1 - 7 of 7 articles
Persistent increase in general price level has been generating policy issues between monetary and fiscal authorities in Nigeria. This study explores dominance of policy regime (monetary versus fiscal) and extends the analysis to inflation determination in Nigeria from 1981 to 2016. The study...
A large number of countries experience negative saving-investment (S-I) gaps, which can be detrimental to economic growth. Earlier literature indicates that women save more than their male counterparts. In this study, our preliminary aim is to understand, whether female employment rates increase...
Previous evidence indicates that there are considerable benefits for firms operating in tax havens, defined as countries that provide tax benefits to attract foreign capital. Using a sample of Eurozone countries along with tax haven country rankings, we examine how firms adjust their level of...
I present a SAS macro that allows the examination of stationarity under the presence of up to m, endogenously determined, structural breaks using the methodology presented by Kapetanios (2005). The computationally intensive grid-search procedure allows researchers with minimum programming skills...
To extend automatic regionalisation of a national input-output (IO) matrix we developed an (online and desk version) open access software tool, the App-RegMIP, which applies location quotients methods for regional coefficients estimations (FLQ, AFLQ). By considering a national IO matrix and...
Machine learning techniques have become attractive due to their robustness and superiority in predicting future behaviour in various areas. This paper is aimed to predict future stock prices by applying a nonlinear autoregressive network with exogenous inputs (NARX) and support vector regression...
The smart 'internet of things' (IoT)-based farming is capable of capturing the sensed information and then transmitting it to the user in a cooperative cognitive radio (CCR) network. CCR has emanated as a dynamic spectrum access technique, where the powers of secondary users (SUs) are controlled...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.