Now showing items 31-40 of 354
A census of South African industrial engineers, based on data extracted from Linkedin
The first South African Industrial Engineers graduated in 1963. Since then, the number of graduates per annum has grown to more than 200 per annum. Many of these Industrial Engineers use the social network, LinkedIn, to ...
Co-digestion of sweet sorghum bagasse with scientific and crude glycerols for electricity generation
With the global fossil fuel supplies dwindling and the alarming increase of carbon dioxide in the atmosphere, the need for alternative, clean energies, from carbon neutral sources is pressing. This impetus advanced research ...
Automatic infarct planimetry by means of swarm-based clustering
Infarct planimetry is an important tool in cardiology research. At present this technique entails that infarct size is manually determined from scanned images of prepared heart sections. Existing attempts at automating ...
HTR system integration in Europe and South Africa
Analysis of spectral opportunity in the UHF terrestrial TV frequency band
In this paper an analysis to quantify the Spectral Opportunity (SO) or so-called TV white space that can be made available to White Space Devices (WSDs) as Secondary Users (SUs) of the Ultra High Frequency (UHF) terrestrial ...
An investigation into the accuracy of the kriging method for multiple Wi-Fi access point RSSI estimation
Kriging was originally developed for geographical interpolation purposes, but has proven to be a powerful tool in many other applications as well. In this study we evaluate the accuracy of kriging for Wi-Fi signal ...
Using mobile networks for effective cold chain management
Research has shown that substantial in transit losses in perishable cargo are sustained due to malpractices in cold chain logistics. Such losses are even more prevalent in developing countries where supply chain systems ...
Considering the influence of human trust in practical social engineering exercises
There are numerous technical advances in the field of information security. However, the application of information security technologies alone is often not sufficient to address security issues. Human factors play an ...