Design of a low-cost autonomous guided cart for material handling
- Authors: Cawood, Gareth James
- Date: 2015
- Subjects: Automobiles -- Design and construction , Automobiles -- Automatic control , Vehicles -- Automatic control
- Language: English
- Type: Thesis , Masters , MEngineering
- Identifier: vital:9655
- Description: This dissertation covers the design and manufacture of an autonomous guided cart (AGC) for use in the material handling industry. General Motors South Africa (GMSA) requires a low-cost AGC for use in their Struandale plant. A budget of R35 000 per unit was proposed. The researcher, in collaboration with staff at GM, compiled a list of engineering requirements for the AGC. After research into the unique problems of the project, an examination of a previous design attempt by staff of GM Thailand, the researcher developed a new design, the subject of this report. Different solutions for each design problem were investigated before the design was finalised. A three-wheeled vehicle was designed making use of two motors in a differential-drive setup to control motion. Navigation is via a line-following mechanism, using an induction sensor-array in conjunction with a pre-laid metallic strip. To aid the design, the system was modelled to understand the different control elements at play. The researcher developed software for several aspects of the design: for the PLC controlling the system and motors; for a microcontroller that communicates with the PLC and a wireless module; for a computer server that communicates with a second wireless device, receiving information from the PLC; and a web interface to view this information. These form the SCADA integration of the project. The final product meets the GMSA specifications. It is a robot capable of towing a trolley of mass not exceeding 350 kg. While the robot is able to navigate a pre-laid route, it cannot reliably stop at marked locations. It is possible to monitor the system via a web-interface. The robot is capable of operating for an entire 8-hour shift before the batteries need to be recharged. The total cost of the prototype was R26 340.
- Full Text:
- Date Issued: 2015
- Authors: Cawood, Gareth James
- Date: 2015
- Subjects: Automobiles -- Design and construction , Automobiles -- Automatic control , Vehicles -- Automatic control
- Language: English
- Type: Thesis , Masters , MEngineering
- Identifier: vital:9655
- Description: This dissertation covers the design and manufacture of an autonomous guided cart (AGC) for use in the material handling industry. General Motors South Africa (GMSA) requires a low-cost AGC for use in their Struandale plant. A budget of R35 000 per unit was proposed. The researcher, in collaboration with staff at GM, compiled a list of engineering requirements for the AGC. After research into the unique problems of the project, an examination of a previous design attempt by staff of GM Thailand, the researcher developed a new design, the subject of this report. Different solutions for each design problem were investigated before the design was finalised. A three-wheeled vehicle was designed making use of two motors in a differential-drive setup to control motion. Navigation is via a line-following mechanism, using an induction sensor-array in conjunction with a pre-laid metallic strip. To aid the design, the system was modelled to understand the different control elements at play. The researcher developed software for several aspects of the design: for the PLC controlling the system and motors; for a microcontroller that communicates with the PLC and a wireless module; for a computer server that communicates with a second wireless device, receiving information from the PLC; and a web interface to view this information. These form the SCADA integration of the project. The final product meets the GMSA specifications. It is a robot capable of towing a trolley of mass not exceeding 350 kg. While the robot is able to navigate a pre-laid route, it cannot reliably stop at marked locations. It is possible to monitor the system via a web-interface. The robot is capable of operating for an entire 8-hour shift before the batteries need to be recharged. The total cost of the prototype was R26 340.
- Full Text:
- Date Issued: 2015
The effects of shot peening on low cycle fatigue life of 7075-T6 aluminium alloy round bar
- Authors: Peters, Donald Michael Dirk
- Date: 2014
- Subjects: Shot peening , Aluminum alloys -- Fatigue , Metals -- Fatigue
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/2929 , vital:20364
- Description: The aim in this dissertation was to improve our understanding of the effectiveness of shot peening in prolonging fatigue life, of 7075-T6 Aluminium Alloy round bar, taking into consideration surface residual stress, microstructural and micro-hardness parameters. Three point bending, high stress, moderately low cycle, fatigue tests were conducted to study the effects of shot peening and associated surface residual compressive stresses on fatigue life. The influence of shot peening on the microstructure was explored, including the application of mechanical small plastic straining and surface skimming, to vary the surface residual compressive stresses and induce strain hardening. Tests were performed to measure residual stress-depth distribution, plastic straining, micro-hardness, and the microstructure analysed on scanning electron microscopy (SEM) fractographs. The Juvinall and Marshek life prediction model was used in conjunction with the Gerber equation for non-zero mean stress applications to generate a proposed life prediction model for this material which is user-friendly. The proposed life prediction model has a linear equation format with the flexibility to conservatively accommodate most of the various types, and combinations, of treatments applied in this research by the use of customised constants. The results show that there was good correlation between actual and predicted fatigue life as well as useful insights into the role of the microstructure in explaining fatigue life behaviour.
- Full Text:
- Date Issued: 2014
- Authors: Peters, Donald Michael Dirk
- Date: 2014
- Subjects: Shot peening , Aluminum alloys -- Fatigue , Metals -- Fatigue
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/2929 , vital:20364
- Description: The aim in this dissertation was to improve our understanding of the effectiveness of shot peening in prolonging fatigue life, of 7075-T6 Aluminium Alloy round bar, taking into consideration surface residual stress, microstructural and micro-hardness parameters. Three point bending, high stress, moderately low cycle, fatigue tests were conducted to study the effects of shot peening and associated surface residual compressive stresses on fatigue life. The influence of shot peening on the microstructure was explored, including the application of mechanical small plastic straining and surface skimming, to vary the surface residual compressive stresses and induce strain hardening. Tests were performed to measure residual stress-depth distribution, plastic straining, micro-hardness, and the microstructure analysed on scanning electron microscopy (SEM) fractographs. The Juvinall and Marshek life prediction model was used in conjunction with the Gerber equation for non-zero mean stress applications to generate a proposed life prediction model for this material which is user-friendly. The proposed life prediction model has a linear equation format with the flexibility to conservatively accommodate most of the various types, and combinations, of treatments applied in this research by the use of customised constants. The results show that there was good correlation between actual and predicted fatigue life as well as useful insights into the role of the microstructure in explaining fatigue life behaviour.
- Full Text:
- Date Issued: 2014
A comparative study of performance and efficiency of a tube and fin type domestic solar water heat collector
- Authors: Kleyn, Gysbert
- Date: 2015
- Subjects: Solar collectors , Solar water heaters -- Testing , Solar heating
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7959 , vital:24329
- Description: The main purpose of this research project was to do a comparative study, by identifying a testing methodology for transient conditions, through which to allow the expression of the relative thermal performance of two DSWH collectors in comparison. The study started off by considering literature about Solar Domestic Water Heaters and National Standards-based test methods, most of which were for Steady State testing conditions. Thereafter establishing a testing methodology and setup, identifying factors to be considered. The results were analyzed and conclusions drawn. The hypothesis was to allow the reduction in the complexity of testing equipment and methods, and by doing transient condition testing and still utilizing the Hottel-Whillier-Bliss relationship as a way of expressing efficiency, the hypothesis was proven.
- Full Text:
- Date Issued: 2015
- Authors: Kleyn, Gysbert
- Date: 2015
- Subjects: Solar collectors , Solar water heaters -- Testing , Solar heating
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7959 , vital:24329
- Description: The main purpose of this research project was to do a comparative study, by identifying a testing methodology for transient conditions, through which to allow the expression of the relative thermal performance of two DSWH collectors in comparison. The study started off by considering literature about Solar Domestic Water Heaters and National Standards-based test methods, most of which were for Steady State testing conditions. Thereafter establishing a testing methodology and setup, identifying factors to be considered. The results were analyzed and conclusions drawn. The hypothesis was to allow the reduction in the complexity of testing equipment and methods, and by doing transient condition testing and still utilizing the Hottel-Whillier-Bliss relationship as a way of expressing efficiency, the hypothesis was proven.
- Full Text:
- Date Issued: 2015
A fuzzy logic control system for a friction stir welding process
- Authors: Majara, Khotso Ernest
- Date: 2006
- Subjects: Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9594 , http://hdl.handle.net/10948/405 , Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Description: FSW is a welding technique invented and patented by The Welding Institute in 1991. This welding technique utilises the benefits of solid-state welding to materials regarded as difficult to weld by fusion processes. The productivity of the process was not optimised as the real-time dynamics of the material and tool changes were not considered. Furthermore, the process has a plastic weld region where no traditional modelling describing the interaction between the tool and work piece is available. Fuzzy logic technology is one of the artificial intelligent strategies used to improve the control of the dynamics of industrial processes. Fuzzy control was proposed as a viable solution to improve the productivity of the FSW process. The simulations indicated that FLC can use feed rate and welding speed to adaptively regulate the feed force and tool temperature respectively, irrespective of varying tool and material change. The simulations presented fuzzy logic technology to be robust enough to regulate FSW process in the absence of accurate mathematical models.
- Full Text:
- Date Issued: 2006
- Authors: Majara, Khotso Ernest
- Date: 2006
- Subjects: Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9594 , http://hdl.handle.net/10948/405 , Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Description: FSW is a welding technique invented and patented by The Welding Institute in 1991. This welding technique utilises the benefits of solid-state welding to materials regarded as difficult to weld by fusion processes. The productivity of the process was not optimised as the real-time dynamics of the material and tool changes were not considered. Furthermore, the process has a plastic weld region where no traditional modelling describing the interaction between the tool and work piece is available. Fuzzy logic technology is one of the artificial intelligent strategies used to improve the control of the dynamics of industrial processes. Fuzzy control was proposed as a viable solution to improve the productivity of the FSW process. The simulations indicated that FLC can use feed rate and welding speed to adaptively regulate the feed force and tool temperature respectively, irrespective of varying tool and material change. The simulations presented fuzzy logic technology to be robust enough to regulate FSW process in the absence of accurate mathematical models.
- Full Text:
- Date Issued: 2006
A model to address factors that could influence the information security behaviour of computing graduates
- Mabece, Thandolwethu, Thomson, Kerry-Lynn
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
Towards a risk assessment matrix for information security workarounds associated with acceptable use policies
- Authors: Slabbert, Eugene
- Date: 2022-04
- Subjects: Information networks--security measures , Computer security--South africa
- Language: English
- Type: Master's theses
- Identifier: http://hdl.handle.net/10948/55533 , vital:52811
- Description: Acceptable Use Policies (AUPs) are used to influence employees’ information security behaviour. Some employees feel that the AUPs and related procedures interfere with their ability to work efficiently and may, therefore, choose not to comply by utilising information security workarounds associated with the AUP. An AUP workaround is a form of information security non compliance that may result in unnecessary information security risk exposure for an organisation. Some AUP workarounds may be useful as they identify more efficient ways to complete tasks that may not impact the information security of an organisation. However, these efficiencies should only be considered for incorporation into standard procedures when the information security risk exposure of an AUP workaround is known. This leads to the problem statement. Many organisations do not have a formal way in which to assess the information security risks posed by workarounds associated with their Acceptable Use Policies, and related procedures. This study provides a solution to the identified problem through the primary objective, to develop a Risk Assessment Matrix for Information Security Workarounds associated with Acceptable Use Policies, and related procedures. Four secondary research objectives were proposed to achieve the primary research objective. The first secondary objective determines the role of information security risk management and how it relates to information security governance through the utilisation of a literature review. The second secondary objective firstly utilises a literature review to determine the role that the AUP and its related procedures play within an organisation, followed by a content analysis which identifies the key content that should be considered in a comprehensive AUP. The third secondary objective determines the factors that influence the use of AUP workarounds within an organisation through the utilisation of a literature review. Lastly, the fourth secondary objective utilises a literature review to determine the key components required for the development of the risk assessment matrix for information security workarounds. In addition, critical reasoning is used to create the risk assessment matrix for information security workarounds. The solution to this study contributes to the body of knowledge by proposing a risk assessment matrix to assess the information security risk exposure of AUP workarounds and find possible efficiency gains while keeping information security risk exposure to a minimum. , Thesis (MTech) -- Faculty of Engineering, the Built Environment and Information Technology , Information Technology, 2022
- Full Text:
- Date Issued: 2022-04
- Authors: Slabbert, Eugene
- Date: 2022-04
- Subjects: Information networks--security measures , Computer security--South africa
- Language: English
- Type: Master's theses
- Identifier: http://hdl.handle.net/10948/55533 , vital:52811
- Description: Acceptable Use Policies (AUPs) are used to influence employees’ information security behaviour. Some employees feel that the AUPs and related procedures interfere with their ability to work efficiently and may, therefore, choose not to comply by utilising information security workarounds associated with the AUP. An AUP workaround is a form of information security non compliance that may result in unnecessary information security risk exposure for an organisation. Some AUP workarounds may be useful as they identify more efficient ways to complete tasks that may not impact the information security of an organisation. However, these efficiencies should only be considered for incorporation into standard procedures when the information security risk exposure of an AUP workaround is known. This leads to the problem statement. Many organisations do not have a formal way in which to assess the information security risks posed by workarounds associated with their Acceptable Use Policies, and related procedures. This study provides a solution to the identified problem through the primary objective, to develop a Risk Assessment Matrix for Information Security Workarounds associated with Acceptable Use Policies, and related procedures. Four secondary research objectives were proposed to achieve the primary research objective. The first secondary objective determines the role of information security risk management and how it relates to information security governance through the utilisation of a literature review. The second secondary objective firstly utilises a literature review to determine the role that the AUP and its related procedures play within an organisation, followed by a content analysis which identifies the key content that should be considered in a comprehensive AUP. The third secondary objective determines the factors that influence the use of AUP workarounds within an organisation through the utilisation of a literature review. Lastly, the fourth secondary objective utilises a literature review to determine the key components required for the development of the risk assessment matrix for information security workarounds. In addition, critical reasoning is used to create the risk assessment matrix for information security workarounds. The solution to this study contributes to the body of knowledge by proposing a risk assessment matrix to assess the information security risk exposure of AUP workarounds and find possible efficiency gains while keeping information security risk exposure to a minimum. , Thesis (MTech) -- Faculty of Engineering, the Built Environment and Information Technology , Information Technology, 2022
- Full Text:
- Date Issued: 2022-04
Application of the theory of critical distance technique to predict fracture toughness in friction stir welded Ti-6Al-4V sheet
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
A systems approach to project implementation within the public sector towards formulating a framework for project evaluation
- Authors: Greyling, Een Lange
- Date: 2012
- Subjects: Project management -- South Africa , Corporations, Government -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9721 , http://hdl.handle.net/10948/d1021223
- Description: The procurement process, from the demand formulation to the final delivery of a public building to the end-user, is defined by the government in terms of procedures and policies to be followed, which is based to be ineffective and inefficient where the process as a whole from a client-value perpective, is flawed. Presently, the National Department of Public Works(NDPW) as a governmental administration is deemed to be a controlling institution and cost centre rather than a service provider. This mind-set is reflected by the inability of government project implementing agencies such as the NDPW to deliver projects successfully in terms of cost, time, and quality whilst failing to meet the government's socio economic objectives to create employment opportunities, stimulate economic growth, and transfer skills to the previously disadvantaged through black economic empowerment (BEE) initiatives. Client satisfaction has widely been recognised by researchers as one of the key challenges for quality improvement in the construction industry. It is a vital factor in the development and management of the construction process, as well in the creation of efficient organisation-client relationship. In addition, client satisfaction is deemed to be a catalyst for client retention which is a success strategy for any organisation. This thesis is primarily concerned with project performance and service delivery by the NDPW as a government project implementing agency that involves an integrated approach that considers the entire supply chain of a construction project. The success or failure of a project is is not the effect of a single variable, or factor, but a set of variables interacting with each other to produce the final result. An extensive review of related literature that entails the analysis of publications related to the projectimplementation and construction project management realm was deemed necessary to formulate a clear understanding of the complexities of implementing projjects within the public sector. The use of systems thinking as the nucleus of the multi-methodological approach to this research was to assist in ascertaining the primary causes of the problem situation and to clarify the process of project implementation as a sub-system within the greater system of the construction industry. The success of projects depends as much on the client as it does on the implementing agencies, project managers (PMs), consultants, contractors and the suppliers of materials.
- Full Text:
- Date Issued: 2012
- Authors: Greyling, Een Lange
- Date: 2012
- Subjects: Project management -- South Africa , Corporations, Government -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9721 , http://hdl.handle.net/10948/d1021223
- Description: The procurement process, from the demand formulation to the final delivery of a public building to the end-user, is defined by the government in terms of procedures and policies to be followed, which is based to be ineffective and inefficient where the process as a whole from a client-value perpective, is flawed. Presently, the National Department of Public Works(NDPW) as a governmental administration is deemed to be a controlling institution and cost centre rather than a service provider. This mind-set is reflected by the inability of government project implementing agencies such as the NDPW to deliver projects successfully in terms of cost, time, and quality whilst failing to meet the government's socio economic objectives to create employment opportunities, stimulate economic growth, and transfer skills to the previously disadvantaged through black economic empowerment (BEE) initiatives. Client satisfaction has widely been recognised by researchers as one of the key challenges for quality improvement in the construction industry. It is a vital factor in the development and management of the construction process, as well in the creation of efficient organisation-client relationship. In addition, client satisfaction is deemed to be a catalyst for client retention which is a success strategy for any organisation. This thesis is primarily concerned with project performance and service delivery by the NDPW as a government project implementing agency that involves an integrated approach that considers the entire supply chain of a construction project. The success or failure of a project is is not the effect of a single variable, or factor, but a set of variables interacting with each other to produce the final result. An extensive review of related literature that entails the analysis of publications related to the projectimplementation and construction project management realm was deemed necessary to formulate a clear understanding of the complexities of implementing projjects within the public sector. The use of systems thinking as the nucleus of the multi-methodological approach to this research was to assist in ascertaining the primary causes of the problem situation and to clarify the process of project implementation as a sub-system within the greater system of the construction industry. The success of projects depends as much on the client as it does on the implementing agencies, project managers (PMs), consultants, contractors and the suppliers of materials.
- Full Text:
- Date Issued: 2012
A framework for IT governance in small businesses
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
The cost of free instant messaging: an attack modelling perspective
- Authors: Du Preez, Riekert
- Date: 2006
- Subjects: Computer security , Instant messaging , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9797 , http://hdl.handle.net/10948/499 , http://hdl.handle.net/10948/d1011921 , Computer security , Instant messaging , Data protection
- Description: Instant Messaging (IM) has grown tremendously over the last few years. Even though IM was originally developed as a social chat system, it has found a place in many companies, where it is being used as an essential business tool. However, many businesses rely on free IM and have not implemented a secure corporate IM solution. Most free IM clients were never intended for use in the workplace and, therefore, lack strong security features and administrative control. Consequently, free IM clients can provide attackers with an entry point for malicious code in an organization’s network that can ultimately lead to a company’s information assets being compromised. Therefore, even though free IM allows for better collaboration in the workplace, it comes at a cost, as the title of this dissertation suggests. This dissertation sets out to answer the question of how free IM can facilitate an attack on a company’s information assets. To answer the research question, the dissertation defines an IM attack model that models the ways in which an information system can be attacked when free IM is used within an organization. The IM attack model was created by categorising IM threats using the STRIDE threat classification scheme. The attacks that realize the categorised threats were then modelled using attack trees as the chosen attack modelling tool. Attack trees were chosen because of their ability to model the sequence of attacker actions during an attack. The author defined an enhanced graphical notation that was adopted for the attack trees used to create the IM attack model. The enhanced attack tree notation extends traditional attack trees to allow nodes in the trees to be of different classes and, therefore, allows attack trees to convey more information. During the process of defining the IM attack model, a number of experiments were conducted where IM vulnerabilities were exploited. Thereafter, a case study was constructed to document a simulated attack on an information system that involves the exploitation of IM vulnerabilities. The case study demonstrates how an attacker’s attack path relates to the IM attack model in a practical scenario. The IM attack model provides insight into how IM can facilitate an attack on a company’s information assets. The creation of the attack model for free IM lead to several realizations. The IM attack model revealed that even though the use of free IM clients may seem harmless, such IM clients can facilitate an attack on a company’s information assets. Furthermore, certain IM vulnerabilities may not pose a great risk by themselves, but when combined with the exploitation of other vulnerabilities, a much greater threat can be realized. These realizations hold true to what French playwright Jean Anouilh once said: “What you get free costs too much”.
- Full Text:
- Date Issued: 2006
- Authors: Du Preez, Riekert
- Date: 2006
- Subjects: Computer security , Instant messaging , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9797 , http://hdl.handle.net/10948/499 , http://hdl.handle.net/10948/d1011921 , Computer security , Instant messaging , Data protection
- Description: Instant Messaging (IM) has grown tremendously over the last few years. Even though IM was originally developed as a social chat system, it has found a place in many companies, where it is being used as an essential business tool. However, many businesses rely on free IM and have not implemented a secure corporate IM solution. Most free IM clients were never intended for use in the workplace and, therefore, lack strong security features and administrative control. Consequently, free IM clients can provide attackers with an entry point for malicious code in an organization’s network that can ultimately lead to a company’s information assets being compromised. Therefore, even though free IM allows for better collaboration in the workplace, it comes at a cost, as the title of this dissertation suggests. This dissertation sets out to answer the question of how free IM can facilitate an attack on a company’s information assets. To answer the research question, the dissertation defines an IM attack model that models the ways in which an information system can be attacked when free IM is used within an organization. The IM attack model was created by categorising IM threats using the STRIDE threat classification scheme. The attacks that realize the categorised threats were then modelled using attack trees as the chosen attack modelling tool. Attack trees were chosen because of their ability to model the sequence of attacker actions during an attack. The author defined an enhanced graphical notation that was adopted for the attack trees used to create the IM attack model. The enhanced attack tree notation extends traditional attack trees to allow nodes in the trees to be of different classes and, therefore, allows attack trees to convey more information. During the process of defining the IM attack model, a number of experiments were conducted where IM vulnerabilities were exploited. Thereafter, a case study was constructed to document a simulated attack on an information system that involves the exploitation of IM vulnerabilities. The case study demonstrates how an attacker’s attack path relates to the IM attack model in a practical scenario. The IM attack model provides insight into how IM can facilitate an attack on a company’s information assets. The creation of the attack model for free IM lead to several realizations. The IM attack model revealed that even though the use of free IM clients may seem harmless, such IM clients can facilitate an attack on a company’s information assets. Furthermore, certain IM vulnerabilities may not pose a great risk by themselves, but when combined with the exploitation of other vulnerabilities, a much greater threat can be realized. These realizations hold true to what French playwright Jean Anouilh once said: “What you get free costs too much”.
- Full Text:
- Date Issued: 2006
The relationship between the value chain and project success in the Malawian construction industry
- Authors: Kadangwe, Samuel Ronald
- Date: 2013
- Subjects: Construction industry -- Malawi , Industrial procurement -- Construction -- Malawi
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9715 , http://hdl.handle.net/10948/d1020865
- Description: The construction industry in Malawi plays a vital role in developing the infrastructure of the country that is in need of improvement. Thus, in order to improve the quality of infrastructure in Malawi, the construction industry has to perform better than the status quo. The construction industry is characterised by a complex value chain that comprises of clients, consultants, contractors, and material manufacturers, suppliers, financing institutions, knowledge organisations and regulatory authority. This research looks at the relationship between construction value and project success in the Malawian construction industry. A qualitative research method was used for compiling the primary data for the study. Twenty-nine (29) participants were interviewed. These participants represented clients, consultants, contractors and material suppliers. The findings reveal that value creation in Malawi is characterised by lack of harmonised standards and specifications, inconsistent project management practices, existence of non-value adding activities, corrupt practices, lack of a skilled labour force, and lack of commitment to best practices in H&S as well as environmental management. Further, logistical problems affect the supply of construction materials to the country; while an unfavourable economic environment makes pricing of materials a challenge in the country too. Poor communication and limited use of information technology (IT) is very common in the industry and project implementation is also affected by a poor road network, an intermittent power supply, and a lack of cooperation from other service providers. In terms of supply chain structures in use, the research revealed that the traditional procurement method that is based on the lowest bidder / price is the most dominant method in use and very few members of the construction industry are conversant with other procurement methods. The method is also the preferred procurement method used by public sector clients. The performance of the traditional procurement method largely depends on the competence of the project design and supervision team, the adequacy of the documentation, and the capacity of the contractor. However, in most cases the system has failed to perform due to the poor contract management skills of the supervising consultant and the lack of timely guidance from the public sector clients. The findings also revealed that most of the suppliers or subcontractors are engaged on project based relationships, and members of the industry are unwilling to engage in long terms relationships due to mistrust and greed among members of the industry, and also largely due to lack of proper frameworks that can support such relationships. It is therefore recommended that other procurement methods should be explored and the engagement of the lowest price bidders should be discontinued on small and medium scale projects. The criteria for upgrading contractors to higher categories should equally be revisited to eliminate incompetent contractors. The NCIC should take a leading role in harmonising the various standards and specifications in use in the country. Promotion of the usage IT services should be encouraged to facilitate faster information dissemination. Usage of risk management in construction and evaluation and monitoring of projects should be encouraged and benchmark best practices. Finally, the members of the industry should take up the responsibility to take leading entities in the industry to task, if fundamental changes are to take place in the industry.
- Full Text:
- Date Issued: 2013
- Authors: Kadangwe, Samuel Ronald
- Date: 2013
- Subjects: Construction industry -- Malawi , Industrial procurement -- Construction -- Malawi
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9715 , http://hdl.handle.net/10948/d1020865
- Description: The construction industry in Malawi plays a vital role in developing the infrastructure of the country that is in need of improvement. Thus, in order to improve the quality of infrastructure in Malawi, the construction industry has to perform better than the status quo. The construction industry is characterised by a complex value chain that comprises of clients, consultants, contractors, and material manufacturers, suppliers, financing institutions, knowledge organisations and regulatory authority. This research looks at the relationship between construction value and project success in the Malawian construction industry. A qualitative research method was used for compiling the primary data for the study. Twenty-nine (29) participants were interviewed. These participants represented clients, consultants, contractors and material suppliers. The findings reveal that value creation in Malawi is characterised by lack of harmonised standards and specifications, inconsistent project management practices, existence of non-value adding activities, corrupt practices, lack of a skilled labour force, and lack of commitment to best practices in H&S as well as environmental management. Further, logistical problems affect the supply of construction materials to the country; while an unfavourable economic environment makes pricing of materials a challenge in the country too. Poor communication and limited use of information technology (IT) is very common in the industry and project implementation is also affected by a poor road network, an intermittent power supply, and a lack of cooperation from other service providers. In terms of supply chain structures in use, the research revealed that the traditional procurement method that is based on the lowest bidder / price is the most dominant method in use and very few members of the construction industry are conversant with other procurement methods. The method is also the preferred procurement method used by public sector clients. The performance of the traditional procurement method largely depends on the competence of the project design and supervision team, the adequacy of the documentation, and the capacity of the contractor. However, in most cases the system has failed to perform due to the poor contract management skills of the supervising consultant and the lack of timely guidance from the public sector clients. The findings also revealed that most of the suppliers or subcontractors are engaged on project based relationships, and members of the industry are unwilling to engage in long terms relationships due to mistrust and greed among members of the industry, and also largely due to lack of proper frameworks that can support such relationships. It is therefore recommended that other procurement methods should be explored and the engagement of the lowest price bidders should be discontinued on small and medium scale projects. The criteria for upgrading contractors to higher categories should equally be revisited to eliminate incompetent contractors. The NCIC should take a leading role in harmonising the various standards and specifications in use in the country. Promotion of the usage IT services should be encouraged to facilitate faster information dissemination. Usage of risk management in construction and evaluation and monitoring of projects should be encouraged and benchmark best practices. Finally, the members of the industry should take up the responsibility to take leading entities in the industry to task, if fundamental changes are to take place in the industry.
- Full Text:
- Date Issued: 2013
Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control
- Zata, Ngonidzashe Munyaradzi, Fernandes, John Manuel
- Authors: Zata, Ngonidzashe Munyaradzi , Fernandes, John Manuel
- Date: 2017
- Subjects: Mechatronics -- Students Engineering students User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13349 , vital:27177
- Description: Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control.
- Full Text:
- Date Issued: 2017
- Authors: Zata, Ngonidzashe Munyaradzi , Fernandes, John Manuel
- Date: 2017
- Subjects: Mechatronics -- Students Engineering students User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13349 , vital:27177
- Description: Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control.
- Full Text:
- Date Issued: 2017
The possibility of a flexible wireless 3-D measurement in the modern automobile production
- Authors: Frede, Stefan
- Date: 2010
- Subjects: Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9619 , http://hdl.handle.net/10948/1203 , Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Description: The quality control of geometrical coherences and relations in modern automobile production is done by different stationary and flexible measurement systems and strategies. Furthermore, there currently exists possibilities of inline measurements and offline measurements. This project presents the basic research concerning the possibility of a flexible wireless measurement system in modern automobile production, that is able to combine the advantages of both strategies. An investigation of existing measurement techniques was done in order to find a sensor technology, which enables the wireless measurement process. The research project introduces the current location systems and positioning systems. These techniques are compared by a value benefit analysis to expose a suited technology as basis for the measurement system. As result of the value benefit anlysis, the ultrasonic technique was selected for further investigations. The ultrasonic test setup is used to analyze the accuracy of modern sensors and to verify the possibility of a project related integration. The tests are done in different conditions, in order to compare the laboratory application and the industrial application. During the test measurements different physical influencing variables and disturbances occurred. From this research project, it can be concluded that the laboratory application of the system is possible. However, the industrial application is subject to restrictions.
- Full Text:
- Date Issued: 2010
- Authors: Frede, Stefan
- Date: 2010
- Subjects: Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9619 , http://hdl.handle.net/10948/1203 , Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Description: The quality control of geometrical coherences and relations in modern automobile production is done by different stationary and flexible measurement systems and strategies. Furthermore, there currently exists possibilities of inline measurements and offline measurements. This project presents the basic research concerning the possibility of a flexible wireless measurement system in modern automobile production, that is able to combine the advantages of both strategies. An investigation of existing measurement techniques was done in order to find a sensor technology, which enables the wireless measurement process. The research project introduces the current location systems and positioning systems. These techniques are compared by a value benefit analysis to expose a suited technology as basis for the measurement system. As result of the value benefit anlysis, the ultrasonic technique was selected for further investigations. The ultrasonic test setup is used to analyze the accuracy of modern sensors and to verify the possibility of a project related integration. The tests are done in different conditions, in order to compare the laboratory application and the industrial application. During the test measurements different physical influencing variables and disturbances occurred. From this research project, it can be concluded that the laboratory application of the system is possible. However, the industrial application is subject to restrictions.
- Full Text:
- Date Issued: 2010
The impact of project performance on the image of the construction industry in Botswana
- Authors: Ndadi, Thabo Enert
- Date: 2018
- Subjects: Project management -- Botswana , Construction industry -- Botswana Construction industry -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/32826 , vital:32367
- Description: The construction industry is one of the largest sectors in the economy of Botswana, and contributes significantly to the socio-economic development of the country, averaging 6.7 per cent of the country’s gross domestic product (GDP). Botswana operates a free enterprise system where anyone is free to participate, which is supported by the existence of multi-national construction firms operating in the country. The construction industry in Botswana consists of various role players. As a developing country, Botswana’s construction industry is facing challenges of poor project implementation. The performance of the construction industry has not escaped the public‘s scrutiny of commercial construction and social development projects, resulting in negative perceptions with respect to the sector. This study focuses on the impact of project performance on the image of the construction industry in Botswana, and was conducted on projects underway. When public opinion is formed, a certain image of the business results, therefore the investigation endeavoured to establish the sources of negative perceptions towards the construction industry. To realise the aforementioned study objectives, an exploratory design sequence method was adopted henceforth applying established and tested quantitative and qualitative systems. A questionnaire was formulated and established to obtain the empirical data on randomly selected projects that were on-going or completed in the past ten years .These included public sector projects, private sector and those undertaken by parastatal organisation. The sample stratum deemed representative picture of the population, included various construction industry stakeholders. To facilitate for an effective data to inform the study, the questionnaire was categorised in three key areas of, biographic data, demographic and the industry best practice perceptions. The study determined that the capability of firms is influenced by construction management skills, and established regulatory systems. These can determine the extent to which the construction industry delivers the project within the business environment that is guided by the micro, macro and market parameters. As evidenced in the findings, the Botswana construction industry faces a skills’ gap and therefore is reliant on imported labour, and many international firms operating in the country affirm this observation. The study also addressed the existing regulatory systems, and the effectiveness of institutions. The study concludes that the existing performance regulatory systems are not adequate or they are ineffectively controlled; industry role players’ behaviour is irresponsible; there is limited skills’ capacity, and political interference accompanies project implementation. While the deterioration in the construction industry can be attributed to imported culture, it is noted that multi-national corporations (MNCs) and other foreign firms can be conduits for technology and knowledge (T&K) transfer to host countries in the developing world. Botswana with its free enterprise market and limited skill capacity and informed by the behaviour of construction industry role players, there is need for a structured integrity restoration process from both regulator and the operators. There is further need for a specific sector regulatory instrument (Act) to regulate the safety, health, and environmental operations in the construction industry. The construction industry also need to support research and development of the industry to be competitive both local and international.
- Full Text:
- Date Issued: 2018
- Authors: Ndadi, Thabo Enert
- Date: 2018
- Subjects: Project management -- Botswana , Construction industry -- Botswana Construction industry -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/32826 , vital:32367
- Description: The construction industry is one of the largest sectors in the economy of Botswana, and contributes significantly to the socio-economic development of the country, averaging 6.7 per cent of the country’s gross domestic product (GDP). Botswana operates a free enterprise system where anyone is free to participate, which is supported by the existence of multi-national construction firms operating in the country. The construction industry in Botswana consists of various role players. As a developing country, Botswana’s construction industry is facing challenges of poor project implementation. The performance of the construction industry has not escaped the public‘s scrutiny of commercial construction and social development projects, resulting in negative perceptions with respect to the sector. This study focuses on the impact of project performance on the image of the construction industry in Botswana, and was conducted on projects underway. When public opinion is formed, a certain image of the business results, therefore the investigation endeavoured to establish the sources of negative perceptions towards the construction industry. To realise the aforementioned study objectives, an exploratory design sequence method was adopted henceforth applying established and tested quantitative and qualitative systems. A questionnaire was formulated and established to obtain the empirical data on randomly selected projects that were on-going or completed in the past ten years .These included public sector projects, private sector and those undertaken by parastatal organisation. The sample stratum deemed representative picture of the population, included various construction industry stakeholders. To facilitate for an effective data to inform the study, the questionnaire was categorised in three key areas of, biographic data, demographic and the industry best practice perceptions. The study determined that the capability of firms is influenced by construction management skills, and established regulatory systems. These can determine the extent to which the construction industry delivers the project within the business environment that is guided by the micro, macro and market parameters. As evidenced in the findings, the Botswana construction industry faces a skills’ gap and therefore is reliant on imported labour, and many international firms operating in the country affirm this observation. The study also addressed the existing regulatory systems, and the effectiveness of institutions. The study concludes that the existing performance regulatory systems are not adequate or they are ineffectively controlled; industry role players’ behaviour is irresponsible; there is limited skills’ capacity, and political interference accompanies project implementation. While the deterioration in the construction industry can be attributed to imported culture, it is noted that multi-national corporations (MNCs) and other foreign firms can be conduits for technology and knowledge (T&K) transfer to host countries in the developing world. Botswana with its free enterprise market and limited skill capacity and informed by the behaviour of construction industry role players, there is need for a structured integrity restoration process from both regulator and the operators. There is further need for a specific sector regulatory instrument (Act) to regulate the safety, health, and environmental operations in the construction industry. The construction industry also need to support research and development of the industry to be competitive both local and international.
- Full Text:
- Date Issued: 2018
A framework for enhancing trust for improved participation in electronic marketplaces accessed from mobile platforms
- Isabirye, Naomi Nabirye, Von Solms, R
- Authors: Isabirye, Naomi Nabirye , Von Solms, R
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa Agricultural innovations -- South Africa Agricultural systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/20019 , vital:29053
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text:
- Date Issued: 2016
- Authors: Isabirye, Naomi Nabirye , Von Solms, R
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa Agricultural innovations -- South Africa Agricultural systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/20019 , vital:29053
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text:
- Date Issued: 2016
An integrated management system for quality and information security in healthcare
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9800 , http://hdl.handle.net/10948/d1012134 , Health services administration -- Quality control
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9800 , http://hdl.handle.net/10948/d1012134 , Health services administration -- Quality control
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
A strategic turnaround model for distressed properties
- Authors: Pitsiladi, Lesvokli N
- Date: 2023-04
- Subjects: Reorganization , Distressed properties
- Language: English
- Type: Doctoral's theses , Thesis
- Identifier: http://hdl.handle.net/10948/60467 , vital:65603
- Description: The importance of commercial real estate is clearly shown by the role it plays, worldwide, in the sustainability of economic activities, with a substantial global impact when measured in monetary terms. This study responds to an important gap in the built environment and turnaround literature relating to the likelihood of a successful distressed commercial property financial recovery. The present research effort addressed the absence of empirical evidence by identifying a number of important factors that influence the likelihood of a successful distressed, commercial property financial recovery. Once the important factors that increase the likelihood of recovery have been determined, the results can be used as a basis for turnaround strategies concerning property investors who invest in distressed opportunities. A theoretical turnaround model concerning properties in distress, would be of interest to ‘opportunistic investing’ yield-hungry investors targeting real estate transactions involving ‘turnaround’ potential. Against this background, the main research problem investigated in the present research effort was as follows: Determine the important factors that would increase the likelihood of a successful distressed commercial property financial recovery. A proposed theoretical model was constructed and empirically tested through a questionnaire distributed physically and electronically to a sample of real estate practitioners from across the globe, and who had all been involved, directly or indirectly, with reviving distressed properties. An explanation was provided to respondents of how the questionnaire was developed and how it would be administered. The demographic information pertaining to the 391 respondents was analysed and summarised. The statistical analysis performed to ensure the validity and reliability of the results, was explained to respondents, together with a detailed description of the covariance structural equation modelling method used to verify the proposed theoretical conceptual model. vi The independent variables of the present research effort comprised; Obsolescence Identification, Capital Improvements Feasibility, Tenant Mix, Triple Net Leases, Concessions, Property Management, Contracts, Business Analysis, Debt Renegotiation, Cost-Cutting, Market Analysis, Strategic Planning and Demography, while the dependent variable was The Perceived Likelihood of a Distressed Commercial Property Financial Recovery. After analysis of the findings, a revised model was then proposed and assessed. Both validity and reliability were assessed and resulted in the following factors that potentially influence the dependent variables; Strategy, Concessions, Tenant Mix, Debt Restructuring, Demography, Analyse Alternatives, Capital Improvements Feasibility, Property Management and Net Leases while, after analysis, the dependent variable was replaced by two dependent variables; The Likelihood of a Distressed Property Turnaround and The Likelihood of a Distressed Property Financial Recovery. The results showed that Strategy (comprising of items from Strategic Planning, Business Analysis, Obsolescence Identification and Property Management) and Concessions (comprising of items from Concessions and Triple Net Leases) had a positive influence on both the dependent variables. Property Management (comprising of items from Business Analysis, Property Management, Capital Improvements Feasibility and Tenant Mix) had a positive influence on Financial Turnaround variable while Capital Improvements Feasibility (comprising of items from Capital Improvements Feasibility, Obsolescence Identification and Property Management) had a negative influence on both. Demography (comprising of items only from Demography) had a negative influence on the Financial Recovery variable. The balance of the relationships were depicted as non-significant. The present research effort presents important actions that can be used to influence the turnaround and recovery of distressed real estate. The literature had indicated reasons to recover distressed properties as having wide-ranging economic consequences for the broader communities and the countries in which they reside. The turnaround of distressed properties will not only present financial rewards for opportunistic investors but will have positive effects on the greater community and economy and, thus, social and economic stability. Vii With the emergence of the COVID-19 pandemic crisis, issues with climate change and sustainability, global demographic shifts, changing user requirements, shifts in technology, the threat of obsolescence, urbanisation, globalisation, geo-political tensions, shifting global order, new trends and different generational expectations, it is becoming more apparent that the threat of distressed, abandoned and derelict properties is here to stay, and which will present future opportunities for turnaround, distressed property owners, as well as future worries for urban authorities and municipalities dealing with urban decay. The study concluded with an examination of the perceived limitations of the study as well as presenting a comprehensive range of suggestions for further research. , Thesis (PhD) -- Faculty of Engineering, Built Environment and Information Technology, School of the built Environment, 2023
- Full Text:
- Date Issued: 2023-04
- Authors: Pitsiladi, Lesvokli N
- Date: 2023-04
- Subjects: Reorganization , Distressed properties
- Language: English
- Type: Doctoral's theses , Thesis
- Identifier: http://hdl.handle.net/10948/60467 , vital:65603
- Description: The importance of commercial real estate is clearly shown by the role it plays, worldwide, in the sustainability of economic activities, with a substantial global impact when measured in monetary terms. This study responds to an important gap in the built environment and turnaround literature relating to the likelihood of a successful distressed commercial property financial recovery. The present research effort addressed the absence of empirical evidence by identifying a number of important factors that influence the likelihood of a successful distressed, commercial property financial recovery. Once the important factors that increase the likelihood of recovery have been determined, the results can be used as a basis for turnaround strategies concerning property investors who invest in distressed opportunities. A theoretical turnaround model concerning properties in distress, would be of interest to ‘opportunistic investing’ yield-hungry investors targeting real estate transactions involving ‘turnaround’ potential. Against this background, the main research problem investigated in the present research effort was as follows: Determine the important factors that would increase the likelihood of a successful distressed commercial property financial recovery. A proposed theoretical model was constructed and empirically tested through a questionnaire distributed physically and electronically to a sample of real estate practitioners from across the globe, and who had all been involved, directly or indirectly, with reviving distressed properties. An explanation was provided to respondents of how the questionnaire was developed and how it would be administered. The demographic information pertaining to the 391 respondents was analysed and summarised. The statistical analysis performed to ensure the validity and reliability of the results, was explained to respondents, together with a detailed description of the covariance structural equation modelling method used to verify the proposed theoretical conceptual model. vi The independent variables of the present research effort comprised; Obsolescence Identification, Capital Improvements Feasibility, Tenant Mix, Triple Net Leases, Concessions, Property Management, Contracts, Business Analysis, Debt Renegotiation, Cost-Cutting, Market Analysis, Strategic Planning and Demography, while the dependent variable was The Perceived Likelihood of a Distressed Commercial Property Financial Recovery. After analysis of the findings, a revised model was then proposed and assessed. Both validity and reliability were assessed and resulted in the following factors that potentially influence the dependent variables; Strategy, Concessions, Tenant Mix, Debt Restructuring, Demography, Analyse Alternatives, Capital Improvements Feasibility, Property Management and Net Leases while, after analysis, the dependent variable was replaced by two dependent variables; The Likelihood of a Distressed Property Turnaround and The Likelihood of a Distressed Property Financial Recovery. The results showed that Strategy (comprising of items from Strategic Planning, Business Analysis, Obsolescence Identification and Property Management) and Concessions (comprising of items from Concessions and Triple Net Leases) had a positive influence on both the dependent variables. Property Management (comprising of items from Business Analysis, Property Management, Capital Improvements Feasibility and Tenant Mix) had a positive influence on Financial Turnaround variable while Capital Improvements Feasibility (comprising of items from Capital Improvements Feasibility, Obsolescence Identification and Property Management) had a negative influence on both. Demography (comprising of items only from Demography) had a negative influence on the Financial Recovery variable. The balance of the relationships were depicted as non-significant. The present research effort presents important actions that can be used to influence the turnaround and recovery of distressed real estate. The literature had indicated reasons to recover distressed properties as having wide-ranging economic consequences for the broader communities and the countries in which they reside. The turnaround of distressed properties will not only present financial rewards for opportunistic investors but will have positive effects on the greater community and economy and, thus, social and economic stability. Vii With the emergence of the COVID-19 pandemic crisis, issues with climate change and sustainability, global demographic shifts, changing user requirements, shifts in technology, the threat of obsolescence, urbanisation, globalisation, geo-political tensions, shifting global order, new trends and different generational expectations, it is becoming more apparent that the threat of distressed, abandoned and derelict properties is here to stay, and which will present future opportunities for turnaround, distressed property owners, as well as future worries for urban authorities and municipalities dealing with urban decay. The study concluded with an examination of the perceived limitations of the study as well as presenting a comprehensive range of suggestions for further research. , Thesis (PhD) -- Faculty of Engineering, Built Environment and Information Technology, School of the built Environment, 2023
- Full Text:
- Date Issued: 2023-04
A model for managing user experience
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
A strategy to make ICT accessible in rural Zambia: a case study of Macha
- Authors: Van Stam, Gertjan
- Date: 2013
- Subjects: Communication in rural development -- Zambia , Communication and technology -- Zambia
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9830
- Description: The problem discussed in this dissertation is to gather evidence of good practice and derive strategy for the development of ICT access in rural Zambia. Access to ICT services is important, also in rural areas of Africa. The challenges are many. There is a distinct void in tangible descriptions of the realities of ICT Access in rural areas or actionable guidelines for practitioners. This study involves a case study in the rural areas of Zambia. It does so through ethnography involving 10 years of observation of aspects of ICT access in rural Macha, Zambia. In this community, emerging from an articulated vision, ICT access in the form of the Internet arrived in 2004. Macha Works with its ICT unit LinkNet provides the basis for this interpretive approach from within the rural cultural setting. The purpose of the study is to benefit the local rural community, addressing the fundamentals of reality to add to the body of knowledge. The study involves cross cultural interaction and takes a trans-disciplinary view on science. It involves Participative Action Learning and Research aimed at recognising the complex adaptive systems while being aligned with the ethics of the rural African environment. Emphasis is on the needs of the community, rather than of the individual utilising empirical evidence. The good practices in Macha that inform strategy to make ICT accessible in rural areas are: engaging the community, building relationships; workforce development, unlocking productivity; thought leadership, establishing authority.
- Full Text:
- Date Issued: 2013
- Authors: Van Stam, Gertjan
- Date: 2013
- Subjects: Communication in rural development -- Zambia , Communication and technology -- Zambia
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9830
- Description: The problem discussed in this dissertation is to gather evidence of good practice and derive strategy for the development of ICT access in rural Zambia. Access to ICT services is important, also in rural areas of Africa. The challenges are many. There is a distinct void in tangible descriptions of the realities of ICT Access in rural areas or actionable guidelines for practitioners. This study involves a case study in the rural areas of Zambia. It does so through ethnography involving 10 years of observation of aspects of ICT access in rural Macha, Zambia. In this community, emerging from an articulated vision, ICT access in the form of the Internet arrived in 2004. Macha Works with its ICT unit LinkNet provides the basis for this interpretive approach from within the rural cultural setting. The purpose of the study is to benefit the local rural community, addressing the fundamentals of reality to add to the body of knowledge. The study involves cross cultural interaction and takes a trans-disciplinary view on science. It involves Participative Action Learning and Research aimed at recognising the complex adaptive systems while being aligned with the ethics of the rural African environment. Emphasis is on the needs of the community, rather than of the individual utilising empirical evidence. The good practices in Macha that inform strategy to make ICT accessible in rural areas are: engaging the community, building relationships; workforce development, unlocking productivity; thought leadership, establishing authority.
- Full Text:
- Date Issued: 2013
A model for automated topic spotting in a mobile chat based mathematics tutoring environment
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012