Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.
Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are
in the following fields but not limited to:
The COVID–19 pandemic has paralyzed the face to face classroom sessions but it has not stopped the teaching and learning activities of universities in the province of Nueva Ecija. The institutions shifted to e-learning and use different technological platforms hoping to provide a quality education through online delivery of instruction to their respective college students. The readiness of the 568 tertiary students to engage in online learning during this time of crisis was the focus of this study with the use of descriptive research. It determined the availability of resources and the environment needed by the students to engage in online education. It also measured the level of knowledge desired by student–learners to engage in online classes. Likewise, the challenges of the learners in engaging in online classes were explored. The results have shown that the students are not prepared to engage in online education because the technological resources and environment they needed were not always available. Their levels of knowledge in e-learning were also on the below-average and average levels. As to their challenges, poor and weak internet connection and loss and error in connections were their main concerns. Additional challenges for the students are the lack of devices, gadgets, or resources like a laptop, webcam, printer, ring light and smartphones. This paper suggests that flexible learning mode was preferred by most students in this crucial time.
This paper presented an accredited model to predict the age of marine snail, which dealt with heuristics data problems and overcomes the restrictions in the mysterious and complex relationship that links the input data to predict results. Measuring the abalone age is a very important process in many aspects, especially economic ones; Abalone economic value is linked strongly to their age. An artificial neural network which is the algorithm proposed that is compatible with solving that data throughout the training
In the capabilities of today technologies, IoT become a merging technology that wildly apply nowadays. Meanwhile, at the same time since IoT technology become more in getting much popularity. At the same time, botnet infection that infect IoT become increasing. Consequently, that’s is a lot botnet detection is infected IoT devices. Based on Cybersecurity Malaysia there are various attack on the IoT via botnet. Then a number of researchers has proposed many various methods in order to detect IoT botnet such as machine learning, deep learning, graph theory and others method. This paper has reviewed the number of detection methods that will propose previous researcher in this review. This paper provides summarize of type of IoT botnet method according on the researcher method. This paper also lists some IoT devices that been attack based on previous paper. The contribution of this paper is to give the community the better understanding of detection method that getting much popularity nowadays to be applied. There a lot of botnet manufactured is difficult to detect. Previous researcher proposed several detections and several methods. The review of previous work is for community understanding. In the capabilities of today technologies, IoT become a merging technology that wildly apply nowadays. Meanwhile, at the same time since IoT technology become more in getting much popularity. At the same time, botnet infection that infect IoT become increasing. Consequently, that’s is a lot botnet detection is infected IoT devices. Based on Cybersecurity Malaysia there are various attack on the IoT via botnet. Then a number of researchers has proposed many various methods in order to detect IoT botnet such as machine learning, deep learning, graph theory and others method. This paper has reviewed the number of detection methods that will propose previous researcher in this review. This paper provides summarize of type of IoT botnet method according on the researcher method. This paper also lists some IoT devices that been attack based on previous paper. The contribution of this paper is to give the community the better understanding of detection method that getting much popularity nowadays to be applied. There a lot of botnet manufactured is difficult to detect. Previous researcher proposed several detections and several methods. The review of previous work is for community understanding
"Open data" is a term officially introduced in the year 2007 as an expansion of data sharing. It is defined as data that anyone can access, use and share. In a global scenario, it can be seen that there is a lot of data residing in silos. Subsequently, these data are just wasted without having a knowledge contribution to the community. On the contrary, there are high demands regarding data in many fields, and this trend becomes tremendously increasing day by day. In a globalised world where sharing potential is at its peak, yet everyone is so concerned about locking up their data. Undeniably, there are sensitive data, and there are reasons to keep it private. Henceforth, we do a preliminary study on the current scenario of data management in the Malaysian Technical University Network (MTUN) to find out the practicalities on data management and concerns that arise towards opening up the data. The results shown were based on personal structured interview sessions to the respective stakeholders of MTUN universities, which are; legal officers, information technology officers and strategic department officers. The interviewees are respectively from four (4) MTUN universities which are Universiti Teknikal Malaysia Melaka (UTeM), Universiti Malaysia Pahang (UMP), Universiti Tun Hussein Onn (UTHM) and Universiti Malaysia Perlis (UNIMAP). Eventually, for evolution, there is a need to share the data whenever possible. Nevertheless, it will bring benefit many parties instead of putting it up in silos
This study is an exploratory survey on the potential use of blockchain technology to record and verify educational qualifications in Thailand. This is an important question for university records because of the increasing demand for educational qualification verification by employers, and because of the increasingly modular nature of qualifications which has increased the frequency of verification requests. A survey of higher education institution leaders and registrars (n = 185) showed that the need for a blockchain or other more efficient service and cultural acceptance of blockchain and innovation generally positively influenced blockchain acceptance for this purpose. However, security concern and technology readiness had a negative effect. A mediation effect was also seen for institutional innovation climate. The implication of this is that some educational institutions, particularly those with a high verification workload, may be nearing the stage of implementation of blockchain-based qualification verification systems, despite their weaknesses