期刊文献+
共找到211篇文章
< 1 2 11 >
每页显示 20 50 100
基于深度卷积-Tokens降维优化视觉Transformer的分心驾驶行为实时检测 被引量:1
1
作者 赵霞 李朝 +2 位作者 付锐 葛振振 王畅 《汽车工程》 EI CSCD 北大核心 2023年第6期974-988,1009,共16页
针对基于端到端深度卷积神经网络的驾驶行为检测模型缺乏全局特征提取能力以及视觉Transformer(vision transformer,ViT)模型不擅长捕捉底层特征和模型参数量较大的问题,本文提出一种基于深度卷积和Tokens降维的ViT模型用于驾驶人分心... 针对基于端到端深度卷积神经网络的驾驶行为检测模型缺乏全局特征提取能力以及视觉Transformer(vision transformer,ViT)模型不擅长捕捉底层特征和模型参数量较大的问题,本文提出一种基于深度卷积和Tokens降维的ViT模型用于驾驶人分心驾驶行为实时检测,并通过开展与其他模型的对比试验、所提模型的消融试验和模型注意力区域的可视化试验充分验证了所提模型的优越性。本文所提模型的平均分类准确率和精确率分别为96.93%和96.95%,模型参数量为21.22 M,基于真实车辆平台在线推理速度为23.32 fps,表明所提模型能够实现实时分心驾驶行为检测。研究结果有利于人机共驾系统的控制策略制定和分心预警。 展开更多
关键词 汽车工程 分心驾驶行为检测模型 视觉Transformer 多头注意力机制 卷积神经网络 tokens降维
下载PDF
Non‑fungible tokens:a bubble or the end of an era of intellectual property rights
2
作者 Elli Kraizberg 《Financial Innovation》 2023年第1期777-796,共20页
The viability of exponentially growing non-fungible token(NFT)market is evaluated by identifying potential value-generating mechanisms that can be rationalized.After identifying the value-generating mechanisms underly... The viability of exponentially growing non-fungible token(NFT)market is evaluated by identifying potential value-generating mechanisms that can be rationalized.After identifying the value-generating mechanisms underlying the positive values of NFTs,this study establishes a pricing model for NFTs that follows a continuous-time financial framework.As NFTs are claimed to securitize“ownership rights short of use”,and as such they may potentially serve as a substitute for the need to rely replace the reliance on the legal protection provided by intellectual property rights(IPRs).Considering this issue,this study evaluates the likelihood that NFTs will replace existing mechanisms that protect producers’rightful claim to use their assets or the need to apply the legal code that governs IPRs.The financial condition for this potential shift is derived for a category of assets whose use or consumption does not reduce supply as the notion of scarcity does not apply. 展开更多
关键词 Non-fungible tokens Intellectual property rights STATUS
下载PDF
Empirical evidence on the ownership and liquidity of real estate tokens 被引量:1
3
作者 Laurens Swinkels 《Financial Innovation》 2023年第1期1246-1274,共29页
To better understand the potential and limitations of the tokenization of real asset mar-kets,empirical studies need to examine this radically new organization of financial mar-kets.In our study,we examine the financi... To better understand the potential and limitations of the tokenization of real asset mar-kets,empirical studies need to examine this radically new organization of financial mar-kets.In our study,we examine the financial and economic consequences of tokenizing 58 residential rental properties in the US,particularly those in Detroit.Tokenization aims at fragmented ownership.We found that the residential properties examined have 254 owners on average.Investors with a greater than USD 5,000 investment in real estate tokens,diversify their real estate ownership across properties within and across the cities.Property ownership changes about once yearly,with more changes for proper-ties on decentralized exchanges.We report that real estate token prices move accord-ing to the house price index;hence,investing in real estate tokens provides economic exposure to residential house prices. 展开更多
关键词 Blockchain Cryptocurrency Real estate TOKENIZATION
下载PDF
Computational Results on Quadratic Functional Model for the Tokens of Nuclear Safety
4
作者 Joseph Olorunju Omolehin Lukuman Aminu Kamilu Rauf 《American Journal of Computational Mathematics》 2013年第1期6-15,共10页
In this work, Nuclear Reactor safety was modeled inform of quadratic functional. The nuclear tokens are structured and used as elements of the control matrix operator in our quadratic functional. The numerical results... In this work, Nuclear Reactor safety was modeled inform of quadratic functional. The nuclear tokens are structured and used as elements of the control matrix operator in our quadratic functional. The numerical results obtained through Conjugate Gradient Method (CGM) algorithm identify the optimal level of safety required for Nuclear Reactor construction at any particular situation. 展开更多
关键词 CONTROL OPERATOR NUCLEAR tokens CGM ALGORITHM OPTIMAL
下载PDF
Love Tokens of Tibetan Herdsmen
5
作者 Ye Yuling 《China's Tibet》 2008年第1期29-33,共5页
Tibet is a large,isolated land with a harsh climate.Previously,herdsmen lived in scattered remote areas.Although cultural
关键词 Love tokens of Tibetan Herdsmen
下载PDF
Blockchain-Based System for Secure and Efficient Cross-Border Remittances: A Potential Alternative to SWIFT
6
作者 Omoshola S. Owolabi Emmanuel Hinneh +6 位作者 Prince C. Uche Nathaniel T. Adeniken Jennifer A. Ohaegbulem Samuel Attakorah Oluwabukola G. Emi-Johnson Chinaza S. Belolisa Harold Nwariaku 《Journal of Software Engineering and Applications》 2024年第8期664-712,共49页
This paper proposes a blockchain-based system as a secure, efficient, and cost-effective alternative to SWIFT for cross-border remittances. The current SWIFT system faces challenges, including slow settlement times, h... This paper proposes a blockchain-based system as a secure, efficient, and cost-effective alternative to SWIFT for cross-border remittances. The current SWIFT system faces challenges, including slow settlement times, high transaction costs, and vulnerability to fraud. Leveraging blockchain technology’s decentralized, transparent, and immutable nature, the proposed system aims to address these limitations. Key features include modular architecture, implementation of microservices, and advanced cryptographic protocols. The system incorporates Proof of Stake consensus with BLS signatures, smart contract execution with dynamic pricing, and a decentralized oracle network for currency conversion. A sophisticated risk-based authentication system utilizes Bayesian networks and machine learning for enhanced security. Mathematical models are presented for critical components, including transaction validation, currency conversion, and regulatory compliance. Simulations demonstrate potential improvements in transaction speed and costs. However, challenges such as regulatory hurdles, user adoption, scalability, and integration with legacy systems must be addressed. The paper provides a comparative analysis between the proposed blockchain system and SWIFT, highlighting advantages in transaction speed, costs, and security. Mitigation strategies are proposed for key challenges. Recommendations are made for further research into scaling solutions, regulatory frameworks, and user-centric designs. The adoption of blockchain-based remittances could significantly impact the financial sector, potentially disrupting traditional models and promoting financial inclusion in underserved markets. However, successful implementation will require collaboration between blockchain innovators, financial institutions, and regulators to create an enabling environment for this transformative system. 展开更多
关键词 INTEROPERABILITY tokens AML/KYC Compliance Peer-to-Peer Transfers Financial Inclusion
下载PDF
基于多模态融合和自适应剪枝Transformer的脑肿瘤图像分割算法
7
作者 姚宗亮 黄荣 +2 位作者 董爱华 韩芳 王青云 《宁夏大学学报(自然科学版)》 CAS 2024年第1期16-24,共9页
脑肿瘤是目前世界上最致命的肿瘤之一,所以脑肿瘤图像的自动分割在临床诊疗中变得日益重要.近年来,基于CNN和Transformer的脑肿瘤分割方法在医学图像分割领域取得了令人欣喜的成就.然而,大多数方法没有充分利用脑肿瘤多模态间的互补性... 脑肿瘤是目前世界上最致命的肿瘤之一,所以脑肿瘤图像的自动分割在临床诊疗中变得日益重要.近年来,基于CNN和Transformer的脑肿瘤分割方法在医学图像分割领域取得了令人欣喜的成就.然而,大多数方法没有充分利用脑肿瘤多模态间的互补性和差异性,并且模型中的Transformer在捕获远程依赖性的同时,忽略了其较大的计算复杂性、冗余依赖性等问题.针对此问题,提出一种基于多模态融合和自适应剪枝Transformer的脑肿瘤图像分割方法(MF-MAPT Swin UNETR),其中多模态融合模块可以充分学习性质相近的模态间信息和不同模态不同尺度的特征变化,为后续分割提供了充分的准备;基于多模态的自适应剪枝Transformer可以降低计算复杂度,对提升性能有一定的帮助,将MF-MAPT Swin UNETR模型在两个公共数据集上进行了实验验证,结果表明,该模型较最先进的方法整体具有突出的分割性能. 展开更多
关键词 脑肿瘤分割 TRANSFORMER 模态交叉连接 多尺度特征融合 token融合 自适应剪枝
下载PDF
局部加全局视角遮挡人脸表情识别方法
8
作者 南亚会 华庆一 《计算机工程与应用》 CSCD 北大核心 2024年第13期180-189,共10页
实际场景中各种遮挡增加了表情识别难度。为此,提出一种滑块局部加权卷积注意力和全局注意力池化的视觉Transformer结合的方法来解决遮挡问题。利用主干网络提取表情特征图,将表情特征图裁剪成多个区域块,利用局部Patch注意力单元通过... 实际场景中各种遮挡增加了表情识别难度。为此,提出一种滑块局部加权卷积注意力和全局注意力池化的视觉Transformer结合的方法来解决遮挡问题。利用主干网络提取表情特征图,将表情特征图裁剪成多个区域块,利用局部Patch注意力单元通过自适应计算局部特征的注意力权重来感知被遮挡的区域,提取表情局部特征。同时,表情特征图转换成Patch块,通过Patch级和Token级注意力池化的视觉Transformer,从全局角度捕获Patch块之间的相互作用和相关性。引导模型强调最具区别性的特征,而忽略遮挡减少不相关特征的影响。在三个表情数据集及其遮挡子集和一个遮挡数据集上进行实验,结果表明所提模型在遮挡表情识别上优于现有方法。 展开更多
关键词 遮挡人脸表情识别 滑块局部卷积注意力 Patch注意力池化 Token注意力池化 vision Transformer
下载PDF
从ChatGPT到Sora发展中的术语问题 被引量:7
9
作者 冯志伟 《中国科技术语》 2024年第2期88-92,共5页
在从ChatGPT到Sora的发展过程中,出现了不少新术语。这些术语,有的被翻译为中文,有的一直使用英文原文。文章在分析这些新术语的相关技术、概念的基础上,探讨如何为其翻译或者赋予适当的中文名称。并指出大量科技新术语不能够及时、高... 在从ChatGPT到Sora的发展过程中,出现了不少新术语。这些术语,有的被翻译为中文,有的一直使用英文原文。文章在分析这些新术语的相关技术、概念的基础上,探讨如何为其翻译或者赋予适当的中文名称。并指出大量科技新术语不能够及时、高效地被本土化,这对我国的术语规范化工作提出了新的挑战,期望学界共同关注这一问题。 展开更多
关键词 人工智能 ChatGPT SORA TRANSFORMER TOKEN scaling law
下载PDF
基于金字塔语义token全局信息增强的高分光学遥感影像变化检测
10
作者 彭代锋 翟晨晨 +3 位作者 周顶蔚 张永军 管海燕 臧玉府 《测绘学报》 EI CSCD 北大核心 2024年第6期1195-1211,共17页
针对复杂背景、光谱变化等因素导致高分辨率遥感影像中细小地物检测缺失,几何结构检测不完整等问题,本文联合卷积网络和Transformer网络优势,提出一种基于金字塔语义token全局信息增强的变化检测网络(PST-GIENet)。首先,利用无最大池化... 针对复杂背景、光谱变化等因素导致高分辨率遥感影像中细小地物检测缺失,几何结构检测不完整等问题,本文联合卷积网络和Transformer网络优势,提出一种基于金字塔语义token全局信息增强的变化检测网络(PST-GIENet)。首先,利用无最大池化层的ResNet18网络提取多时相影像深度特征以构建融合特征,并采用联合注意力机制和深监督策略提高融合特征表达能力;然后,通过空间金字塔池化将影像特征表示为多尺度语义token,进而利用Transformer编码器和解码器对融合特征空间进行全局上下文建模;最后,通过逐层上采样解码器生成最终变化图。为验证本文方法有效性,采用LEVIR-CD、CDD和WHU-CD 3个公开变化检测数据集进行对比试验与分析,定量结果表明PST-GIENet在3个数据集中均取得最优精度指标,其F 1值分别达到91.71%、96.16%和94.08%。目视结果表明PST-GIENet可有效抑制复杂背景、光谱变化等因素干扰,显著增强网络对地物边缘结构和多尺度变化的捕捉能力,取得最佳目视效果。 展开更多
关键词 高分辨率遥感影像 变化检测 金字塔语义token 全局依赖性 注意力机制
下载PDF
Markets in crypto‑assets regulation:Does it provide legal certainty and increase adoption of crypto‑assets?
11
作者 Tina van der Linden Tina Shirazi 《Financial Innovation》 2023年第1期509-538,共30页
This study discusses the European Union’s proposal for a Regulation on Markets in Crypto-Assets,now subject to formal approval by the European Parliament.The objective is to explore whether it will positively impact ... This study discusses the European Union’s proposal for a Regulation on Markets in Crypto-Assets,now subject to formal approval by the European Parliament.The objective is to explore whether it will positively impact the adoption of crypto-assets in the financial sector.The use of crypto-assets is growing.However,some stakeholders in the financial service sector remain skeptical and hesitant to adopt assets that are yet to be defined and have an unclear legal status.This regulatory uncertainty has been identified as the primary reason for the reluctant adoption.The proposed regulation(part of the EU’s Digital Finance Strategy)aims to provide this legal certainty for currently unregulated crypto-assets.This study investigates whether or not the proposed regulation can be expected to have the intended effect by reviewing the proposed regulation itself,the opinions and reactions of the various stakeholders,and secondary literature.Findings reveal that such regulation will most likely not accelerate the adoption of crypto-assets in the EU financial services sector,at least not sufficiently or as intended.Some suggestions are made to improve the proposal. 展开更多
关键词 MiCA regulation Crypto-assets Legal certainty Blockchain Distributed ledger technology Utility tokens Stablecoins Asset-referenced tokens e-money tokens
下载PDF
基于改进Vision Transformer的蝴蝶品种分类
12
作者 许翔 蒲智 +1 位作者 鲁文蕊 王亚波 《电脑知识与技术》 2024年第16期1-5,共5页
蝴蝶作为一种品类繁多且相似度极高的生物,具有重要的生态环境感知功能。不同品类蝴蝶对环境变化的敏感程度各不相同,因此在农学与生物学研究方向上对蝴蝶的研究具有十分重要的意义。近年来,计算机视觉技术的飞速发展为快速识别蝴蝶品... 蝴蝶作为一种品类繁多且相似度极高的生物,具有重要的生态环境感知功能。不同品类蝴蝶对环境变化的敏感程度各不相同,因此在农学与生物学研究方向上对蝴蝶的研究具有十分重要的意义。近年来,计算机视觉技术的飞速发展为快速识别蝴蝶品类提供了强有力的技术支持。然而,传统的Vision Transformer模型存在着一些问题,例如缺乏卷积所具有的归纳偏置、局部信息提取能力不足、容易过拟合以及在小数据集上训练缓慢等。针对这些问题,提出了一种基于Vision Transformer改进的蝴蝶分类算法。引入VanillaNet卷积结构,并通过全局注意力机制改进了Class token的更新方式。实验结果显示,在100类蝴蝶数据集上,改进后的Vision Transformer模型的Top-1准确率达到了94.87%,比改进前提升了28.9%。在使用改进的Class token后,算法的Top-1准确率进一步提升至96.64%,相比改进前提升了30.44%。与原网络模型相比,改进后的模型更适用于蝴蝶品种分类任务。 展开更多
关键词 蝴蝶分类 Vision Transformer 卷积 Class token VanillaNet 注意力机制
下载PDF
NFT Security Matrix:Towards Modeling NFT Ecosystem Threat
13
作者 Peng Liao Chaoge Liu +2 位作者 Jie Yin Zhi Wang Xiang Cui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3255-3285,共31页
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,nume... Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,numerous security concerns have been raised by the rapid expansion of the NFT ecosystem.NFT holders are exposed to a plethora of scams and traps,putting their digital assets at risk of being lost.However,academic research on NFT security is scarce,and the security issues have aroused rare attention.In this study,the NFT ecological process is comprehensively explored.This process falls into five different stages encompassing the entire lifecycle of NFTs.Subsequently,the security issues regarding the respective stage are elaborated and analyzed in depth.A matrix model is proposed as a novel contribution to the categorization of NFT security issues.Diverse data are collected from social networks,the Ethereum blockchain,and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT ecosystem.From this comprehensive dataset,nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative analysis.This study aims to shed light on the severity of NFT ecosystem security issues.The findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem. 展开更多
关键词 Non-fungible token blockchain cyber security
下载PDF
中文电子病历数据元抽取方法
14
作者 郭维嘉 郭少友 《医学信息学杂志》 CAS 2024年第8期78-83,共6页
目的/意义提出基于国家标准的电子病历数据元抽取方法,以实现电子病历数据的细粒度共享。方法/过程利用ALBERT、BiLSTM和CRF模型对电子病历进行序列标注,并根据标注结果生成一组候选数据元;针对每个候选数据元,采集其上下文信息并形成... 目的/意义提出基于国家标准的电子病历数据元抽取方法,以实现电子病历数据的细粒度共享。方法/过程利用ALBERT、BiLSTM和CRF模型对电子病历进行序列标注,并根据标注结果生成一组候选数据元;针对每个候选数据元,采集其上下文信息并形成一个增强的键向量;计算该向量与标准向量之间的相似度,据此判断候选数据元是否有效。结果/结论该方法F 1值为90.32%,效果较好。 展开更多
关键词 电子病历 数据元 ALBERT 序列标注 token向量
下载PDF
Advancements in Web3 Infrastructure for the Metaverse
15
作者 Victor C.M.LEUNG CAI Wei 《ZTE Communications》 2024年第2期1-2,共2页
Web3,also known as Web 3.0,has recently been attracting increasing attention from industry and academia.Leveraging the potential of blockchain technologies,Web3 has emerged as a pivotal foundation in the realm of meta... Web3,also known as Web 3.0,has recently been attracting increasing attention from industry and academia.Leveraging the potential of blockchain technologies,Web3 has emerged as a pivotal foundation in the realm of metaverse development,which is considered by many as the next-generation Internet.Specifically,Web3 technologies such as smart contracts and protocols like non-fungible tokens(NFTs)have supported the immersive and content-rich experience of current Web3 metaverse projects. 展开更多
关键词 WEB TOKEN attracting
下载PDF
统一身份认证和权限控制服务框架
16
作者 曹广华 刘佑东 +3 位作者 何红 杨雨虹 彭儒相 俞瑞 《指挥信息系统与技术》 2024年第4期95-98,共4页
为提升海上监管组织机构的信息化管理水平,构建了一种统一身份认证和权限控制服务框架。该服务框架结合使用应用签名、重定向和token生成等技术实现统一身份认证服务,采用用户-岗位-角色-权限四级关系实现跨应用系统之间的统一权限控制... 为提升海上监管组织机构的信息化管理水平,构建了一种统一身份认证和权限控制服务框架。该服务框架结合使用应用签名、重定向和token生成等技术实现统一身份认证服务,采用用户-岗位-角色-权限四级关系实现跨应用系统之间的统一权限控制,采用全量与订阅分发消息中间件kafka增量相结合的方式实现用户数据同步的双向同步,从而为登录鉴权、整网漫游和权限控制等提供数据服务支撑。该服务框架适应性强且可灵活扩展,可应用于客户端/服务器端(C/S)系统、浏览器端/服务器端(B/S)系统和手机应用程序(App)等信息系统平台。 展开更多
关键词 应用签名 token生成 跨应用系统权限控制 数据全量与增量同步
下载PDF
Trade Tokens
17
作者 By CHEN WEN 《Beijing Review》 2006年第18期14-15,共2页
In the pursuit of balanced trade with the U.S., China pours it on where it counts A week ahead of Chinese President Hu Jintao's first state visit to the United States, Beijing and Washington reached a series of ag... In the pursuit of balanced trade with the U.S., China pours it on where it counts A week ahead of Chinese President Hu Jintao's first state visit to the United States, Beijing and Washington reached a series of agreements intended to ease the bilateral trade imbalance, including resuming trade in U.S. beef, increasing Chinese market access to U.S. medical devices, telecom services and express delivery, and cracking down on intellectual property rights infringements. 展开更多
关键词 Trade tokens JCC
原文传递
THE MEANING OF FROZEN TOKENS IN LIVE NETS
18
作者 陆维明 A.MERCERON 《Science China Mathematics》 SCIE 1989年第4期459-469,共11页
A concurrent system can be modeled by a Petri net. A live Petri net may have fro-zen tokens. It is showed that such tokens can be deleted if they are superfluous, and, whilethey are useful, can be defrozen if they bec... A concurrent system can be modeled by a Petri net. A live Petri net may have fro-zen tokens. It is showed that such tokens can be deleted if they are superfluous, and, whilethey are useful, can be defrozen if they became frozen due to unfair occurrences of tran-sitions, and, finaloy, some frozen tokens lead to more processes. 展开更多
关键词 FROZEN TOKEN LIVE net UNFAIR occurrence.
原文传递
Tokenomics and blockchain tokens: A design-oriented morphological framework
19
作者 Pierluigi Freni Enrico Ferro Roberto Moncada 《Blockchain(Research and Applications)》 2022年第1期80-95,共16页
Blockchain technology has been around for more than ten years,nevertheless,the knowledge about its economic and business implications is still fragmented and heterogeneous.The present article intends to tackle this is... Blockchain technology has been around for more than ten years,nevertheless,the knowledge about its economic and business implications is still fragmented and heterogeneous.The present article intends to tackle this issue with a twofold contribution.The first is an analysis of the shift from economics to tokenomics highlighting the central role played by tokens within blockchain-based ecosystems.The second is a framework for tokens design leveraging a morphological analysis deeply grounded in the literature.As blockchain becomes a mainstream phenomenon,the value of the work proposed lies in lowering the cognitive barriers and in clarifying the space of available options for private and public actors willing to leverage tokenization in their daily operations. 展开更多
关键词 Blockchain TOKENIZATION Tokenomics Classification framework Token design
原文传递
基于学生评教小程序的Web服务端研究与设计 被引量:2
20
作者 杨亚仿 林政艺 《计算机时代》 2023年第10期132-136,共5页
小程序的数据加载与业务流程运行需要Web服务端的安全验证与快速响应。基于高校学生评教小程序的应用,结合具体的评教业务流程,对小程序的Web服务端特点进行了研究与分析,重点对Web服务端如何保持安全、高效的运行进行了研究与设计,具... 小程序的数据加载与业务流程运行需要Web服务端的安全验证与快速响应。基于高校学生评教小程序的应用,结合具体的评教业务流程,对小程序的Web服务端特点进行了研究与分析,重点对Web服务端如何保持安全、高效的运行进行了研究与设计,具体包括自定义JSON序列化、自定义Token以及评教数据的缓存和同步机制等功能。该研究对Web服务端的设计与应用有一定的参考价值。 展开更多
关键词 Web服务端 JSON序列化 自定义Token 数据缓存
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部