摘要:
Described is processing a web query into structured data, such as for use in formulating a database query. A classifier and segmental conditional random field (CRF) model classify and segment a query into labeled segments used to obtain the structured data. The structured data includes a class, an intent set corresponding to data sought by the query, and an attribute set corresponding to an attribute name and attribute value representing each modifier in the query. The structured data may be converted into a query language (e.g., SQL) query to query the structured data source; e.g., the class may be used to select a database, the attribute set used to find one or more columns and a row in the database, and the intent set matched to a column, whose row data is the result being sought. A web search engine may return the database query as part of its results.
摘要:
Systems and methods are disclosed for crystal growth including features of reducing micropit cavity density in grown germanium crystals. In one exemplary implementation, there is provided a method of inserting an ampoule with raw material into a furnace having a heating source, growing a crystal using a vertical growth process wherein movement of a crystallizing temperature gradient relative to the raw material/crucible is achieved to melt the raw material, and growing, at a predetermined crystal growth length, the material to achieve a monocrystalline crystal, wherein monocrystalline ingots having reduced micro-pit densities are reproducibly provided.
摘要:
Embodiments of the present invention provide method for implementing security-related processing on packet and a network security device. Through establishing a relationship between stream attribute information of an initial packet of a stream and security-related processing information implemented on the initial packet, when a succeeding packet of the stream is received, the previously stored relationship is acquired according to stream attribute information of the succeeding packet, the security-related processing is implemented on the succeeding packet according to the security-related processing information in the relationship. Therefore, according to the method for implementing security-related processing on packet and the network security device provided by the present invention, the process of searching for security information entries for succeeding packets of a stream is not required, the security-related processing procedure of the packet is thus accelerated, and the packet processing efficiency is improved.
摘要:
To construct a classifier, a data structure correlating queries to items identified by the queries is received, where the data structure contains initial labeled queries that have been labeled with respect to predetermined classes, and unlabeled queries that have not been labeled with respect to the predetermined classes. The data structure is used to label at least some of the unlabeled queries with respect to the predetermined classes. Queries in the data structure that have been labeled with respect to the predetermined classes are used as training data to train the classifier.
摘要:
In accordance with one embodiment of the present invention, unanticipated semantic intents are discovered in audio data in an unsupervised manner. For instance, the audio acoustics are clustered based on semantic intent and representative acoustics are chosen for each cluster. The human then need only listen to a small number of representative acoustics for each cluster (and possibly only one per cluster) in order to identify the unforeseen semantic intents.
摘要:
Described is the use of acoustic data to improve grapheme-to-phoneme conversion for speech recognition, such as to more accurately recognize spoken names in a voice-dialing system. A joint model of acoustics and graphonemes (acoustic data, phonemes sequences, grapheme sequences and an alignment between phoneme sequences and grapheme sequences) is described, as is retraining by maximum likelihood training and discriminative training in adapting graphoneme model parameters using acoustic data. Also described is the unsupervised collection of grapheme labels for received acoustic data, thereby automatically obtaining a substantial number of actual samples that may be used in retraining. Speech input that does not meet a confidence threshold may be filtered out so as to not be used by the retrained model.
摘要:
Methods and apparatus to predict software values are disclosed. In one example, a method identifies a variable associated with one or more machine readable instructions, determines a predicted value of the variable based on a pattern, generates a value prediction instruction to predict a run-time value using the predicted value of the variable based on the pattern, and combines the value prediction instruction with the one or more machine readable instructions.
摘要:
A self-mechanical-cleaning toilet system with water-splash cleaning options provides a more sanitary and comfortable bathroom experience with minimum water usage. The system includes a receiving trough, a removal scraper, a guide bar, a back door, a first translation mechanism, a second translation mechanism, and a controller. The receiving trough collects the excrement, while the removal scraper moves the excrement out. The guide bar controls the movement of the removal scraper along the receiving trough. The back door separates the receiving trough from an excrement storage compartment/sewer system. The first translation mechanism moves the removal scraper, while the second translation mechanism moves the back door as necessary. The controller monitors and controls the cycles of the operation of the first translation mechanism and the second translation mechanism. The water-splash cleaning options dispense specified amounts of fluids for cleaning and sanitation purposes. The system also includes means to eliminate unpleasant odors instantly.
摘要:
Techniques are disclosed for comparing database tables. In one embodiment, the database tables are partitioned. Queries are generated for retrieving each partition. For each generated query, a stored procedure is invoked, using the respective generated query as an input parameter to the stored procedure. The stored procedure is configured to generate a checksum based on the partition retrieved from executing the respective query. The application compares the generated checksums to determine if the partitions and/or tables are consistent.
摘要:
In one embodiment, a method includes accessing a social graph that includes a plurality of nodes and edges, receiving an unstructured text query, identifying nodes and edges that correspond to n-grams of the text query, accessing a context-free grammar model, identifying grammars having query tokens that correspond to the identified nodes and edges, determining a score for each identified grammar, and then generating structured queries based on the identified grammars based on strings generated by the grammars.