Global

Dominant growth of Islamic financial system has ushered in a new era of alternative world economic approach- Islamic Financial System (IFS). It is a well-established fact that Interest (Riba) has negative comportment for an efficient capital market. Greedy intent of making quick buck increases the riskiness of the market. This study ventures deep into full potential of an Islamic Capital Market (ICM) for the flow of funds in Bangladesh. Both the international and domestic challenges are decelerating the opportunities. But, continuous upsurge of Islamic investors and stable market confidence for such market might overcome the snags. The present paper investigates the functioning of Islamic securities and examines the possibilities of their development within the existing regulations and economic determinants in Islamic countries for example Bangladesh.
Wireless technologies such as Radio Frequency Identification (RFID) and Global Position System (GPS) play important role as value added services in communication systems and mobile commerce these days. The aim of Supply Chain Management is to produce, distribute, logistics and deliver goods and equipment in right location, right time, right amount to satisfy costumers, with minimum time and cost waste. So implementing techniques of radio frequency identification (RFID) that reduce project time and cost, and improve productivity and performance is very important. The purpose of this study is to explore the benefits and liabilities of the use of this technology in supply chain operations and its benefits is centered on goals relative to the optimization of logistics activities; specifically related to inventory management, bullwhip effect and replenishment policies. Besides, some approaches to evaluate the benefits of RFID in supply chain along with a brief analysis of return-on-investment (ROI) to RFID implementation in supply chain operations are identified and discussed.
This paper aims at analyzing performance of Shahjalal Islami Bank Ltd. (SJIBL) at micro level. The study is based on 18 companies of Dhaka Stock Exchange (DSE). As population, 93 listed companies of DSE are purposively selected from a total of 544 companies. Ratio analysis, Individual stock analysis and Portfolio analysis have done using data between 2005 and 2011. A three stock portfolio analysis has been made compiling three financial industries namely; Banking, Insurance and Financial Institutions. Evidence from the study reveals that SJIBL has high return and low risk characteristics. Portfolio result depicts that combination of Islamic Banks’ (IB) stock in portfolio investment can accelerate portfolio return and can reduce risk.
Cloud Computing is the long dreamed vision of computing as a utility, Cloud storage facilitates users to store the data remotely and enjoy the on-demand high quality cloud servers without the burden of local software and hardware systems. By outsourcing the data, users can be comforted from the burden of local data storage and maintenance. By having these many benefits, such a service is also abandon users’ physical control of their outsourced data, which unavoidably posture new security risks towards the accuracy of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attac
The term “Levitation” refers to a class of technologies that uses magnetic levitation to propel vehicles with magnets rather than with wheels, axles and bearings. Maglev (derived from magnetic levitation) uses magnetic levitation to propel vehicles. With maglev, a vehicle is levitated a short distance away from a “guide way” using magnets to create both lift and thrust. High-speed maglev trains promise dramatic improvements for human travel widespread adoption occurs. Maglev trains move more smoothly and somewhat more quietly than wheeled mass transit systems. Their nonreliance on friction means that acceleration and deceleration can surpass that of wheeled transports, and they are unaffected by weather. The power needed for levitation is typically not a large percentage of the overall energy consumption. Most of the power is used to overcome air resistance (drag). Although conventional wheeled transportation can go very fast, maglev allows routine use of higher top speeds than conventional rail, and this type holds the speed record for rail transportation. Vacuum tube train systems might hypothetically allow maglev trains to attain speeds in a different order of magnitude, but no such tracks have ever been built. Compared to conventional wheeled trains, differences in construction affect the economics of maglev trains.
Consultation means refering a case to the related specialist in order to have his/her opinion and manage the treatment of the patient accordingly (1,2). Pulmonary consultations are requested commonly from nearly every inpatient clinic. Cases are generally consulted following the determination of a clinical or radiological pathology at pulmonary system in order to have the patients assessed by the pulmonologist’s point of view regarding diagnosis, treatment or at the preoperative state. This study retrospectively evaluates the records of the consultations asked from Clinics of Chest Disease.
State formation in Hausaland was on course in precolonial Nigeria in the context of geographical proximity, biosocial relations and cultural contiguities before the development was impeded by the Fulani overlords in the Usman Danfodio led jihad (1804-1817). During the jihad, the populations of the Hausa (Habe) states were spontaneously disaggregated and later, re-aggregated to establish a new state, the Sokoto Caliphate. This paper examines the nexus between pre-colonial state formation and social identity transformation along ethno-religious lines in Hausaland under the Sokoto Caliphate. It finds that a major outcome of precolonial state formation in Hausaland is the transformation of social identities along ethno-religious lines. The paper argues that the jihad was not only motivated by the need for religious purification but also as much by the quest for ‘power to make binding decisions and authoritative allocation of values in the society’ and to also ‘determine who gets what, when and how’. This paper contends that the jihadists’ interception of the evolution of the Hausa States had two significant implications. Firstly, it ended the possibility of the transformation of the Hausa States under the Habe rulers into an empire and aborted the Habe dynasties while enthroning the rule of the Fulani over states in Hausaland. Secondly, the Hausa states founded on the cosmopolitanism ideology were transformed to adopt a new ethno-religious identity, the Hausa-Fulani. These implications were to significantly influence the trajectories of social identity formation in Hausaland under the Caliphate.
E-Learning is spreading around the world with leaps and bounds with the growth of Internet. People are keen to get high skilled knowledge from the knowledge pros in the industry and a very new concept of cloud computing is also not unaffected with E-learning. With the intense penetration of the Internet in the life of mankind and fast acceptance of the cloud computing is making researchers to design the various architectures for the cloud applications in generalized manner and specific to the applications. E-learning facilitates the students, teachers, universities and educational service providers to get the services with all ease and 24x7 bases. In cloud computing we mean by a Cloud as a type of parallel and distributed system over the network and virtual machines which are managed for load balancing with high provision for security, and its services are offered to the customers using SLA (Service Level Agreement). Whereas, Cloud Computing includes both applications and hardware & system software running applications. From the studies of various research papers and works done by various researchers it has been found that the major areas of focus in the field of cloud computing are architecture definitions, security, integration of services on various layers, inclusion of Various network and communication devices being developed rapidly.
Wren (1995) explains that, “leadership remains an ambiguous, amorphous, and frequently misunderstood topic" (p. ix). Therefore, isolating and discussing a limited number of leadership models may suggest one is more significant than the other. This paper purposefully lacks the attachment of special significance, and instead, offers a limited focus on certain contingency theories. The present paper reviews the literature of studies conducted by using diverse leadership methods, the similarities and differences in these leadership models.
There are situations where it is not possible to capture larger views with the given imaging media such as still cameras or video recording machines in a single stretch because of their inherent limitations. So to avoid such conditions a term Image Mosaicing comes into play. This Paper presents a complete system for mosaicing a group of still images with some amount of overlapping between every two successive images. Mainly the idea is to wrap up the overlapping areas within the group of images. Detection for the common area is done using common features by the help of feature extraction from the images. In this paper technique used for the feature extraction is SIFT which is used to extract invariant features which are stable in nature. Invariant features are those features of an image which does not change even after the scaling, rotation, or zooming, change in illumination of the image is done. Multiple level filtering and downsampling are the key factors of the SIFT. So the steps involved are feature detection, matching of stable features, wrapping up of features around those feature locations. Mosaicing part consists of two major part and those are transformation matrix and bilinear interpolation. Mosaiced images are full length images which consist of all the group images.