摘要:
Text processing includes: segmenting received text based on a lexicon of smallest semantic units to obtain medium-grained segmentation results; merging the medium-grained segmentation results to obtain coarse-grained segmentation results, the coarse-grained segmentation results having coarser granularity than the medium-grained segmentation results; looking up in the lexicon of smallest semantic units respective search elements that correspond to segments in the medium-grained segmentation results; and forming fine-grained segmentation results based on the respective search elements, the fine-grained segmentation results having finer granularity than the medium-grained segmentation results.
摘要:
A battery over-current protection controller includes a current sense circuit, a first pin coupled to one end of the current detection circuit, a second pin, and a third pin. The second pin and the third pin are respectively coupled to a positive end and a negative end of a battery module. The current sense circuit includes a reference voltage generation unit, a voltage dividing unit, and a comparison unit. The reference voltage generation unit is coupled between the second pin and the third pin to generate a reference voltage. The voltage dividing unit has one end coupled to the reference voltage to thereby generate a voltage dividing signal. The comparison unit receives the voltage dividing signal and a current detection signal indicative of a value of a current flowing through the current detection circuit to thereby generate an over-current protection signal when the current is greater than the predetermined current.
摘要:
Methods of producing photo-voltaic devices include spray coating deposition of metal chalcogenides, contact lithographic methods and/or metal ion injection. Photo-voltaic devices include devices made by the methods, tandem photo-voltaic devices and bulk junction photovoltaic devices.
摘要:
A method and system is provided for encrypting an image compressed with a JPEG2000-based compression with minimal overhead so that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression and can be scaled without decrypting. The encryption system generates, for each independent encryption segment of a codestream for an image, a unique initialization vector from a global initialization vector in such a way that the initialization vectors can be generated during decryption from the global initialization vector, even after truncation. The encryption system encrypts each independent encryption segment using its unique initialization vector. The encryption system ensures that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression both as originally generated and as truncated by an encryption-unaware device.
摘要:
The invention provides a novel class of compounds, pharmaceutical compositions comprising such compounds and methods of using such compounds to treat or prevent diseases or disorders associated with abnormal or deregulated B cell activities, particularly diseases or disorders that involve aberrant activation of inositol 1,4,5-trisphosphate 3-kinase B (ITPKb).
摘要:
The present invention provides a method of allocating resources in a wireless communication system. The method includes requesting persistent allocation of resources for a data spurt in response to detecting the beginning of the data spurt and performing non-persistent resource allocation for at least one packet in the data spurt. The non-persistent resource allocation is performed in response to determining that persistent resources are not available for allocation. The method also includes transmitting the packet using the allocated non-persistent resources.
摘要:
A system for backend conversion attribution of an advertisement served to a user device. The advertisement server provides an advertisement to the user device. The advertisement server receives user information from the user device. The advertisement server stores attributable event information and the user information into an attributable event record in a data store. Based on a user event, a conversion server receives conversion information and the user information from the user device. The conversion server stores the conversion information and the user information into a conversion record in the data store. An attribution server matches the attributable event record with the conversion record.
摘要:
A method for service protection is disclosed, which is applied to a 1:n switching technique. The method includes the following steps. A source end sends a service to a work transmission entity, the work transmission entity performs performance monitoring through the transmitted service, a sink end receives the service from the work transmission entity; when a Signal Degrade (SD) fault occurs at the work transmission entity, the source end sends the service to the work transmission entity and a protection transmission entity simultaneously, and the sink end selects to receive the service from the protection transmission entity; the protection transmission entity performs the performance monitoring through the transmitted service; when the SD fault occurs at both the work transmission entity and the protection transmission entity, the sink end still receives the service from the protection transmission entity. A system for service protection is also disclosed. Technical solutions enable the service to get valid protection during the transmission process, and avoid frequent switching of the service, thereby improving the service quality.
摘要:
A protection method in a packet transport network is provided. A protection path is established for a service data flow borne on a shared protection ring in the method, where the protection path includes a wrapping protection path and a steering protection path. Firstly, a first service data flow is sent through the wrapping protection path. Then, a service data flow node stops sending a second service data flow subsequent to the first service data flow to the wrapping protection path, and buffers the second service data flow. When the first service data flow completely passes by the service data flow node again, the buffered second service data flow is switched from the wrapping protection path to the steering protection path.
摘要:
A method of receiving data packets. In the method of receiving data packets, a determination is made as to whether a received data packet is received out of an expected order. If the determining step determines a received packet is out of the expected order, a time period is calculated to wait for one or more missing data packets based at least in part on an expected time of receiving the one or more missing data packets.