Technology Reports of Kansai University

Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.

Google Scholar

Submission Deadline

Volume - 64 , Issue 05
25 May 2022

Upcoming Publication

Volume - 64 , Issue 05
30 Jun 2022

Aim and Scope

Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are in the following fields but not limited to: Zhonghua er bi yan hou tou jing wai ke za zhi = Chinese journal of otorhinolaryngology head and neck surgery Interventional Pulmonology Interventional Pulmonology (middletown, de.)

Electrical Engineering and Telecommunication Section:

Electrical Engineering, Telecommunication Engineering, Electro-mechanical System Engineering, Biological Biosystem Engineering, Integrated Engineering, Electronic Engineering, Hardware-software co-design and interfacing, Semiconductor chip, Peripheral equipments, Nanotechnology, Advanced control theories and applications, Machine design and optimization , Turbines micro-turbines, FACTS devices , Insulation systems , Power quality , High voltage engineering, Electrical actuators , Energy optimization , Electric drives , Electrical machines, HVDC transmission, Power electronics.

Computer Science Section :

Software Engineering, Data Security , Computer Vision , Image Processing, Cryptography, Computer Networking, Database system and Management, Data mining, Big Data, Robotics , Parallel and distributed processing , Artificial Intelligence , Natural language processing , Neural Networking, Distributed Systems , Fuzzy logic, Advance programming, Machine learning, Internet & the Web, Information Technology , Computer architecture, Virtual vision and virtual simulations, Operating systems, Cryptosystems and data compression, Security and privacy, Algorithms, Sensors and ad-hoc networks, Graph theory, Pattern/image recognition, Neural networks.

Civil and architectural engineering :

Architectural Drawing, Architectural Style, Architectural Theory, Biomechanics, Building Materials, Coastal Engineering, Construction Engineering, Control Engineering, Earthquake Engineering, Environmental Engineering, Geotechnical Engineering, Materials Engineering, Municipal Or Urban Engineering, Organic Architecture, Sociology of Architecture, Structural Engineering, Surveying, Transportation Engineering.

Mechanical and Materials Engineering :

kinematics and dynamics of rigid bodies, theory of machines and mechanisms, vibration and balancing of machine parts, stability of mechanical systems, mechanics of continuum, strength of materials, fatigue of materials, hydromechanics, aerodynamics, thermodynamics, heat transfer, thermo fluids, nanofluids, energy systems, renewable and alternative energy, engine, fuels, nanomaterial, material synthesis and characterization, principles of the micro-macro transition, elastic behavior, plastic behavior, high-temperature creep, fatigue, fracture, metals, polymers, ceramics, intermetallics.

Chemical Engineering :

Chemical engineering fundamentals, Physical, Theoretical and Computational Chemistry, Chemical engineering educational challenges and development, Chemical reaction engineering, Chemical engineering equipment design and process design, Thermodynamics, Catalysis & reaction engineering, Particulate systems, Rheology, Multifase flows, Interfacial & colloidal phenomena, Transport phenomena in porous/granular media, Membranes and membrane science, Crystallization, distillation, absorption and extraction, Ionic liquids/electrolyte solutions.

Food Engineering :

Food science, Food engineering, Food microbiology, Food packaging, Food preservation, Food technology, Aseptic processing, Food fortification, Food rheology, Dietary supplement, Food safety, Food chemistry. AMA, Agricultural Mechanization in Asia, Africa and Latin America Teikyo Medical Journal Azerbaijan Medical Journal Gongcheng Kexue Yu Jishu/Advanced Engineering Science

Physics Section:

Astrophysics, Atomic and molecular physics, Biophysics, Chemical physics, Civil engineering, Cluster physics, Computational physics, Condensed matter, Cosmology, Device physics, Fluid dynamics, Geophysics, High energy particle physics, Laser, Mechanical engineering, Medical physics, Nanotechnology, Nonlinear science, Nuclear physics, Optics, Photonics, Plasma and fluid physics, Quantum physics, Robotics, Soft matter and polymers.

Mathematics Section:

Actuarial science, Algebra, Algebraic geometry, Analysis and advanced calculus, Approximation theory, Boundry layer theory, Calculus of variations, Combinatorics, Complex analysis, Continuum mechanics, Cryptography, Demography, Differential equations, Differential geometry, Dynamical systems, Econometrics, Fluid mechanics, Functional analysis, Game theory, General topology, Geometry, Graph theory, Group theory, Industrial mathematics, Information theory, Integral transforms and integral equations, Lie algebras, Logic, Magnetohydrodynamics, Mathematical analysis.

Latest Articles of

Technology Reports of Kansai University

Journal ID : TRKU-12-08-2020-10990
Total View : 436

Title : Printed Meander Dipole Antenna Array at S-Band Frequency for 3-Dimensional Air Surveillance Radar Application

Abstract :

In a wireless communication system, one component that plays an important role is an antenna. On the radar system, it takes the characteristics of low profile and lightweight antennas. So, the current technology trends have focused a lot on the design of printed antennas. The type of printed meander dipole antenna was chosen because it was able to reduce the dimensions of the usual dipole arm. In this paper, the authors designed and simulated the antenna using CST Studio Suite. Then we fabricated and measured both a single element and eight-element antennas to verify the antenna performance. The antenna works at S-Band frequency. This antenna using Rogers RO-4003C (lossy) as a substrate with relative permittivity 3.55, thickness 1.524 mm, and has the advantage of being more resistant to input power (power handling) than FR-4. The realization of eight-element antennas is using for a 3-dimensional monopulse tracking air surveillance radar. The simulation results show functional return loss that is less than -15 dB. The radiation pattern is directional. Single element gain is more than 5 dB, while eight elements gain 13.78 dB, and the antenna input impedance is 50 W. So, the antenna has been qualified to the desired specification and can be used as a reference antenna for air surveillance radar system.

Full article
Journal ID : TRKU-11-08-2020-10987
Total View : 1206

Title : A GWO-based Attack Detection System Using K-means Clustering Algorithm

Abstract :

So far, various methods have been proposed to deal with cyber-attacks, but many of them are not capable of running in the real environment or do not have enough accuracy to detect different types of attacks. In this paper, using the features of k-means clustering algorithm, ineffective data in detection process are removed from the dataset. Then, the accuracy of attack detection increases by using the Gray Wolf Optimization (GWO) algorithm and replacing stronger wolves based on their degree of suitability. In each iteration of the algorithm, the fitness is computed and if it improves the algorithm is repeated again, otherwise the algorithm terminates. The main purpose of the proposed method is to increase the accuracy of detection as well as reduce the likelihood of getting stuck in local optimal points. The simulation results on 4 different types of attacks in the NSL-KDD and synthetic dataset show that about 3.2% better detection accuracy is obtained rather than other researches by adjusting the parameters of the gray wolf algorithm, as a conclusion, the proposed method has the necessary efficiency for detecting attacks on computer networks

Full article