Technology Reports of Kansai University

Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.

Google Scholar

Submission Deadline

Volume - 66 , Issue 01
20 Jan 2024

Upcoming Publication

Volume - 66 , Issue 01
31 Jan 2024

Aim and Scope

Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are in the following fields but not limited to:

Electrical Engineering and Telecommunication Section:

Electrical Engineering, Telecommunication Engineering, Electro-mechanical System Engineering, Biological Biosystem Engineering, Integrated Engineering, Electronic Engineering, Hardware-software co-design and interfacing, Semiconductor chip, Peripheral equipments, Nanotechnology, Advanced control theories and applications, Machine design and optimization , Turbines micro-turbines, FACTS devices , Insulation systems , Power quality , High voltage engineering, Electrical actuators , Energy optimization , Electric drives , Electrical machines, HVDC transmission, Power electronics.

Computer Science Section :

Software Engineering, Data Security , Computer Vision , Image Processing, Cryptography, Computer Networking, Database system and Management, Data mining, Big Data, Robotics , Parallel and distributed processing , Artificial Intelligence , Natural language processing , Neural Networking, Distributed Systems , Fuzzy logic, Advance programming, Machine learning, Internet & the Web, Information Technology , Computer architecture, Virtual vision and virtual simulations, Operating systems, Cryptosystems and data compression, Security and privacy, Algorithms, Sensors and ad-hoc networks, Graph theory, Pattern/image recognition, Neural networks. Lizi Jiaohuan Yu Xifu/Ion Exchange and Adsorption Fa yi xue za zhi

Civil and architectural engineering :

Architectural Drawing, Architectural Style, Architectural Theory, Biomechanics, Building Materials, Coastal Engineering, Construction Engineering, Control Engineering, Earthquake Engineering, Environmental Engineering, Geotechnical Engineering, Materials Engineering, Municipal Or Urban Engineering, Organic Architecture, Sociology of Architecture, Structural Engineering, Surveying, Transportation Engineering.

Mechanical and Materials Engineering :

kinematics and dynamics of rigid bodies, theory of machines and mechanisms, vibration and balancing of machine parts, stability of mechanical systems, mechanics of continuum, strength of materials, fatigue of materials, hydromechanics, aerodynamics, thermodynamics, heat transfer, thermo fluids, nanofluids, energy systems, renewable and alternative energy, engine, fuels, nanomaterial, material synthesis and characterization, principles of the micro-macro transition, elastic behavior, plastic behavior, high-temperature creep, fatigue, fracture, metals, polymers, ceramics, intermetallics.

Chemical Engineering :

Chemical engineering fundamentals, Physical, Theoretical and Computational Chemistry, Chemical engineering educational challenges and development, Chemical reaction engineering, Chemical engineering equipment design and process design, Thermodynamics, Catalysis & reaction engineering, Particulate systems, Rheology, Multifase flows, Interfacial & colloidal phenomena, Transport phenomena in porous/granular media, Membranes and membrane science, Crystallization, distillation, absorption and extraction, Ionic liquids/electrolyte solutions.

Food Engineering :

Food science, Food engineering, Food microbiology, Food packaging, Food preservation, Food technology, Aseptic processing, Food fortification, Food rheology, Dietary supplement, Food safety, Food chemistry.

Physics Section:

Astrophysics, Atomic and molecular physics, Biophysics, Chemical physics, Civil engineering, Cluster physics, Computational physics, Condensed matter, Cosmology, Device physics, Fluid dynamics, Geophysics, High energy particle physics, Laser, Mechanical engineering, Medical physics, Nanotechnology, Nonlinear science, Nuclear physics, Optics, Photonics, Plasma and fluid physics, Quantum physics, Robotics, Soft matter and polymers.

Mathematics Section:

Actuarial science, Algebra, Algebraic geometry, Analysis and advanced calculus, Approximation theory, Boundry layer theory, Calculus of variations, Combinatorics, Complex analysis, Continuum mechanics, Cryptography, Demography, Differential equations, Differential geometry, Dynamical systems, Econometrics, Fluid mechanics, Functional analysis, Game theory, General topology, Geometry, Graph theory, Group theory, Industrial mathematics, Information theory, Integral transforms and integral equations, Lie algebras, Logic, Magnetohydrodynamics, Mathematical analysis.

Latest Articles of

Technology Reports of Kansai University

Journal ID : TRKU-01-04-2020-10628
Total View : 222

Title : Deep Coverage Strategy for Private Wireless Network Power Using Hybrid ( Salp Optimization – Genetic ) Algorithms

Abstract :

This paper introduced new optimization method called improved salp algorithm to development totally covered area with low cost and low radiation in heterogeneous microcellular system for wireless private network. The sensible planning of deep coverage has become increased protrude for location and many base stations that can meet signal coverage of most outdoor environments, but some terminal stations are required with appropriate depth coverage systems and taken with consideration the deep indoors. The proposed algorithm (combine salp optimization algorithm with genetic) are used to complete indoor data collection and a deep coverage optimization. This method aim to improve the original algorithm with enhances the interaction ability between individuals and the information cross-mutation which used to improve the search speed of the algorithm. The simulation results show that the proposed algorithm can effectively optimize multi-target indoor wireless network planning

Full article
Journal ID : TRKU-01-04-2020-10627
Total View : 317

Title : Secure Software Watermarking Based on WSS and Chaotic Map Function for Watermark Encryption

Abstract :

Software watermarking refers to the process of concealing/hiding information in a source code or program to ensure its protection from piracy. Such information hiding is important since software piracy is one of the problems encountered in the software industry that leads to great financial losses annually. Software protection from piracy requires several prevention measures that will ensure the protection of the copyright of its codes; such protection can be provided using both software and hardware. Regrettably, there is currently no single technique that is robust enough to protect software codes from piracy. However, software developers are currently considering a combination of different approaches that will ensure better protection of software codes from piracy; such methods include encryption, watermarking and steganography. In this paper, authors address this issue through a prevention technique which is software watermarking in conjunction with encryption. Our software watermarking proposed scheme is based on some of the unique code features such as (Semicolon;, round brackets ( ), square brackets). Therefore, the main thought of the suggested scheme is using these features of any language programming to embed watermark information using the new proposed scheme called the White Space Scheme (WSS). Chaotic map is used to encrypt the watermark image before embedding the algorithm of the watermarking software. The experimental test and performance analysis have two parts for watermark encryption and software watermarking and have demonstrated better performance of the proposed scheme in terms of space size, time execution and security

Full article