<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • 信息管理畢業論文參考文獻

    時間:2024-09-22 14:50:08 參考文獻 我要投稿
    • 相關推薦

    信息管理畢業論文參考文獻

      參考文獻是對期刊論文引文進行統計和分析的重要信息源之一,下面是小編搜集整理的信息管理畢業論文參考文獻,供大家閱讀參考。

    信息管理畢業論文參考文獻

      參考文獻一:

      [1]辛金國,關健清.基于數據挖掘民營上市公司績效評價研究探索.中國管理科學,2012,11(20):114-119.

      [2]HayuthY.Portperformancecomparisonapplyingdataenvelopmentanalysis(DEA)[J].MaritimePolicyandManagement,1993,20(2):161-163.

      [3]王慶元.基于RS-BP神經網絡的煤炭企業績效評價研究[D].那鄭:河北工程大學,2012.

      [4]程琳.企業繢效評價指標體系研究[D].天津:天津商業大學,2008.

      [5]RSKaplan,DPNorton.PuttingtheBalancedScorecardtoWork[J],HarvardBusiness.1993.

      [6]TongzonJL.EfficiencymeasurementofselectedAustralianandotherinternationalportsusingdataenvelopmentanalysis[J].TransportResearchA,2001,35(2):113-128.

      [7]ArieSachish.ProductivityfunctionsasamanagerialtoolinIsraeliports[J].MaritimepolicyandManagement,1996,23(4):341-369.

      [8]TalleyWK.Optimumthroughputandperformanceevaluationofmarineterminals[J].MaritimePolicyandManagement,1988,15(4):327-331.

      [9]KBichou,RGray.AlogisticsandSupplychainmanagementapproachtoPortPerformancemeasurement[J].MaritimePolicyandManagement,2004,31(1):47-67.

      [10]G1-TAEYEO.AnapplicationofthehierarchicalfozzyProcesstocontainerPortecompetition;Policyandstrategicimplications[J].Transportation,2006,33(1):409-422.

      [11]陳之濤.基于VBM的企業業繢評價體系研究[D].廈門:廈門大學.

      [12]王炎嬌.沈陽都瑞輪轂有限公司績效管理體系設計[D].哈爾濱:爾濱工業大學,2006.

      [13]財政部統計評價司.企業效績評級問答[M].北京:經濟科學出版社,2001.

      [14]胡文獻.基于上市公司的杜邦財務分析理論研究[D].泉州:華僑大學,2004.

      [15]張萌萌.EVA業績評價在我國家電行業的應用研究——以海信電器為例[D].北京:財政部財政科學研宄所,2013.

      [16]牛麗文,張進.企業績效評價指標體系研究.商場現代化,2005(29):12-15.

      [17]王化成,劉俊勇.企業業績評價模式研究-兼論中國企業業績評價模式選擇.管理世界,2004(4).[18]陸慶平.企業績效評價新論[D].大連:東北財經大學,2006.

      [19]呂永波等.我國主要集裝箱運輸港口的競爭力評價研究[J].北京:北方交通大學學報,2002,26(5):102-105.

      [20]唐波.基于供應鏈管理的物流企業風險預警指標體系研究[D].北京:北京物資學院,2010.

      參考文獻二:

      [1]吉阿兵,朱道立.基于績效率DEA模型的港口績效評價[J].系統工程,2005,4(23):119-122.

      [2]張俊基.我國港口企業績效評價研究[D].南京:河海大學,2006.

      [3]楊建剛.人工神經網絡實用教程[M].杭州:浙江大學出版社,2001.

      [4]張立明等.人工神經網絡的模型及其應用[M].上海:復旦大學出版社.1994.

      [5]MwasiagiJI,HuangXB,WangXH.Performanceofneuralnetworkalgorithmsduringthepredictionofyambreakingelongation[J].FibersandPolymers,2008,9(1):80-86

      [6]王瑞.基于BP神經網絡的港口貨運運營風險控制研究[D].北京:北京交通大學,2013.13-15.

      [7]RafiqMY’QBugmann.Easterbrook:Neuralnetworkdesignforengineeringapplications[J].ComputersandStructures,2001:1541-1552.

      [8]TJyalakshmi,ASanthakumaran.Statisticalnormalizationandbackpropagationforclassification[J].InternationalJournalofCompute,2011,1(3):89-90.

      [9]MwasiagiJI,HuangXB,WangXH.Performanceofneuralnetworkalgorithmsduringthepredictionofyarnbreakingelongation[J].FibersandPolymers,2008:80-86

      [10]JMJMurre.Transferoflearninginbackpropagationandinrelatedneuralnetworkmodels[J].ConfluenceTheNextGenerationInformation,2014,23(12):60-64.

      [11]Gang Cao, Yao Zhao, Rongrong Ni, Lifang Yu, Huawei Tian. Forensic Detection of MediaFiltering in Digital Images[C]. // International Conference on Mulimedia & Expo, Singapore,2010:89-94.

      [12]Kakar Pravin, Natarajan Sudha, Ser Wee. Exposing Digital Image Forgeries by DetectingDiscrepancies in Motion Blur[J]. IEEE Transaction on Multimedia, 13(3):443-452.

      [13]Kakar Pravin, Natarajan Sudha, Ser Wee. Detecting Digital Image Forgeries ThroughInconsistent Motion Blur[C]. //International Conference on Mulimedia & Expo, Singapore,2010:486-491.

      [14]AlinC. Popescu, Hany Farid. Exposing Digital Forgeries by Detecting Traces of Re-sampling[J]. IEEE Transaction on Signal Processing. 2005, 53(2):758-767.

      [15]Gang Cao, Yao Zhao, Rongrong Ni. Forensic identification of resampling operatiors: a seminon-intrusive approach[J]. Forensic Science International, 2012, (216): 13.

      [16]Gloe T, Kirchner M, Winkler A. Can We Trust Digital Image Forensics?[C]. // Proceedings ofInternational Conference on Multimedia, New York, ACM. 2007:78-86.

      [17]Kirchner M, Boehme R. Hiding Traces of Resampling in Digital Images[J]. IEEE Transactionson Information Forensics and Security, 2008,3(4):582-592.

      [18]S. Avidan , A. Shamir. Seam carving for content-aware image resizing [J]. ACM Trans. Graph,2007,26(3):10.

      [19]A. Sarkar, L. Nataraj, B. S. Manjunath. Detection of seam carving and localization of seam insertions in digital images [C]. //Proc, of the 11th ACM workshop on MM&SEC,2009, 107-116.

      [20]Dun-Yu Hsiao, Soo-Chang Pei. Detecting Digital Tampering by Blur Estimation[C]. //In 1stInternational Workshop on Systematic Approaches to Digital ForensicEngineering, 2005:264-278.

      參考文獻三:

      [1] 王俊文,劉光杰,戴躍偉,張湛,王執鏈.基下非抽樣Contourlet變換的圖像模糊取證[J].計算機研究與發展,2009,46 (9) :1549-1555.

      [2] Li-Xian Wei, Junjie Zhu, Xiaoyuan Yang. An Image Forensics Algorithm for Blur DetectionBased on Properties of Sharp Edge Points卩].Advanced MaterialsResearch, 2012, 34(2):743-747.

      [3] Pedro Comesana. Detection and information theoretic measures for quantifying thedistinguishability between multimedia operator chains [C]. // IEEE International Workshop onInformation Forensics and Security, 2012. 211-216.

      [4] Pedro Comesana, Fernando Perez-Gonzalez. Multimedia operator chain topology andordering estimation based on detection and information theoretic tools [C]. // Digital Forensicsand Watermaking, 2012. IWDW 2012. 11th International Workshop on Digital Forensics andWatermaking, 2012. 213-227.

      [5] Z Chen, Y Zhao,R Ni,Detecting the operation chain in digital images by type and order fingerprint[C]. // International Conference on Signal Processing(ICSP), HangZhou, China, October 19-23,2014, 1837-1842.

      [6] Matthew C. Stamm, Xiaoyu Chu, K. J. Ray Liu. Forensically Determining the Order of S ignalProcessing Operations[C]. // IEEE International Workshop on Information Forensics andSecurity, 2013. WIFS 2013. Proceedings of the 2013 IEEE Signal Processing SocietyConference on. IEEE, 2013:162-167.

      [7] M . C. Stamm, K . J . R . Liu. Forensic detection o f image manipulation using statisticalintrinsic fingerprints[J]. IEEE Transactions on information Forensics and Security, 2010, 5(3):492 -506.

      [8] M. Kirchner. Fast and reliable resampling detection by spectral analysis of fixed linear predictorresidue[C]. // ACM workshop on Multimedia and Security, Oxford, United Kingdom,2008:11-20.

      [9] M. Kirchner, J. Fridrich, On detection o f median filtering in digital images[C]. // ElectronicImaging: Security, Steganography, and Watermarking of Multimedia Contents, 2010.Proceedings of SPIE. Media Forensics and Security II,2010:1-12.

      [10] Jianwei Li, Yao Zhao, Rongrong Ni, Detection for processing history of seam insertion and contrast enhancement[C]. // Proc. of SPIE Vol, 9273, 2014.

      [11] Hany Farid. Creating and detecting doctored and virtual images: Implications to the childpornography prevention act[J]. Department of Computer Science, DartmouthCollege, TR2004-518, 2004, 13.

      [12]周琳娜.數字圖像盲取證技術研究[D].北京:北京郵電人學,2007.

      [13] 劉苗,鄭江濱.利小波域同態濾波的偽造圖像檢測方法[J].計算機I:程與應州,2009,45(34) :169-179.

      [14] Yagiz Sutcu, Baris Coskun, Husrev T.Senear. Tamper Detection Based on Regularity ofWavelet Transform Coefficient[C]. // IEEE International Conference on Image Processing, SanAntonio, TX, 2007:397-400.

      [15] 干波,孫璐璐,孔樣維,尤新剛.圖像偽造中模糊操作的異常色調率取證技術m.電+分報.2006,34(12):2451-2454.

      [16] Hany Farid . Blind Inverse Gamma Correction[J]. IEEE Transaction on Image Processing, 2001,10(10):1428-1433.

      [17] Gang Cao, Yao Zhao, Rongrong Ni. Attacking Contrast Enhancement Forensics in DigitalImages[J]. Science China Information Sciences, 2014,57(5): 1-13.

      [18] Gang Cao,Yao Zhao, Rongrong Ni, Alex C.Knot. Efficient contrast enhancement forensicswith application to image foi^ery detection[J]. IEEE Transaction on Information Forensics andSecurity, 2013.

      [19] Gang Cao, Yao Zhao, Rongrong Ni. Forensic Estimation of Gamma Correction in DigitalImages [C]. // International Conference on Image Processing, Hong Kong, 2010:2297-2300.

      [20]王幕,張娜,潘城.數字圖像中值濾波檢測[J].廣東科技,2013,12:214-218.


    【信息管理畢業論文參考文獻】相關文章:

    信息管理系統參考文獻06-26

    信息管理畢業論文12-10

    什么是畢業論文參考文獻03-26

    畢業論文參考文獻的整理12-09

    法律畢業論文參考文獻11-19

    畢業論文的參考文獻精選范文05-16

    畢業論文的參考文獻作用03-28

    java畢業論文參考文獻05-11

    畢業論文參考文獻格式及范例05-30

    主站蜘蛛池模板: 91久久精品国产91性色也| 国产精品乱伦| 国产精品99久久不卡| 亚洲伊人久久精品影院| 日韩精品www| 精品久久久久久久无码| 欧美日韩国产精品| 中文字幕一区二区精品区 | 国产国产成人精品久久| 中文字幕精品无码久久久久久3D日动漫| 日韩精品免费视频| 国产成人精品高清在线观看93| 亚洲国产精品成人久久蜜臀| 国产精品污WWW一区二区三区| 精品国产欧美另类一区| 精品亚洲成a人片在线观看| 亚洲精品无码av天堂| 精品久久久久久无码中文字幕 | 精品综合久久久久久97超人| 久久久久久九九99精品| 亚洲AⅤ永久无码精品AA| 国产手机在线精品| 免费91麻豆精品国产自产在线观看| 精品调教CHINESEGAY| 无码精品一区二区三区在线| 亚洲国产精品自在拍在线播放| 精品欧美| 国产一区二区精品尤物| 欧美亚洲国产精品第一页| 人妻AV一区二区三区精品 | 人人妻人人澡人人爽人人精品97| 鲸鱼传媒绿头鱼实验室之炮机测评日韩精品一级毛| 性色精品视频网站在线观看| 久久精品国产亚洲网站| 国产一区二区三区久久精品| 99re这里只有精品6| 51午夜精品免费视频| 国产成人亚洲综合无码精品| 成人区精品一区二区不卡| 国产精品第12页| 国产cosplay精品视频|