Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.
Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are
in the following fields but not limited to:
The first orientation of development is human development, both as a subject and as an object of expansion use the results of growth. The Gender Empowerment Measure (GEM) was calculated to see the extent of women's involvement and active role in politics and the economy. The Indonesian government is targeting the Gender Empowerment Measure (GEM) in the 2015-2019 NMTDP (the National Medium-Term Development Plan) to increase every year. The Gender Empowerment Measure is a complex composite indicator and adequately describes the development achievement gap between men and women. Gresik Regency is one of the districts in Indonesia which is currently implementing a smart city. One of the villages in Gresik that is quite potent and has political independence is Pangkah Wetan Village. This research was conduct with a dynamic system analysis using gender empowerment measure data in 2019. The results showed that the gender empowerment measure of the Pangkah Wetan population for the next five years had a positive trend. These explain that the existence of smart politics to support the smart city work program that is being carried out by the Gresik Regency Government can encourage an increase in the gender empowerment measure. The simulation results show that Gresik Regency has the opportunity to increase the gender empowerment measure by increasing political participation in involvement in entering parliamentary seats, decision making, or income distribution.
The quantum Cryptography is a latter – day appliance in physics and information security, which employs the design of protocols to availing from quantum mechanics externals to assuredness the security of key distribution. In equivalent terms, the quantum key distribution (QKD) is secure because of the no-cloning theorem of quantum mechanics: Eve cannot duplicate the signal and forward a perfect copy to Bob. In this work, we define a new class of (QKD) protocols that are robust against any attacks. In this kind of cryptography, and analysis two protocols, Bennett – Brassard Protocol (B84) and the quantum cryptographic communication protocol (B92).
Design of a spectral method for estimating Naproxen sodium by the ion pair complex creation with the safranine dye in the existence of the basic medium with the methanol as organic solvent to establish a color product soluble in the organic solvent, displaying the maximum absorption at λMAX 518 nm additionally and at concentration ranging from (2 -60 μg / ml) according to Beer rule. The absorption quality of molars reached 6.578 ×103 L. mol-1. Centimeter-1, 0.030 mg cm-2 Shandell's sensitivity analysis, 0.945 μg / ml as detection limit, the relative standard deviation of the procedure does not surpass 0.732 percent of the process used effectively for the evaluation of Naproxen in tablets varied from 100.380- 100.610 percent for both specific and normal additions. A statistical analysis of the outcomes was introduced utilizing T and F at 95℅ as confidence intervals. The outcomes of the statistical intervention indicated that there was no substantial diff erence between the two methods and, as a result, the recommended approach was appropriate for the pharm aceutical application. The results showed that the technique was reliable, accurate as well as reproducible (relative standard deviation < 2%), Whilst it is easy, cheap and much less labor intensive, the evaluation of NAP in formulations and breakdown experiments can therefore be properly implemented.
The quantum Cryptography is a latter – day appliance in physics and information security, which employs the design of protocols to availing from quantum mechanics externals to assuredness the security of key distribution. in this work by using polarization and phase coding, all these are based on computer programs to discuss, analyze, compute the probability of error and the average of information received, compute the employee distance in polarization and phase coding by using parallel quantum cryptography. It was shown that the probability of error in parallel quantum cryptography is less than that for the single quantum cryptography. The results that the bit rate in the first one is larger than the other, because the noise in detector has more effect in wave length (1300 nm) than (1550 nm) and the relation between the optical length (distance) and the probability of correction. This relation is linear between them. There is another new coming cryptography method, which employs four mathematical processes with their tables, so hereupon been boosting the aptness of cryptography and the information security.
The popularity of Short Message Services (SMS) created a propitious environment for spamming. SMS spam filters are not, unfortunately, as easy to develop as email filters because of the rigid size of text messages and messages being laden with noisy elements, such as slangs and symbols. These inhibit effective training and classification of machine learning algorithms deployed for spam filtering. This study, therefore, proposes an enhanced SMS spam filter model that selects the best features from a text pre-process module, based on lexicography and semantic dictionaries, to normalize and expand incoming messages with the view of minimizing the noise element and combating the brevity of short text messages. A hybrid SMS spam filter model, which comprised of text pre-processing section, feature selection section and machine training and classification section, was developed. The model was simulated on the Scikit-learn library of the python programming platform. Evaluation was done using confusion matrix. Wilcoxon Signed-Ranks Test was used to determine the superiority of the proposed technique. A combination of ten machine learning algorithms was employed for validation. The study concluded that incorporation of feature selection techniques to normalized and expanded SMS messages size enhanced the performance of machine learning algorithms in the classification of SMS messages as either ham or spam.