Global

The world economy entered the 21st century with the optimism of extending the frontiers of technological advancement of the past centuries to accelerate individual national growth and economic development. Disenchantment with erstwhile induced growth and emergence of rapid privatization and market economy appeared to be the only option for attaining the goals hitherto impossible under the hegemony of state-led developmental initiatives. This paper examines the plausibility of privatization argument that the desired level of growth and sustainable development can be achieved in an environment of passive government involvement in the economic processes given the structural rigidity and imbalance of the Nigerian economy.
OBJECTIVES—After reviewing this abstract, you shall be empowered to: • Define the main properties or features of Feudalism (Fm), Capitalism (Km), Socialism (Sm), Communism (Cm), and Globalization1, 2 Capitalism (Kgm). • Identify the five (5) chief types of Km, as the domineering, or hegemonic, world system (order, disorder) of economic conduct. Namely: i) Consumption Capitalism (Kcm); ii) Production Capitalism (Kpm); iii) Hybrid, or Mixed, Capitalism (Khm); iv) Family Capitalism (Kfm); and, v) Transition, or Frontier, Capitalism (Ktm).
Outsourcing is becoming a common topic now as many companies choose to outsource functions so they can improve the productivity of the company. The objective of this article primary discuss about outsourcing, particularly outsourced marketing and how it improves the productivity of a company. Outsourcing is the practice of having certain job functions done outside a company instead of having an in-house department or employee handle them. Thus, a company benefits from outsourcing by taking advantage of specific expertise, marketing in this case, without having to hire professional marketers or train inexperience ones which can be costly. Different organizations go for different kinds of outsourcing, based on the company’s weaknesses and strengths identified, but it is the usually non-core aspects of the business that are outsourced. The relationships between the outsourced company and the providers can directly affect the productivity of the company. Many companies view outsourcing as one of the ways for a large company to expand its capacity without incurring significant entry and overhead costs. Despite the common view that outsourcing is reserved only for large companies due to its huge cost, in the last 10 years outsourcing has also become affordable for small companies. At the end of the article, we will manage to have a clear vision of the potential of outsourcing, why it is a trends in the modernization of marketing operations and the benefit of using the power of outsourcing.
This study was aimed to evaluate the spatial and temporal patterns of forest fire between 1999 and 2014 using remote sensing and GIS in Mudumalai Tiger Reserve, Western Ghats. Remote Sensing and GIS are very effective tools in detecting active fire, mapping burned area, analyzing fire risk and preparing improved management plans. We used Landsat TM, ETM+, OLI-TIRS and Fire location data for this study. In our study, we found that the annual rate of fire was 3141.46 hectare year-1 (9.78%) with an average number of 22 fire incidences per annum. Maximum area was burned in 2004 (10451 hectares) whereas in 2013, we did not record any fire incidence through Lands at images. Fireoccurred between January and May and utmost incidences in February and March (93.64%). However, 58.86 % of detected fire incidences were in February alone.
Kurtosis of a time signal has been a popular tool for detecting nongaussianity. Recently, kurtosis as a function frequency defined in spectral domain has been successfully used in the fault detection of induction motors, machine bearings. A link between the nongaussianity and nonstationaity has been established through Wold-Cramer’s decomposition of a nonstationary signal, and the properties of the so-designated conditional nonstationary (CNS) process have been analytically obtained. As the nonstationary signals are abundantly found in music, the spectral kurtosis could find applications in audio processing e.g. music instrument classification and music-speech classification. In this paper, the theory of spectral kurtosis is briefly reviewed from the first principles and the spectral kurtosis properties of some popular stationary signals, nonstationary signals and mixed processes are analytically obtained. Extensive Monte Carlo simulations are carried out to support the theory.
Social health insurance traditionally imposes mandatory membership in a single pool in the aim of improving the welfare of high risks. However, this creates two problems, inefficiency of a monopolistic scheme and insufficient adaptation to individual preferences. Competition combined with a risk adjustment scheme can be used to improve efficiency. In the presence of preference heterogeneity, risk selection may improve adaptation to individual preferences, resulting in Pareto improvement over the pooling contract. This is shown to be possible both under perfect and imperfect risk adjustment.
Cassava is an important tropical root cropwidely grown in many part of the world in a range of agro-ecological environments. The crop can be used for food and non-foods products. Cassava is capable of providing starch for use in drug industries, it is a stable source of dietary energy for more than 500 million. Nonetheless, despite the nutritional and economic significance of the cassava crop, the diseases incidence on cassava plantations is fast becoming a constraint in farmers’ quest for a bountiful harvest. The efforts of agricultural extension agents seem not to be sufficient in tackling this menace since there is always a limit to how far the human capacity can be stretched in the face of highly demanding situations. Hence, this paper proposed the development of fuzzy expert system for predicting cassava plant disease. The system was developed with the help of fuzzy tool in MATLAB vs. 9. It employed 18 rules for the Cassava Mosaic, 27 rules for the cassava brown streak and 27 rules for cassava bacteria blightfor the classification and prediction of cassava plant diseases. This would provide immediate and instant information to the possible disease.
The earlier intervention of government in rural credit (i.e. provision of credit with cheap interest rate and limited savings and deposit facilities) was not successful in financial terms. Considering the entrepreneurial environment, women’s activates are very interesting as they offer great source of knowledge and innovations, for instance type of female micro-entrepreneur they differ in social back ground, educational level, experience and age. Therefore, this study is aimed to assess cause for women’s participations in micro-finance activates in Jimma town. The study had employed cross sectional study design. The data of this study were both primary and secondary data are collected. The sample were selected by using purposive sampling method. Data was collected through questioners. Descriptive analysis were employed. It was found that the micro-financing schemes have contributed positively to the development of small-scale enterprise and a sense of entrepreneurship attitude. Most of the participants (clients) have taken a loan from each MFIS for the purpose of opening shop since they are provided with inadequate amount of capital. To overcome the small number of women participation problem in each MFIS, increasing the number of MFIS in the area is the best way among the other methods.
Background: Sound human resources management practices are essential for retaining effective professionals in hospitals that addressing health workforce challenges and developing the health workforce strategy of the country. Thus it is rational to assess the competency level of human resource managers found in hospitals. Objective: The overall objective of this study was to assess the competency level in human resource management in public referral hospitals found in Oromia regional state, Ethiopia. Methods: A cross-sectional survey involving 290 human resource managers of the referral hospital found in Oromia regional carried out from February to march 2012.The survey was supplemented by in-depth interview of a qualitative method. The collected data was entered into SPSS Software version 20.0, cleaned and analyzed. Descriptive analyses and Binary logistic regression were used. The results were summarized as crude and adjusted odds ratios at 95% confidence intervals. Result: A total of 290 human resource managers have been involved in this study. Two hundred fifty one (86.4%) of all human resource managers were aged between 20-45 years. One hundred four (35.9%) of them were females. Of All human resource managers, two thundered twelve (73.1%) had work experience below three years. With regards to perceived competence levels the majority of the respondents one hundred eighty nine (65.1%) have capacity to undertake personnel policy related responsibilities, and more than 60% of the respondent have capacity toundertake, performance management, human resource training and development, human resource data system, human resource retention strategy, and genera leadership and management related responsibilities.
In order to apply any machine learning algorithm or classifier, it is fundamentally important to first and foremost collect relevant features. This is most important in the field of dynamic analysis approach to anomaly malware detection systems.In this approach, the behaviour patterns of applications while in execution are analysed. The behaviour features that Android as a system allows access permissions to depend on the type of device; either rooted or not. Android is based on the Linux kernel at the bottom layer, all layers on top of the kernel run without privileged mode. Thus, if a behaviour feature vector is created from features of Android (Application Programming Interface) API in unrooted mode, then only system information made available by Android can be used. In this paper, a Device Monitoring system for an unrooted device is developed and used to collect Android application data. The application data is used to build feature vectors that describes the Android application behaviour for Anomaly malware detection. This application is able to collect essential information from Android application such as installed applications and services running within the device before or after the Monitoring application was started, the date/time stamp, calls initiated from the device, calls received by the device, sent short message services (SMSs), SMSs received, and the status of the device as at when the event took place. This information is loggedin a comma separated value (.csv) file format and stored on the SDcard of the device. The .csv file is converted toattributerelation file format (.arff); the format acceptable by WEKAmachine learning tool. This.arff file of feature vectors is then used as input to the Classifier in the Android malware detection system.