Technology Reports of Kansai University

Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.

Google Scholar

Submission Deadline

Volume - 64 , Issue 05
20 May 2022

Upcoming Publication

Volume - 64 , Issue 05
31 May 2022

Aim and Scope

Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are in the following fields but not limited to: Zhonghua er bi yan hou tou jing wai ke za zhi = Chinese journal of otorhinolaryngology head and neck surgery

Electrical Engineering and Telecommunication Section:

Electrical Engineering, Telecommunication Engineering, Electro-mechanical System Engineering, Biological Biosystem Engineering, Integrated Engineering, Electronic Engineering, Hardware-software co-design and interfacing, Semiconductor chip, Peripheral equipments, Nanotechnology, Advanced control theories and applications, Machine design and optimization , Turbines micro-turbines, FACTS devices , Insulation systems , Power quality , High voltage engineering, Electrical actuators , Energy optimization , Electric drives , Electrical machines, HVDC transmission, Power electronics.

Computer Science Section :

Software Engineering, Data Security , Computer Vision , Image Processing, Cryptography, Computer Networking, Database system and Management, Data mining, Big Data, Robotics , Parallel and distributed processing , Artificial Intelligence , Natural language processing , Neural Networking, Distributed Systems , Fuzzy logic, Advance programming, Machine learning, Internet & the Web, Information Technology , Computer architecture, Virtual vision and virtual simulations, Operating systems, Cryptosystems and data compression, Security and privacy, Algorithms, Sensors and ad-hoc networks, Graph theory, Pattern/image recognition, Neural networks.

Civil and architectural engineering :

Architectural Drawing, Architectural Style, Architectural Theory, Biomechanics, Building Materials, Coastal Engineering, Construction Engineering, Control Engineering, Earthquake Engineering, Environmental Engineering, Geotechnical Engineering, Materials Engineering, Municipal Or Urban Engineering, Organic Architecture, Sociology of Architecture, Structural Engineering, Surveying, Transportation Engineering.

Mechanical and Materials Engineering :

kinematics and dynamics of rigid bodies, theory of machines and mechanisms, vibration and balancing of machine parts, stability of mechanical systems, mechanics of continuum, strength of materials, fatigue of materials, hydromechanics, aerodynamics, thermodynamics, heat transfer, thermo fluids, nanofluids, energy systems, renewable and alternative energy, engine, fuels, nanomaterial, material synthesis and characterization, principles of the micro-macro transition, elastic behavior, plastic behavior, high-temperature creep, fatigue, fracture, metals, polymers, ceramics, intermetallics.

Chemical Engineering :

Chemical engineering fundamentals, Physical, Theoretical and Computational Chemistry, Chemical engineering educational challenges and development, Chemical reaction engineering, Chemical engineering equipment design and process design, Thermodynamics, Catalysis & reaction engineering, Particulate systems, Rheology, Multifase flows, Interfacial & colloidal phenomena, Transport phenomena in porous/granular media, Membranes and membrane science, Crystallization, distillation, absorption and extraction, Ionic liquids/electrolyte solutions.

Food Engineering :

Food science, Food engineering, Food microbiology, Food packaging, Food preservation, Food technology, Aseptic processing, Food fortification, Food rheology, Dietary supplement, Food safety, Food chemistry. AMA, Agricultural Mechanization in Asia, Africa and Latin America Teikyo Medical Journal Azerbaijan Medical Journal Gongcheng Kexue Yu Jishu/Advanced Engineering Science

Physics Section:

Astrophysics, Atomic and molecular physics, Biophysics, Chemical physics, Civil engineering, Cluster physics, Computational physics, Condensed matter, Cosmology, Device physics, Fluid dynamics, Geophysics, High energy particle physics, Laser, Mechanical engineering, Medical physics, Nanotechnology, Nonlinear science, Nuclear physics, Optics, Photonics, Plasma and fluid physics, Quantum physics, Robotics, Soft matter and polymers.

Mathematics Section:

Actuarial science, Algebra, Algebraic geometry, Analysis and advanced calculus, Approximation theory, Boundry layer theory, Calculus of variations, Combinatorics, Complex analysis, Continuum mechanics, Cryptography, Demography, Differential equations, Differential geometry, Dynamical systems, Econometrics, Fluid mechanics, Functional analysis, Game theory, General topology, Geometry, Graph theory, Group theory, Industrial mathematics, Information theory, Integral transforms and integral equations, Lie algebras, Logic, Magnetohydrodynamics, Mathematical analysis.

Latest Articles of

Technology Reports of Kansai University

Journal ID : TRKU-29-07-2020-10952
Total View : 239

Title : Phenotypic study of Klebsiella pneumoniae and Enterobacter cloacae isolated from oral cavity infections in Najaf Province/Iraq

Abstract :

Colonization of the oral cavity by potentially pathogenic bacteria constitutes threatens its transmission to different human tissues and organs, this study provides isolation and identification of 26 isolates (14 Klebsiella pneumoniae and 12 Enterobacter cloacae) recovered from oral cavity infections. In this study, some of virulence factors were detected by traditional phenotypic methods. The results showed 9 (64.28%) of 14 K. pneumoniae isolates demonstrated hypermucoviscosity. The results showed that 57.1% (8/14), 58.4% (7/12) and of isolates were encapsulated K. pneumoniae and E. cloacae isolates, respectively. In this study, there were 78.5 %(11/14) of K. pneumoniae and 66.6% (8/12) of E. cloacae isolates showed their ability to adhere with epithelial cell. The results in of biofilm formation were indicated according to (Salwa et al., 2011) in which 71.4% (10/14) of K. pneumoniae and 83.3% (10/12) of E. cloacae isolates appeared high biofilm formation (strong positive adherence). While 28.6% (4/14) K. pneumoniae and 16.7% (2/12) of E. cloacae isolates appeared moderate biofilm formation

Full article
Journal ID : TRKU-29-07-2020-10950
Total View : 1043

Title : Design Architecture of Control Internet User with The Cyber Religious Concepts

Abstract :

Community users of digital technologies such as the Internet and various facilities such as social media, internet, games, and various other applications provide a variety of positive and negative effects. efficiency, safety, comfort, and effectiveness are positives of this technology but there are also negative impacts such as the decline of social behavior, crime, and moral vulnerability. Although there have been internet ethical guidelines such as Cyber Ethics but have not been able to play a maximum role to be able to control the negative impact. Cyber religious is a model of internet user control of amoral and criminal acts, which can be applied to various elements related to the internet world. One of the applications of cyber religious for user control internet with applications that can detect immoral behavior or crime on the internet through detection on the browser used. It's so easy for someone to access internet information resulting in Uncontrolled Internet users. This can lead to problems such as dangerous access to cysts, pornography, crime, cruelty, abnormal behavior, and committing criminal acts to others. Cyber religious processing is to check the internet access of a person, if found any indication of immorality or crime then the system will provide warning and or provide other information more useful. This research provides various models of cyber religious architecture with adaptation from some research about connection control with internet networks. Each model influences different communities to access from small office (LAN), large office (MAN), Access from any country, and access to the world

Full article