Procurement challenges faced by Eskom contractors during the tender stage
- Authors: Hlalutye, Thandiwe
- Date: 2018
- Subjects: Management -- Procurement -- South Africa -- Northern Cape , Project management -- South Africa -- Northern Cape Contractors' operation -- South Africa -- Northern Cape -- Finance
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/30260 , vital:30913
- Description: The procurement process within South Africa has become an increasing focus in open market access for local economic development. The government introduced Preferential Procurement Policy Frame Act 5 of 2000 (PPPFA) which must be followed by all government owned organisations, including parastatals. Eskom, therefore, has to abide to this regulation and, since it started utilising the Act in its tendering process, there has been a challenge to getting contractors who are commercially and technically approved to be able to execute work or projects. The aim of this study is to examine challenges faced by Eskom Northern Cape Operating Unit contractors during the tender stage in terms of tender requirements, whereby they fail to submit all required tender returnables and fail to meet a set threshold in order to be successful and being awarded with the contract. This study undertook an empirical study using a case study of Eskom after a literature review. A questionnaire was used to collect data from all the active contractors on the Eskom Northern Cape Operating Unit data base. The key findings included that; contractors agreed that they still lack understanding of a quality management system. However they disagreed that they are not complying with safety health and environment and that they lack knowledge of technical requirements which leads them to not submitting objective evidence. The study concluded that contracting firms still do not comply with procurement requirements during the tender stage.
- Full Text:
- Date Issued: 2018
- Authors: Hlalutye, Thandiwe
- Date: 2018
- Subjects: Management -- Procurement -- South Africa -- Northern Cape , Project management -- South Africa -- Northern Cape Contractors' operation -- South Africa -- Northern Cape -- Finance
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/30260 , vital:30913
- Description: The procurement process within South Africa has become an increasing focus in open market access for local economic development. The government introduced Preferential Procurement Policy Frame Act 5 of 2000 (PPPFA) which must be followed by all government owned organisations, including parastatals. Eskom, therefore, has to abide to this regulation and, since it started utilising the Act in its tendering process, there has been a challenge to getting contractors who are commercially and technically approved to be able to execute work or projects. The aim of this study is to examine challenges faced by Eskom Northern Cape Operating Unit contractors during the tender stage in terms of tender requirements, whereby they fail to submit all required tender returnables and fail to meet a set threshold in order to be successful and being awarded with the contract. This study undertook an empirical study using a case study of Eskom after a literature review. A questionnaire was used to collect data from all the active contractors on the Eskom Northern Cape Operating Unit data base. The key findings included that; contractors agreed that they still lack understanding of a quality management system. However they disagreed that they are not complying with safety health and environment and that they lack knowledge of technical requirements which leads them to not submitting objective evidence. The study concluded that contracting firms still do not comply with procurement requirements during the tender stage.
- Full Text:
- Date Issued: 2018
The simulation of vehicle engine cooling in a climatic chamber
- Authors: Badenhorst, Kenneth Merwin
- Date: 2011
- Subjects: Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9615 , http://hdl.handle.net/10948/1454 , Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Description: The simulation of vehicle engine cooling validation in a Climatic chamber will benefit all vehicle manufacturers that are responsible for the design or the localization of parts used in a vehicle's engine cooling system. The ability to test the vehicle in-house allows testing at any time of the year; it provides repeatable and comparative data, and accelerates component level approval, which in itself reduces program timing and cost. For this dissertation road level testing was conducted in Upington using a TD1200 Superflow towing dynamometer, while the in-house testing was performed on a ROTOTEST chassis dynamometer in a Climatic chamber. All tests were conducted according to GENERAL MOTORS SOUTH AFRICA global testing standards. Statistical analyses of the test data were used to determine the relationship between parameters measured and results obtained. The major contributors to the simulation process was identified and implemented to improve measurement quality and test results. The result was an accurate simulation between road and chamber testing, hence the possibility of moving away from road testing and conduct simulated chamber testing. The presented dissertation is useful for the understanding of basic vehicle cooling testing and the methodology of simulated testing in an environmentally controlled chamber.
- Full Text:
- Date Issued: 2011
- Authors: Badenhorst, Kenneth Merwin
- Date: 2011
- Subjects: Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9615 , http://hdl.handle.net/10948/1454 , Automobiles -- Motors -- Cooling systems , Automobiles -- Air conditioning
- Description: The simulation of vehicle engine cooling validation in a Climatic chamber will benefit all vehicle manufacturers that are responsible for the design or the localization of parts used in a vehicle's engine cooling system. The ability to test the vehicle in-house allows testing at any time of the year; it provides repeatable and comparative data, and accelerates component level approval, which in itself reduces program timing and cost. For this dissertation road level testing was conducted in Upington using a TD1200 Superflow towing dynamometer, while the in-house testing was performed on a ROTOTEST chassis dynamometer in a Climatic chamber. All tests were conducted according to GENERAL MOTORS SOUTH AFRICA global testing standards. Statistical analyses of the test data were used to determine the relationship between parameters measured and results obtained. The major contributors to the simulation process was identified and implemented to improve measurement quality and test results. The result was an accurate simulation between road and chamber testing, hence the possibility of moving away from road testing and conduct simulated chamber testing. The presented dissertation is useful for the understanding of basic vehicle cooling testing and the methodology of simulated testing in an environmentally controlled chamber.
- Full Text:
- Date Issued: 2011
A framework for m-voting implementation in South Africa
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
Establishing an information security culture in organizations : an outcomes based education approach
- Van Niekerk, Johannes Frederick
- Authors: Van Niekerk, Johannes Frederick
- Date: 2005
- Subjects: Computer security , Management information systems -- Security measures , Competency-based education
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9742 , http://hdl.handle.net/10948/164 , Computer security , Management information systems -- Security measures , Competency-based education
- Description: Information security is crucial to the continuous well-being of modern orga- nizations. Humans play a signfiicant role in the processes needed to secure an organization's information resources. Without an adequate level of user co-operation and knowledge, many security techniques are liable to be misused or misinterpreted by users. This may result in an adequate security measure becoming inadequate. It is therefor necessary to educate the orga- nization's employees regarding information security and also to establish a corporate sub-culture of information security in the organization, which will ensure that the employees have the correct attitude towards their security responsibilities. Current information security education programs fails to pay su±cient attention to the behavioral sciences. There also exist a lack of knowledge regarding the principles, and processes, that would be needed for the establishment of an corporate sub-culture, specific to information security. Without both the necessary knowledge, and the desired attitude amongst the employee, it will be impossible to guarantee that the organi- zation's information resources are secure. It would therefor make sense to address both these dimensions to the human factor in information security, using a single integrated, holistic approach. This dissertation presents such an approach, which is based on an integration of sound behavioral theories.
- Full Text:
- Date Issued: 2005
Establishing an information security culture in organizations : an outcomes based education approach
- Authors: Van Niekerk, Johannes Frederick
- Date: 2005
- Subjects: Computer security , Management information systems -- Security measures , Competency-based education
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9742 , http://hdl.handle.net/10948/164 , Computer security , Management information systems -- Security measures , Competency-based education
- Description: Information security is crucial to the continuous well-being of modern orga- nizations. Humans play a signfiicant role in the processes needed to secure an organization's information resources. Without an adequate level of user co-operation and knowledge, many security techniques are liable to be misused or misinterpreted by users. This may result in an adequate security measure becoming inadequate. It is therefor necessary to educate the orga- nization's employees regarding information security and also to establish a corporate sub-culture of information security in the organization, which will ensure that the employees have the correct attitude towards their security responsibilities. Current information security education programs fails to pay su±cient attention to the behavioral sciences. There also exist a lack of knowledge regarding the principles, and processes, that would be needed for the establishment of an corporate sub-culture, specific to information security. Without both the necessary knowledge, and the desired attitude amongst the employee, it will be impossible to guarantee that the organi- zation's information resources are secure. It would therefor make sense to address both these dimensions to the human factor in information security, using a single integrated, holistic approach. This dissertation presents such an approach, which is based on an integration of sound behavioral theories.
- Full Text:
- Date Issued: 2005
A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
Management of material waste and cost overrun in the Nigerian construction industry
- Authors: Saidu, Ibrahim
- Date: 2016
- Subjects: Construction industry -- Materials management -- Nigeria , Construction industry -- Nigeria -- Management
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/3792 , vital:20463
- Description: While wastage of materials has become a serious problem requiring urgent attention in the Nigerian Construction Industry, cost overrun is a problem, which affects 90 percent of the completed projects in the world; the argument on how to reduce/eliminate cost overrun has been on-going for the past 70 years; as the on-site wastage of materials leads to increases in the final project cost. Studies from different parts of the world have shown that construction-material waste represents a relatively large percentage of the production costs. Consequently, as a result of low levels of awareness, the Nigerian construction industry pays little attention to the effects of generated material waste on cost overruns. Thus, this research aimed to investigate the relationship between material waste and cost overrun in the Nigerian construction industry. A comprehensive review of the related literature revealed that all material waste causes are related to cost overrun causes at both pre-contract and post-contract stages of a project; but not vice versa. The mixed method (quantitative and qualitative) approach that is rooted in the positivist paradigm was adopted for this study. Abuja, the federal capital territory of Nigeria was the selected geographical scope of this research, out of which thirty-one (31) construction projects were purposeful selected (projects to the value of 100 million Rand/1.6 billion Naira and above).The research instrument was an interview guide used in conjunction with a tick box. Other sources of data included field investigation (measurement of onsite material waste) and the collection of archival records from bills of quantities, project records, and specifications. Analyses of the findings lead to the conclusion that a relationship exists between material waste and cost overrun; at the pre-contract and at the post-contract stages of a project. The implication is that an increase in material wastage on-site leads to a corresponding increase in the amount of cost overrun, regardless of the percentage allowance for material waste in the process of bill preparation. The study also concluded that the average percentage contribution of material waste to project-cost overruns is four (4) percent. Material-waste sources, causes, and control measures were found to have significant effects (very high, high, medium, low, and very low), in causing or minimising cost overruns at both pre-contract and post-contract stages of projects. The research has developed a conceptual model for the management of material waste and cost overruns in the construction industry based on the results and informed by the theoretical framework. The research has also developed a mathematical model for quantifying the amount of material waste to be generated by a project; as well as a mathematical equation for the effective management of material waste and cost overrun for projects. The study has achieved its aim of establishing an understanding of the issues leading to the relationship between material waste and cost overruns, as well as their management in the Nigerian construction industry. The study recommends that the management of material waste and cost overrun should be revised, based on the findings of this research and included as part of the procurement process. The mathematical models for quantification of onsite material waste, and the mathematical equation for managing material waste and cost overruns developed in the study, could be usefully adopted to improve management of material waste and cost overrun in the Nigerian construction industry.
- Full Text:
- Date Issued: 2016
- Authors: Saidu, Ibrahim
- Date: 2016
- Subjects: Construction industry -- Materials management -- Nigeria , Construction industry -- Nigeria -- Management
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/3792 , vital:20463
- Description: While wastage of materials has become a serious problem requiring urgent attention in the Nigerian Construction Industry, cost overrun is a problem, which affects 90 percent of the completed projects in the world; the argument on how to reduce/eliminate cost overrun has been on-going for the past 70 years; as the on-site wastage of materials leads to increases in the final project cost. Studies from different parts of the world have shown that construction-material waste represents a relatively large percentage of the production costs. Consequently, as a result of low levels of awareness, the Nigerian construction industry pays little attention to the effects of generated material waste on cost overruns. Thus, this research aimed to investigate the relationship between material waste and cost overrun in the Nigerian construction industry. A comprehensive review of the related literature revealed that all material waste causes are related to cost overrun causes at both pre-contract and post-contract stages of a project; but not vice versa. The mixed method (quantitative and qualitative) approach that is rooted in the positivist paradigm was adopted for this study. Abuja, the federal capital territory of Nigeria was the selected geographical scope of this research, out of which thirty-one (31) construction projects were purposeful selected (projects to the value of 100 million Rand/1.6 billion Naira and above).The research instrument was an interview guide used in conjunction with a tick box. Other sources of data included field investigation (measurement of onsite material waste) and the collection of archival records from bills of quantities, project records, and specifications. Analyses of the findings lead to the conclusion that a relationship exists between material waste and cost overrun; at the pre-contract and at the post-contract stages of a project. The implication is that an increase in material wastage on-site leads to a corresponding increase in the amount of cost overrun, regardless of the percentage allowance for material waste in the process of bill preparation. The study also concluded that the average percentage contribution of material waste to project-cost overruns is four (4) percent. Material-waste sources, causes, and control measures were found to have significant effects (very high, high, medium, low, and very low), in causing or minimising cost overruns at both pre-contract and post-contract stages of projects. The research has developed a conceptual model for the management of material waste and cost overruns in the construction industry based on the results and informed by the theoretical framework. The research has also developed a mathematical model for quantifying the amount of material waste to be generated by a project; as well as a mathematical equation for the effective management of material waste and cost overrun for projects. The study has achieved its aim of establishing an understanding of the issues leading to the relationship between material waste and cost overruns, as well as their management in the Nigerian construction industry. The study recommends that the management of material waste and cost overrun should be revised, based on the findings of this research and included as part of the procurement process. The mathematical models for quantification of onsite material waste, and the mathematical equation for managing material waste and cost overruns developed in the study, could be usefully adopted to improve management of material waste and cost overrun in the Nigerian construction industry.
- Full Text:
- Date Issued: 2016
Analysing the effect of FSP on MIG-laser hybrid welded 6082-T6 AA joints
- Authors: Mjali, Kadephi Vuyolwethu
- Date: 2007
- Subjects: Friction stir welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9610 , http://hdl.handle.net/10948/563 , Friction stir welding
- Description: Friction Stir Processing (FSP) of aluminium alloys has been used to modify and improve the microstructure and relevant properties of fusion welded aluminium alloys. The effect of FSP on MIG-Laser Hybrid (MLH) welded aluminium alloy 6082-T6 mechanical and microstructural properties has been studied in this research. The FSP process was used on 6mm thick aluminium alloy plates and a tool was designed specifically for FSP, and the effect of varying speeds was analysed before the final FSP welds were made. The effect of FSP was analysed by optical microscopy, tensile, microhardness and fatigue testing. The aim of the study was to determine whether the FSP process has a beneficial influence on the mechanical properties and metallurgical integrity of MIG-Laser Hybrid welded 6082-T6 aluminium alloy with varying gap tolerances. Three welding processes were compared, namely combined Friction Stir Processing on MIG-Laser hybrid process (FSP-MLH), MLH and Friction Stir Welding (FSW) as part of the analysis. (FSP was carried out on MLH components when it was found that FSP is not an entirely complete welding process but rather a finishing process per se.) The aim of this dissertation is to investigate the effects of the FSP process on the weld quality of MLH welded joints and also to compare this to individual processes like FSW and MLH. This investigation was undertaken in order to gain an understanding of the effect of these processes on fatigue performance and microhardness distribution on aluminium alloy 6082-T6 weld joints.
- Full Text:
- Date Issued: 2007
- Authors: Mjali, Kadephi Vuyolwethu
- Date: 2007
- Subjects: Friction stir welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9610 , http://hdl.handle.net/10948/563 , Friction stir welding
- Description: Friction Stir Processing (FSP) of aluminium alloys has been used to modify and improve the microstructure and relevant properties of fusion welded aluminium alloys. The effect of FSP on MIG-Laser Hybrid (MLH) welded aluminium alloy 6082-T6 mechanical and microstructural properties has been studied in this research. The FSP process was used on 6mm thick aluminium alloy plates and a tool was designed specifically for FSP, and the effect of varying speeds was analysed before the final FSP welds were made. The effect of FSP was analysed by optical microscopy, tensile, microhardness and fatigue testing. The aim of the study was to determine whether the FSP process has a beneficial influence on the mechanical properties and metallurgical integrity of MIG-Laser Hybrid welded 6082-T6 aluminium alloy with varying gap tolerances. Three welding processes were compared, namely combined Friction Stir Processing on MIG-Laser hybrid process (FSP-MLH), MLH and Friction Stir Welding (FSW) as part of the analysis. (FSP was carried out on MLH components when it was found that FSP is not an entirely complete welding process but rather a finishing process per se.) The aim of this dissertation is to investigate the effects of the FSP process on the weld quality of MLH welded joints and also to compare this to individual processes like FSW and MLH. This investigation was undertaken in order to gain an understanding of the effect of these processes on fatigue performance and microhardness distribution on aluminium alloy 6082-T6 weld joints.
- Full Text:
- Date Issued: 2007
A model for role-based security education, training and awareness in the South African healthcare environment
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
Causes and effects of non-payment of residential property rates in Mahikeng
- Authors: Asianoah, Rexford Kofi
- Date: 2014
- Subjects: Debts, Public -- South Africa -- Mahikeng , Municipal default -- South Africa -- Mahikeng , Public utilities -- South Africa -- Mahikeng , Collecting of accounts -- South Africa -- Mahikeng
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9674 , http://hdl.handle.net/10948/d1020076
- Description: One of the major sources of income to South African Municipalities is property rates. Income generated from property rates is meant to develop and deliver services to residents living in the said Municipal area. The main aim of the research was to identify the causes and effects of the non-payment of residential property rates, and also to develop workable strategies to maximise the collection of residential property rates in order to ensure developmental growth sustenance, specifically in Mahikeng Municipal area. Related literature was reviewed on the non-financial viability of Municipalities, maintenance of public infrastructure, service delivery and Municipal development plans in establishing the relationship with non-payment of residential property rates. Four hypotheses were set to guide the research with two testing positive with high level of confidence using the chi square method of testing. The research methodology employed in the research was mainly quantitative where the results and findings obtained from the questionnaire were statistically analysed. The research revealed that: The Mahikeng Local Municipality has failed to find the right medium to send rates bills to clients on time, is not taking active responsibility to recover rates debts, does not provide quality service delivery and the reluctance by locals to pay their property rates. The effects thereof, are the inability of the Municipality to deliver effective and efficient services, lack of maintenance of public infrastructure and development in the area. By implementing various options such as email, sms and the post to send rates bills to property owners, by employing different payment options, for example debit orders, transfers, bank deposits and discounts for property owners and embarking on periodic public awareness campaigns in educating the community regarding the importance of payment of property rates could serve as effective mechanisms to address the non-payment of residential property rates faced by the Mahikeng Local Municipality.
- Full Text:
- Date Issued: 2014
- Authors: Asianoah, Rexford Kofi
- Date: 2014
- Subjects: Debts, Public -- South Africa -- Mahikeng , Municipal default -- South Africa -- Mahikeng , Public utilities -- South Africa -- Mahikeng , Collecting of accounts -- South Africa -- Mahikeng
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9674 , http://hdl.handle.net/10948/d1020076
- Description: One of the major sources of income to South African Municipalities is property rates. Income generated from property rates is meant to develop and deliver services to residents living in the said Municipal area. The main aim of the research was to identify the causes and effects of the non-payment of residential property rates, and also to develop workable strategies to maximise the collection of residential property rates in order to ensure developmental growth sustenance, specifically in Mahikeng Municipal area. Related literature was reviewed on the non-financial viability of Municipalities, maintenance of public infrastructure, service delivery and Municipal development plans in establishing the relationship with non-payment of residential property rates. Four hypotheses were set to guide the research with two testing positive with high level of confidence using the chi square method of testing. The research methodology employed in the research was mainly quantitative where the results and findings obtained from the questionnaire were statistically analysed. The research revealed that: The Mahikeng Local Municipality has failed to find the right medium to send rates bills to clients on time, is not taking active responsibility to recover rates debts, does not provide quality service delivery and the reluctance by locals to pay their property rates. The effects thereof, are the inability of the Municipality to deliver effective and efficient services, lack of maintenance of public infrastructure and development in the area. By implementing various options such as email, sms and the post to send rates bills to property owners, by employing different payment options, for example debit orders, transfers, bank deposits and discounts for property owners and embarking on periodic public awareness campaigns in educating the community regarding the importance of payment of property rates could serve as effective mechanisms to address the non-payment of residential property rates faced by the Mahikeng Local Municipality.
- Full Text:
- Date Issued: 2014
Factors impacting Tablet PC usage in low-income communities
- Authors: Meiring, Natalie
- Date: 2014
- Subjects: Information technology -- Economic aspects , Information technology -- Social aspects
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/4642 , vital:20625
- Description: The purpose of this research was to identify factors that impact on tablet PC usage in low-income communities. In order to determine and identify these factors a main research question and sub-research questions were formulated. The primary research question of this study was "What factors impact on tablet PC usage in low-income communities?" This main research question was answered by creating three sub-research questions followed by triangulating the results from these questions. The first sub-research question was aimed at determining whether prior exposure to touch screen technology impacts the user experience. In order to reach this objective an extensive literature review was conducted on the tablet PC landscape in South Africa. This literature review, coupled with the case study helped answer this first research question. The second sub-research question was concerned with determining whether existing user experience guidelines are relevant to South African users. A thorough literature review was conducted on user experience guidelines and related studies. This literature review, together with the results from the case study helped answer this second research question. The third sub-research question involved identifying specific factors which help improve the user experience of tablet PC users in a specific context. This research question was addressed in the case study. Each sub-research question provided results which were analysed in order to answer the main research question. The factors which impact on tablet PC usage were thus identified and recommendations were proposed.
- Full Text:
- Date Issued: 2014
- Authors: Meiring, Natalie
- Date: 2014
- Subjects: Information technology -- Economic aspects , Information technology -- Social aspects
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/4642 , vital:20625
- Description: The purpose of this research was to identify factors that impact on tablet PC usage in low-income communities. In order to determine and identify these factors a main research question and sub-research questions were formulated. The primary research question of this study was "What factors impact on tablet PC usage in low-income communities?" This main research question was answered by creating three sub-research questions followed by triangulating the results from these questions. The first sub-research question was aimed at determining whether prior exposure to touch screen technology impacts the user experience. In order to reach this objective an extensive literature review was conducted on the tablet PC landscape in South Africa. This literature review, coupled with the case study helped answer this first research question. The second sub-research question was concerned with determining whether existing user experience guidelines are relevant to South African users. A thorough literature review was conducted on user experience guidelines and related studies. This literature review, together with the results from the case study helped answer this second research question. The third sub-research question involved identifying specific factors which help improve the user experience of tablet PC users in a specific context. This research question was addressed in the case study. Each sub-research question provided results which were analysed in order to answer the main research question. The factors which impact on tablet PC usage were thus identified and recommendations were proposed.
- Full Text:
- Date Issued: 2014
Integrating sustainability principles in construction health and safety management practices in Zimbabwe
- Authors: Chigara, Benviolent
- Date: 2018
- Subjects: Sustainable construction -- Zimbabwe , Construction industry -- Safety measures Industrial safety -- Zimbabwe -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/23459 , vital:30565
- Description: The construction industry is an important industry to national development through the provision of infrastructure and creation of employment, and hence contributing to sustainable development. Nevertheless, the construction industry has a poor health and safety (H&S) and environmental record. Globally, the construction industry is a leading contributor to workplace fatalities, injuries, and disease. In Zimbabwe, the Millennium Towers accident, which resulted in 15 construction workers losing their lives, compromised the integrity of construction H&S management, and highlighted the need to improve H&S management in the sector. This study examined H&S management in Zimbabwe and developed a framework for integrating sustainability into H&S management practices. The study employed a mixed method research design involving the use of interviews and questionnaires to collect primary data from contractors, consultants, government, clients, and workers in Harare and Bulawayo. A total of 101 questionnaires were successfully completed and analysed, representing a response rate of 55.6%. The data from questionnaires were analysed with the help of the SPSS software v.23 to produce descriptive and inferential statistics. The results of the study suggest that H&S practices are inadequate as demonstrated by the extent to which workers are exposed to hazards and the occurrence of injuries, disease, and fatalities. The factors contributing to workers’ exposure to hazards and the occurrence of injuries, disease, and fatalities include, inter alia, inadequate planning for H&S, inadequate hazard identification and risk assessments (HIRAs), inadequate management of hazards, inadequate occupational health (OH) surveillance, appointment of stakeholders who do not systematically manage H&S, inadequate design HIRAs, and unsafe work practices. The problem is amplified by inadequate integration of H&S within procurement systems, which limit the extent to which contractors make financial provision for H&S. Regrettably, workplace fatalities, injuries, and disease diminish the quality of life for the injured workers, increase project cost and delays project completion. Against this background, the study investigated the integration of sustainability principles in construction H&S as a strategy to improve H&S practices in Zimbabwe. The outcome of that investigation was a strategy and interventions, and a framework for improved practices in the form of a Sustainability Framework for Construction H&S (SFCHS). The validation of the SFCHS by construction practitioners confirms the importance of the recommended practices to reducing workplace fatalities, injuries, and disease in Zimbabwe and beyond. The development of a SFCHS, as a strategy to improve H&S practices in Zimbabwe, and the validation thereof, resulted in a significant contribution to the related body of knowledge. Nevertheless, the transition to sustainable H&S practices require contractors, consultants, government, clients and workers to take a proactive role relative to the recommended practices in the SFCHS. Further studies can explore the responsiveness of sustainability factors relative to the occurrence of injuries, disease and fatalities based on selected case studies.
- Full Text:
- Date Issued: 2018
- Authors: Chigara, Benviolent
- Date: 2018
- Subjects: Sustainable construction -- Zimbabwe , Construction industry -- Safety measures Industrial safety -- Zimbabwe -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/23459 , vital:30565
- Description: The construction industry is an important industry to national development through the provision of infrastructure and creation of employment, and hence contributing to sustainable development. Nevertheless, the construction industry has a poor health and safety (H&S) and environmental record. Globally, the construction industry is a leading contributor to workplace fatalities, injuries, and disease. In Zimbabwe, the Millennium Towers accident, which resulted in 15 construction workers losing their lives, compromised the integrity of construction H&S management, and highlighted the need to improve H&S management in the sector. This study examined H&S management in Zimbabwe and developed a framework for integrating sustainability into H&S management practices. The study employed a mixed method research design involving the use of interviews and questionnaires to collect primary data from contractors, consultants, government, clients, and workers in Harare and Bulawayo. A total of 101 questionnaires were successfully completed and analysed, representing a response rate of 55.6%. The data from questionnaires were analysed with the help of the SPSS software v.23 to produce descriptive and inferential statistics. The results of the study suggest that H&S practices are inadequate as demonstrated by the extent to which workers are exposed to hazards and the occurrence of injuries, disease, and fatalities. The factors contributing to workers’ exposure to hazards and the occurrence of injuries, disease, and fatalities include, inter alia, inadequate planning for H&S, inadequate hazard identification and risk assessments (HIRAs), inadequate management of hazards, inadequate occupational health (OH) surveillance, appointment of stakeholders who do not systematically manage H&S, inadequate design HIRAs, and unsafe work practices. The problem is amplified by inadequate integration of H&S within procurement systems, which limit the extent to which contractors make financial provision for H&S. Regrettably, workplace fatalities, injuries, and disease diminish the quality of life for the injured workers, increase project cost and delays project completion. Against this background, the study investigated the integration of sustainability principles in construction H&S as a strategy to improve H&S practices in Zimbabwe. The outcome of that investigation was a strategy and interventions, and a framework for improved practices in the form of a Sustainability Framework for Construction H&S (SFCHS). The validation of the SFCHS by construction practitioners confirms the importance of the recommended practices to reducing workplace fatalities, injuries, and disease in Zimbabwe and beyond. The development of a SFCHS, as a strategy to improve H&S practices in Zimbabwe, and the validation thereof, resulted in a significant contribution to the related body of knowledge. Nevertheless, the transition to sustainable H&S practices require contractors, consultants, government, clients and workers to take a proactive role relative to the recommended practices in the SFCHS. Further studies can explore the responsiveness of sustainability factors relative to the occurrence of injuries, disease and fatalities based on selected case studies.
- Full Text:
- Date Issued: 2018
Wireless rotational process monitoring system
- Authors: Odendaal, Morné
- Date: 2011
- Subjects: Manufacturing processes -- Automation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9599 , http://hdl.handle.net/10948/1347 , Manufacturing processes -- Automation
- Description: The manufacturing industry is constantly looking for ways to reduce production costs and at the same time to increase productivity. Automation of common manufacturing operations is one of these methods. By automating common manufacturing operations; various machines, robots, control systems and information technologies are used to reduce the overall human input requirement (mental and physical). Recent advances in technology have made it possible to now also automate (or facilitate) the maintenance requirement of these machines and tools. Modern tools and machines, which can estimate when it will fail or when failure is imminent have obvious advantages for predictive maintenance purposes. Another function of this technology is to determine how efficiently a tool or machine operates, or what the quality of the produced goods is. Predictive maintenance can decrease manufacturing plant or machine down times – which have a positive effect on cost-savings – has gained considerable importance over the last two decades.
- Full Text:
- Date Issued: 2011
- Authors: Odendaal, Morné
- Date: 2011
- Subjects: Manufacturing processes -- Automation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9599 , http://hdl.handle.net/10948/1347 , Manufacturing processes -- Automation
- Description: The manufacturing industry is constantly looking for ways to reduce production costs and at the same time to increase productivity. Automation of common manufacturing operations is one of these methods. By automating common manufacturing operations; various machines, robots, control systems and information technologies are used to reduce the overall human input requirement (mental and physical). Recent advances in technology have made it possible to now also automate (or facilitate) the maintenance requirement of these machines and tools. Modern tools and machines, which can estimate when it will fail or when failure is imminent have obvious advantages for predictive maintenance purposes. Another function of this technology is to determine how efficiently a tool or machine operates, or what the quality of the produced goods is. Predictive maintenance can decrease manufacturing plant or machine down times – which have a positive effect on cost-savings – has gained considerable importance over the last two decades.
- Full Text:
- Date Issued: 2011
Risk management practices on public sector construction projects: Case studies in Lesotho
- Authors: Nketekete, Molefi
- Date: 2016
- Subjects: Construction industry -- Risk management Construction industry -- Lesotho Risk management -- Lesotho
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/11228 , vital:26900
- Description: Risk management (RM) is a knowledge area in project management (PM). The challenges of project complexity require astute RM. However, RM practices in Lesotho appear to lag behind international trends. Within the sub-Sahara African region, RM incompetence affects timely delivery of public projects owing to PM practices that do not address risks. This study, which adopts a case study approach, unravels the „how and why‟ of contemporary RM practices which are lacking in Lesotho, despite a poor record of project success in the construction industry. Through the reviewed literature and primary data collection, this study investigates three elements in order to determine the level of RM practice within Lesotho public sector construction projects. These elements were the basis of RM, the RM processes, and the peoples‟ perceptions which were essentially centred on the probability of risk and the impact thereof. The results from the study achieved through cross-case synthesis show that the level of RM practice in the Lesotho public sector construction projects is at variance with international practice. The notable gaps in practice include construction professionals who do not know about or who have not practiced project RM. The study thus propose that the Government of Lesotho (GoL) should invest in educating more people in the areas of construction project management or engage professionals with extensive project RM experience. The recommended initiatives should promote professionalism and accountability that are essential for bracing the RM practice in public sector construction projects.
- Full Text:
- Date Issued: 2016
- Authors: Nketekete, Molefi
- Date: 2016
- Subjects: Construction industry -- Risk management Construction industry -- Lesotho Risk management -- Lesotho
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/11228 , vital:26900
- Description: Risk management (RM) is a knowledge area in project management (PM). The challenges of project complexity require astute RM. However, RM practices in Lesotho appear to lag behind international trends. Within the sub-Sahara African region, RM incompetence affects timely delivery of public projects owing to PM practices that do not address risks. This study, which adopts a case study approach, unravels the „how and why‟ of contemporary RM practices which are lacking in Lesotho, despite a poor record of project success in the construction industry. Through the reviewed literature and primary data collection, this study investigates three elements in order to determine the level of RM practice within Lesotho public sector construction projects. These elements were the basis of RM, the RM processes, and the peoples‟ perceptions which were essentially centred on the probability of risk and the impact thereof. The results from the study achieved through cross-case synthesis show that the level of RM practice in the Lesotho public sector construction projects is at variance with international practice. The notable gaps in practice include construction professionals who do not know about or who have not practiced project RM. The study thus propose that the Government of Lesotho (GoL) should invest in educating more people in the areas of construction project management or engage professionals with extensive project RM experience. The recommended initiatives should promote professionalism and accountability that are essential for bracing the RM practice in public sector construction projects.
- Full Text:
- Date Issued: 2016
The influence of briefing on Eastern Cape government project outcomes
- Authors: Binqela, Lukhanyo
- Date: 2019
- Subjects: Government projects -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/44562 , vital:38128
- Description: South African Government projects are frequently completed with large cost overruns, extended schedules, quality concerns and an increase in emerging contractors making a significant loss in projects they undertake. The construction phase has been the focus of many studies on the causes of unfavourable project outcomes. However, the crucial stages in the construction process that influence the success of a project are the early ones. This is where major decisions that influence the features and form of a project occur. This study, which adopts a case study approach, aims to establish the influence of the brief development process on the outcome of Government projects in the Eastern Cape. Through the reviewed literature and primary data collection, the study aimed at establishing the influence of the brief that is utilised for a need analysis, to define a detailed scope of works, stakeholder engagement and the time management on Eastern Cape Government project outcomes. The Sarah Baartman district was the selected geographical scope of research. Five projects were selected; these included three schools, one emergency medical service facility and one office facility. The study revealed that Eastern Cape Government projects brief development is based on the client department 2013 Published Norms and Standards for state buildings and a need analysis for other stakeholders is not considered. The study further revealed that there is no stakeholder management in government projects; therefore, there is no stakeholder engagement plan during the brief development. The study further revealed that government time management is suboptimal because stakeholder needs are not realised. The research also found that Eastern Cape Government projects do not achieve stakeholder satisfaction and are delivered late. However, some Government projects are able to meet the desired quality and are within budget. The study thus proposes that the Eastern Cape Government projects need to adopt the dynamic brief development process and implement stakeholder management. The brief development process should be an ongoing process extending throughout the project life cycle responding in an innovative manner to emerging stakeholder requirements.
- Full Text:
- Date Issued: 2019
- Authors: Binqela, Lukhanyo
- Date: 2019
- Subjects: Government projects -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/44562 , vital:38128
- Description: South African Government projects are frequently completed with large cost overruns, extended schedules, quality concerns and an increase in emerging contractors making a significant loss in projects they undertake. The construction phase has been the focus of many studies on the causes of unfavourable project outcomes. However, the crucial stages in the construction process that influence the success of a project are the early ones. This is where major decisions that influence the features and form of a project occur. This study, which adopts a case study approach, aims to establish the influence of the brief development process on the outcome of Government projects in the Eastern Cape. Through the reviewed literature and primary data collection, the study aimed at establishing the influence of the brief that is utilised for a need analysis, to define a detailed scope of works, stakeholder engagement and the time management on Eastern Cape Government project outcomes. The Sarah Baartman district was the selected geographical scope of research. Five projects were selected; these included three schools, one emergency medical service facility and one office facility. The study revealed that Eastern Cape Government projects brief development is based on the client department 2013 Published Norms and Standards for state buildings and a need analysis for other stakeholders is not considered. The study further revealed that there is no stakeholder management in government projects; therefore, there is no stakeholder engagement plan during the brief development. The study further revealed that government time management is suboptimal because stakeholder needs are not realised. The research also found that Eastern Cape Government projects do not achieve stakeholder satisfaction and are delivered late. However, some Government projects are able to meet the desired quality and are within budget. The study thus proposes that the Eastern Cape Government projects need to adopt the dynamic brief development process and implement stakeholder management. The brief development process should be an ongoing process extending throughout the project life cycle responding in an innovative manner to emerging stakeholder requirements.
- Full Text:
- Date Issued: 2019
Modelling the effect of graphitization on the fracture toughness (JIC) of service exposed ASTM A-515 Gr. 65 material by the small punch test method
- Authors: Grewar, Stephen James
- Date: 2017
- Subjects: Graphitization Fracture mechanics
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/18849 , vital:28737
- Description: Small Punch Testing is a recent testing methodology with numerous favourable applications in engineering assessments. The advantages of this small specimen method are utilised to derive fracture toughness measurements on service exposed and graphitized steel designated ASTM A-515 Gr. 65. The EPRI-FAA “innovative method”, involving finite element analysis, is applied to obtain fracture toughness estimates and investigate the effect of localised graphitization on localised fracture toughness. The method is described in a stepwise manner and validated favourably against standard fracture toughness testing methods as well as the work of forerunners in this field. Analysis of twenty tested small punch disk specimens extracted from a service exposed welded pipe coupon showed that toughness decreases logarithmically with increased graphitization volumetric percentages in the small samples. Therefore graphitization is found to have a significant influence on local fracture toughness (JIC) of ASTM A-515 Gr. 65 steel under room temperature conditions. The possibility of documenting the effect of microstructural changes on other static properties such as yield strength and strain hardening exists provided that analysis of each disk specimen is performed prior to punch testing. A relationship between percentage graphitization and material toughness has been proposed for ASTM A-515 Gr. 65 at room temperature.
- Full Text:
- Date Issued: 2017
- Authors: Grewar, Stephen James
- Date: 2017
- Subjects: Graphitization Fracture mechanics
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/18849 , vital:28737
- Description: Small Punch Testing is a recent testing methodology with numerous favourable applications in engineering assessments. The advantages of this small specimen method are utilised to derive fracture toughness measurements on service exposed and graphitized steel designated ASTM A-515 Gr. 65. The EPRI-FAA “innovative method”, involving finite element analysis, is applied to obtain fracture toughness estimates and investigate the effect of localised graphitization on localised fracture toughness. The method is described in a stepwise manner and validated favourably against standard fracture toughness testing methods as well as the work of forerunners in this field. Analysis of twenty tested small punch disk specimens extracted from a service exposed welded pipe coupon showed that toughness decreases logarithmically with increased graphitization volumetric percentages in the small samples. Therefore graphitization is found to have a significant influence on local fracture toughness (JIC) of ASTM A-515 Gr. 65 steel under room temperature conditions. The possibility of documenting the effect of microstructural changes on other static properties such as yield strength and strain hardening exists provided that analysis of each disk specimen is performed prior to punch testing. A relationship between percentage graphitization and material toughness has been proposed for ASTM A-515 Gr. 65 at room temperature.
- Full Text:
- Date Issued: 2017
Advanced monitoring system for bolted connections in vehicle construction
- Authors: Buchmann, Macro
- Date: 2010
- Subjects: Automobiles -- Design and construction , Motor vehicles -- Design and construction , Bolted joints
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9617 , http://hdl.handle.net/10948/1417 , Automobiles -- Design and construction , Motor vehicles -- Design and construction , Bolted joints
- Description: Bolted connections where used from the beginning of vehicle construction for joining two or more parts. The reliability of bolted connections is still a major problem. The objective of this research thesis is focused on an advanced monitoring system for bolted connections in vehicle construction. A mechanical “vibrating test bench”, which was developed by the aeronautical engineer Mr. Junkers, is being adapted, to suite the requirements of the automotive industry. It is designed according to DIN 65151 standards. The bolted connection is tightened to a specific torque to achieve the required preload forces and then exposed to an oscillating elastic shear force. The preload force and their loss are measured in relation to the number of load cycles. The ideal locking mechanism would be, if no settling occurs. Realistic in practice is the remaining of a sufficient preload force which doesn’t decry with time. The aim of this thesis is, to gain knowledge that will assist in the future control of the bolt locking procedure. The test bench can be used to verify the clamping capability of a bolted connection. With the dynamic computer-aided test system it will also be possible to test critical bolted joints and their safety, which reduces the probability of costly product recalls, or even severe cases of failure.
- Full Text:
- Date Issued: 2010
- Authors: Buchmann, Macro
- Date: 2010
- Subjects: Automobiles -- Design and construction , Motor vehicles -- Design and construction , Bolted joints
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9617 , http://hdl.handle.net/10948/1417 , Automobiles -- Design and construction , Motor vehicles -- Design and construction , Bolted joints
- Description: Bolted connections where used from the beginning of vehicle construction for joining two or more parts. The reliability of bolted connections is still a major problem. The objective of this research thesis is focused on an advanced monitoring system for bolted connections in vehicle construction. A mechanical “vibrating test bench”, which was developed by the aeronautical engineer Mr. Junkers, is being adapted, to suite the requirements of the automotive industry. It is designed according to DIN 65151 standards. The bolted connection is tightened to a specific torque to achieve the required preload forces and then exposed to an oscillating elastic shear force. The preload force and their loss are measured in relation to the number of load cycles. The ideal locking mechanism would be, if no settling occurs. Realistic in practice is the remaining of a sufficient preload force which doesn’t decry with time. The aim of this thesis is, to gain knowledge that will assist in the future control of the bolt locking procedure. The test bench can be used to verify the clamping capability of a bolted connection. With the dynamic computer-aided test system it will also be possible to test critical bolted joints and their safety, which reduces the probability of costly product recalls, or even severe cases of failure.
- Full Text:
- Date Issued: 2010
Guidelines for secure cloud-based personal health records
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
Introducing hippocratic log files for personal privacy control
- Authors: Rutherford, Andrew
- Date: 2005
- Subjects: Computer security , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9743 , http://hdl.handle.net/10948/171 , Computer security , Internet -- Security measures
- Description: The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information they release. Hippocratic databases, designed by Agrawal, Kiernan, Srikant, and Xu (2002), aim to give users greater control over information stored in a data- base. Their design was inspired by the medical Hippocratic oath, and makes data privacy protection a fundamental responsibility of the database itself. To achieve the privacy of data, Hippocratic databases are governed by 10 key privacy principles. This dissertation argues, that asides from a few challenges, the 10 prin- ciples of Hippocratic databases can be applied to log ¯les. This argument is supported by presenting a high-level functional view of a Hippocratic log file architecture. This architecture focuses on issues that highlight the con- trol users gain over their personal information that is collected in log files. By presenting a layered view of the aforementioned architecture, it was, fur- thermore, possible to provide greater insight into the major processes that would be at work in a Hippocratic log file implementation. An exploratory prototype served to understand and demonstrate certain of the architectural components of Hippocratic log files. This dissertation, thus, makes a contribution to the ideal of providing users with greater control over their personal information, by proposing the use of Hippocratic logfiles.
- Full Text:
- Date Issued: 2005
- Authors: Rutherford, Andrew
- Date: 2005
- Subjects: Computer security , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9743 , http://hdl.handle.net/10948/171 , Computer security , Internet -- Security measures
- Description: The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information they release. Hippocratic databases, designed by Agrawal, Kiernan, Srikant, and Xu (2002), aim to give users greater control over information stored in a data- base. Their design was inspired by the medical Hippocratic oath, and makes data privacy protection a fundamental responsibility of the database itself. To achieve the privacy of data, Hippocratic databases are governed by 10 key privacy principles. This dissertation argues, that asides from a few challenges, the 10 prin- ciples of Hippocratic databases can be applied to log ¯les. This argument is supported by presenting a high-level functional view of a Hippocratic log file architecture. This architecture focuses on issues that highlight the con- trol users gain over their personal information that is collected in log files. By presenting a layered view of the aforementioned architecture, it was, fur- thermore, possible to provide greater insight into the major processes that would be at work in a Hippocratic log file implementation. An exploratory prototype served to understand and demonstrate certain of the architectural components of Hippocratic log files. This dissertation, thus, makes a contribution to the ideal of providing users with greater control over their personal information, by proposing the use of Hippocratic logfiles.
- Full Text:
- Date Issued: 2005
Factors affecting the adoption and meaningful use of electronic medical records in general practices
- Authors: Masiza, Melissa
- Date: 2012
- Subjects: Medical records -- Data processing , Medical records
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9814 , http://hdl.handle.net/10948/d1018561
- Description: Patients typically enter the healthcare systems at the primary care level from where they are further referred to specialists or hospitals as necessary. In the private healthcare system, primary care is provided by a general practitioner (GP). A GP will refer a patient to a specialist for treatment when necessary, while the GP remains the main healthcare provider. The provision of care is, thus, fragmented which results in continuity of care becoming a challenge. Furthermore, the majority of healthcare providers continue to use paper-based systems to capture and store patient medical data. However, capturing and storing patient medical data via electronic methods, such as Electronic Medical Records (EMRs), has been found to improve continuity of care. Despite this benefit, research reveals that smaller practices are slow to adopt electronic methods of record keeping. Hence this explorative research attempts to identify factors that affect the lack of adoption and meaningful use of EMRs in general practices. Four general practices are surveyed through patient and staff questionnaires, as well as GP interviews. Socio-Technical Systems (STS) theory is used as a theoretical lens to formulate the resulting factors. The findings of the research indicate specific factors that relate to either the social, environmental or technical sub-systems of the socio-technical system, or an overlap between these sub-systems. It is significant to note that within these sub-systems, the social sub-system plays a key role. This is due to various reasons revealed by this research. Furthermore, multiple perceptions emerged from the GP and patient participants during the analysis of the findings. These perceptions may have an influence on the adoption and potential meaningful use of an EMR in a general practice. Additionally, the socio-technical factors identified from this research highlight the challenges related to encouraging the adoption and meaningful use of EMRs. These challenges are introduced by the complexities represented by these factors. Nevertheless, addressing the factors will contribute towards improving the rate of adoption and meaningful use of EMRs in small practices.
- Full Text:
- Date Issued: 2012
Factors affecting the adoption and meaningful use of electronic medical records in general practices
- Authors: Masiza, Melissa
- Date: 2012
- Subjects: Medical records -- Data processing , Medical records
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9814 , http://hdl.handle.net/10948/d1018561
- Description: Patients typically enter the healthcare systems at the primary care level from where they are further referred to specialists or hospitals as necessary. In the private healthcare system, primary care is provided by a general practitioner (GP). A GP will refer a patient to a specialist for treatment when necessary, while the GP remains the main healthcare provider. The provision of care is, thus, fragmented which results in continuity of care becoming a challenge. Furthermore, the majority of healthcare providers continue to use paper-based systems to capture and store patient medical data. However, capturing and storing patient medical data via electronic methods, such as Electronic Medical Records (EMRs), has been found to improve continuity of care. Despite this benefit, research reveals that smaller practices are slow to adopt electronic methods of record keeping. Hence this explorative research attempts to identify factors that affect the lack of adoption and meaningful use of EMRs in general practices. Four general practices are surveyed through patient and staff questionnaires, as well as GP interviews. Socio-Technical Systems (STS) theory is used as a theoretical lens to formulate the resulting factors. The findings of the research indicate specific factors that relate to either the social, environmental or technical sub-systems of the socio-technical system, or an overlap between these sub-systems. It is significant to note that within these sub-systems, the social sub-system plays a key role. This is due to various reasons revealed by this research. Furthermore, multiple perceptions emerged from the GP and patient participants during the analysis of the findings. These perceptions may have an influence on the adoption and potential meaningful use of an EMR in a general practice. Additionally, the socio-technical factors identified from this research highlight the challenges related to encouraging the adoption and meaningful use of EMRs. These challenges are introduced by the complexities represented by these factors. Nevertheless, addressing the factors will contribute towards improving the rate of adoption and meaningful use of EMRs in small practices.
- Full Text:
- Date Issued: 2012
An appraisal of secure, wireless grid-enabled data warehousing
- Authors: Seelo, Gaolathe
- Date: 2007
- Subjects: Data warehousing , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9790 , http://hdl.handle.net/10948/602 , http://hdl.handle.net/10948/d1011700 , Data warehousing , Computer security
- Description: In most research, appropriate collections of data play a significant role in aiding decision-making processes. This is more critical if the data is being accessed across organisational barriers. Further, for the data to be mined and analysed efficiently, to aid decision-making processes, it must be harnessed in a suitably-structured fashion. There is, for example, a need to perform diverse data analyses and interpretation of structured (non-personal) HIV/AIDS patient-data from various quarters in South Africa. Although this data does exist, to some extent, it is autonomously owned and stored in disparate data storages, and not readily available to all interested parties. In order to put this data to meaningful use, it is imperative to integrate and store this data in a manner in which it can be better utilized by all those involved in the ontological field. This implies integration of (and hence, interoperability), and appropriate accessibility to, the information systems of the autonomous organizations providing data and data-processing. This is a typical problem-scenario for a Virtual Inter-Organisational Information System (VIOIS), proposed in this study. The VIOIS envisaged is a hypothetical, secure, Wireless Grid-enabled Data Warehouse (WGDW) that enables IOIS interaction, such as the storage and processing of HIV/AIDS patient-data to be utilized for HIV/AIDS-specific research. The proposed WDGW offers a methodical approach for arriving at such a collaborative (HIV/AIDS research) integrated system. The proposed WDGW is virtual community that consists mainly of data-providers, service-providers and information-consumers. The WGDW-basis resulted from systematic literaturesurvey that covered a variety of technologies and standards that support datastorage, data-management, computation and connectivity between virtual community members in Grid computing contexts. A Grid computing paradigm is proposed for data-storage, data management and computation in the WGDW. Informational or analytical processing will be enabled through data warehousing while connectivity will be attained wirelessly (for addressing the paucity of connectivity infrastructure in rural parts of developing countries, like South Africa).
- Full Text:
- Date Issued: 2007
- Authors: Seelo, Gaolathe
- Date: 2007
- Subjects: Data warehousing , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9790 , http://hdl.handle.net/10948/602 , http://hdl.handle.net/10948/d1011700 , Data warehousing , Computer security
- Description: In most research, appropriate collections of data play a significant role in aiding decision-making processes. This is more critical if the data is being accessed across organisational barriers. Further, for the data to be mined and analysed efficiently, to aid decision-making processes, it must be harnessed in a suitably-structured fashion. There is, for example, a need to perform diverse data analyses and interpretation of structured (non-personal) HIV/AIDS patient-data from various quarters in South Africa. Although this data does exist, to some extent, it is autonomously owned and stored in disparate data storages, and not readily available to all interested parties. In order to put this data to meaningful use, it is imperative to integrate and store this data in a manner in which it can be better utilized by all those involved in the ontological field. This implies integration of (and hence, interoperability), and appropriate accessibility to, the information systems of the autonomous organizations providing data and data-processing. This is a typical problem-scenario for a Virtual Inter-Organisational Information System (VIOIS), proposed in this study. The VIOIS envisaged is a hypothetical, secure, Wireless Grid-enabled Data Warehouse (WGDW) that enables IOIS interaction, such as the storage and processing of HIV/AIDS patient-data to be utilized for HIV/AIDS-specific research. The proposed WDGW offers a methodical approach for arriving at such a collaborative (HIV/AIDS research) integrated system. The proposed WDGW is virtual community that consists mainly of data-providers, service-providers and information-consumers. The WGDW-basis resulted from systematic literaturesurvey that covered a variety of technologies and standards that support datastorage, data-management, computation and connectivity between virtual community members in Grid computing contexts. A Grid computing paradigm is proposed for data-storage, data management and computation in the WGDW. Informational or analytical processing will be enabled through data warehousing while connectivity will be attained wirelessly (for addressing the paucity of connectivity infrastructure in rural parts of developing countries, like South Africa).
- Full Text:
- Date Issued: 2007