Wadeville, Germiston, is home to the local manufacture of cast brake drums and ventilated disks using the casting processes. To satisfy the stringent acceptance criteria of the major motor manufacturers, the plant recently installed an Adroit supervisory control and data acquisition (scada) system to achieve a fully automated, continuous moulding and sand recycling plant, free of human interference and with full, online record keeping.
Moulding sand
Moulding sand is the key component in quality casting moulds. Good quality moulding sand ensures good quality castings and the site utilises 35 tons of this per hour in the manufacture of car components for all the major motoring brands.
After a casting mould has been used, the useful properties of the moulding sand are lost due to ingredient losses that occur when the hot liquid metals are poured into the mould. During the recycling process, moisture and other ingredients are replenished. The Adroit scada was implemented to precisely control the parameters of the sand on a continuous basis. Foremost among these is the measurement of water content. Water content is kept up to 0,2%.
Recycling the moulding sand
Sand is recycled in a five-day-a-week continuous batch operation. Parameters are entered through the Adroit system and implemented by the foundry machinery, a Compactibility Controller and Bond Determinator (CCBD) then feeds data back to the Adroit. This complex mini-lab (imported from USA) automatically draws samples of the sand and performs a battery of tests on the medium in less than one minute. Each batch is separately numbered for reference purposes.
One of the parameters measured by the CCBD is the bond, which is the term used to describe the binding properties of moulding sand, the ingredient added to recover these properties is a fine clay called Pentenite, that, when combined with water, gives the moulding sand its mechanical strength.
The role of the scada
The CCBD is linked to the scada for online monitoring purposes and to ensure access to the parameters. Adroit Technologies helped set up the communication using Adroit's Ethernet communication features. The plant makes extensive use of the Adroit trending functionality to provide an online reference for plant operators as to the process temperatures, moisture levels and sand water content, and the sand's strength as tested by the CCBD.
Batch reports are printed continuously, while data drawn from a Microsoft Access database provides daily reports on the plant operations and batch statistics - which is then further analysed using Opus reporting software. The scada's onscreen and audible alarming provides notification to operators in case the sand's parameters stray over their limits - or in instances when any plant equipment malfunctions, and the times that these events occur.
The project began in April 2004 and was completed in August.
Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.
Read more...Axis signs CISA Secure by Design pledge Axis Communications SA
News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.
Read more...HC Series hand controller
SCADA/HMI
The HC Series hand controller is a pre-qualified solution for demanding environments, and ensures safe and intuitive command where standard controls fail.
Read more...AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.
Read more...Becoming a leader in alarm annunciators Omniflex Remote Monitoring Specialists
SCADA/HMI
The rise of the digital age and PC-based systems and graphical interfaces led many to view the traditional annunciator market as obsolete. Omniflex explains how the company saw the market differently to then established players like Highland and Rochester, and how it reshaped the industry.
Read more...Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.
Read more...Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence
Read more...What is your ‘real’ security posture? BlueVision
Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?
Read more...What is your ‘real’ security posture? (Part 2) BlueVision
Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.
While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.