Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.
Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are
in the following fields but not limited to:
Prevalent years have witnessed the rise in a plethora of data security issues that run across the board from copyright to content security issues due to the multitudinous transmission and sharing of multimedia activities across communications conduit that utilizes the network, which is not secure. Consequently, the requirement for the latest security techniques in data hiding such as steganography is now imperative and indispensable. Thus, steganography entails the skill and science of concealment of existing confidential information by concurrently making the communications imperceptible through the utilisation of diverse media carriers such as Image, Text, Audio, Video, Protocol and DNA. Amongst the varying kinds of media utilised, the findings of this study show the high demand and proliferation of digitalized images, thus the emphasis of our study is pertaining to the implementation of digital image steganography (IS). The major problem in the construction of a steganography system is the maintenance of a compromise between robustness, security, imperceptibility and a greater rate of bit embedding. This study offers a comprehensive summary of current IS forms, alongside the latest endowments of individual classification in a wide range of aspects and modes of operations. Additionally, this study offers a comprehensive summary of IS inclusive of customary operation, necessities, varying aspects, diverse forms and their performance assessments, protocols, and types of attacks. Diverse performance analysis measures for the evaluation of steganography systems are also deliberated here
This work presents the results for determining the optimum exchanged wheel diameter when surface grinding stainless steel. To do that, an optimization problem with the target is the grinding time was conducted. Also, the impact of many input factors including the initial wheel diameter, the wheel life, the radial grinding wheel wear per dress and the total depth of dressing cut on the optimum replaced wheel diameter was evaluated. In addition, a regression model to predict the optimum replaced diameter was proposed