[an error occurred while processing this directive]

 

 

Science Journal

 

Academia Arena

(Academ Arena)

学术争鸣

ISSN 1553-992X (print); ISSN 2158-771X (online), doi:10.7537, Monthly

Volume 10 - Number 2 (Cumulated No. 104), February 25, 2018

Cover (jpg), Cover (pdf)Introduction, Contents, Call for Papers

 

You can use the message in end of the article abstract to cite it.

For Microsoft Document (doc file): After you open the "Full Text" for each article, change the last 3 characters of the web address from .pdf to .doc (or docx)

Welcome to send your manuscript(s) to: editor@sciencepub.net.

CONTENTS  

No.

Titles / Authors /Abstracts

Full Text

No.

1

The Big Bounce Theory

 

Manjunath. R

 

#16/1, 8th Main Road, Shivanagar, Rajajinagar, Bangalore560010, Karnataka, India

*Corresponding Author Email: manjunath5496@gmail.com

 

Abstract: Over the past few years, we have been hearing the term “The Big Bounce Theory”, quite a lot. The Big Bounce Theory is a hypothetical scientific theory of the formation of the universe which claims that our present universe was formed after the collapse of a previous universe, and that these cosmological events are repeated infinitely. As we know there are many models about the formation of the universe and we could write several articles about them, but in this article the Big Bounce is at the forefront of much discussion.

[Manjunath R. The Big Bounce Theory. Academ Arena 2018;10(2):1-12]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 1. doi:10.7537/marsaaj100218.01.

 

Keywords: Big Bounce; Energy; Vibration; Quantum mechanics; Physical Constants; Universe.

Full Text

1

2

The Post and the Person

 

Sri Srimad Bhaktivedanta Narayana Gosvami Maharaja, Hari Katha

 

HariKatha@harikatha.com

 

Abstract: Sri Narada desired to proclaim the glories of Lord Siva. As previously described, he praised Siva as the greatest devotee of Lord Krsna and most dear to Him, and Lord Siva became upset by hearing those praises. Siva then related a number of incidents which, according to him, were evidence that he was not dear to Krsna at all.

[Sri Srimad Bhaktivedanta Narayana Gosvami Maharaja, Hari Katha. The Post and the Person. Academ Arena 2018;10(2):13-21]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 2. doi:10.7537/marsaaj100218.02.

 

Keywords: Sri Narada; Lord Siva; incident; Krsna

Full Text

2

3

Genome editing using CRISPR/Cas9 literatures

 

Ma Hongbao

 

Brookdale Hospital, Brooklyn, New York 11212, USA

ma8080@gmail.com

 

Abstract: Genome editing, or genome engineering is a type of genetic engineering in which DNA is inserted, deleted, modified or replaced in the genome of a living organism. In 2018, the common methods for such editing use engineered nucleases, or "molecular scissors". These nucleases create site-specific double-strand breaks (DSBs) at desired locations in the genome. The induced double-strand breaks are repaired through nonhomologous end-joining (NHEJ) or homologous recombination (HR), resulting in targeted mutations. As of 2015 four families of engineered nucleases were used: meganucleases, zinc finger nucleases (ZFNs), transcription activator-like effector-based nucleases (TALEN), and the clustered regularly interspaced short palindromic repeats (CRISPR/Cas9) system. Nine genome editors were available as of 2017. CRISPR is a family of DNA sequences in bacteria. The sequences contain snippets of DNA from viruses that have attacked the bacterium. These snippets are used by the bacterium to detect and destroy DNA from similar viruses during subsequent attacks. These sequences play a key role in a bacterial defense system, and form the basis of a technology known as CRISPR/Cas9 that effectively and specifically changes genes within organisms. The CRISPR/Cas system is a prokaryotic immune system that confers resistance to foreign genetic elements such as those present within plasmids and phages that provides a form of acquired immunity. RNA harboring the spacer sequence helps Cas (CRISPR-associated) proteins recognize and cut exogenous DNA. Other RNA-guided Cas proteins cut foreign RNA. CRISPRs are found in approximately 40% of sequenced bacterial genomes and 90% of sequenced archaea.

[Ma H. Genome editing using CRISPR/Cas9 literatures. Academ Arena 2018;10(2):22-96]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 3. doi:10.7537/marsaaj100218.03.

 

Key words: DNA; eternal; life; genome editing; CRISPR/Cas9

Full Text

3

4

Soil Quality Assessment for Plantation of Ashwagandha in Barshi Tahsil, Solapur [MH]

Shyam C. Kagade and Avinash S. Kadam

Research Student & Assistant Professor
School of Earth Sciences, Swami Ramanand Teerth Marathwada University, Vishnupuri, Nanded-431606, Maharashtra India.
shyamkagade@gmail.com

 

Abstract: A field study was conducted at Barshi Tahsil for soil and its various contents throughout period of 2014 to 2015. A through survey was conducted to examine the quality of soil samples collected from agricultural farmlands around Barshi Tahsil of Maharashtra state, India. The soil is mainly alluvial in nature. Data presentation revealed different values of physical and chemical characteristics of soil. The objective of the study was to assess and compare the soil physicochemical properties of this soil. The study was carried on few selected physical and chemical characterization and that to the quality soil and its nature. The standard analytical methods were applied for analysis of soil. The present study was conducted to determine geographical feasibility of commercial plantation of Ashwagandha in Barshi Tahsil of Solapur regions of Maharashtra. On the basis of these research results it can be concluded that soil properties of this area were more operative for Ashwagandha plantation in respective area.
[Shyam C. Kagade and Avinash S. Kadam. Soil Quality Assessment for Plantation of Ashwagandha in Barshi Tahsil, Solapur [MH]. Academ Arena 2018;10(2):97-100]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 4. doi:10.7537/marsaaj100218.04.

Key words: Plantation, Soil quality, Chemical analysis, UV-spectrophotometer

Full Text

4

5

Dwell Time Modeling for NPS and RCS in WiMAX

 

Adil Ali Raja, Khurram Shahzad, Saqib Saleem, Qamar-ul-Islam

 

Department of Electrical Engineering, Institute of Space Technology, Islamabad, Pakistan

E-mail: adilaliraja@gmail.com

 

Abstract: Telecom industry experienced a rapid growth and success for past few decades. With the advent of mobile phone, the way of living has changed dramatically. Mobile phone becomes a basic necessity of life. With its vast acceptance, telecom service providers generate a lot of revenue. But to accommodate this vast population with the limited resources is a challenging task. Bandwidth dictates that how much users can be accommodated at a given time. A limited bandwidth means a limited number of users can avail the mobile services. To save the precious bandwidth in order to accommodate more users is the top priority of the telecom service provider. In this paper probability of blocking (Pb), handover failure probability (Ph) and probability of forced termination (Pft) have been depicted. The above mentioned probabilities have been found for two channel allocation schemes namely, Non Prioritized Scheme (NPS) and Reserved Channel Scheme (RCS) in WiMAX. The effect of dwell time has been monitored on each scheme.

[Adil Ali Raja, Khurram Shahzad, Saqib Saleem, Qamar-ul-Islam. Dwell Time Modeling for NPS and RCS in WiMAX. Academ Arena 2018;10(2):101-104]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 5. doi:10.7537/marsaaj100218.05.

 

Keywords: Channel Allocation; no priority scheme; reserved channel scheme; WiMAX; dwell time

Full Text

5

6

Effect of Information of Communications and Technology on Economic Sectors of using Growth Accounting Approach

Raziyeh Mohammad Karimi

Department of Economic Development and Planning, Islamic Azad University, Science and Research Branch
mohammadkarimiraziyeh@yahoo.com

 

Abstract: ICT investment in recent years has increased incrementally in different sectors of countries. Government tries to deploy ICT as a improving and fastening tool in their economic growth. This research measures empirically the effect of ICT on the economic growth of different economic sections of the IRAN through modified growth accounting approach. We used modified Cobb-Douglas as our production function. The model is made up with capital investment and labor force. Capital investment is dividing by physical capital and ICT investment. The analysis is based on panel data covering a sample of 7 economic sectors during the period of 2003-2012. we used an econometric approach to estimate the contribution of model components. Growth accounting results indicate that labor has the most contribution in the growth of each sector, but contribution of ICT investment in the output growth has increased during the recent years. Based on the model output, we can confirm the hypothesis, which implies sectors with more investment in ICT; have more contribution of ICT in their growth.
[Raziyeh Mohammad Karimi. Effect of Information of Communications and Technology on Economic Sectors of using Growth Accounting Approach. Academ Arena 2018;10(2):105-108]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 6. doi:10.7537/marsaaj100218.06.

Keywords: economic growth, information technology and communication of accounting

Full Text

6

7

Decision Making Practices in the Universities of Pakistan (A Comparative Study)

*Dr. Bibi Asia Naz, **Dr. Umar Ali, ***Dr. Riasat Ali, ****Dr. Javed Iqbal, *****Dr. Amir Zaman, ******Dr. Abdul Ghaffar******* Fazli Ameen

*Department of Education AWKU Mardan.
**Institute Of Education and Research Gomal University D.I.Khan.
***Department of Education AWKU Mardan.
****Hazara University Mansehra.
*****Department of Education AWKU Mardan.
******Department of Education AWKU Mardan.
*******M.Phil Scholar, SDepartment of Education AWKU Mardan.

 

Abstract: Main purpose of this study was to compare the prevailing decision making practices in the universities of Pakistan. The decision making practice was compared on the following aspects: a. Decision Dictated by the chair, b. Decisions made by a majority vote c. Decisions taken on political grounds in public and private sector universities. It was found that both public and private sector have same procedure of decisions making and are made by a majority vote but have differences that decisions are dictated by the chair and are taken according to internal and external pressure. This practice was observed mostly in public sector universities.
[Bibi Asia Naz, Umar Ali, Riasat Ali, Javed Iqbal, Amir Zaman, Abdul Ghaffar Fazli Ameen. Decision Making Practices in the Universities of Pakistan (A Comparative Study). Academ Arena 2018;10(2):109-112]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 7. doi:10.7537/marsaaj100218.07.

Key Words: Universities, Decision Making Practice, Internal and External Influence

Full Text

7

8

Designing the Abnormality Detection System Using Neural Networks

 

Homayun Motameni 1, Majid Aboutalebi2, naznoosh etminan 3

 

1. Member of Faculty Computer Engineering Department. Islamic Azad University Sari Branch, Sari, Iran

2. Computer enginnering department, Islamic Azad University Sari Branch, Sari, Iran

3. Computer enginnering department, Islamic Azad University Sari Branch, Sari, Iran

na.etminan@yahoo.com

 

Abstract: One of the solutions for securing the systems and computer networks is the set of intrusion detecting systems. These systems that are analogous to burglar alarms detect the suspicious events and intrusions in their supervising environment and alarm against such suspicious events. The objective of the security solutions such as encoding, shield, ID detection systems, etc. are to secure the systems and preventing any intrusion event. Since the complete security is an expensive process and it cannot be provided in practice, we will need a system for reporting the event and even find its roots and reasons instead of preventing such events. Intrusion detecting systems are designed and used for this reason. In this research we present a new method for designing the abnormality detection using neural networks. In this method, training the neural network of system is being done in a two-step and sequential form. We have tested this new model on five different neural systems and we have compared its efficiency with the models in which the training process is single-step. The five types of our used neural networks include PCA[1]-based Neural Network, SOFM[2]-based Neural Network, MLP[3] neural network, GFF[4] Neural Network, and Jordan- Elman Neural Network. Our tests and evaluations have been done using KDD CUP 99 database and we have used all network records for training and testing the network. The Results show that our offered model leads to a significant improvement in its detection scale and positive error scale in comparison with the simple system, so that our system has the same efficiency in comparison with its similar systems and even in some cases its efficiency is better than the similar systems.

[Homayun Motameni, Majid Aboutalebi, naznoosh etminan. Designing the Abnormality Detection System Using Neural Networks. Academ Arena 2018;10(2):113-118]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 8. doi:10.7537/marsaaj100218.08.

 

Keywords: Abnormality Detection System, GFF Neural Network, Jordan- Elman Neural Network, MLP Neural Network, PCA Neural Network, SOFM Neural Network

Full Text

8

9

证明了“费马大定理”

Jiang Chunxuan (蒋春暄)

Institute for Basic Research, Palm Harbor, FL 34682-1577, USA
And: P. O. Box 3924, Beijing 100854, China (蒋春暄,北京3924信箱,中国,100854)
jiangchunxuan@sohu.com, cxjiang@mail.bcf.net.cn, jcxuan@sina.com, Jiangchunxuan@vip.sohu.com, jcxxxxx@163.com,
liukxi@public3.bta.net.cn

 

摘要 (Abstract): 中国的蒋春暄先生首先证明了“费马大定理”。
[Jiang Chunxuan (蒋春暄). 证明了“费马大定理”. Academ Arena 2018;10(2):119-119]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 9. doi:10.7537/marsaaj100218.09.

关键词 (Keywords): 中国;蒋春暄;证明;费马大定理

Full Text

9

10

天地生人学术讲座 快讯, 国际数学家在网上发文费马大定理证明权应是蒋春暄而不是怀尔斯

Jiang Chunxuan (蒋春暄)

Institute for Basic Research, Palm Harbor, FL 34682-1577, USA
And: P. O. Box 3924, Beijing 100854, China (蒋春暄,北京3924信箱,中国,100854)
jiangchunxuan@sohu.com, cxjiang@mail.bcf.net.cn, jcxuan@sina.com, Jiangchunxuan@vip.sohu.com, jcxxxxx@163.com,
liukxi@public3.bta.net.cn

 

摘要 (Abstract): 蒋春暄证明费马大定理是数学上的大成就。
[Jiang Chunxuan (蒋春暄). 国际数学家在网上发文费马大定理证明权应是蒋春暄而不是怀尔斯. Academ Arena 2018;10(2):120-121]. ISSN 1553-992X (print); ISSN 2158-771X (online). http://www.sciencepub.net/academia. 10. doi:10.7537/marsaaj100218.10.

关键词 (Keywords): 蒋春暄;证明;费马大定理;中国;数学;成就

Full Text

10

The articles in this issue are presented as online first for peer-review starting from February 10, 2018. 

All comments are welcome: editor@sciencepub.net

For back issues of the Academia Arena, click here.

Emails: editor@sciencepub.net; sciencepub@gmail.com

Website: http://www.sciencepub.net/academia  

Publication ethics and malpractice statement

doi prefix: 10.7537

Global Impact Factor: 0.324 (2012); 0.454 (2013); 0.565 (2014); 0.676 (2015)

InfoBase Index IBI Factor: 4.79 (2015)

IF A2016: 2.15

Journal Index I2OR

[an error occurred while processing this directive]

 

Marsland Press: http://www.sciencepub.net

 39-06 Main Street, #202, Flushing, NY 11354, USA

 

Terms of Service  |  Privacy Policy  |

© 2018 Marsland Press