Academic submissions (CEDAT): Recent submissions
Now showing items 261-280 of 519
-
Assessment of Lake Victoria's trophic status using satellite-derived Secchi Disk depth
As a result of the accelerated population growth in Lake Victoria’s catchment area accompanied by the large scale urbanization in the area, the lake has increasingly faced water quality issues. Trophic status index is a ... -
Assessing the effect of climate change on stream flow of River Kyambura
River Kyambura relies on rainfall as one of its contributors to its stream flow therefore changes in the hydrological cycle due to climate change will have an effect on the streamflow and yet the magnitude of this effect ... -
Design of a hydrogen extractor for solar energy storage using electrolysis
Our desire to save earth from the consistent emission of greenhouse gases into the atmosphere has led us to embrace renewable energy but seeing that renewable energy sources are intermittent sources of energy meaning they ... -
How open street markets can be adopted to solve the street vending challenge: A case of Ben Kiwanuka Street
The report is comprised of five chapters which will fully explore the research objectives. Chapter one encompasses the general introduction of the study, the background of the study, the goals and specific objectives ... -
A comparative study on the quality of tenement housing in Kinawataka and Kigoowa-Nakawa Division
Housing is a profoundly ideological issue that serves as an index for development rankings. In Uganda, regulations such as the PPA (2010) and NPPSG (2011) were established to act as development control tool kits to enhance ... -
Investigation of the tensile and compressive strength of Ugandan Borassus Aethiopum (African Fan Palm)
Uganda has over forty-five (45) timber species on market. The most common timber species include eucalyptus, mvule and mahogany that are used in making furniture and for construction works among other uses. There is ... -
Internet of everything password access control
The project is basically about ensuring security of internet of everything (IOE) through authentication and authorization at the application level. So here we have a smart phone (Android) operating as a smart device for ...