Technology Reports of Kansai University

Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.

Google Scholar

Submission Deadline

Volume - 63 , Issue 05
10 May 2021

Upcoming Publication

Volume - 63 , Issue 04
30 Apr 2021

Aim and Scope

Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are in the following fields but not limited to:

Electrical Engineering and Telecommunication Section:

Electrical Engineering, Telecommunication Engineering, Electro-mechanical System Engineering, Biological Biosystem Engineering, Integrated Engineering, Electronic Engineering, Hardware-software co-design and interfacing, Semiconductor chip, Peripheral equipments, Nanotechnology, Advanced control theories and applications, Machine design and optimization , Turbines micro-turbines, FACTS devices , Insulation systems , Power quality , High voltage engineering, Electrical actuators , Energy optimization , Electric drives , Electrical machines, HVDC transmission, Power electronics.

Computer Science Section :

Software Engineering, Data Security , Computer Vision , Image Processing, Cryptography, Computer Networking, Database system and Management, Data mining, Big Data, Robotics , Parallel and distributed processing , Artificial Intelligence , Natural language processing , Neural Networking, Distributed Systems , Fuzzy logic, Advance programming, Machine learning, Internet & the Web, Information Technology , Computer architecture, Virtual vision and virtual simulations, Operating systems, Cryptosystems and data compression, Security and privacy, Algorithms, Sensors and ad-hoc networks, Graph theory, Pattern/image recognition, Neural networks.

Civil and architectural engineering :

Architectural Drawing, Architectural Style, Architectural Theory, Biomechanics, Building Materials, Coastal Engineering, Construction Engineering, Control Engineering, Earthquake Engineering, Environmental Engineering, Geotechnical Engineering, Materials Engineering, Municipal Or Urban Engineering, Organic Architecture, Sociology of Architecture, Structural Engineering, Surveying, Transportation Engineering.

Mechanical and Materials Engineering :

kinematics and dynamics of rigid bodies, theory of machines and mechanisms, vibration and balancing of machine parts, stability of mechanical systems, mechanics of continuum, strength of materials, fatigue of materials, hydromechanics, aerodynamics, thermodynamics, heat transfer, thermo fluids, nanofluids, energy systems, renewable and alternative energy, engine, fuels, nanomaterial, material synthesis and characterization, principles of the micro-macro transition, elastic behavior, plastic behavior, high-temperature creep, fatigue, fracture, metals, polymers, ceramics, intermetallics.

Chemical Engineering :

Chemical engineering fundamentals, Physical, Theoretical and Computational Chemistry, Chemical engineering educational challenges and development, Chemical reaction engineering, Chemical engineering equipment design and process design, Thermodynamics, Catalysis & reaction engineering, Particulate systems, Rheology, Multifase flows, Interfacial & colloidal phenomena, Transport phenomena in porous/granular media, Membranes and membrane science, Crystallization, distillation, absorption and extraction, Ionic liquids/electrolyte solutions.

Food Engineering :

Food science, Food engineering, Food microbiology, Food packaging, Food preservation, Food technology, Aseptic processing, Food fortification, Food rheology, Dietary supplement, Food safety, Food chemistry. AMA, Agricultural Mechanization in Asia, Africa and Latin America Teikyo Medical Journal Journal of the Mine Ventilation Society of South Africa Dokkyo Journal of Medical Sciences

Physics Section:

Astrophysics, Atomic and molecular physics, Biophysics, Chemical physics, Civil engineering, Cluster physics, Computational physics, Condensed matter, Cosmology, Device physics, Fluid dynamics, Geophysics, High energy particle physics, Laser, Mechanical engineering, Medical physics, Nanotechnology, Nonlinear science, Nuclear physics, Optics, Photonics, Plasma and fluid physics, Quantum physics, Robotics, Soft matter and polymers.

Mathematics Section:

Actuarial science, Algebra, Algebraic geometry, Analysis and advanced calculus, Approximation theory, Boundry layer theory, Calculus of variations, Combinatorics, Complex analysis, Continuum mechanics, Cryptography, Demography, Differential equations, Differential geometry, Dynamical systems, Econometrics, Fluid mechanics, Functional analysis, Game theory, General topology, Geometry, Graph theory, Group theory, Industrial mathematics, Information theory, Integral transforms and integral equations, Lie algebras, Logic, Magnetohydrodynamics, Mathematical analysis.

Latest Articles of

Technology Reports of Kansai University

Journal ID : TRKU-14-02-2021-11426
Total View : 389

Title : Analysis and design of solar power systems for a variety of applications in wireless public lighting, surveillance and wireless communication

Abstract :

The design process often requires delays in the wireless network and loss of packets. The solar lighting system provides a clean environment so that it can operate for a long time. Solar Wireless Network Control System (SWNCS) offers a multi-service infrastructure solution for developed and underdeveloped countries. The system provides access to Wi-Fi / WIMAX, video surveillance and a wireless sensor for weather monitoring, powered by solar energy. This system is compatible with all applications. This study focuses on delayed SWNCS and packet hopping for stochastic wireless communications. Delays and loss of wireless networks vary stochastically. This stochastic approach to wasted time and packets for wireless networks such as Wi-Fi and WiMAX are typical for commercial use. Delays and packet losses are constructed using Markovan circuits as models of a stochastic wireless network. Based on this model, SWNCS has developed new approaches to avoid packets and loss of time. The linear matrix inequality (LMI) methodology is used to analyze the robust model predictive controller (RMPC) approach for SWNCS. SWNCS delays are known by the Markov chain as a normal variable. SWNCs are represented by a discrete Markov jump system with unlimited standard delay. The full state feedback controller can be designed using the LMI kit based on the SWNCS model. The modelling and simulation show the performance of the proposed project. The proposed control algorithm provides a numerical example to verify the reliability of the results. The standards are used to determine the reliability and functionality of the main structures and are taken from LMI. In addition, the effectiveness of a solid stability analysis is illustrated by a numerical example.

Full article
Journal ID : TRKU-14-02-2021-11425
Total View : 433

Title : An Accurate Anomaly-based Intrusion Detection System using a Valid Dataset

Abstract :

With the increasing use of a variety of services and applications in the real world network environment, identifying malicious behavior in traffic patterns generated by different applications has become challenging. Many existing methods use a technique and a dataset with specific limitations. But in the real world, applications may have different datasets. In addition, the nonlinear behavior of the dataset is another challenge for detecting anomalous data. Several researches have been done in this area, but it is still an open research topic and less used in the real world. In general, existing methods consider a set of assumptions about training data and validation methods, while the created system cannot be used in the real world. In this paper, we present a new approach to create a valid attack dataset. Also, a new validation strategy is provided and so an SVM-based feature selection method is proposed to implement the intrusion detection system. The evaluation results show that the proposed feature selection method improves the system accuracy by considering the important features of the real network during the modeling process.

Full article