Technology Reports of Kansai University

Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.

Google Scholar

Submission Deadline

Volume - 63 , Issue 05
10 May 2021
Day
Hour
Min
Sec

Upcoming Publication

Volume - 63 , Issue 05
31 May 2021

Aim and Scope

Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are in the following fields but not limited to:

Electrical Engineering and Telecommunication Section:

Electrical Engineering, Telecommunication Engineering, Electro-mechanical System Engineering, Biological Biosystem Engineering, Integrated Engineering, Electronic Engineering, Hardware-software co-design and interfacing, Semiconductor chip, Peripheral equipments, Nanotechnology, Advanced control theories and applications, Machine design and optimization , Turbines micro-turbines, FACTS devices , Insulation systems , Power quality , High voltage engineering, Electrical actuators , Energy optimization , Electric drives , Electrical machines, HVDC transmission, Power electronics.

Computer Science Section :

Software Engineering, Data Security , Computer Vision , Image Processing, Cryptography, Computer Networking, Database system and Management, Data mining, Big Data, Robotics , Parallel and distributed processing , Artificial Intelligence , Natural language processing , Neural Networking, Distributed Systems , Fuzzy logic, Advance programming, Machine learning, Internet & the Web, Information Technology , Computer architecture, Virtual vision and virtual simulations, Operating systems, Cryptosystems and data compression, Security and privacy, Algorithms, Sensors and ad-hoc networks, Graph theory, Pattern/image recognition, Neural networks.

Civil and architectural engineering :

Architectural Drawing, Architectural Style, Architectural Theory, Biomechanics, Building Materials, Coastal Engineering, Construction Engineering, Control Engineering, Earthquake Engineering, Environmental Engineering, Geotechnical Engineering, Materials Engineering, Municipal Or Urban Engineering, Organic Architecture, Sociology of Architecture, Structural Engineering, Surveying, Transportation Engineering.

Mechanical and Materials Engineering :

kinematics and dynamics of rigid bodies, theory of machines and mechanisms, vibration and balancing of machine parts, stability of mechanical systems, mechanics of continuum, strength of materials, fatigue of materials, hydromechanics, aerodynamics, thermodynamics, heat transfer, thermo fluids, nanofluids, energy systems, renewable and alternative energy, engine, fuels, nanomaterial, material synthesis and characterization, principles of the micro-macro transition, elastic behavior, plastic behavior, high-temperature creep, fatigue, fracture, metals, polymers, ceramics, intermetallics.

Chemical Engineering :

Chemical engineering fundamentals, Physical, Theoretical and Computational Chemistry, Chemical engineering educational challenges and development, Chemical reaction engineering, Chemical engineering equipment design and process design, Thermodynamics, Catalysis & reaction engineering, Particulate systems, Rheology, Multifase flows, Interfacial & colloidal phenomena, Transport phenomena in porous/granular media, Membranes and membrane science, Crystallization, distillation, absorption and extraction, Ionic liquids/electrolyte solutions.

Food Engineering :

Food science, Food engineering, Food microbiology, Food packaging, Food preservation, Food technology, Aseptic processing, Food fortification, Food rheology, Dietary supplement, Food safety, Food chemistry. AMA, Agricultural Mechanization in Asia, Africa and Latin America Teikyo Medical Journal Journal of the Mine Ventilation Society of South Africa Dokkyo Journal of Medical Sciences

Physics Section:

Astrophysics, Atomic and molecular physics, Biophysics, Chemical physics, Civil engineering, Cluster physics, Computational physics, Condensed matter, Cosmology, Device physics, Fluid dynamics, Geophysics, High energy particle physics, Laser, Mechanical engineering, Medical physics, Nanotechnology, Nonlinear science, Nuclear physics, Optics, Photonics, Plasma and fluid physics, Quantum physics, Robotics, Soft matter and polymers.

Mathematics Section:

Actuarial science, Algebra, Algebraic geometry, Analysis and advanced calculus, Approximation theory, Boundry layer theory, Calculus of variations, Combinatorics, Complex analysis, Continuum mechanics, Cryptography, Demography, Differential equations, Differential geometry, Dynamical systems, Econometrics, Fluid mechanics, Functional analysis, Game theory, General topology, Geometry, Graph theory, Group theory, Industrial mathematics, Information theory, Integral transforms and integral equations, Lie algebras, Logic, Magnetohydrodynamics, Mathematical analysis.

Latest Articles of

Technology Reports of Kansai University

Journal ID : TRKU-11-09-2020-11099
Total View : 408

Title : Discovering IoT Botnet Detection Method: A Review

Abstract :

In the capabilities of today technologies, IoT become a merging technology that wildly apply nowadays. Meanwhile, at the same time since IoT technology become more in getting much popularity. At the same time, botnet infection that infect IoT become increasing. Consequently, that’s is a lot botnet detection is infected IoT devices. Based on Cybersecurity Malaysia there are various attack on the IoT via botnet. Then a number of researchers has proposed many various methods in order to detect IoT botnet such as machine learning, deep learning, graph theory and others method. This paper has reviewed the number of detection methods that will propose previous researcher in this review. This paper provides summarize of type of IoT botnet method according on the researcher method. This paper also lists some IoT devices that been attack based on previous paper. The contribution of this paper is to give the community the better understanding of detection method that getting much popularity nowadays to be applied.  There a lot of botnet manufactured is difficult to detect. Previous researcher proposed several detections and several methods. The review of previous work is for community understanding. In the capabilities of today technologies, IoT become a merging technology that wildly apply nowadays. Meanwhile, at the same time since IoT technology become more in getting much popularity. At the same time, botnet infection that infect IoT become increasing. Consequently, that’s is a lot botnet detection is infected IoT devices. Based on Cybersecurity Malaysia there are various attack on the IoT via botnet. Then a number of researchers has proposed many various methods in order to detect IoT botnet such as machine learning, deep learning, graph theory and others method. This paper has reviewed the number of detection methods that will propose previous researcher in this review. This paper provides summarize of type of IoT botnet method according on the researcher method. This paper also lists some IoT devices that been attack based on previous paper. The contribution of this paper is to give the community the better understanding of detection method that getting much popularity nowadays to be applied.  There a lot of botnet manufactured is difficult to detect. Previous researcher proposed several detections and several methods. The review of previous work is for community understanding

Full article
Journal ID : TRKU-10-09-2020-11097
Total View : 397

Title : Concerns and Critical of MTUN Regarding Open Data: How to Open Up Data

Abstract :

"Open data" is a term officially introduced in the year 2007 as an expansion of data sharing. It is defined as data that anyone can access, use and share. In a global scenario, it can be seen that there is a lot of data residing in silos. Subsequently, these data are just wasted without having a knowledge contribution to the community. On the contrary, there are high demands regarding data in many fields, and this trend becomes tremendously increasing day by day. In a globalised world where sharing potential is at its peak, yet everyone is so concerned about locking up their data. Undeniably, there are sensitive data, and there are reasons to keep it private. Henceforth, we do a preliminary study on the current scenario of data management in the Malaysian Technical University Network (MTUN) to find out the practicalities on data management and concerns that arise towards opening up the data. The results shown were based on personal structured interview sessions to the respective stakeholders of MTUN universities, which are; legal officers, information technology officers and strategic department officers. The interviewees are respectively from four (4) MTUN universities which are Universiti Teknikal Malaysia Melaka (UTeM), Universiti Malaysia Pahang (UMP), Universiti Tun Hussein Onn (UTHM) and Universiti Malaysia Perlis (UNIMAP). Eventually, for evolution, there is a need to share the data whenever possible. Nevertheless, it will bring benefit many parties instead of putting it up in silos

Full article

Certificates