Ultra-high precision machining of rapidly solidified aluminium (RSA) alloys for optics
- Authors: Odedeyi, Peter Babatunde
- Date: 2021-12
- Subjects: Mechatronics Surface roughness -- Measurement
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/55921 , vital:54400
- Description: The advancement of ultra-precision is one of the most adaptable machining processes in the manufacturing of very complex and high-quality surface structures for optics, industrial, medical, aerospace and communication applications. Studies have shown that single-point diamond turning has an outstanding ability to machine high-quality optical components at a nanometric scale. However, in a responsive cutting process, the nanometric machinability of these optical components can easily be affected by several factors. The call for increasing needs of optical systems has recently led to the development of newly modified aluminium grades of non-ferrous alloys characterized by finer microstructures, defined mechanical and physical properties. To date, there has been a lack of sufficient research into these new aluminium alloys. In modern ultra-precision machining, the high demands for smart and inexpensive cutting tools are becoming more relevant in recent precision machines. In monitoring and predicting high-quality surface, cutting forces in single point diamond turning are believed to be as critical as other machining processes due to their potential effects on the quality of surface roughness. Undermining such an important factor is a compromise between the machining process's efficiency and the increased cost of production. Therefore, a comprehensive scientific understanding of the Nano-cutting mechanics is critical, particularly on modelling and analysis of cutting force, surface roughness, chip vii formation, acoustic emission, material removal rates, and molecular dynamic simulation of the rapidly solidified aluminium alloys to bridge the gap between fundamentals and industrial-scale application. The study is divided into three essential sections. First, the development of a force sensor. Secondly, investigation of the effect of cutting parameters (i.e., cutting speed, feed rate, and cutting depth) on cutting force, acoustic emission (AE), material removal rate (MRR), chip formation, Nose radius, and surface roughness (Ra), which play a leading role in the determination of machine productivity and efficiency of single-point diamond turning of rapidly solidified aluminium alloys. Thirdly, a 3-D molecular dynamic (MD) simulation of RSA 6061 is also carried out to further understand the nanometric mechanism and characterization of the alloy. The experiment was mainly conducted using Precitech Nanoform ultra-grind 250 lathe machines on three different advanced optical aluminium alloys materials; these are RSA 443, RSA 905, and RSA 6061. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Information Technology, School of Engineering, 2021
- Full Text:
- Date Issued: 2021-12
- Authors: Odedeyi, Peter Babatunde
- Date: 2021-12
- Subjects: Mechatronics Surface roughness -- Measurement
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/55921 , vital:54400
- Description: The advancement of ultra-precision is one of the most adaptable machining processes in the manufacturing of very complex and high-quality surface structures for optics, industrial, medical, aerospace and communication applications. Studies have shown that single-point diamond turning has an outstanding ability to machine high-quality optical components at a nanometric scale. However, in a responsive cutting process, the nanometric machinability of these optical components can easily be affected by several factors. The call for increasing needs of optical systems has recently led to the development of newly modified aluminium grades of non-ferrous alloys characterized by finer microstructures, defined mechanical and physical properties. To date, there has been a lack of sufficient research into these new aluminium alloys. In modern ultra-precision machining, the high demands for smart and inexpensive cutting tools are becoming more relevant in recent precision machines. In monitoring and predicting high-quality surface, cutting forces in single point diamond turning are believed to be as critical as other machining processes due to their potential effects on the quality of surface roughness. Undermining such an important factor is a compromise between the machining process's efficiency and the increased cost of production. Therefore, a comprehensive scientific understanding of the Nano-cutting mechanics is critical, particularly on modelling and analysis of cutting force, surface roughness, chip vii formation, acoustic emission, material removal rates, and molecular dynamic simulation of the rapidly solidified aluminium alloys to bridge the gap between fundamentals and industrial-scale application. The study is divided into three essential sections. First, the development of a force sensor. Secondly, investigation of the effect of cutting parameters (i.e., cutting speed, feed rate, and cutting depth) on cutting force, acoustic emission (AE), material removal rate (MRR), chip formation, Nose radius, and surface roughness (Ra), which play a leading role in the determination of machine productivity and efficiency of single-point diamond turning of rapidly solidified aluminium alloys. Thirdly, a 3-D molecular dynamic (MD) simulation of RSA 6061 is also carried out to further understand the nanometric mechanism and characterization of the alloy. The experiment was mainly conducted using Precitech Nanoform ultra-grind 250 lathe machines on three different advanced optical aluminium alloys materials; these are RSA 443, RSA 905, and RSA 6061. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Information Technology, School of Engineering, 2021
- Full Text:
- Date Issued: 2021-12
Navigating between information security management documents : a modeling methodology
- Authors: Domingues, Steve
- Date: 2010
- Subjects: Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9761 , http://hdl.handle.net/10948/1212 , Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Description: Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a control in one standard may relate to other standards. This allows the end user to navigate between the standards documents. These mapping documents are valuable to a person who wishes to grasp how different standards deal with a specific control. However, the navigation between standards is a cumbersome task. In order to navigate between the standards the end user is required to consult three or more documents, depending on the number of standards that are mapped to the control being investigated. The need for a tool that will provide fast and efficient navigation between standards was identified. The data tier of the tool is the focus of this dissertation. As a result, this research proposes a modeling methodology that will allow for the modeling of the standards and the information about the mapping between standards, thereby contributing to the creation of tools to aid in the navigation between standards. A comparison between the major data modeling paradigms identifies multi-dimensional modeling as the most appropriate technique to model standards. Adapting an existing modeling methodology to cater for the modeling standards, yield a five step standard modeling methodology. Once modeled, the standards can be physically implemented as a database. The database schema that results from the standard modeling methodology adheres to a specific pattern and can thus be expressed according to well-defined meta-model. This allows for the generation of SQL statements by a tool with limited knowledge of the standards in a way that allows the quick navigation between standards. To determine the usefulness of the standards modeling methodology the research presents iv a prototype that utilizes the well-defined meta-model to navigate between standards. It is shown that, as far as navigation is concerned, no code changes are necessary when adding a new standard or new mappings between standards. This research contributes to the creation of a tool that can easily navigate between standards by providing the ability to model the data tier in such a way that it is extensible, yet remains independent of the application and presentation tiers.
- Full Text:
- Date Issued: 2010
- Authors: Domingues, Steve
- Date: 2010
- Subjects: Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9761 , http://hdl.handle.net/10948/1212 , Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Description: Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a control in one standard may relate to other standards. This allows the end user to navigate between the standards documents. These mapping documents are valuable to a person who wishes to grasp how different standards deal with a specific control. However, the navigation between standards is a cumbersome task. In order to navigate between the standards the end user is required to consult three or more documents, depending on the number of standards that are mapped to the control being investigated. The need for a tool that will provide fast and efficient navigation between standards was identified. The data tier of the tool is the focus of this dissertation. As a result, this research proposes a modeling methodology that will allow for the modeling of the standards and the information about the mapping between standards, thereby contributing to the creation of tools to aid in the navigation between standards. A comparison between the major data modeling paradigms identifies multi-dimensional modeling as the most appropriate technique to model standards. Adapting an existing modeling methodology to cater for the modeling standards, yield a five step standard modeling methodology. Once modeled, the standards can be physically implemented as a database. The database schema that results from the standard modeling methodology adheres to a specific pattern and can thus be expressed according to well-defined meta-model. This allows for the generation of SQL statements by a tool with limited knowledge of the standards in a way that allows the quick navigation between standards. To determine the usefulness of the standards modeling methodology the research presents iv a prototype that utilizes the well-defined meta-model to navigate between standards. It is shown that, as far as navigation is concerned, no code changes are necessary when adding a new standard or new mappings between standards. This research contributes to the creation of a tool that can easily navigate between standards by providing the ability to model the data tier in such a way that it is extensible, yet remains independent of the application and presentation tiers.
- Full Text:
- Date Issued: 2010
A process model for e-voting in South Africa
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
Slow delivery of low-income housing at munipal level with special reference to the Nelson Mandela Bay Munipality
- Authors: Scheepers, Mario Jacques
- Date: 2011
- Subjects: SLow-income housing -- South Africa -- Port Elizabeth , Municipal services -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9671 , http://hdl.handle.net/10948/d1015968
- Description: The provision of adequate housing is an important part of government's commitment towards providing a better quality of life to the people of South Africa. Housing delivery is, however, not taking place to the extent and speed that will eliminate the backlog in housing delivery. The researcher aims to (i) evaluate and investigate the reasons why housing delivery at municipal level is slow, (ii) discuss the effect of inefficient implementation on delivery, (iii) examine the influence of the lack of infrastructure and the lack of skilled municipal officials and employees of construction organisations and the processes followed to make a success of housing delivery. Chapter 2, Section 26(1), Act 108 0f 1996 of the Constitution of South Africa states that everyone has the right to have access to adequate housing. This places an obligation on government to provide adequate housing to all citizens, within the restriction of available resources. The lack of land hampers the speed at which municipalities can deliver low-income housing. Housing and basic infrastructure (water, sewer and roads) form an integral part of the governments commitment to reduce poverty and improve the quality of life of South Africans. The fact that municipalities do not have capacity to address housing delivery and the fact that most artisans are near retirement age also influence the rate that houses can be delivered. Adequate housing processes are needed for housing delivery to take place, without it government will not succeed in delivering adequate housing. The results of the survey and the literature review confirm that housing delivery at municipality level is slow, that municipal officials need training and more employees to insure that housing delivery improves. The results also show the importance of infrastructure and land, the importance of implementing housing policies and processes adequately.
- Full Text:
- Date Issued: 2011
- Authors: Scheepers, Mario Jacques
- Date: 2011
- Subjects: SLow-income housing -- South Africa -- Port Elizabeth , Municipal services -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9671 , http://hdl.handle.net/10948/d1015968
- Description: The provision of adequate housing is an important part of government's commitment towards providing a better quality of life to the people of South Africa. Housing delivery is, however, not taking place to the extent and speed that will eliminate the backlog in housing delivery. The researcher aims to (i) evaluate and investigate the reasons why housing delivery at municipal level is slow, (ii) discuss the effect of inefficient implementation on delivery, (iii) examine the influence of the lack of infrastructure and the lack of skilled municipal officials and employees of construction organisations and the processes followed to make a success of housing delivery. Chapter 2, Section 26(1), Act 108 0f 1996 of the Constitution of South Africa states that everyone has the right to have access to adequate housing. This places an obligation on government to provide adequate housing to all citizens, within the restriction of available resources. The lack of land hampers the speed at which municipalities can deliver low-income housing. Housing and basic infrastructure (water, sewer and roads) form an integral part of the governments commitment to reduce poverty and improve the quality of life of South Africans. The fact that municipalities do not have capacity to address housing delivery and the fact that most artisans are near retirement age also influence the rate that houses can be delivered. Adequate housing processes are needed for housing delivery to take place, without it government will not succeed in delivering adequate housing. The results of the survey and the literature review confirm that housing delivery at municipality level is slow, that municipal officials need training and more employees to insure that housing delivery improves. The results also show the importance of infrastructure and land, the importance of implementing housing policies and processes adequately.
- Full Text:
- Date Issued: 2011
Motivation of construction workers in the nelson Mandela Bay Metropole, South Africa
- Jesumoroti, Christtestimony Oluwafemi
- Authors: Jesumoroti, Christtestimony Oluwafemi
- Date: 2018
- Subjects: Employee motivation -- South Africa -- Nelson Mandela Bay Municipality , Performance standards -- South Africa -- Nelson Mandela Bay Municipality Construction workers -- South Africa -- Nelson Mandela Bay Municipality Construction industry -- Employees -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/30573 , vital:30962
- Description: The issue of construction workers’ motivation has become a subject of debate among construction project management professionals. Construction workers mostly work long hours in relatively disagreeable environments and, far from their families. Most of the activities are done under difficult conditions including harsh weather conditions, however, employees are required to be motivated towards ensuring the attractiveness of the industry to them. Moreover, there are diverse perceptions that the motivation of construction workers positively impacts construction workers performance or rather adversely affects the general performance of construction workers. Although, workers motivation has been proven to improve construction productivity globally, motivation of construction workers seems not to be effectively implemented in South African Construction Industry. As a result, it is difficult for management to identify motivational factors that affect workers productivity in a work environment. A quantitative research approach was employed to analyse the result obtained from a structured questionnaire survey. The research respondents included: bricklayers, plumbers, concrete workers, electricians, carpenters, and professionals. This study used data from primary source which focus on tradesman, labourer and professional context. A survey was conducted with tradesmen, labourers and professionals regarding motivation on construction workers which was conducted in the Nelson Mandela Bay Metropole, Eastern Cape. It was found that motivation is important to construction workers’ performance. Awarding bonuses to workers is important to improving workers’ efficiency and there is a need for construction workers recognition by management. Construction industry stakeholder should shift their attention and prioritise the motivation of its workers since the industry has a way of cubing poverty and uplifting the county’s economy. The findings revealed that motivational communication, rather than functional communication, would enhance worker productivity. It was found that both intrinsic and extrinsic rewards are needed to improve worker productivity. It was also found that positive reinforcement techniques, should be used to enhance worker productivity. The findings from this research study revealed that the motivational theories apply to construction workers, and management needs to apply these theories wisely to achieve improved productivity. The study therefore concludes that motivational techniques are necessary to improve construction workers productivity on a vii construction site. It is recommended that supervisors use motivational communication, extrinsic rewards, intrinsic rewards and positive reinforcement to motivate their workers to achieve higher levels of productivity.
- Full Text:
- Date Issued: 2018
- Authors: Jesumoroti, Christtestimony Oluwafemi
- Date: 2018
- Subjects: Employee motivation -- South Africa -- Nelson Mandela Bay Municipality , Performance standards -- South Africa -- Nelson Mandela Bay Municipality Construction workers -- South Africa -- Nelson Mandela Bay Municipality Construction industry -- Employees -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/30573 , vital:30962
- Description: The issue of construction workers’ motivation has become a subject of debate among construction project management professionals. Construction workers mostly work long hours in relatively disagreeable environments and, far from their families. Most of the activities are done under difficult conditions including harsh weather conditions, however, employees are required to be motivated towards ensuring the attractiveness of the industry to them. Moreover, there are diverse perceptions that the motivation of construction workers positively impacts construction workers performance or rather adversely affects the general performance of construction workers. Although, workers motivation has been proven to improve construction productivity globally, motivation of construction workers seems not to be effectively implemented in South African Construction Industry. As a result, it is difficult for management to identify motivational factors that affect workers productivity in a work environment. A quantitative research approach was employed to analyse the result obtained from a structured questionnaire survey. The research respondents included: bricklayers, plumbers, concrete workers, electricians, carpenters, and professionals. This study used data from primary source which focus on tradesman, labourer and professional context. A survey was conducted with tradesmen, labourers and professionals regarding motivation on construction workers which was conducted in the Nelson Mandela Bay Metropole, Eastern Cape. It was found that motivation is important to construction workers’ performance. Awarding bonuses to workers is important to improving workers’ efficiency and there is a need for construction workers recognition by management. Construction industry stakeholder should shift their attention and prioritise the motivation of its workers since the industry has a way of cubing poverty and uplifting the county’s economy. The findings revealed that motivational communication, rather than functional communication, would enhance worker productivity. It was found that both intrinsic and extrinsic rewards are needed to improve worker productivity. It was also found that positive reinforcement techniques, should be used to enhance worker productivity. The findings from this research study revealed that the motivational theories apply to construction workers, and management needs to apply these theories wisely to achieve improved productivity. The study therefore concludes that motivational techniques are necessary to improve construction workers productivity on a vii construction site. It is recommended that supervisors use motivational communication, extrinsic rewards, intrinsic rewards and positive reinforcement to motivate their workers to achieve higher levels of productivity.
- Full Text:
- Date Issued: 2018
Engendering the meaningful use of electronic medical records: a South African perspective
- Chipfumbu, Colletor Tendeukai
- Authors: Chipfumbu, Colletor Tendeukai
- Date: 2016
- Subjects: Electronic records -- South Africa -- Management Information storage and retrieval systems -- Management , Medical records -- South Africa Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18420 , vital:28635
- Description: Theoretically, the use of Electronic Medical Records (EMRs) holds promise of numerous benefits in healthcare provision, including improvement in continuity of care, quality of care and safety. However, in practice, there is evidence that the adoption of electronic medical records has been slow and where adopted, often lacks meaningful use. Thus there is a clear dichotomy between the ambitions for EMR use and the reality of EMR implementation. In the USA, a legislative approach was taken to turn around the situation. Other countries such as Canada and European countries have followed suit (in their own way) to address the adoption and meaningful use of electronic medical records. The South African e-Health strategy and the National Health Normative Standards Framework for Interoperability in eHealth in South Africa documents both recommend the adoption of EMRs. Much work has been done to establish a baseline for standards to ensure interoperability and data portability of healthcare applications and data. However, even with the increased focus on e-Health, South Africa remains excessively reliant on paper-based medical records. Where health information technologies have been adopted, there is lack of coordination between and within provinces, leading to a multitude of systems and vendors. Thus there is a lack of systematic adoption and meaningful use of EMRs in South Africa. The main objective of this research is to develop the components required to engender meaningful use of electronic medical records in the South African healthcare context. The main contributors are identified as EMR certification and consistent, proper use of certified EMRs. Literature review, a Delphi study and logical argumentation are used to develop the relevant components for the South African healthcare context. The benefits of EMRs can only be realized through systematic adoption and meaningful use of EMRs, thus this research contributes to providing a road map for engendering the meaningful use of EMRs with the ultimate aim of improving healthcare in the South African healthcare landscape.
- Full Text:
- Date Issued: 2016
- Authors: Chipfumbu, Colletor Tendeukai
- Date: 2016
- Subjects: Electronic records -- South Africa -- Management Information storage and retrieval systems -- Management , Medical records -- South Africa Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18420 , vital:28635
- Description: Theoretically, the use of Electronic Medical Records (EMRs) holds promise of numerous benefits in healthcare provision, including improvement in continuity of care, quality of care and safety. However, in practice, there is evidence that the adoption of electronic medical records has been slow and where adopted, often lacks meaningful use. Thus there is a clear dichotomy between the ambitions for EMR use and the reality of EMR implementation. In the USA, a legislative approach was taken to turn around the situation. Other countries such as Canada and European countries have followed suit (in their own way) to address the adoption and meaningful use of electronic medical records. The South African e-Health strategy and the National Health Normative Standards Framework for Interoperability in eHealth in South Africa documents both recommend the adoption of EMRs. Much work has been done to establish a baseline for standards to ensure interoperability and data portability of healthcare applications and data. However, even with the increased focus on e-Health, South Africa remains excessively reliant on paper-based medical records. Where health information technologies have been adopted, there is lack of coordination between and within provinces, leading to a multitude of systems and vendors. Thus there is a lack of systematic adoption and meaningful use of EMRs in South Africa. The main objective of this research is to develop the components required to engender meaningful use of electronic medical records in the South African healthcare context. The main contributors are identified as EMR certification and consistent, proper use of certified EMRs. Literature review, a Delphi study and logical argumentation are used to develop the relevant components for the South African healthcare context. The benefits of EMRs can only be realized through systematic adoption and meaningful use of EMRs, thus this research contributes to providing a road map for engendering the meaningful use of EMRs with the ultimate aim of improving healthcare in the South African healthcare landscape.
- Full Text:
- Date Issued: 2016
Performance of project management units (PMUS): the case of Sarah Baartman District Municipality
- Authors: Monare, Thabang
- Date: 2017
- Subjects: Project management -- South Africa -- Eastern Cape -- Evaluation , Construction industry -- South Africa -- Eastern Cape -- Management Construction industry -- South Africa -- Eastern Cape -- Quality control
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/19081 , vital:28771
- Description: The Municipal Infrastructure Grant programme (MIG) is South Africa’s largest local government infrastructure development funding. Designed to improve service delivery through financing the cost of eradicating basic services backlogs created by Apartheid’s legacy of ‘separate development’, MIG is also intended to be part of government’s overall strategy to eliminate the ‘triple challenge’ of poverty, unemployment and growing inequality. Through government’s active policy which sought to transform and enhance the municipal infrastructure service delivery capacity, effective project management was identified as an integral function of municipalities with a developmental role in terms of the Constitutional mandate. This led to the establishment of Project Management Units (PMUs) tasked with administering the MIG funds and managing the infrastructure projects effectively. Whilst MIG’s overall key principles were clearly defined in the MIG policy framework, the attainment of project success has proved elusive for most municipalities and this manifestation has only been partially examined. The purpose of this study is to explore factors affecting project success with the establishment of PMUs in Sarah Baartman District Municipality (SBDM) in the Eastern Cape Province in South Africa, with the aim of contributing to the refinement of best-practice for project implementation. A multiple case study approach was preferred, preceded by an extensive review of relevant literature on the basic tenets of project success. This exercise culminated in the refinement of research questions which were then posed in interviews to a purposive sample of PMU managers within SBDM. The findings from the study revealed the centrality of the dominant features required to influence the probability of positive outcomes such as institutional capacity, organisational culture and infrastructure governance. The research concludes by proposing ways of improving on these three components in the delivery of municipal infrastructure.
- Full Text:
- Date Issued: 2017
- Authors: Monare, Thabang
- Date: 2017
- Subjects: Project management -- South Africa -- Eastern Cape -- Evaluation , Construction industry -- South Africa -- Eastern Cape -- Management Construction industry -- South Africa -- Eastern Cape -- Quality control
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/19081 , vital:28771
- Description: The Municipal Infrastructure Grant programme (MIG) is South Africa’s largest local government infrastructure development funding. Designed to improve service delivery through financing the cost of eradicating basic services backlogs created by Apartheid’s legacy of ‘separate development’, MIG is also intended to be part of government’s overall strategy to eliminate the ‘triple challenge’ of poverty, unemployment and growing inequality. Through government’s active policy which sought to transform and enhance the municipal infrastructure service delivery capacity, effective project management was identified as an integral function of municipalities with a developmental role in terms of the Constitutional mandate. This led to the establishment of Project Management Units (PMUs) tasked with administering the MIG funds and managing the infrastructure projects effectively. Whilst MIG’s overall key principles were clearly defined in the MIG policy framework, the attainment of project success has proved elusive for most municipalities and this manifestation has only been partially examined. The purpose of this study is to explore factors affecting project success with the establishment of PMUs in Sarah Baartman District Municipality (SBDM) in the Eastern Cape Province in South Africa, with the aim of contributing to the refinement of best-practice for project implementation. A multiple case study approach was preferred, preceded by an extensive review of relevant literature on the basic tenets of project success. This exercise culminated in the refinement of research questions which were then posed in interviews to a purposive sample of PMU managers within SBDM. The findings from the study revealed the centrality of the dominant features required to influence the probability of positive outcomes such as institutional capacity, organisational culture and infrastructure governance. The research concludes by proposing ways of improving on these three components in the delivery of municipal infrastructure.
- Full Text:
- Date Issued: 2017
An in-line measuring technique with tool error detection in an automotive production line
- Authors: Viol, Florian
- Date: 2010
- Subjects: Automobile industry and trade -- Quality control
- Language: English
- Type: Thesis , Masters , MEngineering
- Identifier: vital:9647 , http://hdl.handle.net/10948/1327 , Automobile industry and trade -- Quality control
- Description: The modern automobile industry faces an increasing demand on personalized high quality products. In order to stay competitive the automobile manufacturers have to ensure the customers high quality demands. With the increasing amount of applied parts and components manufacturing processes are becoming more complex. The recent quality assurance of the manufacturers considers only the product quality. Furthermore are with the recent quality assurance methods only punctual integrations of quality assurance tools in production chains possible. These limitations cause a large quality control loop. This leads in case of defective parts to an enormous time and money effort to track the cause for the defect. This project presents an innovative measurement strategy of quality assurance within the modern automobile production which will minimize the control loop and identify the tool causing the defect in the part. It highlights the possibility to integrate equipment for quality assurance directly into the production cell itself and analyse the geometrical conditions within the manufacturing processes. The result of this thesis is a fully automated prototype which is installed into the actual production of the Volkswagen Golf assembly. The prototype system consists on the one hand out of different on the market free available hardware and software components. On the other hand there are specifically for this prototype developed hardware components and software tools. For the first time it is possible to inspect the geometrical conditions of one tool continuously during production and identify, if occurring, deviations in the tool in position direction and size. The installation of similar systems in the production will minimize the control loops of the production. The chance of early recognition of errors will reduce the efforts and cost of error backtracking. In ideal conditions this instrument will identify defective tools before a product is manufactured. This innovative quality tool is the ideal addition to the current quality assurance and is the first link between the product quality and the geometrical conditions of the tools.
- Full Text:
- Date Issued: 2010
- Authors: Viol, Florian
- Date: 2010
- Subjects: Automobile industry and trade -- Quality control
- Language: English
- Type: Thesis , Masters , MEngineering
- Identifier: vital:9647 , http://hdl.handle.net/10948/1327 , Automobile industry and trade -- Quality control
- Description: The modern automobile industry faces an increasing demand on personalized high quality products. In order to stay competitive the automobile manufacturers have to ensure the customers high quality demands. With the increasing amount of applied parts and components manufacturing processes are becoming more complex. The recent quality assurance of the manufacturers considers only the product quality. Furthermore are with the recent quality assurance methods only punctual integrations of quality assurance tools in production chains possible. These limitations cause a large quality control loop. This leads in case of defective parts to an enormous time and money effort to track the cause for the defect. This project presents an innovative measurement strategy of quality assurance within the modern automobile production which will minimize the control loop and identify the tool causing the defect in the part. It highlights the possibility to integrate equipment for quality assurance directly into the production cell itself and analyse the geometrical conditions within the manufacturing processes. The result of this thesis is a fully automated prototype which is installed into the actual production of the Volkswagen Golf assembly. The prototype system consists on the one hand out of different on the market free available hardware and software components. On the other hand there are specifically for this prototype developed hardware components and software tools. For the first time it is possible to inspect the geometrical conditions of one tool continuously during production and identify, if occurring, deviations in the tool in position direction and size. The installation of similar systems in the production will minimize the control loops of the production. The chance of early recognition of errors will reduce the efforts and cost of error backtracking. In ideal conditions this instrument will identify defective tools before a product is manufactured. This innovative quality tool is the ideal addition to the current quality assurance and is the first link between the product quality and the geometrical conditions of the tools.
- Full Text:
- Date Issued: 2010
Research and development of an intelligent AGV-based material handling system for industrial applications
- Authors: Ferreira, Tremaine Pierre
- Date: 2015
- Subjects: Robotics -- Industrial applications Artificial intelligence , Mechatronics -- South Africa
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/21711 , vital:29738
- Description: The use of autonomous robots in industrial applications is growing in popularity and possesses the following advantages: cost effectiveness, job efficiency and safety aspects. Despite the advantages, the major drawback to using autonomous robots is the cost involved to acquire such robots. It is the aim of GMSA to develop a low cost AGV capable of performing material handling in an industrial environment. Collective autonomous robots are often used to perform tasks, that is, more than one working together to achieve a common goal. The intelligent controller, responsible for establishing coordination between the individual robots, plays a key role in managing the tasks of each robot to achieve the common goal. This dissertation addresses the development of an AGV capable of such functionality. Key research areas include: the development of an autonomous coupling system, integration of key safety devices and the development of an intelligent control strategy that can be used to govern the operation of multiple AGVs in an area.
- Full Text:
- Date Issued: 2015
- Authors: Ferreira, Tremaine Pierre
- Date: 2015
- Subjects: Robotics -- Industrial applications Artificial intelligence , Mechatronics -- South Africa
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/21711 , vital:29738
- Description: The use of autonomous robots in industrial applications is growing in popularity and possesses the following advantages: cost effectiveness, job efficiency and safety aspects. Despite the advantages, the major drawback to using autonomous robots is the cost involved to acquire such robots. It is the aim of GMSA to develop a low cost AGV capable of performing material handling in an industrial environment. Collective autonomous robots are often used to perform tasks, that is, more than one working together to achieve a common goal. The intelligent controller, responsible for establishing coordination between the individual robots, plays a key role in managing the tasks of each robot to achieve the common goal. This dissertation addresses the development of an AGV capable of such functionality. Key research areas include: the development of an autonomous coupling system, integration of key safety devices and the development of an intelligent control strategy that can be used to govern the operation of multiple AGVs in an area.
- Full Text:
- Date Issued: 2015
Characterisation of dissimilar friction stir welds between 5754 Aluminium alloy and C11000 copper
- Authors: Akinlabi, Esther Titilayo
- Date: 2010
- Subjects: Friction stir welding , Aluminum alloys , Copper alloys
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9629 , http://hdl.handle.net/10948/1536 , Friction stir welding , Aluminum alloys , Copper alloys
- Description: Friction Stir Welding (FSW) is a solid state welding process invented and patented by The Welding Institute (TWI) in 1991, for joining ferrous and non-ferrous materials1. The FSW of Aluminium and its alloys has been commercialised; and recent interest is focused on joining dissimilar materials. However, in order to commercialise the process, research studies are required to characterise and establish process windows. This research work through material characterisation of the welded joints establishes a process window for the Friction Stir welding of 5754 Aluminium Alloy and C11000 Copper. Furthermore, preliminary studies83,85 on the FSW of aluminium and copper have revealed the presence of intermetallic compounds which are detrimental to the weld qualities. This research work is also aimed at establishing process parameters that will result in limited or no intermetallic formation in the weld. The joint integrity of the resulting welds will also be correlated with the input process parameters. Based on the preliminary investigations conducted, a final weld matrix consisting of twenty seven welds was produced by varying the rotational speed between 600 and 1200 rpm, and the feed rate between 50 and 300 mm/min using three different shoulder diameter tools – 15, 18 and 25 mm to compare the heat input into the welds and to achieve the best results. The welds were characterised through microstructural evaluation, tensile testing, microhardness profiling, X-Ray Diffraction analysis, electrical resistivity and statistical analysis – in order to establish the interrelationship between the process parameters and the weld qualities. viii Microstructural evaluation of the weld samples revealed that the interfacial regions are characterised by mixture layers of aluminium and copper; while 33 percent of the tensile samples are within the acceptable range (> 75 percent joint efficiency). High Vickers microhardness values were measured at the joint interfaces, which corresponded with the intermetallic compounds. The Energy Dispersive Spectroscopy analysis revealed the presence of thin layers of intermetallics in nanoscale at the interfacial regions. The diffractograms of the X-Ray Diffraction analysis showed small peaks for intermetallics in some of the welds. Low electrical resistivities were measured at the joint interfaces. The statistical analysis showed that the downward vertical force, (Fz) can significantly influence the resulting weld qualities. An overall summary of the analysis of the weld qualities - with respect to the shoulder diameter tools employed showed that the 18 mm shoulder diameter tool is most appropriate among the three shoulder diameters considered, and a process window of medium spindle speed of 950 rpm and low-to-medium feed rate between 50 and 150 mm/min is established for FSW of Aluminium and Copper. Welds produced at 1200 rpm and 300 mm/min with low heat input did not have intermetallics formed at the joint interface.
- Full Text:
- Date Issued: 2010
- Authors: Akinlabi, Esther Titilayo
- Date: 2010
- Subjects: Friction stir welding , Aluminum alloys , Copper alloys
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9629 , http://hdl.handle.net/10948/1536 , Friction stir welding , Aluminum alloys , Copper alloys
- Description: Friction Stir Welding (FSW) is a solid state welding process invented and patented by The Welding Institute (TWI) in 1991, for joining ferrous and non-ferrous materials1. The FSW of Aluminium and its alloys has been commercialised; and recent interest is focused on joining dissimilar materials. However, in order to commercialise the process, research studies are required to characterise and establish process windows. This research work through material characterisation of the welded joints establishes a process window for the Friction Stir welding of 5754 Aluminium Alloy and C11000 Copper. Furthermore, preliminary studies83,85 on the FSW of aluminium and copper have revealed the presence of intermetallic compounds which are detrimental to the weld qualities. This research work is also aimed at establishing process parameters that will result in limited or no intermetallic formation in the weld. The joint integrity of the resulting welds will also be correlated with the input process parameters. Based on the preliminary investigations conducted, a final weld matrix consisting of twenty seven welds was produced by varying the rotational speed between 600 and 1200 rpm, and the feed rate between 50 and 300 mm/min using three different shoulder diameter tools – 15, 18 and 25 mm to compare the heat input into the welds and to achieve the best results. The welds were characterised through microstructural evaluation, tensile testing, microhardness profiling, X-Ray Diffraction analysis, electrical resistivity and statistical analysis – in order to establish the interrelationship between the process parameters and the weld qualities. viii Microstructural evaluation of the weld samples revealed that the interfacial regions are characterised by mixture layers of aluminium and copper; while 33 percent of the tensile samples are within the acceptable range (> 75 percent joint efficiency). High Vickers microhardness values were measured at the joint interfaces, which corresponded with the intermetallic compounds. The Energy Dispersive Spectroscopy analysis revealed the presence of thin layers of intermetallics in nanoscale at the interfacial regions. The diffractograms of the X-Ray Diffraction analysis showed small peaks for intermetallics in some of the welds. Low electrical resistivities were measured at the joint interfaces. The statistical analysis showed that the downward vertical force, (Fz) can significantly influence the resulting weld qualities. An overall summary of the analysis of the weld qualities - with respect to the shoulder diameter tools employed showed that the 18 mm shoulder diameter tool is most appropriate among the three shoulder diameters considered, and a process window of medium spindle speed of 950 rpm and low-to-medium feed rate between 50 and 150 mm/min is established for FSW of Aluminium and Copper. Welds produced at 1200 rpm and 300 mm/min with low heat input did not have intermetallics formed at the joint interface.
- Full Text:
- Date Issued: 2010
Information security awareness: generic content, tools and techniques
- Authors: Mauwa, Hope
- Date: 2007
- Subjects: Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9733 , http://hdl.handle.net/10948/560 , Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Description: In today’s computing environment, awareness programmes play a much more important role in organizations’ complete information security programmes. Information security awareness programmes are there to change behaviour or reinforce good security practices, and provide a baseline of security knowledge for all information users. Security awareness is a learning process, which changes individual and organizational attitudes and perceptions so that the importance of security and the adverse consequences of its failure are realized. Therefore, with proper awareness, employees become the most effective layer in an organization’s security defence. With the important role that these awareness programmes play in organizations’ complete information security programmes, it is a must that all organizations that are serious about information security must implement it. But though awareness programmes have become increasing important, the level of awareness in most organizations is still low. It seems that the current approach of developing these programmes does not satisfy the needs of most organizations. Therefore, another approach, which tries to meet the needs of most organizations, is proposed in this project as part of the solution of raising the level of awareness programmes in organizations.
- Full Text:
- Date Issued: 2007
- Authors: Mauwa, Hope
- Date: 2007
- Subjects: Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9733 , http://hdl.handle.net/10948/560 , Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Description: In today’s computing environment, awareness programmes play a much more important role in organizations’ complete information security programmes. Information security awareness programmes are there to change behaviour or reinforce good security practices, and provide a baseline of security knowledge for all information users. Security awareness is a learning process, which changes individual and organizational attitudes and perceptions so that the importance of security and the adverse consequences of its failure are realized. Therefore, with proper awareness, employees become the most effective layer in an organization’s security defence. With the important role that these awareness programmes play in organizations’ complete information security programmes, it is a must that all organizations that are serious about information security must implement it. But though awareness programmes have become increasing important, the level of awareness in most organizations is still low. It seems that the current approach of developing these programmes does not satisfy the needs of most organizations. Therefore, another approach, which tries to meet the needs of most organizations, is proposed in this project as part of the solution of raising the level of awareness programmes in organizations.
- Full Text:
- Date Issued: 2007
Development of a navigation system for an autonomous guided vehicle using android technology
- Authors: Snyman, Christo Johannes
- Date: 2012
- Subjects: Mechatronics , Engeering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9654 , http://hdl.handle.net/10948/d1020025
- Full Text:
- Date Issued: 2012
- Authors: Snyman, Christo Johannes
- Date: 2012
- Subjects: Mechatronics , Engeering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9654 , http://hdl.handle.net/10948/d1020025
- Full Text:
- Date Issued: 2012
Towards a framework for the integration of information security into undergraduate computing curricula
- Gomana, Lindokuhle Gcina, Thomson, Kerry-Lynn
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
The use of building information modelling as a tool to improve informed design communication between student and lecturer during critique sessions
- Authors: Basson, Jean-Pierre
- Date: 2018
- Subjects: Building information modeling , Building -- Data processing Construction industry -- South Africa Construction projects -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/23680 , vital:30598
- Description: Within the design studio at the Department of Architecture, Nelson Mandela University, the timeous submission of design projects is a problem. After close inspection, it is noted that students spend weeks on conceptual design ideas with no progressions towards completion. The purpose of the study is thus to determine whether building information modelling (BIM), as opposed to the traditional method of design, can be used to improve informed design communication during conceptual design for the first-year master of architecture students and contribute to timeous design project submission. A cohort comparison rubric will be used as the method for looking at the qualitative attributes of design intention, function, aesthetics, and sustainability. The 2016 cohort made use of the traditional design method, whereas for the 2017 cohort the BIM course was introduced in the computer module with implementation in the design studio. The work of nine students from both cohorts was analysed and findings include the following: improved drawing type availability, accuracy, and quality; reduced time spent on redundant work; inclusive discussions compared to isolated critique sessions; reduced printing costs - and the establishment of “what if” scenarios early in the project. Based upon the research findings it can be concluded that BIM as a teaching strategy and process has the capability of improving the communication between student and lecturer in the conceptual stage, thereby leading to a more timeous submission. It is recommended that BIM education must be incorporated in the undergraduate programme thereby providing students with an appropriate platform for expressing conceptual ideas more effectively within the design course.
- Full Text:
- Date Issued: 2018
- Authors: Basson, Jean-Pierre
- Date: 2018
- Subjects: Building information modeling , Building -- Data processing Construction industry -- South Africa Construction projects -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/23680 , vital:30598
- Description: Within the design studio at the Department of Architecture, Nelson Mandela University, the timeous submission of design projects is a problem. After close inspection, it is noted that students spend weeks on conceptual design ideas with no progressions towards completion. The purpose of the study is thus to determine whether building information modelling (BIM), as opposed to the traditional method of design, can be used to improve informed design communication during conceptual design for the first-year master of architecture students and contribute to timeous design project submission. A cohort comparison rubric will be used as the method for looking at the qualitative attributes of design intention, function, aesthetics, and sustainability. The 2016 cohort made use of the traditional design method, whereas for the 2017 cohort the BIM course was introduced in the computer module with implementation in the design studio. The work of nine students from both cohorts was analysed and findings include the following: improved drawing type availability, accuracy, and quality; reduced time spent on redundant work; inclusive discussions compared to isolated critique sessions; reduced printing costs - and the establishment of “what if” scenarios early in the project. Based upon the research findings it can be concluded that BIM as a teaching strategy and process has the capability of improving the communication between student and lecturer in the conceptual stage, thereby leading to a more timeous submission. It is recommended that BIM education must be incorporated in the undergraduate programme thereby providing students with an appropriate platform for expressing conceptual ideas more effectively within the design course.
- Full Text:
- Date Issued: 2018
Factors impacting the design of a mobile application for soil management: a case study of the Eastern Cape crops
- Authors: Botha, Stephan
- Date: 2019
- Subjects: Mobile soil management application
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/44581 , vital:38127
- Description: Some of the biggest challenges the global community has to face are the ever-dwindling levels of freshwater resources, the drastic impact of the greenhouse gases on the global climate and the loss of non-renewable fertile soil. South African agriculture contributes a total of 12.7% to the overall South African GDP (gross domestic product). Only a small portion of the South African soil is considered as being able to grow healthy and nutritious crops. The world of information communication technology (ICT) is extremely vast and growing daily with newly created tools, to accommodate the needs of a specific sector, such as agriculture. As the ICT-based agricultural solutions increase and improve, the uptake of these solutions within the South African agricultural sector becomes even smaller. The reasons for the low uptake of mobile soil management solutions for crop growing farmers are unknown, due to limited research conducted. The identified problem was a lack of understanding of the way mobile technologies can be designed to adequately support farmers to correctly manage their soil to produce the best possible crops. The primary objective of this research study was to identify factors, which may have a significant impact on the design of a mobile soil management application for crop farmers in the Eastern Cape (South Africa). The secondary objectives were as follows: (i) to determine what soil management is and which aspects are required to implement soil management effectively; (ii) to identify possible mobile technologies suitable to act as an effective support structure for a mobile soil management application; and (iii) to identify which user experience guidelines are key for the development of an effective mobile soil management solution and to compile a user experience guideline for an effective mobile soil management solution. Achieving these objectives, resulted in a better understanding of the identified problem. The problem was addressed by conducting a thorough literature review and a case study to better grasp the different aspects of the identified problem. Quantitative data was collected by conducting a user interface evaluation. Qualitative data were also gathered by means of a field test using the mobile soil management application. The field test was done in conjunction with a heuristic evaluation, completed by the participants. Data triangulation was used to compare the results of the gathered data. The results from the data triangulation were used to confirm the factors, which made the most significant impact on the success of the soil management application. These confirmed design factors were used to produce a list of guidelines to improve the design of future mobile ICT soil management applications.
- Full Text:
- Date Issued: 2019
- Authors: Botha, Stephan
- Date: 2019
- Subjects: Mobile soil management application
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/44581 , vital:38127
- Description: Some of the biggest challenges the global community has to face are the ever-dwindling levels of freshwater resources, the drastic impact of the greenhouse gases on the global climate and the loss of non-renewable fertile soil. South African agriculture contributes a total of 12.7% to the overall South African GDP (gross domestic product). Only a small portion of the South African soil is considered as being able to grow healthy and nutritious crops. The world of information communication technology (ICT) is extremely vast and growing daily with newly created tools, to accommodate the needs of a specific sector, such as agriculture. As the ICT-based agricultural solutions increase and improve, the uptake of these solutions within the South African agricultural sector becomes even smaller. The reasons for the low uptake of mobile soil management solutions for crop growing farmers are unknown, due to limited research conducted. The identified problem was a lack of understanding of the way mobile technologies can be designed to adequately support farmers to correctly manage their soil to produce the best possible crops. The primary objective of this research study was to identify factors, which may have a significant impact on the design of a mobile soil management application for crop farmers in the Eastern Cape (South Africa). The secondary objectives were as follows: (i) to determine what soil management is and which aspects are required to implement soil management effectively; (ii) to identify possible mobile technologies suitable to act as an effective support structure for a mobile soil management application; and (iii) to identify which user experience guidelines are key for the development of an effective mobile soil management solution and to compile a user experience guideline for an effective mobile soil management solution. Achieving these objectives, resulted in a better understanding of the identified problem. The problem was addressed by conducting a thorough literature review and a case study to better grasp the different aspects of the identified problem. Quantitative data was collected by conducting a user interface evaluation. Qualitative data were also gathered by means of a field test using the mobile soil management application. The field test was done in conjunction with a heuristic evaluation, completed by the participants. Data triangulation was used to compare the results of the gathered data. The results from the data triangulation were used to confirm the factors, which made the most significant impact on the success of the soil management application. These confirmed design factors were used to produce a list of guidelines to improve the design of future mobile ICT soil management applications.
- Full Text:
- Date Issued: 2019
The development of a framework to reduce water and energy consumption through the use of water and energy value stream mapping for the South African manufacturing industry
- Authors: Davies, Edward
- Date: 2015
- Subjects: Lean manufacturing -- South Africa , Stream mapping -- South Africa , Water consumption -- South Africa
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: http://hdl.handle.net/10948/4160 , vital:20564
- Description: The Republic of South Africa’s energy economy is under immense pressure and the main energy utility, Eskom, cannot reliably generate sufficient electrical energy to meet its customer demand. Water security in South Africa is also under threat as the country is currently amidst a water crisis. The South African manufacturing industry is the sector consuming the largest portion of the total energy consumption and second largest portion of the total water consumption (excluding urban use) nationally. Water and energy efficiency improvement is becoming imperative for organisational success as well as national economic sustainability. This is due to the significant increase in the cost of both electrical energy and water in recent years, and the drop in the reserve energy margin below the minimum level required for sustainable operation of energy utilities. The research objective therefore was to develop a Lean-based water and energy efficiency improvement framework for the manufacturing industry to encourage and realise a reduced demand for energy and water in it. A literature review was conducted on the water and energy landscape in South Africa, Lean manufacturing principles and their positive natural influence on water and energy efficiency, and the Value Stream Mapping tool. The survey of water and energy wastes in the manufacturing industry yielded the creation of standardised water and energy waste categories for use in conjunction with the conventional Lean wastes, tools and techniques. The literature survey indicated that the implementation of Lean manufacturing techniques naturally leads to the improvement of energy and water intensity. The researcher hypothesised that there is even greater potential for water and energy savings if a Lean-based tool is developed to specifically focus on the improvement of energy and water efficiency. A framework for this tool was developed through the literature survey. The tool is based on the Value Stream Mapping tool. A practical experiment was then conducted to establish the effectiveness of the tool in the South African manufacturing industry. The experiment design included an outline of the forecasting and statistical validation techniques to ensure the integrity of data utilised for approving or disproving the set hypotheses. The results of the practical experiment yielded positive results, confirming the hypothesis that the implementation of the developed framework will lead to improved energy and water efficiency in the manufacturing industry. After an explanation of the experimental results, the study concluded with recommendations and conclusions based on the findings.
- Full Text:
- Date Issued: 2015
- Authors: Davies, Edward
- Date: 2015
- Subjects: Lean manufacturing -- South Africa , Stream mapping -- South Africa , Water consumption -- South Africa
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: http://hdl.handle.net/10948/4160 , vital:20564
- Description: The Republic of South Africa’s energy economy is under immense pressure and the main energy utility, Eskom, cannot reliably generate sufficient electrical energy to meet its customer demand. Water security in South Africa is also under threat as the country is currently amidst a water crisis. The South African manufacturing industry is the sector consuming the largest portion of the total energy consumption and second largest portion of the total water consumption (excluding urban use) nationally. Water and energy efficiency improvement is becoming imperative for organisational success as well as national economic sustainability. This is due to the significant increase in the cost of both electrical energy and water in recent years, and the drop in the reserve energy margin below the minimum level required for sustainable operation of energy utilities. The research objective therefore was to develop a Lean-based water and energy efficiency improvement framework for the manufacturing industry to encourage and realise a reduced demand for energy and water in it. A literature review was conducted on the water and energy landscape in South Africa, Lean manufacturing principles and their positive natural influence on water and energy efficiency, and the Value Stream Mapping tool. The survey of water and energy wastes in the manufacturing industry yielded the creation of standardised water and energy waste categories for use in conjunction with the conventional Lean wastes, tools and techniques. The literature survey indicated that the implementation of Lean manufacturing techniques naturally leads to the improvement of energy and water intensity. The researcher hypothesised that there is even greater potential for water and energy savings if a Lean-based tool is developed to specifically focus on the improvement of energy and water efficiency. A framework for this tool was developed through the literature survey. The tool is based on the Value Stream Mapping tool. A practical experiment was then conducted to establish the effectiveness of the tool in the South African manufacturing industry. The experiment design included an outline of the forecasting and statistical validation techniques to ensure the integrity of data utilised for approving or disproving the set hypotheses. The results of the practical experiment yielded positive results, confirming the hypothesis that the implementation of the developed framework will lead to improved energy and water efficiency in the manufacturing industry. After an explanation of the experimental results, the study concluded with recommendations and conclusions based on the findings.
- Full Text:
- Date Issued: 2015
The adoption of quality assurance in e-Health acquisition for rural hospitals in the Eastern Cape Province
- Authors: Ruxwana, Nkqubela
- Date: 2010
- Subjects: Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9731 , http://hdl.handle.net/10948/1514 , Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Description: The evolution of e-health has the potential to assist in the management of scarce resources and the shortage of skills, enhance efficiencies, improve quality and increase work productivity within the healthcare sector. As a result, an increase is seen in e-health solutions developments with the aim to improve healthcare services, hospital information systems, health decision support, telemedicine and other technical systems that have the potential to reduce cost, improve quality, and enhance the accessibility and delivery of healthcare. However, unfortunately their implementation contiues to fail. Although there are several reasons for this, in this study a lack of project quality management is viewed as a key contributor to the failure of e-health solutions implementation projects in rural hospitals. This results in neglected aspects of quality assurance (QA), which forms an integral part of project quality management. The purpose of this study is to develop a Genertic Quality Assurance Model (GQAM) for the successful acquisition (i.e. development and implementation) of e-health solutions in rural hospitals in the Eastern Cape Province to enable improved quality of care and service delivery. In order to develop and test this model it was necessary to identify the QA methodologies that are currently used in rural hospitals and to evaluate their strengths and weaknesses, as well as their impact on project success. The study is divided into four phases; in each phase different study designs were followed. The study used triangulation of qualitative and some elements of quantitative research approaches, in terms of which a case study approach was adpoted to answer the research questions. This study did indeed develop a GQAM that can be used to ensure e-health solution success in rural hospitals. Furthermore, to aid in the implementation of this model, a set of QA value chain implementation guidelines were developed, as a framework, to inject the nodel into typical (SDLC) phases.
- Full Text:
- Date Issued: 2010
- Authors: Ruxwana, Nkqubela
- Date: 2010
- Subjects: Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9731 , http://hdl.handle.net/10948/1514 , Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Description: The evolution of e-health has the potential to assist in the management of scarce resources and the shortage of skills, enhance efficiencies, improve quality and increase work productivity within the healthcare sector. As a result, an increase is seen in e-health solutions developments with the aim to improve healthcare services, hospital information systems, health decision support, telemedicine and other technical systems that have the potential to reduce cost, improve quality, and enhance the accessibility and delivery of healthcare. However, unfortunately their implementation contiues to fail. Although there are several reasons for this, in this study a lack of project quality management is viewed as a key contributor to the failure of e-health solutions implementation projects in rural hospitals. This results in neglected aspects of quality assurance (QA), which forms an integral part of project quality management. The purpose of this study is to develop a Genertic Quality Assurance Model (GQAM) for the successful acquisition (i.e. development and implementation) of e-health solutions in rural hospitals in the Eastern Cape Province to enable improved quality of care and service delivery. In order to develop and test this model it was necessary to identify the QA methodologies that are currently used in rural hospitals and to evaluate their strengths and weaknesses, as well as their impact on project success. The study is divided into four phases; in each phase different study designs were followed. The study used triangulation of qualitative and some elements of quantitative research approaches, in terms of which a case study approach was adpoted to answer the research questions. This study did indeed develop a GQAM that can be used to ensure e-health solution success in rural hospitals. Furthermore, to aid in the implementation of this model, a set of QA value chain implementation guidelines were developed, as a framework, to inject the nodel into typical (SDLC) phases.
- Full Text:
- Date Issued: 2010
The impact of non-compliance with Eskom procurement policies
- Authors: Mvelase, Thokozile Olivia
- Date: 2015
- Subjects: Eskom (Firm) , Industrial procurement -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/9140 , vital:26468
- Description: Supply Chain Management (SCM) has an overwhelming impact on firms as it directly impacts on sales and costs. Therefore, it must be a core competency for any organization and thus SCM expertise is highly valued in organisations. Procurement of goods and services has a major impact on the successful execution of the project. Procurement can help the business, ensuring that all the goods and services they buy will be of the right quality, quantity and price, and they will be delivered ‘just in time’. The application of procurement policies and practices, using fair and open procedures, is crucial not only for attracting efficient contractors and suppliers, but also to safeguard the principle of accountability and the cost-effective use of funds. Before awarding a tender, there is a substantial amount of work to be undertaken by the project manager, contracts manager, end user, buyer, and authorising committees. Commitment from personnel involved in contract awarding is not adequate. Furthermore, the Eskom governance process sometimes contributes to delays in awarding a contract. before the enquiry and tender documentation is sent out to the suppliers on the tender list, the core team involved in the procurement process verifies that the enquiry is complete and correct. Should there be contractual or legal issues during the execution of the project in the form of say a contract that has been issued with unsuitable clauses, solving the problem becomes difficult. Contractors will sometimes use contract clauses to suit themselves, and take advantage of the employer, causing cost overruns due to the difficulties in managing the contract. Eskom’s commercial activities are governed by the Public Finance Management Act (PFMA) and Constitution of South Africa, which states that an organisation such as Eskom should have in place “an appropriate procurement and provisioning system which is fair, equitable, transparent, competitive, and cost-effective.” This can eliminate irregularities in contracts, since they can have a serious economic impact, interfere with fair competition, and destroy confidence in the integrity and functioning of public administration Such irregularities may lead to costs overruns on projects where incompetent contractors are awarded a contract. Incorrect financial forecasting is a very serious issue, and needs to be addressed in order to help strengthen the cash flow and forecasting within Eskom. This research strategy is intended for quantifying observations of human behaviour, with the emphasis on exact measurements. The primary data for this study was generated through the administration of a structured questionnaire survey conducted among engineers, project managers, contract managers, and forensics personnel. The secondary data for the present study was gathered from literature in the form of open ended questionnaire from the same personnel. Poor commitment of buyers and chain approval meetings being shifted affect the delays in awarding of contracts. Lack of training of contract managers, absence of legal representative’s advice and squad checking meetings not being represented properly contributes to contracts being awarded with unsuitable clauses. Managers specifically forcing contracts to be awarded to a specific contractor, nepotism or favoritism, politics and contractor greediness, relate to irregularities in contracts. Lack of experience, revision of scope (unclarified scope), project delays, less effort being made when forecasting and unforeseen circumstances, such as strikes, and forces of nature, relate to incorrect financial forecasting. Continuous training and commitment of all personnel involved in the project environment is important, therefore Eskom personnel in the project environment should work as a team in an integrated way. Adequate time should be spent, and thorough checks made, to ensure that documents sent out for tendering conform to requirements. Involvement of all the supporting functions must be maximised. Code of ethics training and application is very crucial in the project environment, and the current governance policies should be adhered to by all stakeholders in the project.
- Full Text:
- Date Issued: 2015
- Authors: Mvelase, Thokozile Olivia
- Date: 2015
- Subjects: Eskom (Firm) , Industrial procurement -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/9140 , vital:26468
- Description: Supply Chain Management (SCM) has an overwhelming impact on firms as it directly impacts on sales and costs. Therefore, it must be a core competency for any organization and thus SCM expertise is highly valued in organisations. Procurement of goods and services has a major impact on the successful execution of the project. Procurement can help the business, ensuring that all the goods and services they buy will be of the right quality, quantity and price, and they will be delivered ‘just in time’. The application of procurement policies and practices, using fair and open procedures, is crucial not only for attracting efficient contractors and suppliers, but also to safeguard the principle of accountability and the cost-effective use of funds. Before awarding a tender, there is a substantial amount of work to be undertaken by the project manager, contracts manager, end user, buyer, and authorising committees. Commitment from personnel involved in contract awarding is not adequate. Furthermore, the Eskom governance process sometimes contributes to delays in awarding a contract. before the enquiry and tender documentation is sent out to the suppliers on the tender list, the core team involved in the procurement process verifies that the enquiry is complete and correct. Should there be contractual or legal issues during the execution of the project in the form of say a contract that has been issued with unsuitable clauses, solving the problem becomes difficult. Contractors will sometimes use contract clauses to suit themselves, and take advantage of the employer, causing cost overruns due to the difficulties in managing the contract. Eskom’s commercial activities are governed by the Public Finance Management Act (PFMA) and Constitution of South Africa, which states that an organisation such as Eskom should have in place “an appropriate procurement and provisioning system which is fair, equitable, transparent, competitive, and cost-effective.” This can eliminate irregularities in contracts, since they can have a serious economic impact, interfere with fair competition, and destroy confidence in the integrity and functioning of public administration Such irregularities may lead to costs overruns on projects where incompetent contractors are awarded a contract. Incorrect financial forecasting is a very serious issue, and needs to be addressed in order to help strengthen the cash flow and forecasting within Eskom. This research strategy is intended for quantifying observations of human behaviour, with the emphasis on exact measurements. The primary data for this study was generated through the administration of a structured questionnaire survey conducted among engineers, project managers, contract managers, and forensics personnel. The secondary data for the present study was gathered from literature in the form of open ended questionnaire from the same personnel. Poor commitment of buyers and chain approval meetings being shifted affect the delays in awarding of contracts. Lack of training of contract managers, absence of legal representative’s advice and squad checking meetings not being represented properly contributes to contracts being awarded with unsuitable clauses. Managers specifically forcing contracts to be awarded to a specific contractor, nepotism or favoritism, politics and contractor greediness, relate to irregularities in contracts. Lack of experience, revision of scope (unclarified scope), project delays, less effort being made when forecasting and unforeseen circumstances, such as strikes, and forces of nature, relate to incorrect financial forecasting. Continuous training and commitment of all personnel involved in the project environment is important, therefore Eskom personnel in the project environment should work as a team in an integrated way. Adequate time should be spent, and thorough checks made, to ensure that documents sent out for tendering conform to requirements. Involvement of all the supporting functions must be maximised. Code of ethics training and application is very crucial in the project environment, and the current governance policies should be adhered to by all stakeholders in the project.
- Full Text:
- Date Issued: 2015
Managing an information security policy architecture : a technical documentation perspective
- Maninjwa, Prosecutor Mvikeli
- Authors: Maninjwa, Prosecutor Mvikeli
- Date: 2012
- Subjects: Computer security -- Management , Computer architecture , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9825 , http://hdl.handle.net/10948/d1020757
- Description: Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However, the organization’s information assets are faced with a number of internal and external threats, aimed at compromising the confidentiality, integrity and/or availability (CIA) of information assets. These threats can be of physical, technical, or operational nature. For an organization to successfully conduct its business operations, information assets should always be protected from these threats. The process of protecting information and its related assets, ensuring the CIA thereof, is referred to as information security. To be effective, information security should be viewed as critical to the overall success of the organization, and therefore be included as one of the organization’s Corporate Governance sub-functions, referred to as Information Security Governance. Information Security Governance is the strategic system for directing and controlling the organization’s information security initiatives. Directing is the process whereby management issues directives, giving a strategic direction for information security within an organization. Controlling is the process of ensuring that management directives are being adhered to within an organization. To be effective, Information Security Governance directing and controlling depend on the organization’s Information Security Policy Architecture. An Information Security Policy Architecture is a hierarchical representation of the various information security policies and related documentation that an organization has used. When directing, management directives should be issued in the form of an Information Security Policy Architecture, and controlling should ensure adherence to the Information Security Policy Architecture. However, this study noted that in both literature and organizational practices, Information Security Policy Architectures are not comprehensively addressed and adequately managed. Therefore, this study argues towards a more comprehensive Information Security Policy Architecture, and the proper management thereof.
- Full Text:
- Date Issued: 2012
- Authors: Maninjwa, Prosecutor Mvikeli
- Date: 2012
- Subjects: Computer security -- Management , Computer architecture , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9825 , http://hdl.handle.net/10948/d1020757
- Description: Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However, the organization’s information assets are faced with a number of internal and external threats, aimed at compromising the confidentiality, integrity and/or availability (CIA) of information assets. These threats can be of physical, technical, or operational nature. For an organization to successfully conduct its business operations, information assets should always be protected from these threats. The process of protecting information and its related assets, ensuring the CIA thereof, is referred to as information security. To be effective, information security should be viewed as critical to the overall success of the organization, and therefore be included as one of the organization’s Corporate Governance sub-functions, referred to as Information Security Governance. Information Security Governance is the strategic system for directing and controlling the organization’s information security initiatives. Directing is the process whereby management issues directives, giving a strategic direction for information security within an organization. Controlling is the process of ensuring that management directives are being adhered to within an organization. To be effective, Information Security Governance directing and controlling depend on the organization’s Information Security Policy Architecture. An Information Security Policy Architecture is a hierarchical representation of the various information security policies and related documentation that an organization has used. When directing, management directives should be issued in the form of an Information Security Policy Architecture, and controlling should ensure adherence to the Information Security Policy Architecture. However, this study noted that in both literature and organizational practices, Information Security Policy Architectures are not comprehensively addressed and adequately managed. Therefore, this study argues towards a more comprehensive Information Security Policy Architecture, and the proper management thereof.
- Full Text:
- Date Issued: 2012
Shape memory Alloy Actuator for cross-feed in turning operation
- Authors: Otieno, Timothy
- Date: 2012
- Subjects: Shape memory alloys -- Mechanical properties , Shape memory alloys , Intermetallic compounds , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9650 , http://hdl.handle.net/10948/d1012590 , Shape memory alloys -- Mechanical properties , Shape memory alloys , Intermetallic compounds , Materials -- Mechanical properties
- Description: A shape memory alloy (SMA) is an intermetallic compound able to recover, in a continuous and reversible way, a predetermined shape during a thermal cycle while generating mechanical work. In this thesis, its use in developing an actuator for a machining process is investigated. The actuator is to drive the tool cross feed into an aluminium workpiece in a finishing lathe operation. The actuator structure was designed with an output shaft to transfer the movement and force of the SMA wire outside the device. The actuator was fabricated and the experimental setup was assembled which also included a power supply control circuit, displacement sensor, temperature sensor and current sensor for feedback, and data collection and monitoring within software. PID control was implemented within the software that regulated the power supplied to the SMA, thereby providing the position control. This study covers the mechatronics system design and development of the actuator, the experiments carried out to determine performance and the results. Open loop tests were conducted to determine the maximum stroke, the effect of cooling and response to radial forces. These tests revealed the expected non-linearity of the SMA. The actuator achieved the rated maximum stroke of 3-4 percent. The forced cooling test showed a general improvement of approximately 65 percent with fans. The radial force tests showed the value of the maximum stroke remained unaffected by force. The results from the closed loop tests responses with a tuned PID controller produced a stable system for various displacement setpoints. The actuator had a feed rate of 0.25 mm/s and an accuracy of 0.0153mm, which was within the acceptable accuracy for turning operations. The system was deemed accurate for a conventional lathe machine cross feed.
- Full Text:
- Date Issued: 2012
- Authors: Otieno, Timothy
- Date: 2012
- Subjects: Shape memory alloys -- Mechanical properties , Shape memory alloys , Intermetallic compounds , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9650 , http://hdl.handle.net/10948/d1012590 , Shape memory alloys -- Mechanical properties , Shape memory alloys , Intermetallic compounds , Materials -- Mechanical properties
- Description: A shape memory alloy (SMA) is an intermetallic compound able to recover, in a continuous and reversible way, a predetermined shape during a thermal cycle while generating mechanical work. In this thesis, its use in developing an actuator for a machining process is investigated. The actuator is to drive the tool cross feed into an aluminium workpiece in a finishing lathe operation. The actuator structure was designed with an output shaft to transfer the movement and force of the SMA wire outside the device. The actuator was fabricated and the experimental setup was assembled which also included a power supply control circuit, displacement sensor, temperature sensor and current sensor for feedback, and data collection and monitoring within software. PID control was implemented within the software that regulated the power supplied to the SMA, thereby providing the position control. This study covers the mechatronics system design and development of the actuator, the experiments carried out to determine performance and the results. Open loop tests were conducted to determine the maximum stroke, the effect of cooling and response to radial forces. These tests revealed the expected non-linearity of the SMA. The actuator achieved the rated maximum stroke of 3-4 percent. The forced cooling test showed a general improvement of approximately 65 percent with fans. The radial force tests showed the value of the maximum stroke remained unaffected by force. The results from the closed loop tests responses with a tuned PID controller produced a stable system for various displacement setpoints. The actuator had a feed rate of 0.25 mm/s and an accuracy of 0.0153mm, which was within the acceptable accuracy for turning operations. The system was deemed accurate for a conventional lathe machine cross feed.
- Full Text:
- Date Issued: 2012