摘要:
Described herein are systems and methods for the generation and maintenance of language models. Language models are developed based at least in part on transaction data from one or more users. These transactions may include purchases and other interactions between one or more users and one or more online merchants. The language models may be associated with a particular user or group of users. Ongoing transactions may modify the language models. The language models may be used to recognize spoken input from the one or more users.
摘要:
It is to provide a method for removing a tin defect present on the surface of a glass substrate produced by a float process in a short time without the glass substrate surface being damaged regardless of the glass temperature. A method for removing a tin-containing foreign matter from the surface of glass, which comprises applying to the surface of a glass substrate produced by a float process a pulse laser beam having a transmittance of at least 70% through the glass substrate and having a pulse width, a wavelength and an energy density per unit area on the glass substrate surface which satisfy specific relations, to remove a tin-containing foreign matter present on the rear face opposite to the face irradiated with the pulse laser beam.
摘要:
Described herein are systems and methods for context-aware speech processing. A speech context is determined based on context data associated with a user uttering speech. The speech context and the speech uttered in that speech context may be used to build acoustic models for that speech context. An acoustic model for use in speech processing may be selected based on the determined speech context. A language model for use in speech processing may also be selected based on the determined speech context. Using the acoustic and language models, the speech may be processed to recognize the speech from the user.
摘要:
A computing device can capture video data of at least a portion of a mouth area (e.g., mouth, lips, tongue, chin, jaw) of a user of the device. The computing device can also capture sound data including a voice of the user as well as noise (e.g. background noise). The video data can be processed to detect a movement of the portion of the mouth area. The movement of the portion of the mouth area can be analyzed and compared with mouth area movement models characteristic of oral communication (e.g., speech, song). If the movement of the portion of the mouth area corresponds to at least one model characteristic of oral communication, then the movement indicates that the user is likely engaging in oral communication. Noise reduction can be applied and/or increased on the captured sound data to reduce noise and in turn enhance the user's voice.
摘要:
It is to provide a method for removing a tin defect present on the surface of a glass substrate produced by a float process in a short time without the glass substrate surface being damaged regardless of the glass temperature.A method for removing a tin-containing foreign matter from the surface of glass, which comprises applying to the surface of a glass substrate produced by a float process a pulse laser beam having a transmittance of at least 70% through the glass substrate and having a pulse width, a wavelength and an energy density per unit area on the glass substrate surface which satisfy specific relations, to remove a tin-containing foreign matter present on the rear face opposite to the face irradiated with the pulse laser beam.
摘要:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
摘要:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
摘要:
A method for processing a chain of packets involving obtaining the chain of packets from a network, obtaining destination information from a first packet in the chain of packets, determining whether destination information of the first packet matches destination information of a second packet in the chain of packets, aggregating the first packet and the second packet to obtain an aggregated chain of packets, if destination information of the second packet matches the destination information of the first packet, hashing destination information to obtain a hash value, and forwarding the aggregated chain of packets to at least one client using the hash value.
摘要:
Soybean milk-containing alcoholic beverage containing fermented soybean milk, acid soybean milk or a mixture thereof, alcohol and high methoxylpectin. This beverage does not result in formation of precipitates.
摘要:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.