期刊文献+
共找到195篇文章
< 1 2 10 >
每页显示 20 50 100
基于深度卷积-Tokens降维优化视觉Transformer的分心驾驶行为实时检测 被引量:1
1
作者 赵霞 李朝 +2 位作者 付锐 葛振振 王畅 《汽车工程》 EI CSCD 北大核心 2023年第6期974-988,1009,共16页
针对基于端到端深度卷积神经网络的驾驶行为检测模型缺乏全局特征提取能力以及视觉Transformer(vision transformer,ViT)模型不擅长捕捉底层特征和模型参数量较大的问题,本文提出一种基于深度卷积和Tokens降维的ViT模型用于驾驶人分心... 针对基于端到端深度卷积神经网络的驾驶行为检测模型缺乏全局特征提取能力以及视觉Transformer(vision transformer,ViT)模型不擅长捕捉底层特征和模型参数量较大的问题,本文提出一种基于深度卷积和Tokens降维的ViT模型用于驾驶人分心驾驶行为实时检测,并通过开展与其他模型的对比试验、所提模型的消融试验和模型注意力区域的可视化试验充分验证了所提模型的优越性。本文所提模型的平均分类准确率和精确率分别为96.93%和96.95%,模型参数量为21.22 M,基于真实车辆平台在线推理速度为23.32 fps,表明所提模型能够实现实时分心驾驶行为检测。研究结果有利于人机共驾系统的控制策略制定和分心预警。 展开更多
关键词 汽车工程 分心驾驶行为检测模型 视觉Transformer 多头注意力机制 卷积神经网络 tokens降维
下载PDF
Non‑fungible tokens:a bubble or the end of an era of intellectual property rights
2
作者 Elli Kraizberg 《Financial Innovation》 2023年第1期777-796,共20页
The viability of exponentially growing non-fungible token(NFT)market is evaluated by identifying potential value-generating mechanisms that can be rationalized.After identifying the value-generating mechanisms underly... The viability of exponentially growing non-fungible token(NFT)market is evaluated by identifying potential value-generating mechanisms that can be rationalized.After identifying the value-generating mechanisms underlying the positive values of NFTs,this study establishes a pricing model for NFTs that follows a continuous-time financial framework.As NFTs are claimed to securitize“ownership rights short of use”,and as such they may potentially serve as a substitute for the need to rely replace the reliance on the legal protection provided by intellectual property rights(IPRs).Considering this issue,this study evaluates the likelihood that NFTs will replace existing mechanisms that protect producers’rightful claim to use their assets or the need to apply the legal code that governs IPRs.The financial condition for this potential shift is derived for a category of assets whose use or consumption does not reduce supply as the notion of scarcity does not apply. 展开更多
关键词 Non-fungible tokens Intellectual property rights STATUS
下载PDF
Empirical evidence on the ownership and liquidity of real estate tokens 被引量:1
3
作者 Laurens Swinkels 《Financial Innovation》 2023年第1期1246-1274,共29页
To better understand the potential and limitations of the tokenization of real asset mar-kets,empirical studies need to examine this radically new organization of financial mar-kets.In our study,we examine the financi... To better understand the potential and limitations of the tokenization of real asset mar-kets,empirical studies need to examine this radically new organization of financial mar-kets.In our study,we examine the financial and economic consequences of tokenizing 58 residential rental properties in the US,particularly those in Detroit.Tokenization aims at fragmented ownership.We found that the residential properties examined have 254 owners on average.Investors with a greater than USD 5,000 investment in real estate tokens,diversify their real estate ownership across properties within and across the cities.Property ownership changes about once yearly,with more changes for proper-ties on decentralized exchanges.We report that real estate token prices move accord-ing to the house price index;hence,investing in real estate tokens provides economic exposure to residential house prices. 展开更多
关键词 Blockchain Cryptocurrency Real estate TOKENIZATION
下载PDF
Computational Results on Quadratic Functional Model for the Tokens of Nuclear Safety
4
作者 Joseph Olorunju Omolehin Lukuman Aminu Kamilu Rauf 《American Journal of Computational Mathematics》 2013年第1期6-15,共10页
In this work, Nuclear Reactor safety was modeled inform of quadratic functional. The nuclear tokens are structured and used as elements of the control matrix operator in our quadratic functional. The numerical results... In this work, Nuclear Reactor safety was modeled inform of quadratic functional. The nuclear tokens are structured and used as elements of the control matrix operator in our quadratic functional. The numerical results obtained through Conjugate Gradient Method (CGM) algorithm identify the optimal level of safety required for Nuclear Reactor construction at any particular situation. 展开更多
关键词 CONTROL OPERATOR NUCLEAR tokens CGM ALGORITHM OPTIMAL
下载PDF
Love Tokens of Tibetan Herdsmen
5
作者 Ye Yuling 《China's Tibet》 2008年第1期29-33,共5页
Tibet is a large,isolated land with a harsh climate.Previously,herdsmen lived in scattered remote areas.Although cultural
关键词 Love tokens of Tibetan Herdsmen
下载PDF
基于多模态融合和自适应剪枝Transformer的脑肿瘤图像分割算法
6
作者 姚宗亮 黄荣 +2 位作者 董爱华 韩芳 王青云 《宁夏大学学报(自然科学版)》 CAS 2024年第1期16-24,共9页
脑肿瘤是目前世界上最致命的肿瘤之一,所以脑肿瘤图像的自动分割在临床诊疗中变得日益重要.近年来,基于CNN和Transformer的脑肿瘤分割方法在医学图像分割领域取得了令人欣喜的成就.然而,大多数方法没有充分利用脑肿瘤多模态间的互补性... 脑肿瘤是目前世界上最致命的肿瘤之一,所以脑肿瘤图像的自动分割在临床诊疗中变得日益重要.近年来,基于CNN和Transformer的脑肿瘤分割方法在医学图像分割领域取得了令人欣喜的成就.然而,大多数方法没有充分利用脑肿瘤多模态间的互补性和差异性,并且模型中的Transformer在捕获远程依赖性的同时,忽略了其较大的计算复杂性、冗余依赖性等问题.针对此问题,提出一种基于多模态融合和自适应剪枝Transformer的脑肿瘤图像分割方法(MF-MAPT Swin UNETR),其中多模态融合模块可以充分学习性质相近的模态间信息和不同模态不同尺度的特征变化,为后续分割提供了充分的准备;基于多模态的自适应剪枝Transformer可以降低计算复杂度,对提升性能有一定的帮助,将MF-MAPT Swin UNETR模型在两个公共数据集上进行了实验验证,结果表明,该模型较最先进的方法整体具有突出的分割性能. 展开更多
关键词 脑肿瘤分割 TRANSFORMER 模态交叉连接 多尺度特征融合 token融合 自适应剪枝
下载PDF
Markets in crypto‑assets regulation:Does it provide legal certainty and increase adoption of crypto‑assets?
7
作者 Tina van der Linden Tina Shirazi 《Financial Innovation》 2023年第1期509-538,共30页
This study discusses the European Union’s proposal for a Regulation on Markets in Crypto-Assets,now subject to formal approval by the European Parliament.The objective is to explore whether it will positively impact ... This study discusses the European Union’s proposal for a Regulation on Markets in Crypto-Assets,now subject to formal approval by the European Parliament.The objective is to explore whether it will positively impact the adoption of crypto-assets in the financial sector.The use of crypto-assets is growing.However,some stakeholders in the financial service sector remain skeptical and hesitant to adopt assets that are yet to be defined and have an unclear legal status.This regulatory uncertainty has been identified as the primary reason for the reluctant adoption.The proposed regulation(part of the EU’s Digital Finance Strategy)aims to provide this legal certainty for currently unregulated crypto-assets.This study investigates whether or not the proposed regulation can be expected to have the intended effect by reviewing the proposed regulation itself,the opinions and reactions of the various stakeholders,and secondary literature.Findings reveal that such regulation will most likely not accelerate the adoption of crypto-assets in the EU financial services sector,at least not sufficiently or as intended.Some suggestions are made to improve the proposal. 展开更多
关键词 MiCA regulation Crypto-assets Legal certainty Blockchain Distributed ledger technology Utility tokens Stablecoins Asset-referenced tokens e-money tokens
下载PDF
NFT Security Matrix:Towards Modeling NFT Ecosystem Threat
8
作者 Peng Liao Chaoge Liu +2 位作者 Jie Yin Zhi Wang Xiang Cui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3255-3285,共31页
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,nume... Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,numerous security concerns have been raised by the rapid expansion of the NFT ecosystem.NFT holders are exposed to a plethora of scams and traps,putting their digital assets at risk of being lost.However,academic research on NFT security is scarce,and the security issues have aroused rare attention.In this study,the NFT ecological process is comprehensively explored.This process falls into five different stages encompassing the entire lifecycle of NFTs.Subsequently,the security issues regarding the respective stage are elaborated and analyzed in depth.A matrix model is proposed as a novel contribution to the categorization of NFT security issues.Diverse data are collected from social networks,the Ethereum blockchain,and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT ecosystem.From this comprehensive dataset,nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative analysis.This study aims to shed light on the severity of NFT ecosystem security issues.The findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem. 展开更多
关键词 Non-fungible token blockchain cyber security
下载PDF
从ChatGPT到Sora发展中的术语问题
9
作者 冯志伟 《中国科技术语》 2024年第2期88-92,共5页
在从ChatGPT到Sora的发展过程中,出现了不少新术语。这些术语,有的被翻译为中文,有的一直使用英文原文。文章在分析这些新术语的相关技术、概念的基础上,探讨如何为其翻译或者赋予适当的中文名称。并指出大量科技新术语不能够及时、高... 在从ChatGPT到Sora的发展过程中,出现了不少新术语。这些术语,有的被翻译为中文,有的一直使用英文原文。文章在分析这些新术语的相关技术、概念的基础上,探讨如何为其翻译或者赋予适当的中文名称。并指出大量科技新术语不能够及时、高效地被本土化,这对我国的术语规范化工作提出了新的挑战,期望学界共同关注这一问题。 展开更多
关键词 人工智能 ChatGPT SORA TRANSFORMER TOKEN scaling law
下载PDF
Trade Tokens
10
作者 By CHEN WEN 《Beijing Review》 2006年第18期14-15,共2页
In the pursuit of balanced trade with the U.S., China pours it on where it counts A week ahead of Chinese President Hu Jintao's first state visit to the United States, Beijing and Washington reached a series of ag... In the pursuit of balanced trade with the U.S., China pours it on where it counts A week ahead of Chinese President Hu Jintao's first state visit to the United States, Beijing and Washington reached a series of agreements intended to ease the bilateral trade imbalance, including resuming trade in U.S. beef, increasing Chinese market access to U.S. medical devices, telecom services and express delivery, and cracking down on intellectual property rights infringements. 展开更多
关键词 Trade tokens JCC
原文传递
THE MEANING OF FROZEN TOKENS IN LIVE NETS
11
作者 陆维明 A.MERCERON 《Science China Mathematics》 SCIE 1989年第4期459-469,共11页
A concurrent system can be modeled by a Petri net. A live Petri net may have fro-zen tokens. It is showed that such tokens can be deleted if they are superfluous, and, whilethey are useful, can be defrozen if they bec... A concurrent system can be modeled by a Petri net. A live Petri net may have fro-zen tokens. It is showed that such tokens can be deleted if they are superfluous, and, whilethey are useful, can be defrozen if they became frozen due to unfair occurrences of tran-sitions, and, finaloy, some frozen tokens lead to more processes. 展开更多
关键词 FROZEN TOKEN LIVE net UNFAIR occurrence.
原文传递
Tokenomics and blockchain tokens: A design-oriented morphological framework
12
作者 Pierluigi Freni Enrico Ferro Roberto Moncada 《Blockchain(Research and Applications)》 2022年第1期80-95,共16页
Blockchain technology has been around for more than ten years,nevertheless,the knowledge about its economic and business implications is still fragmented and heterogeneous.The present article intends to tackle this is... Blockchain technology has been around for more than ten years,nevertheless,the knowledge about its economic and business implications is still fragmented and heterogeneous.The present article intends to tackle this issue with a twofold contribution.The first is an analysis of the shift from economics to tokenomics highlighting the central role played by tokens within blockchain-based ecosystems.The second is a framework for tokens design leveraging a morphological analysis deeply grounded in the literature.As blockchain becomes a mainstream phenomenon,the value of the work proposed lies in lowering the cognitive barriers and in clarifying the space of available options for private and public actors willing to leverage tokenization in their daily operations. 展开更多
关键词 Blockchain TOKENIZATION Tokenomics Classification framework Token design
原文传递
基于学生评教小程序的Web服务端研究与设计
13
作者 杨亚仿 林政艺 《计算机时代》 2023年第10期132-136,共5页
小程序的数据加载与业务流程运行需要Web服务端的安全验证与快速响应。基于高校学生评教小程序的应用,结合具体的评教业务流程,对小程序的Web服务端特点进行了研究与分析,重点对Web服务端如何保持安全、高效的运行进行了研究与设计,具... 小程序的数据加载与业务流程运行需要Web服务端的安全验证与快速响应。基于高校学生评教小程序的应用,结合具体的评教业务流程,对小程序的Web服务端特点进行了研究与分析,重点对Web服务端如何保持安全、高效的运行进行了研究与设计,具体包括自定义JSON序列化、自定义Token以及评教数据的缓存和同步机制等功能。该研究对Web服务端的设计与应用有一定的参考价值。 展开更多
关键词 Web服务端 JSON序列化 自定义Token 数据缓存
下载PDF
基于数据共享系统的气象灾害防御网格治理平台设计与实现
14
作者 邱忠洋 蒋骏 +1 位作者 陈宏波 姚丽娜 《湖北农业科学》 2023年第12期188-194,217,共8页
为解决气象信息及时高效地以网格化形式精准靶向发布给决策者或普通用户这一实际需求,常州市气象局依托局内数据共享系统,结合常州市突发事件预警信息平台、常州市市域社会治理现代化联动指挥平台,设计研发了气象灾害防御网格化治理平... 为解决气象信息及时高效地以网格化形式精准靶向发布给决策者或普通用户这一实际需求,常州市气象局依托局内数据共享系统,结合常州市突发事件预警信息平台、常州市市域社会治理现代化联动指挥平台,设计研发了气象灾害防御网格化治理平台。该平台可将预警、预报、重要通知、气象防灾减灾等信息高效精准地发布至网格员使用的PC端或APP端,再由网格员扩散。技术上,气象灾害防御网格化治理平台所使用的数据共享系统引入了Token令牌管理机制,软件设计上采用了B/S数据处理架构,数据库依托Oracle,数据调取采用了Mybatis框架提供API服务。实际使用效果表明,系统灵活高效,基本满足服务的需求。 展开更多
关键词 气象灾害 网格治理 Token令牌 B/S架构 ORACLE数据库 API服务 Mybatis框架 气象灾害防御网格治理平台
下载PDF
基于克隆检测技术的性能Bugs查找
15
作者 邓子含 徐云 《计算机系统应用》 2023年第7期57-64,共8页
性能bug是指代码中降低程序运行效率的缺陷.现有的检测工具只能查找特定类型的性能bug并且需要复杂的程序分析过程,因而缺乏通用性并且时空开销巨大.同时,有许多经典的克隆检测技术被用于一般性相似代码检测,但是它们只能检测高度相似... 性能bug是指代码中降低程序运行效率的缺陷.现有的检测工具只能查找特定类型的性能bug并且需要复杂的程序分析过程,因而缺乏通用性并且时空开销巨大.同时,有许多经典的克隆检测技术被用于一般性相似代码检测,但是它们只能检测高度相似的代码或者需要依赖训练集,使得它们难以用于在真实数据集中查找性能bug.基于此,通过构建带有标记token的代码模板,本文提出一种使用克隆检测技术来查找多种类型的性能bug的方法.通过对不同类型和频度的token标记不同的权重,本文提出的方法可以区分其重要性并因此提取出代码中的关键信息.在真实项目构成的数据集上的实验表明,本方法可以发现更多类型的性能bug同时比现有工具耗时更少.另一项实验也证明了本方法显著提升了基于token的克隆检测技术的检测能力,相比于现有的克隆检测方法更适合用于性能bug查找. 展开更多
关键词 性能bug检测 代码克隆检测 代码模板 带标记的token
下载PDF
基于C/S与B/S融合架构的公车管理系统设计与实现
16
作者 胡斌 张捷 《工业控制计算机》 2023年第7期120-121,132,共3页
为加强廉政建设,降低行政成本,积极响应公务用车改革,针对目前公务车辆管理存在的诸多问题,设计了基于C/S与B/S融合架构的公车管理系统。此系统通过物联网技术和Web技术实现了信息采集,同时搭建信息化管理平台,对用车申请、流程审批、... 为加强廉政建设,降低行政成本,积极响应公务用车改革,针对目前公务车辆管理存在的诸多问题,设计了基于C/S与B/S融合架构的公车管理系统。此系统通过物联网技术和Web技术实现了信息采集,同时搭建信息化管理平台,对用车申请、流程审批、车辆调度等需求提供了一个高效的解决方案,以大幅提高办公效率,有效减少财政支出。首先介绍了系统的总体架构设计和功能模块设计,然后对系统关键技术的实现做了详细的说明。 展开更多
关键词 公车管理系统 物联网 SOCKET通信 Token认证
下载PDF
Edims: an event-driven internal memory synchronized readout prototype ASIC chip developed for HFRS-TPC
17
作者 Ming‑Yu Yang Yi Qian +5 位作者 Tian‑Lei Pu Wei‑Jian Lu Zhi‑Kun Sun Hong‑Yun Zhao Jia‑Rui Zhang Zheng‑Qiang Liu 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2023年第12期177-189,共13页
HFRS(HIAF FRagment Separator) will be the radioactive secondary beam separation line on High-Intensity heavy-ion Accelerator Facility(HIAF) in China. Several TPC detectors, with high count rates, are planned for parti... HFRS(HIAF FRagment Separator) will be the radioactive secondary beam separation line on High-Intensity heavy-ion Accelerator Facility(HIAF) in China. Several TPC detectors, with high count rates, are planned for particle identification and beam monitoring at HFRS. This paper presents an event-driven internal memory and synchronous readout(EDIMS)prototype ASIC chip. The aim is to provide HFRS-TPC with high-precision time and charge measurements with high count rates and a large dynamic range. The first prototype EDIMS chip integrated 16 channels and is fabricated using a 0.18-μm CMOS process. Each channel consists of a charge-sensitive amplifier, fast shaper, slow shaper, peak detect-and-hold circuit, discriminator with time-walk compensation, analog memory, and FIFO. The token ring is used for clock-synchronous readout. The chip is taped and tested. 展开更多
关键词 GEM-TPC HFRS Readout ASIC Self-trigger TIMESTAMP TWC PDH SCA Token ring
下载PDF
全球第二大加密货币削减能源消耗
18
作者 Mitch Leslie 《Engineering》 SCIE EI CAS CSCD 2023年第6期6-8,共3页
The year 2022 was a milestone for cryptocurrencies-and not just because investors suffered record losses of more than2 × 1012USD and the arrest on fraud charges of the founder of one of the biggest exchanges [1,2... The year 2022 was a milestone for cryptocurrencies-and not just because investors suffered record losses of more than2 × 1012USD and the arrest on fraud charges of the founder of one of the biggest exchanges [1,2]. Last year also stands out because, for the first time, a major cryptocurrency took action to curb its enormous energy appetite. On 15 September 2022,Ethereum, the cryptocurrency with the second highest market capitalization, changed its operating algorithm, cutting its electricity use by more than 99% [3]. Dubbed the Merge, this transformation dispensed with mining, the energy intensive computational process that generates new cryptocurrency tokens for users to spend or trade. 展开更多
关键词 TOKEN SPEND CURRENCY
下载PDF
Predicting Carpark Prices Indices in Hong Kong Using AutoML
19
作者 Rita YiMan Li Lingxi Song +2 位作者 Bo Li M.James C.Crabbe Xiao-Guang Yue 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期2247-2282,共36页
The aims of this study were threefold:1)study the research gap in carpark and price index via big data and natural language processing,2)examine the research gap of carpark indices,and 3)construct carpark price indice... The aims of this study were threefold:1)study the research gap in carpark and price index via big data and natural language processing,2)examine the research gap of carpark indices,and 3)construct carpark price indices via repeat sales methods and predict carpark indices via the AutoML.By researching the keyword“carpark”in Google Scholar,the largest electronic academic database that coversWeb of Science and Scopus indexed articles,this study obtained 999 articles and book chapters from 1910 to 2019.It confirmed that most carpark research threw light on multi-storey carparks,management and ventilation systems,and reinforced concrete carparks.The most common research method was case studies.Regarding price index research,many previous studies focused on consumer,stock,press and futures,with many keywords being related to finance and economics.These indicated that there is no research predicting carpark price indices based on an AutoML approach.This study constructed repeat sales indices for 18 districts in Hong Kong by using 34,562 carpark transaction records from December 2009 to June 2019.Wanchai’s carpark price was about four times that of Yuen Long’s carpark price,indicating the considerable carpark price differences inHong Kong.This research evidenced the features that affected the carpark price indices models most:gold price ranked the first in all 19 models;oil price or Link stock price ranked second depending on the district,and carpark affordability ranked third. 展开更多
关键词 Carpark repeat sales index AutoML Hong Kong natural language processing TOKENIZATION
下载PDF
Language-Independent Text Tokenization Using Unsupervised Deep Learning
20
作者 Hanan A.Hosni Mahmoud Alaaeldin M.Hafez Eatedal Alabdulkreem 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期321-334,共14页
Languages–independent text tokenization can aid in classification of languages with few sources.There is a global research effort to generate text classification for any language.Human text classification is a slow p... Languages–independent text tokenization can aid in classification of languages with few sources.There is a global research effort to generate text classification for any language.Human text classification is a slow procedure.Conse-quently,the text summary generation of different languages,using machine text classification,has been considered in recent years.There is no research on the machine text classification for many languages such as Czech,Rome,Urdu.This research proposes a cross-language text tokenization model using a Transformer technique.The proposed Transformer employs an encoder that has ten layers with self-attention encoding and a feedforward sublayer.This model improves the efficiency of text classification by providing a draft text classification for a number of documents.We also propose a novel Sub-Word tokenization model with frequent vocabulary usage in the documents.The Sub-Word Byte-Pair Tokenization technique(SBPT)utilizes the sharing of the vocabulary of one sentence with other sentences.The Sub-Word tokenization model enhances the performance of other Sub-Word tokenization models such pair encoding model by+10%using precision metric. 展开更多
关键词 Text classification language-independent tokenization sub word tokenization
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部