- 相關(guān)推薦
信息管理畢業(yè)論文參考文獻(xiàn)
參考文獻(xiàn)是對(duì)期刊論文引文進(jìn)行統(tǒng)計(jì)和分析的重要信息源之一,下面是小編搜集整理的信息管理畢業(yè)論文參考文獻(xiàn),供大家閱讀參考。
參考文獻(xiàn)一:
[1]辛金國(guó),關(guān)健清.基于數(shù)據(jù)挖掘民營(yíng)上市公司績(jī)效評(píng)價(jià)研究探索.中國(guó)管理科學(xué),2012,11(20):114-119.
[2]HayuthY.Portperformancecomparisonapplyingdataenvelopmentanalysis(DEA)[J].MaritimePolicyandManagement,1993,20(2):161-163.
[3]王慶元.基于RS-BP神經(jīng)網(wǎng)絡(luò)的煤炭企業(yè)績(jī)效評(píng)價(jià)研究[D].那鄭:河北工程大學(xué),2012.
[4]程琳.企業(yè)繢效評(píng)價(jià)指標(biāo)體系研究[D].天津:天津商業(yè)大學(xué),2008.
[5]RSKaplan,DPNorton.PuttingtheBalancedScorecardtoWork[J],HarvardBusiness.1993.
[6]TongzonJL.EfficiencymeasurementofselectedAustralianandotherinternationalportsusingdataenvelopmentanalysis[J].TransportResearchA,2001,35(2):113-128.
[7]ArieSachish.ProductivityfunctionsasamanagerialtoolinIsraeliports[J].MaritimepolicyandManagement,1996,23(4):341-369.
[8]TalleyWK.Optimumthroughputandperformanceevaluationofmarineterminals[J].MaritimePolicyandManagement,1988,15(4):327-331.
[9]KBichou,RGray.AlogisticsandSupplychainmanagementapproachtoPortPerformancemeasurement[J].MaritimePolicyandManagement,2004,31(1):47-67.
[10]G1-TAEYEO.AnapplicationofthehierarchicalfozzyProcesstocontainerPortecompetition;Policyandstrategicimplications[J].Transportation,2006,33(1):409-422.
[11]陳之濤.基于VBM的企業(yè)業(yè)繢評(píng)價(jià)體系研究[D].廈門:廈門大學(xué).
[12]王炎嬌.沈陽都瑞輪轂有限公司績(jī)效管理體系設(shè)計(jì)[D].哈爾濱:爾濱工業(yè)大學(xué),2006.
[13]財(cái)政部統(tǒng)計(jì)評(píng)價(jià)司.企業(yè)效績(jī)?cè)u(píng)級(jí)問答[M].北京:經(jīng)濟(jì)科學(xué)出版社,2001.
[14]胡文獻(xiàn).基于上市公司的杜邦財(cái)務(wù)分析理論研究[D].泉州:華僑大學(xué),2004.
[15]張萌萌.EVA業(yè)績(jī)?cè)u(píng)價(jià)在我國(guó)家電行業(yè)的應(yīng)用研究——以海信電器為例[D].北京:財(cái)政部財(cái)政科學(xué)研宄所,2013.
[16]牛麗文,張進(jìn).企業(yè)績(jī)效評(píng)價(jià)指標(biāo)體系研究.商場(chǎng)現(xiàn)代化,2005(29):12-15.
[17]王化成,劉俊勇.企業(yè)業(yè)績(jī)?cè)u(píng)價(jià)模式研究-兼論中國(guó)企業(yè)業(yè)績(jī)?cè)u(píng)價(jià)模式選擇.管理世界,2004(4).[18]陸慶平.企業(yè)績(jī)效評(píng)價(jià)新論[D].大連:東北財(cái)經(jīng)大學(xué),2006.
[19]呂永波等.我國(guó)主要集裝箱運(yùn)輸港口的競(jìng)爭(zhēng)力評(píng)價(jià)研究[J].北京:北方交通大學(xué)學(xué)報(bào),2002,26(5):102-105.
[20]唐波.基于供應(yīng)鏈管理的物流企業(yè)風(fēng)險(xiǎn)預(yù)警指標(biāo)體系研究[D].北京:北京物資學(xué)院,2010.
參考文獻(xiàn)二:
[1]吉阿兵,朱道立.基于績(jī)效率DEA模型的港口績(jī)效評(píng)價(jià)[J].系統(tǒng)工程,2005,4(23):119-122.
[2]張俊基.我國(guó)港口企業(yè)績(jī)效評(píng)價(jià)研究[D].南京:河海大學(xué),2006.
[3]楊建剛.人工神經(jīng)網(wǎng)絡(luò)實(shí)用教程[M].杭州:浙江大學(xué)出版社,2001.
[4]張立明等.人工神經(jīng)網(wǎng)絡(luò)的模型及其應(yīng)用[M].上海:復(fù)旦大學(xué)出版社.1994.
[5]MwasiagiJI,HuangXB,WangXH.Performanceofneuralnetworkalgorithmsduringthepredictionofyambreakingelongation[J].FibersandPolymers,2008,9(1):80-86
[6]王瑞.基于BP神經(jīng)網(wǎng)絡(luò)的港口貨運(yùn)運(yùn)營(yíng)風(fēng)險(xiǎn)控制研究[D].北京:北京交通大學(xué),2013.13-15.
[7]RafiqMY’QBugmann.Easterbrook:Neuralnetworkdesignforengineeringapplications[J].ComputersandStructures,2001:1541-1552.
[8]TJyalakshmi,ASanthakumaran.Statisticalnormalizationandbackpropagationforclassification[J].InternationalJournalofCompute,2011,1(3):89-90.
[9]MwasiagiJI,HuangXB,WangXH.Performanceofneuralnetworkalgorithmsduringthepredictionofyarnbreakingelongation[J].FibersandPolymers,2008:80-86
[10]JMJMurre.Transferoflearninginbackpropagationandinrelatedneuralnetworkmodels[J].ConfluenceTheNextGenerationInformation,2014,23(12):60-64.
[11]Gang Cao, Yao Zhao, Rongrong Ni, Lifang Yu, Huawei Tian. Forensic Detection of MediaFiltering in Digital Images[C]. // International Conference on Mulimedia & Expo, Singapore,2010:89-94.
[12]Kakar Pravin, Natarajan Sudha, Ser Wee. Exposing Digital Image Forgeries by DetectingDiscrepancies in Motion Blur[J]. IEEE Transaction on Multimedia, 13(3):443-452.
[13]Kakar Pravin, Natarajan Sudha, Ser Wee. Detecting Digital Image Forgeries ThroughInconsistent Motion Blur[C]. //International Conference on Mulimedia & Expo, Singapore,2010:486-491.
[14]AlinC. Popescu, Hany Farid. Exposing Digital Forgeries by Detecting Traces of Re-sampling[J]. IEEE Transaction on Signal Processing. 2005, 53(2):758-767.
[15]Gang Cao, Yao Zhao, Rongrong Ni. Forensic identification of resampling operatiors: a seminon-intrusive approach[J]. Forensic Science International, 2012, (216): 13.
[16]Gloe T, Kirchner M, Winkler A. Can We Trust Digital Image Forensics?[C]. // Proceedings ofInternational Conference on Multimedia, New York, ACM. 2007:78-86.
[17]Kirchner M, Boehme R. Hiding Traces of Resampling in Digital Images[J]. IEEE Transactionson Information Forensics and Security, 2008,3(4):582-592.
[18]S. Avidan , A. Shamir. Seam carving for content-aware image resizing [J]. ACM Trans. Graph,2007,26(3):10.
[19]A. Sarkar, L. Nataraj, B. S. Manjunath. Detection of seam carving and localization of seam insertions in digital images [C]. //Proc, of the 11th ACM workshop on MM&SEC,2009, 107-116.
[20]Dun-Yu Hsiao, Soo-Chang Pei. Detecting Digital Tampering by Blur Estimation[C]. //In 1stInternational Workshop on Systematic Approaches to Digital ForensicEngineering, 2005:264-278.
參考文獻(xiàn)三:
[1] 王俊文,劉光杰,戴躍偉,張湛,王執(zhí)鏈.基下非抽樣Contourlet變換的圖像模糊取證[J].計(jì)算機(jī)研究與發(fā)展,2009,46 (9) :1549-1555.
[2] Li-Xian Wei, Junjie Zhu, Xiaoyuan Yang. An Image Forensics Algorithm for Blur DetectionBased on Properties of Sharp Edge Points卩].Advanced MaterialsResearch, 2012, 34(2):743-747.
[3] Pedro Comesana. Detection and information theoretic measures for quantifying thedistinguishability between multimedia operator chains [C]. // IEEE International Workshop onInformation Forensics and Security, 2012. 211-216.
[4] Pedro Comesana, Fernando Perez-Gonzalez. Multimedia operator chain topology andordering estimation based on detection and information theoretic tools [C]. // Digital Forensicsand Watermaking, 2012. IWDW 2012. 11th International Workshop on Digital Forensics andWatermaking, 2012. 213-227.
[5] Z Chen, Y Zhao,R Ni,Detecting the operation chain in digital images by type and order fingerprint[C]. // International Conference on Signal Processing(ICSP), HangZhou, China, October 19-23,2014, 1837-1842.
[6] Matthew C. Stamm, Xiaoyu Chu, K. J. Ray Liu. Forensically Determining the Order of S ignalProcessing Operations[C]. // IEEE International Workshop on Information Forensics andSecurity, 2013. WIFS 2013. Proceedings of the 2013 IEEE Signal Processing SocietyConference on. IEEE, 2013:162-167.
[7] M . C. Stamm, K . J . R . Liu. Forensic detection o f image manipulation using statisticalintrinsic fingerprints[J]. IEEE Transactions on information Forensics and Security, 2010, 5(3):492 -506.
[8] M. Kirchner. Fast and reliable resampling detection by spectral analysis of fixed linear predictorresidue[C]. // ACM workshop on Multimedia and Security, Oxford, United Kingdom,2008:11-20.
[9] M. Kirchner, J. Fridrich, On detection o f median filtering in digital images[C]. // ElectronicImaging: Security, Steganography, and Watermarking of Multimedia Contents, 2010.Proceedings of SPIE. Media Forensics and Security II,2010:1-12.
[10] Jianwei Li, Yao Zhao, Rongrong Ni, Detection for processing history of seam insertion and contrast enhancement[C]. // Proc. of SPIE Vol, 9273, 2014.
[11] Hany Farid. Creating and detecting doctored and virtual images: Implications to the childpornography prevention act[J]. Department of Computer Science, DartmouthCollege, TR2004-518, 2004, 13.
[12]周琳娜.數(shù)字圖像盲取證技術(shù)研究[D].北京:北京郵電人學(xué),2007.
[13] 劉苗,鄭江濱.利小波域同態(tài)濾波的偽造圖像檢測(cè)方法[J].計(jì)算機(jī)I:程與應(yīng)州,2009,45(34) :169-179.
[14] Yagiz Sutcu, Baris Coskun, Husrev T.Senear. Tamper Detection Based on Regularity ofWavelet Transform Coefficient[C]. // IEEE International Conference on Image Processing, SanAntonio, TX, 2007:397-400.
[15] 干波,孫璐璐,孔樣維,尤新剛.圖像偽造中模糊操作的異常色調(diào)率取證技術(shù)m.電+分報(bào).2006,34(12):2451-2454.
[16] Hany Farid . Blind Inverse Gamma Correction[J]. IEEE Transaction on Image Processing, 2001,10(10):1428-1433.
[17] Gang Cao, Yao Zhao, Rongrong Ni. Attacking Contrast Enhancement Forensics in DigitalImages[J]. Science China Information Sciences, 2014,57(5): 1-13.
[18] Gang Cao,Yao Zhao, Rongrong Ni, Alex C.Knot. Efficient contrast enhancement forensicswith application to image foi^ery detection[J]. IEEE Transaction on Information Forensics andSecurity, 2013.
[19] Gang Cao, Yao Zhao, Rongrong Ni. Forensic Estimation of Gamma Correction in DigitalImages [C]. // International Conference on Image Processing, Hong Kong, 2010:2297-2300.
[20]王幕,張娜,潘城.數(shù)字圖像中值濾波檢測(cè)[J].廣東科技,2013,12:214-218.
【信息管理畢業(yè)論文參考文獻(xiàn)】相關(guān)文章:
畢業(yè)論文參考文獻(xiàn)范例06-15
化學(xué)專業(yè)畢業(yè)論文參考文獻(xiàn)04-25
環(huán)境工程畢業(yè)論文參考文獻(xiàn)04-23
大學(xué)生畢業(yè)論文參考文獻(xiàn)04-26
機(jī)械工程畢業(yè)論文參考文獻(xiàn)12-01
日語專業(yè)畢業(yè)論文參考文獻(xiàn)的格式02-23