Technology Reports of Kansai University

Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.

Submission Deadline

Volume - 62 , Issue 10
08 Nov 2020
Day
Hour
Min
Sec

Upcoming Publication

Volume - 62 , Issue 08
30 Sep 2020

Aim and Scope

Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are in the following fields but not limited to:

Electrical Engineering and Telecommunication Section:

Electrical Engineering, Telecommunication Engineering, Electro-mechanical System Engineering, Biological Biosystem Engineering, Integrated Engineering, Electronic Engineering, Hardware-software co-design and interfacing, Semiconductor chip, Peripheral equipments, Nanotechnology, Advanced control theories and applications, Machine design and optimization , Turbines micro-turbines, FACTS devices , Insulation systems , Power quality , High voltage engineering, Electrical actuators , Energy optimization , Electric drives , Electrical machines, HVDC transmission, Power electronics.

Computer Science Section :

Software Engineering, Data Security , Computer Vision , Image Processing, Cryptography, Computer Networking, Database system and Management, Data mining, Big Data, Robotics , Parallel and distributed processing , Artificial Intelligence , Natural language processing , Neural Networking, Distributed Systems , Fuzzy logic, Advance programming, Machine learning, Internet & the Web, Information Technology , Computer architecture, Virtual vision and virtual simulations, Operating systems, Cryptosystems and data compression, Security and privacy, Algorithms, Sensors and ad-hoc networks, Graph theory, Pattern/image recognition, Neural networks.

Civil and architectural engineering :

Architectural Drawing, Architectural Style, Architectural Theory, Biomechanics, Building Materials, Coastal Engineering, Construction Engineering, Control Engineering, Earthquake Engineering, Environmental Engineering, Geotechnical Engineering, Materials Engineering, Municipal Or Urban Engineering, Organic Architecture, Sociology of Architecture, Structural Engineering, Surveying, Transportation Engineering.

Mechanical and Materials Engineering :

kinematics and dynamics of rigid bodies, theory of machines and mechanisms, vibration and balancing of machine parts, stability of mechanical systems, mechanics of continuum, strength of materials, fatigue of materials, hydromechanics, aerodynamics, thermodynamics, heat transfer, thermo fluids, nanofluids, energy systems, renewable and alternative energy, engine, fuels, nanomaterial, material synthesis and characterization, principles of the micro-macro transition, elastic behavior, plastic behavior, high-temperature creep, fatigue, fracture, metals, polymers, ceramics, intermetallics.

Chemical Engineering :

Chemical engineering fundamentals, Physical, Theoretical and Computational Chemistry, Chemical engineering educational challenges and development, Chemical reaction engineering, Chemical engineering equipment design and process design, Thermodynamics, Catalysis & reaction engineering, Particulate systems, Rheology, Multifase flows, Interfacial & colloidal phenomena, Transport phenomena in porous/granular media, Membranes and membrane science, Crystallization, distillation, absorption and extraction, Ionic liquids/electrolyte solutions.

Food Engineering :

Food science, Food engineering, Food microbiology, Food packaging, Food preservation, Food technology, Aseptic processing, Food fortification, Food rheology, Dietary supplement, Food safety, Food chemistry.

Physics Section:

Astrophysics, Atomic and molecular physics, Biophysics, Chemical physics, Civil engineering, Cluster physics, Computational physics, Condensed matter, Cosmology, Device physics, Fluid dynamics, Geophysics, High energy particle physics, Laser, Mechanical engineering, Medical physics, Nanotechnology, Nonlinear science, Nuclear physics, Optics, Photonics, Plasma and fluid physics, Quantum physics, Robotics, Soft matter and polymers.

Mathematics Section:

Actuarial science, Algebra, Algebraic geometry, Analysis and advanced calculus, Approximation theory, Boundry layer theory, Calculus of variations, Combinatorics, Complex analysis, Continuum mechanics, Cryptography, Demography, Differential equations, Differential geometry, Dynamical systems, Econometrics, Fluid mechanics, Functional analysis, Game theory, General topology, Geometry, Graph theory, Group theory, Industrial mathematics, Information theory, Integral transforms and integral equations, Lie algebras, Logic, Magnetohydrodynamics, Mathematical analysis.

Latest Articles of

Technology Reports of Kansai University

Journal ID : TRKU-04-09-2020-11073
Total View : 341

Title : Automated Visualization of Malware Attack Analysis

Abstract :

Malicious software or widely known as malware has inflicted a great number of computers and causing many intrusion and damages that wasted a lot of money and resource. Despite having a new variant and type of malware appeared almost every day, traditional worm such as Blaster are still posing threats these days due to its rapid distribution through the internet. This research is previously analyzed manually using packet analyzer namely tcpdump and wireshark which is time-consuming and inefficient. To overcome this problem, an automated script known as Malware Attack Visualization (MAV) Script is developed to automate the visualization of the malware attack scenario. This script is capable to analyze and dissect the network traffic and represent the scenario in visualization. This information is crucial as it helps to identify the sources of the attack and the location of the incurred damage. Thus, this script will help to determine and visualize the malware attack scenario which eases the process of finding the Attacker, Victim, and Victim/Attacker of the attack

Full article
Journal ID : TRKU-04-09-2020-11072
Total View : 459

Title : Attribute Related Methods for Improvement of ID3 Algorithm in Classification of Data: A Review

Abstract :

Decision tree is an important method in data mining to solve the classification problems. There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. The use of information gain in the ID3 algorithm as the attribute selection criteria is not to assess the relationship between classification and the dataset’s attributes. The objective of the study being conducted is to implement the attribute related methods to solve the shortcomings of the ID3 algorithm like the tendency to select attributes with many values and also improve the performance of ID3 algorithm. The techniques of attribute related methods studied in this paper were mutual information, association function and attribute weighted. All the techniques assist the decision tree to find the most optimal attributes in each generation of the tree. Results of the reviewed techniques show that attribute selection methods capable to resolve the limitations in ID3 algorithm and increase the performance of the method. All of the reviewed techniques have their advantages and disadvantages and useful to solve the classification problems. Implementation of the techniques with ID3 algorithm is being discussed thoroughly

Full article

Certificates