as well as new emerging contractors that entered the industry. Various training and mentoring programmes were initiated by government as well as quasi-government institutions which attempted to address these challenges. Having an effective mentoring programme in place in the construction industry is critical to the development and growth of the emerging contractors as well as the industry as a whole. This research focuses on a specific programme to establish if the need for training and mentoring programmes exist and which specific aspects of the training need the most attention. The study furthermore, investigates the effect the programme had on emerging contractors on the specific programme. Primary data was collected by means of a telephonic questionnaire to emerging contractors on the mentoring programme as well as the mentors and service providers of the programme. Secondary data was obtained from the literature reviewed and from relevant publications. The main findings were that a need for the training and mentoring of emerging contractors exists and the study emphasizes that there is a demand for the ongoing monitoring of emerging contractors after completion of the programme. The study furthermore reveals that all aspects of the training and mentoring programme is important but more time and effort should be spent on the management and financial aspects of the programme The research is limited to emerging contractors and mentors who participated in the East Cape Development Corporation (ECDC) mentoring programme in the Eastern Cape and is limited to two specific regions namely Port Elizabeth and East London. The findings from the study could be used by training providers as well as mentors to enhance the existing programme to ensure proper rounding of the emerging contractors.
- Full Text:
- Date Issued: 2008
- Authors: Moss, Ian
- Date: 2008
- Subjects: Construction industry -- South Africa , Mentoring
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9680 , http://hdl.handle.net/10948/1630 , Construction industry -- South Africa , Mentoring
- Description: The first democratically elected government in South Africa came into power in 1994 and with this the whole country faced changes and new challenges. The construction industry faced the challenge of incorporating and empowering previously disadvantaged people that were part of the industry as well as new emerging contractors that entered the industry. Various training and mentoring programmes were initiated by government as well as quasi-government institutions which attempted to address these challenges. Having an effective mentoring programme in place in the construction industry is critical to the development and growth of the emerging contractors as well as the industry as a whole. This research focuses on a specific programme to establish if the need for training and mentoring programmes exist and which specific aspects of the training need the most attention. The study furthermore, investigates the effect the programme had on emerging contractors on the specific programme. Primary data was collected by means of a telephonic questionnaire to emerging contractors on the mentoring programme as well as the mentors and service providers of the programme. Secondary data was obtained from the literature reviewed and from relevant publications. The main findings were that a need for the training and mentoring of emerging contractors exists and the study emphasizes that there is a demand for the ongoing monitoring of emerging contractors after completion of the programme. The study furthermore reveals that all aspects of the training and mentoring programme is important but more time and effort should be spent on the management and financial aspects of the programme The research is limited to emerging contractors and mentors who participated in the East Cape Development Corporation (ECDC) mentoring programme in the Eastern Cape and is limited to two specific regions namely Port Elizabeth and East London. The findings from the study could be used by training providers as well as mentors to enhance the existing programme to ensure proper rounding of the emerging contractors.
- Full Text:
- Date Issued: 2008
Analysis and modelling of the temperature distribution during the friction taper stud welding of 10CrMo910
- Van Zyl, Carlo Angelo Antonio
- Authors: Van Zyl, Carlo Angelo Antonio
- Date: 2008
- Subjects: Friction welding , Pressure welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9630 , http://hdl.handle.net/10948/720 , http://hdl.handle.net/10948/d1012898 , Friction welding , Pressure welding
- Description: Heat generation during the FTSW process plays and important role in determining the characteristics of the weld. In order to obtain temperature fields, a transient temperature heat analysis is required. An area is the maximum temperatures reached within the base material during the FTSW process. These temperatures will be measured during experimentation, and compared to the welding simulation done using FEA. From the literature search it appeared that no heat transfer analysis had been done using finite element methods.
- Full Text:
- Date Issued: 2008
- Authors: Van Zyl, Carlo Angelo Antonio
- Date: 2008
- Subjects: Friction welding , Pressure welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9630 , http://hdl.handle.net/10948/720 , http://hdl.handle.net/10948/d1012898 , Friction welding , Pressure welding
- Description: Heat generation during the FTSW process plays and important role in determining the characteristics of the weld. In order to obtain temperature fields, a transient temperature heat analysis is required. An area is the maximum temperatures reached within the base material during the FTSW process. These temperatures will be measured during experimentation, and compared to the welding simulation done using FEA. From the literature search it appeared that no heat transfer analysis had been done using finite element methods.
- Full Text:
- Date Issued: 2008
Business process security maturity: a paradigm convergence
- Authors: Box, Debra
- Date: 2008
- Subjects: Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9785 , http://hdl.handle.net/10948/722 , Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Description: Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
- Full Text:
- Date Issued: 2008
- Authors: Box, Debra
- Date: 2008
- Subjects: Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9785 , http://hdl.handle.net/10948/722 , Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Description: Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
- Full Text:
- Date Issued: 2008
Designing accessible portals in South Africa: a case study
- Authors: Meyer, Shaun
- Date: 2008
- Subjects: Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9782 , http://hdl.handle.net/10948/770 , Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Description: Web portals are considered “gateways” to the World Wide Web. These portals are becoming very popular entry points to the Web by offering important services such as email, news, weather reports, course notes and general information. In addition, some portal sites allow users the option of customising the site according to their personal interests. However, disabled and elderly people encounter many accessibility and usability barriers while accessing web portals. A preliminary review of a university portal was conducted to identify some of these accessibility problems. This treatise presents an overview of the processes to be followed when conducting an accessibility and usability evaluation. In addition, it mentions some guidelines to be considered when specifically designing portals for use by many different users from varying backgrounds.
- Full Text:
- Date Issued: 2008
- Authors: Meyer, Shaun
- Date: 2008
- Subjects: Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9782 , http://hdl.handle.net/10948/770 , Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Description: Web portals are considered “gateways” to the World Wide Web. These portals are becoming very popular entry points to the Web by offering important services such as email, news, weather reports, course notes and general information. In addition, some portal sites allow users the option of customising the site according to their personal interests. However, disabled and elderly people encounter many accessibility and usability barriers while accessing web portals. A preliminary review of a university portal was conducted to identify some of these accessibility problems. This treatise presents an overview of the processes to be followed when conducting an accessibility and usability evaluation. In addition, it mentions some guidelines to be considered when specifically designing portals for use by many different users from varying backgrounds.
- Full Text:
- Date Issued: 2008
Development of a reciprocating aerofoil wind energy harvester
- Authors: Phillips, Russell Leslie
- Date: 2008
- Subjects: Windmills , Wind power , Wind turbines
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9622 , http://hdl.handle.net/10948/899 , Windmills , Wind power , Wind turbines
- Description: Cross flow wind turbines are not unique. The performance of Savonius and Darrieus turbines is well documented. Both share the advantage of being able to accept fluid flow from any direction. The Savonius is drag based and hence has poor power output while the Darrieus is lift based. Due to the fact that the Darrieus has fixed blades the fluid flow through the rotor does not result in optimal lift being generated at all points in the rotation circle. A drawback of the Darrieus system is that it has to operate at a high tip-to wind-speed ratio to obtain reasonable performance with the fixed blades. Deviation from a small optimal range of tip speed ratios results in poor performance. The Darrieus also has poor starting torque. The research conducted in this project focused on overcoming the shortcomings of other turbines and developing an effective cross flow turbine capable of good performance. A number of different concepts were experimented with, however all were based on a symmetrical aerofoil presented to the actual relative airflow at an angle that would produce the highest lift force at all times. The lift force was then utilized to generate movement and to do work on an electrical generator. All concepts contemplated were researched to ascertain their appropriateness for the intended application. During development of the final experimental platform and after lodging of a provisional patent (RSA 2007/00927) it was ascertained that the design shared some similarities with an American patent 5503525 dated 28/4/1994. This patent employed complex electronic sensing and control equipment for control of blade angle. This was thought to be overly complex and costly, particularly for small scale wind energy generation applications and a simpler mechanical solution was sought in the design of the final experimental platform used in this project. The design of the mechanical control system was refined in an attempt to make it simpler, more durable and employ the least number of moving parts. Literature studies and patent searches conducted, suggested that the mechanical control system as developed for the final experimental platform was unique. The enormous variation in the power available from the wind at the different wind speeds likely to be encountered by the device necessitated some means of control. In high wind conditions control of the amount of wind power into the device was deemed to be the preferable means of control. A number of different concepts to achieve this were devised and tested. The final concept employed limited the tail angle deflection and hence the lift produced by the aerofoils. This resulted in a seamless “throttle” control allowing the device to be used in any wind strength by adjusting the control to a position that resulted in the device receiving a suitable amount of power from the wind. The outcome of performance tests conducted indicated that the device has the potential to be developed into a viable wind turbine for both small and large scale applications. The ability to control the power input from the wind to the machine from zero to a maximum is considered to be one of the most beneficial outcomes of this project and together with the quiet operation and low speed, are considered the main advantages of the device over existing wind turbine designs. The possibilities of using the device to compress air for energy storage are exciting avenues that warrant further research.
- Full Text:
- Date Issued: 2008
- Authors: Phillips, Russell Leslie
- Date: 2008
- Subjects: Windmills , Wind power , Wind turbines
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9622 , http://hdl.handle.net/10948/899 , Windmills , Wind power , Wind turbines
- Description: Cross flow wind turbines are not unique. The performance of Savonius and Darrieus turbines is well documented. Both share the advantage of being able to accept fluid flow from any direction. The Savonius is drag based and hence has poor power output while the Darrieus is lift based. Due to the fact that the Darrieus has fixed blades the fluid flow through the rotor does not result in optimal lift being generated at all points in the rotation circle. A drawback of the Darrieus system is that it has to operate at a high tip-to wind-speed ratio to obtain reasonable performance with the fixed blades. Deviation from a small optimal range of tip speed ratios results in poor performance. The Darrieus also has poor starting torque. The research conducted in this project focused on overcoming the shortcomings of other turbines and developing an effective cross flow turbine capable of good performance. A number of different concepts were experimented with, however all were based on a symmetrical aerofoil presented to the actual relative airflow at an angle that would produce the highest lift force at all times. The lift force was then utilized to generate movement and to do work on an electrical generator. All concepts contemplated were researched to ascertain their appropriateness for the intended application. During development of the final experimental platform and after lodging of a provisional patent (RSA 2007/00927) it was ascertained that the design shared some similarities with an American patent 5503525 dated 28/4/1994. This patent employed complex electronic sensing and control equipment for control of blade angle. This was thought to be overly complex and costly, particularly for small scale wind energy generation applications and a simpler mechanical solution was sought in the design of the final experimental platform used in this project. The design of the mechanical control system was refined in an attempt to make it simpler, more durable and employ the least number of moving parts. Literature studies and patent searches conducted, suggested that the mechanical control system as developed for the final experimental platform was unique. The enormous variation in the power available from the wind at the different wind speeds likely to be encountered by the device necessitated some means of control. In high wind conditions control of the amount of wind power into the device was deemed to be the preferable means of control. A number of different concepts to achieve this were devised and tested. The final concept employed limited the tail angle deflection and hence the lift produced by the aerofoils. This resulted in a seamless “throttle” control allowing the device to be used in any wind strength by adjusting the control to a position that resulted in the device receiving a suitable amount of power from the wind. The outcome of performance tests conducted indicated that the device has the potential to be developed into a viable wind turbine for both small and large scale applications. The ability to control the power input from the wind to the machine from zero to a maximum is considered to be one of the most beneficial outcomes of this project and together with the quiet operation and low speed, are considered the main advantages of the device over existing wind turbine designs. The possibilities of using the device to compress air for energy storage are exciting avenues that warrant further research.
- Full Text:
- Date Issued: 2008
Information communication and technology in Port Elizabeth secondary schools : exploring the digital divide
- Authors: Adebisi, Adeolu Abiodun
- Date: 2008
- Subjects: Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9770 , http://hdl.handle.net/10948/914 , Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Description: The primary goal of the research is to investigate the extent of ICT adoption in secondary schools within the larger Port Elizabeth area. In order to demonstrate the current status, two geographical areas within that area namely privileged and less privileged areas will be selected and surveyed. The main objective of this research study is to survey the access to ICT services by learners and teachers living and working in less privileged communities compared with that of learners and teachers in the more privileged communities of Port Elizabeth. At present all the schools in these communities are funded by the same provincial government, but the extent of the digital divide is not known. This research will investigate the factors that lead to the inequalities in the access to ICT among secondary school learners and teachers. This research has the following sub goals and objectives: 1. To identify the factors that impact on the status of access to ICT services; 2. To determine which socio-economic factors contribute to the status of access to ICT services in the specific areas; 3. To determine the status of access to ICT services in specific communities within the larger Port Elizabeth area; 4. To determine whether the level of access differs between secondary schools and the homes of teachers and learners in the identified areas.
- Full Text:
- Date Issued: 2008
- Authors: Adebisi, Adeolu Abiodun
- Date: 2008
- Subjects: Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9770 , http://hdl.handle.net/10948/914 , Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Description: The primary goal of the research is to investigate the extent of ICT adoption in secondary schools within the larger Port Elizabeth area. In order to demonstrate the current status, two geographical areas within that area namely privileged and less privileged areas will be selected and surveyed. The main objective of this research study is to survey the access to ICT services by learners and teachers living and working in less privileged communities compared with that of learners and teachers in the more privileged communities of Port Elizabeth. At present all the schools in these communities are funded by the same provincial government, but the extent of the digital divide is not known. This research will investigate the factors that lead to the inequalities in the access to ICT among secondary school learners and teachers. This research has the following sub goals and objectives: 1. To identify the factors that impact on the status of access to ICT services; 2. To determine which socio-economic factors contribute to the status of access to ICT services in the specific areas; 3. To determine the status of access to ICT services in specific communities within the larger Port Elizabeth area; 4. To determine whether the level of access differs between secondary schools and the homes of teachers and learners in the identified areas.
- Full Text:
- Date Issued: 2008