A framework for secure mobility in wireless overlay networks
- Authors: Chen, Hejun
- Date: 2006
- Subjects: Wireless communication systems , Computer networks
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9778 , http://hdl.handle.net/10948/819 , Wireless communication systems , Computer networks
- Description: Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
- Full Text:
- Date Issued: 2006
A fuzzy logic control system for a friction stir welding process
- Authors: Majara, Khotso Ernest
- Date: 2006
- Subjects: Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9594 , http://hdl.handle.net/10948/405 , Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Description: FSW is a welding technique invented and patented by The Welding Institute in 1991. This welding technique utilises the benefits of solid-state welding to materials regarded as difficult to weld by fusion processes. The productivity of the process was not optimised as the real-time dynamics of the material and tool changes were not considered. Furthermore, the process has a plastic weld region where no traditional modelling describing the interaction between the tool and work piece is available. Fuzzy logic technology is one of the artificial intelligent strategies used to improve the control of the dynamics of industrial processes. Fuzzy control was proposed as a viable solution to improve the productivity of the FSW process. The simulations indicated that FLC can use feed rate and welding speed to adaptively regulate the feed force and tool temperature respectively, irrespective of varying tool and material change. The simulations presented fuzzy logic technology to be robust enough to regulate FSW process in the absence of accurate mathematical models.
- Full Text:
- Date Issued: 2006
A holistic approach to network security in OGSA-based grid systems
- Authors: Loutsios, Demetrios
- Date: 2006
- Subjects: Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9736 , http://hdl.handle.net/10948/550 , Computer networks -- Security measures
- Description: Grid computing technologies facilitate complex scientific collaborations between globally dispersed parties, which make use of heterogeneous technologies and computing systems. However, in recent years the commercial sector has developed a growing interest in Grid technologies. Prominent Grid researchers have predicted Grids will grow into the commercial mainstream, even though its origins were in scientific research. This is much the same way as the Internet started as a vehicle for research collaboration between universities and government institutions, and grew into a technology with large commercial applications. Grids facilitate complex trust relationships between globally dispersed business partners, research groups, and non-profit organizations. Almost any dispersed “virtual organization” willing to share computing resources can make use of Grid technologies. Grid computing facilitates the networking of shared services; the inter-connection of a potentially unlimited number of computing resources within a “Grid” is possible. Grid technologies leverage a range of open standards and technologies to provide interoperability between heterogeneous computing systems. Newer Grids build on key capabilities of Web-Service technologies to provide easy and dynamic publishing and discovery of Grid resources. Due to the inter-organisational nature of Grid systems, there is a need to provide adequate security to Grid users and to Grid resources. This research proposes a framework, using a specific brokered pattern, which addresses several common Grid security challenges, which include: Providing secure and consistent cross-site Authentication and Authorization; Single-sign on capabilities to Grid users; Abstract iii; Underlying platform and runtime security, and; Grid network communications and messaging security. These Grid security challenges can be viewed as comprising two (proposed) logical layers of a Grid. These layers are: a Common Grid Layer (higher level Grid interactions), and a Local Resource Layer (Lower level technology security concerns). This research is concerned with providing a generic and holistic security framework to secure both layers. This research makes extensive use of STRIDE - an acronym for Microsoft approach to addressing security threats - as part of a holistic Grid security framework. STRIDE and key Grid related standards, such as Open Grid Service Architecture (OGSA), Web-Service Resource Framework (WS-RF), and the Globus Toolkit are used to formulate the proposed framework.
- Full Text:
- Date Issued: 2006
A study of the development of partner relationships associated with the chinese travel trade to South Africa
- Authors: Lin, Bin
- Date: 2006
- Subjects: Travel agents -- South Africa , Tourism -- China , Travel agents -- China , Tourism -- South Africa , Relationship marketing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9336 , http://hdl.handle.net/10948/414 , Travel agents -- South Africa , Tourism -- China , Travel agents -- China , Tourism -- South Africa , Relationship marketing
- Description: The Chinese inbound tourism market to SA has been acknowledged as an emerging market. However, South African tour operators experience difficulties in establishing and developing viable partner relationships with Chinese travel agents. Recognizing the size, importance and complexity of this market, the major purpose of this research is to explore and investigate the crucial process of developing Sino-South African partnership relationships in the tourism industry, to facilitate the establishment of business relationships with Chinese travel agents. This study is draws on applied marketing, management and cross-cultural theories on networking to explore the process of developing partnership relationships in the Chinese inbound tourism market to SA. The literature on networking, the development of networking relationships, and the effect of guanxi (connection), a key feature of Chinese business networking on partnership relations are reviewed. Given the limited research conducted on this topic and its cross-country nature, a quantitative research method was adopted for this study. Specifically, this study utilized e-mail survey techniques to explore the relationships between South African inbound tour operators and Chinese travel agents. This study identifies that the process of developing partnership relationships between Chinese travel agents and South African inbound tour operators is culturally embedded. They are giving rise to communication problems that affect partnership relationships. A new stage model of the development of partnership relationships between South African inbound tour operators and Chinese travel agents is therefore developed. In particular, the study identifies important factors in the process of developing business relationships. For example, mutual commitment, the pricing issue, word-of-mouth, and quality of services are all considered crucial in attaining long-term stable partnership relationships. Guanxi plays a significant, but not decisive role in the process of developing partnership relationships between Chinese travel agents and South African inbound tour operators. However, guanxi relationships can provide added value to the partnership relationships.
- Full Text:
- Date Issued: 2006
An empirical study of capital budgeting evaluation techniques used in firms in the Nelson Mandela Metropole
- Authors: Bester, Lizel
- Date: 2006
- Subjects: Capital budget -- South Africa -- Port Elizabeth , Capital budget -- Firms -- Evaluation techniques -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8978 , http://hdl.handle.net/10948/475 , Capital budget -- South Africa -- Port Elizabeth , Capital budget -- Firms -- Evaluation techniques -- South Africa -- Port Elizabeth
- Description: The first research objective of this dissertation is an empirical study of the capital budgeting process to determine what capital budgeting evaluation techniques are used by firms in the Nelson Mandela Metropole. The second research objective of this dissertation is how the size of the firm impacts on the type of capital budgeting evaluation techniques used. The size of the firm is measured by magnitude of turnover, assets and the number of employees.
- Full Text:
- Date Issued: 2006
An investigation into employee empowerment strategies for Small, Medium, and Micro Enterprises (SMMEs)
- Authors: Pandle, Nolubabalo Leeanne
- Date: 2006
- Subjects: Employee empowerment , Business enterprises , Small business -- Management , Affirmative action programs
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9344 , http://hdl.handle.net/10948/d1012138 , Employee empowerment , Business enterprises , Small business -- Management , Affirmative action programs
- Description: Employee empowerment is a strategy that small business managers can deploy to add value to the business. This strategy is aimed at cultivating the power and ability of employees in their jobs. A business is a business by people working in it though they differ in many ways their contribution to the success of the organization is very important. However, these people are not often recognized as value contributors in the success of the business and for this reason they do not intend to add value to the business and they become demotivated to do their jobs properly. People are the business storehouse of knowledge and they are central to the organization's competitive advantage. Well educated, coached, and highly motivated people are critical to the development and execution of strategies, especially in today's fast-paced market, where top management can no longer assure the business competitiveness in isolation. In the business world, almost all businesses are doing the same, small businesses should strive to do things differently, and the only way that they can achieve that uniqueness is through instilling frankness and liberty to employees so that they act as if the business also belongs to them. The reason behind this success is the strategy the business is using to get into the heart of its customers, and this strategy is “employee empowerment”. People are the business's most underutilized resource; involvement in an organization is no longer a one-way road. In today's corporate environment a manager must work towards engaging the organization forcefully enough to achieve its objectives. New knowledge-based enterprises are characterized by flat hierarchical structures and a multi-skilled workforce. Managers assume more leadership and coaching tasks and work hard to provide employees with resources and working conditions they need to accomplish the goals they have agreed to. In brief, managers work for their staff, and not the reverse and this makes employees feel valued. Small business owners should tap into a new dimension of utilizing employee empowerment strategies in their businesses as these are proficient and are not costly. This paper investigates employee empowerment strategies that can be used by small, medium and micro enterprises (SMME's). An important reason for this investigation is that small businesses have incompetent skilled labour force due to the fact that they operate under a limited budget from which it would be difficult to get skilled workers who will demand higher salaries, as a result they need to put their energies rather on equipping and educating their employees through empowerment, which could at the end make them feel valued and part of the business. It is imperative to firstly assess the current situation of small business commitment to employee empowerment strategies; to what extent do they use employee empowerment strategies in their businesses In terms of the empirical study it was determined that small businesses were not aware of the concept of employee empowerment, but are in actual fact practicing employee empowerment strategies that have been theoretically revealed, according to the researcher’s observation, they were not aware of the impact of employee empowerment in the organization and that they can be implemented into the business. Therefore, by introducing the concept of employee empowerment and the strategies that can be used in small businesses, SMME's can enhance their services to customers, increase productivity and contribute to the welfare of employees to add value to the individual, the business and the country.
- Full Text:
- Date Issued: 2006
An investigation into the family life cycle within a South African context
- Authors: Koekemoer, Evan
- Date: 2006
- Subjects: Consumer behavior -- South Africa , Market segmentation , Consumers -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9352 , http://hdl.handle.net/10948/191 , Consumer behavior -- South Africa , Market segmentation , Consumers -- South Africa
- Description: Each individual/household progresses through the family life cycle (FLC). This progression, which is characterized by various stages and varying consumption portfolios, can be traditional or non-traditional in nature. In the general marketing sense, the FLC concept has great value. The concept is utilized in a variety of marketing activities, particularly in segmentation, and is also applied in consumer behaviour. The lack of research regarding the FLC in South Africa and the need to investigate the concept’s applicability to different environments motivated this research. The aim of the study was to determine how the FLC within a South African context compared to the theoretical depiction of the concept. The evaluation of literature revealed five distinct traditional stages and an array of non-traditional stages, determined by a combination of life stage determining variables. Regarding the empirical approach, self-administered questionnaires were distributed to a convenience sample consisting of 225 students and staff members of the then Port Elizabeth Technikon. The empirical findings revealed the following. {u100083} Non-traditional stages were more prevalent than traditional stages. ii {u100083} Marital status, the presence/absence of children and living arrangement appear to be sufficient life stage determining variables for both current and prospective life stage classifications. {u100083} The consumption portfolios of individuals in the traditional FLC were similar to theory. The research provided insight into the consumption portfolios of individuals in the non-traditional FLC. {u100083} Based on the intentions of certain individuals regarding marriage, having children and living arrangements, it appears as though the future FLC will include an integration of traditional and non-traditional progressions.
- Full Text:
- Date Issued: 2006
Comparitive study of automation strategies at VW Germany and South Africa
- Authors: Wessel, Oliver
- Date: 2006
- Subjects: Volkswagen (Firm) , Motor vehicle industry -- Automation Comparative studies
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9607 , http://hdl.handle.net/10948/823 , Volkswagen (Firm) , Motor vehicle industry -- Automation Comparative studies
- Description: This master thesis analyses the Volkswagen assembly lines of the Golf A5 manufacture in the mother plant in Wolfsburg, the Touran manufacture in the Auto 5000 GmbH in Wolfsburg as well as the Golf A5 manufacture in Uitenhage in South Africa - all with regard to the level of automation. The target of the analysis is the determination of the optimal level of automation in the three production sites and therefore, the investigation of the potential to automate, or rather to deautomate in particular sections of the assembly in the prevailing production locations. The three production sites are to be investigated with regard to costs, quality and quantity.
- Full Text:
- Date Issued: 2006
Corporate information risk : an information security governance framework
- Authors: Posthumus, Shaun Murray
- Date: 2006
- Subjects: Computer security , Business enterprises -- Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9776 , http://hdl.handle.net/10948/814 , Computer security , Business enterprises -- Computer networks -- Security measures
- Description: Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipulate and transmit sensitive customer and financial information. IT, which involves major risks, may threaten the security if corporate information assets. Therefore, IT requires attention at board level to ensure that technology-related information risks are within an organization’s accepted risk appetite. However, IT issues are a neglected topic at board level and this could bring about enronesque disasters. Therefore, there is a need for the Board of Directors to direct and control IT-related risks effectively to reduce the potential for Information Security breaches and bring about a stronger system of internal control. The IT Oversight Committee is a proven means of achieving this, and this study further motivates the necessity for such a committee to solidify an organization’s Information Security posture among other IT-related issues.
- Full Text:
- Date Issued: 2006
Epirismm: an enterprise information risk management model
- Authors: Lategan, Neil
- Date: 2006
- Subjects: Risk management , Small business , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9734 , http://hdl.handle.net/10948/541 , Risk management , Small business , Information technology -- Security measures
- Description: Today, information is considered a commodity and no enterprise can operate without it. Indeed, the information and the supporting technology are pivotal in all enterprises. However, a major problem being experienced in the business environment is that enterprise risk cannot be managed effectively because business and information-related risk are not congruently aligned with risk management terminology and practices. The business environment and information technology are bound together by information. For this reason, it is imperative that risk management is synergised in the business, ICT (Information and Communication Technology) and information environments. A thorough, all inclusive, risk analysis exercise needs to be conducted in business and supporting environments in order to develop an effective internal control system. Such an internal control system should reduce the exposure of risk and aid the safeguarding of assets. Indeed, in today’s so-called information age, where business processes integrate the business and ICT environments, it is imperative that a unary internal control system be established, based on a holistic risk management exercise. To ensure that the enterprise, information and ICT environments operate free of the risks that threaten them, the risks should be properly governed. A model, EPiRISMM (Enterprise Information Risk Management Model) is proposed that offers to combine risk management practices from an ICT, information, governance, and enterprise perspective because there are so many overlapping aspects inherent in them. EPiRISMM combines various well-known standards and frameworks into one coherent model. By employing EPiRISMM, an enterprise will be able to eliminate the traditional segmented approach of the ICT department and thus eliminate any previous discontinuity in risk management practices.
- Full Text:
- Date Issued: 2006
Evaluating the extent to which Nelson Mandela Metropolitan University (NMMU) libraries meet student expectations
- Authors: Zhibing, Mu
- Date: 2006
- Subjects: Nelson Mandela Metropoliotan University. Library , Academic libraries -- South Africa -- Port Elizabeth -- Evaluation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9351 , http://hdl.handle.net/10948/648 , Nelson Mandela Metropoliotan University. Library , Academic libraries -- South Africa -- Port Elizabeth -- Evaluation
- Description: The failure to evaluate the service quality by comparing service expectations and service perceptions of students requires that the management of NMMU libraries identify the service expectations and service perceptions of students and measure the gaps between these service expectations and service perceptions of students. A literature review was conducted to explore the service expectations and service perceptions of students. An effective method (using the LibQUAL model) to evaluate the service quality of NMMU libraries based on the service expectations of students was described. Thereafter, a LibQUAL survey was used to collect the required empirical data from a convenience sample of 2 047 students enrolled at NMMU. The empirical findings showed that gaps existed between the service expectations and service perceptions of students at different campuses of NMMU. At different campuses of NMMU, the service expectations of students were not met in term of the service perceptions of the four dimensions (affect of service, library as place, information access and personal control) of the LibQUAL model. ii The study identified the gaps between the service expectations and service perceptions of students at different NMMU campuses and conclusions and recommendations based on these gaps were formulated. The management of the NMMU libraries needs to choose appropriate strategies to improve the quality of NMMU library services based on the service expectations of students.
- Full Text:
- Date Issued: 2006
Factors influencing species richness, cover and composition of vegetation on Namaqualand quartz fields
- Authors: Van Tonder, Carlo
- Date: 2006
- Subjects: Plant diversity -- South Africa -- Namaqualand , Soil biology -- South Africa -- Namaqualand
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10752 , http://hdl.handle.net/10948/630 , Plant diversity -- South Africa -- Namaqualand , Soil biology -- South Africa -- Namaqualand
- Description: Quartz fields contribute significantly to plant diversity in the Succulent Karoo biome. They are distinctly different from surrounding habitats and have high levels of plant endemism. Biological soil crusts are features of quartz field soils and fulfill a vital function in that they stabilize soils. It is important for managers of nature reserves and agricultural rangelands to know what factors influence quartz field soils and vegetation. Both stakeholders could benefit from new information that would allow for informed decision-making regarding land-use on quartz fields. The present study took place in the Namaqua National Park that contains a significant proportion of the Riethuis-Wallekraal quartz fields phytochorion. The first part of the study aimed to understand whether certain land-use activities potentially destabilize quartz field soils, which might have possible ramifications for associated biological soil crusts and vegetation. It was followed by relating variation in soil stability with species richness, cover and species composition of quartz field vegetation. Overall, positions assumed to be impacted by land-use activities had less stable soils compared to positions assumed not be impacted. Soil stability had a significant influence on species richness and cover but to a lesser degree on species composition. Quartz field vegetation was significantly influenced by soil physical and chemical properties as well as location in the quartz fields landscape. The second part of the study aimed at understanding how species richness of isolated quartz outcrops is related to their size compared to that of a mainland body of quartz outcrops. No clear species-area relationships emerged from the study. There were significant differences between isolated outcrops and mainland outcrops in substrate and vegetation composition. Findings are discussed in relation to Island Biogeography Theory.
- Full Text:
- Date Issued: 2006
Strategies for Chinese companies to enter the Port Elizabeth sports-shoe market
- Authors: Guo, Zhi
- Date: 2006
- Subjects: Shoe industry -- South Africa -- Port Elizabeth , Business enterprises, Foreign -- South Africa -- Port Elizabeth , Entrepreneurship -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9005 , http://hdl.handle.net/10948/516 , http://hdl.handle.net/10948/d1011691 , Shoe industry -- South Africa -- Port Elizabeth , Business enterprises, Foreign -- South Africa -- Port Elizabeth , Entrepreneurship -- South Africa -- Port Elizabeth
- Description: This research addressed the study of entry strategies by Chinese sports-shoe manufacturers into the South African sports-shoe market. The goal of this research is to investigate what are the appropriate entry strategies for Chinese sports-shoe companies to enter the South African sports-shoe market. A Chinese sports-shoe company, Li Ning Limited, was used as a case study to illustrate the methods to explore appropriate entry strategies. The research methodology included: {u10007A} A literature study to explore the popular entry strategies used to enter the South African and also global markets was conducted. In addition, the South African and Chinese market environments were investigated. {u10007A} An empirical study, a survey of sports-shoe customers and sports-shoe shops owners, was done in order to explore the advisable entry strategies for Chinese sports-shoe companies to enter the South African sports-shoe market. According to the literature study as well as the empirical study, the research explored some advisable entry strategies for Chinese sports-shoe companies into the South African domain.
- Full Text:
- Date Issued: 2006
The cost of free instant messaging: an attack modelling perspective
- Authors: Du Preez, Riekert
- Date: 2006
- Subjects: Computer security , Instant messaging , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9797 , http://hdl.handle.net/10948/499 , http://hdl.handle.net/10948/d1011921 , Computer security , Instant messaging , Data protection
- Description: Instant Messaging (IM) has grown tremendously over the last few years. Even though IM was originally developed as a social chat system, it has found a place in many companies, where it is being used as an essential business tool. However, many businesses rely on free IM and have not implemented a secure corporate IM solution. Most free IM clients were never intended for use in the workplace and, therefore, lack strong security features and administrative control. Consequently, free IM clients can provide attackers with an entry point for malicious code in an organization’s network that can ultimately lead to a company’s information assets being compromised. Therefore, even though free IM allows for better collaboration in the workplace, it comes at a cost, as the title of this dissertation suggests. This dissertation sets out to answer the question of how free IM can facilitate an attack on a company’s information assets. To answer the research question, the dissertation defines an IM attack model that models the ways in which an information system can be attacked when free IM is used within an organization. The IM attack model was created by categorising IM threats using the STRIDE threat classification scheme. The attacks that realize the categorised threats were then modelled using attack trees as the chosen attack modelling tool. Attack trees were chosen because of their ability to model the sequence of attacker actions during an attack. The author defined an enhanced graphical notation that was adopted for the attack trees used to create the IM attack model. The enhanced attack tree notation extends traditional attack trees to allow nodes in the trees to be of different classes and, therefore, allows attack trees to convey more information. During the process of defining the IM attack model, a number of experiments were conducted where IM vulnerabilities were exploited. Thereafter, a case study was constructed to document a simulated attack on an information system that involves the exploitation of IM vulnerabilities. The case study demonstrates how an attacker’s attack path relates to the IM attack model in a practical scenario. The IM attack model provides insight into how IM can facilitate an attack on a company’s information assets. The creation of the attack model for free IM lead to several realizations. The IM attack model revealed that even though the use of free IM clients may seem harmless, such IM clients can facilitate an attack on a company’s information assets. Furthermore, certain IM vulnerabilities may not pose a great risk by themselves, but when combined with the exploitation of other vulnerabilities, a much greater threat can be realized. These realizations hold true to what French playwright Jean Anouilh once said: “What you get free costs too much”.
- Full Text:
- Date Issued: 2006
The effect of different slaughter age regimes on the primary and secondary production parameters of Ostriches (Struthio Camelus Domesticus) and the economic consequences of different slaughter ages
- Authors: Bhiya, Clovis Solomon
- Date: 2006
- Subjects: Slaughtering and slaughter-houses -- South Africa , Ostrich farming -- South Africa , Ostriches -- Breeding -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10735 , http://hdl.handle.net/10948/837 , Slaughtering and slaughter-houses -- South Africa , Ostrich farming -- South Africa , Ostriches -- Breeding -- South Africa
- Description: The South African ostrich industry is presently characterised by a drastic decline in the slaughter price of slaughter birds, due to the drop in the price of meat as well as leather. As a result, the economic viability of ostrich farming is severely hampered by these developments, and many generally accepted industry practices have to be reviewed. Among the practices under review is the possibility of slaughtering ostriches at an earlier age than the traditional slaughter age of 12 - 14 months, in order to minimise feed costs and the incidence of damage to the skin. However, little information is available on the effect of the slaughter age on the yield and quality of the economically important end-products. The effect of slaughter age on production and the economic viability of a commercially intensive ostrich production system was consequently evaluated in a completely randomised experimental design involving two batches (n= 81 and n= 94) of ostriches. The experiments took place at Kromme Rhee experimental farm of the Elsenburg Research Centre near Stellenbosch. The birds were subject to experimental treatment at the age of 4 months (n= 81, from May 2004 to March 2005) and 6 months (n= 94, from August 2004 to August 2005) respectively. The ostriches were randomly divided into 10 groups of between 16 and 20 birds per group. Standard production practices, as applied in an intensive ostrich production unit, were implemented. Clean drinking water and self-mixed grower diet (min 15 percent crude protein, 0.68 percent lysine and 11.4 MJ ME per kg feed) and finisher diet (min 14 percent crude protein, 0.55 percent lysine and 9.8 MJ ME per kg feed) were provided ad libitum to the birds. Birds were slaughtered at the ages of 8.5, 10.5, 12.5, 14.5, and 16.5 months respectively. Data on feed intake and yields of cold carcass, crust skin size, skin grade and total feathers was recorded for birds slaughtered at the respective ages. Data was analysed according to the analysis of variances. Values for meat yield, skin size yield and feed intake were predicted by regression analysis based on experimental values. Industry figures and norms were used as proxy for other production inputs and costs. A gross margin type analysis was performed to evaluate the effect of different slaughter ages on the profitability of each production system. There was a positive correlation between age and feed intake (r2= 0.40), slaughter weight (r2= 0.97), cold carcass yield (r2= 0.48), skin surface area (r2= 0.39), skin grade (r2= 0.19) and total yield of feathers (r2= 0.29). The dry skin grade showed deterioration as slaughter age was prolonged. Highly significant differences (P< 0.01) in slaughter weight, cold carcass yield, skin surface area, dry skin grade and total feathers were detected at the different slaughter ages. There were no significant differences (P> 0.05) with respect to gender for slaughter weight, skin surface area and dry skin grade within the different age groups. Males had significantly higher (P< 0.05) cold carcass yield and total feather yield than their female counterparts. From this study it can be concluded that an increase in slaughter age significantly increases feed intake, slaughter weight, cold carcass yield, and skin surface area. It is also clear that an increase in slaughter age can be detrimental to dry skin grade. The relative income contribution of the three main products (skin: meat: feathers) occurred in a ratio of 47:53:0, 52:47:1, 47:50:3, 44:51:5, 39:56:5 at the respective slaughter ages. Total income revealed an increase of 26 percent from 8.5 to 10.5 months slaughtering, an increase of 4 percent between 10.5 and 12.5 months, and an increase of 11 percent between 12.5 and 14.5 months. The income dropped by 0.3 percent between 14.5 and 16.5 months slaughtering. Total costs increased with slaughter age, particularly feed costs which showed an increase (at a decreasing rate) between the different slaughter ages. The margin above specified cost per bird was the highest for birds slaughtered at the age of 10.5 months. The margin above cost showed a steady decline as birds were slaughtered at higher ages. Slaughtering at 16.5 months revealed a negative margin. To compare the effect of differences in time span on different slaughter age regimes, margin above costs for each system over 5 years were discounted to a present value. In this study, with current feed costs and income from end products, slaughtering at 10.5 months revealed the highest present value for the margin above cost. Furthermore, slaughtering at 16.5 months revealed a negative present value on the margin above cost after 5 years. Financial viability calculations are relevant and valid for data obtained in this case study. Financial viability is however case-specific and may vary between producers, depending on their individual management practices, production systems and cost structures. Results from this study may be of significant value to managerial decision-making in the ostrich industry.
- Full Text:
- Date Issued: 2006
The four cycles of Herakles : towards the visual articulation of myth as psychological process
- Authors: Wentzel, Andrieta
- Date: 2006
- Subjects: Art -- Philosophy , Psychoanalysis and the arts , Mythology -- Psychological aspects
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8500 , http://hdl.handle.net/10948/642 , Art -- Philosophy , Psychoanalysis and the arts , Mythology -- Psychological aspects
- Description: My research involves the reassertion of mythic experience in a manner considered contemporaneously relevant. The relevancy resides in the Jungian assumption that myth structures psychic experience to the benefit of the individual and ultimately, society. To this end, I have taken the hero myth of Heracles, and, by filtering it through Jung’s system promoting psychological maturation, that is what he called the individuation process, I have reconfigured it in fine art form
- Full Text:
- Date Issued: 2006
Towards a framework for corporate information governance
- Authors: Mears, Lynette May
- Date: 2006
- Subjects: Information technology -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9775 , http://hdl.handle.net/10948/820 , Information technology -- Management
- Description: Information is a critical asset without which an organisation could not survive. The adequate and effective governance of this asset is an essential function and is the direct responsibility of the board and senior management. The board and senior management have a responsibility to maintain the financial and material health of their enterprise and this includes setting the proper direction and governance of the information asset. Many organisations have, over the past few years, suffered severe losses and failures due to the inadequate governance and protection of this valuable asset. The reasons for the lack of corporate information governance need to be examined. The board and senior management need to direct and control their organisations effectively, with the appropriate delegation of responsibilities, to reduce the possibility of suffering similar losses and/or failures. The contribution made by this study is illustrated in the designing of a framework and activity plans to facilitate the board in practically implementing an improved corporate information governance process.
- Full Text:
- Date Issued: 2006
Towards the optimization of resolution and rendering issues in the context of contemporary environmental design computer modelling
- Authors: Liu, Peng
- Date: 2006
- Subjects: Architecture -- Environmental aspects -- South Africa , Environmental engineering , City planning , Engineering design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8151 , http://hdl.handle.net/10948/548 , Architecture -- Environmental aspects -- South Africa , Environmental engineering , City planning , Engineering design
- Description: This dissertation sets out to find a pragmatic solution for optimizing both resolution and rendering issues in the context of contemporary environmental design computer modelling. In this regard the following issues are addressed: Firstly, determining (with reference to a limited selection of existing 3DS Max software and plugins (i.e. VRay and Mental-Ray), which specific piece of software produces the best compromise as far as visual accuracy is concerned whilst still offering the designer the best scope for further design manipulation. Secondly, establishing design techniques which can increase the speed of model making as well as reduce rendering time without having an adverse effect on issues such as resolution and image quality. Lastly, ascertaining the least number of surfaces for a typical geometrical shape (e.g. chair, table, ornament etc.) without losing visual veracity by manipulation of the design itself. The research strongly supports the notion that VRay is the best overall software to be employed as a base before applying any design solutions. In this latter regard a number of solutions became evident as a means to both save memory and cut down on rendering time, including such factors as using spotlight rather than an omni light when rendering, because omni light calculations include the generation of needless shadows. The beneficial effect of employing ‘target direct’ light and reducing the area of light in order to decrease the calculation of shadow. Eliminating objects which do not need shadows from the lighting calculation and shutting off the reverberation and refraction factors before rendering. It was also confirmed that a black and white mipmap is better than a colour mipmap as far as saving on the system’s memory.
- Full Text:
- Date Issued: 2006
Work methods and procedures for plague surveillance and control in South Africa
- Authors: Zhou, Hongxing
- Date: 2006
- Subjects: Plague -- South Africa , Plague -- Vaccination
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9833 , http://hdl.handle.net/10948/649 , Plague -- South Africa , Plague -- Vaccination
- Description: Plague is a classic zoonosis caused by the bacterium Yersinia pestis and is subject to the International Health Regulations, 1969. In the last two millennia, plague has become widespread, with three pandemics occurring in the 6th, 14th and 20th centuries. Currently, plague outbreaks and epidemics still occur worldwide. This study attempts to develop formal work methods and procedures for plague surveillance and control by environmental health practitioners as a strategy to ensure that field data can be integrated within the municipal, provincial and national spheres of government. A qualitative, explorative, descriptive, inductive and deductive research design was followed. A documentary research approach was employed as the primary method of data collection. To obtain additional information, both semi-structured personal interviews and physical observations during plague surveillance were adopted by the researcher. The organisational structure of the health care system in South Africa was analysed to identify and explain the role and functions of relevant decision-makers related to the surveillance and control of plague within the different spheres of government. Legislative measures regarding plague surveillance and control were also presented. As a prerequisite for the development of work methods and procedures for plague surveillance and control, the epidemiology of plague was discussed with emphasis on the distribution and characteristics of the disease in South Africa. Important rodent reservoirs and flea vectors of plague in South Africa were identified. Clinical manifestations, diagnosis and treatment of plague were described and discussed. Within this qualitative study an attempt has been made to develop work methods (xiii) and procedures for plague surveillance and control in South Africa. Relevant field data forms to be used during plague surveillance and control strategies were also developed. Recommendations emanating from the study can be found in the final chapter.
- Full Text:
- Date Issued: 2006