通信工程硕士论文参考文献一
[1]刘孟庵,连立民.水声工程[M].浙江科学技术出版社,2002,10
[2]赵志文,赵迎春.声学测流技术与应用[J].计算机自动测量与控制,2000,8(4):32-34
[3]佘亮亮,谢悦波.ADCP基本原理及应用[EB/OL].北京:中国科技论文在线[2008-06-06]. 200806-135.
[4]霍树梅.声学多普勒测流技术进展评述[J].气象水文海洋仪器,1998,12.
[5]马淳燕.宽带相控多普勒测流研究[D].哈尔滨:哈尔滨工程大,2009,6-7.
[6]Michael R. Simpson. Discharge measurements using a broad-band acoustic dop-pler current profiler. Sacramento [R], California: United States Geological Survey,2001, Open-File Report, 6-7.
[7]Blair H. Brumley, Ramon G, et al. Performance of a Broad-Band Acoustic DopplerCurrent Profiler [J]. IEEE JOURANL OF OCEANIC ENGINEERING^1991,16(4):407-420.
[8]Len Zedel, Alex E. Hay, Ramon Cabrera, and Atle Lohnnann. Performance ofSingle-Beam Pulse-to-Pulse Coherent Doppler Profiler [J]. IEEE JOURNAL OFOCEANIC ENGINEERING^ 1996,21(3):290-297.
[9]D. S. ZRNIC. Spectral Moment Estimates from Correlated Pulse Pairs [N]. IEEETRANSACTION ON AEROSPACE AND ELECTRONIC SYSTEMS,1997,13(4):344-354.
[10]Brumley B H, Deines K L, et al. Broadband Acoustic Doppler Current Profiler [P].United States Patent: US005208785A, 1993,1-2.田日才.扩频通信[M].北京:清华大学出版社,2007,57-94.
[11]田淳,刘少华.声学多普勒测流原理及其应用[M].河南:黄河水利出版社,2003,43-48.
[12]Incoherent Multibeam Doppler Current Profiler Performance: Part I -EstimateVariance. IEEE JOURNAL OF OCEANIC ENGINEERING 1986,11(1):7-15.
[13]Incoherent Multibeam Doppler Current Profiler Performance: Part II -SpatialResponse. IEEE JOURNAL OF OCEANIC ENGINEERINQ 1986,11(1):7-15.
[14]J. A. Smith, R. Pinkel. Improvement of Doppler Estimation through Repeat-Sequence Coding [J], Scripts Institution of Oceanography, La Jolla, CA 093-0213.
[15]王秀波.宽带多普勒测流技术研究[D].哈尔滨:哈尔滨工程大学,2005,34-36.
[16]竺春,向大威.利用复相关法估计信号的平均频率[J].声学技术,2003,22(3):182-186.
[17]杨小牛,楼才义,徐建良.软件无线电原理与应用[M].北京:电子工业出版社,2001. 48-57.
[18]杨明磊,陈伯孝,张守宏.宽带信号中的中频正交采样[J].现代雷达,2007,29(3):47-51.
[19]居余马,等.线性代数(第二版)[M].北京:清华大学出版社,2002,199-210.
[20]USER GUIDE-PHINS PART 2: DEFINITIONS, CONVENTIONS and SPECIFI?CATIONS. 2005,7-21.
[21]邹洪,向大威,景永刚.多普勒计程仪的数据平滑算法[J].声学技术.2008,08
[22]田坦,刘国枝,孙大军.声呐技术[M].哈尔滨:哈尔滨工程大学出版社,2000,14-17.
[23]Texas Instruments. OMAP-L137 Low-Power Application Processor datasheet [Z].SPRS563C, 2009.12.
[24]Texas Instruments. TMS320 DSP/BIOS v5.42 User's Guide [Z]. SPRU423I,2012.08.
[25]Texas Instruments. TMS320C6000 DSP/BIOS 5.x Application ProgrammingInterface (API) Reference Guide. SPRU403S. 2012.08.
[26]Texas Instruments. DSP/BIOS LINK User Guide vl .6.2008.10.
[27]Texas Instruments. DSP/BIOS LINK Programmer's Guide vl.6.2008.10.
[28]刘德涛.声学多普勒流速测量关键技术研究[D].哈尔滨:哈尔滨工程大学.2010,26-32, 70-72.
[29]戎建刚.带通信号的数字正交采样定理及优化设计[J].电子与信息学报.2001.11.
[30]David H. Titterton and John L. Weston. Strapdown Inertial Navigation Technology-2nd Edition. The Institution of Electrical Engineers, 2004
[31]Donoho D L. De-noising by soft-thresholding. IEEE Transactions on InformationTheory, 1995,41(3): 613-627
[32]ADS8556 data sheet. Texas Instruments, 2009.8
[33]OMAP-L137 Low-Power Applications Processor data sheet. Texas Instruments,2009.12
[34]TLV5638 data sheet. Texas Instruments, 2004.1
[35]MS320C674x/OMAP-Llx Processor Multichannel Audio Serial Port (McASP)User's Guide. Texas Instruments, 2009.8
[36]TMS320C674x/OMAP-L 1 x Processor Enhanced High-Resolution Pulse-WidthModulator (eHRPWM) User's Guide. Texas Instruments, 2009.11
[37]喻斌,陈军波,李青侠.数字AGC的分析和设计.桂林电子工业学院学报,2003,23(5):35
[38]Winder A A. Underwater Sound-A Review: II Sonar systems technology. IEEE Transon Sonics and Ultxasonic's, vol 22,NO.5,1975.9
[39]DSP/BIOS? LINK LNK 058 USR User's Guide. Texas Instruments, 2009.3
[40]DSP/BIOS? Link Platform Guide OMAPL 1 xx. Texas Instruments, 2009.3
通信工程硕士论文参考文献二
[1] 李浩光. IPv6 的安全机制-IPSec 协议的分析与研究[J]. 计算机安全, 2014(3):60-63.
[2] 马迪, 毛伟, 田野. 面向可信互联网的 IP 地址管理技术研究[J]. 计算机应用研究, 2012, 29(3):801-806.
[3] 耿行. IPSec 协议分析[J]. 电子科技, 2014, 27(28): 142-143.
[4] 荣霓. 高速边缘路由器 IPSec 体系结构及关键技术的研究[D]. 湖南: 国防科技大学,2005.3-4.
[5] 肖波. 基于 IPSec 协议的安全联盟设计及其应用[D]. 重庆: 重庆大学, 2013.2-3.
[6] 王妍. 基于 IPSec 的 VPN 系统设计与实现[D]. 成都: 电子科技大学,2013.2-3.
[7] 王小龙. 模块化分布式路由器数据平面研究与实现[D].北京: 北京邮电大学, 2010.4-5.
[8] 徐明伟, 江学智, 陈文龙. 路由器分布式控制研究综述[J]. 电子学报, 2010(8): 1892-1898.
[9] 贺东. 路由器分布式控制技术研究[J]. 科技创新导报, 2012(18): 26-26.
[10] 杨邦甲. 高性能路由器的功能与基本结构[J]. 电脑知识与技术, 2009, 12(5): 3117-3119.
[11] 吴锋. 基于软硬加密的 IPSec VPN 系统结构的设计与实现[D]. 湖北: 华中科技大学, 2007.
[12] 林海, 朱柯.高性能路由器中 IPSec 协议研究及其实现[J]. 计算机安全, 2008 (7):10-13.
[13]S.Kent. Security Architecture for IP[S]. Internet Engineering Task Force, RFC4301, 2005(12).
[14] 胡珊. 基于 IPSec 协议的 VPN 网络安全技术的研究与实现[D]. 南京: 南京航空航天大学,2003.
[15] 杨笑卉. IPSec 协议的优化及其相关执行性能的研究[D]. 湖南: 中南大学, 2005.
[16] 杭波. 新一代 Internet 网络层安全协议的研究与实现[D]. 黑龙江: 哈尔滨工业大学, 2003.
[17] 白俊峰, 邓祖朴. 多核系统下的 IPSec VPN 网关的研究和实现[J]. 计算机工程与设计,2010, 31(13):2992-2995.
[18] 马士超, 王贞松. IPSec 协议实现及其现状分析[J]. 计算机工程, 2006 (22): 107-110.
[19] 朱彦杰, 冯志慧.IPSec 的原理及应用[J]. 计算机安全, 2008 (11): 73-76.
[20] 李乐佳. 一种基于 OCTEON 处理器的 IPSec 协议的实现[D]. 广州: 华南理工大学, 2012.2-3.
[21] 罗娅. 基于 IPSec 的 VPN 系统研究与设计[D]. 重庆: 重庆大学, 2004.
[22] 林海, 朱柯. 高性能路由器中 IPSec 协议研究及其实现[J]. 计算机安全, 2008 (7): 10-13.
[23] 廖悦欣. IPSec 协议实现技术研究[D]. 广州: 华南理工大学, 2013.2-3.
[24]S. Kent. IP Encapsulating Security Payload[S]. Internet Engineering Task Force,RFC4303,2005(12).
[25]C.Kaufman. Internet Key Exchange(IKEv2)Protocol[S]. Internet Engineering Task Force,RFC4306, 2005(12).
[26] 朱永升. IPSec 技术研究及其在路由器上的实现[D]. 西安: 西安电子科技大学,2007.2-3.
[27] 尹建平. 基于 IPSec 的分布式集群 VPN 应用研究 [D]. 重庆: 重庆大学, 2006.2-3.
[28] 张治元, 孔庆月. 基于 HCR 路由器的 IPSec 系统设计与实现[J]. 计算机与现代化, 2009(11):50-52.
[29] Zhang Lin,Wang RuChuan. Research of main mode with a pre-shared key in ike protocol[J].Nanjing Youdian Daxue Xuebao, 2007, 27(5):50-55.
[30]Wu Jianwu. Implementation of Virtual Private Network based on IPSec Protocol[C]. IEEE FutureComputer and Communication , 2009: 138-141.
[31]D.Maughan .Internet Security Association and Key Management Protocol[S]. InternetEngineering Task Force, RFC2408, 1998(11).
[32]S.Kent. IP Authentication Header[S]. Internet Engineering Task Force, RFC4302,2005(12).
[33] 陈平. IPSec 在路由器中的实现[J]. 微型电脑应用, 2005, 21(5): 48-50.
[34] 董峰. IPSec 在高性能路由器上的实现[D]. 南京: 南京航空航天大学, 2007.25-30.
[35] 王志敏. IPSec 安全技术研究与实现 [D]. 西安: 西安电子科技大学, 2005.2-3.
[36] 徐庆和. 基于多核的 BFD 协议实现及测试[D]. 成都: 电子科技大学, 2012.
通信工程硕士论文参考文献三
[1]ChenLEE l,ASM (Active Shape Model)算法介绍,2012-11-17
[2]张翠平,苏光大,人脸识别技术综述,中国图像图形学报[习,2000年11月,第11期第五卷p885-p89
[3]S.Y. Ho, H. Huang, An analytic solution for the pose determination of human facesfrom a monocular image,Pattern Recognition Letters [J],1988,1045-1054.
[4]Songyan Ma, Tiancang Du,Improved Adaboost Face Detection Measuring Technologyand Mechatronics Automation (ICMTNA),International Conference[J], 2010,434-437.
[5]Hsiuao-Ying Chen, Chung-Lin Huang, Chih-Ming Fu, Hybrid-boost learning formultipose face detection and facial expression recognition,,Original Research ArticlePattern Recognitions [J], 2008,Volume 41,Issue 3,1173-1185.
[6]Yan Hou,Qingsong Peng, Face Detection Based on Adaboost and Skin Color IntelligentNetworks and Intelligent Systems [J], 2008,ICINIS 08,First International Conference,457-460.
[7]Enmin Song,Dongshan Huang, Guangzhi Ma, Chi-Cheng Hung, Semi-supervisedmulti-class Adaboost by exploiting unlabeled data, Article Expert System withApplications [J],2011,Volume 38,Issue 6,6720-6726.
[8]R,Jones M.,Rapid Object Detection Using a Boosted Cascade of SimpleFeatures, Computer Vision and Pattern Recognition, DEEE Computer SocietyConference [J], 2001,Volume 1,511-518.
[9]Lienhart R. Maydt J” An Extended Set ofHarr-like Features For Rapid ObjectDetection, Image Processing, Internation Conference [J], 2002,Volume 1,900-903.
[10]ZhengmirigLi, Lijie Xue, Fei Tan, Face detection in complex background based on skincolor features and improved AdaBoost algorithms Progress in Informatics andComputing(PIC), IEEE International Conference [J], 2010,Volume 2 723-727.
[11]Peng Deng, Mingtao Pei,Multi-View Face detection based on Adaboost and Skin ColorIntelligent Networks and Intelligent Systems, ICINIS 08,First International Conference[J] 2008,457-460.
[12] Yijun Sun, Sinisa Todorovic, Jian Li Unifying multi-class Adaboost Algorithms withBinary Base Learners Under tiie Margin framework Pattern Recognition Letters [J],2012 Volume 45,Issue 11,3853-3865.
[13]Daniel Lelis Baggio,Shervin Emami, David Millan Escriva, Roy Shikrot, MasteringOpenCV with Practical Computer Vision Projects [M], 2012 Birmingham, PacktPublishing Ltd, 208-254.
[14]Breitenstein,Real-Time face pose estimation from Single Range Images, 2008,Harvard University
[15]Nasiri,JA. Yazdi, H.S. Moulavi, MA; Rouhani, M?; SharghAPSO Tuning Approachfor Lip Detection on Color Images Computer Modeling and Simulation. EMS '08.Second UKSIM European Symposium [J], 2008,278- 282.
[16]Jian-MingZhang,Liang-Min Wang, De-Jiao Niu,Yong-Zhao Zhan Research andimplementation of a real time approach to lip detection in video sequences MachineLearning and Cybernetics, International Conference [J], 2003,Volume 5,2795- 2799.
[17]T.K.Leung, M.C. Burl,and P. Perona, Finding Faces in Cluttered Scenes Using RandomLabeled Graph Matching, Proc. Fifth IEEE Int'l Conf. Computer Vision [J], 1995,637-644,
[18]C,C.Han,Liao,K.-C. Yu,and L.-H. Chen, Fast Face Detection viaMorphology-Based Pre-Processing, Proc. Ninth Infl Conf. Image Analysis andProcessing [J], 1998,469-476.
[19]D.Chetverikov and A. Lerch, Multiresolution Face Detection,Theoretical Foundationsof Computer Vision [J], 1993, Volume. 69,131-140.
[20]M.F.Augusteijn and T.L. Skujca,Identification of Human Faces through Texture-BasedFeature Recognition and Neural Network Technology, Proc. IEEE Conf. NeuralNetworks[J], 1993,392-398
[21]Y. Dai, Y. Nakano, Face-texture model based on SGLD and its application in facedetection in a color scene,Pattern Recognition 29 (6)[J], 1996,1007-1017.
[22]Sakai, M. Nagao, and S. Fujibayashi,Line Extraction and Pattern Detection in aPhotograph, Pattern Recognition [J], 1969,vol. 1,233-248.
[23]A. Tsukamoto,C.-W. Lee, and S. Tsuji, Detection and Tracking of Human Face withSynthesized Templates, Proc. First Asian Conf. Computer Vision[J], 1993,183-186,
[24]J. Miao,B. Yin, K. Wang,L. Shen,and X. Chen, A Hierarchical Multiscale andMultiangle System for Human Face Detection in a Complex Background Using Gravity-Center Template, Pattern Recognition[J], 1999,vol. 32,no. 7,1237-1248.
[25]A. Yuille,P. Hallinan,and D. Cohen, Feature Extraction from Faces Using DeformableTemplates,Int'I J. Computer sion[J], 1992,vol. 8,no. 2,99-111.
[26]A. Lanitis, C.J. Taylor, and T.F. Cootes,An Automatic Face Identification System UsingFlexible Appearance Models, Image and Vision Computing[J],1995,vol. 13,no. 5,393-401.
[27]M. Kirby and L. Sirovich, Application of the Karhuaen-Loe've Procedure for theCharacterization of Human Faces, IEEE Trans-Pattern Analysis and MachineIntelligence [J], Jan. 1990,Volume. 12, No. 1,103-108.
[28]H.Rowley, S. Baluja, and T. Kanade, Neural Network-Based Face Detection, IEEETrans. Pattern Analysis and Machine Intelligence [J], Jan. 1998,Volume. 20,No. 1,23-38.
[29]E.Osuna, R. Freund,and F. Girosi, Training Support Vector Machines: An Applicationto Face Detection, Proc. IEEE Conf.Computer Vision and Pattern Recognition[J], 1997,130-136.
[30]M. Turk and A. Pentland, Eigenfaces for Recognition, J. Cognitive Neuroscience[J],1991,vol. 3,no. 1,pp. 71-86.
[31]K.-K.Sung,Learning and Example Selection for Object and Pattern Detection, PhDthesis, Massachusetts Inst, of Technology, 1996.
[32]K.-K. Sung and T. Poggio, Example-Based Learning for View-Based Human FaceDetection, IEEE Trans. Pattern Analysis and Machine IntelligencefJ], Jan. 1998,vol. 20,no. 1,pp. 39-51.
[33]E. Osuna,R, Freund, and F. Girosi,Training Support Vector Machines: An Applicationto Face Detection, Proc. IEEE Conf. Computer \^sion and Pattern Recognition[J], 1997,130-136.
[34]Kuchi,Prem,Gabbur,Prasad, Bhat,P. Subbanna, David S,Sumam Human facedetection and tracking using skin color modeling and connected component operatorsIETE Journal of Research Visual Media Processing[J],May/August 2002,Volume48,No 3-4,289-293.
[35]NI 官方网站,Lab VIEW 系统设计软件 2014-09-10.
[36]周志勇,周激流,刘智明,贺新,基于彩色和投影的人脸检测和跟踪算法贵州工业大学学报(自然科学版)[J] 2003 32(3),46-53.
[37]Ho,Sh.-Y.? Huang, H.-L. Analytic solution for the pose determination of human facesfrom a monocular image Pattern Recognition Letters [J], Sep 1998, Volume 19,No 11,1045-1054.
[38]Nikolaidis,Athanasios,Pitas, Ioannis Facial feature extraction and pose determinationPattern Recognition [J], Nov 2000,Volume 33,No 11,1783-1791.
[39]Wei,Li Lee, Eung-Joo Improved multi-pose 2D face recognition using 3D face modelwith camera pose estimation approach and nD-PCA recognition algorithm Proceedings International Conference on Convergence and Hybrid Information Technology [J],,2008,ICCIT2008,Volume 2,728-736,
[40]李洪生,基于ASM算法的人脸特征点定位研究与应用[硕士学位论文],江苏南京:东南大学,2009,40-43.