有没有大神向ieice是什么协会 transactions on electronics投过稿

小木虫 --- 500万硕博科研人员喜爱的学术科研平台
&&查看话题
IEICE TRANSACTIONS ON COMMUNICATIONS投稿求助
最近投了一篇文章到IEICE TRANSACTIONS ON COMMUNICATIONS,8月3日,两个人的审稿意见就回到编辑那边了,论文状态就变成“The 1st Review Reports have been completed”,到现在论文一直都处于这个状态.请问有没有人遇到这种情况?这种情况有没有戏啊?
这个杂志只有两个审稿人,两个人的意见都已经回来了
哦哦,这应该显示的是第一个审稿人意见回来了吧,如果两个审稿人意见都返回了,那应该快了
这个意思是第一轮审稿意见已经完成,不是第一个审稿人意见返回
哦哦,那接下来应该是编辑汇总外审人员的意见
有可能编辑还邀请了其他审稿人,意见没有返回,所以状态一直不变。当然,也有可能是忘了更新状态。
研究生必备与500万研究生在线互动!
扫描下载送金币
浏览器进程
打开微信扫一扫
随时随地聊科研小木虫 --- 500万硕博科研人员喜爱的学术科研平台
&&查看话题
关于IEICE期刊投稿问题?
我导师有一个IEICE会员帐号,该帐号只能查看IEICE旗下一个期刊(
IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences:A)文章的全文。我用该帐号投稿时是不是只能投IEICE Transactions on Fundamentals这个期刊?其他IEICE旗下的期刊诸如:
IEICE Electronics Express,IEICE Transactions on Communications,IEICE Transactions on Electronics,IEICE Transactions on Information and Systems和Nonlinear Theory and Its Applications, IEICE,我能不能投稿呢?那些期刊能投那些不能投?望知道的虫子指点一下,谢谢!
请教若被accept&&一定要缴交paper charge吗?
是否有选项可以选择不印出?
您好,请问您是IEICE会员吗?我想投文章,但不是IEICE会员,现在自己申请太慢了。QQ:
您好,请问您是IEICE会员吗?我想投文章,但不是IEICE会员,现在自己申请太慢了。QQ:
您好,请问您是IEICE会员吗?我想投文章,但不是IEICE会员,现在自己申请太慢了。QQ:
您好,请问您是IEICE会员吗?我想投文章,但不是IEICE会员,现在自己申请太慢了。QQ:
大概需要多久给出一审结果?
研究生必备与500万研究生在线互动!
扫描下载送金币
浏览器进程
打开微信扫一扫
随时随地聊科研小木虫 --- 500万硕博科研人员喜爱的学术科研平台
&&查看话题
IEICE Transactions 期刊被拒绝还能重投吗?
大家好,7月份我投了 IEICE Transactions on information and system. 今天收到了意见,有两个评审,都 Reject 了我的论文,最后被编辑 Reject 了。
邮件中的一些内容如下,我摘下来了。
请大家帮忙看看,这种情况我还可以改改重新再投吗?
结果邮件中有如下这段,应该是最终的总结:
============review form ============
English Evaluation
Paper No :& &xxx
Paper Title : xxx
Evaluation: C
A. Excellent
C. Below average, recommended to be proofed by native English speaker before submitting final version
D. Poor, recommended to be completely rewritten
具体的一些意见如下:
============================================
We regret to inform you that your above-referenced manuscript
has been rejected for publication in the IEICE Transactions.
Having carefully reviewed and evaluated your manuscript, we have
come to the conclusion that your approach is not sufficient to
warrant its publication this time.
For your reference, their comments and the relevant and marked
pages in the manuscript, if any, are attached below.
Thank you for considering the IEICE Transactions to present
the results of your research. We hope that this decision will
not discourage you from submitting other manuscripts to us
in the future.
In the reviewing process, two reviewers have reviewed the paper.
As a result, both Reviewer A and Reviewer B recommended 'Rejection’.
From the ratings and the comments of the reviewers, the editor finally decided to reject the paper.
Please see the detailed comments of the reviewers, and
we hope that the comments of the reviewers will be help in your future work.
结果邮件中有如下这段,应该是最终的总结:
============review form ============
English Evaluation
Paper No :& &xxx
Paper Title : xxx
Evaluation: C
A. Excellent
C. Below average, recommended to be proofed by native English speaker before submitting final version
D. Poor, recommended to be completely rewritten
邮件还说了下 re-submit:
If you are re-submitting a manuscript revised from this rejected one in IEICE Transactions, you are kindly encouraged to attach an &Authors' Reply& to the revised manuscript in order to expedite the review process.
Please note that even re-submission should be done from the following
URL https://review.ieice.org/regist/regist_baseinfo_e.aspx like an initial submission and send the required documents to IEICE again.
吧,不超页数的话
研究生必备与500万研究生在线互动!
扫描下载送金币
浏览器进程
打开微信扫一扫
随时随地聊科研IEICE SEARCH SYSTEM
Latest Issue
Editorial Board
Open Access Papers
Copyright (c) by IEICE
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer SciencesLatest Issue
Online ISSN&:&
Volume E99-A&No.12&&(Publication Date:)
[Whole issue]:PDF
Special Section on Information Theory and Its Applications
pp.&&FOREWORDFOREWORD&&
&|&Full Text:PDF
pp.&&PAPER-Shannon TheoryAsymptotic Behavior of Error Probability in Continuous-Time Gaussian Channels with Feedback&&
&|&Full Text:PDF
pp.&&PAPER-Source Coding and Data CompressionNew Non-Asymptotic Bounds on Numbers of Codewords for the Fixed-Length Lossy Compression&&&&
&|&Full Text:PDF
pp.&&PAPER-Source Coding and Data CompressionLossless Data Compression via Substring Enumeration for k-th Order Markov Sources with a Finite Alphabet&&&&
&|&Full Text:PDF
pp.&&PAPER-Information Theoretic SecurityError and Secrecy Exponents for Wiretap Channels under Two-Fold Cost Constraints&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Coding Theory and TechniquesBitwise MAP Estimation for Group Testing Based on Holographic Transformation&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Coding Theory and TechniquesPerformance Analysis Based on Density Evolution
on Fault Erasure Belief Propagation Decoder&&&&
&|&Full Text:PDF
pp.&&PAPER-Coding Theory and TechniquesEfficient Search for High-Rate Punctured Convolutional Codes Using Dual Codes&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Coding Theory and TechniquesLinear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channel&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Coding Theory and TechniquesAlgebraic Decoding of BCH Codes over Symbol-Pair Read Channels: Cases of Two-Pair and Three-Pair Error Correction&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Communication Theory and SystemsAsymptotic Optimality of QPSK Faster-than-Nyquist Signaling in Massive MIMO Systems&&
&|&Full Text:PDF
pp.&&PAPER-Communication Theory and SystemsApplying Write-Once Memory Codes to Binary Symmetric Asymmetric Multiple Access Channels&&&&
&|&Full Text:PDF
pp.&&PAPER-Networks and Network CodingOn the Computational Complexity of the Linear Solvability of Information Flow Problems with Hierarchy Constraint&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Networks and Network CodingProbabilistic Analysis of the Network Reliability Problem on Random Graph Ensembles&&&&
&|&Full Text:PDF
pp.&&PAPER-SequencesA Multi-Value Sequence Generated by Power Residue Symbol and Trace Function over Odd Characteristic Field&&&&&&&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Fundamentals of Information TheoryOn the Topological Entropy of the Discretized Markov &-Transformations&&
&|&Full Text:PDF
pp.&&PAPER-Signal Processing for StorageMulti-Track Joint Decoding Schemes Using Two-Dimensional Run-Length Limited Codes for Bit-Patterned Media Magnetic Recording&&
&|&Full Text:PDF
pp.&&PAPER-Video CodingPerformance Improvement of Error-Resilient 3D DWT Video Transmission Using Invertible Codes&&&&&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Machine LearningAn Improved Feature Selection Algorithm for Ordinal Classification&&&&
&|&Full Text:PDF
pp.&&LETTER-Shannon TheorySecond-Order Achievable Rate Region of Slepian-Wolf Coding Problem in terms of Smooth Max-Entropy for General Sources&&&&
&|&Full Text:PDF
pp.&&LETTER-Source Coding and Data CompressionAverage Coding Rate of a Multi-Shot Tunstall Code with an Arbitrary Parsing Tree Sequence&&
&|&Full Text:PDF
pp.&&LETTER-Source Coding and Data CompressionThreshold of Overflow Probability Using Smooth Max-Entropy in Lossless Fixed-to-Variable Length Source Coding for General Sources&&&&
&|&Full Text:PDF
pp.&&LETTER-Source Coding and Data CompressionDirect- or Fast-Access Decoding Schemes for VF Codes&&&&
&|&Full Text:PDF
pp.&&LETTER-Information Theoretic SecuritySecure Outage Analysis of Buffer-Aided Cognitive Relay Networks with Multiple Primary Users&&&&&&
&|&Full Text:PDF
&&Special Section on VLSI Design and CAD Algorithms
pp.&&FOREWORDFOREWORD&&
&|&Full Text:PDF
pp.&&PAPERA Test Pattern Compaction Method Using SAT-Based Fault Grouping&&
&|&Full Text:PDF
pp.&&PAPERLogic-Path-and-Clock-Path-Aware At-Speed Scan Test Generation&&&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERPower-Supply-Noise-Aware Timing Analysis and Test Pattern Regeneration&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERRange Limiter Using Connection Bounding Box for SA-Based Placement of Mixed-Grained Reconfigurable Architecture&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERHardware-Trojans Rank: Quantitative Evaluation of Security Threats at Gate-Level Netlists by Pattern Matching&&&&&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERA Highly-Adaptable and Small-Sized In-Field Power Analyzer for Low-Power IoT Devices&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERA Fast Mask Manufacturability and Process Variation Aware OPC Algorithm with Exploiting a Novel Intensity Estimation Model&&&&&&
&|&Full Text:PDF
pp.&&PAPERA Low-Power VLSI Architecture for HEVC De-Quantization and Inverse Transform&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERNon-Uniform Clock Mesh Synthesis with Clock Gating and Register Clustering&&&&&&
&|&Full Text:PDF
pp.&&PAPERA Bit-Write-Reducing and Error-Correcting Code Generation Method by Clustering ECC Codewords for Non-Volatile Memories&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERA Fast MER Enumeration Algorithm for Online Task Placement on Reconfigurable FPGAs&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERA New Algorithm for Reducing Components of a Gaussian Mixture Model&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERSynthesis and Automatic Layout of Resistive Digital-to-Analog Converter Based on Mixed-Signal Slice Cell&&&&&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERMontgomery Multiplier Design for ECDSA Signature Generation Processor&&&&
&|&Full Text:PDF
pp.&&PAPERLow Complexity Reed-Solomon Decoder Design with Pipelined Recursive Euclidean Algorithm&&
&|&Full Text:PDF
pp.&&PAPERAnalytical Stability Modeling for CMOS Latches in Low Voltage Operation&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERA Design of Op-Amp Free SAR-VCO Hybrid ADC with 2nd-Order Noise Shaping in 65nm CMOS Technology&&&&&&&&
&|&Full Text:PDF
pp.&&PAPERA 60mV-3V Wide-Input-Voltage-Range Boost Converter with Amplitude-Regulated Oscillator for Energy Harvesting&&&&&&
&|&Full Text:PDF
pp.&&PAPERA Highly Efficient Switched-Capacitor Voltage Boost Converter with Nano-Watt MPPT Controller for Low-Voltage Energy Harvesting&&&&&&&&&&&&
&|&Full Text:PDF
pp.&&LETTERSLM: A Scalable Logic Module Architecture with Less Configuration Memory&&&&&&&&
&|&Full Text:PDF
pp.&&LETTERHardware-Efficient Local Extrema Detection for Scale-Space Extrema Detection in SIFT Algorithm&&&&
&|&Full Text:PDF
&&Regular Section
pp.&&PAPER-Nonlinear ProblemsGlobal Hyperbolic Hopfield Neural Networks&&
&|&Full Text:PDF
pp.&&PAPER-Cryptography and Information SecurityOnline/Offline Self-Updating Encryption&&&&&&
&|&Full Text:PDF
pp.&&PAPER-Cryptography and Information SecurityComparison of Two Signature Schemes Based on the MQ Problem and Quartz&&&&
&|&Full Text:PDF
pp.&&PAPER-ImageSurface Reconstruction of Renal Corpuscle from Microscope Renal Biopsy Image Sequence&&&&
&|&Full Text:PDF
pp.&&PAPER-VisionMultiple Object Segmentation in Videos Using Max-Flow Decomposition&&&&
&|&Full Text:PDF
pp.&&PAPER-Neural Networks and BioengineeringA Deep Neural Network Based Quasi-Linear Kernel for Support Vector Machines&&&&&&&&
&|&Full Text:PDF
pp.&&LETTER-Digital Signal ProcessingTime Delay Estimation via Co-Prime Aliased Sparse FFT&&&&&&&&
&|&Full Text:PDF
pp.&&LETTER-Digital Signal ProcessingSignal Power Estimation Based on Orthogonal Projection and Oblique Projection&&&&
&|&Full Text:PDF
pp.&&LETTER-Digital Signal ProcessingBeamforming Optimization via Max-Min SINR in MU-MISO SWIPT Systems under Bounded Channel Uncertainty&&&&&&&&
&|&Full Text:PDF
pp.&&LETTER-Systems and ControlUp-Stream Dispatching of Power by Density of Power Packet&&&&&&
&|&Full Text:PDF
pp.&&LETTER-Cryptography and Information SecurityImprovement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks&&&&&&&&
&|&Full Text:PDF
pp.&&LETTER-Communication Theory and SignalsAn Algorithm for Fast Implementation of AN-Aided Transmit Design in Secure MIMO System with SWIPT&&&&&&&&
&|&Full Text:PDF
pp.&&LETTER-Communication Theory and SignalsReliability-Security Tradeoff for Secure Transmission with Untrusted Relays&&&&&&&&&&
&|&Full Text:PDF
pp.&&LETTER-Communication Theory and SignalsSum Outage Capacity Maximization in Cognitive Radio Networks with Channel Distribution Information&&&&
&|&Full Text:PDF
pp.&&LETTER-Spread Spectrum Technologies and ApplicationsPerfect Gaussian Integer Sequences of Degree-4 Using Difference Sets&&&&&&&&
&|&Full Text:PDF}

我要回帖

更多关于 ieice 小木虫 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信