首页 信息管理毕业论文参考文献

信息管理毕业论文参考文献

举报
开通vip

信息管理毕业论文参考文献信息管理毕业论文参考文献   是对期刊论文引文进行统计和分析的重要信息源之一,下面是搜集整理的信息管理参考文献,供大家阅读参考。   参考文献一:   [1]辛金国,关健清.基于数据挖掘民营上市公司绩效评价研究探索.中国管理科学,2012,11(20):114-119.   [2]HayuthY.Portperformancecomparisonapplyingdataenvelopmentanalysis(DEA)[J].MaritimePolicyandManagement,1993,20(2):161-163...

信息管理毕业论文参考文献
信息管理毕业论文参考文献   是对期刊论文引文进行统计和分析的重要信息源之一,下面是搜集整理的信息管理参考文献,供大家阅读参考。   参考文献一:   [1]辛金国,关健清.基于数据挖掘民营上市公司绩效评价研究探索.中国管理科学,2012,11(20):114-119.   [2]HayuthY.Portperformancecomparisonapplyingdataenvelopmentanalysis(DEA)[J].MaritimePolicyandManagement,1993,20(2):161-163.   [3]王庆元.基于RS-BP神经网络的煤炭企业绩效评价研究[D].那鄭:河北工程大学,2012.   [4]程琳.企业缋效评价指标体系研究[D].天津:天津商业大学,2008.   [5]RSKaplan,DPNorton.PuttingtheBalancedScorecardtoWork[J],HarvardBusiness.1993.   [6]TongzonJL.EfficiencymeasurementofselectedAustralianandotherinternationalportsusingdataenvelopmentanalysis[J].TransportResearchA,2001,35(2):113-128.   [7]ArieSachish.ProductivityfunctionsasamanagerialtoolinIsraeliports[J].MaritimepolicyandManagement,1996,23(4):341-369.   [8]TalleyWK.Optimumthroughputandperformanceevaluationofmarineterminals[J].MaritimePolicyandManagement,1988,15(4):327-331.   [9]KBichou,RGray.AlogisticsandSupplychainmanagementapproachtoPortPerformancemeasurement[J].MaritimePolicyandManagement,2004,31(1):47-67.   [10]G1-TAEYEO.AnapplicationofthehierarchicalfozzyProcesstocontainerPortecompetition;Policyandstrategicimplications[J].Transportation,2006,33(1):409-422.   [11]陈之涛.基于VBM的企业业缋评价体系研究[D].厦门:厦门大学.   [12]王炎娇.沈阳都瑞轮毂有限公司绩效管理体系设计[D].哈尔滨:尔滨工业大学,2006.   [13]财政部统计评价司.企业效绩评级问答[M].北京:经济科学出版社,2001.   [14]胡文献.基于上市公司的杜邦财务分析理论研究[D].泉州:华侨大学,2004.   [15]张萌萌.EVA业绩评价在我国家电行业的应用研究——以海信电器为例[D].北京:财政部财政科学研宄所,2013.   [16]牛丽文,张进.企业绩效评价指标体系研究.商场现代化,2005(29):12-15.   [17]王化成,刘俊勇.企业业绩评价模式研究-兼论中国企业业绩评价模式选择.管理世界,2004(4).[18]陆庆平.企业绩效评价新论[D].大连:东北财经大学,2006.   [19]吕永波等.我国主要集装箱运输港口的竞争力评价研究[J].北京:北方交通大学学报,2002,26(5):102-105.   [20]唐波.基于供应链管理的物流企业风险预警指标体系研究[D].北京:北京物资学院,2010.   参考文献二:   [1]吉阿兵,朱道立.基于绩效率DEA模型的港口绩效评价[J].系统工程,2005,4(23):119-122.   [2]张俊基.我国港口企业绩效评价研究[D].南京:河海大学,2006.   [3]杨建刚.人工神经网络实用教程[M].杭州:浙江大学出版社,2001.   [4]张立明等.人工神经网络的模型及其应用[M].上海:复旦大学出版社.1994.   [5]MwasiagiJI,HuangXB,WangXH.Performanceofneuralnetworkalgorithmsduringthepredictionofyambreakingelongation[J].FibersandPolymers,2008,9(1):80-86   [6]王瑞.基于BP神经网络的港口货运运营风险控制研究[D].北京:北京交通大学,2013.13-15.   [7]RafiqMY’QBugmann.Easterbrook:Neuralnetworkdesignforengineeringapplications[J].ComputersandStructures,2001:1541-1552.   [8]TJyalakshmi,ASanthakumaran.Statisticalnormalizationandbackpropagationforclassification[J].InternationalJournalofCompute,2011,1(3):89-90.   [9]MwasiagiJI,HuangXB,WangXH.Performanceofneuralnetworkalgorithmsduringthepredictionofyarnbreakingelongation[J].FibersandPolymers,2008:80-86   [10]JMJMurre.Transferoflearninginbackpropagationandinrelatedneuralnetworkmodels[J].ConfluenceTheNextGenerationInformation,2014,23(12):60-64.   [11]Gang Cao, Yao Zhao, Rongrong Ni, Lifang Yu, Huawei Tian. Forensic Detection of MediaFiltering in Digital Images[C]. // International Conference on Mulimedia & Expo, Singapore,2010:89-94.   [12]Kakar Pravin, Natarajan Sudha, Ser Wee. Exposing Digital Image Forgeries by DetectingDiscrepancies in Motion Blur[J]. IEEE Transaction on Multimedia, 13(3):443-452.   [13]Kakar Pravin, Natarajan Sudha, Ser Wee. Detecting Digital Image Forgeries ThroughInconsistent Motion Blur[C]. //International Conference on Mulimedia & Expo, Singapore,2010:486-491.   [14]AlinC. Popescu, Hany Farid. Exposing Digital Forgeries by Detecting Traces of Re-sampling[J]. IEEE Transaction on Signal Processing. 2005, 53(2):758-767.   [15]Gang Cao, Yao Zhao, Rongrong Ni. Forensic identification of resampling operatiors: a seminon-intrusive approach[J]. Forensic Science International, 2012, (216): 13.   [16]Gloe T, Kirchner M, Winkler A. Can We Trust Digital Image Forensics?[C]. // Proceedings ofInternational Conference on Multimedia, New York, ACM. 2007:78-86.   [17]Kirchner M, Boehme R. Hiding Traces of Resampling in Digital Images[J]. IEEE Transactionson Information Forensics and Security, 2008,3(4):582-592.   [18]S. Avidan , A. Shamir. Seam carving for content-aware image resizing [J]. ACM Trans. Graph,2007,26(3):10.   [19]A. Sarkar, L. Nataraj, B. S. Manjunath. Detection of seam carving and localization of seam insertions in digital images [C]. //Proc, of the 11th ACM workshop on MM&SEC,2009, 107-116.   [20]Dun-Yu Hsiao, Soo-Chang Pei. Detecting Digital Tampering by Blur Estimation[C]. //In 1stInternational Workshop on Systematic Approaches to Digital ForensicEngineering, 2005:264-278.   参考文献三:   [1] 王俊文,刘光杰,戴跃伟,张湛,王执链.基下非抽样Contourlet变换的图像模糊取证[J].计算机研究与发展,2009,46 (9) :1549-1555.   [2] Li-Xian Wei, Junjie Zhu, Xiaoyuan Yang. An Image Forensics Algorithm for Blur DetectionBased on Properties of Sharp Edge Points卩].Advanced MaterialsResearch, 2012, 34(2):743-747.   [3] Pedro Comesana. Detection and information theoretic measures for quantifying thedistinguishability between multimedia operator chains [C]. // IEEE International Workshop onInformation Forensics and Security, 2012. 211-216.   [4] Pedro Comesana, Fernando Perez-Gonzalez. Multimedia operator chain topology andordering estimation based on detection and information theoretic tools [C]. // Digital Forensicsand Watermaking, 2012. IWDW 2012. 11th International Workshop on Digital Forensics andWatermaking, 2012. 213-227.   [5] Z Chen, Y Zhao,R Ni,Detecting the operation chain in digital images by type and order fingerprint[C]. // International Conference on Signal Processing(ICSP), HangZhou, China, October 19-23,2014, 1837-1842.   [6] Matthew C. Stamm, Xiaoyu Chu, K. J. Ray Liu. Forensically Determining the Order of S ignalProcessing Operations[C]. // IEEE International Workshop on Information Forensics andSecurity, 2013. WIFS 2013. Proceedings of the 2013 IEEE Signal Processing SocietyConference on. IEEE, 2013:162-167.   [7] M . C. Stamm, K . J . R . Liu. Forensic detection o f image manipulation using statisticalintrinsic fingerprints[J]. IEEE Transactions on information Forensics and Security, 2010, 5(3):492 -506.   [8] M. Kirchner. Fast and reliable resampling detection by spectral analysis of fixed linear predictorresidue[C]. // ACM workshop on Multimedia and Security, Oxford, United Kingdom,2008:11-20.   [9] M. Kirchner, J. Fridrich, On detection o f median filtering in digital images[C]. // ElectronicImaging: Security, Steganography, and Watermarking of Multimedia Contents, 2010.Proceedings of SPIE. Media Forensics and Security II,2010:1-12.   [10] Jianwei Li, Yao Zhao, Rongrong Ni, Detection for processing history of seam insertion and contrast enhancement[C]. // Proc. of SPIE Vol, 9273, 2014.   [11] Hany Farid. Creating and detecting doctored and virtual images: Implications to the childpornography prevention act[J]. Department of Computer Science, DartmouthCollege, TR2004-518, 2004, 13.   [12]周琳娜.数字图像盲取证技术研究[D].北京:北京邮电人学,2007.   [13] 刘苗,郑江滨.利小波域同态滤波的伪造图像检测方法[J].计算机I:程与应州,2009,45(34) :169-179.   [14] Yagiz Sutcu, Baris Coskun, Husrev T.Senear. Tamper Detection Based on Regularity ofWavelet Transform Coefficient[C]. // IEEE International Conference on Image Processing, SanAntonio, TX, 2007:397-400.   [15] 干波,孙璐璐,孔样维,尤新刚.图像伪造中模糊操作的异常色调率取证技术m.电+分报.2006,34(12):2451-2454.   [16] Hany Farid . Blind Inverse Gamma Correction[J]. IEEE Transaction on Image Processing, 2001,10(10):1428-1433.   [17] Gang Cao, Yao Zhao, Rongrong Ni. Attacking Contrast Enhancement Forensics in DigitalImages[J]. Science China Information Sciences, 2014,57(5): 1-13.   [18] Gang Cao,Yao Zhao, Rongrong Ni, Alex C.Knot. Efficient contrast enhancement forensicswith application to image foi^ery detection[J]. IEEE Transaction on Information Forensics andSecurity, 2013.   [19] Gang Cao, Yao Zhao, Rongrong Ni. Forensic Estimation of Gamma Correction in DigitalImages [C]. // International Conference on Image Processing, Hong Kong, 2010:2297-2300.   [20]王幕,张娜,潘城.数字图像中值滤波检测[J].广东科技,2013,12:214-218.
本文档为【信息管理毕业论文参考文献】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
该文档来自用户分享,如有侵权行为请发邮件ishare@vip.sina.com联系网站客服,我们会及时删除。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。
本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。
网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
下载需要: 免费 已有0 人下载
最新资料
资料动态
专题动态
is_833902
暂无简介~
格式:doc
大小:9KB
软件:Word
页数:5
分类:工学
上传时间:2017-03-15
浏览量:31