摘要:
Input handwritten characters are classified as print or cursive based upon numerical feature values calculated from the shape of an input character. The feature values are applied to inputs of an artificial neural network which outputs a probability of the input character being print or cursive. If a character is classified as print, it is analyzed by a print character recognizer. If a character is classified as cursive, it is analyzed using a cursive character recognizer. The cursive character recognizer compares the input character to multiple prototype characters using a Dynamic Time Warping (DTW) algorithm.
摘要:
A processing device, such as, for example, a tablet PC, or other processing device, may receive non-textual language input. The non-textual language input may be recognized to produce one or more textual characters. The processing device may generate a list including one or more prefixes based on the produced one or more textual characters. Multiple text auto-completion predictions may be generated based on multiple prediction data sources and the one or more prefixes. The multiple text auto-completion predictions may be ranked and sorted based on features associated with each of the text auto-completion predictions. The processing device may present a predetermined number of best text auto-completion predictions. A selection of one of the presented predetermined number of best text auto completion predictions may result in a word, currently being entered, being replaced by the selected one of the predetermined number of best text auto completion predictions.
摘要:
Input handwritten characters are classified as print or cursive based upon numerical feature values calculated from the shape of an input character. The feature values are applied to inputs of an artificial neural network which outputs a probability of the input character being print or cursive. If a character is classified as print, it is analyzed by a print character recognizer. If a character is classified as cursive, it is analyzed using a cursive character recognizer. The cursive character recognizer compares the input character to multiple prototype characters using a Dynamic Time Warping (DTW) algorithm.
摘要:
Learning to reorder alternates based on a user's personalized vocabulary may be provided. An alternate list provided to a user for replacing words input by the user via a character recognition application may be reordered based on data previously viewed or input by the user (personal data). The alternate list may contain generic data, for example, words for possible substitution with one or more words input by the user. By using the user's personal data and statistical learning methodologies in conjunction with generic data in the alternate list, the alternate list can be reordered to present a top alternate that more closely reflect the user's vocabulary. Accordingly, the user is presented with a top alternate that is more likely to be used by the user to replace data incorrectly input.
摘要:
Various technologies and techniques are disclosed for using user corrections to help improve handwriting recognition operations. The system tracks user corrections to recognition results. The system receives handwritten input from the user and performs a recognition operation to determine a top recognized word. The prior corrections made by the user are analyzed to calculate a ratio of times the user has corrected the top recognized word to a particular other word as opposed to correcting the particular other word to the top recognized word. If the ratio meets or exceeds a required minimum, then at least one secondary source is optionally analyzed to determine if the particular other word is used a certain number of times more frequently than the top recognized word in the secondary source. The system performs a swap of the top recognized word with the particular other word when the required criteria are met.
摘要:
A spam detection system employs a “Delayed-Verification on Purported Responsible Address” (DVPRA) module which verifies the validity of the return address of a received e-mail message in mail server in a time delay interval specifiable by the user. An implementation of the module as a Spam Mail Filter in a stand-alone spam detection system. An implementation of the module as a supplementary to the existing anti-spam systems.
摘要:
Learning to reorder alternates based on a user's personalized vocabulary may be provided. An alternate list provided to a user for replacing words input by the user via a character recognition application may be reordered based on data previously viewed or input by the user (personal data). The alternate list may contain generic data, for example, words for possible substitution with one or more words input by the user. By using the user's personal data and statistical learning methodologies in conjunction with generic data in the alternate list, the alternate list can be reordered to present a top alternate that more closely reflect the user's vocabulary. Accordingly, the user is presented with a top alternate that is more likely to be used by the user to replace data incorrectly input.
摘要:
Various technologies and techniques are disclosed for using user corrections to help improve handwriting recognition operations. The system tracks user corrections to recognition results. The system receives handwritten input from the user and performs a recognition operation to determine a top recognized word. The prior corrections made by the user are analyzed to calculate a ratio of times the user has corrected the top recognized word to a particular other word as opposed to correcting the particular other word to the top recognized word. If the ratio meets or exceeds a required minimum, then at least one secondary source is optionally analyzed to determine if the particular other word is used a certain number of times more frequently than the top recognized word in the secondary source. The system performs a swap of the top recognized word with the particular other word when the required criteria are met.
摘要:
A security system includes a network adapter that links the security system to a computer network infrastructure to establish a connection to the network. An embedded HTTP server receives and responses to the requests sent from any HTTP client having access to the computer network. A browser-based management module allows any HTTP client that is capable of accessing the computer network to setup and maintain the security system. A browser-based information query module allows any HTTP client that is capable to access the computer network to access the information of the security system.