A theoretical study of wireless networks in local area networks
- Authors: Nagar, Bansi
- Date: 2014-10-07
- Subjects: Wireless LANs , Local area networks (Computer networks) , Internet
- Type: Thesis
- Identifier: uj:12507 , http://hdl.handle.net/10210/12301
- Description: M.Com. (Computer Auditing) , With all the technology available in today’s world, people have become more connected to each other as well as to the world around them. This has been echoed by Rutledge (2009:1), who stated: “Emerging technologies are linking the world, but we no longer need wires and cables to connect people. People are no longer trapped by geography. We are, however, facing a digital tsunami as communications technology becomes cheaper, simpler, and more culturally-acceptable.” The new wireless technology has become an aid to most organizations, making networking simpler, cheaper and more effective, and has not only changed the way businesses operates but has changed the entire world of communications. It has not only caused a change in technology, but a change in the way of life. This is emphasized by Lawlor (2007:3), who stated: “Information technology has been a major driving force behind globalization and that information technology has now become a key component of a corporation’s global business strategy.” It is evident that the use of wireless technologies has changed the mode in which work is carried out and the manner in which communication takes place today. It has made it easier, more effective and efficient than before with wired technology. Wireless networks provide computing suppleness. It aids employees and individuals to take advantage of mobile networking for e-mail, Internet access, and sharing files regardless of where they are in the office or in a local area network (hereafter LAN). The advantage of the wireless setting is that it can be moved around at will, with no need for cables, leaving employees free to work from anywhere...
- Full Text:
- Authors: Nagar, Bansi
- Date: 2014-10-07
- Subjects: Wireless LANs , Local area networks (Computer networks) , Internet
- Type: Thesis
- Identifier: uj:12507 , http://hdl.handle.net/10210/12301
- Description: M.Com. (Computer Auditing) , With all the technology available in today’s world, people have become more connected to each other as well as to the world around them. This has been echoed by Rutledge (2009:1), who stated: “Emerging technologies are linking the world, but we no longer need wires and cables to connect people. People are no longer trapped by geography. We are, however, facing a digital tsunami as communications technology becomes cheaper, simpler, and more culturally-acceptable.” The new wireless technology has become an aid to most organizations, making networking simpler, cheaper and more effective, and has not only changed the way businesses operates but has changed the entire world of communications. It has not only caused a change in technology, but a change in the way of life. This is emphasized by Lawlor (2007:3), who stated: “Information technology has been a major driving force behind globalization and that information technology has now become a key component of a corporation’s global business strategy.” It is evident that the use of wireless technologies has changed the mode in which work is carried out and the manner in which communication takes place today. It has made it easier, more effective and efficient than before with wired technology. Wireless networks provide computing suppleness. It aids employees and individuals to take advantage of mobile networking for e-mail, Internet access, and sharing files regardless of where they are in the office or in a local area network (hereafter LAN). The advantage of the wireless setting is that it can be moved around at will, with no need for cables, leaving employees free to work from anywhere...
- Full Text:
Authentication of banking transactions over the Internet
- Authors: Naude, Louis
- Date: 2012-08-23
- Subjects: Banks and banking -- Security measures , Internet , Computer networks -- Security measures
- Type: Mini-Dissertation
- Identifier: uj:3095 , http://hdl.handle.net/10210/6513
- Description: M.Comm. , Due to the new dimension the Internet has brought to electronic commerce, and the fact that banks are now able to deliver their services over the Internet, a structure need to be in place to ensure a secure environment for such banks. In the literature survey Internet risks and security tools will first be dealt first with in chapter two and then, in chapter three, client authentication methods required when delivering banking services over the Internet will be compared to authentication in the traditional IT banking environment. In chapter four basic Internet policy requirements will be analysed to serve as basis for the development of the Internet Security Policy Framework (checklist) for banks delivering services over the Internet as presented in chapter five. This framework will ensure that all risk areas have been covered in authenticating clients over the Internet and simultaneously to secure the Bank's own systems.
- Full Text:
- Authors: Naude, Louis
- Date: 2012-08-23
- Subjects: Banks and banking -- Security measures , Internet , Computer networks -- Security measures
- Type: Mini-Dissertation
- Identifier: uj:3095 , http://hdl.handle.net/10210/6513
- Description: M.Comm. , Due to the new dimension the Internet has brought to electronic commerce, and the fact that banks are now able to deliver their services over the Internet, a structure need to be in place to ensure a secure environment for such banks. In the literature survey Internet risks and security tools will first be dealt first with in chapter two and then, in chapter three, client authentication methods required when delivering banking services over the Internet will be compared to authentication in the traditional IT banking environment. In chapter four basic Internet policy requirements will be analysed to serve as basis for the development of the Internet Security Policy Framework (checklist) for banks delivering services over the Internet as presented in chapter five. This framework will ensure that all risk areas have been covered in authenticating clients over the Internet and simultaneously to secure the Bank's own systems.
- Full Text:
The relationship between personality traits, attitudes towards the Internet and Internet usage
- Authors: Cronje, Marthie
- Date: 2011-11-24
- Subjects: Personality research , Attitude (Psychology) , Internet , Internet usage
- Type: Thesis
- Identifier: uj:1729 , http://hdl.handle.net/10210/4079
- Description: M.A. , The goal of the present study was to investigate the relationship between personality traits, attitudes towards the Internet, and Internet use. This study was regarded as important because the Internet is increasingly becoming an important part of everyday life, and is changing society as we know it. 224 third year psychology students participated in the study. The existing literature indicated that the personality traits of Extraversion and Openness to Experience were likely to influence Internet use. Attitudes could also be expected to influence volitional behaviour, such as voluntary Internet use. Other research has also found exposure to be positively related to attitudes. A self-constructed questionnaire collected information relating to computer and Internet use, as well as attitudes towards the Internet. A short personality measure, namely the Saucier (1994) 40-ltem Mini-marker set, was used to measure the personality traits of participants. Examination of the results obtained through correlational and multiple regression techniques supported the existing theory. The personality traits of Extraversion and Openness to Experience were found to predict Internet use in certain situations, with Openness emerging as particularly important in understanding computer and Internet use. Attitudes formed by exposure to the Internet, as measured by the self-constructed Internet exposure scale, was found to correlate positively with time spent on the Internet. The study support previous studies which found that the personality traits of Extraversion and Openness influence media use, and suggest that this influence is also present in relation to Internet use. It also supported the theory that a positive relationship exists between attitudes towards the Internet, specifically attitudes formed by exposure, and frequency of Internet use.
- Full Text:
- Authors: Cronje, Marthie
- Date: 2011-11-24
- Subjects: Personality research , Attitude (Psychology) , Internet , Internet usage
- Type: Thesis
- Identifier: uj:1729 , http://hdl.handle.net/10210/4079
- Description: M.A. , The goal of the present study was to investigate the relationship between personality traits, attitudes towards the Internet, and Internet use. This study was regarded as important because the Internet is increasingly becoming an important part of everyday life, and is changing society as we know it. 224 third year psychology students participated in the study. The existing literature indicated that the personality traits of Extraversion and Openness to Experience were likely to influence Internet use. Attitudes could also be expected to influence volitional behaviour, such as voluntary Internet use. Other research has also found exposure to be positively related to attitudes. A self-constructed questionnaire collected information relating to computer and Internet use, as well as attitudes towards the Internet. A short personality measure, namely the Saucier (1994) 40-ltem Mini-marker set, was used to measure the personality traits of participants. Examination of the results obtained through correlational and multiple regression techniques supported the existing theory. The personality traits of Extraversion and Openness to Experience were found to predict Internet use in certain situations, with Openness emerging as particularly important in understanding computer and Internet use. Attitudes formed by exposure to the Internet, as measured by the self-constructed Internet exposure scale, was found to correlate positively with time spent on the Internet. The study support previous studies which found that the personality traits of Extraversion and Openness influence media use, and suggest that this influence is also present in relation to Internet use. It also supported the theory that a positive relationship exists between attitudes towards the Internet, specifically attitudes formed by exposure, and frequency of Internet use.
- Full Text:
Rendering information services to rural communities through Web technology
- Authors: Letshela, Phegello Zacharia
- Date: 2012-08-29
- Subjects: Community information services - South Africa , Rural development - Information services - South Africa , Rural development - South Africa , Internet , World Wide Web
- Type: Mini-Dissertation
- Identifier: uj:3416 , http://hdl.handle.net/10210/6813
- Description: D.Litt. et Phil. , This research investigated the possibilities of rendering information services to rural communities through the use of Web technology. The research endeavoured to establish the role that institutions of higher learning can play to provide this service as part of their community outreach function. Research indicated that in other countries such as the U.S.A and Canada universities were involved in using their Internet infrastructure to connect rural communities to the information super highway. To provide a scientific basis for a local model, an investigation into needs of rural communities was launched. A further survey was conducted on the different roles that universities were playing. A follow-up survey was conducted to establish how other countries were using this technology to render information services to rural communities. Following these surveys, an investigation into one of the departments at the University of the North (UNIN), namely the Aquaculture Research Unit (ARU), was conducted to have a clear understanding of the outreach projects currently provided by this department. Based on these investigations a local model was designed that could be used by UNIN to provide information services to rural communities in the Northern Province. Other institutions of higher learning in South Africa could also adopt and adapt this model for use in their own provinces. The final part of this research provided ideas on how this initiative of rendering information services to rural areas could be pursued further by other research projects.
- Full Text:
- Authors: Letshela, Phegello Zacharia
- Date: 2012-08-29
- Subjects: Community information services - South Africa , Rural development - Information services - South Africa , Rural development - South Africa , Internet , World Wide Web
- Type: Mini-Dissertation
- Identifier: uj:3416 , http://hdl.handle.net/10210/6813
- Description: D.Litt. et Phil. , This research investigated the possibilities of rendering information services to rural communities through the use of Web technology. The research endeavoured to establish the role that institutions of higher learning can play to provide this service as part of their community outreach function. Research indicated that in other countries such as the U.S.A and Canada universities were involved in using their Internet infrastructure to connect rural communities to the information super highway. To provide a scientific basis for a local model, an investigation into needs of rural communities was launched. A further survey was conducted on the different roles that universities were playing. A follow-up survey was conducted to establish how other countries were using this technology to render information services to rural communities. Following these surveys, an investigation into one of the departments at the University of the North (UNIN), namely the Aquaculture Research Unit (ARU), was conducted to have a clear understanding of the outreach projects currently provided by this department. Based on these investigations a local model was designed that could be used by UNIN to provide information services to rural communities in the Northern Province. Other institutions of higher learning in South Africa could also adopt and adapt this model for use in their own provinces. The final part of this research provided ideas on how this initiative of rendering information services to rural areas could be pursued further by other research projects.
- Full Text:
Riglyne vir die gebruik van die Internet in onderrig
- Authors: De Bruyn, Annis Malcolm
- Date: 2012-08-15
- Subjects: Internet , Educational technology , Education -- Computer network resources
- Type: Thesis
- Identifier: uj:9347 , http://hdl.handle.net/10210/5786
- Description: D.Ed. , The increase in internal and external communication has brought about a radical change in organisation and has left its mark on education. Information remains the facilitator's most important aid. At present information is stored in textbooks, facilitator's notes, audiocassettes, sources of reference, videos and curriculum guides. Facilitators and learners obtain information from these sources and process it in various ways. By means of digital technology it has become possible both to keep all these sources up to date and to establish a direct link with other sources. The question arises as to how education can make use of this extensive aid. This research poses the question whether education can be advanced through the effective use of electronic communication such as videos, computers and, more specifically, the Internet. With a view to the utilisation of electronic communication for education, an Internet module as an example was designed, in order to determine which application possibilities exist in electronic communication, more specifically the Internet, and how they can be utilised for the dissemination of information. The research has attempted to provide guidelines for the effective utilisation of an Internet module applied as learning content. A qualitative, exploratory and descriptive research design is followed within contextual setting to achieve the aims of the study. In Phase One of the research a relevant study of literature on electronic communication, the Internet, and education was undertaken in order to design and apply an Internet module. The research method consists of interviews with media experts, focusing on the application possibilities and the establishment of guidelines for an Internet module. A group interview with principals was held mainly for verification and triagulatory purposes. The results of the study were compared with existing literature on the subject. The conclusions, findings and recommendations resulting from the research were presented for consideration and further research. Some of the most important findings and recommendations follow.
- Full Text:
- Authors: De Bruyn, Annis Malcolm
- Date: 2012-08-15
- Subjects: Internet , Educational technology , Education -- Computer network resources
- Type: Thesis
- Identifier: uj:9347 , http://hdl.handle.net/10210/5786
- Description: D.Ed. , The increase in internal and external communication has brought about a radical change in organisation and has left its mark on education. Information remains the facilitator's most important aid. At present information is stored in textbooks, facilitator's notes, audiocassettes, sources of reference, videos and curriculum guides. Facilitators and learners obtain information from these sources and process it in various ways. By means of digital technology it has become possible both to keep all these sources up to date and to establish a direct link with other sources. The question arises as to how education can make use of this extensive aid. This research poses the question whether education can be advanced through the effective use of electronic communication such as videos, computers and, more specifically, the Internet. With a view to the utilisation of electronic communication for education, an Internet module as an example was designed, in order to determine which application possibilities exist in electronic communication, more specifically the Internet, and how they can be utilised for the dissemination of information. The research has attempted to provide guidelines for the effective utilisation of an Internet module applied as learning content. A qualitative, exploratory and descriptive research design is followed within contextual setting to achieve the aims of the study. In Phase One of the research a relevant study of literature on electronic communication, the Internet, and education was undertaken in order to design and apply an Internet module. The research method consists of interviews with media experts, focusing on the application possibilities and the establishment of guidelines for an Internet module. A group interview with principals was held mainly for verification and triagulatory purposes. The results of the study were compared with existing literature on the subject. The conclusions, findings and recommendations resulting from the research were presented for consideration and further research. Some of the most important findings and recommendations follow.
- Full Text:
Internet chat rooms: new meeting places for real identities
- Authors: Marneweck, Maritha
- Date: 2008-10-27T06:38:57Z
- Subjects: Internet , Virtual reality , Communication and technology , Online chat groups , Computer communication systems
- Type: Thesis
- Identifier: uj:13291 , http://hdl.handle.net/10210/1330
- Description: M.A. , The anonymity associated with Computer Mediated Communication has formed the basis of an assumption that fantasy is a prominent feature of interactions taking place via the internet. Some of the literature argues that through fantasy identities all participants are able to become whoever they want to be, creating new virtual communities where equality between members is fundamental in their interactions. The findings of this dissertation suggest, however, that anonymity is limited by the reasons for chat room participation. Further, all the members are not equal, with a clear hierarchy evident as one logs onto the site. This study also argues that the concept of ‘virtual communities’ is not an accurate description of what occurs in chat rooms. The examination of chat rooms as ‘new meeting places’ for real identities is expected to generate more accurate theoretical postulations, in which the significance of the linkages between on- and offline realities is acknowledged. The extended case method was used to examine a chat room, known as Conversations, to investigate the linkages between online participation patterns and offline realities. Issues concerning identity and identity formation informed the principal motives in the selection of a research design that allowed the researcher extensive exposure to the members of this chat room. Since the emphasis was on the discovery of the meaning the chatters themselves attached to their participation, it was important to use a comprehensive research design. To this effect, three complementary data gathering techniques were employed; namely: virtual participant observation, face-to-face participant observation and in-depth interviews. Through this innovative research design the linkages between social opportunities, individual motivation and chat room participation were illuminated. , Meera Ichharam Chris Bolsmann
- Full Text:
- Authors: Marneweck, Maritha
- Date: 2008-10-27T06:38:57Z
- Subjects: Internet , Virtual reality , Communication and technology , Online chat groups , Computer communication systems
- Type: Thesis
- Identifier: uj:13291 , http://hdl.handle.net/10210/1330
- Description: M.A. , The anonymity associated with Computer Mediated Communication has formed the basis of an assumption that fantasy is a prominent feature of interactions taking place via the internet. Some of the literature argues that through fantasy identities all participants are able to become whoever they want to be, creating new virtual communities where equality between members is fundamental in their interactions. The findings of this dissertation suggest, however, that anonymity is limited by the reasons for chat room participation. Further, all the members are not equal, with a clear hierarchy evident as one logs onto the site. This study also argues that the concept of ‘virtual communities’ is not an accurate description of what occurs in chat rooms. The examination of chat rooms as ‘new meeting places’ for real identities is expected to generate more accurate theoretical postulations, in which the significance of the linkages between on- and offline realities is acknowledged. The extended case method was used to examine a chat room, known as Conversations, to investigate the linkages between online participation patterns and offline realities. Issues concerning identity and identity formation informed the principal motives in the selection of a research design that allowed the researcher extensive exposure to the members of this chat room. Since the emphasis was on the discovery of the meaning the chatters themselves attached to their participation, it was important to use a comprehensive research design. To this effect, three complementary data gathering techniques were employed; namely: virtual participant observation, face-to-face participant observation and in-depth interviews. Through this innovative research design the linkages between social opportunities, individual motivation and chat room participation were illuminated. , Meera Ichharam Chris Bolsmann
- Full Text:
The internet : a business tool for organisations in the nineties
- Authors: Roux, André
- Date: 2012-08-14
- Subjects: Internet , Business enterprises - Computer networks , Business intormation services
- Type: Thesis
- Identifier: uj:9174 , http://hdl.handle.net/10210/5626
- Description: M.Comm. , The main aim of this study is to provide an insight on how businesses can use the Internet to enhance their existing business operations. Towards this aim, there are the following secondary aims. Explaining what the Internet can and cannot do, and the tools required. Identifying the current risks involved with the Internet and their impact on business. Providing a possible strategy to follow when planning on using the Internet for business. The output of this study should provide clear guidelines to any South African organisation on why they should utilise, or alternatively, avoid the Internet.
- Full Text:
- Authors: Roux, André
- Date: 2012-08-14
- Subjects: Internet , Business enterprises - Computer networks , Business intormation services
- Type: Thesis
- Identifier: uj:9174 , http://hdl.handle.net/10210/5626
- Description: M.Comm. , The main aim of this study is to provide an insight on how businesses can use the Internet to enhance their existing business operations. Towards this aim, there are the following secondary aims. Explaining what the Internet can and cannot do, and the tools required. Identifying the current risks involved with the Internet and their impact on business. Providing a possible strategy to follow when planning on using the Internet for business. The output of this study should provide clear guidelines to any South African organisation on why they should utilise, or alternatively, avoid the Internet.
- Full Text:
Internet EDI risks in an ordering system
- Gohil, Ketansinh Aniruddhsinh
- Authors: Gohil, Ketansinh Aniruddhsinh
- Date: 2012-08-22
- Subjects: Electronic data interchange , Internet , Internet - Security measures
- Type: Mini-Dissertation
- Identifier: uj:2992 , http://hdl.handle.net/10210/6416
- Description: M.Comm. , The Gartner Group (1996c:1) has recognised that the Internet has grown substantially since its inception. Recently, companies are "Internet enabling" their applications (The Gartner Group, 1997:1) and they are increasingly using the Internet to initiate transactions (The Gartner Group, 1996b:16). The South African Institute of Chartered Accountants requires that an auditor should assess the control environment for each material class of transactions (SAICA, SAAS 400 .18). Therefore the auditor may be required to review an Internet ordering system where this is the source of material sales transactions. With the increasing sophistication of computerised systems, computer auditors are being forced to treat computer systems as the target of their audits (Watne and Turne, 1994:14). The literature survey conducted did not reveal a suitable risk model which may be applied to Internet ordering systems. Therefore the objective of the research was to develop such a risk model. The research identified the technology involved in Internet ordering systems. A detailed literature review of these components was performed. Thereafter, the research defined risk and selected a risk model appropriate to Internet ordering systems. Risk was defined in relation to control objectives for computer systems, as defined by Watne and Turne (1990:308-309), and the risk model selected was the Access Model and the Path Context Model developed by Boshoff (1985, 1990). Four layers in the "access path" of an Internet ordering system were selected for review, namely the HTML electronic form, HTTP, TCP/IP and CGI scripts. Risk factors identified varied according to the layers in the access path of an Internet ordering system. In the HTML layer, risk was influenced by the design elements of the electronic form. At the HTTP level, message header fields and server HTTP response codes impacted on risk. TCP/IP was also found to have header fields which affected risk. Finally, CGI scripts were found to be different to the other layers. Risk factors at this level were found to be very dependent on the actual CGI scripts implemented. The short dissertation opened additional areas for research. Of the three types of Internet EDI systems identified by The Gartner Group (1996b:4), only one was selected for research in this short dissertation. Clearly, opportunity exists for similar research to be conducted on the other Internet EDI implementations. Another area opened for research was the evaluation of risk in system-specific CGI scripts. In conclusion, growth of electronic commerce on the Internet is being hampered by debate over taxation of goods and services sold over the Internet and by US government concerns over the exporting of encryption techniques (The Gartner Group, 1997b:1). However it appears that successful resolution of these issues is on the horizon (The Gartner Group, 1997b:1).
- Full Text:
- Authors: Gohil, Ketansinh Aniruddhsinh
- Date: 2012-08-22
- Subjects: Electronic data interchange , Internet , Internet - Security measures
- Type: Mini-Dissertation
- Identifier: uj:2992 , http://hdl.handle.net/10210/6416
- Description: M.Comm. , The Gartner Group (1996c:1) has recognised that the Internet has grown substantially since its inception. Recently, companies are "Internet enabling" their applications (The Gartner Group, 1997:1) and they are increasingly using the Internet to initiate transactions (The Gartner Group, 1996b:16). The South African Institute of Chartered Accountants requires that an auditor should assess the control environment for each material class of transactions (SAICA, SAAS 400 .18). Therefore the auditor may be required to review an Internet ordering system where this is the source of material sales transactions. With the increasing sophistication of computerised systems, computer auditors are being forced to treat computer systems as the target of their audits (Watne and Turne, 1994:14). The literature survey conducted did not reveal a suitable risk model which may be applied to Internet ordering systems. Therefore the objective of the research was to develop such a risk model. The research identified the technology involved in Internet ordering systems. A detailed literature review of these components was performed. Thereafter, the research defined risk and selected a risk model appropriate to Internet ordering systems. Risk was defined in relation to control objectives for computer systems, as defined by Watne and Turne (1990:308-309), and the risk model selected was the Access Model and the Path Context Model developed by Boshoff (1985, 1990). Four layers in the "access path" of an Internet ordering system were selected for review, namely the HTML electronic form, HTTP, TCP/IP and CGI scripts. Risk factors identified varied according to the layers in the access path of an Internet ordering system. In the HTML layer, risk was influenced by the design elements of the electronic form. At the HTTP level, message header fields and server HTTP response codes impacted on risk. TCP/IP was also found to have header fields which affected risk. Finally, CGI scripts were found to be different to the other layers. Risk factors at this level were found to be very dependent on the actual CGI scripts implemented. The short dissertation opened additional areas for research. Of the three types of Internet EDI systems identified by The Gartner Group (1996b:4), only one was selected for research in this short dissertation. Clearly, opportunity exists for similar research to be conducted on the other Internet EDI implementations. Another area opened for research was the evaluation of risk in system-specific CGI scripts. In conclusion, growth of electronic commerce on the Internet is being hampered by debate over taxation of goods and services sold over the Internet and by US government concerns over the exporting of encryption techniques (The Gartner Group, 1997b:1). However it appears that successful resolution of these issues is on the horizon (The Gartner Group, 1997b:1).
- Full Text:
Remote monitoring and diagnosis for control of EDM parameters
- Authors: Cilliers, Charl
- Date: 2008-11-18T09:06:39Z
- Subjects: Machining automatic control , Machining monitoring , Computer integrated manufacturing systems , Internet , Computer network protocols , Neural networks (Computer science)
- Type: Thesis
- Identifier: uj:14726 , http://hdl.handle.net/10210/1730
- Description: M.Ing. , This thesis presents the concept of remote (Internet) data acquisition and processing for control of EDM parameters. It incorporates aspects of data analysis while performing diagnosis of process behavior. A working neuro-macro model of the EDM process is utilized for process correlation and diagnosis recommendations. The approach allows selective ways to vary the EDM process performance. The focus in this work is on the process efficiency. The process efficiency is related to the input parameters through the neuro-macro model of the EDM process. A comprehensive description of on-line monitoring and processing of data is included. Experimental results based on the suggested analysis and diagnosis for possible process adaptation particularly with respect to the EDM process efficiency is presented.
- Full Text:
- Authors: Cilliers, Charl
- Date: 2008-11-18T09:06:39Z
- Subjects: Machining automatic control , Machining monitoring , Computer integrated manufacturing systems , Internet , Computer network protocols , Neural networks (Computer science)
- Type: Thesis
- Identifier: uj:14726 , http://hdl.handle.net/10210/1730
- Description: M.Ing. , This thesis presents the concept of remote (Internet) data acquisition and processing for control of EDM parameters. It incorporates aspects of data analysis while performing diagnosis of process behavior. A working neuro-macro model of the EDM process is utilized for process correlation and diagnosis recommendations. The approach allows selective ways to vary the EDM process performance. The focus in this work is on the process efficiency. The process efficiency is related to the input parameters through the neuro-macro model of the EDM process. A comprehensive description of on-line monitoring and processing of data is included. Experimental results based on the suggested analysis and diagnosis for possible process adaptation particularly with respect to the EDM process efficiency is presented.
- Full Text:
Peer-to-peer file-sharing as part of an information infrastructure
- Niemand, Cornelius Johannes Petrus
- Authors: Niemand, Cornelius Johannes Petrus
- Date: 2009-01-12T07:27:31Z
- Subjects: Peer-to-peer architecture (Computer networks) , Internet
- Type: Thesis
- Identifier: uj:14785 , http://hdl.handle.net/10210/1862
- Description: M.A. , A second technological revolution is imminent. As with the first major technological revolution, which was driven by the decentralisation of computing power from that of mainframe networks to that of the “smart” personal-workstation computer, this second revolution is also characterised and driven by decentralised online-communication technology. In terms of this second revolution, however, modern computer users are poised to free themselves of centralised Internet servers for communication and/or file-sharing by connecting to other users directly. This second revolution has even been given a name, that is, “People-to-People” or “Peer-to-Peer computing”, called “P2P computing” for short. Although the basic concept of P2P computing cannot lay claim to being entirely new, it is associated by many a user with file-sharing, particularly with MP3 music files, whilst P2P computing, in fact, constitutes much more, such as instant messaging, group collaboration and distributed computing. Closer to the Information Studies and library environments would be the P2P data replication of a digital-library collection. The extensive use of P2P computing will have a significant impact on the bandwidths available within organisations, to the extent that an unprepared network may very well be overwhelmed by the increased traffic generated by the use of P2P file-sharing. A well-founded understanding of the usage patterns of the individuals using P2P applications will ensure better management and control by the system administrators of and over the expensive information technology (IT) infrastructure. This will also ensure better response to and usage of other systems and applications, such as e-mail and the general World Wide Web utilising the same infrastructure. The principal aim of this study, which was undertaken at the Rand Afrikaans University, is to identify such user behaviour and utilisation patterns in students interacting with P2P systems available on the Internet. The selected respondents, in their capacity of Information Science students, all completed a questionnaire aimed at examining, among other things, aspects such as • information technology (IT) utilisation • the frequency and duration of user sessions • the type of content downloaded and shared • the social aspects associated with P2P file-sharing. P2P computing can be seen as a radically new mindset, setting the stage for a decentralised Internet future. Although distributed computing is dogged by various inherent problems, for example copyright and privacy issues, the most troublesome problem still is that of bandwidth usage. It is to be hoped, therefore, that the application of the research results of this study will ensure the better management of existing infrastructure and resources, as well as the development and rendering of new value-added services within organisations.
- Full Text:
- Authors: Niemand, Cornelius Johannes Petrus
- Date: 2009-01-12T07:27:31Z
- Subjects: Peer-to-peer architecture (Computer networks) , Internet
- Type: Thesis
- Identifier: uj:14785 , http://hdl.handle.net/10210/1862
- Description: M.A. , A second technological revolution is imminent. As with the first major technological revolution, which was driven by the decentralisation of computing power from that of mainframe networks to that of the “smart” personal-workstation computer, this second revolution is also characterised and driven by decentralised online-communication technology. In terms of this second revolution, however, modern computer users are poised to free themselves of centralised Internet servers for communication and/or file-sharing by connecting to other users directly. This second revolution has even been given a name, that is, “People-to-People” or “Peer-to-Peer computing”, called “P2P computing” for short. Although the basic concept of P2P computing cannot lay claim to being entirely new, it is associated by many a user with file-sharing, particularly with MP3 music files, whilst P2P computing, in fact, constitutes much more, such as instant messaging, group collaboration and distributed computing. Closer to the Information Studies and library environments would be the P2P data replication of a digital-library collection. The extensive use of P2P computing will have a significant impact on the bandwidths available within organisations, to the extent that an unprepared network may very well be overwhelmed by the increased traffic generated by the use of P2P file-sharing. A well-founded understanding of the usage patterns of the individuals using P2P applications will ensure better management and control by the system administrators of and over the expensive information technology (IT) infrastructure. This will also ensure better response to and usage of other systems and applications, such as e-mail and the general World Wide Web utilising the same infrastructure. The principal aim of this study, which was undertaken at the Rand Afrikaans University, is to identify such user behaviour and utilisation patterns in students interacting with P2P systems available on the Internet. The selected respondents, in their capacity of Information Science students, all completed a questionnaire aimed at examining, among other things, aspects such as • information technology (IT) utilisation • the frequency and duration of user sessions • the type of content downloaded and shared • the social aspects associated with P2P file-sharing. P2P computing can be seen as a radically new mindset, setting the stage for a decentralised Internet future. Although distributed computing is dogged by various inherent problems, for example copyright and privacy issues, the most troublesome problem still is that of bandwidth usage. It is to be hoped, therefore, that the application of the research results of this study will ensure the better management of existing infrastructure and resources, as well as the development and rendering of new value-added services within organisations.
- Full Text:
Business strategy for the application of internet and intranet technology in Eskom
- Authors: Moodley, Raj
- Date: 2014-07-23
- Subjects: Business enterprises - Computer networks , Internet , Intranets (Computer networks) , Eskom (Firm)
- Type: Thesis
- Identifier: uj:11744 , http://hdl.handle.net/10210/11470
- Description: M.B.A. , Eskom, South Africa's electricity utility, is the electricity supplier for South Africa. It has 20 power stations with a nominal capacity of 39 154 megawatts. Eskom is among the top five electricity utilities in the world in terms of size and sales and strives to remain one of the lowest-cost producers of electricity in the world. Eskom supplies 98% of the country's electricity requirements, which amounts to more than half of the electricity generated on the African continent. Eskom supports the development of a Southern African transmission grod to encourage cooperation and accelerate economic growth in the region. Eskom support employment equity and encourages employees to develop to their full potential through training. Eskom sees itself as a respected corporate citizen and is working towards environmental sustainability and socio-economic improvement (Eskom report, 1997). The growth of Internet technologies (and within Eskom the Intranet) has been phenomenal. On 23 July 1998, after extensive consultation and compilation, an Eskom Internet / Intranet strategy was approved. The strategy defines the way in which Eskom will employ this technology to support their business, to ensure synergy in organisational efforts. This chapter gives an overview of the strategy (Eskom Report, 1997). The strategy positions Eskom to be able to derive significant business benefit. from the technology, and ensures we will not be "left behind" by our competitors and customers, but ensures that our use of the technology and the resulting costs can be properly managed. It accommodates the different cultures in the business groups, from progressive through conservative, in terms of the deployment of the technology ...
- Full Text:
- Authors: Moodley, Raj
- Date: 2014-07-23
- Subjects: Business enterprises - Computer networks , Internet , Intranets (Computer networks) , Eskom (Firm)
- Type: Thesis
- Identifier: uj:11744 , http://hdl.handle.net/10210/11470
- Description: M.B.A. , Eskom, South Africa's electricity utility, is the electricity supplier for South Africa. It has 20 power stations with a nominal capacity of 39 154 megawatts. Eskom is among the top five electricity utilities in the world in terms of size and sales and strives to remain one of the lowest-cost producers of electricity in the world. Eskom supplies 98% of the country's electricity requirements, which amounts to more than half of the electricity generated on the African continent. Eskom supports the development of a Southern African transmission grod to encourage cooperation and accelerate economic growth in the region. Eskom support employment equity and encourages employees to develop to their full potential through training. Eskom sees itself as a respected corporate citizen and is working towards environmental sustainability and socio-economic improvement (Eskom report, 1997). The growth of Internet technologies (and within Eskom the Intranet) has been phenomenal. On 23 July 1998, after extensive consultation and compilation, an Eskom Internet / Intranet strategy was approved. The strategy defines the way in which Eskom will employ this technology to support their business, to ensure synergy in organisational efforts. This chapter gives an overview of the strategy (Eskom Report, 1997). The strategy positions Eskom to be able to derive significant business benefit. from the technology, and ensures we will not be "left behind" by our competitors and customers, but ensures that our use of the technology and the resulting costs can be properly managed. It accommodates the different cultures in the business groups, from progressive through conservative, in terms of the deployment of the technology ...
- Full Text:
Distributed manufacturing systems and the internet of things : a case study
- Butala, P., Vrabič, R., Oosthuizen, G.
- Authors: Butala, P. , Vrabič, R. , Oosthuizen, G.
- Date: 2013
- Subjects: Distributed manufacturing systems , Internet
- Type: Article
- Identifier: uj:4915 , http://hdl.handle.net/10210/13015
- Description: In order to stay competitive in today's global market, manufacturing companies need to be flexible. To ensure flexible production, shorten processing times, and reduce time-tomarket, companies are utilizing the distributed manufacturing system paradigm, wherein geographically distributed, local resources are used for product development and production. In this context, the Internet of Things (IoT) has emerged as a concept which uses existing communication technologies, such as local wireless networks and the Internet to ensure visibility of anything from anywhere and at any time. In the paper, a case study of applying the IoT to the manufacturing domain is discussed. A distributed agent-based system for virtual monitoring and control of 3-axis CNC milling machine tools is designed and developed. The machines' 3D models and process states are shown through a web interface in real-time. The potential and challenges of implementing this system and the basic building blocks for decentralized value creation are discussed.
- Full Text:
- Authors: Butala, P. , Vrabič, R. , Oosthuizen, G.
- Date: 2013
- Subjects: Distributed manufacturing systems , Internet
- Type: Article
- Identifier: uj:4915 , http://hdl.handle.net/10210/13015
- Description: In order to stay competitive in today's global market, manufacturing companies need to be flexible. To ensure flexible production, shorten processing times, and reduce time-tomarket, companies are utilizing the distributed manufacturing system paradigm, wherein geographically distributed, local resources are used for product development and production. In this context, the Internet of Things (IoT) has emerged as a concept which uses existing communication technologies, such as local wireless networks and the Internet to ensure visibility of anything from anywhere and at any time. In the paper, a case study of applying the IoT to the manufacturing domain is discussed. A distributed agent-based system for virtual monitoring and control of 3-axis CNC milling machine tools is designed and developed. The machines' 3D models and process states are shown through a web interface in real-time. The potential and challenges of implementing this system and the basic building blocks for decentralized value creation are discussed.
- Full Text:
- «
- ‹
- 1
- ›
- »