首页 > 最新文献

South African Computer Journal最新文献

英文 中文
Applying long short-term memory recurrent neural networks to intrusion detection 长短期记忆递归神经网络在入侵检测中的应用
Q3 Social Sciences Pub Date : 2015-07-11 DOI: 10.18489/SACJ.V56I1.248
R. C. Staudemeyer
We claim that modelling network trac as a time series with a supervised learning approach, using known genuine and malicious behaviour, improves intrusion detection. To substantiate this, we trained long short-term memory (LSTM) recurrent neural networks with the training data provided by the DARPA / KDD Cup ’99 challenge. To identify suitable LSTM-RNN network parameters and structure we experimented with various network topologies. We found networks with four memory blocks containing two cells each oer a good compromise between computational cost and detection performance. We applied forget gates and shortcut connections respectively. A learning rate of 0.1 and up to 1,000 epochs showed good results. We tested the performance on all features and on extracted minimal feature sets respectively. We evaluated dierent feature sets for the detection of all attacks within one network and also to train networks specialised on individual attack classes. Our results show that the LSTM classier provides superior performance in comparison to results previously published results of strong static classiers. With 93.82% accuracy and 22.13 cost, LSTM outperforms the winning entries of the KDD Cup ’99 challenge by far. This is due to the fact that LSTM learns to look back in time and correlate consecutive connection records. For the rst time ever, we have demonstrated the usefulness of LSTM networks to intrusion detection.
我们声称,使用已知的真实和恶意行为,将网络轨迹建模为具有监督学习方法的时间序列,可以改进入侵检测。为了证实这一点,我们使用DARPA / KDD杯挑战赛提供的训练数据训练了长短期记忆(LSTM)递归神经网络。为了确定合适的LSTM-RNN网络参数和结构,我们对各种网络拓扑进行了实验。我们发现具有四个存储块的网络,每个存储块包含两个单元,在计算成本和检测性能之间取得了很好的折衷。我们分别应用了遗忘门和快捷连接。学习率为0.1,最多可达1000次,效果很好。我们分别在所有特征和提取的最小特征集上测试了性能。我们评估了不同的特征集,以检测一个网络中的所有攻击,并训练专门针对单个攻击类别的网络。我们的结果表明,与之前发布的强静态分类器的结果相比,LSTM分类器提供了更好的性能。到目前为止,LSTM的准确率为93.82%,成本为22.13%,远远超过了1999年KDD杯挑战赛的获奖作品。这是由于LSTM学会了回顾时间并关联连续的连接记录。我们第一次证明了LSTM网络对入侵检测的有用性。
{"title":"Applying long short-term memory recurrent neural networks to intrusion detection","authors":"R. C. Staudemeyer","doi":"10.18489/SACJ.V56I1.248","DOIUrl":"https://doi.org/10.18489/SACJ.V56I1.248","url":null,"abstract":"We claim that modelling network trac as a time series with a supervised learning approach, using known genuine and malicious behaviour, improves intrusion detection. To substantiate this, we trained long short-term memory (LSTM) recurrent neural networks with the training data provided by the DARPA / KDD Cup ’99 challenge. To identify suitable LSTM-RNN network parameters and structure we experimented with various network topologies. We found networks with four memory blocks containing two cells each oer a good compromise between computational cost and detection performance. We applied forget gates and shortcut connections respectively. A learning rate of 0.1 and up to 1,000 epochs showed good results. We tested the performance on all features and on extracted minimal feature sets respectively. We evaluated dierent feature sets for the detection of all attacks within one network and also to train networks specialised on individual attack classes. Our results show that the LSTM classier provides superior performance in comparison to results previously published results of strong static classiers. With 93.82% accuracy and 22.13 cost, LSTM outperforms the winning entries of the KDD Cup ’99 challenge by far. This is due to the fact that LSTM learns to look back in time and correlate consecutive connection records. For the rst time ever, we have demonstrated the usefulness of LSTM networks to intrusion detection.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"56 1","pages":"136-154"},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67992653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 152
Block RAM-based architecture for real-time reconfiguration using Xilinx® FPGAs 基于块ram的架构,使用Xilinx®fpga进行实时重构
Q3 Social Sciences Pub Date : 2015-07-11 DOI: 10.18489/SACJ.V56I1.252
Rikus le Roux, G. V. Schoor, P. V. Vuuren
Despite the advantages dynamic reconfiguration adds to a system, it only improves system performance if the execution time exceeds the configuration time. As a result, dynamic reconfiguration is only capable of improving the performance of quasi-static applications. In order to improve the performance of dynamic applications, researchers focus on improving the reconfiguration throughput. These approaches are mostly limited by the bus commonly used to connect the configuration controller to the memory, which contributes to the configuration time. A method proposed to ameliorate this overhead is an architecture utilizing localised block RAM (BRAM) connected to the configuration controller to store the configuration bitstream. The aim of this paper is to illustrate the advantages of the proposed architecture, especially for reconfiguring real-time applications. This is done by validating the throughput of the architecture and comparing this to the maximum theoretical throughput of the internal configuration access port (ICAP). It was found that the proposed architecture is capable of reconfiguring an application within a time-frame suitable for real-time reconfiguration. The drawback of this method is that the BRAM is extremely limited and only a discrete set of configurations can be stored. This paper also proposes a method on how this can be mitigated without affecting the throughput.
尽管动态重新配置为系统增加了优势,但只有在执行时间超过配置时间时才会提高系统性能。因此,动态重新配置只能提高准静态应用程序的性能。为了提高动态应用程序的性能,研究人员致力于提高重构吞吐量。这些方法大多受到通常用于将配置控制器连接到内存的总线的限制,这会增加配置时间。为了改善这种开销,提出了一种利用局部块RAM (BRAM)连接到配置控制器来存储配置比特流的架构。本文的目的是说明所提出的体系结构的优点,特别是在重新配置实时应用程序方面。这是通过验证体系结构的吞吐量并将其与内部配置访问端口(ICAP)的最大理论吞吐量进行比较来完成的。结果表明,所提出的体系结构能够在适合实时重构的时间框架内重构应用程序。这种方法的缺点是BRAM非常有限,只能存储一组离散的配置。本文还提出了一种在不影响吞吐量的情况下减轻这种情况的方法。
{"title":"Block RAM-based architecture for real-time reconfiguration using Xilinx® FPGAs","authors":"Rikus le Roux, G. V. Schoor, P. V. Vuuren","doi":"10.18489/SACJ.V56I1.252","DOIUrl":"https://doi.org/10.18489/SACJ.V56I1.252","url":null,"abstract":"Despite the advantages dynamic reconfiguration adds to a system, it only improves system performance if the execution time exceeds the configuration time. As a result, dynamic reconfiguration is only capable of improving the performance of quasi-static applications. In order to improve the performance of dynamic applications, researchers focus on improving the reconfiguration throughput. These approaches are mostly limited by the bus commonly used to connect the configuration controller to the memory, which contributes to the configuration time. A method proposed to ameliorate this overhead is an architecture utilizing localised block RAM (BRAM) connected to the configuration controller to store the configuration bitstream. The aim of this paper is to illustrate the advantages of the proposed architecture, especially for reconfiguring real-time applications. This is done by validating the throughput of the architecture and comparing this to the maximum theoretical throughput of the internal configuration access port (ICAP). It was found that the proposed architecture is capable of reconfiguring an application within a time-frame suitable for real-time reconfiguration. The drawback of this method is that the BRAM is extremely limited and only a discrete set of configurations can be stored. This paper also proposes a method on how this can be mitigated without affecting the throughput.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"56 1","pages":"22-32"},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67992965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A social representations analysis of design science research 设计科学研究的社会表征分析
Q3 Social Sciences Pub Date : 2015-07-11 DOI: 10.18489/SACJ.V56I1.274
R. Naidoo, A. V. D. Merwe, A. Gerber, A. Hevner
Design science research (DSR) is a relatively unfamiliar research paradigm within the computing field in South Africa. In light of recent interest in this paradigm, this study sought to explore DSR perspectives among local computing researchers. Key theoretical concepts from social representations theory (SRT) such as anchoring and objectification were used to explore how researchers construct their understanding of DSR. A visual approach was used to administer drawing and association tasks to two focus groups; each focus group comprised around 25 participants ranging from doctoral students to experienced researchers. The focus group discussions invoked interesting complementary and distinctive associations about the process and content of DSR – anchored in dominant and conventional research practices. The results also illustrated several ways in which DSR is objectified by the researchers in drawings and metaphorical constructions. We conclude that SRT is useful for exploring beliefs about novel and relatively unfamiliar research practices. This study contributes to an enhanced understanding of how computing researchers go about making sense and assigning meaning to changing research practices. The findings are developed into recommendations for introducing changes to research practices. These recommendations can be used to direct efforts to more appropriately accommodate changing research practices within the computing community to broaden knowledge generation.
设计科学研究(DSR)在南非计算领域是一个相对陌生的研究范式。鉴于最近对这种范式的兴趣,本研究试图探索本地计算研究人员的DSR观点。本研究利用社会表征理论中的锚定和客观化等关键理论概念来探讨研究者如何构建他们对社会表征理论的理解。使用视觉方法对两个焦点小组进行绘图和联想任务;每个焦点小组由大约25名参与者组成,从博士生到经验丰富的研究人员。焦点小组讨论引起了关于DSR过程和内容的有趣的互补和独特的联系-锚定在主流和传统的研究实践中。结果还说明了研究人员在绘图和隐喻结构中对象化DSR的几种方式。我们的结论是,SRT对于探索对新颖和相对陌生的研究实践的信念是有用的。这项研究有助于增强对计算机研究人员如何为不断变化的研究实践创造意义和分配意义的理解。这些发现被发展成对研究实践进行改革的建议。这些建议可以用来指导工作,以更适当地适应计算机社区内不断变化的研究实践,以扩大知识的产生。
{"title":"A social representations analysis of design science research","authors":"R. Naidoo, A. V. D. Merwe, A. Gerber, A. Hevner","doi":"10.18489/SACJ.V56I1.274","DOIUrl":"https://doi.org/10.18489/SACJ.V56I1.274","url":null,"abstract":"Design science research (DSR) is a relatively unfamiliar research paradigm within the computing field in South Africa. In light of recent interest in this paradigm, this study sought to explore DSR perspectives among local computing researchers. Key theoretical concepts from social representations theory (SRT) such as anchoring and objectification were used to explore how researchers construct their understanding of DSR. A visual approach was used to administer drawing and association tasks to two focus groups; each focus group comprised around 25 participants ranging from doctoral students to experienced researchers. The focus group discussions invoked interesting complementary and distinctive associations about the process and content of DSR – anchored in dominant and conventional research practices. The results also illustrated several ways in which DSR is objectified by the researchers in drawings and metaphorical constructions. We conclude that SRT is useful for exploring beliefs about novel and relatively unfamiliar research practices. This study contributes to an enhanced understanding of how computing researchers go about making sense and assigning meaning to changing research practices. The findings are developed into recommendations for introducing changes to research practices. These recommendations can be used to direct efforts to more appropriately accommodate changing research practices within the computing community to broaden knowledge generation.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"56 1","pages":"33-49"},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67993978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Burning money with firewalls 用防火墙烧钱
Q3 Social Sciences Pub Date : 2015-07-11 DOI: 10.18489/SACJ.V56I1.322
R. C. Staudemeyer, James Connan
Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but are not aware of.
保护计算基础设施是一项昂贵但必要的任务。运行自己的计算基础设施的公司需要时刻保持警惕,以防范网络上的入侵者以及试图拦截其通信的团体或个人。公司转向防火墙和入侵检测系统供应商来帮助他们保护他们的信息和基础设施。这些公司把他们的信心寄托在昂贵的设备上,这些设备试图区分友好和恶意的流量。尽管这些系统昂贵且复杂,但恶意用户似乎找到了避免检测的方法,大规模违规的新闻几乎每天都在发生。我们建议从根本上改变看待信息安全的方式。我们强调了当前系统中的一些根本缺陷,并揭露了许多专家知道但没有意识到的风险。
{"title":"Burning money with firewalls","authors":"R. C. Staudemeyer, James Connan","doi":"10.18489/SACJ.V56I1.322","DOIUrl":"https://doi.org/10.18489/SACJ.V56I1.322","url":null,"abstract":"Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but are not aware of.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"56 1","pages":"165-167"},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67993870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Strong Growth 社论:强劲增长
Q3 Social Sciences Pub Date : 2015-07-11 DOI: 10.18489/sacj.v56i1.336
P. Machanick
{"title":"Editorial: Strong Growth","authors":"P. Machanick","doi":"10.18489/sacj.v56i1.336","DOIUrl":"https://doi.org/10.18489/sacj.v56i1.336","url":null,"abstract":"","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67993935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The factors that influence customer e-services adoption 影响客户采用电子服务的因素
Q3 Social Sciences Pub Date : 2015-07-11 DOI: 10.18489/SACJ.V56I1.209
K. Persad, Keshnee Padayachee
The aim of this paper is to provide an overview of the investigation into customer e-service adoption. The investigation includes a qualitative survey and observation of participants using e-services. E-services are used to attract customers and persuade them to transact online and the customer’s perception of an e-service contributes greatly to e-service adoption or rejection. This paper describes the factors that influence customer perception towards e-services. Relationships between the identified factors were also considered in order to build a conceptual framework. Grounded theory was used for its flexibility, repetitive comparisons of data, and emergence of concepts and theories.
本文的目的是对客户采用电子服务的调查提供一个概述。调查包括对使用电子服务的参与者进行定性调查和观察。电子服务被用来吸引顾客并说服他们在网上交易,顾客对电子服务的看法对电子服务的采用或拒绝有很大的影响。本文描述了影响顾客对电子服务感知的因素。为了建立一个概念框架,还考虑了已确定因素之间的关系。扎根理论因其灵活性、数据的重复比较以及概念和理论的出现而被使用。
{"title":"The factors that influence customer e-services adoption","authors":"K. Persad, Keshnee Padayachee","doi":"10.18489/SACJ.V56I1.209","DOIUrl":"https://doi.org/10.18489/SACJ.V56I1.209","url":null,"abstract":"The aim of this paper is to provide an overview of the investigation into customer e-service adoption. The investigation includes a qualitative survey and observation of participants using e-services. E-services are used to attract customers and persuade them to transact online and the customer’s perception of an e-service contributes greatly to e-service adoption or rejection. This paper describes the factors that influence customer perception towards e-services. Relationships between the identified factors were also considered in order to build a conceptual framework. Grounded theory was used for its flexibility, repetitive comparisons of data, and emergence of concepts and theories.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"56 1","pages":"80-106"},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67992930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Identifying attributes of GPU programs for difficulty evaluation 识别GPU程序的属性以进行难度评估
Q3 Social Sciences Pub Date : 2014-08-29 DOI: 10.18489/sacj.v53i0.195
Dale Tristram, K. Bradshaw
General-purpose computation on graphics processing units (GPGPU) has great potential to accelerate many scientific models and algorithms. However, some problems are considerably more difficult to accelerate than others, and it may be challenging for those new to GPGPU to ascertain the difficulty of accelerating a particular problem. Through what was learned in the acceleration of three problems, problem attributes have been identified that can assist in the evaluation of the difficulty of accelerating a problem on a GPU. The identified attributes are a problem's available parallelism, inherent parallelism, synchronisation requirements, and data transfer requirements. We envisage that with further development, these attributes could form the foundation of a difficulty classification system that could be used to determine whether GPU acceleration is practical for a candidate GPU acceleration problem, aid in identifying appropriate techniques and optimisations, and outline the required GPGPU knowledge.
图形处理单元(GPGPU)上的通用计算在加速许多科学模型和算法方面具有巨大的潜力。然而,有些问题的加速要比其他问题困难得多,对于那些刚接触GPGPU的人来说,确定加速某个特定问题的难度可能是一项挑战。通过在三个问题的加速中所学到的知识,问题属性已经被确定,可以帮助评估在GPU上加速问题的难度。确定的属性是问题的可用并行性、固有并行性、同步需求和数据传输需求。我们设想,随着进一步的发展,这些属性可以形成一个难度分类系统的基础,该系统可用于确定GPU加速是否适用于候选GPU加速问题,帮助确定适当的技术和优化,并概述所需的GPGPU知识。
{"title":"Identifying attributes of GPU programs for difficulty evaluation","authors":"Dale Tristram, K. Bradshaw","doi":"10.18489/sacj.v53i0.195","DOIUrl":"https://doi.org/10.18489/sacj.v53i0.195","url":null,"abstract":"General-purpose computation on graphics processing units (GPGPU) has great potential to accelerate many scientific models and algorithms. However, some problems are considerably more difficult to accelerate than others, and it may be challenging for those new to GPGPU to ascertain the difficulty of accelerating a particular problem. Through what was learned in the acceleration of three problems, problem attributes have been identified that can assist in the evaluation of the difficulty of accelerating a problem on a GPU. The identified attributes are a problem's available parallelism, inherent parallelism, synchronisation requirements, and data transfer requirements. We envisage that with further development, these attributes could form the foundation of a difficulty classification system that could be used to determine whether GPU acceleration is practical for a candidate GPU acceleration problem, aid in identifying appropriate techniques and optimisations, and outline the required GPGPU knowledge.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67991773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Steady Growth 社论:稳定增长
Q3 Social Sciences Pub Date : 2014-06-29 DOI: 10.18489/SACJ.V52I0.262
P. Machanick
{"title":"Editorial: Steady Growth","authors":"P. Machanick","doi":"10.18489/SACJ.V52I0.262","DOIUrl":"https://doi.org/10.18489/SACJ.V52I0.262","url":null,"abstract":"","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67991691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ringing the changes: editorial 敲响变化的钟声:社论
Q3 Social Sciences Pub Date : 2013-07-01 DOI: 10.18489/sacj.v50i1.180
P. Machanick
We have mostly cleared the backlog in reviewing since I took over editorship in June 2012. The paper longest under review published in this issue was submitted on 27 September 2012. The paper that had the shortest time to publication was submitted on 4 April 2013. We will continue to try to speed up publication. To do so, we need quality papers that need minimal changes after review, and I urge anyone wanting to help speed up the process to volunteer to review. The workload is not high, and the reward of helping your fellow academics to improve their work is worth it in itself - and my experience is that reviewing the work of others improves my own writing. The papers longest in the publication queue now are papers where the authors have been invited to make substantial changes after review, and have as yet not submitted a revision.
自2012年6月我接手编辑工作以来,我们已经基本清理了积压的审稿工作。本刊发表的审查时间最长的论文于2012年9月27日提交。发表时间最短的论文于2013年4月4日提交。我们将继续努力加快出版速度。要做到这一点,我们需要高质量的论文,这些论文在审查后只需要最小的修改,我敦促任何想要帮助加快这一过程的人自愿参与审查。工作量并不高,而且帮助你的同行学者改进他们的工作本身就是值得的——我的经验是,审查别人的工作可以提高我自己的写作水平。现在发表队列中最长的论文是那些作者被邀请在审稿后进行实质性修改,但尚未提交修订的论文。
{"title":"Ringing the changes: editorial","authors":"P. Machanick","doi":"10.18489/sacj.v50i1.180","DOIUrl":"https://doi.org/10.18489/sacj.v50i1.180","url":null,"abstract":"We have mostly cleared the backlog in reviewing since I took over editorship in June 2012. The paper longest under review published in this issue was submitted on 27 September 2012. The paper that had the shortest time to publication was submitted on 4 April 2013. We will continue to try to speed up publication. To do so, we need quality papers that need minimal changes after review, and I urge anyone wanting to help speed up the process to volunteer to review. The workload is not high, and the reward of helping your fellow academics to improve their work is worth it in itself - and my experience is that reviewing the work of others improves my own writing. The papers longest in the publication queue now are papers where the authors have been invited to make substantial changes after review, and have as yet not submitted a revision.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"50 1","pages":"v-vi"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67991879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: HISA Special Section 嘉宾评论:HISA特别组
Q3 Social Sciences Pub Date : 2013-07-01 DOI: 10.18489/sacj.v50i1.181
N. Mostert-Phipps, A. Maeder
{"title":"Guest Editorial: HISA Special Section","authors":"N. Mostert-Phipps, A. Maeder","doi":"10.18489/sacj.v50i1.181","DOIUrl":"https://doi.org/10.18489/sacj.v50i1.181","url":null,"abstract":"","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67991958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
South African Computer Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1