Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.
Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are
in the following fields but not limited to:
This paper presents a time optimization study to find optimal exchanged wheel diameter when internal grinding stainless steel. To do that, the minimum grinding time was elected for the target of the optimization problem. In addition, five process factors were carefully chosen for the exploration. They are the original wheel diameter, the wheel width, the wheel wear per dress, the wheel life, and the total depth of dressing cut. Moreover, to weigh the effects of the input parameters on the optimal exchanged wheel diameter, a simulation experiment was designed and accompanied. In addition, a regression model was presented to estimate the optimal exchanged wheel diameter
The digital world is rapidly converging and converting a lot of our valuable data on to its digital equivalent. Its dissemination as eased via the advent of the Internet has also led to and encountered many attacks due to predictable responses from users. This has evolved the field of social engineering and exploits of user trust-levels. Thus, the use of deception mechanisms now plays a prominent role in enhancing the field of cyber and data security. There exists many techniques to dissuade and/or redirect adversaries via deception mode commonly called honeypots. They seek to detect intrusive activities by adversaries using services that attract the attacker to it. Honeypots have been successfully employed to minimize security breaches. We explore deception-based mechanism (honeypot) as an effective means to minimize data exploitation by adversaries – implemented via web servers and equipped with tracking and identification capabilities as the system learns and defends the user system against intrusive actions.