kansai

Technology Reports of Kansai University

Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.

Google Scholar

Submission Deadline

Volume - 66 , Issue 02
26 Jan 2025
Day
Hour
Min
Sec

Upcoming Publication

Volume - not available , Issue not available
00:00:00

Aim and Scope

Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are in the following fields but not limited to:

Electrical Engineering and Telecommunication Section:

Electrical Engineering, Telecommunication Engineering, Electro-mechanical System Engineering, Biological Biosystem Engineering, Integrated Engineering, Electronic Engineering, Hardware-software co-design and interfacing, Semiconductor chip, Peripheral equipments, Nanotechnology, Advanced control theories and applications, Machine design and optimization , Turbines micro-turbines, FACTS devices , Insulation systems , Power quality , High voltage engineering, Electrical actuators , Energy optimization , Electric drives , Electrical machines, HVDC transmission, Power electronics.

Computer Science Section :

Software Engineering, Data Security , Computer Vision , Image Processing, Cryptography, Computer Networking, Database system and Management, Data mining, Big Data, Robotics , Parallel and distributed processing , Artificial Intelligence , Natural language processing , Neural Networking, Distributed Systems , Fuzzy logic, Advance programming, Machine learning, Internet & the Web, Information Technology , Computer architecture, Virtual vision and virtual simulations, Operating systems, Cryptosystems and data compression, Security and privacy, Algorithms, Sensors and ad-hoc networks, Graph theory, Pattern/image recognition, Neural networks.

Civil and architectural engineering :

Architectural Drawing, Architectural Style, Architectural Theory, Biomechanics, Building Materials, Coastal Engineering, Construction Engineering, Control Engineering, Earthquake Engineering, Environmental Engineering, Geotechnical Engineering, Materials Engineering, Municipal Or Urban Engineering, Organic Architecture, Sociology of Architecture, Structural Engineering, Surveying, Transportation Engineering.

Mechanical and Materials Engineering :

kinematics and dynamics of rigid bodies, theory of machines and mechanisms, vibration and balancing of machine parts, stability of mechanical systems, mechanics of continuum, strength of materials, fatigue of materials, hydromechanics, aerodynamics, thermodynamics, heat transfer, thermo fluids, nanofluids, energy systems, renewable and alternative energy, engine, fuels, nanomaterial, material synthesis and characterization, principles of the micro-macro transition, elastic behavior, plastic behavior, high-temperature creep, fatigue, fracture, metals, polymers, ceramics, intermetallics.

Chemical Engineering :

Chemical engineering fundamentals, Physical, Theoretical and Computational Chemistry, Chemical engineering educational challenges and development, Chemical reaction engineering, Chemical engineering equipment design and process design, Thermodynamics, Catalysis & reaction engineering, Particulate systems, Rheology, Multifase flows, Interfacial & colloidal phenomena, Transport phenomena in porous/granular media, Membranes and membrane science, Crystallization, distillation, absorption and extraction, Ionic liquids/electrolyte solutions.

Food Engineering :

Food science, Food engineering, Food microbiology, Food packaging, Food preservation, Food technology, Aseptic processing, Food fortification, Food rheology, Dietary supplement, Food safety, Food chemistry.

Physics Section:

Astrophysics, Atomic and molecular physics, Biophysics, Chemical physics, Civil engineering, Cluster physics, Computational physics, Condensed matter, Cosmology, Device physics, Fluid dynamics, Geophysics, High energy particle physics, Laser, Mechanical engineering, Medical physics, Nanotechnology, Nonlinear science, Nuclear physics, Optics, Photonics, Plasma and fluid physics, Quantum physics, Robotics, Soft matter and polymers.

Mathematics Section:

Actuarial science, Algebra, Algebraic geometry, Analysis and advanced calculus, Approximation theory, Boundry layer theory, Calculus of variations, Combinatorics, Complex analysis, Continuum mechanics, Cryptography, Demography, Differential equations, Differential geometry, Dynamical systems, Econometrics, Fluid mechanics, Functional analysis, Game theory, General topology, Geometry, Graph theory, Group theory, Industrial mathematics, Information theory, Integral transforms and integral equations, Lie algebras, Logic, Magnetohydrodynamics, Mathematical analysis.

Latest Articles of

Technology Reports of Kansai University

Journal ID : TRKU-25-08-2020-11042
Total View : 345

Title : The effect of carbon whisker loading on carbon foam on physical and mechanical properties

Abstract :

Carbon foam is demanded in large quantities since it has certain attractive features like lightweight and high-temperature stability makes them versatile in many applications. Since the carbon foam from renewable resources gets a lot of attention, this study is a focus to fabricate a high strength carbon foam using natural resources such as sucrose and carbon whisker to produce good strength properties of carbon foam. The specimens were prepared via blowing method with varies loading of carbon whiskers of 0.1 wt%, 0.2 wt%, 0.3wt%, 0.4 wt%, 0.5 wt% and 0.6 wt% before mixing with sucrose and boric acid. Then, the materials are mixed uniformly with carbon whisker and boric acid for 2 hours. Next, foaming and setting of solid organic foam for 48 hours and dehydration for 16 hours. The carbonization in the inert atmosphere takes place for 2 hours constant temperature and the heating rate at 2°C/min until 900°C. The morphology, porosity, density and compression properties were analysed in this study. SEM analysis presented the distribution of carbon fibre on the wall structures and some debonding and holes were observed. Images of carbon fibre still bonded between walls surfaces and embedded on the wall structures were also observed. The bulk density result shows that the highest carbon whisker contains has a higher value reading which is 0.238 g/cm3 with 84.87% of porosity. The highest whisker carbon contains shows a good result in compressive strength which is 0.13 N/mm2 and it can be concluded as the best parameter among their carbon loading

Full article
Journal ID : TRKU-24-08-2020-11041
Total View : 456

Title : Time Optimization when Internal Grinding Stainless Steel

Abstract :

This paper presents a time optimization study to find optimal exchanged wheel diameter when internal grinding stainless steel. To do that, the minimum grinding time was elected for the target of the optimization problem. In addition, five process factors were carefully chosen for the exploration. They are the original wheel diameter, the wheel width, the wheel wear per dress, the wheel life, and the total depth of dressing cut. Moreover, to weigh the effects of the input parameters on the optimal exchanged wheel diameter, a simulation experiment was designed and accompanied. In addition, a regression model was presented to estimate the optimal exchanged wheel diameter

Full article
Journal ID : TRKU-24-08-2020-11040
Total View : 445

Title : Forging A Smart Dependable Data Integrity And Protection System Through Hybrid-Integration Honeypot In Web and Database Server

Abstract :

The digital world is rapidly converging and converting a lot of our valuable data on to its digital equivalent. Its dissemination as eased via the advent of the Internet has also led to and encountered many attacks due to predictable responses from users. This has evolved the field of social engineering and exploits of user trust-levels. Thus, the use of deception mechanisms now plays a prominent role in enhancing the field of cyber and data security. There exists many techniques to dissuade and/or redirect adversaries via deception mode commonly called honeypots. They seek to detect intrusive activities by adversaries using services that attract the attacker to it. Honeypots have been successfully employed to minimize security breaches. We explore deception-based mechanism (honeypot) as an effective means to minimize data exploitation by adversaries – implemented via web servers and equipped with tracking and identification capabilities as the system learns and defends the user system against intrusive actions.

Full article
Journal ID : TRKU-24-08-2020-11039
Total View : 390

Title : Secure Patient Data Transmission Using Information Hiding System and Medical IoT

Abstract :

Evolution in the concealment of data was reflected in the medical field specifically on medical images and becoming more challenging and an enthusiastic area of research since the last decades over the dispersed IoTs. Hide information technology in the image is called steganography. The objective of this study is the preservation of privacy and confidentiality of data in uncertain surroundings during multimedia exchange joining two IoT hops. For attacker hindrance and, provision of data confidentiality, a resilient multilevel security perspective depending on information hiding and cryptography is suggested. The existing schemes have limitations related to the equilibrium trade-off amid two variables (medical image quality and security). In addition, the direct embedment of the secret data into the images and further subtraction of encrypted data from it often enables the intruders to easily detect and extract the hidden information. Based on these factors, we proposed multilevel security based on three random iterations with chosen a procedure that was implemented using Henon function to stop against cybercrimes challenges. Satisfying results, gained when benchmarking our results with the existing methods in literature through the same criteria

Full article
Journal ID : TRKU-24-08-2020-11038
Total View : 344

Title : Digital Image Steganography in Spatial Domain: A Critical Study

Abstract :

Prevalent years have witnessed the rise in a plethora of data security issues that run across the board from copyright to content security issues due to the multitudinous transmission and sharing of multimedia activities across communications conduit that utilizes the network, which is not secure. Consequently, the requirement for the latest security techniques in data hiding such as steganography is now imperative and indispensable. Thus, steganography entails the skill and science of concealment of existing confidential information by concurrently making the communications imperceptible through the utilisation of diverse media carriers such as Image, Text, Audio, Video, Protocol and DNA. Amongst the varying kinds of media utilised, the findings of this study show the high demand and proliferation of digitalized images, thus the emphasis of our study is pertaining to the implementation of digital image steganography (IS). The major problem in the construction of a steganography system is the maintenance of a compromise between robustness, security, imperceptibility and a greater rate of bit embedding. This study offers a comprehensive summary of current IS forms, alongside the latest endowments of individual classification in a wide range of aspects and modes of operations. Additionally, this study offers a comprehensive summary of IS inclusive of customary operation, necessities, varying aspects, diverse forms and their performance assessments, protocols, and types of attacks. Diverse performance analysis measures for the evaluation of steganography systems are also deliberated here

Full article

Certificates


//