Global

Organizational justice is a common concept and of great interest among high education professionals, because it represents equal opportunities and outcomes for all people. The objective of this paper is to determine the significant effect among the qualifying academic variables and the variables in organizational justice. The sample population was made up of 334 teachers and we used Moorman’s (1991) Organizational Justice Instrument. The main results show that the teachers within a range of 40 to 49 years old perceive a better distribution in the work-load. This could be explained because they have greater seniority in the institution.
There are procedures, standards, processes, and principles that are applicable before the International Criminal Court (ICC) that need to be simplified so that they can be understood. The ICC is a very unique institution, and it is very distinct in terms of its operations, from domestic courts, international military tribunals, international criminal tribunals and hybrid international courts. There are distinct ways in which cases are referred to the ICC, as well as methods through which the ICC finds and confirms its jurisdiction over cases. There are also various ways in which suspects are brought before the ICC, and continue to interact with the ICC until their cases are finalized. The ICC also has established processes relating to the engagement and protection of witnesses’ rights, and interests. There are also various standards of proof that are laid down in the ICC, which must be followed and met. This paper seeks to simplify and explain the various processes, procedures, standards and principles applicable before the ICC, so that various stakeholders to the ICC may have a better appreciation.
Wealth has traditionally and commonly been measured using monetary indicators such as income and consumption (Hargreaves et al., 2007). Income is “the amount of money received during a period of time in exchange for labour or services, from the sale of goods or property, or as a profit from financial investments” (O’ Donnell et al., 2008; 70). On the other hand, consumption is “the final use of goods and services, excluding the intermediate use of some goods and services in the production of others” (pp, 70). While there could be some differences in defining these two concepts, the approach to use them as welfare indicators has resulted in the production of social protection policies in various countries including Botswana. However, some researchers have debated the adequacy of the two monetary indicators in capturing status of welfare; hence alternative approaches have been proposed to serve this purpose. It has been observed that despite the findings of assets being the underlying determinants of poverty in the developing world, little attention (safe for human capital proxied by education) is given to them, resulting in the objectives to address only income (and/or expenditure) poverty (Sahn and Stifel, 2003).
Fractal Image Compression (FIC) is a state of the art technique used for high compression ratio. But it lacks behind in its encoding time requirements. In this method an image is divided into non-overlapping range blocks and overlapping domain blocks. The total number of domain blocks is larger than the range blocks. Similarly the sizes of the domain blocks are twice larger than the range blocks. Together all domain blocks creates a domain pool. A range block is compared with all possible domains block for similarity measure. So the domain is decimated for a proper domainrange comparison. In this paper a novel domain pool decimation and reduction technique has been developed which uses the median as a measure of the central tendency instead of the mean (or average) of the domain pixel values. However this process is very time consuming.
Mobile ad hoc networks is the future wireless communication systems have recently emerged as an important trend. Mobile adhoc network is self-configurable and adaptive. Due to the mobility of nodes, the network congestion occurs and it is difficult to predict load on the network which leads to congestion. Mobile adhoc network suffers from a severe congestion controlling problem due to the nature of shared communication and mobility. Standard TCP controlling mechanism for congestion is not fit to the dynamic changing topology of MANETs. This provides a wide scope of research work in mobile ad hoc network. The purpose of this survey is to study and analyze various issues and challenges in congestion control mechanisms in adaptive routing protocols in Mobile Adhoc Network (MANET).
The need for adequate attention to security of lives and properties cannot be over-emphasised. Existing approaches to security management by various agencies and sectors have focused on the use of possession (card, token) and knowledge (password, username)-based strategies which are susceptible to forgetfulness, damage, loss, theft, forgery and other activities of fraudsters. The surest and most appropriate strategy for handling these challenges is the use of naturally endowed biometrics, which are the human physiological and behavioural characteristics. This paper presents an overview of the use of biometrics for human verification and identification. The applications, methodologies, operations, integration, fusion and strategies for multi-modal biometric systems that give more secured and reliable human identity management is also presented.
The study is conducted on quality of service delivery and its effect on customer satisfaction in the case of Ethiotelecom in Oromia region in Ambo area on mobile telephone users. This study tried to provide relevant factors that cause customers to respond about mobile phone services delivered by Ethio-telecom. The research approach employed for the study is mixed approach i.e. both qualitative and quantitative approached used to find out the effect of Ethio-telecom service quality on customer satisfaction. For the purpose of the study both primary and secondary data are used. The primary data are collected through questionnaire and interview with the Ambo branch Ethio-telecom employees, manager and customers. Furthermore, secondary data are taken from documents and brochures that are available from the branch office. The research design employed is descriptive and uses charts and frequency table to discuss the output. A sample of 500 were selected through simple random sampling from the total population. Result of the study shows that mobile phone users faces awe-inspiring number of the problems like network busy, error in connection, poor network coverage, slow mobile internet service and expensive price of the service.
Security is vital to subsistence and survival of individuals and communities. It guarantees conducive environment and affords opportunity to live and pursue a meaningful life beyond the merely animal. However, it is threatened as terrorists groups emerged in number and operate dangerously in the name of Islam. Jihad is the ethos; suicide and arms’ attack are modus operandi. Innocent people and institutions are the victims. Is this truly Islamic? This is a challenge to Islamic jurisprudence and a burden to contemporary Muslim jurists. Who is (are) the architect(s) of the terrorist groups, Islam, Muslims or political super-powers? Here lies burden of proof? The present work attempts to explore these posers.
Cotton is the important cash crop of Pakistan and a major source of foreign earnings. However cotton crop is facing many problems, such as disease and pest attacks. One way to reduce losses caused by disease and pest attack is the use integrated pest management (IPM) practices. Keeping in view the importance of this technique, the present study analyzed the adoption of IPM along with estimation of risk involved in the adoption process. To estimate the cotton yield, two types of production functions (one for adopter and other for non-adopters) were estimated using the regression analysis. Then estimate of regression models was used further in risk analysis. The results of non-adopters of IPM showed that cost of urea bags, cost of nitrophosphate bags, cost of herbicide and rainfall were -0.038, 0.00475, 0.301 and 0.164 respectively and all ofthese significant at 10 percent level.
This study was conducted from June, 2013 to May, 2014 in selected areas of Wolaita and Dawuro zones, with the core intentions of to assess the type and efficacy of the most frequently used acaricides in the areas, to identify the most prevalent cattle tick species and recommend the effective acaricide for cattle tick control. To achieve these objectives preliminary survey; invitro and invivo acaricide efficacy evaluation techniques have been conducted. The major tick species identified in order of their importance were Rhip(Boophilus) decoloratus (60.92%), Amblyomma variegatum (28.26%), A. cohaerens (7.82%) and A. gemma (3.0%). Diazinon 60%EC, Amitraz 12.5%, Ivermectin and Deltamethrin, according to their importance, was the acaricides frequently used in the areas. For the invitro technique, a total of 320 Rhip(Booph) decoloratus and 320 A. variegatum engorged adult female ticks were collected from each study sites and the standard modified adult immersion test (AIT) was employed for two successive round. On the other side of study, the efficacies of all the four acaricides at dose of concentration recommended by the manufacturer were assessed all the way through purposively selecting a total of 255 naturally tick infested cattle aged between 1 to 5 years.