首页 > 最新文献

South African Computer Journal最新文献

英文 中文
Waterfall and Agile information system project success rates – A South African perspective 瀑布和敏捷信息系统项目的成功率——一个南非的视角
Q3 Social Sciences Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.683
L. Khoza, C. Marnewick
Software projects are still failing at an alarming rate and do not provide value to the organisation at large. This has been the case for the last decade. Software projects use predominantly Waterfall as a methodology. This raises the question whether new ways of working can be introduced to improve the success rate. One such new way is Agile as an approach to developing software. A survey was done to determine whether Agile projects are more successful than Waterfall projects, thus contrasting the old and the new ways of working. Some 617 software projects were evaluated to determine the success rate based on the methodology used. Success was measured on a continuum of five levels and not just the triple constraint. The results imply that Agile projects are more successful than Waterfall projects to some extent, but that there are still concerns that need to be addressed.
软件项目仍以惊人的速度失败,无法为整个组织提供价值。过去十年一直是这样。软件项目主要使用Waterfall作为一种方法论。这就提出了一个问题,即是否可以引入新的工作方式来提高成功率。敏捷是一种新的软件开发方法。进行了一项调查,以确定敏捷项目是否比瀑布项目更成功,从而对比新旧工作方式。对大约617个软件项目进行了评估,以根据所使用的方法确定成功率。衡量成功的标准是五个层面,而不仅仅是三重约束。结果表明,在某种程度上,敏捷项目比瀑布项目更成功,但仍有一些问题需要解决。
{"title":"Waterfall and Agile information system project success rates – A South African perspective","authors":"L. Khoza, C. Marnewick","doi":"10.18489/sacj.v32i1.683","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.683","url":null,"abstract":"Software projects are still failing at an alarming rate and do not provide value to the organisation at large. This has been the case for the last decade. Software projects use predominantly Waterfall as a methodology. This raises the question whether new ways of working can be introduced to improve the success rate. One such new way is Agile as an approach to developing software. A survey was done to determine whether Agile projects are more successful than Waterfall projects, thus contrasting the old and the new ways of working. Some 617 software projects were evaluated to determine the success rate based on the methodology used. Success was measured on a continuum of five levels and not just the triple constraint. The results imply that Agile projects are more successful than Waterfall projects to some extent, but that there are still concerns that need to be addressed.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48744607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Survey of Automated Financial Statement Fraud Detection with Relevance to the South African Context 与南非背景相关的财务报表欺诈自动检测调查
Q3 Social Sciences Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.777
W. Mongwe, K. Malan
Financial statement fraud has been on the increase in the past two decades and includes prominent scandals such as Enron, WorldCom and more recently in South Africa, Steinhoff. These scandals have led to billions of dollars being lost in the form of market capitalisation from different stock exchanges across the world. During this time, there has been an increase in the literature on applying automated methods to detecting financial statement fraud using publicly available data. This paper provides a survey of the literature on automated financial statement fraud detection and identifies current gaps in the literature. The paper highlights a number of important considerations in the implementation of financial statement fraud detection decision support systems, including 1) the definition of fraud, 2) features used for detecting fraud, 3) region of the case study, dataset size and imbalance, 4) algorithms used for detection, 5) approach to feature selection / feature engineering, 6) treatment of missing data, and 7) performance measure used. The current study discusses how these and other implementation factors could be approached within the South African context.
财务报表欺诈在过去二十年中一直在增加,包括安然、世通和最近在南非发生的斯坦霍夫等突出丑闻。这些丑闻导致世界各地不同证券交易所以市值的形式损失了数十亿美元。在此期间,关于使用公开数据应用自动化方法检测财务报表欺诈的文献有所增加。本文对自动财务报表欺诈检测的文献进行了调查,并确定了当前文献中的空白。本文强调了财务报表欺诈检测决策支持系统实施过程中的一些重要考虑因素,包括1)欺诈的定义,2)用于检测欺诈的特征,3)案例研究的区域、数据集大小和不平衡,4)用于检测的算法,5)特征选择/特征工程方法,6)缺失数据的处理,以及7)所使用的性能度量。目前的研究讨论了如何在南非背景下处理这些和其他执行因素。
{"title":"A Survey of Automated Financial Statement Fraud Detection with Relevance to the South African Context","authors":"W. Mongwe, K. Malan","doi":"10.18489/sacj.v32i1.777","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.777","url":null,"abstract":"Financial statement fraud has been on the increase in the past two decades and includes prominent scandals such as Enron, WorldCom and more recently in South Africa, Steinhoff. These scandals have led to billions of dollars being lost in the form of market capitalisation from different stock exchanges across the world. During this time, there has been an increase in the literature on applying automated methods to detecting financial statement fraud using publicly available data. This paper provides a survey of the literature on automated financial statement fraud detection and identifies current gaps in the literature. The paper highlights a number of important considerations in the implementation of financial statement fraud detection decision support systems, including 1) the definition of fraud, 2) features used for detecting fraud, 3) region of the case study, dataset size and imbalance, 4) algorithms used for detection, 5) approach to feature selection / feature engineering, 6) treatment of missing data, and 7) performance measure used. The current study discusses how these and other implementation factors could be approached within the South African context.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49488146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa 南非东开普省实习教师对网络欺凌的看法
Q3 Social Sciences Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.737
L. Cilliers, W. Chinyamurindi
Cyber bullying has become a topical issue in South Africa. However, there is very little guidance and training for teachers on how to deal with cyber bullying in the classroom. This study investigated the perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa. The backdrop of this study is a context where there is a proliferation of technologies in much of South African society. Within this, there are calls to not only investigate the positive side of technology but also aspects where technology may have a “dark” side. The study made use of a quantitative survey approach to collect data from 150 student teachers at a university in the Eastern Cape Province of South Africa. The student teachers were representative of all three the school phases used in South Africa. The results indicated that almost half of the student teachers had been victims of cyber bullying. Overall, cyber bullying was considered a serious issue for the student teachers but awareness of the prevalence of the issue decreased outside the classroom. The topic has not been incorporated into policy or the school curriculum in South Africa. The recommendation of the study is that the Department of Basic Education in South Africa must provide a standardised policy and curriculum that schools can use to implement and enforce cyber safety behaviour in the schools.
网络欺凌已经成为南非的一个热门话题。然而,在如何处理课堂上的网络欺凌方面,对教师的指导和培训很少。本研究调查了南非东开普省实习教师对网络欺凌的看法。这项研究的背景是在南非社会的许多地方都有技术扩散的背景。在这种情况下,有人呼吁不仅要调查技术的积极方面,还要调查技术可能有“黑暗”一面的方面。这项研究采用了定量调查的方法,从南非东开普省一所大学的150名实习教师那里收集数据。这些实习教师代表了南非所有三个阶段的学校。调查结果显示,近一半的实习教师曾是网络欺凌的受害者。总体而言,学生教师认为网络欺凌是一个严重的问题,但在课堂外,对这一问题的普遍认识却有所下降。在南非,这一主题尚未纳入政策或学校课程。这项研究的建议是,南非基础教育部(Department of Basic Education)必须提供一套标准化的政策和课程,学校可以用它来实施和加强学校的网络安全行为。
{"title":"Perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa","authors":"L. Cilliers, W. Chinyamurindi","doi":"10.18489/sacj.v32i1.737","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.737","url":null,"abstract":"Cyber bullying has become a topical issue in South Africa. However, there is very little guidance and training for teachers on how to deal with cyber bullying in the classroom. This study investigated the perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa. The backdrop of this study is a context where there is a proliferation of technologies in much of South African society. Within this, there are calls to not only investigate the positive side of technology but also aspects where technology may have a “dark” side. The study made use of a quantitative survey approach to collect data from 150 student teachers at a university in the Eastern Cape Province of South Africa. The student teachers were representative of all three the school phases used in South Africa. The results indicated that almost half of the student teachers had been victims of cyber bullying. Overall, cyber bullying was considered a serious issue for the student teachers but awareness of the prevalence of the issue decreased outside the classroom. The topic has not been incorporated into policy or the school curriculum in South Africa. The recommendation of the study is that the Department of Basic Education in South Africa must provide a standardised policy and curriculum that schools can use to implement and enforce cyber safety behaviour in the schools.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44017764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Obituary: KenMcGregor 作者:KenMcGregor
Q3 Social Sciences Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.863
S. Berman
{"title":"Obituary: KenMcGregor","authors":"S. Berman","doi":"10.18489/sacj.v32i1.863","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.863","url":null,"abstract":"","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48675133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Coping with Covid 社论:应对新冠肺炎
Q3 Social Sciences Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.858
P. Machanick
I am pleased to report that SACJ has been able to publish on schedule in July 2020 despite the Covid-19 (SARS-CoV-2) pandemic. South Africa, like many other countries, has been severely impacted by prevention measures. South African academics have had to try to work out how to do remote delivery of courses with inadequate resources. At my own university, there has been a major upsurge in students supported by the National Student Financial Aid Scheme (NSFAS). These students are from poor families, many with no prior exposure to higher education, and from all over the country as well as further afield. As one of the country’s smallest universities, we have also become one of the most diverse. I hope we do not lose significant numbers of students to the additional academic stresses. In this editorial I look at how academia can respond to a crisis like this. I also outline an upcoming special issue and some transitions including a sad event arising from the pandemic, a warning to all of us.
我很高兴地报告,尽管新冠肺炎(SARS-CoV-2)大流行,SACJ仍能如期于2020年7月出版。与许多其他国家一样,南非也受到预防措施的严重影响。南非学者不得不试图找出如何在资源不足的情况下远程授课的方法。在我自己的大学里,得到国家学生资助计划(NSFAS)支持的学生人数激增。这些学生来自贫困家庭,许多人以前没有受过高等教育,来自全国各地和更远的地方。作为美国最小的大学之一,我们也成为了最多元化的大学之一。我希望我们不要因为额外的学业压力而失去大量的学生。在这篇社论中,我将探讨学术界如何应对这样的危机。我还概述了即将出版的一期特刊和一些过渡,包括疫情引发的一个悲伤事件,这是对我们所有人的警告。
{"title":"Editorial: Coping with Covid","authors":"P. Machanick","doi":"10.18489/sacj.v32i1.858","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.858","url":null,"abstract":"I am pleased to report that SACJ has been able to publish on schedule in July 2020 despite the Covid-19 (SARS-CoV-2) pandemic. South Africa, like many other countries, has been severely impacted by prevention measures. South African academics have had to try to work out how to do remote delivery of courses with inadequate resources. At my own university, there has been a major upsurge in students supported by the National Student Financial Aid Scheme (NSFAS). These students are from poor families, many with no prior exposure to higher education, and from all over the country as well as further afield. As one of the country’s smallest universities, we have also become one of the most diverse. I hope we do not lose significant numbers of students to the additional academic stresses. In this editorial I look at how academia can respond to a crisis like this. I also outline an upcoming special issue and some transitions including a sad event arising from the pandemic, a warning to all of us.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42662113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An OpenCL-based parallel acceleration of aSobel edge detection algorithm Using IntelFPGA technology 基于OpenCL的基于IntelFPGA技术的Sobel边缘检测并行加速算法
Q3 Social Sciences Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.749
Abedalmuhdi Almomany, A. Al-Omari, Amin Jarrah, M. Tawalbeh, A. Alqudah
This paper examines the feasibility of using commercial out-of-the-box reconfigurable field programmable gate array (FPGA) technology and the open computing language (OpenCL) framework to create an efficient Sobel edge-detection implementation, which is considered a fundamental aspect of image and video processing. This implementation enhances speedup and energy consumption attributes when compared to general single-core processors. We created the proposed approach at a high level of abstraction and executed it on a high commodity Intel FPGA platform (an Intel De5-net device was used). This approach was designed in a manner that allows the high-level compiler/synthesis tool to manipulate a task-parallelism model. The most promising FPGA and conventional implementations were compared to their single-core CPU software equivalents. For these comparisons, local-memory, pipelining, loop unrolling, vectorization, internal channel mechanisms, and memory coalescing were manipulated to provide a much more effective hardware design. The run-time and power consumption attributes were estimated for each implementation, resulting in up to 37-fold improvement of the execution/transfer time and up to a 53-fold improvement in energy consumption when compared to a specific single-core CPU-based implementation.
本文研究了使用商用开箱即用可重构现场可编程门阵列(FPGA)技术和开放计算语言(OpenCL)框架创建高效Sobel边缘检测实现的可行性,这被认为是图像和视频处理的一个基本方面。与普通单核处理器相比,这种实现增强了加速和能耗属性。我们在高抽象级别上创建了所提出的方法,并在高商品的Intel FPGA平台上执行(使用了Intel De5网络设备)。这种方法的设计方式允许高级编译器/合成工具操作任务并行性模型。将最有前途的FPGA和传统实现与它们的单核CPU软件等价物进行了比较。为了进行这些比较,对本地内存、流水线、循环展开、矢量化、内部通道机制和内存合并进行了操作,以提供更有效的硬件设计。对每个实现的运行时间和功耗属性进行了估计,与基于特定单核CPU的实现相比,执行/传输时间提高了37倍,能耗提高了53倍。
{"title":"An OpenCL-based parallel acceleration of aSobel edge detection algorithm Using IntelFPGA technology","authors":"Abedalmuhdi Almomany, A. Al-Omari, Amin Jarrah, M. Tawalbeh, A. Alqudah","doi":"10.18489/sacj.v32i1.749","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.749","url":null,"abstract":"This paper examines the feasibility of using commercial out-of-the-box reconfigurable field programmable gate array (FPGA) technology and the open computing language (OpenCL) framework to create an efficient Sobel edge-detection implementation, which is considered a fundamental aspect of image and video processing. This implementation enhances speedup and energy consumption attributes when compared to general single-core processors. We created the proposed approach at a high level of abstraction and executed it on a high commodity Intel FPGA platform (an Intel De5-net device was used). This approach was designed in a manner that allows the high-level compiler/synthesis tool to manipulate a task-parallelism model. The most promising FPGA and conventional implementations were compared to their single-core CPU software equivalents. For these comparisons, local-memory, pipelining, loop unrolling, vectorization, internal channel mechanisms, and memory coalescing were manipulated to provide a much more effective hardware design. The run-time and power consumption attributes were estimated for each implementation, resulting in up to 37-fold improvement of the execution/transfer time and up to a 53-fold improvement in energy consumption when compared to a specific single-core CPU-based implementation.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48173454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa 保护个人信息:在南非进行的一项涉及数据价值链和将个人信息用于营销目的的实验
Q3 Social Sciences Pub Date : 2020-03-31 DOI: 10.18489/sacj.v32i1.712
Benson Zenda, R. Vorster, Adéle da Veiga
South Africa enacted the Protection of Personal Information Act 4 of 2013 (POPI) in an effort to curb the misuse of customers’ personal information by organisations. The aim of this research was to establish whether the South African insurance industry is adhering to certain prescripts of POPI, focusing on direct marketing requirements. An experiment was utilised to monitor the flow of personal information submitted to 20 insurance companies requesting short-term insurance quotations, using new e-mail addresses and phone numbers. The results of the experiment indicate that 92% of the marketing communication received did not have prior consent from the researcher. Contact was made by companies outside the sample, indicating third-party sharing. 86% of the unsolicited short message service (SMS) communication received required customers to pay for unsubscribing from SMSs, which is not in line with regulatory requirements. The non-compliance evident in this experiment acts as an early warning to the insurance industry and South Africa, prompting a more concerted effort towards preparation of compliance with POPI. A personal information processing management framework is proposed to aid the insurance industry in understanding how personal information can be processed in line with the requirements of the Act.
南非颁布了2013年第4号《个人信息保护法》(POPI),以遏制组织滥用客户个人信息的行为。本研究的目的是确定南非保险业是否遵守POPI的某些规定,重点关注直销要求。利用一项实验,使用新的电子邮件地址和电话号码,监测提交给20家要求短期保险报价的保险公司的个人信息流。实验结果表明,92%的营销沟通没有得到研究人员的事先同意。样本之外的公司进行了联系,表明存在第三方共享。收到的未经请求的短信服务(SMS)通信中,86%要求客户为取消订阅短信付费,这不符合监管要求。这一实验中明显存在的不遵守情况对保险业和南非来说是一个早期预警,促使各方更加协调一致地为遵守持久性有机污染物指数做准备。提出了一个个人信息处理管理框架,以帮助保险业了解如何根据该法案的要求处理个人信息。
{"title":"Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa","authors":"Benson Zenda, R. Vorster, Adéle da Veiga","doi":"10.18489/sacj.v32i1.712","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.712","url":null,"abstract":"South Africa enacted the Protection of Personal Information Act 4 of 2013 (POPI) in an effort to curb the misuse of customers’ personal information by organisations. The aim of this research was to establish whether the South African insurance industry is adhering to certain prescripts of POPI, focusing on direct marketing requirements. An experiment was utilised to monitor the flow of personal information submitted to 20 insurance companies requesting short-term insurance quotations, using new e-mail addresses and phone numbers. The results of the experiment indicate that 92% of the marketing communication received did not have prior consent from the researcher. Contact was made by companies outside the sample, indicating third-party sharing. 86% of the unsolicited short message service (SMS) communication received required customers to pay for unsubscribing from SMSs, which is not in line with regulatory requirements. The non-compliance evident in this experiment acts as an early warning to the insurance industry and South Africa, prompting a more concerted effort towards preparation of compliance with POPI. A personal information processing management framework is proposed to aid the insurance industry in understanding how personal information can be processed in line with the requirements of the Act.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41644241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Editorial: ICT in Education 社论:教育中的信息通信技术
Q3 Social Sciences Pub Date : 2017-10-13 DOI: 10.18489/sacj.v29i2.547
R. Dlamini, E. Coleman
{"title":"Editorial: ICT in Education","authors":"R. Dlamini, E. Coleman","doi":"10.18489/sacj.v29i2.547","DOIUrl":"https://doi.org/10.18489/sacj.v29i2.547","url":null,"abstract":"","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Upper bounds on the performance of discretisation in reinforcement learning : research article 强化学习中离散化性能的上界:研究文章
Q3 Social Sciences Pub Date : 2015-12-10 DOI: 10.18489/SACJ.V0I57.284
Michael Mitchley
Reinforcement learning is a machine learning framework whereby an agent learns to perform a task by maximising its total reward received for selecting actions in each state. The policy mapping states to actions that the agent learns is either represented explicitly, or implicitly through a value function. It is common in reinforcement learning to discretise a continuous state space using tile coding or binary features. We prove an upper bound on the performance of discretisation for direct policy representation or value function approximation.
强化学习是一种机器学习框架,智能体通过最大化在每个状态下选择行动所获得的总奖励来学习执行任务。将策略映射状态映射到代理学习的动作,通过值函数显式地或隐式地表示。在强化学习中,使用tile编码或二进制特征来离散连续状态空间是很常见的。我们证明了直接策略表示或值函数近似的离散化性能的上界。
{"title":"Upper bounds on the performance of discretisation in reinforcement learning : research article","authors":"Michael Mitchley","doi":"10.18489/SACJ.V0I57.284","DOIUrl":"https://doi.org/10.18489/SACJ.V0I57.284","url":null,"abstract":"Reinforcement learning is a machine learning framework whereby an agent learns to perform a task by maximising its total reward received for selecting actions in each state. The policy mapping states to actions that the agent learns is either represented explicitly, or implicitly through a value function. It is common in reinforcement learning to discretise a continuous state space using tile coding or binary features. We prove an upper bound on the performance of discretisation for direct policy representation or value function approximation.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"57 1","pages":"24-31"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Learning System Usage in Higher Education – A Study at Two South African Institutions 虚拟学习系统在高等教育中的应用——两所南非机构的研究
Q3 Social Sciences Pub Date : 2015-12-10 DOI: 10.18489/SACJ.V0I57.324
I. Padayachee, A. V. D. Merwe, P. Kotzé
In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education institutions. A case study research strategy was adopted, combining qualitative and quantitative approaches to data collection and analysis. Survey findings revealed four clusters of VLS feature usage, namely, communication, management, content and pedagogic. Analysis showed that the ‘content cluster’ was used more than the other clusters. The average usage of the ‘pedagogic cluster’ for Durban University of Technology (DUT) was significantly greater than that of University of KwaZulu-Natal (UKZN), which tentatively indicates that staff development seems to be an important aspect of VLS usage. There was no significant difference in the usage of the ‘communication’ and ‘management’ clusters between the two institutions, DUT and UKZN. The study contributes to the body of system utilisation research by confirming an uneven pattern of VLS feature usage among educators, whilst providing fresh insights into the challenges associated with the usage of two different VLSs in two different universities.
在高等教育机构中,各种VLSs已被正式采用,以支持在线教学。然而,关于教育工作者使用VLS的模式的研究很少。本研究的目的是对两所南非高等教育机构的VLS功能使用情况和相关挑战进行描述性分析。采用个案研究策略,结合定性和定量方法收集和分析数据。调查结果显示,VLS的功能使用分为四类,即沟通、管理、内容和教学。分析表明,“内容集群”比其他集群使用得更多。德班科技大学(DUT)“教学集群”的平均使用率显著高于夸祖鲁-纳塔尔大学(UKZN),这初步表明,员工发展似乎是VLS使用的一个重要方面。DUT和UKZN这两个机构在“沟通”和“管理”集群的使用上没有显著差异。该研究通过确认教育工作者使用VLS功能的不平衡模式,为系统利用研究的主体做出了贡献,同时为两所不同大学使用两种不同的VLS所带来的挑战提供了新的见解。
{"title":"Virtual Learning System Usage in Higher Education – A Study at Two South African Institutions","authors":"I. Padayachee, A. V. D. Merwe, P. Kotzé","doi":"10.18489/SACJ.V0I57.324","DOIUrl":"https://doi.org/10.18489/SACJ.V0I57.324","url":null,"abstract":"In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education institutions. A case study research strategy was adopted, combining qualitative and quantitative approaches to data collection and analysis. Survey findings revealed four clusters of VLS feature usage, namely, communication, management, content and pedagogic. Analysis showed that the ‘content cluster’ was used more than the other clusters. The average usage of the ‘pedagogic cluster’ for Durban University of Technology (DUT) was significantly greater than that of University of KwaZulu-Natal (UKZN), which tentatively indicates that staff development seems to be an important aspect of VLS usage. There was no significant difference in the usage of the ‘communication’ and ‘management’ clusters between the two institutions, DUT and UKZN. The study contributes to the body of system utilisation research by confirming an uneven pattern of VLS feature usage among educators, whilst providing fresh insights into the challenges associated with the usage of two different VLSs in two different universities.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"44 1","pages":"32-57"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
South African Computer Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1