Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.
Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are
in the following fields but not limited to:
Zhonghua er bi yan hou tou jing wai ke za zhi = Chinese journal of otorhinolaryngology head and neck surgery
Colonization of the oral cavity by potentially pathogenic bacteria constitutes threatens its transmission to different human tissues and organs, this study provides isolation and identification of 26 isolates (14 Klebsiella pneumoniae and 12 Enterobacter cloacae) recovered from oral cavity infections. In this study, some of virulence factors were detected by traditional phenotypic methods. The results showed 9 (64.28%) of 14 K. pneumoniae isolates demonstrated hypermucoviscosity. The results showed that 57.1% (8/14), 58.4% (7/12) and of isolates were encapsulated K. pneumoniae and E. cloacae isolates, respectively. In this study, there were 78.5 %(11/14) of K. pneumoniae and 66.6% (8/12) of E. cloacae isolates showed their ability to adhere with epithelial cell. The results in of biofilm formation were indicated according to (Salwa et al., 2011) in which 71.4% (10/14) of K. pneumoniae and 83.3% (10/12) of E. cloacae isolates appeared high biofilm formation (strong positive adherence). While 28.6% (4/14) K. pneumoniae and 16.7% (2/12) of E. cloacae isolates appeared moderate biofilm formation
Community users of digital technologies such as the Internet and various facilities such as social media, internet, games, and various other applications provide a variety of positive and negative effects. efficiency, safety, comfort, and effectiveness are positives of this technology but there are also negative impacts such as the decline of social behavior, crime, and moral vulnerability. Although there have been internet ethical guidelines such as Cyber Ethics but have not been able to play a maximum role to be able to control the negative impact. Cyber religious is a model of internet user control of amoral and criminal acts, which can be applied to various elements related to the internet world. One of the applications of cyber religious for user control internet with applications that can detect immoral behavior or crime on the internet through detection on the browser used. It's so easy for someone to access internet information resulting in Uncontrolled Internet users. This can lead to problems such as dangerous access to cysts, pornography, crime, cruelty, abnormal behavior, and committing criminal acts to others. Cyber religious processing is to check the internet access of a person, if found any indication of immorality or crime then the system will provide warning and or provide other information more useful. This research provides various models of cyber religious architecture with adaptation from some research about connection control with internet networks. Each model influences different communities to access from small office (LAN), large office (MAN), Access from any country, and access to the world